id
stringlengths
9
10
text
stringlengths
1
18.1M
source
stringclasses
1 value
created
timestamp[s]
added
stringlengths
26
26
metadata
dict
2107.12471
# Thermodynamic speed limits for co-evolving systems Farita Tasnim [email protected], web: farita.me Massachusetts Institute of Technology, Cambridge, MA, USA David H. Wolpert [email protected], web: davidwolpert.weebly.com Santa Fe Institute, Santa Fe, NM, USA Complexity Science Hub, Vienna, Austria Arizona State University, Tempe, AZ, USA ###### Abstract Previously derived “global” thermodynamic speed limit theorems state that increasing the maximum speed with which a system can evolve between two given probability distributions over its states requires the system to produce more entropy in its evolution. However, these theorems ignore that many systems are not monolithic, but instead comprise multiple subsystems that interact according to an (often sparse) network. Indeed, most naturally-occurring and human-engineered systems of increasing complexity can be decomposed into sets of co-evolving subsystems, where there exist a priori constraints on the dynamics of each subsystem, restricting which other subsystems can affect its dynamics. Here we derive three new SLTs that account for the thermodynamic effects of such constraints. Our first new speed limit strengthens the global speed limit. While our other two SLTs do not have this guarantee, in some situations they are even stronger than our first speed limit. Our results establish that a stochastically evolving system will, on average, produce more entropy in evolving between two distributions within a given time simply due to its comprising multiple, co-evolving subsystems. We illustrate our results with numerical calculations involving a model of two cells sensing and storing information about their environment. ††preprint: APS/123-QED Introduction We can characterize a stochastic process by the minimum time it takes to evolve from one particular, specified probability distribution over its states into another specified distribution. To give just a few examples, such lower bounds usefully describe: a cell that senses a change in its environment [1, 2] or synthesizes a protein [3]; a set of chemical species that changes their concentrations via a chemical reaction network [4, 5]; a genome that evolves to include particular mutations [6, 7]; a digital device that completes a particular computation [8, 9]; a network of neurons that store, process and transmit information [10, 11, 12] or (re)configures itself [13, 14]; and an opinion network that evolves from a unimodal to a bimodal state [15, 16]. Continuous-time Markov chains (CTMC’s) can accurately serve as models of many of these stochastic processes. With the new body of work sometimes called (classical) “stochastic thermodynamics" [17, 18, 19, 20, 21, 22] developed in the last two decades, we have drastically improved our ability to analyze the thermodynamics of CTMCs. For example, thermodynamic uncertainy relations (TURs) [23, 24] have shown that dissipated work constrains the fluctuations in any current flowing in a system at a steady state arbitrarily far from equilibrium. Additionally, fluctuation theorems (FTs) [18, 25, 26] have shown that probability distributions over any functional of a stochastic trajectory obey symmetries that constrain their even and odd moments. In addition to these powerful new results, the last few years have brought about a quickly growing set of lower bounds on the time it takes a system evolving according to a CTMC to move from one given distribution over the system’s states to another one [27, 28, 29, 30, 31, 32, 33]. These “thermodynamic speed limit theorems" (SLTs) reveal a trade-off between the time for the evolution to take place, and the amount of work dissipated (and, thus, free energy consumed) during that evolution. As a canonical example, the SLT derived in [33] lower bounds this time of evolution with a quantity proportional to the total variation distance between the initial and final distributions over system states; and inversely proportional to the total entropy production (EP) and time-averaged dynamical activity. When local detailed balance holds, the EP equals the work a system must dissipate during a process, i.e., the degree to which the total entropy of the universe increases, or the expended free energy that cannot be recovered. Therefore, intuitively, this SLT declares that if we modify a CTMC to make it change its distribution either by a greater amount or in less time, then we must “pay for” that faster evolution by increasing (a lower bound on) the total dissipated work. However, like most of the other theorems in (classical) stochastic thermodynamics [17, 19, 20, 34], the previously derived SLTs do not exploit any information concerning the internal structure of a system. In particular, these SLTs ignore all aspects of how the system might decompose into a set of co-evolving subsystems. Although this attribute allows for their broad applicability, these SLTs will, in general, provide increasingly weak bounds for systems of increasing complexity. As a result, such “global SLTs”, along with other previously derived thermodynamic relations (such as the TURs and FTs) that formalize systems as monolithic entities, most appropriately apply to nanoscale systems [18, 35, 36, 37, 38, 39, 40, 41], whose internal structure is either unimportant (because the system is so small) or unknown. Importantly, this shortcoming needlessly limits the strength of these results. For many systems above the nanoscale, we know much about how their internal subsystems influence each other. For example, many sets of co-evolving subsystems form modular interaction networks [42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52]. This kind of internal structure can be formulated as a set of constraints on the CTMC governing the overall dynamics of the whole system. Here we derive tighter SLTs by analyzing how constraints on the allowed dynamics in a system affect its stochastic thermodynamics. Specifically, we explore a major class of dynamical constraints that arises in systems of increasing complexity, as imposed by the property that they decompose into sets of co-evolving subsystems, where the interactions between subsystems restrict how the overall, combined system can evolve. Figure 1: An example of a multipartite process. This MPP consists of four subsystems and maps to the abstracted MPP given in Fig. 2. Subsystem 3 is $l$, the concentration of the ligand in a cellular medium. Two "nearby" cells sense this ligand concentration. The number of bound receptors, $n_{r_{1}}$, in Cell 1 comprise subsystem 2, and the number of bound receptors, $n_{r_{2}}$, in Cell 2 comprise subsystem 4. Subsystem 1 represents a memory of (phosphorylated) proteins, $n_{m}$, in Cell 1 that observes the state of its receptors. We begin by reviewing the relevant stochastic thermodynamics of co-evolving subsystems, with emphasis on subsystem-indexed contributions to thermodynamic quantities such as the entropy production. As commonly done in the literature, we assume that subsystems are spatially separated, and therefore that the overall system evolves as a multipartite process (MPP) [43, 44, 49, 48]. We next derive three major results, each a new SLT applicable to multipartite processes. The first SLT demonstrates that accounting for the dynamical constraints resulting from the internal structure of interactions in an MPP strengthens the bound on the minimum time required for that system to evolve between two distributions. In deriving our second SLT, we note that an important concept in analyzing a set of co-evolving subsystems is that of a "unit", which is a subset of subsystems whose joint dynamics is independent of the state of all the other subsystems. While subsystems outside of a unit can “observe” (depend on the state of) a subsystem in a unit, the reverse is not true. This SLT shows that a system can never evolve faster than its slowest- evolving unit. Our third SLT shows that a system can never evolve faster than its slowest-evolving subsystem. We prove that the first SLT is always at least as strong as the global SLT in [33], regardless of the details of the system’s dependency constraints. The other two SLTs do not always have this guarantee; however, in many cases, they are stronger than our first SLT. We derive our new SLTs in full detail in Appendices S1 and S2. We then conduct numerical calculations to explore the strength of our new SLTs for the example MPP of a cell sensing its environment, a model previously studied in the literature [1, 53]. This example, depicted in Fig. 1, consists of two sets of cellular receptors and a cellular memory that sense and record the value of a changing ligand concentration. We end the main text with a discussion of the significance of our results, a summary of thermodynamic consistency and auxiliary results (including new speed limits for Bayes’ Nets) derived in the sections S3 - S10 of the Appendices, and suggestions for future work. We summarize all notation used in the main text in Appendix S11. Figure 2: An example of a multipartite process. The system consists of four subsystems, indicated by outlined circles. The arrows represent dependencies that restrict the associated subsystem’s rate matrices: the state of subsystem 1 at time $t+\delta t$ depends on the state of subsystems 1 and 2 at time $t$; subsystem 2 depends on 2 and 3; subsystem 3 depends only on itself, and subsystem 4 depends on 3 and 4. The set of all dependency constraints can be represented as a directed acyclic graph (DAG), called a dependency graph $(1\leftarrow 2\leftarrow 3\rightarrow 4)$. Five units exist in the system aside from the global system itself: $\\{\omega,\alpha,\phi,\beta,\psi\\}$. Each unit structure, indicated by circle-capped vertical lines, is a set of units that is closed under intersections and that covers $\mathcal{N}$. There are four possible unit structures, $\mathcal{N}^*_{1}=\\{\omega,\alpha,\phi\\}$, $\mathcal{N}^*_{2}=\\{\omega,\alpha,\phi,\beta\\}$, $\mathcal{N}^*_{3}=\\{\omega,\psi,\beta\\}$, or $\mathcal{N}^*_{4}=\\{\omega,\psi,\alpha,\beta,\phi\\}$. Results Stochastic thermodynamics of multipartite processes A set of co-evolving systems can be modeled to evolve as a multipartite process (MPP). Formally, an MPP describes any system with the property that no two of its subsystems can change state at exactly the same time. We call this the multipartite property. MPPs are extremely common [43, 44, 49, 48], including biological sensors, information engines, and Ising spin systems that can be modeled with the Gillespie algorithm or kinetic Monte Carlo simulations [54]. Other examples include eukaryotic cells, which consist of multiple interacting organelles and biomolecular species [1]. Subcellular processes such as protein synthesis could also be modelled as MPPs, with subsystems as ribosomal subunits, mRNA, and sets of tRNA-activated amino acids [3]. An MPP can have any arbitrary collection of dependency constraints, i.e., restrictions on how the dynamics of each subsystem depends on the states of the other subsystems. This includes non-reciprocal couplings between subsystems [55], such as those that can be found in networks represented by directed acyclic graphs (DAGs) [56]. This assumption of no “back-action” is used throughout literature [57, 1]. The ubiquity of MPPs arises because, unless two subsystems occupy the exact same location, they will not be coupled to the same degrees of freedom in the external reservoirs. Therefore, it is physically impossible for them to change state at the exact same moment due to a single fluctuation in their interaction with a reservoir. Additionally, continuous time also allows for successive state transitions to occur arbitrarily closely in time. We consider an MPP $\mathcal{N}$ that comprises a set of $N$ subsystems with finite state spaces $\\{X_{i}:i=1,\ldots,N\\}$. $x$ indicates a state vector in $X=\bigtimes_{\;i\in\mathcal{N}}X_{i}$, the joint state space of the full system. For any set of subsystems $A\subset\mathcal{N}$, we write $-A:=\mathcal{N}\backslash A$, and $x_{A}$ indicates an element of $X_{A}=\bigtimes_{\;i\in A}X_{i}$. For any two distributions $p$ and $p^{\prime}$ over $X$, we write the total variation (L1) distance between them as $\displaystyle\mathcal{L}(p,p^{\prime})=\sum_{x}\left\lvert p_{x}-p^{\prime}_{x}\right\rvert$ (1) We indicate the Shannon entropy of a distribution over states $X_{A}$ as $S^{X_{A}}$ or $S^A$. We set $k_{\text{B}}=1$. The joint dynamics over $X$ is given by the master equation $\displaystyle\frac{dp_{x}(t)}{dt}=\sum_{x^{\prime}}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)$ (2) In an MPP, there also exists a set of $N$ (possibly time-varying) stochastic rate matrices, $\\{K^{x^{\prime}}_{x}(i;t):i=1,\ldots,N\\}$ where $K^{x^{\prime}}_{x}(i;t)=0\;\forall\,i,t,\\{x^{\prime},x\,|\,x^{\prime}_{-i}\neq x_{-i}\\}$, and we can decompose $\displaystyle K^{x^{\prime}}_{x}(t)=\sum_{i\in\mathcal{N}}K^{x^{\prime}}_{x}(i;t)$ (3) Similarly, for any $B\subseteq\mathcal{N}$, $K^{x^{\prime}}_{x}(B;t)=\sum_{i\in B}K^{x^{\prime}}_{x}(i;t)$. In an MPP, $K^{x^{\prime}}_{x}(t)=0$ if $x^{\prime}$ and $x$ differ in more than one component. In other words, at any given moment in time, only one subsystem can undergo a state transition. This means that the global rate matrix is sparse for many MPPs. Note that for all $x^{\prime}\neq x$, $\displaystyle K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}}_{x}(t)\delta(x^{\prime}_{-i},x_{-i})$ (4) For each subsystem $i$, we write $r(i;t)$ for any set of subsystems at time $t$ that include $i$ and for which we can write $\displaystyle K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}_{r(i;t)}}_{x_{r(i;t)}}(i;t)\,\delta(x^{\prime}_{-r(i;t)},x_{-r(i;t)})$ (5) In general, for any given $i$ there could be multiple such sets $r(i;t)$. We refer to a specification of any $r(i;t)$ as a dependency constraint. We define a unit $\omega$ (at an implicit time $t$) as a set of subsystems $i$ such that $i\in\omega$ implies that $r(i;t)\subseteq\omega$. Consequently, any intersection of two units is a unit, as is any union of two units. For any unit $\omega$, we can decompose $K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)=\sum_{i\in\omega}K^{x^{\prime}_{\omega}}_{x_{\omega}}(i;t)$. So, by Eq. 5, $K^{x^{\prime}}_{x}(\omega;t)=\sum_{i\in\omega}K^{x^{\prime}}_{x}(i;t)=K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)\delta(x^{\prime}_{-\omega},x_{-\omega})$. We write $\mathcal{N}^{**}$ for the set of all units in $\mathcal{N}$, other than the global system itself. For the example system shown in Fig. 2, $\mathcal{N}^{**}=\\{\omega,\alpha,\phi,\beta,\psi\\}$. For later use, we also define $\mathcal{N}^\dagger=\mathcal{N}^{**}\cup\mathcal{N}$. As is standard in the recent literature on MPPs [48, 49, 47], we assume that there are pre-fixed time intervals in which $\mathcal{N}^{**}$ doesn’t change, and restrict attention to such an interval. Crucially, the local marginal distribution $p_{x_{\omega}}(t)$ of any unit $\omega$ at any time $t$ evolves as a self-contained CTMC with the local rate matrix $K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)$ (proved in Appendix A of [49]): $\displaystyle\frac{dp_{x_{\omega}}(t)}{dt}=\sum_{x^{\prime}_{\omega}}K^{x^{\prime}_{\omega}}_{x_{\omega}}(\omega;t)p_{x^{\prime}_{\omega}}(t)=\sum_{x^{\prime}_{\omega}}\sum_{i\in\omega}K^{x^{\prime}_{\omega}}_{x_{\omega}}(i;t)p_{x^{\prime}_{\omega}}(t)$ (6) This means that any unit obeys all the usual stochastic thermodynamic theorems for CTMCs, e.g. the second law, FTs, TURs, and SLTs. In general, this property does not hold for any single subsystem or any set of subsystems (that is not a unit) in an MPP, due to each subsystem’s dependency constraints [49]. Instead, the marginal distribution of subsystem $i$ changes as $\displaystyle\frac{d}{dt}p_{x_{i}}(t)=\sum_{x^{\prime}}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)$ (7) $\displaystyle=\sum_{x^{\prime}\neq x}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)-K^{x}_{x^{\prime}}(i;t)p_{x}(t)$ (8) $\displaystyle=\sum_{x^{\prime}_{-i}}\sum_{x^{\prime}_{i}\neq x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)-K^{x_{i},x^{\prime}_{-i}}_{x^{\prime}_{i},x^{\prime}_{-i}}(i;t)p_{x_{i},x^{\prime}_{-i}}(t)$ (9) For any MPP, we write the global time-averaged dynamical activity (often interpreted as the frequency of state transitions) during the time interval $[0,\tau]$ as $\displaystyle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}=\frac{1}{\tau}\int_{0}^\tau\sum_{x^{\prime}\neq x}dt\;K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)$ (10) We write the global EP rate as $\displaystyle\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle=\sum_{x^{\prime},x}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)\ln\left[\frac{K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)}{K^{x}_{x^{\prime}}(t)p_{x}(t)}\right]$ (11) Integrating the global EP rate over the interval $[0,\tau]$ provides the total global EP $\langle\sigma^{\mathcal{N}}(\tau)\rangle$. In our notation, the major result of [33] — “global SLT” — reads $\tau\geq{\mathcal{T}}:=\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}}$. Note that although the global SLT can be applied to an MPP, it does not account for any of the MPP’s dependency constraints. In order to derive SLTs that account for the multipartite nature of the system dynamics, we decompose the global EP rate $\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle$ for an MPP at time $t$: $\displaystyle\langle\dot{\sigma}^{\mathcal{N}}(t)\rangle=\sum_{i\in\mathcal{N}}\sum_{x^{\prime},x}K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)\ln\left[\frac{K^{x^{\prime}}_{x}(i;t)p_{x^{\prime}}(t)}{K^{x}_{x^{\prime}}(i;t)p_{x}(t)}\right]$ (12) $\displaystyle=\sum_{i\in\mathcal{N}}\sum_{x^{\prime}_{-i},x^{\prime}_{i},x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)\ln\left[\frac{K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)}{K^{x_{i},x^{\prime}_{-i}}_{x^{\prime}_{i},x^{\prime}_{-i}}(i;t)p_{x_{i},x^{\prime}_{-i}}(t)}\right]$ (13) $\displaystyle:=\sum_{i\in\mathcal{N}}\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$ (14) $\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$ is a subsystem-indexed contribution to the global EP rate, i.e., it changes only due to the state transitions in subsystem $i$ (compare it to the integrand in Eq. 11). We make the associated time-integrated definition, $\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle=\int_{0}^\tau dt\langle\dot{\zeta}^{i}_{\mathcal{N}}(t)\rangle$; therefore, $\langle\sigma^{\mathcal{N}}(t)\rangle=\sum_{i\in\mathcal{N}}\langle\zeta^{i}_{\mathcal{N}}(t)\rangle$ for all times $t$. Similarly, for any unit $\omega$, we can write $\langle\dot{\sigma}^{\omega}(t)\rangle:=\sum_{i\in\omega}\langle\dot{\zeta}^{i}_{\omega}(t)\rangle$ and $\langle\sigma^{\omega}(t)\rangle=\sum_{i\in\omega}\langle\zeta^{i}_{\omega}(t)\rangle$. We define the vector whose components are the time-$t$ subsystem-indexed contributions to the global EP as $\langle\vec{\zeta}_{\mathcal{N}}(t)\rangle$, and to the $\omega$-local EP as $\langle\vec{\zeta}_{\omega}(t)\rangle$. Similarly, we define the dynamical activity due only to the state transitions in subsystem $i$ as: $\displaystyle{\mathcal{A}}^i(t):=\sum_{x^{\prime}_{-i}}\sum_{x_{i}}\sum_{x^{\prime}_{i}\neq x_{i}}K^{x^{\prime}_{i},x^{\prime}_{-i}}_{x_{i},x^{\prime}_{-i}}(i;t)p_{x^{\prime}_{i},x^{\prime}_{-i}}(t)$ (15) where ${\mathcal{A}}^{\mathcal{N}}(t):=\sum_{x^{\prime}\neq x}K^{x^{\prime}}_{x}(t)p_{x^{\prime}}(t)=\sum_{i\in\mathcal{N}}{\mathcal{A}}^{i}(t)$. The corresponding time-averaged dynamical activity is $\langle{\mathcal{A}}^{i}\rangle_{\tau}=\frac{1}{\tau}\int_{0}^\tau{\mathcal{A}}^{i}(t)$. Similarly, for any unit $\omega$, ${\mathcal{A}}^{\omega}(t)=\sum_{i\in\omega}{\mathcal{A}}^{i}(t)$ and $\langle{\mathcal{A}}^{\omega}\rangle_{\tau}=\sum_{i\in\omega}\langle{\mathcal{A}}^{i}\rangle_{\tau}$. Unlike its entropy production, a subsystem’s contribution to the dynamical activity does not depend on whether that dynamical activity is a global or local quantity (see Appendix S3 for proof). We write $\langle\vec{{\mathcal{A}}}_{\mathcal{N}}\rangle_{t}$ for the vector with components ${\mathcal{A}}^i(t)$, and write $\langle\vec{{\mathcal{A}}}_{\omega}\rangle_{t}$ for the vector with components ${\mathcal{A}}^{\omega}(t)$. We formulate our analysis below as if each subsystem $i$ interacts wih a single heat bath (of inverse temperature $\beta_{i}$); however, all of our results extend naturally to the case of multiple reservoirs per subsystem, as discussed in [48]. As a final comment, we emphasize that all thermodynamic speed limits hold for any chosen run-time $\tau$. Indeed, since all EPs and dynamical activities depend on $\tau$, the speed limit bounds are functions of $\tau$. Strengthened speed limits for multipartite processes Our first main result, derived in Appendix S1, states $\displaystyle\tau\geq{\mathcal{T}}_{\mathcal{N}}:=\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\left(\sum_{i\in\mathcal{N}}\sqrt{\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2}$ (16) Furthermore, the Cauchy-Schwartz inequality ensures that $\left(\sum_{i\in\mathcal{N}}\sqrt{\langle\zeta^{i}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2\leq\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}$. Combining establishes that ${\mathcal{T}}_{\mathcal{N}}\geq\frac{\left(\mathcal{L}(p_{x}(0),p_{x}(\tau))\right)^2}{2\langle\sigma^{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{\mathcal{N}}\rangle_{\tau}}={\mathcal{T}}$. Therefore, accounting for a system’s internal structure strengthens the thermodynamic speed limit. Our second main result is a speed limit involving only the thermodynamic contributions (and thus the dependency constraints) for the subsystems within any single unit $\omega\subset\mathcal{N}$ (proof in Appendix S1): $\displaystyle\tau\geq\max_{\omega\in\mathcal{N}^{**}}\left({\mathcal{T}}_{\omega}:=\frac{\left(\mathcal{L}(p_{x_{\omega}}(0),p_{x_{\omega}}(\tau))\right)^2}{2\left(\sum_{i\in\omega}\sqrt{\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)^2}\right)$ (17) In this sense, the slowest of all the units is the limiting factor on how fast the overall system can evolve. Below we will refer to the set of SLTs based on all of the ${\mathcal{T}}_{\omega}$ as the unit-based SLTs. Our third main result bounds an MPP’s speed of evolution using only the thermodynamic contributions of any single subsystem (proof in Appendix S2): $\displaystyle\tau\geq\max_{i\in\mathcal{N}}\left({\mathcal{T}}_{i}:=\frac{\left(\mathcal{L}(p_{x_{i}}(0),p_{x_{i}}(\tau))\right)^2}{\min_{\omega\in\mathcal{N}^\dagger\,|\,i\in\omega}2\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}\right)$ (18) In general, the unit satisfying the minimum in the denominator will be given by the smallest unit containing $i$. Intuitively, this result shows that an MPP can evolve only as fast as its slowest-evolving subsystem. The set of all ${\mathcal{T}}_{i}$ form the subsystem-local SLTs. These second two results are not guaranteed to be tighter than the global SLT. However, in many cases, at least one of each kind of SLT (i.e., Eq. 17 for some unit $\omega$ or Eq. 18 some subsystem $i$) is stronger than even the bound given in our first result, Eq. 16. In general, which of our three main results will provide the tightest bound will vary depending on the details of the CTMC, particularly on the dependency graph and the control protocol (time sequence of rate matrices). We can easily write necessary and sufficient conditions for any one of the three SLTs to be stronger than any one of the others. For instance, a necessary and sufficient condition for Eq. 18 (for subsystem $i$) to outperform Eq. 16 is if the CTMC satisfies $\frac{\left(\sum_{j\in\mathcal{N}}\sqrt{\langle\zeta^{j}_{\mathcal{N}}(\tau)\rangle\langle{\mathcal{A}}^{j}\rangle_{\tau}}\right)^2}{\min_{\omega\in\mathcal{N}^\dagger\,|\,i\in\omega}\langle\zeta^{i}_{\omega}(\tau)\rangle\langle{\mathcal{A}}^{i}\rangle_{\tau}}(\mathcal{L}(p_{x_{i}}(0),p_{x_{i}}(\tau)))^2\geq(\mathcal{L}(p_{x}(0),p_{x}(\tau)))^2$. Figure 3: Comparison of speed limit bounds for the example of cellular sensing shown in Fig. 1. The dark grey line represents the actual time of system evolution. All other lines represent the lower bounds on time provided by different SLTs. Note that bounds represented by the orange and violet lines are equivalent because the unit $\phi$ is composed of only subsystem 3. Numerical calculations of speed limit bounds for a model of cellular sensing We now illustrate our results for an MPP model of a cell sensing and storing information about its environment [1, 53, 49]. This system is illustrated in Fig. 1 and captured abstractly in Fig. 2. Two sets of cellular receptors, belonging to different cells, each independently observe the concentration of a ligand in the medium. Additionally, a set of proteins in one of the cells acts as a subcellular memory of that cell’s fraction of bound receptors. Subsystem 3 is the ligand concentration, whose state is $l=\ln\frac{s}{s_{0}}$, where $s_{0}$ is a reference concentration. Subsystem 2 is the number of receptors bound by the ligand in the cell membrane of Cell 1. Its possible states are $n_{r_{1}}=0,1,2,\ldots,N_{r_{1}}$, where $N_{r_{1}}$ is the total number of receptors. Subsystem 4 is the number of bound receptors in Cell 2. Its possible states are $n_{r_{2}}=0,1,2,\ldots,N_{r_{2}}$, where $N_{r_{2}}$ is the total number of receptors. Subsystem 1 is the number of phosphorylated proteins in Cell 1, serving as a memory of that cell’s fraction of bound receptors. Its possible states are $n_{m}=0,1,2,\ldots,N_{m}$, where $N_{m}$ is the total number of proteins. In our calculations, we use $N_{r_{1}}=3,N_{r_{2}}=3$, and $N_{m}=4$. We construct the time-homogeneous rate matrices governing the evolution of this model system according to Section III of [1]. These rate matrices account for quantities such as the free energy required for a ligand-receptor binding event and for a phosphorylation reaction. We set the initial joint distribution as $p_{x}(0)=p_{x_{3}}(0)p_{x_{2}|x_{3}}(0)p_{x_{4}|x_{3}}(0)p_{x_{1}|x_{2}}(0)$, where each of the conditional distributions are Gaussians with mean set by the value of the state on which it is dependent, and where the initial distribution of subsystem 3, $p_{x_{3}}(0)$, is $\sim\mathcal{N}(0,0.01)$. For more details, refer to the code available at https://github.com/FaritaTasnim/MPP_SLTs_cellular_sensing. We evolve the joint distribution over time according to the global rate matrix $K$ by solving the master equation to obtain $p_{x}(t)=p_{x}(0)e^{tK}$. We calculate the distribution every 50 $\mu$s in the interval [0, 55] ms. From the rate matrices and time-$t$ distributions, we calculate all relevant thermodynamic quantities at each timestep. Our numerical calculations are illustrated in Fig. 3, for both subsystem-local SLTs (left panel) and for unit-based SLTs (right panel). These calculations confirm that our first main result (${\mathcal{T}}_{\mathcal{N}}\equiv$ pink) provides a tighter bound on the speed of system evolution than does the global SLT from [33] (${\mathcal{T}}\equiv$ dark green). Additionally, we find that in this particular example, each unit-based SLT (${\mathcal{T}}_{\omega}\equiv$ lavender, ${\mathcal{T}}_{\alpha}\equiv$ sea green, ${\mathcal{T}}_{\phi}\equiv$ violet, ${\mathcal{T}}_{\beta}\equiv$ dark blue, ${\mathcal{T}}_{\psi}\equiv$ olive green), as well as each subsystem- local SLT (${\mathcal{T}}_{1}\equiv$ yellow, ${\mathcal{T}}_{2}\equiv$ light blue, ${\mathcal{T}}_{3}\equiv$ orange, ${\mathcal{T}}_{4}\equiv$ lime green), is stronger than not only the global SLT, but also our first SLT. (As an aside, the units that minimize the denominator in the bound ${\mathcal{T}}_{i}$ for each subsystem $i$ are as follows: $\\{1:\omega,\;2:\beta,\;3:\phi,\;4:\alpha\\}$.) As noted before, each of these units is the smallest unit containing $i$. Interestingly, even though the rate matrix for system evolution doesn’t change (i.e., it is time-homogeneous) we see that the strength of the subsystem-local SLT for subsystem 3 (${\mathcal{T}}_{3}\equiv$ orange) surpasses that for subsystem 2 (${\mathcal{T}}_{2}\equiv$ light blue) after 35 ms of system evolution. Discussion In this paper we extended the conventional thermodynamic speed limit to derive a set of strengthened speed limits for the case of co-evolving subsystems. These results can be useful for analyzing naturally occurring systems of many types where one would suppose there exist design pressures to make the evolution of an MPP as fast as possible, e.g., in a biological setting, where speed might directly translate into fitness value. These results could additionally augment the evaluation of trade-offs between control protocols for evolving a system along a desired path of distributions [58, 59, 60]. We present other interesting properties related to SLTs in MPPs, as well as some auxiliary results in Appendices S4 - S10. In Appendix S4, we discuss how our results extend the applicability of thermodynamic speed limits to systems characterized by local, rather than global, interactions. In doing so, we establish thermodynamic consistency of our results for systems whose dynamics are defined by local, rather than global, Hamiltonians. In Appendix S5, we show that each of the subsystem-indexed contributions to the global EP follows an integral fluctuation theorem. In Appendix S6, we note that the global SLT also applies to subsets of subsystems, or units, that evolve according to their own CTMC; this leads to what we call “unit-local SLTs”. In Appendix S7, we prove that the strongest of a generalized form of the SLT that involves a linear combination of unit-local thermodynamic properties is given by the unit-local SLT for the system’s slowest-evolving unit. In Appendix S8, we consider the SLTs as bounds on the space of distributions that a system can access within a given time. In particular, we show that the unit-local SLTs together more tightly restrict (than the global SLT) this space of final joint distributions for a pair of independently evolving spins. In Appendix S9, we derive maximum and minimum speeds of evolution for Bayes’ Nets, which are a type of MPP for which the state transitions occur according to a global clock. In Appendix S10, we derive lower bounds on the difference between the EP rate and the rate at which one unit “learns” about another using counterfactual thermodynamic quantities. Finally, we note that the results in this paper suggest several avenues for future work. Our results investigate how the dynamical constraints imposed by the interaction network of co-evolving subsystems that comprise an MPP demand a decrease in the system’s maximum possible speed of evolution. However, we note that the effect on speed due to other types of dynamical constraints should be explored. In general, any constraints on a system’s CTMC will contribute to its minimal EP, strengthening the Second Law of thermodynamics. As a practical matter, for any CTMC that obeys a given set of constraints while also implementing a given conditional distribution $P(x_{f}|x_{i})$ on an initial distribution $P(x_{i})$, often the EP is the dominant contributor to the total heat dissipation of the system. This contribution of the EP to the thermodynamic cost of evolution often far exceeds the minimal cost established by the generalized Landauer bound, which is simply given by the change in the entropy of the system [61, 62]. Although dynamical constraints govern the thermodynamic costs of classical, many-degree-of-freedom systems, the analysis of the thermodynamic implications of constraints on a system’s allowed dynamics remains in its infancy. One example of relevant research derives the stochastic thermodynamics under protocol constraints [59]. There has also been some important work where the “constraint” on a many-degree-of-freedom classical system is simply that it be some very narrowly defined type of system, whose dynamics is specified by many different kinds of parameters. For example, there has been analysis of the stochastic thermodynamics of chemical reaction networks [63, 5, 4, 64], of electronic circuits [65, 66, 67], of spin glasses where all spins are coupled to one another [68], of biological copying mechanisms [69], and of systems in which the state transitions of subsystems occur according to a synchronous global clock [46, 45]. The analyses in this paper as well as those in [46, 48, 49, 70] consider time- homogeneous dependency constraints. In many real-world scenarios, however, the dependency constraints may change with time. Integrating this time-dependence into our framework may further strengthen our speed limits for MPPs. Additionally, we expect that incorporating finer-grained information about the topology of the dependency graph would lead to stronger SLTs. However, in many cases, one does not know the full details of the dependency graph, but instead might know certain of its properties, e.g., average degree, degree distribution, or features of community structure. It would therefore be valuable to extend the stochastic thermodynamics of MPPs, including the SLTs, to cases where one has such summary statistics of the dependency graph. Acknowledgements F.T. thanks David Hartich for helping translate the rate matrices in [1] to a Markov jump process in a biophysically realistic manner. This work was supported by the MIT Media Lab Consortium, Santa Fe Institute, US NSF Grant CHE-1648973, and FQXi Grant FQXi-RFP-IPW-1912. ## References * Hartich _et al._ [2016] D. Hartich, A. C. Barato, and U. Seifert, Sensory capacity: An information theoretical measure of the performance of a sensor, Physical Review E 93, 10.1103/physreve.93.022116 (2016). * Ashida _et al._ [2021] K. Ashida, K. Aoki, and S. Ito, Experimental evaluation of thermodynamic speed limit in living cells via information geometry, bioRxiv , 2020 (2021). * Dutta _et al._ [2020] A. Dutta, G. M. Schütz, and D. Chowdhury, Stochastic thermodynamics and modes of operation of a ribosome: A network theoretic perspective, Physical Review E 101, 032402 (2020). * Rao and Esposito [2018a] R. Rao and M. Esposito, Conservation laws and work fluctuation relations in chemical reaction networks, The Journal of chemical physics 149, 245101 (2018a). * Rao and Esposito [2016] R. Rao and M. Esposito, Nonequilibrium thermodynamics of chemical reaction networks: wisdom from stochastic thermodynamics, Physical Review X 6, 041064 (2016). * Colegrave [2002] N. Colegrave, Sex releases the speed limit on evolution, Nature 420, 664 (2002). * McDonald _et al._ [2016] M. J. McDonald, D. P. Rice, and M. M. Desai, Sex speeds adaptation by altering the dynamics of molecular evolution, Nature 531, 233 (2016). * Lloyd [2000] S. Lloyd, Ultimate physical limits to computation, Nature 406, 1047 (2000). * Markov [2014] I. L. Markov, Limits on fundamental limits to computation, Nature 512, 147 (2014). * Laughlin _et al._ [1998] S. B. Laughlin, R. R. d. R. van Steveninck, and J. C. Anderson, The metabolic cost of neural information, Nature neuroscience 1, 36 (1998). * Laughlin [2001] S. B. Laughlin, Energy as a constraint on the coding and processing of sensory information, Current opinion in neurobiology 11, 475 (2001). * Laughlin and Sejnowski [2003] S. B. Laughlin and T. J. Sejnowski, Communication in neuronal networks, Science 301, 1870 (2003). * Bassett _et al._ [2011] D. S. Bassett, N. F. Wymbs, M. A. Porter, P. J. Mucha, J. M. Carlson, and S. T. Grafton, Dynamic reconfiguration of human brain networks during learning, Proceedings of the National Academy of Sciences 108, 7641 (2011). * Bullmore and Sporns [2012] E. Bullmore and O. Sporns, The economy of brain network organization, Nature Reviews Neuroscience 13, 336 (2012). * Li and Dankowicz [2019] M. Li and H. Dankowicz, Impact of temporal network structures on the speed of consensus formation in opinion dynamics, Physica A: Statistical Mechanics and its Applications 523, 1355 (2019). * Siegenfeld and Bar-Yam [2020] A. F. Siegenfeld and Y. Bar-Yam, Negative representation and instability in democratic elections, Nature Physics 16, 186 (2020). * Esposito and Van den Broeck [2010a] M. Esposito and C. Van den Broeck, Three faces of the second law. i. master equation formulation, Physical Review E 82, 011143 (2010a). * Seifert [2012] U. Seifert, Stochastic thermodynamics, fluctuation theorems and molecular machines, Reports on progress in physics 75, 126001 (2012). * Van den Broeck _et al._ [2013] C. Van den Broeck _et al._ , Stochastic thermodynamics: A brief introduction, Physics of Complex Colloids 184, 155 (2013). * Van den Broeck and Esposito [2015] C. Van den Broeck and M. Esposito, Ensemble and trajectory thermodynamics: A brief introduction, Physica A: Statistical Mechanics and its Applications 418, 6 (2015). * Ciliberto [2017] S. Ciliberto, Experiments in stochastic thermodynamics: Short history and perspectives, Physical Review X 7, 021051 (2017). * Wolpert [2019] D. H. Wolpert, The stochastic thermodynamics of computation, Journal of Physics A: Mathematical and Theoretical 52, 193001 (2019). * Horowitz and Gingrich [2017] J. M. Horowitz and T. R. Gingrich, Proof of the finite-time thermodynamic uncertainty relation for steady-state currents, Physical Review E 96, 020103 (2017). * Horowitz and Gingrich [2020] J. M. Horowitz and T. R. Gingrich, Thermodynamic uncertainty relations constrain non-equilibrium fluctuations, Nature Physics 16, 15 (2020). * Esposito and Van den Broeck [2010b] M. Esposito and C. Van den Broeck, Three detailed fluctuation theorems, Physical review letters 104, 090601 (2010b). * Rao and Esposito [2018b] R. Rao and M. Esposito, Detailed fluctuation theorems: A unifying perspective, Entropy 20, 635 (2018b). * Ito [2018] S. Ito, Stochastic thermodynamic interpretation of information geometry, Physical review letters 121, 030605 (2018). * Ito and Dechant [2020] S. Ito and A. Dechant, Stochastic time evolution, information geometry, and the cramér-rao bound, Physical Review X 10, 021056 (2020). * Sekimoto and Sasa [1997] K. Sekimoto and S.-i. Sasa, Complementarity relation for irreversible process derived from stochastic energetics, Journal of the Physical Society of Japan 66, 3326 (1997). * Aurell _et al._ [2012] E. Aurell, K. Gawedzki, C. Mejía-Monasterio, R. Mohayaee, and P. Muratore-Ginanneschi, Refined second law of thermodynamics for fast random processes, Journal of statistical physics 147, 487 (2012). * Vo _et al._ [2020] V. T. Vo, T. V. Vu, and Y. Hasegawa, Unified approach to classical speed limit and thermodynamic uncertainty relation, Physical Review E 102, 10.1103/physreve.102.062132 (2020). * Van Vu and Hasegawa [2021] T. Van Vu and Y. Hasegawa, Geometrical bounds of the irreversibility in markovian systems, Physical Review Letters 126, 010601 (2021). * Shiraishi _et al._ [2018] N. Shiraishi, K. Funo, and K. Saito, Speed limit for classical stochastic processes, Physical Review Letters 121, 10.1103/physrevlett.121.070601 (2018). * Pietzonka _et al._ [2017] P. Pietzonka, F. Ritort, and U. Seifert, Finite-time generalization of the thermodynamic uncertainty relation, Physical Review E 96, 012101 (2017). * Collin _et al._ [2005] D. Collin, F. Ritort, C. Jarzynski, S. B. Smith, I. Tinoco, and C. Bustamante, Verification of the crooks fluctuation theorem and recovery of rna folding free energies, Nature 437, 231 (2005). * Xiong _et al._ [2018] T. Xiong, L. Yan, F. Zhou, K. Rehan, D. Liang, L. Chen, W. Yang, Z. Ma, M. Feng, and V. Vedral, Experimental verification of a jarzynski-related information-theoretic equality by a single trapped ion, Physical review letters 120, 010601 (2018). * Huber _et al._ [2008] G. Huber, F. Schmidt-Kaler, S. Deffner, and E. Lutz, Employing trapped cold ions to verify the quantum jarzynski equality, Physical review letters 101, 070403 (2008). * Toyabe _et al._ [2010] S. Toyabe, T. Sagawa, M. Ueda, E. Muneyuki, and M. Sano, Experimental demonstration of information-to-energy conversion and validation of the generalized jarzynski equality, Nature physics 6, 988 (2010). * Barato and Seifert [2015] A. C. Barato and U. Seifert, Thermodynamic uncertainty relation for biomolecular processes, Physical review letters 114, 158101 (2015). * Friedman _et al._ [2020] H. M. Friedman, B. K. Agarwalla, O. Shein-Lumbroso, O. Tal, and D. Segal, Thermodynamic uncertainty relation in atomic-scale quantum conductors, Physical Review B 101, 195423 (2020). * Pietzonka _et al._ [2016] P. Pietzonka, A. C. Barato, and U. Seifert, Universal bound on the efficiency of molecular motors, Journal of Statistical Mechanics: Theory and Experiment 2016, 124004 (2016). * D’Souza [2009] R. M. D’Souza, Structure comes to random graphs, Nature Physics 5, 627 (2009). * Horowitz and Esposito [2014] J. M. Horowitz and M. Esposito, Thermodynamics with continuous information flow, Physical Review X 4, 031015 (2014). * Horowitz [2015] J. M. Horowitz, Multipartite information flow for multiple maxwell demons, Journal of Statistical Mechanics: Theory and Experiment 2015, P03006 (2015). * Ito and Sagawa [2013] S. Ito and T. Sagawa, Information thermodynamics on causal networks, Physical Review Letters 111, 180603 (2013). * Wolpert [2020a] D. H. Wolpert, Uncertainty relations and fluctuation theorems for bayes nets, Physical Review Letters 125, 10.1103/physrevlett.125.200602 (2020a). * Wolpert [2020b] D. H. Wolpert, Strengthened landauer bound for composite systems, arXiV (2020b). * Wolpert [2021] D. H. Wolpert, Fluctuation theorems for multiple systems with interdependent dynamics, New Journal of Physics (2021). * Wolpert [2020c] D. H. Wolpert, Minimal entropy production rate of interacting systems, New Journal of Physics 22, 113013 (2020c). * Pilosof _et al._ [2017] S. Pilosof, M. A. Porter, M. Pascual, and S. Kéfi, The multilayer nature of ecological networks, Nature Ecology & Evolution 1, 1 (2017). * Delmas _et al._ [2019] E. Delmas, M. Besson, M.-H. Brice, L. A. Burkle, G. V. Dalla Riva, M.-J. Fortin, D. Gravel, P. R. Guimarães Jr, D. H. Hembry, E. A. Newman, _et al._ , Analysing ecological networks of species interactions, Biological Reviews 94, 16 (2019). * Bassett and Bullmore [2006] D. S. Bassett and E. Bullmore, Small-world brain networks, The neuroscientist 12, 512 (2006). * Brittain _et al._ [2017] R. A. Brittain, N. S. Jones, and T. E. Ouldridge, What we learn from the learning rate, Journal of Statistical Mechanics: Theory and Experiment 2017, 063502 (2017). * Novinger _et al._ [2021] Q. Novinger, A. Suma, D. Sigg, G. Gonnella, and V. Carnevale, Particle-based ising model, Physical Review E 103, 012125 (2021). * Loos and Klapp [2020] S. A. Loos and S. H. Klapp, Irreversibility, heat and information flows induced by non-reciprocal interactions, New Journal of Physics 22, 123051 (2020). * Eissfeller and Opper [1994] H. Eissfeller and M. Opper, Mean-field monte carlo approach to the sherrington-kirkpatrick model with asymmetric couplings, Physical Review E 50, 709 (1994). * Sagawa and Ueda [2009] T. Sagawa and M. Ueda, Minimal energy cost for thermodynamic information processing: measurement and information erasure, Physical review letters 102, 250602 (2009). * Bravetti and Tapias [2017] A. Bravetti and D. Tapias, Thermodynamic cost for classical counterdiabatic driving, Physical Review E 96, 052107 (2017). * Kolchinsky and Wolpert [2020] A. Kolchinsky and D. H. Wolpert, Entropy production and thermodynamics of information under protocol constraints, arXiv preprint arXiv:2008.10764 (2020). * Iram _et al._ [2021] S. Iram, E. Dolson, J. Chiel, J. Pelesko, N. Krishnan, Ö. Güngör, B. Kuznets-Speck, S. Deffner, E. Ilker, J. G. Scott, _et al._ , Controlling the speed and trajectory of evolution with counterdiabatic driving, Nature Physics 17, 135 (2021). * Diamantini and Trugenberger [2014] M. C. Diamantini and C. A. Trugenberger, Generalized landauer bound as a universal thermodynamic entropy in continuous phase transitions, Physical Review E 89, 052138 (2014). * Kempes _et al._ [2017] C. P. Kempes, D. Wolpert, Z. Cohen, and J. Pérez-Mercader, The thermodynamic efficiency of computations made in cells across the range of life, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, 20160343 (2017). * Wachtel _et al._ [2018] A. Wachtel, R. Rao, and M. Esposito, Thermodynamically consistent coarse graining of biocatalysts beyond michaelis–menten, New Journal of Physics 20, 042002 (2018). * Yoshimura and Ito [2021] K. Yoshimura and S. Ito, Thermodynamic uncertainty relation and thermodynamic speed limit in deterministic chemical reaction networks, arXiv preprint arXiv:2104.14748 (2021). * Gao and Limmer [2021] C. Y. Gao and D. T. Limmer, Principles of low dissipation computing from a stochastic circuit model, arXiv preprint arXiv:2102.13067 (2021). * Wolpert and Kolchinsky [2020] D. H. Wolpert and A. Kolchinsky, Thermodynamics of computing with circuits, New Journal of Physics 22, 063047 (2020). * Freitas _et al._ [2020] N. Freitas, J.-C. Delvenne, and M. Esposito, Stochastic thermodynamics of non-linear electronic circuits: A realistic framework for thermodynamics of computation, arXiv preprint arXiv:2008.10578 (2020). * Herpich _et al._ [2020] T. Herpich, T. Cossetto, G. Falasco, and M. Esposito, Stochastic thermodynamics of all-to-all interacting many-body systems, New Journal of Physics 22, 063005 (2020). * Poulton _et al._ [2019] J. M. Poulton, P. R. Ten Wolde, and T. E. Ouldridge, Nonequilibrium correlations in minimal dynamical models of polymer copying, Proceedings of the National Academy of Sciences 116, 1946 (2019). * Kardeş and Wolpert [2021] G. Kardeş and D. H. Wolpert, Thermodynamic uncertainty relations for multipartite processes, arXiv preprint arXiv:2101.01610 (2021).
arxiv-papers
2021-07-26T20:55:41
2024-09-04T03:07:20.064096
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Farita Tasnim, David H. Wolpert", "submitter": "Farita Tasnim", "url": "https://arxiv.org/abs/2107.12471" }
2107.12473
tiny # Adversarial Attacks with Time-Scale Representations Alberto Santamaria-Pang Jianwei Qiu Aritra Chowdhury James Kubricht Peter Tu Iyer Naresh Nurali Virani GE Research 1 Research Circle Niskayuna NY 12309 {santamar, jianwei.qiu, Aritra.Chowdhury, james.kubrich, tu, iyerna, nurali.virani}@ge.com ###### Abstract We propose a novel framework for real-time black-box universal attacks which disrupts activations of early convolutional layers in deep learning models. Our hypothesis is that perturbations produced in the wavelet space disrupt early convolutional layers more effectively than perturbations performed in the time domain. The main challenge in adversarial attacks is to preserve low frequency image content while minimally changing the most meaningful high frequency content. To address this, we formulate an optimization problem using time-scale (wavelet) representations as a dual space in three steps. First, we project original images into orthonormal sub-spaces for low and high scales via wavelet coefficients. Second, we perturb wavelet coefficients for high scale projection using a generator network. Third, we generate new adversarial images by projecting back the original coefficients from the low scale and the perturbed coefficients from the high scale sub-space. We provide a theoretical framework that guarantees a dual mapping from time and time-scale domain representations. We compare our results with state-of-the-art black-box attacks from generative-based and gradient-based models. We also verify efficacy against multiple defense methods such as JPEG compression, Guided Denoiser and Comdefend. Our results show that wavelet-based perturbations consistently outperform time-based attacks thus providing new insights into vulnerabilities of deep learning models and could potentially lead to robust architectures or new defense and attack mechanisms by leveraging time-scale representations. ## 1 Introduction While great progress has been made in adversarial attacks [3, 6, 16, 41], the fundamental reason why convolutional neural networks (CNNs) are fragile to small perturbations is still unclear [25, 33, 4, 44, 32]. State-of-the-art models generate perturbations that seem like statistical noise that affect both high and low image scales (similar to high and low frequency). We believe that the inability to localize an attack becomes a key limitation of time- domain attacks as they end up modifying unnecessary or unrelated information in the image [20, 2]. Thus, instead of generating adversarial attacks in the time domain (low and high frequencies), we propose to expose a new vulnerability of deep learning models by generating fine structural- perturbations in meaningful image content in the high scale Wavelet decomposition. Studies have shown that early convolution layers capture low- level edge and edge orientation information possibly similar to receptive fields of human vision [19, 49]. We aim to induce a perturbation that will alter the local vertical, horizontal, and diagonal edge content of images, therefore, creating arbitrary activation spikes in early convolution layers. We argue that decomposing and isolating localized coherent spatial arrangements is an effective mechanism for disrupting CNN layer responses. Our approach relies on the following steps: i) time-scale analysis is used to provide a mechanism to decompose an image and localize high scale (frequency) and structural image properties, ii) generative models are used to learn both high-scale and structural patterns to perturb high scale coefficients, iii) synthesis of image from perturbed coefficients aims disrupt early convolution layers. Figure 1 presents a schematic of our proposed method. Figure 1: Schematic of the proposed Time-Scale adversarial attack. Since, state-of-the-art deep learning (DL) network designs rely on convolutional layers that broadly target all high frequency content – indiscriminate to structural perturbations – making them highly vulnerable to these attacks [34, 1, 42, 48, 5]. The targeted decomposition of fine image details accounts for a small fraction of the image energy content [24, 14, 8]. This helps with our objective to minimally perturb the image while inducing misclassification in classifier that consist of convolution layers. The significance of our approach is that the concept of scales (wavelet decomposition levels) and orientations (filter banks) can be associated to one another to investigate the fundamental principles of image/video analysis and signal processing for a new type of black-box attack. ## 2 Literature Review To the best of our knowledge, no work has been reported in attack-based mechanisms from time-scale representations. All adversarial attack frameworks reported to date [30, 21, 37, 27, 10, 7, 6, 40, 45, 18, 43], perturb an image which is represented in the time domain using all of its frequency (Fourier) content. A detail review can be found in Pitropakis et al. [28]. Black-box attacks are challenging adversarial attacks as there is no access to training data nor to the target model. These attacks can be categorized as either gradient-based or transfer-based methods. Gradient-based methods iteratively estimate the gradient by perturbing the input image while optimizing an objective function. Here the major challenge is to account for robust optimization in a high dimensional input space (see Chen et al. [6] for an initial report). Ilyas et al. [16] subsequently proposed a natural evolution attack with a limited number of queries. While their methods showed a significant improvement in query efficiency and speed, it generated images with high distortion. Performance was later improved by Cheng et al. [7] who used a surrogate model as a prior, effectively reducing the number of gradient averages or queries per iteration. To alleviate computational cost, transfer-based attacks [29, 35, 36, 12] train a generator network using white-box attacks from a surrogate or a chosen base model. Sharif et al. [35] used adversarial generative networks to create adversarial examples with defined objectives. The method was demonstrated in applications for face and handwritten-digit recognition. Poursaeed et al. [29] presented an approach that uses a generative model to design small perturbations (high frequency) that are distributed in the overall image, rather than following structural patterns. All of the above methods share the following limitations: gradient-based methods are prohibitively computationally expensive when estimating the gradient, while transfer-based methods suffer from generalization. Our hypothesis is that accounting for unnecessary and redundant image content in very high multidimensional space leads to non-tractable optimization problems and poor generalization [9, 42, 46, 26, 39]. Our main contributions are the following: i) providing a novel, tractable, fast, and black-box (surrogate-based or transfer-based) adversarial attack for deep neural networks, ii) exploring a new direction to study vulnerability (and hence robustness) of neural networks via time-scale perturbations that affects early convolution layers, and iii) experimental study with state-of- the-art classifiers and other generative or iterative attacks to illustrate the efficacy and salient features of this attack. Our code is available online at: https://github.com/waveletgap/wgap. ## 3 Methods ### 3.1 Background ##### Multiresolution Analysis: We briefly review multiresolution analysis introduced by Mallat and Meyer from [23]. Let $\varphi$ a function in $L^{2}(\mathbb{R})$ (Hilbert space of square-integrable complex valued functions on $\mathbb{R}$), such that the translation $\varphi(\cdot-k),k\in\mathbb{Z}$ defines an orthonormal system. Then $\varphi$ generates the sequence of spaces $V_{j}:j\in\mathbb{N}$, if $\varphi_{jk}(x)=2^{j/2}\varphi(2^{j}x-k)$. A multiresolution analysis (MRA) for $L^{2}(\mathbb{R})$ is a sequence of spaces $\\{V_{j}\\}$ generated by the orthonormal system $\varphi_{jk}$ in $L^{2}(\mathbb{R})$, if $V_{j}\subset V_{j+1}$ and $\bigcup V_{j}$ is dense in $L^{2}(\mathbb{R})$. We say that $\varphi$ is a father wavelet or scaling function if $\varphi$ generates a MRA. Given $f\in L^{2}(\mathbb{R})$, it can be shown that $f\in\bigcup_{j=0}^{\infty}V_{j}=V_{0}\oplus\bigoplus_{j=0}^{\infty}W_{j}$, where $W_{j}$ is the orthogonal complement of $V_{j}$ in $V_{j+1}$. We refer to $W_{j}$ as $j^{th}$ resolution level of the multiresolution analysis of level $j$. A mother wavelet is a function $\psi\in W_{0}$ such that $\psi_{0k}=\psi(\cdot-k)$. Then $\psi$ is an orthonormal basis in $W_{j}$ and is orthogonal to the father wavelet. Then any $f\in L^{2}(\mathbb{R})$ can be represented in terms of the father and mother wavelet via the following series: $f(x)=\sum_{k}\alpha_{k}\varphi_{0k}(x)+\sum_{j=0}^{\infty}\sum_{k}\beta_{jk}\psi_{jk}(x),$ (1) where the wavelet coefficients are defined as: $\alpha_{k}=\int f(x)\overline{\varphi_{0k}(x)}dx,~{}~{}\beta_{jk}=\int f(x)\overline{\psi_{jk}(x)}dx$. The main advantage of the wavelet representation in Eq. 1 over Fourier analysis is the ability to capture both the spatial component and the frequency spectrum. The term $\sum_{k}\alpha_{k}\varphi_{0k}(x)$ is the spatial component whereas the term $\sum_{j=0}^{\infty}\sum_{k}\beta_{jk}\psi_{jk}(x)$ localizes the frequency spectrum. The coefficients $\alpha_{k}$ inherently capture the main signal content while $\beta_{jk}$ capture the local details. We refer to $\alpha_{k}$ and $\beta_{jk}$ as the approximation and detail coefficients, respectively. ##### 2D Discrete Wavelet Transform (DWT): The 2D Discrete Wavelet Transform (DWT) is a direct generalization of the 1D MRA into $L^{2}(\mathbb{Z}^{2})$. Let $\varphi$ be a scaling function and $\psi$ its corresponding wavelet. We define three wavelets: $\psi^{1}=\varphi\psi$, $\psi^{2}=\psi\varphi$, and $\psi^{3}=\varphi\varphi$, where $\psi_{j,(n_{1},n_{2})}^{k}(t_{1},t_{2})=2^{j/2}\psi^{k}((2^{j}n_{1}-t_{1})/2^{j},(2^{j}n_{2}-t_{2})/2^{j})$ with $k\in\\{1,2,3\\}$. Then the wavelet family $\\{\psi_{j,n}^{1},\psi_{j,n}^{2},\psi_{j,n}^{3}\\}_{n\in Z^{2}}$ with $n=(n_{1},n_{2})$ is an orthonormal basis for $W_{j}^{2}$ and $\\{\psi_{j,n}^{1},\psi_{j,n}^{2},\psi_{j,n}^{3}\\}_{j,n\in Z^{2}}$ is an orthonormal basis for $L^{2}(\mathbb{Z}^{2})$. The corresponding coefficients are obtained from the inner products: $a_{j}[n]=\langle f,\varphi_{j,n}^{2}\rangle,~{}d_{jk}[n]=\langle f,\psi_{j,n}^{k}\rangle,\;\forall k\in\\{1,2,3\\}$. The approximation coefficients $a_{j}$ are associated with low frequencies, whereas the detail coefficients $d_{jk}$ are associated with high frequencies at horizontal, vertical, and diagonal orientations. The scaling function $\varphi$ and the mother wavelet $\psi$ can be represented as conjugate mirror filters banks $h[n]$ and $g[n]$. We denote as $h_{d}[n]=h[-n]$ and $g_{d}[n]=[-g]$ the mirror filters of $h[n]$ and $g[n]$, respectively. Figure 2 illustrates two- dimensional DWT for the first decomposition level. Figure 2: Schematic of the 2D wavelet transform for an RGB image $x$ showing associated filter banks for analysis and synthesis. The input image is projected into $P_{V_{0}^{2\times 3}}$ and $P_{W_{0}^{2\times 3}}$. ### 3.2 Wavelet-based Generative Adversarial Perturbation (WGAP) Modeling We present a generic framework for black-box and transfer attacks by perturbing the projection $P_{W_{j_{0}}}(x)$ (details) and preserving the projection $P_{V_{j_{0}}}(x)$ (approximation) for an image $x$. The analysis is shown for single channel images $L^{2}(\mathbb{Z}^{2})$, but is easily generalized to three-channel color images. Since it has been observed that early convolution layers capture low-level edge and edge orientation information, we aim to induce a perturbation in $P_{W_{j_{0}}}(x)$ such that it will alter the local vertical, horizontal, and diagonal edge content of $x$, therefore, creating arbitrary activation spikes in early convolution layers. This method systematically alters the edges, thereby influencing shape-content information. This approach is different from denoising since noise distribution is not explicitly modeled. Rather, object structure from finer details is directly altered. We also deviate from intervention methods in the high-frequency Fourier spectrum since Fourier transformations lose spatial content coherence in contrast with time- and space-scale representations used in this work. #### 3.2.1 General Formulation Suppose, we have a classifier $c(\cdot)$ with a loss function $\ell_{c}(X,y)$ where $X$ and $y$ is the input image and output class label, respectively. Here $c(X)$ is the predicted label. We assume: i) an adversarial example can be derived from an additive model as follows $X^{\prime}=X+D$, and ii) for a fixed class label $y$, the loss $\ell_{c}$ is a continuous function. Then adversarial attack generation can be posed as an optimization problem: $\operatorname*{arg\,max}_{X^{\prime}:\lVert X^{\prime}-X\rVert\leq\epsilon}\ell_{c}\big{(}X^{\prime},c(X)\big{)}.$ (2) Please note that: i) if $c(\cdot)$ is the attacked model then it is a white- box attack, ii) if it is a surrogate of the model to be attacked, then it is a black-box attack, and iii) if it is a chosen base model and the model to be attacked is unknown, then it is a transfer attack. Based on this formulation, in this work, we are interested in transfer and black-box attacks with perturbation in the wavelet domain. To convince that such an attack is sound, we look at the following result. Theorem 1: Let $(a_{j},d_{jk})$, $(a_{j},d^{\prime}_{jk})$ be wavelet coefficients for $X$ and $X^{\prime}$, such that $X=\text{DWT}^{-1}(a_{j},d_{jk})$ and $X^{\prime}=\text{DWT}^{-1}(a_{j},d^{\prime}_{jk})$. For some scale $j_{0}$, we can express problem in Equation 2 in terms of the wavelet coefficients as follows: $\operatorname*{arg\,max}_{\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}):\lVert d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert\leq\tilde{\epsilon}}\ell_{c}\big{(}X^{\prime},c(X)\big{)}.$ (3) ###### Proof. We need to prove that if $\lVert X^{\prime}-X\rVert<\epsilon$, then there exists $\tilde{\epsilon}$, such that $\lVert d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert<\tilde{\epsilon}$ for any chosen scale $j_{0}$. Given that $X$ and $X^{\prime}$ have the same approximation coefficients, from Equation 1, $D=X^{\prime}-X$ is in $W_{j}^{2}$ but not in $V_{0}$. Then using, linearity, orthonormality and the Pythagorean identity, we can write $\lVert X-X^{\prime}\rVert$ as: $\lVert\sum_{j=0}^{\infty}\sum_{k}d_{jk}\psi_{jk}(X)-\sum_{j=0}^{\infty}\sum_{k}d^{\prime}_{jk}\psi_{jk}(X^{\prime})\rVert=$ (4) $\lVert\sum_{j=0}^{\infty}\sum_{k}(d_{jk}-d^{\prime}_{jk})\psi_{jk}(X-X^{\prime})\rVert<$ (5) $\sum_{j=0}^{\infty}\sum_{k}\lVert d_{jk}-d^{\prime}_{jk}\rVert\psi_{jk}(X-X^{\prime})\leq$ (6) $\sup_{j,k}\lVert d_{jk}-d^{\prime}_{jk}\rVert=\lVert d_{j_{0}k}-d^{\prime}_{j_{0}k}\rVert=\tilde{\epsilon}$ (7) Finally, the DWT is providing the dual mapping of the signal representation from the estimated detailed coefficients $d^{\prime}$ within $W_{j}^{2}$ respect to the loss function $\ell_{c}$. ∎ The intuition behind the previous formulation is that the dual space can create a new adversarial image by just perturbing the details coefficients corresponding to a scale level (resolution) of the original image. The significance of this theoretical result is that i) adversarial attacks could be further targeted to an optimal resolution (scale and frequency) and ii) makes no assumption on the attack type since results applies to black-box, white-box and class-targeted attacks. Next, we will demonstrate a formulation for black-box and generative models. #### 3.2.2 Wavelet-based Generative Adversarial Perturbations Poursaeed et al. [29] proposed a Generative Adversarial Perturbation (GAP) method to minimize cross entropy loss, targeting the least likely class for an input image and surrogate model $c$. Here, noise (from uniform distribution) is passed to a generator network to create a perturbation. Then, the output of the generator is normalized based on a maximum magnitude of perturbation and added to the original image to generate $X^{\prime}$. Time Domain Formulation: We formulate a novel universal loss function for universal black-box attacks: we do not use noise models and only use a surrogate model $c$. We propose a conditional loss function based on a budget parameter. This parameter controls the magnitude of the image perturbation. Comparing to normal cross entropy loss, the key difference is that we optimize the attack rate (fooling ratio) while keeping the amount of perturbation within certain budget $\epsilon$. If perturbations exceeds the budget $\epsilon$, an additional penalty term will be added to the total loss. The same concept can be applied to gradient-based methods and targeted attacks. For a given budget $\epsilon$, the time domain representation of the loss function is: $\small{\ell_{c}=\begin{cases}\mathcal{H}\big{(}p(X^{\prime}),\mathbb{I}_{p_{ll(X)}}\big{)}+l*\mathcal{D}(X^{\prime},X),&\text{if }\lVert X-X^{\prime}\rVert>\epsilon\\\ \mathcal{H}\big{(}p(X^{\prime}),\mathbb{I}_{p_{ll(X)}}\big{)}&\text{otherwise}\end{cases}}$ (8) The first term $\mathcal{H}$ is the cross-entropy operator, where $\mathbb{I}_{y}$ denotes the one-hot encoding for the class label $y$, probability $p(X^{\prime})$ is output probability for perturbed sample, and $p_{ll(X)}=\operatorname*{arg\,min}{p(X)}$ is the least likely class given the original image $X$ based on model $c$. For the second term, $l$ is a parameter to regulate the loss, $\mathcal{D}$ the structural dissimilarly: $\mathcal{D}(X^{\prime},X)=1-{\frac{(2\mu_{X^{\prime}}\mu_{X}+c_{1})(2\sigma_{X^{\prime}X}+c_{2})}{(\mu_{X^{\prime}}^{2}+\mu_{X}^{2}+c_{1})(\sigma_{X^{\prime}}^{2}+\sigma_{X}^{2}+c_{2})}},$ (9) where $\mu_{X}^{\prime}$, $\sigma_{X}^{\prime}$ represent the mean and covariance for $X^{\prime}$ (similarly for $X$), $\sigma_{X^{\prime}X}$ is the covariance of $X^{\prime}$ and $X$. The values for $c_{1}$, $c_{2}$ stabilize the division with weak denominator. Dual Formulation: We reformulate the previous time-domain attack. From Theorem 1, given a budget $\epsilon$, there is a scale $j_{0}$ so that $X=\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k})$ and $X^{\prime}=\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k})$. The, the terms for Equation 8 from the following terms: $\mathcal{H}\big{(}p(\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}),\mathbb{I}_{p_{ll(\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k}))}}\big{)},$ (10) and $\mathcal{D}(\text{DWT}^{-1}(a_{j_{0}},d^{\prime}_{j_{0}k}),\text{DWT}^{-1}(a_{j_{0}},d_{j_{0}k})),$ (11) where, $k\in\\{1,2,3\\}$. Similarly for the budget $\epsilon$ is estimated from $\text{DWT}^{-1}$. We show how we can use the notion of scale to constraint the magnitude of the perturbation (budget). In our implementation, we fixed a scale $j_{0}$, and we apply DWT to obtain the approximation and detail coefficients $a_{j_{0}}$ and $d_{j_{0}k}$. We only pass the detail coefficients $d_{j_{0}k}$ to the generator and we reconstruct $X^{\prime}$ using inverse DWT from the original approximation coefficients $a_{j_{0}}$ and the new perturbed coefficients $d^{\prime}_{j_{0}k}$. Note that we are inherently normalizing the perturbed coefficients relative to the scale $j_{0}$ and this is possible because that approximation coefficients contain most of the energy. Figure 3 shows a schematic of the proposed method. Figure 3: Overview of the proposed adversarial attack. ## 4 Results We demonstrate model transferability of our Wavelet-based Generative Adversarial Perturbation (WGAP) method and compare performance with the generative model GAP [29] and a gradient-based method [7]. The ILSVRC12 (ImageNet-1000) dataset [31] was used for training, and 1000 randomly selected ImageNet images [7] were used for evaluation. The Generative model for GAP [29] and WGAP is a ResNet generator with 6 ResNet blocks, except the size of the input and output channels are different. The surrogate model is Inception-v3. To implement the discrete wavelet transform (DWT), we used the Daubechies wavelet filter bank db2 [8] at scale levels: 1, 2, 3 and budgets $\epsilon_{1}=0.05$, $\epsilon_{2}=0.1$, $\epsilon_{3}=0.25$. The selection of the Daubechies wavelet is due to stable numerical approximation and compact representation. For the WGAP models, nine input and output channels were used due to three concatenated detail coefficients. For the first convolution layer of the generative model, generative filter kernel size was set to 7 with a kernel number of 64. For the second and third convolution layers, the kernel size was 3 with a kernel number of 128. For each of the ResNet block, the kernel size as set to 3 a kernel number of 256. Batch normalization and ReLu activation function was used along with each convolution layer. The Adam optimization function was used with learning rate 0.0002 and beta parameters 0.5 and 0.999. The GAP and WGAP models were trained for 100 epochs with 500 iterations each. For GAP, we used magnitude value of 10. The models were then evaluated using a conventional NVIDIA V100-32G GPU and implemented in Pytorch. Pretrained are from the TorchVision library and https://github.com/thu- ml/Prior-Guided-RGF. ### 4.1 Attack and defense comparison with generative-based models To evaluate black-box attack transferability (no access to training data, nor the target model), we implemented adversarial attacks using Inception-v3 as a surrogate model. Testing models include ResNet-50 [13], VGG-16 [38]. To evaluate attack and defense, we use three state-of-the-art defense approaches: JPEG compression [11], Guided Denoiser [22], Randomization [47]. Table 1 shows fooling ratio in normal and defense performance for GAP [29], a modified GAP formulation with budget constraint (no wavelet integration) and WGAP. Overall, our model WGAP achieved best performance for scale level 1 and lowest for scale level 3. Interestingly, GAP showed best performance when using the testing networks ResNet-50, VGG-16 than the surrogate network Inception-v3. Best performance was obtained by WGAP, scale 1, across all budgets. Second-best performance was obtained by WGAP-J2($\epsilon_{k=1,2,3}$) , and similar performance was obtained with GAP and WGAP-J3($\epsilon_{k=1,2,3}$) . It is worth noting that, for a fixed budget, there is a decrease in fooling ratio performance from WGAP-J1($\epsilon_{k=1,2,3}$) (level 1) to WGAP-J3($\epsilon_{k=1,2,3}$) (level 3) and GAP($\epsilon_{k=1,2,3}$) (no wavelet). This suggests that defense approaches may not be tuned to overcome attacks from targeted frequency perturbations. Attacks in Normal Models Attacks in Defense Models Method Inception-v3 ResNet-50 VGG-16 JPEG Compression Randomization Guided Denoiser GAP 69.4% 91.8% 90.3% 13.0% 14.1% 1.8 % GAP($\epsilon_{1}$) 84.4% 89.5% 90.8% 10.7% 12.3% 13.4% WGAP-J1($\epsilon_{1}$) 91.1% 97.5% 98.5% 79.2% 73.5% 57.8% WGAP-J2($\epsilon_{1}$) 81.1% 96.5% 97.3% 69.1% 68.8% 33.9% WGAP-J3($\epsilon_{1}$) 34.2% 84.4% 88.7% 30.7% 30.3% 13.6% GAP($\epsilon_{2}$) 92.6% 94.5% 97.1% 15.1% 17.5% 18.3% WGAP-J1($\epsilon_{2}$) 97.6% 98.9% 99.2% 96.2% 85.5% 86.9% WGAP-J2($\epsilon_{2}$) 85.4% 97.1% 99.3% 77.9% 76.0% 61.1% WGAP-J3($\epsilon_{2}$) 55.4% 89.1% 95.7% 51.1% 47.0% 22.8% GAP($\epsilon_{3}$) 95.1% 98.6% 99.6% 23.3% 25.1% 29.8% WGAP-J1($\epsilon_{3}$) 99.4% 99.8% 99.7% 99.7% 93.6% 89.7% WGAP-J2($\epsilon_{3}$) 92.2% 98.0% 99.3% 87.8% 83.6% 68.9% WGAP-J3($\epsilon_{3}$) 56.3% 92.4% 95.7% 53.0% 44.5% 30.7% Table 1: Fooling ratio performance comparison for attacks in normal and defense models. Inception-v3 is the surrogate model and the others are testing models. GAP is the method [29] with magnitude value of 10, WGAP for scales J1-J3 and budgets $\epsilon_{1}$=0.05, $\epsilon_{2}$=0.1, $\epsilon_{3}$=0.25. ### 4.2 Attack and defense comparison for iterative (query-based) models We further evaluate the transferability of the WGAP model by comparing performance with the Prior-guided Random Gradient-Free (P-RGF) [7]. We use the optimal parameter $\lambda^{*}$ and ResNet-152 as surrogate model [7]. The fooling ratio values for attack in normal models Inception-v3, ResNet-50 and VGG-16 are 91.1%, 99.6% and 97.7% respectively. Similarly, the number of iterations for the same models are: 649, 352 and 370. Fooling ratio for attacks in defense models JPEG Compression, Randomization and Guided Denoiser are 81.1%, 82.3% and 89.5% respectively. Whereas for number of iterations we obtained 2120, 1816 and 1784. As for the number of iterations, the optimized P-RGFD achieved 99.1% in 649 iterations and the average time required to generate an adversarial attack was 15.15 seconds. While, P-RGFD shows very high performance in attacks for both normal and defense models, the computationally complexity could be highly prohibitive to use in real time scenarios. Experimentally, we estimated an average time to produce an adversarial example, which was 209.21 seconds per image for P-RGFD. The most similar performance in a defense network was in the Guided Denoiser2 with a difference of 1.4%. Here, the P-RGF required 1816 iterations, approximately four times greater than the average number of iterations in normal models. It should be noted that the P-RGF requires access to the target model to iteratively estimate the gradient. While this may be useful in attacks where a model is available, there is a risk of generalizing and over fitting. Next, we provide an analysis to compare universal full black-box attacks and defense. | P-RGFD ($\lambda^{*}$) | GAP | WGAP-J1($\epsilon_{1}$) | WGAP-J2($\epsilon_{1}$) | WGAP-J1($\epsilon_{2}$) | WGAP-J2($\epsilon_{2}$) ---|---|---|---|---|---|--- Comdefend | 24.5% | 28.3% | 65.3% | 77.5% | 62.1% | 69.5% L2 Norm (%) | 1.4 % | 3.3% | 4.2% | 4.8 % | 5.1% | 5.4 % Table 2: Performance comparison when the defense Comdefend method for fooling ratio and L2 Norm percentage. ### 4.3 Transfer attacks and defense comparison We compare model transferability from all approaches for black-box attack/defense and image error approximation in terms of the L2 norm. We test the state-of-the-art defense method Comdefend [17] against the generated images from the surrogate models: i) Inception-v3 for GAP and WGAP and ii) ResNet-152 for P-RGF [7]. This will provide an independent test on how general methods could be. Please note that for the iterative method, P-RGF we do not make any new query, we just used the generated image. Results are presented in Table 2. The first row shows the fooling ratio from all models (higher is better), second row shows the estimated L2 norm (lower is better). We note that P-RGF and GAP corresponds to the poorest performance when estimating fooling ratio: 24.5% and 28.3% respectively. However, the L2 norm values 1.4% and 3.3% for P-RGF and GAP are the lowest. For WGAP-based fooling ratio, the values for WGAP-J1($\epsilon_{1}$) and WGAP-J2($\epsilon_{1}$) were 65.3% and 77.5% respectively, while for WGAP-J1($\epsilon_{2}$) and WGAP-J2($\epsilon_{2}$) the fooling ratio values were 62.1% and 69.1% respectively. We note that while there was a significance increase in performance from budget $\epsilon_{1}$=0.05 to $\epsilon_{2}$=0.1, there was not a significant increase in L2 norm. For WGAP, we noticed that the L2 norm error was close to 5% even the budget was close to 10%. This may because the network prioritizes perturbations with no major penalty to the budget. However, there may be significant qualitative visual differences between budgets. We note that the fooling ratio increases as wavelet coefficients go from details to approximations. This indicates that details (high) frequency perturbation patterns may be most meaningful when disrupting early convolutional layers from the network. Figure 4 and Figure 5 depict example adversarial and residual images for each model (we omit other models due to space constraints). Column one in Figure 4, shows original images with corresponding class label. Column two and three corresponds to P-RGF [7], and GAP [29] respectively. Columns four and five corresponds to our proposed method with WGAP-J1($\epsilon_{1}$) and WGAP-J1($\epsilon_{2}$) with scale 1 and budget $\epsilon_{1}$=0.05, $\epsilon_{2}$=0.1. Figures 4(b,c) and Figures 4(g,h) show an example where the defense network Comdefend, correctly classified the adversarial image. Figures 4(d,e) incorrectly classified the original image, with class name Thimble and Bucket. For Figure 4(l), while the defense network incorrectly classified the original image as oxygen mask, the prediction is semantically similar to the original category (gasmask). Figures 4(n,o) show the predictions from our method corresponding to Strainer and Zebra. We notice that the most semantics difference are in relation to the budget. (a) Lipstick (b) Lipstick (c) Lipstick (d) Thimble (e) Bucket (f) Pizza (g) Pizza (h) Pizza (i) Screw (j) Rock python (k) Gasmask (l) Oxygen mask (m) Comic book (n) Strainer (o) Zebra Figure 4: Adversarial examples from adversarial attack methods. First column ((a),(f),(k)) corresponds to the original image . Second column ((b),(g),(l)) corresponds to the adversarial example generated by the P-RGF method with optimal parameter $\lambda^{*}$. Third column ((c),(h),(m)) corresponds to the GAP method, a parameter value of 10 was set as proposed in the original method. Fourth ((d),(i),(n)) and fifth ((e),(j),(o)) columns corresponds to our proposed method WGAP-J1($\epsilon_{1}$) and WGAP-J1($\epsilon_{2}$) , with budget $\epsilon_{1}=0.05$ and $\epsilon_{1}=0.1$ for L2 norm respectively. Images in Figures 5(a,f,k) show the original images. Images in Figures 5(b,g,l) show the residual for the P-RGF method. We can observe minimum perturbation across all images and without sign of a defined pattern across any image. Figures 5(c,h,m) show the result of the perturbation when GAP method was applied. A uniform pattern can be observed across the image. This is due to the outcome of the universal attack. Figures 5(d,i,n) and Figures 5(e,j,o) show the perturbations from our method at scale 1 and budgets 0.05 and 0.1, respectively. In contrast with the other two methods, we can observe that the perturbation pattern is heterogenous and non-uniformly distributed across the image. The perturbations is minimum at the background, either uniform (Figures 5(d,e) or Figures 5(i,j)) or heterogeneous (Figures 5(n,o)). Also, we note that the perturbations are consistently higher at the edges (as expected) and seems to increase for larger budget. Similarly, we observe some ‘texture-like’ patterns within the object of interest distributed across the foreground and backgrounds which seems to adapt according to the complexity of the image texture. This may indicate adaptive changes in the fine detail structure within the image according to the budget. For example, in Figure 5(d) there are 6 ‘texture-like’ patterns, whereas in Figure 5(e) seems there are approximately 28 ‘texture-like’ patterns distributed in the foreground. Similar ‘texture-like’ patterns are found in the residuals relative to the other images. While this effect, will require more investigation, our experimental results may suggest that the frequency spectrum is affected differently depending on the scale, budget and object of interest. (a) Lipstick (b) Lipstick (c) Lipstick (d) Thimble (e) Bucket (f) Pizza (g) Pizza (h) Pizza (i) Screw (j) Rock python (k) Gasmask (l) Oxygen mask (m) Comic book (n) Strainer (o) Zebra Figure 5: Residual images from adversarial attack methods. First column ((a),(f),(k)) corresponds to the original image . Second column ((b),(g),(l)) corresponds to the adversarial example generated by the P-RGF method with optimal parameter $\lambda^{*}$. Third column ((c),(h),(m)) corresponds to the GAP method. Fourth ((d),(i),(n)) and fifth ((e),(j),(o)) columns corresponds to our proposed method WGAP-J1($\epsilon_{1}$) and WGAP-J1($\epsilon_{2}$) , with budget $\epsilon_{1}=0.05$ and $\epsilon_{1}=0.1$ for L2 norm respectively. ## 5 Conclusions We presented a new formulation for black-box attacks via time-scale (wavelets) analysis. Our approach performs adversarial attacks where there is no access to model nor dataset on which the target model has been trained. We make no assumptions about the image type or the target model and we provide extensive validation comparing our approach with two state-of-the-art adversarial attacks methods and four state-of-the-art defense algorithms. Our results suggest that is it is both feasible and effective to localize coherent spatial arrangements as a mechanism to disrupt CNN layer responses. Our effort provides the first mathematical framework in terms of image analysis and signal processing for creating attacks to understand underlying vulnerability of convolution layers in neural networks. Even though time domain attacks are capable of effectively disrupting CNNs, it is difficult to interpret and systematically study the nature of the perturbations themselves. Moreover, by producing attacks from the perspective of wavelets, we seek to inspire research in academic community to look at decades of research in signal processing on wavelet transforms to study neural network properties and explore new architectures. This will in turn help us build up a general theory of how and why certain scales, orientations and frequency sub-bands affect neural networks. This will potentially lead to an understanding of CNN’s vulnerability, providing the broader community with mathematical conditions to avoid unfavorable architectural choices. To the best of our knowledge this is the first time that time-scale analysis has been used for adversarial attacks. The systematic analysis of the wavelet- based attacks will further provide a signal processing framework for understanding fundamental reasons for the brittleness in state-of-the-art DL models. The current research will be extended to provide the community with mathematical conditions to improve DL architectures and avoid choices that beget model fragility. ## References * [1] Arjun Nitin Bhagoji, Warren He, Bo Li, and Dawn Song. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11216, pages 158–174. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science. * [2] Ali Borji. Pros and cons of GAN evaluation measures. Computer Vision and Image Understanding, 179:41–65, Feb. 2019. * [3] Thomas Brunner, Frederik Diehl, Michael Truong Le, and Alois Knoll. Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks. pages 4958–4966, 2019. * [4] Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, and Alexey Kurakin. On Evaluating Adversarial Robustness. arXiv:1902.06705 [cs, stat], Feb. 2019. arXiv: 1902.06705. * [5] Nicholas Carlini and David Wagner. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec ’17, pages 3–14, Dallas, Texas, USA, Nov. 2017. Association for Computing Machinery. * [6] Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, and Cho-Jui Hsieh. ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security - AISec ’17, pages 15–26, 2017. arXiv: 1708.03999. * [7] Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, and Jun Zhu. Improving Black-box Adversarial Attacks with a Transfer-based Prior. arXiv:1906.06919 [cs, stat], Oct. 2019. arXiv: 1906.06919. * [8] I. Daubechies. The wavelet transform, time-frequency localization and signal analysis. IEEE Transactions on Information Theory, 36(5):961–1005, Sept. 1990\. Conference Name: IEEE Transactions on Information Theory. * [9] Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, and Patrick McDaniel. On the (Statistical) Detection of Adversarial Examples. arXiv:1702.06280 [cs, stat], Oct. 2017. arXiv: 1702.06280. * [10] Chuan Guo, Jared S. Frank, and Kilian Q. Weinberger. Low Frequency Adversarial Perturbation. arXiv:1809.08758 [cs], July 2019. arXiv: 1809.08758. * [11] Chuan Guo, Mayank Rana, Moustapha Cisse, and Laurens van der Maaten. Countering Adversarial Images using Input Transformations. arXiv:1711.00117 [cs], Jan. 2018. arXiv: 1711.00117. * [12] Jamie Hayes and George Danezis. Learning Universal Adversarial Perturbations with Generative Models. arXiv:1708.05207 [cs, stat], Jan. 2018. arXiv: 1708.05207. * [13] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep Residual Learning for Image Recognition. pages 770–778, 2016. * [14] Christopher Heil and Gitta Kutyniok. The Homogeneous Approximation Property for wavelet frames. Journal of Approximation Theory, 147(1):28–46, July 2007. * [15] Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q. Weinberger. Densely Connected Convolutional Networks. arXiv:1608.06993 [cs], Jan. 2018. arXiv: 1608.06993. * [16] Andrew Ilyas, Logan Engstrom, and Aleksander Madry. Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors. arXiv:1807.07978 [cs, stat], Mar. 2019. arXiv: 1807.07978. * [17] Xiaojun Jia, Xingxing Wei, Xiaochun Cao, and Hassan Foroosh. ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples. pages 6084–6092, 2019. * [18] Ameya Joshi, Amitangshu Mukherjee, Soumik Sarkar, and Chinmay Hegde. Semantic adversarial attacks: Parametric transformations that fool deep classifiers. In Proceedings - 2019 International Conference on Computer Vision, ICCV 2019, pages 4772–4782. Institute of Electrical and Electronics Engineers Inc., Oct. 2019. * [19] Saeed Reza Kheradpisheh, Masoud Ghodrati, Mohammad Ganjtabesh, and Timothée Masquelier. Deep Networks Can Resemble Human Feed-forward Vision in Invariant Object Recognition. Scientific Reports, 6, Sept. 2016. * [20] Xin Li and Fuxin Li. Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 5775–5783, Oct. 2017. ISSN: 2380-7504. * [21] Yingwei Li, Song Bai, Cihang Xie, Zhenyu Liao, Xiaohui Shen, and Alan L. Yuille. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv:1904.00979 [cs], Apr. 2019. arXiv: 1904.00979. * [22] Fangzhou Liao, Ming Liang, Yinpeng Dong, Tianyu Pang, Xiaolin Hu, and Jun Zhu. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. pages 1778–1787, 2018. * [23] Stephane Mallat. A Wavelet Tour of Signal Processing : Stephane Mallat : 9780123743701\. * [24] Stéphane Mallat. Understanding Deep Convolutional Networks. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2065):20150203, Apr. 2016. arXiv: 1601.04920. * [25] Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. Universal adversarial perturbations. arXiv:1610.08401 [cs, stat], Mar. 2017. arXiv: 1610.08401. * [26] Konda Reddy Mopuri, Aditya Ganeshan, and R. Venkatesh Babu. Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations. IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(10):2452–2465, Oct. 2019. Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence. * [27] Konda Reddy Mopuri, Utsav Garg, and R. Venkatesh Babu. Fast Feature Fool: A data independent approach to universal adversarial perturbations. arXiv:1707.05572 [cs], July 2017. arXiv: 1707.05572. * [28] Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, and George Loukas. A taxonomy and survey of attacks against machine learning. Computer Science Review, 34:100199, Nov. 2019. * [29] Omid Poursaeed, Isay Katsman, Bicheng Gao, and Serge Belongie. Generative Adversarial Perturbations. arXiv:1712.02328 [cs, stat], July 2018. arXiv: 1712.02328. * [30] Aaditya Prakash, Nick Moran, Solomon Garber, Antonella DiLillo, and James Storer. Deflecting Adversarial Attacks With Pixel Deflection. pages 8571–8580, 2018. * [31] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. arXiv:1409.0575 [cs], Jan. 2015. arXiv: 1409.0575. * [32] Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. arXiv:1806.01246 [cs], Dec. 2018. arXiv: 1806.01246. * [33] Pouya Samangouei, Maya Kabkab, and Rama Chellappa. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models. arXiv:1805.06605 [cs, stat], May 2018. arXiv: 1805.06605. * [34] Sayantan Sarkar, Ankan Bansal, Upal Mahbub, and Rama Chellappa. UPSET and ANGRI : Breaking High Performance Image Classifiers. arXiv:1707.01159 [cs], July 2017. arXiv: 1707.01159. * [35] Ali Shafahi, Mahyar Najibi, Mohammad Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S Davis, Gavin Taylor, and Tom Goldstein. Adversarial training for free! In H. Wallach, H. Larochelle, A. Beygelzimer, F. d\textquotesingle Alché-Buc, E. Fox, and R. Garnett, editors, Advances in Neural Information Processing Systems 32, pages 3358–3369. Curran Associates, Inc., 2019. * [36] Ali Shafahi, Mahyar Najibi, Zheng Xu, John Dickerson, Larry S. Davis, and Tom Goldstein. Universal Adversarial Training. arXiv:1811.11304 [cs], Nov. 2019. arXiv: 1811.11304. * [37] Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. A General Framework for Adversarial Examples with Objectives. ACM Transactions on Privacy and Security, 22(3):1–30, July 2019\. * [38] Karen Simonyan and Andrew Zisserman. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:1409.1556 [cs], Apr. 2015. arXiv: 1409.1556. * [39] David Stutz, Matthias Hein, and Bernt Schiele. Disentangling Adversarial Robustness and Generalization. pages 6976–6987, 2019. * [40] Jiawei Su, Danilo Vasconcellos Vargas, and Kouichi Sakurai. One Pixel Attack for Fooling Deep Neural Networks. IEEE Transactions on Evolutionary Computation, 23(5):828–841, Oct. 2019. Conference Name: IEEE Transactions on Evolutionary Computation. * [41] Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Alexander Turner, and Aleksander Madry. Robustness May Be at Odds with Accuracy. arXiv:1805.12152 [cs, stat], Sept. 2019. arXiv: 1805.12152 version: 2. * [42] Danilo Vasconcellos Vargas and Shashank Kotyan. Robustness Assessment for Adversarial Machine Learning: Problems, Solutions and a Survey of Current Neural Networks and Defenses. arXiv:1906.06026 [cs, stat], Nov. 2019. arXiv: 1906.06026. * [43] B. S. Vivek, Konda Reddy Mopuri, and R. Venkatesh Babu. Gray-Box Adversarial Training. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11219, pages 213–228. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science. * [44] Eric Wong and J Zico Kolter. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. page 10. * [45] Chaowei Xiao, Ruizhi Deng, Bo Li, Taesung Lee, Benjamin Edwards, Jinfeng Yi, Dawn Song, Mingyan Liu, and Ian Molloy. AdvIT: Adversarial frames identifier based on temporal consistency in videos. In Proceedings - 2019 International Conference on Computer Vision, ICCV 2019, pages 3967–3976. Institute of Electrical and Electronics Engineers Inc., Oct. 2019. * [46] Chaowei Xiao, Ruizhi Deng, Bo Li, Fisher Yu, Mingyan Liu, and Dawn Song. Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation. In Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss, editors, Computer Vision – ECCV 2018, volume 11214, pages 220–237. Springer International Publishing, Cham, 2018. Series Title: Lecture Notes in Computer Science. * [47] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. Mitigating Adversarial Effects Through Randomization. arXiv:1711.01991 [cs], Feb. 2018. arXiv: 1711.01991. * [48] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Yuyin Zhou, Lingxi Xie, and Alan Yuille. Adversarial Examples for Semantic Segmentation and Object Detection. In 2017 IEEE International Conference on Computer Vision (ICCV), pages 1378–1387, Oct. 2017. ISSN: 2380-7504. * [49] Matthew D. Zeiler and Rob Fergus. Visualizing and Understanding Convolutional Networks. In David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, editors, Computer Vision – ECCV 2014, Lecture Notes in Computer Science, pages 818–833, Cham, 2014. Springer International Publishing.
arxiv-papers
2021-07-26T20:58:57
2024-09-04T03:07:20.077331
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Alberto Santamaria-Pang, Jianwei Qiu, Aritra Chowdhury, James\n Kubricht, Peter Tu, Iyer Naresh, Nurali Virani", "submitter": "Aritra Chowdhury", "url": "https://arxiv.org/abs/2107.12473" }
2107.12474
††thanks: This work was partially supported by the Prime Minister’s Research Fellowship of the Government of India. # A novel DC Microgrid stabilization method based on the logarithmic norm Aditya Arpitha Prasad Computational & Data Sciences Indian Institute of Science Bengaluru 560012, India [email protected] ###### Abstract Microgrids could be the answer to integrating distributed energy resources into our powergrid. It promises improved resilience, reliability, efficiency and decarbonising of our electric grid. This paper models a low voltage direct current microgrid using a DAE formulation on a complex network. We then offer a novel method to compute a stability metric using the logarithmic norm which can be used to isolate disturbed nodes. ###### Index Terms: microgrids, logarithmic norm, stability ## I Introduction There are well documented reasons motivating a shift towards a decentralized grid incorporating more renewable energy sources - security [1], economic [2], ecological [3], social [4]. A decentralized grid is more resistant to natural disasters, cyber attacks and safeguard our ability to secure uninterrupted quality power to critical infrastructures like hospitals, power plants, network towers. Due to the ability of individual microgrids to island itself, the grid will be resistant to cascading blackouts, improving resilience and reliability. On the ecological side, the energy supply sector is the largest contributor to global greenhouse gas emissions and decarbonizing electricity generation is a cost-effective way of rapidly achieving our carbon targets. As energy generation comes closer to the point of consumption, we can bring down line losses. Consumers will turn into prosumers with bidirectional power flow on the grid. We can also adopt efficient practices of buffering energy for peak demand instead of the costly inefficient ramp up that now occurs. For a country like India, where many communities live in remote and inaccessible locations microgrids can help bridging last mile connectivity [5]. India has set a target of 175 GW installed capacity by 2022 of which 100 GW is solar [6]. These are ambitious goals and microgrids are a natural way to incorporate these distributed energy resources (DER) in a decentralized way. But there are challenges to overcome when integrating DERs into the main grid. Due to cloud cover and wind speed variability the grid has to handle both supply and demand side uncertainties [7]. As renewable penetration increases we see a reduction in inertia. There is also a need for research into new distributed control techniques to ensure robust control of the microgrid. There are two main types of microgrids - AC and DC. Due to the prevalence of DC loads, DC sources and reduced losses when compared to AC-DC power electronics, DC microgrid is what we used in the model. DC microgrids are characterized by components such as controlled and uncontrolled loads, distributed generation (DG) units and storage devices operate together in a coordinated manner with controlled power electronic devices under a DC power system principle [8]. Even in case of sources like wind energy, the AC power that is produced is variable and needs to be rectified to DC then inverted to be used in AC grids. EPRI found that if we switched to small DC grids we could reduce losses by 10-30% [9] At present research on stability of microgrids in islanded mode and grid connected mode are treated separately, here we are dealing with islanded mode since the utility grid has sufficient inertia to handle any disturbances in very short time scales [10]. Further there are two types of small signal stability or transient stability. Most of this analysis is done on extremely small number of DGs under consideration, here we will use the logarithmic norm to consider the local stability at the equilibrium point. Recent work usually deals with a linearized the system and exploits Lypunov function to prove local stability [11]. Due to practical limitations in communication links, instead of a centralized control scheme like master-slave control, decentralized control schemes were explored. In most studies droop control is what is used as feedback control. [12] The traditional method to assess stability is eigenvalue analysis[13][14][15]. This is without accounting for the fact that numerical errors and limitations in measurement can mean pseudospectrum of the matrix is often more relevant to the study [16]. The logarithmic norm gives us an estimate for psudeospectra [17] and stiffness [18]. ## II Microgrid Model In this section we present the models used for the power lines, distributed sources, constant power load and complex network data structure used to represent a DC microgrid. ### II-A Topology We can describe the network as a weighted, undirected graph ($\mathcal{N},\mathcal{E}$), where we have $n=|\mathcal{N}|$ nodes and $m=|\mathcal{E}|$ edges. The topology of this graph is defined by an incidence matrix $L_{m\times n}$, whenever a new node i is connected to the DC microgrid at bus/node j a new row is appended to this matrix where $L(m,i)=1$ and $L(m,j)=-1$. This lets us use $L\in\mathbb{R}^{m\times n}$ to set up the KCL and KVL constraints easily by accounting for current direction as shown below in equations (1) and (2). Here let $\vec{v}_{g}(t)=[v_{g1},v_{g2},v_{g3},\cdots,v_{gn}]$ be the bus voltages. Similarly $\vec{v}_{p}(t)=[v_{p1},v_{p2},v_{p3},\cdots,v_{pm}]$ are the power line voltages found as the difference between node voltages. $\vec{v}_{p}(t)_{m\times 1}=L_{m\times n}\vec{v}_{g}(t)_{n\times 1}$ (1) For the current law we can define $\vec{i}_{g}(t)=[i_{g1},i_{g2},i_{g3},\cdots,i_{gn}]$ be the current leaving each node. Similarly $\vec{i}_{p}(t)=[i_{p1},i_{p2},i_{p3},\cdots,i_{pm}]$ are the power line currents found flowing $\vec{i}_{g}(t)_{n\times 1}=L^{T}_{n\times m}\vec{i}_{p}(t)_{n\times 1}$ (2) ### II-B Power line model Since this a DC microgrid with short line lengths, we can go for a nominal pi model of a transmission line, where we have a lumped resistance and inductance in series. This is a common model in the literature [19]. This gives us the differential equation, $\vec{v}_{p}(t)=I_{n\times n}\frac{d\vec{i}_{p}(t)}{dt}+R_{n\times n}\vec{i}_{p}(t)$ (3) Here the matrix $I$ is a diagonal matrix of the line inductances and $R$ is the diagonal matrix of the line resistances. Figure 1: Part of a DC micro grid with voltages and currents labelled ### II-C PV Solar Home Solar photovoltaic (PV) systems can be set up in each home letting it either pull power or supply power to the microgrid. The DC microgrid will be able to grow via preferential attachment organically. When a node is acting as a net producer we can assume a controlled current source and capacitance in parallel to model the DC link capacitance as shown in Fig 1. This is because modern power electronics can supply that constant current after a DC-DC step up from an unregulated dc voltage. [20] We can define the current entering each node’s capacitance as $\vec{i}_{c}(t)=[i_{c1},i_{c2},i_{c3},\cdots,i_{cn}]$. $C$ is a diagonal matrix with all the link capacitance values. $\vec{i}_{g}(t)=\vec{f}(t)-\vec{i}_{c}(t)$ (4) $\vec{i}_{c}(t)=C_{n\times n}\frac{d\vec{v}_{g}(t)}{dt}$ (5) ### II-D DAE formulation From these equations we can formulate the inherent ODE of the DC microgrid, from plugging equations (1) into (3), $\frac{d\vec{i}_{p}(t)}{dt}=I^{-1}(L\vec{v}_{g}(t)-R\vec{i}_{p}(t))$ (6) Now by plugging (4) and (2) in (5) $\frac{d\vec{v}_{g}(t)}{dt}=C^{-1}(-L^{T}\vec{i}_{p}(t)+f(t))$ (7) Now by defining the state vector as $x=[i_{p}(t),v_{g}(t)]$, $\dot{x}=\begin{bmatrix}-I^{-1}R&&I^{-1}L\\\ -C^{-1}L^{T}&&O\end{bmatrix}x+\begin{bmatrix}0\\\ C^{-1}\end{bmatrix}f(t)$ (8) ## III Stability Analysis ### III-A Proportional Droop Control For my analysis I will be using proportional droop control where the control law is based on the local measured $v_{g}$ value as compared to a set reference value - $V_{s}$. The matrix $K$ For these producer nodes the current source will be controlled to be. We can model the consuming nodes as a constant power load - $P_{s}$ since we can assume the power electronics tightly regulates the output [21]. Here the model of $f$ will change depending on which nodes are producing excess power and supplying to the grid and which are drawing current as a load. I use a permutation matrix $P$ to order the $p$ power producing nodes in the front and $n-p$ nodes will be in the end of the vector. $f_{p}(t)=\hat{K}_{p\times p}(\hat{v}_{g}(t)-V_{s}(t))$ (9) $f_{c}(t)=\frac{P_{s}}{V_{s}}$ (10) Where the hat is used to represent the transformed variables via permutation. $\hat{v}_{g}=P\vec{v}_{g}$ $\hat{i}_{g}=P\vec{i}_{g}$ $\hat{i}_{c}=P\vec{i}_{c}$ $\hat{L}=PL$ $\hat{R}=PR$ $\hat{I}=PI$ $\hat{C}=PC$ We can write the complete $f$ as, $f(t)=\begin{bmatrix}K_{p\times p}&&0\\\ 0&&0\end{bmatrix}\hat{v}_{g}-\begin{bmatrix}K_{p\times p}&&0\\\ 0&&0\end{bmatrix}\begin{bmatrix}V_{s}\\\ -\frac{P_{s}}{V_{s}}\end{bmatrix}$ (11) So the sake of conciseness we can define the constant matrix $K^{\prime}$ and vector $c$ using equation (8), $f(t)=K^{\prime}\hat{v}_{g}-K^{\prime}c$ (12) So using equations (9) and (10) in (7), $\frac{d\hat{v}_{g}(t)}{dt}=\hat{C}^{-1}\left(-\hat{L}^{T}i_{p}(t)+K^{\prime}\hat{v}_{g}-K^{\prime}c\right)$ (13) Now by redefining the state vector as $z=[\vec{i}_{p}(t),\hat{v}_{g}(t)]$, we can use this to formulate the closed loop system, $\dot{z}=\begin{bmatrix}-\hat{I}^{-1}\hat{R}&&\hat{I}^{-1}L\\\ -\hat{C}^{-1}\hat{L}^{T}&&\hat{C}^{-1}K^{\prime}\end{bmatrix}z+\begin{bmatrix}0\\\ -C^{-1}K^{\prime}c\end{bmatrix}$ (14) For sake of consciseness again we define $B$ and $k$ using equation (14) $\dot{z}=Bz+k$ (15) This requires computation of inverse of a matrix where the numerical stability is not assured. But given a permutation matrix we can find the matrix $B$. ### III-B Logarithmic norm We propose it can be useful to use the logarithmic norm introduced by Dahlquist [22] to measure the stability of the microgrid for any given permutation matrix $P$, $\mu[B]=\lim_{h\to 0^{+}}\frac{||I+hB||-1}{h}$ (16) Where the matrix norm used is the matrix norm induced by the vector 2 - norm. $||B||=\sup_{x\neq 0}\frac{||Bx||_{2}}{||x||_{2}}$ (17) One important reason to prefer the logarithmic norm is because it captures the information regarding the pseudospectrum of $A$. Due to humidity, temperature, numerical errors, measurement errors we cannot be certain regarding the local stability of equilibrium of $B$ matrix in equation (15) from just the eigenvalues. The = $\epsilon$-pseudospectral abscissa and logarithmic norm, also called numerical abscissa are intimately connected. The logarithmic norm is maximum real part of the numerical range.[17] This is of a serious concern when it comes to nonnormal system matrices where even a small amount of noise can destabilize when eigenvalues are negative. [23] $\mu[B]=\sup_{\epsilon>0}[\alpha_{\epsilon}(B)-\epsilon]$ (18) There are other useful properties like $\mu[B]$ is the maximal growth rate of $\log||z||$ where $\dot{z}=Bz$. $D_{t}^{+}\log||x||\leq\mu[B]$ (19) Here $D_{t}^{+}$ is the upper right Dini derivative. So from equation (15) we can write the exponential stability condition $\mu[B]<0$ [24]. Here the computation of the logarithmic norm can be reduced to an eigenvalue problem, [25] $\mu[B]=\lambda_{max}\\{\frac{B+B^{*}}{2}\\}$ (20) Simple eigenvalue computations alone cannot reveal the potential for transient growth. The spectral abscissa gives us a lower bound for the solutions, while the logarithmic norm gives us the upper bound. [26] $e^{t\alpha}\leq||e^{tB}||\leq e^{t\mu[B]}$ (21) Where $\alpha$ is the spectral abscissa, $\alpha=\max_{1\leq i\leq n}\Re\\{\lambda_{i}(B)\\}$ ### III-C Stabilization method Step 1: Monitor the deviation from voltage set point and if positive threshold $t$ is crossed, move the node to producer list and if negative threshold is crossed, move node to consumer list. Step 2: Computer logarithmic norm for current B and store in a temporary variable. Step 3: Recompute the matrix P with new producer and consumer list and recalculate the system matrix B. Step 4: Calculate logarithmic norm for B and compare to old value. Step 5: If value is more negative, turn switches to implement the move. With this method the consumers and producers of the microgrid can be decided and stability can be iteratively improved. ## Conclusion This paper has developed a complete model of a general scalable DC microgrid model and discussed a method to control switching between nodes. To the best of the author’s knowledge this is the first time logarithmic norm has been applied to stability studies of DC microgrids. This paper proposed a novel technique to increase the stability of the microgrid. DC microgrids offers a lot of benefits and in future studies this model needs to be improved on to incorporate other DERs like wind farms, energy storage devices, fuel cells. ## References * [1] Adam Hirsch, Yael Parag and Josep Guerrero “Microgrids: A review of technologies, key drivers, and outstanding issues” In _Renewable and Sustainable Energy Reviews_ 90, 2018, pp. 402–411 DOI: 10.1016/j.rser.2018.03.040 * [2] Furkan Ahmad and Mohammad Saad Alam “Economic and ecological aspects for microgrids deployment in India” In _Sustainable Cities and Society_ 37, 2018, pp. 407–419 DOI: 10.1016/j.scs.2017.11.027 * [3] R.K. Pachauri and L.A. (eds.) “IPCC, 2014: Climate Change 2014: Synthesis Report” In _Contribution of Working Groups I, II and III to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change_ 1454, 2014, pp. 99 * [4] Ashok Jhunjhunwala and Prabhjot Kaur “Solar Energy, dc Distribution, and Microgrids: Ensuring Quality Power in Rural India” In _IEEE Electrification Magazine_ 6.4, 2018, pp. 32–39 DOI: 10.1109/MELE.2018.2871277 * [5] Anthony P. Heynen et al. “Off-grid opportunities and threats in the wake of India’s electrification push” In _Energy, Sustainability and Society_ 9.1, 2019, pp. 16 DOI: 10.1186/s13705-019-0198-z * [6] D. Palchak et al. “GREENING THE GRID: Pathways to Integrate 175 Gigawatts of Renewable Energy into India’s Electric Grid, Vol. I—National Study EXECUTIVE SUMMARY”, 2017 URL: https://escholarship.org/uc/item/7hw5t7bb * [7] David Steen et al. “Challenges of integrating solar and wind into the electricity grid” In _Systems Perspectives on Renewable Power 2014_ , 2014, pp. 94–107 URL: https://research.chalmers.se/en/publication/210515 * [8] Jackson John Justo, Francis Mwasilu, Ju Lee and Jin-Woo Jung “AC-microgrids versus DC-microgrids with distributed energy resources: A review” In _Renewable and Sustainable Energy Reviews_ 24, 2013, pp. 387–405 DOI: 10.1016/j.rser.2013.03.067 * [9] Brian T. Patterson “DC, Come Home: DC Microgrids and the Birth of the “Enernet”” In _IEEE Power and Energy Magazine_ 10.6, 2012, pp. 60–69 DOI: 10.1109/MPE.2012.2212610 * [10] Zhikang Shuai et al. “Microgrid stability: Classification and a review” In _Renewable and Sustainable Energy Reviews_ 58, 2016, pp. 167–179 DOI: 10.1016/j.rser.2015.12.201 * [11] Julia A. Belk, Wardah Inam, David J. Perreault and Konstantin Turitsyn “Stability and control of ad hoc dc microgrids” In _2016 IEEE 55th Conference on Decision and Control (CDC)_ , 2016, pp. 3271–3278 DOI: 10.1109/CDC.2016.7798761 * [12] Oben Dag and Behrooz Mirafzal “On stability of islanded low-inertia microgrids” In _2016 Clemson University Power Systems Conference (PSC)_ , 2016, pp. 1–7 DOI: 10.1109/PSC.2016.7462854 * [13] Ajit A. Renjit, Mahesh S. Illindala and Rama K. Yedavalli “Stability robustness analysis and its improvement for an industrial microgrid” In _2014 IEEE Industry Application Society Annual Meeting_ , 2014, pp. 1–8 DOI: 10.1109/IAS.2014.6978499 * [14] Mei Su et al. “Stability Analysis and Stabilization Methods of DC Microgrid With Multiple Parallel-Connected DC–DC Converters Loaded by CPLs” In _IEEE Transactions on Smart Grid_ 9.1, 2018, pp. 132–142 DOI: 10.1109/TSG.2016.2546551 * [15] Behnam Tamimi, Claudio Cañizares and Kankar Bhattacharya “System Stability Impact of Large-Scale and Distributed Solar Photovoltaic Generation: The Case of Ontario, Canada” In _IEEE Transactions on Sustainable Energy_ 4.3, 2013, pp. 680–688 DOI: 10.1109/TSTE.2012.2235151 * [16] Jianzhe Liu, Wei Zhang and Giorgio Rizzoni “Robust stability analysis of DC microgrids with constant power loads” arXiv: 1702.07580 In _arXiv:1702.07580 [math]_ , 2017 URL: http://arxiv.org/abs/1702.07580 * [17] Lloyd N. Trefethen and Mark Embree “Spectra and Pseudospectra: The Behavior of Nonnormal Matrices and Operators” Princeton University Press, 2005, pp. 170–172 DOI: 10.2307/j.ctvzxx9kj * [18] Desmond J. Higham and Lloyd N. Trefethen “Stiffness of ODEs” In _BIT Numerical Mathematics_ 33.2, 1993, pp. 285–303 DOI: 10.1007/BF01989751 * [19] Sandeep Anand and B.. Fernandes “Reduced-Order Model and Stability Analysis of Low-Voltage DC Microgrid” In _IEEE Transactions on Industrial Electronics_ 60.11, 2013, pp. 5040–5049 DOI: 10.1109/TIE.2012.2227902 * [20] Shamsher Ansari, Aseem Chandel and Mohd Tariq “A Comprehensive Review on Power Converters Control and Control Strategies of AC/DC Microgrid” In _IEEE Access_ 9, 2021, pp. 17998–18015 DOI: 10.1109/ACCESS.2020.3020035 * [21] Fanghua Zhang and Yangguang Yan “Start-Up Process and Step Response of a DC–DC Converter Loaded by Constant Power Loads” In _IEEE Transactions on Industrial Electronics_ 58.1, 2011, pp. 298–304 DOI: 10.1109/TIE.2010.2045316 * [22] J.. Schmidt “G. Dahlquist, Stability and Error Bounds in the Numerical Integration of Ordinary Differential Equations. 85 S. Stockholm 1959. K. Tekniska Högskolans Handlingar” In _ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik_ 41.6, 1961, pp. 267–268 DOI: 10.1002/zamm.19610410611 * [23] D.. Higham and X. Mao “Nonnormality and stochastic differential equations” In _BIT Numerical Mathematics_ 46.3, 2006, pp. 525–532 DOI: 10.1007/s10543-006-0067-y * [24] Gustaf Söderlind “The logarithmic norm. History and modern theory” In _BIT Numerical Mathematics_ 46.3, 2006, pp. 631–652 DOI: 10.1007/s10543-006-0069-9 * [25] Emre Mengi and Michael L. Overton “Algorithms for the computation of the pseudospectral radius and the numerical radius of a matrix” In _IMA Journal of Numerical Analysis_ 25.4, 2005, pp. 648–669 DOI: 10.1093/imanum/dri012 * [26] A.. Perov and I.. Kostrub “On the spectral abscissa and the logarithmic norm” In _Mathematical Notes_ 101.3–4, 2017, pp. 677–687 DOI: 10.1134/S0001434617030257
arxiv-papers
2021-07-26T20:59:43
2024-09-04T03:07:20.089760
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Aditya A Prasad", "submitter": "Aditya Arpitha Prasad", "url": "https://arxiv.org/abs/2107.12474" }
2107.12492
# SpectGRASP: Robotic Grasping by Spectral Correlation Maxime Adjigble†, Cristiana de Farias, Rustam Stolkin, Naresh Marturi All authors are with the Extreme Robotics Laboratory, School of Metallurgy and Materials, University of Birmingham, Edgbaston, B15 2TT, UK. †Corresponding author email: [email protected] work was supported by the UK National Centre for Nuclear Robotics, part-funded by EPSRC EP/R02572X/1 and in part supported by CHIST-ERA under Project EP/S032428/1 PeGRoGAM. ###### Abstract This paper presents a spectral correlation-based method (SpectGRASP) for robotic grasping of arbitrarily shaped, unknown objects. Given a point cloud of an object, SpectGRASP extracts contact points on the object’s surface matching the hand configuration. It neither requires offline training nor a-priori object models. We propose a novel Binary Extended Gaussian Image (BEGI), which represents the point cloud surface normals of both object and robot fingers as signals on a 2-sphere. Spherical harmonics are then used to estimate the correlation between fingers and object BEGIs. The resulting spectral correlation density function provides a similarity measure of gripper and object surface normals. This is highly efficient in that it is simultaneously evaluated at all possible finger rotations in $\bm{\mathrm{SO(3)}}$. A set of contact points are then extracted for each finger using rotations with high correlation values. We then use our previous work, Local Contact Moment (LoCoMo) similarity metric, to sequentially rank the generated grasps such that the one with maximum likelihood is executed. We evaluate the performance of SpectGRASP by conducting experiments with a 7-axis robot fitted with a parallel-jaw gripper, in a physics simulation environment. Obtained results indicate that the method not only can grasp individual objects, but also can successfully clear randomly organized groups of objects. The SpectGRASP method also outperforms the closest state-of-the-art method in terms of grasp generation time and grasp-efficiency. ## I Introduction Reliable autonomous grasping of arbitrarily shaped, unknown objects, in cluttered and unstructured environments, remains a challenging problem. Major difficulties lie in establishing a useful correspondence, between a robot’s gripper fingers and an object’s surface obtained from computer vision, to achieve a robust and stable grasp. Although, robots have already been deployed in flexible manufacturing to perform vision-guided pick and place tasks, these predominantly assume that precise object models are known a-priori for each product, for which stable grasp poses can be pre-computed. For robots to reliably manipulate arbitrarily shaped objects, in unstructured environments, robust and efficient methods for grasp synthesis are needed. In this context, given a gripper configuration, we present a novel spectral domain method that can generate grasps for unknown objects observed as point clouds. Figure 1: Object grasping by proposed SpectGRASP method. (Top) Perceived object point clouds with surface normals. (Middle) Corresponding Binary Extended Gaussian Images. (Bottom) Executed best grasps. A variety of methods have emerged in the literature for robotic grasping [1, 2, 3, 4]. Most of the state-of-the-art methods can be classified into analytical approaches versus data-driven methods [4]. The conventional analytical approaches predominantly generate grasp hypotheses by using physics-based formulations. They largely rely on a-priori information like accurate geometric models of objects, dynamic parameters such as object mass, and assumed values for friction coefficients etc. These methods achieve acceptable performance when grasping at prescribed contact points. However, they have difficulty in generalising to many real-world scenarios, particularly for unknown objects, of arbitrary shape, in unstructured scenes. These problems have been addressed by more recent data-driven methods, which sample grasp candidates by means of learning [5, 6, 7, 8, 9]. These methods enabled robots to better cope with uncertainties in vision and perception, and demonstrated some degree of generalisation to new objects. However, they predominantly require large amounts of data and extensive offline training. Moreover, their ability to handle novel objects, especially those with shapes that differ greatly from training data objects, is limited. Also, grasping objects from randomly organised cluttered scenes, remains a major problem to solve. These limitations can be tackled by using geometry-based approaches, like the one presented in this paper. Although geometric methods may not be as fast as some learning-based methods, they are: easy to generalise for multi-fingered hands; work well for grasping novel objects with a-priori unknown geometries; and can handle heaps of objects in cluttered and unstructured environments[10]. Recent methods, based on shape similarities between hand fingers and object surfaces, have demonstrated remarkable results for robotic grasping of unknown objects [11, 12, 10, 13, 14]. These methods synthesise grasp hypotheses by matching the surface regions of gripper fingers with similar surface patches on the object, to maximize the contact area during grasping. The sampled grasp candidates are then ranked or sorted by virtue of custom grasp ranking metrics to find the candidate with highest probability of success. Our previous work in this area presented a Local Contact Moment (LoCoMo) similarity metric-based grasp planner[10]. This method demonstrated high success rates in grasping individual unknown objects and also in clearing random cluttered heaps of objects. However, it requires high computational time (about ten seconds), which also increases with the point cloud density. A comparable approach based on shape adaptability has been presented in [13]. Very recently, an approach based on gripper workspace spheres was presented in [12], for grasping unknown objects represented as registered point clouds. This approach can be flexibly generalised to a variety of grippers. Although the method is comparably fast, it can only be applied to scenes containing single objects. A fast geometric unknown object grasping algorithm based on force balanced optimisation was presented in [15]. Like other methods, it also synthesises grasps based on online processing of a single point cloud. In contrast to the aforementioned approaches, there are other geometric methods that work by surface reconstruction and object modelling [16, 17, 18, 19]. However, sampling grasp candidates for large numbers of object points and gripper configurations can be slow and computationally expensive. To overcome these limitations, we propose SpectGRASP, a robust and computationally efficient method for synthesizing grasp candidates for unknown objects. At the core of our method, spherical harmonics are used to efficiently compute spectral correlations between object and finger surface normals. Previously, a method using spherical harmonics for grasping was reported in [20]. It transfers a known grasp from one object to another by smoothly deforming the surface of the first object into the second one. Unlike our method, it requires a complete, dense point cloud, sampled from a closed convex surface, i.e., without holes. In contrast, SpectGRASP makes no assumptions about object shape, and is effective with sparse point clouds. Furthermore, while [20] has only been demonstrated on single and mostly convex objects, SpectGRASP generates grasps for a wide range of object shapes, and robustly handles multiple objects in cluttered scenes. SpectGRASP is designed as a two step process: correspondence matching and contact ranking. The matching is performed by correlating gripper and object surface normals. We propose Binary Extended Gaussian Images (BEGI) to represent surface normals. A Fast Fourier Transform (FFT) for functions defined on the rotation group is used to efficiently compute the correlation density function [21]. In the same way that cross-correlation is used as a similarity measure, between two signals over a set of positions in the standard Euclidean space $\mathbb{R}^{n}$, the resulting spectral correlation density function can be used as a similarity measure over $\bm{\mathrm{SO}(3)}$. Thus, finding a pattern embedded in a signal (both defined on the unit sphere) is reduced to finding pattern rotations with high correlation values. Here, the finger BEGI is the pattern and the object BEGI (seen in Fig. 1) is the signal. From this correlation, a set of contact points are extracted on the object for each gripper finger. Finally, gripper poses are sampled from the contact points and ranked according to their LoCoMo score, which provides a grasp likelihood metric based on the correspondence between surface patches of gripper fingers and object surfaces [10]. The main contributions of this work are as follows: * (i) We propose BEGI as a novel way of representing point cloud surface normals. This representation helps finding corresponding point-pairs between two point clouds. * (ii) We propose the use of spectral correlation for efficiently sampling grasp contact points on the surface of an object given a robot hand configuration. * (iii) We present a new, generic and efficient grasp generation pipeline, combining spectral correlation with the LoCoMo grasp likelihood metric of our previous work. SpectGRASP works directly using online captured point clouds of objects. It does not require any object CAD models, or learning with offline training data. In simulation experiments, using a 7-axis robot with a two-finger hand, we demonstrate how SpectGRASP generates effective grasps for a variety of objects selected from the YCB object set [22]. We also demonstrate how SpectGRASP can reliably clear randomly generated scenes of multiple objects with successive grasps. In addition, we compare and discuss the performance of SpectGRASP against the LoCoMo-based grasp planner [10], since this was the previous state-of-the-art in learning-free and model-free grasping. ## II Methodology In this section, we present our proposed SpectGRASP method. We first show how point cloud surface normals are represented as BEGI. Later, we show how spherical harmonics are used to compute correspondence between two BEGIs and estimate the grasp contact points. Finally, we present how the grasp candidates are generated and ranked. ### II-A Binary Extended Gaussian Image (BEGI) The extended Gaussian image (EGI) [23] has been extensively used as a shape descriptor for object surface normals [24, 25, 26]. It represents the distribution of surface normals in polar coordinate system by mapping them onto a unit sphere, also denoted as the 2-sphere or $\bm{S}^{2}$. Given a vector $\bm{n}=(n_{x},n_{y},n_{z})$ in the Euclidean space $\mathbb{R}^{3}$, the corresponding spherical coordinates $(r,\theta,\phi)$ are computed as: $\begin{gathered}r=\sqrt{n_{x}^{2}+n_{y}^{2}+n_{z}^{2}}\quad\quad\theta=\arctan{\frac{\sqrt{n_{x}^{2}+n_{y}^{2}}}{n_{z}}}\\\ \mkern-38.0mu\phi=\arctan(\frac{n_{y}}{n_{x}})\end{gathered}$ (1) Physically, these coordinates represent norm, longitude and latitude. When $\bm{n}$ is unitary, i.e., $r=1$, the set $(\theta,\phi)$ is sufficient to locate the vector on the unit sphere. To make use of spherical coordinates to numerically compute distributions, a discrete sphere is required. We use the following discretization along longitude and latitude to represent object surface normals on $\bm{S}^{2}$: $\theta_{j}=\frac{\pi(2j+1)}{4B}$ and $\phi_{k}=\frac{\pi k}{B}$ , $(j,k)\in\mathbb{N}$ with the constraint $0\leq j,k<2B$. Here, $B$ is the bandwidth and acts like a low pass filter. Smaller $B$ values lead to a coarser distributions and higher values provide more accurate representations, as seen in Fig. 2. While conventional EGIs use histograms to represent the distribution of surface normals on a unit sphere, our method uses binary values for each cell parameterised by the indices $(j,k)$. This corresponds to the existence of at least one surface normal in the direction of $(\theta_{j},\phi_{k})$. Additionally, we store the list of point coordinates of surface normals corresponding to the cell. Fig. 2 illustrates object surface normals represented as BEGI for three different bandwidths. Finer representations on the sphere are obtained with higher bandwidth, i.e., $B=16$. Points belonging to adjacent cells when $B=8$ are merged into a single cell at a lower bandwidth, $B=4$. Figure 2: BEGIs with different bandwidths for the above “Hammer” object point cloud. The one with highest bandwidth, i.e., $B=16$, provides finer distribution where as the lower bandwidth ones show coarse distributions. Given a point cloud with surface normals $\mathcal{PC}_{n}=\\{(\bm{p},\bm{n})\in\mathbb{R}^{3}\times\bm{S}^{2}\\}$ and a bandwidth $B$, the BEGI can be constructed using (2). $\begin{gathered}f(\theta_{j},\phi_{k})=v_{jk}\\\ \mathcal{P}_{jk}=\left\\{p_{i}\in\mathbb{R}^{3}\mid n_{i}=(\theta_{j},\phi_{k})\right\\}\end{gathered}$ (2) With $0\leq j,k<2B$, $v_{jk}\in[0,1]$. $v_{jk}=1$ if there exists a surface normal $n_{i}=(\theta_{j},\phi_{k})$ in $\mathcal{PC}_{n}$ and $v_{jk}=0$, otherwise. $f(\theta_{j},\phi_{k})$is the BEGI function and $\mathcal{P}_{jk}$ is the BEGI point set at $(j,k)$. Any point cloud with surface normals can be reconstructed upto a degree of precision using its BEGI by specifying an appropriate value for the bandwidth $B$. ### II-B Spherical Harmonics Spherical harmonics are used to provide a decomposition of functions defined on the unit sphere [27]. They are the spherical equivalent of the Fourier transform in Euclidean space and form an orthonormal basis on the sphere. In computer vision, they have been used for 3D model recognition and visual servoing [28, 29]. Any square-integrable function $f:\bm{S}^{2}\rightarrow\mathbb{C}$ ($f\in L^{2}(\bm{S}^{2})$) can be represented by its spherical harmonic expansion as: $f(\theta,\phi)=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\hat{f_{l}^{m}}Y_{l}^{m}(\theta,\phi)$ (3) where, $l,m\in\mathbb{N}^{+}$ , $l_{max}>0$ is the maximum degree of expansion, $Y_{l}^{m}$ is the spherical harmonics of degree $l$ and order $m$, $\hat{f_{l}^{m}}$ is the corresponding harmonic coefficient. The spherical harmonics $Y_{l}^{m}$ are computed as: $Y_{l}^{m}(\theta,\phi)=(-1)^{m}\sqrt{\frac{(2l+1)(l-m)!}{4\pi(l+m)!}}P_{l}^{m}(cos\theta)e^{im\phi}$ (4) In the literature, the factor $(-1)^{m}$ is sometimes integrated with the definition of Legendre polynomials, $P_{l}^{m}$. The harmonic coefficients $\hat{f_{l}^{m}}$ are computed by the inner product between $f$ and $Y_{l}^{m}$ over $\bm{S}^{2}$: $\displaystyle\hat{f_{l}^{m}}$ $\displaystyle=\int_{w\in\bm{S}^{2}}f(w)\overline{Y_{l}^{m}(w)}\,dw$ (5) $\displaystyle=\int_{0}^{2\pi}d\phi\int_{0}^{\pi}d\theta\sin\theta f(\theta,\phi)\overline{Y_{l}^{m}(\theta,\phi)}$ where, $\overline{Y_{l}^{m}}$ is the complex conjugate of $Y_{l}^{m}$. Using (3), the harmonic decomposition of a BEGI function $f:\bm{S}^{2}\rightarrow[0,1]\subset\mathbb{C}$ is computed. This means that the harmonic functions can be used to evaluate the correlation of two BEGIs. The harmonic coefficients described in (5) are computed numerically by using the previously presented discretization of the sphere. By setting a value for $B$, the angles $\theta$ and $\phi$ can be sampled using an equiangular $2B\times 2B$ grid. ### II-C Spectral Correlation of Functions on $\bm{\mathrm{SO}(3)}$ Let $f$ and $g$ are two functions with bandwidth $B$ defined on $\bm{S}^{2}$, and $g_{r}=g(\mathcal{R}(\alpha,\beta,\gamma))=g(\alpha,\beta,\gamma)$ is the rotated version of $g$ by a rotation $\mathcal{R}\in\bm{\mathrm{SO}(3)}$111$\mathcal{R}$ is taken as $zyz$ Euler angles $\alpha,\beta,\gamma$; $\alpha,\gamma\in[0,2\pi[$ and $\beta\in[0,\pi]$.. The correlation $\mathcal{C}(\mathcal{R})$ between $f$ and $g_{r}$ is computed as $\mathcal{C}(\mathcal{R})=\int_{w\in S^{2}}f(w)\overline{g_{r}(w)}\,dw$ (6) (6) evaluates the degree of similarity between $f$ and $g_{r}$. By computing the correlation for a set of rotations, a correlation density function is obtained as shown in Fig. 3(d). Figure 3: Illustation of BEGI correlation process. Initially, surface normals of both gripper fingers and object are converted to BEGIs. These are then correlated using spherical hormonics resulting in a correlation density map. Here we show the values $\geq 0.5$. The cross-section along $(\alpha,\beta,\gamma)=(\pi/4,\pi/2,\pi)$ shows an in depth view of the correlation density map. Blue dots correspond to rotations with low correlation values, while red dots are locations with high correlation. In harmonic domain, rotations are expressed as Wigner D-Matrices, $D_{mm^{\prime}}^{l}$ [30]. Consequently, the rotated pattern BEGI $g_{r}$ is represented in the spectral domain as: $\begin{gathered}g(\alpha,\beta,\gamma)=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\sum_{m^{\prime}=-l}^{l}D_{mm^{\prime}}^{l}(\alpha,\beta,\gamma)\hat{g_{l}^{m^{\prime}}}Y_{l}^{m}\\\ \mbox{with}\quad D_{mm^{\prime}}^{l}(\alpha,\beta,\gamma)=e^{-im\alpha}d_{mm^{\prime}}^{l}(\beta)e^{-im^{\prime}\gamma}\end{gathered}$ (7) where, $d_{mm^{\prime}}^{l}$ are the Wigner d-functions. Replacing $f$ and $g_{r}$ in (6) by their harmonic expansions, using the orthogonality principle of the harmonic coefficients, i.e., $\int_{w\in S^{2}}Y_{l}^{m}(w)\overline{Y_{l^{\prime}}^{m^{\prime}}(w)}\,dw=1$ if $m=m^{\prime}$ and $0$, otherwise, we get: $\mathcal{C}(\mathcal{R})=\sum_{l=0}^{l_{max}}\sum_{m=-l}^{l}\sum_{m^{\prime}=-l}^{l}\hat{f_{l}^{m}}\overline{\hat{g_{l}^{m^{\prime}}}}\overline{D_{mm^{\prime}}^{l}(\mathcal{R})}$ (8) (8) can be evaluated using FFTs defined on $\bm{\mathrm{SO}(3)}$. We refer the readers to [21] for more details on spectral correlation. ### II-D Contact Sampling by Spectral Correlation A grasp is defined by the location of each finger of the gripper on an object and a pose defining the wrist location in space. For a gripper with $N_{f}$ fingers, the grasp configuration $\mathcal{G}$ can be defined as: $\mathcal{G}=(p_{1}\cdots p_{N_{f}},n_{1}\cdots n_{N_{f}},M)$ (9) where, $p_{i},n_{i}\in\mathbb{R}^{3}$ are respectively the object contact point and surface normals for the finger $i$, $M\in\bm{\mathrm{SE}(3)}$ is the wrist pose. Achieving static equilibrium when grasping requires that the force applied by each finger on the object stays within the friction cone [31]. In this sense, we attempt to select finger positions applying minimal tangential forces on the object during grasping. This is accomplished by finding contact points maximizing the dot product between finger and object surface normal vectors. Correlating the BEGIs corresponding to object and gripper fingers provide indication on the location of such points in $\bm{\mathrm{SO}(3)}$. Rotations with high correlation values can then be sampled from the correlation density function, while the BEGI point set map $\mathcal{P}=\\{\mathcal{P}_{jk}\\}$ is used to extract, for each finger, those contact points. The following contact sampling algorithm is then devised: * • Given an object point cloud and a hand configuration parametrized by the gripper’s joint configuration $\bm{q}$, we compute the BEGIs of point cloud and gripper fingers using (2). * • The correlation between these two BEGIs is then computed using (8). This process is depicted in Fig. 3. * • Rotations with correlation values greater than a threshold $t_{corr}$ are then sampled. The BEGI function of the gripper is then rotated and for each finger, object points located at the index $(j,k)$ of the finger are extracted. * • The set $\mathcal{P}^{r}_{N_{f}}=\\{\mathcal{P}_{(0)},\mathcal{P}_{(1)}\cdots\mathcal{P}_{(N_{f})}\\}$ can then be constructed for each rotation where $\mathcal{P}_{(i)}$ is the set of points extracted for the finger $i$. * • Contact point sets with surface normals $(p_{1}\cdots p_{N_{f}},\allowbreak n_{1}\cdots n_{N_{f}})$ can then be extracted from $\mathcal{P}^{r}_{N_{f}}$. * • An additional filtering step is required in order to remove the contacts that do not satisfy the force closure principle and that are out of range of the gripper kinematics. * • Wrist poses $\\{M\\}$ leading to collision-free grasps can then be sampled using the kinematics of the gripper. ### II-E Grasp Ranking Grasp candidates obtained from the previous step need to be ranked such that the one with maximum likelihood is selected and executed on the robot. For this purpose, we use our previously developed LoCoMo metric [10], which provides a similarity score between gripper fingers and object at the contact points. Due to the generic nature of SpectGRASP, using alternative ranking metrics will not limit its performance. The benefits of using the LoCoMo metric are twofold; first, it has been proven to perform well in practice and second, it provides a common basis to objectively evaluate the proposed method against the one presented in [10]. LoCoMo grasp ranking $\mathcal{Q}$ is computed as in (10). Figure 4: Successful grasps for various objects from the YCB object set using the proposed SpectGRASP method. Top row shows the computed top-ranked grasp candidates and bottom row shows the same grasps executed on the simulated robot. Detailed results can be found in the supplementary video. $\displaystyle\mathcal{M}_{i}$ $\displaystyle=\frac{1}{N_{s}}\sum_{j=1}^{\kappa}\left((2\pi)^{\kappa}|\Sigma|\right)^{\frac{1}{2}}\mathcal{N}\left(\varepsilon_{j};\vec{0},\Sigma\right)$ (10) $\displaystyle\mathcal{Q}$ $\displaystyle=\rho\prod_{i=1}^{N_{f}}\mathcal{M}_{i}^{\omega_{i}}$ where, $\mathcal{M}_{i}$ is the contact moment (CoMo) of finger $i$ computed at a contact point, $N_{s}$ is a normalizing term, $\kappa$ is the number of point cloud patches sampled around the location of the finger, $\mathcal{N}(\varepsilon_{j};\vec{0},\Sigma)$ is the multivariate Gaussian density function centered at $\vec{0}$ with covariance $\Sigma$, $\varepsilon_{j}$ is the difference of gripper and object zero-moment shift vectors. Finally, $\omega_{i}$ and $\rho$ are weighting factors. As presented in [32], $\rho$ can be dynamically updated to re-rank grasps based on factors such as the distance between robot’s end effector and closest grasps. More details on the derivation of (10) can be found in [10]. ## III Experimental Validations In this section, we present the experiments conducted in simulation to validate the performance of the proposed SpectGRASP method in grasping individual objects as well as clearing multi-object scenes. We also compare the grasping performance of our method with state-of-the-art LoCoMo-based grasp planner222LoCoMo grasp planner code is available at: https://github.com/maximeadjigble/grasplocomo [10] and the obtained results are discussed. Furthermore, we also discuss in detail the applicability of our approach to real scenarios. All experiments are performed on a windows machine with an i7 CPU. ### III-A Simulation Setup Description All experiments are performed using the PyBullet physics simulator. It is a Python wrapper for the Bullet physics engine, which has been proven to be an efficient open-source simulation tool for robotic models [33]. Our robotic setup consists of a 7 degrees of freedom (DoF) articulated robot arm fitted with a parallel-jaw gripper. For experiments, we have selected 16 different objects from the YCB object set [22] that are suitable with our gripper model. In order to make our system as realistic as possible, we have created a virtual RGB-D camera for point cloud acquisition and attached it to the robot’s end-effector. We use a point cloud generated by registering multiple clouds acquired by moving the robot to four different viewpoints around the objects. This registration is merely cloud stitching as the point clouds are acquired by a camera whose exact pose in the robot base frame is known [6]. Object CAD models downloaded from YCB website are used for simulations. In order to reach the grasp poses, a full 6-DoF end-effector pose controller has been implemented to generate the robot trajectory. Moreover, as previously stated, kinematically infeasible configurations are discarded from the full list of generated candidates. For all experiments, an empirically selected threshold $t_{corr}=0.1$ is used to generate grasps. We report both single and multiple objects grasping results following the evaluation protocol described in [34]. Similar to the setup described in [34], we have considered a circular task-space with a radius of $25~{}\mathrm{cm}$ within the robot workspace. TABLE I: Single object grasping results for both proposed and LoCoMo-based methods at test location-1. Object | SpectGRASP | LoCoMo ---|---|--- | Total Grasps1 (Feasible) | Time [s] | Lift (%) | Rotation (%) | Shake (%) | Total Grasps (Feasible) | Time [s] | Lift (%) | Rotation (%) | Shake (%) Cleanser | 1995 (265) | 2.55 | 100 | 100 | 100 | 7916 (379) | 9.93 | 100 | 100 | 100 Cup | 790 (116) | 0.42 | 100 | 100 | 100 | 3421 (90) | 1.66 | 100 | 100 | 100 F. Screwdriver | 2016 (125) | 0.86 | 100 | 100 | 100 | 13251 (1172) | 4.60 | 100 | 0 | NA2 Golf Ball | 3514 (119) | 0.98 | 100 | 100 | 100 | 30479 (1684) | 9.63 | 100 | 100 | 100 Hammer | 3173 (537) | 1.58 | 100 | 100 | 100 | 24179 (4213) | 10.49 | 100 | 0 | NA Large Clamp | 47 (12) | 0.15 | 100 | 0 | NA | 1361 (173) | 1.93 | 100 | 0 | NA Mug | 72 (4) | 0.31 | 100 | 0 | NA | 261 (9) | 4.19 | 100 | 33 | 0 P. Screwdriver | 1828 (5) | 0.64 | 100 | 100 | 100 | 14281 (276) | 4.7 | 100 | 0 | NA Potted Meat | 300 (6) | 0.34 | 100 | 100 | 100 | 1046 (28) | 0.92 | 100 | 100 | 100 Power Drill | 2410 (300) | 1.48 | 100 | 0 | NA | 28503 (1626) | 17.62 | 100 | 100 | 0 Racquet Ball | 614 (65) | 0.53 | 100 | 0 | NA | 16064 (2821) | 10.26 | 100 | 100 | 100 Softball | 7406 (52) | 2.07 | 100 | 100 | 100 | 64510 (1576) | 20.25 | 0 | NA | NA Strawberry | 5446 (16) | 1.57 | 100 | 100 | 100 | 36521 (639) | 12.16 | 100 | 100 | 0 Woodblock | 6001 (380) | 3.33 | 100 | 100 | 100 | 13269 (782) | 10.82 | 100 | 100 | 100 Mustard | 4638 (440) | 3.66 | 100 | 100 | 100 | 13438 (1647) | 21.56 | 100 | 100 | 100 * 1 Total number of grasps computed and in parenthesis are the total feasible grasps after IK filtering. * 2 NA – Test not performed as previous test failed. TABLE II: Single object grasping results for both proposed and LoCoMo-based methods at test location-2. Object | SpectGRASP | LoCoMo ---|---|--- | Total (Feasible) | Time | Lift | Rotation | Shake | Total (Feasible) | Time | Lift | Rotation | Shake Cleanser | 146 (33) | 0.32 | 100 | 100 | 100 | 8972 (1921) | 10.93 | 100 | 100 | 100 Cup | 617 (9) | 0.43 | 100 | 100 | 100 | 1525 (10) | 1.1 | 100 | 100 | 0 F. Screwdriver | 1869 (106) | 0.75 | 100 | 0 | NA | 13210 (694) | 4.65 | 100 | 0 | NA Golf Ball | 5674 (321) | 1.46 | 100 | 100 | 100 | 38481 (1891) | 12.64 | 100 | 100 | 100 Hammer | 2678 (31) | 1.25 | 100 | 100 | 100 | 14505 (231) | 7.94 | 100 | 100 | 100 Large Clamp | 161 (5) | 0.24 | 100 | 0 | NA | 1897 (69) | 1.86 | 100 | 0 | NA Mug | 90 (14) | 0.41 | 0 | NA | NA | 312 (38) | 4.3 | 100 | 100 | 100 P. Screwdriver | 1502 (228) | 0.58 | 100 | 100 | 100 | 11995 (1108) | 4.02 | 100 | 100 | 100 Potted Meat | 118 (8) | 0.33 | 100 | 100 | 100 | 1203 (94) | 1.06 | 0 | NA | NA Power Drill | 2767 (577) | 1.57 | 100 | 100 | 100 | 28078 (1869) | 20.6 | 100 | 0 | NA Racquet Ball | 505 (79) | 0.45 | 100 | 100 | 100 | 14425 (1084) | 8.64 | 0 | NA | NA Softball | 8489 (327) | 2.45 | 100 | 100 | 100 | 68615 (4286) | 21.58 | 100 | 0 | NA Strawberry | 5164 (419) | 1.54 | 100 | 100 | 100 | 34740 (1613) | 11.47 | 0 | NA | NA Woodblock | 5152 (707) | 2.93 | 100 | 100 | 100 | 12262 (1155) | 11.87 | 100 | 100 | 100 Mustard | 3428 (928) | 3.35 | 100 | 100 | 100 | 13080 (1865) | 21.68 | 100 | 100 | 100 ### III-B Grasping Individual Objects For this experiment, two different test locations on the circular task-space are selected. For location-1, the objects are placed at the origin of the circular task-space, i.e., the point on the ground plane at which the centre of the tool is projected onto, when the robot is at 90-90 configuration. Refer [34] for more details. For location-2, we move the object $25~{}\mathrm{cm}$ in the negative-$y$ direction and apply a rotation of $-90^{\circ}$ around $z$-axis. After candidate generation, filtering, and sequential ranking, the top ranked grasp is executed on the robot. A force of $50\mathrm{N}$ is used to grasp and hold the object. Thereafter, a series of three tests, as in [34], are performed to check the grasp stability: (i) lift test, where the object is lifted $20~{}\mathrm{cm}$ off the table at a speed of $10~{}\mathrm{cm/s}$; (ii) rotation test, where the object is rotated $90^{\circ}$ and $-90^{\circ}$ around the $y$-axis at a speed of $45~{}\mathrm{deg/s}$; and finally (iii) shake test, where the robot shakes the object in a sinusoidal pattern ($0.25\mathrm{m}$ amplitude, $10~{}\mathrm{m/s^{2}}$ acceleration) for 10 seconds. These tests are performed sequentially, i.e., if any of these fail the grasp is considered a failure and the next test will not be performed. The test is considered a fail if the object slips out of the fingers. For each object, with both proposed and LoCoMo-based methods, at each test location, we have repeated the test 3 times. In the paper, we report the average of those three trials. Fig. 4 shows some screenshots of the successful grasps generated and executed for 7 different objects. Tables I and II summarise the results for test locations 1 and 2, respectively. From the results, it can be seen that the proposed method outperformed the LoCoMo-based grasp planner in terms of grasp generation time. SpectGRASP takes on average $\bm{1.28~{}\mathrm{seconds}}$ to generate grasps. This is $\bm{7\times}$ faster compared to the LoCoMo-based grasp planner, which takes $9.5~{}\mathrm{seconds}$ on average. Although SpectGRASP generates fewer grasp candidates compared to LoCoMo, it demonstrated higher success rates than the later. For location 1, the average success rates of SpectGRASP for lifting, rotation and shaking tests are respectively, $\bm{100\%}$, $\bm{73\%}$ and $\bm{73\%}$, while for LoCoMo they are $93\%$, $62\%$, $47\%$. And for location 2, the average success rates of SpectGRASP for lifting, rotation and shaking tests are respectively $\bm{93\%}$, $\bm{80\%}$ and $\bm{80\%}$, while for LoCoMo they are $80\%$, $53\%$, $47\%$. These results suggest that the SpectGRASP is able to generate good and stable grasps than the ones generated by LoCoMo-based method. The difference in the number of grasps generated is due to the fact that LoCoMo uses all possible point pairs of a given point cloud to sample contact points. This results in a high number of grasp candidates; however, the generation time is more. Nevertheless, in practical real-world applications, only the top ranked grasps are considered; thus, making the SpectGRASP a more suitable grasp planner. It is worth noting that for both methods, the success rates from rotation and shake tests are lower than that of the lifting test. This is mainly due to the inaccuracy of physics simulator to model interactions between objects. We believe that these success rates will be improved with a real robot system, e.g. see results for LoCoMo method in [10] and [34]. Figure 5: Grasping objects in clutter with proposed method. Top row shows generated top-ranked grasps and the bottom row shows the same grasps executed on the robot. Objects are grasped one by one until either the scene is cleared, or the method returns no feasible grasps. Detailed results can be found in the supplementary video. ### III-C Grasping Objects in Clutter The second set of experiments are performed to evaluate the performance of the proposed method in clearing cluttered scenes containing multiple objects. For this tests, 6 different objects are randomly positioned. We test the performance by clearing 3 such randomly generated scenes. The task is to successively grasp, lift, rotate and shake one object at a time until the scene is successfully cleared. For each iteration, a new scene point cloud is captured based on which the grasps are generated. Like before, the generated grasps are filtered and ranked, and the top grasp is executed by the robot. The experiment is repeated until all objects are successfully removed or if the algorithm fails to find any feasible grasp. Also for this tests, we report the results following the protocol in [34] for group of objects. Fig. 5 shows successive images from this test where a cluttered scene being cleared using the proposed method. Table III summarises the result for clearing three different clutters. SpectGRASP is able to successfully clear all 3 scenes. It can be seen that the pickup order varies due to the random positioning of objects, but in all cases the first 4 objects are successfully picked up in the first attempt. For the 6th object of scene 2, the “Mustard” bottle was lifted successfully but fell back on the table during the rotation test. Another attempt was required to successfully complete this trial. Likewise, two attempts were needed to clear “screwdriver” in scene 3. Overall, considering all trials, on average it took $18.02~{}\mathrm{seconds}$ to generate grasps required to clear a scene of 6 objects. This corresponds to $\approx 3~{}\mathrm{seconds}$ per object, which is slightly higher compared to the case of single object grasping. This is because, cluttered scenes are composed of multiple objects, which means more grasp candidates are generated leading to high generation time. TABLE III: Clutter clearance results with proposed method. Scene | Object | Pickup order | Time (s) | Lift | Rotation | Shake ---|---|---|---|---|---|--- 1 | Woodblock | 2 | 3.96 | ✔ | ✔ | ✔ | Golfball | 4 | 2.37 | ✔ | ✔ | ✔ | Dishwash | 1 | 7 | ✔ | ✔ | ✔ | Lemon | 3 | 2.67 | ✔ | ✔ | ✔ | Screwdriver | 5 | 0.75 | ✔ | ✔ | ✔ | Mustard | 6 | 0.14 | ✔ | ✔ | ✔ Total grasp generation time: | 16.89 seconds 2 | Woodblock | 1 | 5.18 | ✔ | ✔ | ✔ | Golfball | 3 | 2.11 | ✔ | ✔ | ✔ | Dishwash | 2 | 3.4 | ✔ | ✔ | ✔ | Lemon | 4 | 1.09 | ✔ | ✔ | ✔ | Screwdriver | 5 | 0.63 | ✔ | ✔ | ✔ | Mustard | 6 | 0.25 | ✔3 | ✔ | ✔ Total grasp generation time: | 12.66 seconds 3 | Woodblock | 2 | 5.59 | ✔ | ✔ | ✔ | Golfball | 6 | 1.66 | ✔ | ✔ | ✔ | Dishwash | 1 | 6.45 | ✔ | ✔ | ✔ | Lemon | 4 | 3.34 | ✔ | ✔ | ✔ | Screwdriver | 5 | 2.96 | ✔ | ✔ | ✔ | Mustard | 3 | 4.51 | ✔ | ✔ | ✔ Total grasp generation time: | 24.51 seconds * 3 Purple tick mark: Success after second try. ### III-D Discussion #### Complexity analysis Experimental results demonstrate the efficiency of SpectGRASP method in generating grasps for various objects with a variety of shapes. This is mainly supported by rapid computation of the correlation density map that is used to sample contact points. For a parallel jaw gripper, naively sampling contact points on a point cloud with $N$ points results in a $\mathcal{O}(N^{2})$ complexity. As the number of points increases, the cost of sampling contacts becomes high. Also, this complexity drastically increases when hands with more fingers are used. However, for SpectGRASP, which uses the Fourier transform on $\bm{\mathrm{SO}(3)}$, has a complexity of $\mathcal{O}(B^{4})$ with $B$ being the bandwidth [21]. Suppose, $N_{r}$ rotations are sampled from the correlation density map and a maximum number of $K$ points are extracted from each BEGI cell, in extreme cases, sampling contacts leads to an $\mathcal{O}(N_{r}K^{N_{f}})$ complexity, with $N_{f}$ being the number of fingers. It is important to notice that the complexity of SpectGRASP is not directly related to the number of points in the point cloud, meaning that the efficiency of the method still remains same even for dense point clouds. Additionally, $B$ value can be adjusted to modify the grasp generation time. For instance, lower values of $B$ lead to higher number of points per cell but result in a lower number of possible rotations. This is desirable for applications requiring high number of grasp candidates. While, higher values of B tend to produce a smaller number of points per cell with a high number of rotations. This leads to fewer grasp candidates with precise matching. Applications such as dynamic grasping could greatly benefit from this type of fine matching. The contact sampling complexity can be further reduced by clustering the points in each BEGI cell. #### Applicability to real system In this work, we have validated our approach by a substantial number of virtual experiments with a simulated 7-DoF robot and a parallel-jaw gripper, grasping a variety of objects. The selected robot and gripper configurations match with the real KUKA iiwa robot arm and Schunk PG-70 gripper models, same as the setup presented in [10]. The full pipeline presented in this paper can be directly imported on to the real robot as it does not assume any kinematic constraints, and the grasp configurations for which there is no IK solutions are discarded. Our method relies only on the point clouds generated by the simulated virtual camera, which is mounted on the robot’s wrist. This camera has been constructed considering the camera parameters of a real depth camera. This means that the virtually generated point clouds are similar to that of the real-world depth sensor. As previously stated, our autonomous grasping technique does not rely on any prior knowledge of the object, e.g., a CAD model. Furthermore, our approach does not make use of any additional information regarding given unknown object that would not be available in a real-world scenario. The assumption is that the object will be placed in a reachable location by the robot within its workspace, viewable from a camera and the object size should be suitable for the gripper to be able to manipulate. Besides, our approach is agnostic to the robot system used, given that: (i) there is a scene or robot mounted vision system to acquire point cloud; (ii) the robot’s end-effector is a multi-finger hand with minimum two fingers; and (iii) hand kinematic model is known. Henceforth, we believe that our method is applicable to real systems. ## IV Conclusion In this paper, we have presented a computationally efficient and robust method, SpectGRASP, for robotic grasping via spectral correlation and grasp ranking. A Fast Fourier Transform of functions defined on the sphere is used to efficiently sample contact points on the surface of the object, while the LoCoMo metric is used for grasp ranking. The method uses only the point cloud and surface normals of an object to generate grasps. No training data, learning nor any 3D object model is needed. We also introduced a novel representation of point clouds with surface normals (BEGI). This can be used to efficiently find correspondance points between two point clouds. Experimental results in simulation have shown the efficiency and robustness of SpectGRASP for grasp generation using a parallel-jaw gripper. SpectGRASP outperforms the previous state-of-the-art “model-free and learning-free grasping” method, in terms of grasp generation time and success rate for the tasks of grasping single objects and clearing cluttered scenes with successive grasps. Future work will focus on evaluating the method on a real robot setup, and also on extending it to multi-finger hands. Due to the swiftness and efficiency of the grasp generation pipeline, we intend to use it for tracking and grasping moving objects by integrating it with the method presented in [35]. ## References * [1] A. Bicchi and V. Kumar, “Robotic grasping and contact: a review,” in _IEEE Int. Conf. Robot. Autom_ , vol. 1, 2000, pp. 348–353 vol.1. * [2] J. Bohg _et al._ , “Data-driven grasp synthesis—a survey,” _IEEE Trans. Robot._ , vol. 30, no. 2, pp. 289–309, 2013. * [3] K. B. Shimoga, “Robot grasp synthesis algorithms: A survey,” _Int. J. Rob. Res._ , vol. 15, no. 3, pp. 230–266, 1996. * [4] A. Sahbani, S. El-Khoury, and P. Bidaud, “An overview of 3d object grasp synthesis algorithms,” _Rob. Auton. Syst._ , vol. 60, no. 3, pp. 326–336, 2012. * [5] A. ten Pas _et al._ , “Grasp pose detection in point clouds,” _Int. J. Rob. Res._ , vol. 36, no. 13-14, pp. 1455–1473, 2017. * [6] N. Marturi _et al._ , “Dynamic grasp and trajectory planning for moving objects,” _Autonomous Robots_ , vol. 43, no. 5, pp. 1241–1256, 2019. * [7] S. Levine _et al._ , “Learning hand-eye coordination for robotic grasping with deep learning and large-scale data collection,” _Int. J. Rob. Res._ , vol. 37, no. 4-5, pp. 421–436, 2018. * [8] J. Mahler _et al._ , “Dex-net 2.0: Deep learning to plan robust grasps with synthetic point clouds and analytic grasp metrics,” _arXiv preprint arXiv:1703.09312_ , 2017. * [9] M. Kopicki _et al._ , “One-shot learning and generation of dexterous grasps for novel objects,” _Int. J. Rob. Res._ , vol. 35, no. 8, pp. 959–976, 2016. * [10] M. Adjigble _et al._ , “Model-free and learning-free grasping by local contact moment matching,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ , Oct 2018, pp. 2933–2940. * [11] M. Kiatos, S. Malassiotis, and I. Sarantopoulos, “A geometric approach for grasping unknown objects with multifingered hands,” _IEEE Trans. Robot._ , 2020. * [12] M. Sorour _et al._ , “Grasping unknown objects based on gripper workspace spheres,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2019, pp. 1541–1547. * [13] C. Eppner and O. Brock, “Grasping unknown objects by exploiting shape adaptability and environmental constraints,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2013, pp. 4000–4006. * [14] K. Charusta _et al._ , “Independent contact regions based on a patch contact model,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2012, pp. 4162–4169. * [15] Q. Lei and M. Wisse, “Fast grasping of unknown objects using force balance optimization,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ IEEE, 2014, pp. 2454–2460. * [16] C. de Farias _et al._ , “Simultaneous tactile exploration and grasp refinement for unknown objects,” _IEEE Robot. Autom. Lett._ , vol. 6, no. 2, pp. 3349–3356, 2021. * [17] V. Lippiello _et al._ , “Visual grasp planning for unknown objects using a multifingered robotic hand,” _IEEE/ASME Trans. Mechatronics_ , vol. 18, no. 3, pp. 1050–1059, 2012. * [18] A. H. Quispe _et al._ , “Exploiting symmetries and extrusions for grasping household objects,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2015, pp. 3702–3708. * [19] G. Vezzani, U. Pattacini, and L. Natale, “A grasping approach based on superquadric models,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2017, pp. 1579–1586. * [20] F. T. Pokorny, Y. Bekiroglu, and D. Kragic, “Grasp moduli spaces and spherical harmonics,” in _IEEE Int. Conf. Robot. Autom._ IEEE, 2014, pp. 389–396. * [21] P. J. Kostelec and D. N. Rockmore, “Ffts on the rotation group,” _Journal of Fourier analysis and applications_ , vol. 14, no. 2, pp. 145–179, 2008. * [22] B. Calli _et al._ , “The ycb object and model set: Towards common benchmarks for manipulation research,” in _Proc. Int. Conf. Adv. Robot. (ICAR)_. IEEE, 2015, pp. 510–517. * [23] B. K. P. Horn, “Extended gaussian images,” _Proceedings of the IEEE_ , vol. 72, no. 12, pp. 1671–1686, 1984. * [24] B. Lowekamp, P. Rheingans, and T. S. Yoo, “Exploring surface characteristics with interactive gaussian images (a case study),” in _IEEE Visualization Conference_. IEEE, 2002, pp. 553–556. * [25] S. K. Nayar _et al._ , “Specular surface inspection using structured highlight and gaussian images.” _IEEE Trans. Robot. Autom._ , vol. 6, no. 2, pp. 208–218, 1990. * [26] J. J. Little, “Extended gaussian images, mixed volumes, shape reconstruction,” in _First Annual Symposium on Computational geometry_ , 1985, pp. 15–23. * [27] C. Müller, _Spherical harmonics_. Springer, 2006, vol. 17. * [28] T. S. Cohen _et al._ , “Spherical cnns,” _arXiv preprint arXiv:1801.10130_ , 2018. * [29] N. Marturi _et al._ , “Image-guided nanopositioning scheme for sem,” _IEEE Transactions on Automation Science and Engineering_ , vol. 15, no. 1, pp. 45–56, 2016. * [30] E. Wigner, _Group theory: and its application to the quantum mechanics of atomic spectra_. Elsevier, 2012, vol. 5. * [31] V.-D. Nguyen, “Constructing force-closure grasps,” _The International Journal of Robotics Research_ , vol. 7, no. 3, pp. 3–16, 1988. * [32] M. Adjigble _et al._ , “An assisted telemanipulation approach: combining autonomous grasp planning with haptic cues,” in _IEEE/RSJ Int. Conf. Intell. Rob. Sys._ , 2019, pp. 3164–3171. * [33] E. Coumans and Y. Bai, “Pybullet, a python module for physics simulation for games, robotics and machine learning,” 2016. * [34] Y. Bekiroglu _et al._ , “Benchmarking protocol for grasp planning algorithms,” _IEEE Robot. Autom. Lett._ , vol. 5, no. 2, pp. 315–322, 2020\. * [35] C. de Farias _et al._ , “Dual quaternion-based visual servoing for grasping moving objects,” _arXiv preprint arXiv:2107.08149_ , 2021. [Online]. Available: https://arxiv.org/abs/2107.08149
arxiv-papers
2021-07-26T21:48:46
2024-09-04T03:07:20.107479
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Maxime Adjigble, Cristiana de Farias, Rustam Stolkin, Naresh Marturi", "submitter": "Naresh Marturi", "url": "https://arxiv.org/abs/2107.12492" }
2107.12493
# Strong Negative Electrothermal Feedback in Thermal Kinetic Inductance Detectors Shubh Agrawal [email protected] Department of Physics, California Institute of Technology, Pasadena, CA, 91125, USA Bryan Steinbach [email protected] Department of Physics, California Institute of Technology, Pasadena, CA, 91125, USA James J. Bock Department of Physics, California Institute of Technology, Pasadena, CA, 91125, USA Jet Propulsion Lab, Pasadena, CA, 91109, USA Clifford Frez Jet Propulsion Lab, Pasadena, CA, 91109, USA Lorenzo Minutolo Department of Physics, California Institute of Technology, Pasadena, CA, 91125, USA Hien Nguyen Jet Propulsion Lab, Pasadena, CA, 91109, USA Roger O’Brient Jet Propulsion Lab, Pasadena, CA, 91109, USA Anthony Turner Jet Propulsion Lab, Pasadena, CA, 91109, USA Albert Wandui Department of Physics, California Institute of Technology, Pasadena, CA, 91125, USA (August 27, 2024) ###### Abstract We demonstrate strong negative electrothermal feedback accelerating and linearizing the response of a thermal kinetic inductance detector (TKID). TKIDs are a proposed highly multiplexable replacement to transition-edge sensors and measure power through the temperature-dependent resonant frequency of a superconducting microresonator bolometer. At high readout probe power and probe frequency detuned from the TKID resonant frequency, we observe electrothermal feedback loop gain up to $\mathcal{L}$ $\approx$ 16 through measuring the reduction of settling time. We also show that the detector response has no detectable non-linearity over a 38% range of incident power and that the noise-equivalent power is below the design photon noise. ## I Introduction And Motivation We present observations of strong negative electrothermal feedback in a thermal kinetic inductance detector (TKID). TKIDs are cryogenic bolometers that detect minute power fluctuations by measuring the temperature fluctuations of a suspended absorber Ulbricht _et al._ (2015); Quaranta _et al._ (2013); Arndt _et al._ (2017); Timofeev _et al._ (2014); Dabironezare _et al._ (2018); Wernis (2013). The suspended absorber is connected to a thermal bath with a weak thermal link so that the incident power and the suspended absorber temperature are related approximately linearly. In a TKID, the temperature rise is measured through the temperature dependence of the kinetic inductance effect in a superconducting inductor on the suspended absorber. The inductor is coupled to a capacitor to form a superconducting microresonator, such that the incident power is measured by the change in the resonant frequency. The resonant frequency is measured through the phase shift of a readout probe signal, which normally is at a low enough power (much less than the incident power which is being measured) such that the TKID dynamics are not altered by the probe. Negative electrothermal feedback occurs in bolometers when the power dissipated in the temperature sensor has a negative temperature dependence. Strong electrothermal feedback through Joule heating reduces non-linearities and resolution limitations in voltage-biased transition-edge sensors Irwin (1995). Feedback reduces Johnson noise in bolometers using resistive sensors Mather (1982). In a detector with negative electrothermal feedback, dissipated readout power decreases rapidly with increasing temperature, such that temperature deviations from the operating point return to the mean more rapidly. Total power flux is held nearly constant, as readout power compensates for changes in incident power, which increases the linearity of the bolometer. In the strong electrothermal feedback regime with transition- edge bolometers, this effect reduces the time constant of the detector by an order of magnitude Irwin and Hilton (2005). These benefits have led to numerous applications for transition-edge sensors, where strong electrothermal feedback produces fast, linear, and photon noise limited sensors for millimeter-wave detection Anderson _et al._ (2020); Zhang _et al._ (2020); Koopman _et al._ (2018) and X-ray calorimeters with eV energy resolution Szypryt _et al._ (2019). Lindeman Lindeman (2014) proposed a mechanism through which electrothermal feedback would occur in a TKID when the frequency of the readout probe signal was detuned from the resonant frequency. Detuning the probe frequency above the TKID’s resonant frequency, an increase in temperature of the suspended absorber decreases the resonant frequency due to an increase in kinetic inductance, moving the resonant frequency further from the probe frequency. This decreases the electrical power dissipated by the probe in the resonator, which in turn decreases the temperature of the suspended absorber, resulting in negative electrothermal feedback. The feedback can be strong in resonators with high quality factors, as there is a large change in absorption of power from the probe signal for a small change in resonant frequency. We demonstrate that this feedback occurs in a TKID device of the design previously presented and characterized at low readout power in Wandui et al Wandui _et al._ (2020) and shown in Fig. 1. Figure 1: SEM micrograph of the suspended absorber of a TKID of the design used for this work. The gold resistor heater is seen on the left and the meandered aluminum inductor is seen on the right. For more details on the design of the TKID, see Wandui et al. Wandui _et al._ (2020) ### I.1 Modeling We model the response of a TKID to probe signals of high power following the schematic in Fig. 2. Probe power $P_{probe}$ enters port 1 of the transmission line and is modulated by the resonant circuit, and some phase-shifted fraction of it exits at port 2. Strong electrothermal feedback manifests as a non- linear response to high probe powers reminiscent of the Duffing oscillator. Similar behavior is observed in traditional hot quasiparticle kinetic inductance detectors due to the non-linearity of kinetic inductance near the superconducting critical current Swenson _et al._ (2013). To determine the non-linear behavior of a TKID, we first solve for the stable non-linear operating temperatures of the suspended absorber and then calculate the strength of the electrothermal feedback from the relation between probe power dissipation and absorber temperature. Figure 2: Schematic and circuit diagram of the TKID. The suspended absorber, as shown in Fig. 1, is enclosed in red. The blue arrows represent the power fluxes into ($P_{opt}$ and $P_{abs}$) and out of ($P_{leg}$) the absorber and the probe power along the transmission line ($P_{probe}$). Capacitors $C_{c}$ weakly couple the detector to the transmission line. The inductance L and capacitance C form the TKID’s superconducting microresonator. Incident power $P_{opt}$ plus the readout probe power dissipated in the resonator $P_{abs}$ heat the suspended absorber. $P_{abs}$ is a fraction of the probe power $P_{probe}$, $P_{abs}=\frac{1}{2}\chi_{c}\chi_{g}P_{probe}.$ (1) The dissipated probe power is limited by the coupling efficiency $\chi_{c}$ of the resonator to the transmission line, and the detuning efficiency $\chi_{g}$ of the resonator to the probe frequency. We generalize $\chi_{c}$ to complex coupling quality factors $Q_{c}$ with complex angle $\phi_{c}$ for asymmetric resonances Khalil _et al._ (2012), where $x=(f-f_{r})/f_{r}$ is the fractional frequency detuning and $Q_{i}$ and $Q_{r}$ are the internal and total quality factors, $\chi_{c}=\frac{4|Q_{c}|Q_{i}}{(|Q_{c}|+Q_{i}\cos(\phi_{c})^{2})},\quad\chi_{g}=\frac{1}{1+4Q_{r}^{2}x^{2}}.$ (2) The fractional energy loss per cycle from the resonator $Q_{r}^{-1}$ is a reciprocal sum of the absorption in the inductor $Q_{i}^{-1}$ and loss to the transmission line $\Re\left[Q_{c}^{-1}\right]$, $Q_{r}^{-1}=Q_{i}^{-1}+\Re\left[Q_{c}^{-1}\right].$ (3) At low temperature, the resonant frequency is $f_{0}$. As the temperature rises, the frequency shifts to $f_{r}$ due to the temperature dependence of the kinetic inductance effect. We assume the superconductor follows Mattis- Bardeen theory for a thin film in its frequency shift $x_{MB}=(f_{r}-f_{0})/f_{0}$ and internal quality factor $Q_{i}$, $x_{MB}=-\frac{\alpha_{k}S_{2}n_{qp}}{4N_{0}\Delta},$ (4) $Q_{i}^{-1}=\frac{2N_{0}\Delta}{\alpha_{k}n_{qp}S_{1}},$ (5) where $S_{1}$ and $S_{2}$ are the Mattis-Bardeen derived absorption and frequency responses for a superconducting microresonator Zmuidzinas (2012). $n_{qp}$ is the equilibrium quasiparticle density for a BCS superconductor at suspended absorber temperature $T$ with gap $\Delta$ and density of states $N_{0}$. For our aluminum films with critical temperature $T_{c}$, we use $\Delta$ $\approx$ 1.75 $k_{B}T_{c}$ = 0.00015 eV/K $\times$ $T_{c}$ and $N_{0}=1.72\times 10^{10}$ µm-3 eV-1. We use low temperature approximations to the Mattis-Bardeen integrals for $n_{qp}$, $S_{2}$ and $S_{1}$, $n_{qp}=2N_{0}\sqrt{2\pi k_{B}T\Delta}\exp\Big{(}-\frac{\Delta}{k_{B}T}\Big{)},$ (6) $S_{2}=1+\sqrt{\frac{2\Delta}{\pi k_{B}T}}\exp\Big{(}-\frac{hf}{2k_{B}T}\Big{)}I_{0}\Big{[}\frac{hf}{2k_{B}T}\Big{]},$ (7) $S_{1}=\frac{2}{\pi}\sqrt{\frac{2\Delta}{\pi k_{B}T}}\sinh\Big{(}\frac{hf}{2k_{B}T}\Big{)}K_{0}\Big{[}\frac{hf}{2k_{B}T}\Big{]}.$ (8) The suspended absorber has a heat capacity $C(T)$ and is connected to a heat sink at temperature $T_{bath}$ through a thermal conductance $G(T)$ = $nK_{c}T^{n-1}$ = $\partial P_{leg}/\partial T$. The power transferred between the suspended absorber and the heat sink is $P_{leg}$ = $K_{c}(T^{n}-T_{\text{bath}}^{n})$. The thermal energy in the suspended absorber changes at a rate equal to net power entering and leaving the suspended absorber, $C(T)\frac{dT}{dt}=-P_{leg}+P_{abs}+P_{opt}.$ (9) The steady-state solutions for the temperature thus satisfy $P_{abs}(T)$ \+ $P_{opt}$ = $P_{leg}(T)$. In order to be a stable solution, we additionally require $\partial(P_{abs}-P_{leg})/\partial T<0$, as otherwise a small perturbation in temperature will grow exponentially away from equilibrium. We show predicted stable temperature solutions for a range of probe powers in Fig. 3. Figure 3: Model predictions for suspended absorber temperature $T$ under slow probe frequency sweeps. Different probe powers are shown in different colors. Solid lines indicate the cold branch which is accessed through frequency up sweeps; dashed segments show the hot branch which is accessed through frequency down sweeps. Model parameters used are those for the device tested in Section II.1. Like the Duffing oscillator, at high probe powers, the response to probe frequency sweeps splits into two stable branches. The stable branches are a cold branch with weak positive electrothermal feedback and a hot branch with strong negative electrothermal feedback. A third unstable branch exists at an intermediate temperature and experiences strong positive electrothermal feedback, so small perturbations grow rapidly away from equilibrium. We neglect this unstable solution, which is inaccessible to our experimental setup. Qualitatively, we explain the extended hot branch and the lower bifurcation frequency in Fig. 3 as follows. If the probe frequency starts above the resonant frequency, we dissipate a small amount of power in the resonator that pushes its frequency slightly down. As we lower the probe frequency and have it approach the resonant frequency, the dissipated power grows, so the resonant frequency is further pushed down. The frequency gap must continue to close for the dissipated power to grow, so $\chi_{g}$ increases. Eventually, the frequency gap shrinks to zero, and the dissipated power is maximized. At this point, any further decrease in probe frequency decreases the dissipated power, and the resonant frequency begins rising and bifurcates back to the cold branch, leaving the probe frequency well below the resonant frequency. We term these sweeps described above, where the probe frequency is stepped down slowly in small decrements, as “down sweeps”. “Up sweeps” are where we step the probe frequency up slowly in small increments, and these exhibit positive electrothermal feedback. In up sweeps, the probe frequency starts lower than the resonance frequency, and as power is dissipated in the resonator and positive electrothermal feedback becomes significant, the resonant frequency is pulled down and bifurcates to below the probe frequency. Non-linear kinetic inductance Swenson _et al._ (2013) and quasiparticle heating Thomas, Withington, and Goldie (2015); Guruswamy _et al._ (2017) could produce similar non-linearities in our devices, without producing useful electrothermal feedback that speeds up the time constant or linearizes the response. In the case of non-linear kinetic inductance, as the current in the inductor approaches the critical current, the inductance increases, and the resonant frequency decreases, mimicking electrothermal feedback from the perspective of the probe. We minimize the impact of non-linear kinetic inductance in our setup by operating the TKID at higher temperatures, where it has strong responsivity, and therefore relatively low quality factors ($\approx$ 10,000) and low current densities in the superconducting film. Quasiparticle heating can also produce electrothermal feedback internal to the quasiparticle population, but without any useful reduction in the time constant. Quasiparticle heating is reduced due to our large volume inductor, which maximizes the thermal conductance between the quasiparticles and the phonons in the superconducting film. The quasiparticle to phonon thermal conductance also benefits from high temperatures, where the quasiparticle density is high and the quasiparticle lifetime is short. ### I.2 Loop Gain and Time Constant We model the dynamics of small perturbations in temperature by linearizing Eq. 9. We Taylor expand $P_{leg}=P_{leg}^{0}+GT$ where $G=(\partial P_{leg})/T$, $P_{abs}=P_{abs}^{0}-G_{ETF}T$, where $G_{ETF}=(\partial P_{abs})/{T}$, and where $T$ now refers to a small perturbation in temperature from the equilibrium. With these substitutions the linearized version of Eq. 9 becomes $C\frac{dT}{dt}=-(G+G_{ETF})T+P_{opt}(t).$ (10) Following the convention for transition-edge sensors Irwin and Hilton (2005), we define loop gain as $\mathcal{L}=G_{ETF}/G$. Loop gain measures how strongly electrothermal feedback forces the temperature of the bolometer back to equilibrium, relative to the forcing due to the thermal link. Negative electrothermal feedback corresponds to positive loop gain due to the minus sign in the definition of $G_{ETF}$. Solving the $P_{opt}(t)$ step response of Eq. 10 leads to the time constant for the bolometer $\tau_{ETF}=\frac{1}{\mathcal{L}+1}\frac{C}{G}=\frac{1}{\mathcal{L}+1}\tau_{0},$ (11) where $\tau_{0}=C/G$ is the intrinsic bolometer thermal time constant. The effective electrothermal feedback $G_{ETF}$ is the derivative of $P_{abs}$ with temperature, which from Eq. 1 is $G_{ETF}=P_{abs}^{\prime}(T)=\frac{1}{2}(\chi_{c}^{\prime}(T)\chi_{g}(T)+\chi_{c}(T)\chi_{g}^{\prime}(T))P_{probe}.$ (12) To estimate loop gain in the strong negative electrothermal feedback regime, the term $\chi_{c}^{\prime}(T)$ can be neglected, because it is temperature- dependent only through the internal quality factor, while $\chi_{g}^{\prime}(T)$ is temperature-dependent through resonator frequency shifts. At the low probe frequencies of interest for TKIDs, the frequency shift effects are more significant than quality factor shifts by typically about an order of magnitude. We additionally assume that $Q_{r}^{\prime}(T)$ is zero in $\chi_{g}^{\prime}(T)$. Then, the temperature dependence of $G_{ETF}$ is contained in $\chi_{g}^{\prime}(T)=-8Q_{r}^{2}\chi_{g}(T)^{2}x(T)x^{\prime}(T).$ (13) The fractional frequency offset between probe and resonator that maximizes $\chi_{g}^{\prime}(T)$ is $\hat{x}=\frac{1}{Q_{r}\sqrt{12}}.$ (14) At this detuning (where the probe is between one-quarter and one-third of a linewidth above the resonant frequency), the power absorbed is $\hat{P}_{abs}=\frac{3}{8}\chi_{c}P_{probe}.$ (15) The loop gain at optimal detuning $\hat{\mathcal{L}}$ can be expressed in terms of $\beta=S_{2}/S_{1}$, $\kappa=\partial\log n_{qp}\Big{/}\partial\log T$. We additionally define $\alpha=\sqrt{3}\beta\kappa/4$, in order to put the expression of the loop gain of a TKID into the same form as the loop gain of a transition-edge sensorIrwin and Hilton (2005): $\hat{\mathcal{L}}=\frac{\alpha P_{abs}}{GT}.$ (16) ### I.3 Noise Model The intrinsic noise of a TKID contains contributions from three sources: thermal fluctuations in the suspended absorber due to the exchange of phonons in the weak thermal link, quasiparticle number density fluctuations in the superconductor due to thermal generation and recombination of quasiparticles, and readout noise from the low noise amplifier Wandui _et al._ (2020). When the TKID is operated in the strong electrothermal feedback regime, we expect a significant change in the phonon noise and small changes in generation recombination noise and readout noise. We expect our devices to be strongly phonon noise limited. The phonon noise contribution to the noise-equivalent power of the detector, $NEP_{\text{phonon}}=\sqrt{4k_{B}T^{2}G\gamma},$ (17) includes $\gamma\approx 0.5$, a factor that accounts for the lower temperature of the thermal bathMather (1982). Phonon noise will generally increase due to an increase in the total thermal power in the legs. A typical operating condition for transition-edge sensors is setting dissipated readout power equal to the incident power; for this setup, the phonon noise increases by a factor of $\sqrt{2}$ if the detector thermal conductance $G$ is re-optimized to fix the suspended absorber temperature. Changes in the quasiparticle generation recombination noise should be limited by the large volume of our inductor, as the quasiparticle population is in thermal equilibrium with the phonons in the suspended absorber. The readout noise should not vary much, because the decrease in coupling efficiency from detuning is compensated for by the increase in readout power, such that the absolute responsivity $P_{probe}$ $\times$ ${dS_{21}}/{dP_{opt}}$ is only weakly dependent on probe power in the strong electrothermal feedback regime. We also expect an additional source of frequency-dependent noise due to finite thermal conductance within the suspended absorber and distributed heat capacity. This effect is observed in transition-edge sensors at high loop gains Lee _et al._ (1998), manifesting as a rise in noise beyond the intrinsic thermal bandwidth of the suspended absorber. Our suspended absorber is approximately 300 nm thick, much thinner than the 1000 nm thick absorbers where we have observed this effect in transition-edge sensors Kernasovskiy (2020). This reduces the thermal conductance within the absorber which is limited by the cross-sectional area of the suspended absorber, due to the phonon analog of the Stefan-Boltzmann law. ## II Results and Discussion We studied a single TKID at high readout probe powers using the cryostat described in Wandui et al Wandui _et al._ (2020) and the software-defined radio system described in Minutolo et al Minutolo _et al._ (2019). To deposit incident power $P_{opt}$ that is free of photon noise, we supplied DC to the gold heater resistor visible in Fig. 1 on the suspended absorber. The nominal incident power used in our experiments is $P_{opt}$ = 3.75 pW which brings the aluminum inductor to a temperature $T\approx 0.33K$ where it has useful responsivity. ### II.1 TKID Characterization To characterize the TKID resonator at low readout probe power, we obtained transmission $S_{21}$ measurements by biasing the detector at a fixed probe power $P_{probe}$ = $0.1$ pW and sweeping the probe frequency $f$ over 2001 equally-spaced points between $312.5$ MHz and $319$ MHz. We repeated this for 10 different values of bath temperature $T_{bath}$ between 114 mK and 439 mK. A least-squares fit of the $S_{21}$ curves to Eq. 18 gives us the resonant frequency $f_{r}$ dependent on $T_{bath}$, which when fitted using Eqs. 4, 6, and 7, estimates $|Q_{c}|$ $\approx$ 13500, $\phi_{c}$ $\approx$ 0.3, $T_{c}$ = 1.32 $\pm$ 0.01 K, and $\alpha_{k}$ = 0.50 $\pm$ 0.03. With the resonator now calibrated as a thermometer, we characterize the weak thermal link by sweeping the incident power $P_{opt}$ in 31 steps between 0 and 23.4 pW with $T_{bath}=$ 186 mK. Least-squares fits to the responses determines the dependence of $f_{r}$ on $P_{opt}$. The approximation $P_{opt}$ $\approx$ $P_{leg}$ in Eqs. 9 and 1 gave us $f_{0}$ = 317.889 $\pm$ 0.005 MHz, $K_{c}$ = 185 $\pm$ 3 pW / Kn, and $n$ = 3.23 $\pm$ 0.02. Our value of $n\approx 3$ is consistent with similar bolometers with thin silicon nitride support legs used in BICEP/Keck Wandui _et al._ (2020). ### II.2 Non-linear $S_{21}$ curves We measured non-linear $S_{21}$ by biasing the detector at a range of fixed probe powers $P_{probe}$ and performing both up and down sweeps, over 3000 equally-spaced probe frequencies $f$ between $316$ MHz and $318.4$ MHz. The bath temperature was regulated to 186 mK, and we fixed the incident power at $P_{opt}=$ 3.75 pW. The predicted $S_{21}$ is given by $S_{21}(f)=1-\frac{Q_{r}}{Q_{c}}\frac{1}{1+j2Q_{r}x},$ (18) where $Q_{r}$ and $x$ are determined by solving for the stable suspended absorber temperature as described in Section I.1. (a) Up Sweeps: Frequency stepped up in gradual increments. (b) Down Sweeps: Frequency stepped down in gradual decrements. Figure 4: Crosses show the measured $S_{21}$ magnitude plotted against frequency; model predictions are given by lines. Insets show measured $S_{21}$ phase. Strong hysteresis is seen at probe powers of the order of a few pW, when $P_{probe}$ is comparable to $P_{opt}$. Fig. 4 shows the measured and predicted $S_{21}$ frequency sweeps when probe power at the chip is $0.5$ pW, $5$ pW, and $8$ pW. Directional hysteresis is absent at 0.5 pW but shows up strongly at 5 and 8 pW. For frequency down sweeps at the higher probe powers, the resonance frequency is pushed down as predicted by the negative electrothermal feedback model. At the highest probe power setting with $P_{probe}$ = 8 pW, we observed that the lower bifurcation frequency of the hysteresis branch deviates by a few MHz from the resonance frequency obtained at low probe power. ### II.3 Speed of Response Figure 5: Measured $S_{21}$ step responses to a small change in incident power at low (blue) and high (orange) probe power, averaged over $\approx 10$ periods shown in dotted lines. Solid lines show the fit to the exponential decay at this edge of the applied $P_{opt}$ square wave. For clarity, the data are scaled and shifted along the $y$-axis, such that the response range for both is $(0,1]$. At high probe power, the time for $S_{21}$ to reach a steady state is reduced dramatically due to strong negative electrothermal feedback. We measured bolometer time constants on the hot branch at probe powers ranging from 0.05 pW to 8 pW. We applied probe signals at frequencies $f$ between 317.0 MHz and 318.0 MHz spaced by 50 kHz to the detector with bath temperature regulated to $T_{bath}$ = 186 mK. The incident power pulses with a 34 pW square impulse several time constants wide (0.05 s) to bias the detector into the hot branch. After the pulse, the incident power oscillates in a 1.92 Hz square wave between 3.65 and 3.85 pW. We recorded $S_{21}$ for 5 s intervals at a sample rate of 20 kHz. Stacked $S_{21}$ traces at low and high negative electrothermal feedback are shown in Fig. 5. Fitting the exponential decay of detector response $S_{21}$ at the edge of the applied square wave estimates the time constant $\tau$. This gives us the loop gain $\mathcal{L}$ by Eq. 11. Figure 6: Measured loop gains plotted against probe frequency (in MHz) at incident power $P_{opt}=$ 3.75 pW and a range of probe powers $P_{probe}$. Measured data points are connected by dotted lines; solid lines give model predictions between the two bifurcation frequencies. Higher values of $\mathcal{L}$ are obtained at higher probe powers in good agreement with predictions. We show the observed loop gain as a function of probe frequency and power, along with our model predictions, in Fig. 6. The highest value $\mathcal{L}$ = 15.7 $\pm$ 1.3 observed was at $P_{probe}$ = 8 pW and $f$ = 317.45 MHz. Our model slightly underestimates the speed up of the bolometer time constant, which will be investigated in future work. ### II.4 Linearity of Response To measure linearity in the strong negative electrothermal feedback regime, we biased the TKID with $P_{probe}$ = 5.12 pW, $f$ = 317.65 MHz while regulating the bath temperature to $T_{bath}$ = 186 mK, where loop gain was previously measured to be $\mathcal{L}$ $\approx$ 10 at $P_{opt}$ = 3.75 pW. We swept incident power $P_{opt}$ over a wide range, from which we select a region from 3.5 pW to 4.9 pW (or 8% below and 30% above the nominal 3.75 pW) where the response is highly linear. The top panel of Fig. 7 shows the detector response to the incident power sweep in $S_{21}$ phase. We fitted this response to a linear model, as shown in the two panels of Fig. 7. The residuals (lower panel) are dominated by measurement noise and indicate linearity better than 0.1% in this operational range. Figure 7: Above, the response of the detector in $S_{21}$ phase over a range of incident power in red, along with a linear fit in blue. Below, the binned residual difference between data and linear fit, giving a reduced $\chi^{2}$ $\approx$ 2. ### II.5 NEP Measurements We measured the noise-equivalent power (NEP) of the TKID over a range of probe frequencies and powers. As in the time constant measurements, we biased the detector into the hot branch by pulsing the incident power after applying the probe signal. The NEP amplitude spectrum, shown in Fig. 8 for $P_{probe}$ = 5.12 pW and $f$ = 317.65 MHz, rises at kHz frequencies, suggestive of internal thermal resistance and multiple decoupled heat capacities discussed in Section I.3. Figure 8: Noise-equivalent Power (NEP) amplitude spectrum for $P_{probe}$ = 5.12 pW, $f$ = 317.65 MHz and $P_{opt}$ = 3.75 pW on the hot branch. The blue curve shows thermal noise (in the direction in the complex plane that changing incident power changes $S_{21}$), while the yellow curve gives readout noise (in the orthogonal direction). We suspect common-mode environmental noise, likely from thermal fluctuations or RF-interference susceptibility that are detector-detector correlated, to be responsible for the higher noise amplitude between 10 - 30 Hz and the 1/$f$ knee at $\approx$ 10 Hz Wandui _et al._ (2020). We did not implement a pair differencing scheme that would remove common-mode noise to obtain the results shown in Fig. 8. These methods have been previously proven effective on a small array of detectors, achieving phonon-limited NEPs with a 1/$f$ knee at $\approx$ 0.1 Hz for the same design Wandui _et al._ (2020). Fig. 9 shows the NEP at all measured probe powers and frequencies. The NEP is averaged over 10 - 30 Hz to minimize the impact of the excess low-frequency noise and the rise in kHz high-frequency noise. There is a probe frequency at all probe powers that achieves a NEP of 25 aW/rtHz. This is below the intended photon noise of 38 aW/rtHz, but well above the expected phonon noise of 14 aW/rtHz. We believe that the NEP is limited by environmental noise, as we have observed phonon-limited noise with much lower 1/$f$ knees in a TKID of the same design in a different testbed Wandui _et al._ (2020). Figure 9: NEP at several probe fixed signals $P_{probe}$ and $f$ on the negative electrothermal feedback hot branch. ## III Conclusion We have demonstrated negative electrothermal feedback in a TKID biased at readout probe powers comparable to the design incident power through the speed-up in bolometer response time. The maximum speed-up we observed was a factor of $\tau_{0}/\tau$ = 16.7 $\pm$ 1.3 at $P_{probe}$ = 8 pW and $P_{opt}$ = 3.75 pW. At a bias of $P_{probe}$ = 5.12 pW, we observed a highly linear response in phase $\phi_{S_{21}}$ for $P_{opt}$ = 3.5 - 4.9 pW. We also provide noise- equivalent power (NEP) measurements of the detector which demonstrate that the noise performance remains comparable to nominal TKID values when they are biased at low probe powers. Our NEP measurements do not reach the phonon noise floor, so we cannot yet rule out whether high probe power operation introduces additional noise at the 15 aW/rtHz level. In this work, we operated only a single detector in the negative electrothermal feedback regime. As the TKID is intended to be a multiplexable detector, it remains to be seen what the practical implication of high probe power operation is on multiplexing. We anticipate an increase in the dynamic range requirement of the readout due to the decrease in responsivity relative to the probe power. Additionally, moving resonators with probe power can impact resonator collisions. We see hints of the internal thermal structure to the detector in our NEP measurements, manifesting as a characteristic rise at high frequency. We intend to measure the incident power to $S_{21}$ transfer function in the frequency domain to clarify the internal thermal structure of the TKID. The results presented here indicate that operating the detector with high electrothermal feedback does not degrade the noise in single devices; we leave further noise performance tests using common-mode noise removal to future work. The increase in speed due to negative electrothermal feedback could allow TKIDs to be practical in low incident power applications such as in narrow bandwidth line intensity mapping spectrometers, where low thermal conductance would lead to the TKID being otherwise too slow. The increase in speed could also be useful in calorimeters, where energy resolution is inversely proportional to the square root of the loop gain Irwin and Hilton (2005). ###### Acknowledgements. Our work was carried out at the Jet Propulsion Laboratory, Caltech, under contract from the National Aeronautics and Space Administration. We thank Mark Lindeman and Jonas Zmuidzinas for insightful discussion. Shubh Agrawal’s work was supported by the Dr. Gary Stupian SURF Fellowship. ## Data Availability The data that support the findings of this study are available from the corresponding author upon reasonable request. ## References * Ulbricht _et al._ (2015) G. Ulbricht, B. A. Mazin, P. Szypryt, A. B. Walter, C. Bockstiegel, and B. Bumble, Applied Physics Letters 106, 251103 (2015), publisher: American Institute of Physics. * Quaranta _et al._ (2013) O. Quaranta, T. Cecil, L. Gades, B. Mazin, and A. Miceli, Superconductor Science and Technology 26, 105021 (2013), arXiv: 1304.3387. * Arndt _et al._ (2017) M. Arndt, S. Wuensch, C. Groetsch, M. Merker, G. Zieger, K. Peiselt, S. Anders, H.-G. Meyer, and M. Siegel, IEEE Transactions on Applied Superconductivity 27, 1 (2017). * Timofeev _et al._ (2014) A. V. Timofeev, V. Vesterinen, P. Helistö, L. Grönberg, J. Hassel, and A. Luukanen, Superconductor Science Technology 27, 025002 (2014). * Dabironezare _et al._ (2018) S. O. Dabironezare, J. Hassel, E. Gandini, L. Grönberg, H. Sipola, V. I. Vesterinen, and N. Llombart, IEEE Transactions on Terahertz Science and Technology 8 (2018), 10.1109/TTHZ.2018.2873973. * Wernis (2013) R. A. Wernis, _Characterizing a Resonator Bolometer Array_ , Senior Thesis (Major), California Institute of Technology (2013). * Irwin (1995) K. D. Irwin, Applied Physics Letters 66, 1998 (1995). * Mather (1982) J. C. Mather, Applied Optics 21, 1125 (1982), publisher: Optical Society of America. * Irwin and Hilton (2005) K. D. Irwin and G. C. Hilton, Cryogenic Particle Detection 99, 63 (2005), iSBN: 9783540201137. * Anderson _et al._ (2020) A. J. Anderson, P. A. R. Ade, Z. Ahmed, J. S. Avva, P. S. Barry, R. B. Thakur, A. N. Bender, B. A. Benson, L. Bryant, K. Byrum, J. E. Carlstrom, F. W. Carter, T. W. Cecil, C. L. Chang, H.-M. Cho, J. F. Cliche, A. Cukierman, T. de Haan, E. V. Denison, J. Ding, M. A. Dobbs, D. Dutcher, W. Everett, K. R. Ferguson, A. Foster, J. Fu, J. Gallicchio, A. E. Gambrel, R. W. Gardner, A. Gilbert, J. C. Groh, S. T. Guns, R. Guyser, N. W. Halverson, A. H. Harke-Hosemann, N. L. Harrington, J. W. Henning, G. C. Hilton, W. L. Holzapfel, D. Howe, N. Huang, K. D. Irwin, O. B. Jeong, M. Jonas, A. Jones, T. S. Khaire, A. M. Kofman, M. Korman, D. L. Kubik, S. Kuhlmann, C.-L. Kuo, A. T. Lee, E. M. Leitch, A. E. Lowitz, S. S. Meyer, D. Michalik, J. Montgomery, A. Nadolski, T. Natoli, H. Nguyen, G. I. Noble, V. Novosad, S. Padin, Z. Pan, P. Paschos, J. Pearson, C. M. Posada, W. Quan, A. Rahlin, D. Riebel, J. E. Ruhl, J. T. Sayre, E. Shirokoff, G. Smecher, J. A. Sobrin, A. A. Stark, J. Stephen, K. T. Story, A. Suzuki, K. L. Thompson, C. Tucker, L. R. Vale, K. Vanderlinde, J. D. Vieira, G. Wang, N. Whitehorn, V. Yefremenko, K. W. Yoon, and M. R. Young, Journal of Low Temperature Physics 199, 320 (2020). * Zhang _et al._ (2020) C. Zhang, P. a. R. Ade, Z. Ahmed, M. Amiri, D. Barkats, R. B. Thakur, C. A. Bischoff, J. J. Bock, H. Boenish, E. Bullock, V. Buza, J. Cheshire, J. Connors, J. Cornelison, M. Crumrine, A. Cukierman, M. Dierickx, L. Duband, S. Fatigoni, J. P. Filippini, G. Hall, M. Halpern, S. Harrison, S. Henderson, S. R. Hildebrandt, G. C. Hilton, H. Hui, K. D. Irwin, J. Kang, K. S. Karkare, E. Karpel, S. Kefeli, J. M. Kovac, C. L. Kuo, K. Lau, K. G. Megerian, L. Moncelsi, T. Namikawa, H. T. Nguyen, R. O’Brient, S. Palladino, N. Precup, T. Prouvé, C. Pryke, B. Racine, C. D. Reintsema, S. Richter, A. Schillaci, B. Schmitt, R. Schwarz, C. D. Sheehy, A. Soliman, T. S. Germaine, B. Steinbach, R. V. Sudiwala, K. L. Thompson, C. Tucker, A. D. Turner, C. Umiltà, A. G. Vieregg, A. Wandui, A. C. Weber, D. V. Wiebe, J. Willmert, W. L. K. Wu, E. Yang, K. W. Yoon, E. Young, and C. Yu, Journal of Low Temperature Physics 199, 968 (2020). * Koopman _et al._ (2018) B. J. Koopman, N. F. Cothard, S. K. Choi, K. T. Crowley, S. M. Duff, S. W. Henderson, S. P. Ho, J. Hubmayr, P. A. Gallardo, F. Nati, M. D. Niemack, S. M. Simon, S. T. Staggs, J. R. Stevens, E. M. Vavagiakis, and E. J. Wollack, Journal of Low Temperature Physics 193, 1103 (2018). * Szypryt _et al._ (2019) P. Szypryt, G. C. O’Neil, E. Takacs, J. N. Tan, S. W. Buechele, A. S. Naing, D. A. Bennett, W. B. Doriese, M. Durkin, J. W. Fowler, J. D. Gard, G. C. Hilton, K. M. Morgan, C. D. Reintsema, D. R. Schmidt, D. S. Swetz, J. N. Ullom, and Y. Ralchenko, Review of Scientific Instruments 90, 123107 (2019), publisher: American Institute of Physics. * Lindeman (2014) M. A. Lindeman, Journal of Applied Physics 116, 024506 (2014). * Wandui _et al._ (2020) A. Wandui, J. Bock, C. Frez, M. Hollister, L. Minutolo, H. Nguyen, B. Steinbach, A. Turner, J. Zmuidzinas, and R. O’Brient, Journal of Applied Physics 128, 044508 (2020), arXiv: 2001.08887. * Swenson _et al._ (2013) L. J. Swenson, P. K. Day, B. H. Eom, H. G. Leduc, N. Llombart, C. M. McKenney, O. Noroozian, and J. Zmuidzinas, Journal of Applied Physics 113, 104501 (2013). * Khalil _et al._ (2012) M. S. Khalil, M. J. A. Stoutimore, F. C. Wellstood, and K. D. Osborn, Journal of Applied Physics 111, 054510 (2012). * Zmuidzinas (2012) J. Zmuidzinas, Annual Review of Condensed Matter Physics 3, 169 (2012). * Thomas, Withington, and Goldie (2015) C. N. Thomas, S. Withington, and D. J. Goldie, Superconductor Science and Technology 28, 045012 (2015), publisher: IOP Publishing. * Guruswamy _et al._ (2017) T. Guruswamy, C. N. Thomas, S. Withington, and D. J. Goldie, Superconductor Science and Technology 30, 064006 (2017), publisher: IOP Publishing. * Lee _et al._ (1998) S.-F. Lee, J. M. Gildemeister, W. Holmes, A. T. Lee, and P. L. Richards, Applied Optics 37, 3391 (1998), publisher: Optical Society of America. * Kernasovskiy (2020) S. Kernasovskiy, _Measuring the polarization of the cosmic microwave background with the Keck Array and BICEP2_ , Ph.D. thesis, Stanford University (2020). * Minutolo _et al._ (2019) L. Minutolo, B. Steinbach, A. Wandui, and R. O’Brient, IEEE Transactions on Applied Superconductivity 29, 1 (2019).
arxiv-papers
2021-07-26T21:50:49
2024-09-04T03:07:20.120535
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Shubh Agrawal, Bryan Steinbach, James J. Bock, Clifford Frez, Lorenzo\n Minutolo, Hien Nguyen, Roger O'Brient, Anthony Turner, Albert Wandui", "submitter": "Shubh Agrawal", "url": "https://arxiv.org/abs/2107.12493" }
2107.12499
# CalCROP21: A Georeferenced multi-spectral dataset of Satellite Imagery and Crop Labels Rahul Ghosh [email protected] University of MinnesotaMinneapolisMNUSA , Praveen Ravirathinam [email protected] University of MinnesotaMinneapolisMNUSA , Xiaowei Jia [email protected] University of PittsburghPittsburghPAUSA , Ankush Khandelwal [email protected] University of MinnesotaMinneapolisMNUSA , David Mulla [email protected] University of MinnesotaSt. PaulMNUSA and Vipin Kumar [email protected] University of MinnesotaMinneapolisMNUSA (2021) ###### Abstract. Mapping and monitoring crops is a key step towards sustainable intensification of agriculture and addressing global food security. A dataset like ImageNet that revolutionized computer vision applications can accelerate development of novel crop mapping techniques. Currently, the United States Department of Agriculture (USDA) annually releases the Cropland Data Layer (CDL) which contains crop labels at 30m resolution for the entire United States of America. While CDL is state of the art and is widely used for a number of agricultural applications, it has a number of limitations (e.g., pixelated errors, labels carried over from previous errors and absence of input imagery along with class labels). In this work, we create a new semantic segmentation benchmark dataset, which we call CalCROP21, for the diverse crops in the Central Valley region of California at 10m spatial resolution using a Google Earth Engine based robust image processing pipeline and a novel attention based spatio-temporal semantic segmentation algorithm STATT. STATT uses re- sampled (interpolated) CDL labels for training, but is able to generate a better prediction than CDL by leveraging spatial and temporal patterns in Sentinel2 multi-spectral image series to effectively capture phenologic differences amongst crops and uses attention to reduce the impact of clouds and other atmospheric disturbances. We also present a comprehensive evaluation to show that STATT has significantly better results when compared to the resampled CDL labels. We have released the dataset and the processing pipeline code for generating the benchmark dataset. ††copyright: acmcopyright††journalyear: 2021††doi: 10.1145/1122445.1122456 ## 1\. Introduction With the rise in world’s population, food supplies must scale up to keep pace with the growing demand. Hence it is critical to ensure that farm lands are being used efficiently from an environmental perspective. In particular, mapping and monitoring crops is a key step towards forecasting yield, guiding sustainable management practices, measuring the loss of productive cropland due to urbanization and evaluating progress in conservation efforts. In the United States, the Department of Agriculture’s (USDA) Cropland Data Layer (CDL) provides a publicly available land-cover classification map annually at 30m resolution which includes major crop commodities for the conterminous United States (CONUS) (Boryan et al., 2011). CDL product has driven the advancement of research in areas ranging from agricultural sustainability studies (Hartz et al., 2011; Fitzgerald and Zimmerman, 2013), to environmental issues (Belden et al., 2012; Cibin et al., 2012), land conversion assessments (Wright and Wimberly, 2013; Rashford et al., 2013), crop rotations (Plourde et al., 2013; Boryan et al., 2012), farmer surveys (Painter et al., 2013) and many more (CDL, 2021). While CDL is the state-of- the-art spatially explicit identification product for crops, it has a number of limitations (Reitsma et al., 2015; Pritsolas and Pearson, [n.d.]). First, the CDL is created using a pixel based classification algorithm and hence contains pixelated errors in crop labels. Second, each pixel is not updated every year and labels for some pixels are borrowed from previous years which sometimes leads to incorrect labels. Third, CDL is known to have low accuracy in classifying many minor crops such as alfalfa, hay, tree crops, and many vegetable crops (Lark et al., 2021). Finally, CDL labels are created using Landsat images, which are at 30m resolution, leading to mixed pixels errors. The Sentinel constellation provides images at a finer resolution (10m) and more frequent temporal scale (5days vs 15 days) and thus offers the possibility of creating crop labels at 10m resolution. The success of deep learning in solving highly complex tasks in the field of computer vision and natural language processing can be attributed to the availability of large datasets such as ImageNet (Deng et al., 2009) and computational resources. These large datasets are essential for the generalization of such deep learning methods. Indeed advances in Earth observation technologies have led to the collection of vast amount of accurate and reliable remote sensing (RS) data that provide tremendous potential to create similar large scale datasets for mapping crops over large regions. For example, several large-scale remote sensing datasets have been created for similar land cover mapping tasks (Yang and Newsam, 2010; Basu et al., 2015; Penatti et al., 2015; Helber et al., 2017; Sumbul et al., 2019; Maggiori et al., 2017; Demir et al., 2018; Schmitt et al., 2019). However, these datasets cannot be directly used for crop mapping for several reasons. First, existing large-scale RS datasets mostly provide a single view of the earth’s surface in time. As highlighted in previous literature (Ghosh et al., 2021b), the distribution and growth of crops commonly exhibit special spatio-temporal patterns, e.g., the contiguous nature of crop fields and temporal/seasonal patterns due to their unique crop phenology. Hence, these datasets are not designed for effective crop mapping using spatial and temporal data patterns. Moreover, these large scale datasets are either limited (Ghosh et al., 2021a) in the number of categories (i.e limited number of classes that do not cover many important crop types) (Demir et al., 2018) or lack in the spatial resolution (e.g. single label assigned to entire image) (Sumbul et al., 2019). To overcome the limitations of existing RS datasets and to facilitate deep learning research in RS-based crop mapping, this paper presents a new semantic segmentation benchmark dataset for crops, CalCROP21. Specifically, the input images were created using a Google Earth Engine based robust image processing pipeline on the multi-spectral temporal images collected by the Sentinel-2 constellation in the Central Valley of California in 2018. A novel spatio- temporal semantic segmentation (Ghosh et al., 2021b) method was used to generate better quality labels using resampled CDL as initial labels. This efficacy of the methodology relies on several key assumptions. First, the noisy coarse resolution CDL labels are still of good enough quality to be used for training a classifier. Second, a classifier that makes use of space and time is more effective in dealing with the training label noise than one that ignores such information. Third, labels at the geographical farm boundaries can be mixed and their labels at the coarse resolution are not trustworthy, whereas labels at the interior of a region are likely to be more confident. To summarize, our contributions in this paper are as follows: * • This dataset is a first large scale semantic segmentation dataset that includes both input images as well as labels for a diverse array of crops at 10m resolution. Specifically, each pixel in the image is labeled as one of 21 crop or 7 other classes. * • We improve the quality of the resampled CDL labels for these classes using a novel spatio-temporal deep learning method based on the phenotypic differences among crops with Sentinel images at multiple time steps. * • We validate the quality of the labels via a detailed quantitative and qualitative evaluation. * • We provide the processing pipeline code for further use by the community in collecting images and generating results for a different year and using different temporal frequency. * • With some small edits, this pipeline can be used to produce similar results for any other part of the US or the world (assuming some initial labels are available even at a coarse resolution). ## 2\. Related Works Several such benchmark datasets are available for land use and land cover (LULC) mapping. They can be divided into multiple categories based on their downstream tasks, a) object recognition (Xia et al., 2018), b) image classification (Yang and Newsam, 2010; Basu et al., 2015; Penatti et al., 2015; Helber et al., 2017; Sumbul et al., 2019) and c) semantic segmentation (Maggiori et al., 2017; Demir et al., 2018; Schmitt et al., 2019). These datasets do not have sufficient granularity to enable scientific advances in crop mapping using deep learning. First, they provide labels that cover a very small number of categories. Second, due to the use of overhead aerial imagery which only captures limited number of bands as compared to satellites which can capture a vast array of bands and thus help in distinguishing between crops. Unlike image classification task which only provides presence of a crop in an image, image segmentation datasets are more relevant from the domain perspective because knowledge of area under different crops provides insights into food supply. While datasets are available for LULC, to the best of our knowledge, no dataset on crop semantic segmentation that includes minor crops is available. For example, in the context of cropland mapping, BigEarthNet (Sumbul et al., 2019) is the one most relevant dataset which provides 590,326 image patches from 125 Sentinel-2 tiles and associate each image patch with a subset of 43 Corine Land Cover classes over Europe. However, there are several limitations in this dataset which make it less ideal for crop monitoring. First, the topology of the classes included do not distinguish between different crops but rather between broad vegetation types (forest, agriculture, grassland, etc). Second, due to the association of labels to entire image patch it captures the presence and not the area of a certain category of land cover. Finally, a single temporal snapshot for an area does not allow identification of different types of crops (Ghosh et al., 2021b). ## 3\. Data Sources We use freely available multi-spectral satellite images and data products to create our dataset. Specifically, we use Sentinel-2 as the input images and the Cropland Data Layer as initial labels. Here we describe the data sources involved in creating the dataset. ### 3.1. Input Satellite Imagery In our dataset, we use the multi-spectral images captured by the two polar- orbiting satellites as part of the Sentinel-2 mission operated by the European Space Agency (ESA). Due to Its high revisit time of 5 days, phenological characteristics of different crops can be observed compared to using single snapshot (or few snapshots) for the whole season. The multi-spectral images has 13 bands in the visible, near infrared, and short wave infrared part of the spectrum, each having a spatial resolution of 10, 20 or 60m. The captured images are available in the form of tiles, each of which have a unique ID and covers an area of 10,000 sq km. ### 3.2. Crop Labels The Cropland Data Layer (CDL) is an annual publicly available land cover classification map for the entire US. CDL is generated by a Decision tree based approach using moderate resolution satellite imagery and extensive agricultural ground truth. With over 200 classes, CDL provides land cover maps covering the entire conterminous United States (CONUS) at 30-meter spatial resolution with a high accuracy up to 95% for classifying major crop types (i.e., Corn, Soybean, and Wheat). The CDL data products are free to download from Google Earth Engine (cdl, 2021). Although CDL is a very useful product that has led to the development of many downstream applications, the product is plagued with noise that arise due to the reasons discussed in Section 1. In particular, it has high accuracy (up to 95%) for classifying major crops(e.g., Corn, Soybean, Wheat), but it is known to have poor accuracy for minor crops (e.g., Alfalfa, Hay and Tree crops) (Lark et al., 2021). Figure 1. Overlay of 11 tiles in Central Valley of California region we used in our study. The colors represent different crops and the mapping (refer to Figure 4) is kept consistent throughout this paper. ## 4\. Processing Pipeline We use Google Earth Engine to build a robust image processing pipeline to create biweekly Sentinel image composites. Using the obtained biweekly composites and CDL labels, we develop a novel spatio-temporal deep learning method to improve upon the original CDL labels. In the following, we describe these steps in details. ### 4.1. Generation of bi-weekly Sentinel-2 multispectral composites Many land covers, e.g., different types of crops, are indistinguishable at a single time step. In particular, different crops have different seeding time and harvesting time, which is also affected by weather conditions. Hence, different crops show discriminative signatures at different points of time (Ghosh et al., 2021b). Correctly identifying crops will require modelling its entire agricultural cycle from sowing to harvesting. Hence, we consider all the images available in a year for this dataset. However, these images often have clouds and other atmospheric disturbances. Here, we generate bi-weekly image composites using a robust Google Earth Engine based pipeline to reduce the impact of these atmospheric disturbances. Specifically, we collect all available images within a 2-week period and score every pixel of each tile using a the quality band (QA60), which presents information as to whether a pixel is cloud-free, dense cloud or cirrus cloud. The quality scores are then thresholded to create cloud masks for each image. Based on the amount of cloud-free pixels the collection of images are sorted and finally the best images merged to create a cloud-free mosaic. Thus we obtain 24 mosaics in a year per tile, each in the projection of the zone (for California crop belt, 8 tiles are in EPSG:32610 - WGS 84 / UTM zone 10N and 3 are in EPSG:32611 - WGS 84 / UTM zone 11N). All the bands are resampled to 10m spatial resolution and then exported from Google Earth Engine. Since some Sentinel tile images may be slightly larger than the area they are supposed to cover, we use GDAL to clip the images and reproject them so that every pixel is of 10m$\times$10m resolution. This finally produces 24 georeferenced files each of which has a shape of (10980,10980,10) for a tile, with 10 signifying the number of bands (10m and 20m) used. Since our objective is to map the entire crop belt in the Central Valley of California, we found that 11 Sentinel-2 tiles covers this crop belt, namely T10SEH, T10SEJ, T10SFG, T10SFH, T10SFJ, T10SGF, T10SGG, T10TEK, T11SKA, T11SKV, and T11SLV, giving a total of 264 tif files. As a preprocessing step we first clip the bottom and top 2%ile of each channel of the satellite images and then apply max-min normalization. Following the preprocessing of the images, we split each tile into 100 grids each of size 10km$\times$10km (1098$\times$1098 pixels). We combine all the 24 composite images corresponding to same grid together to form an array of shape (24,1098,1098,10): 24 timestamps, (1098,1098) pixels and 10 channels. We have 1,100 grid arrays in total, each of which is named as “TILEID_YEAR_ROW_COL_IMAGE.npy”, e.g., “T11SKA_2018_5_6_IMAGE.npy” corresponds to the 5th row and 6th column (indexed from 0) of the tile T11SKA in 2018. Figure 2. Evolution of labels through each preprocessing step are shown for two randomly chosen regions (rows). The first columns shows the raw CDL labels resampled at 10m resolution. The second columns shows a revised set of labels, where similar classes have been combined and untrustworthy classes have been grouped as unknown class (in light purple). The third column shows one level of erosion done classwise at boundaries and also removal of connected components of size less than 4 pixels. We refer to these labels as CDL- combined-eroded, and use these for training our deep learning model. ### 4.2. Pre-processing of CDL We use Google Earth Engine to fetch the labels and crop them using each georeferenced Sentinel-2 tile, which produces a label image at 30m resolution for each tile. We then resample the labels to 10m resolution to create 11 label tiles of shape (10980,10980). The overlay of the 11 labels tiles on the California Central Valley crop belt is shown in Fig. 1. CDL provides labels for more than 200 crop classes, many of which are completely absent or rarely present in the California Central Valley region. In our dataset we exclude these absent classes in the California Central Valley region. In addition, CDL provides state-wise validation metrics for their labels using ground-truth labels. We also exclude those classes for which the number of pixels used for CDL validation is too few as their labels cannot be trusted. Specifically, we include a crop class in our dataset if it fulfils the following conditions: * • The crop class has at least 1 million pixels in the study region (in this case the 11 tiles). * • The crop class has at least 100 validation pixels used by CDL. For non-crop classes we only apply the first condition (e.g., wetlands, grass, forests, hay, urban etc.) as their validation metrics are not provided by CDL.Following these steps we are left with 34 classes: {Corn, Cotton, Rice, Sunflower, Barley, Winter Wheat, Safflower, Dry Beans, Onions, Tomatoes, Cherries, Grapes, Citrus, Almonds, Walnut, Pistachio, Garlic, Olives, Pomegranates, Alfalfa, Hay, Barren, Fallow and Idle, Deciduous Forests, Evergreen forest, Mixed Forests, Clover and wildflower, Shrubland, Grass, Woody wetlands, Herbaceous Wetlands, Water, Urban, Double Crops}. For training and evaluation purposes we combine the different forest classes to a super class “Forest Combined”, wetland classes to “Wetlands Combined”, and combine {Grass, Shrubland, Clover, Wildflower} to “Grass combined”. We also do not use Double Crops in our study and label all those pixels as unknown class. Following the preprocessing of the labels we are left with 21 crop classes and 7 other classes and we refer to this label set as CDL-combined. Since the CDL is originally at 30m resolution, which we resample to 10m (to match with the resolution of input images), the boundary pixels are mixed and thus they could contain regions of multiple classes. Given the uncertainty of labels at spatial boundaries between any two classes, we perform 1 pixel erosion for each class and replace these eroded pixels with unknown class and remove connected components of a class that are less than or equal to size 4. These labels are called CDL-combined-eroded. Fig 2 shows the progression of the labels through these preprocessing steps. Similar to the image data, post erosion we segment and store the label in arrays of shape (1098,1098) and have the naming convention as TILEID_YEAR_ROW_COL_PREPROCESSED_CDL_LABEL.npy. ### 4.3. Grid curation Figure 3. Distribution of Train/Val/Test grids. Green, light blue, and red represent the regions used for training, validation and testing, respectively. The purple regions denote the non-agricultural land and are not used in our experiments. As described earlier, in our dataset we have 1,100 grids of 1098$\times$1098 pixels in size covering the entire crop belt in California’s Central Valley. Many of these grids are predominantly covered by non-crop classes, and hence are removed from the dataset resulting in 367 acceptable grids. Specifically, a grid is included if it follows both of the following conditions: * • Grid has at least 50% pixels that are not unknown * • Out of the valid pixels, Grid G has at least 50% pixels that belong to crop classes ### 4.4. Label Improvement using STATT As described earlier, CDL based labels cannot be used directly as reference labels. To improve the quality of CDL labels, we used the STATT model proposed by the authors in (Ghosh et al., 2021b) which uses spatial as well as temporal information to effectively model the phenology of crops and reduce the effects of clouds and other atmospheric disturbances. Specifically STATT uses a UNET style architecture to extract spatial features and a bidirectional Long-Short Term Memory (biLSTM) to model temporal progression of the crop specific growing and harvesting patterns. Further it uses attention networks to aggregate the hidden representations for each time-step based on their contribution to the classification performance. Finally, using these attention scores, the spatial features by the convolutional encoders at multiple resolutions are aggregated and passed using skip connections to the convolutional decoder to generate segmentation maps. A comparison of STATT with alternative approaches that model either the spatial or temporal information, or both (but not as effectively as STATT) is available in (Ghosh et al., 2021b). To demonstrate the efficacy of this method in improving the quality of CDL labels, we divided the grids into train, validation and test set. The crop distribution is not similar throughout the California Central Valley crop belt. For example, Rice is grown mainly in the northern part of the California Central Valley crop belt and is rarely found in the southern parts. To make sure we create a training set that is balanced amongst classes and is also spread uniformly across space, we adopt a gridwise count based data splitting strategy. For each class, we sort the grids based on the number of pixels present of that particular class in the grid. We take intersection of the common grids amongst all classes such that the total number of grids comes out to around 60% of the total girds we have. Following this first step we were able to filter 210 grids for training (approximately 57%). Now after removing these training girds we again sort grid intersections classwise to create validation set such that around 20% more is used, then the remaining are used for testing. With this approach we created a training set of 210 grids, validation set of 84 grids and test set of 73 grids. The color coded final distribution of the sets can be seen in the Fig. 3. Figure 4. Argmax predictions vs Region Growing predictions on certain patches in test area which demonstrate the advantage of Region Growing over Argmax. For example in the first row, the region growing strategy has removed many speckles of winter wheat (brown) misclassified by CDL. Moreover, majority of the pixels converted to “unknown” by region growing lie in the boundary where the pixels due to being mixed, are more likely to be misclassified. (Arrows represent places of improvement by Region growing over Argmax) Following the approach as outlined in (Ghosh et al., 2021b), STATT extracts patches of size 32$\times$32 pixels from the training grids. Using this input patch of size 32$\times$32, we output labels for a patch of size 16$\times$16\. For this task, we use three convolutional blocks in our encoder each having two convolutional layers. Thus there are six convolutional layers having 64,64,128,128,256,256 channels and filters of size 3$\times$3\. To downsample the output of the convolutional blocks STATT uses max-pooling of size 2$\times$2 after the first and second convolutional blocks. In the decoder, STATT has two convolutional blocks each of which consistsof two convolutional layers. The four convolutional layers of the decoder have 128,128,64,64 channels respectively. To upsample the output we add transposed- convolutional layers before the first and second convolutional block of the decoder having 128,64 channels respectively and kernel size of 2$\times$2\. Finally, STATT has a fully-connected layer with input dimension of 64 and output dimension equal to the number of classes i.e. 28. The model was trained using the training dataset for 50 epochs and the validation performance was used as the model selection criteria. Figure 5. Flowchart of the entire pipeline used in our study. The output of the model are softmax probabilities over the classes for each pixel thus having shape of (16,16,34). By combining all the patches within a grid, we create probability grids of shape (16,16,34). Usually for multi-class classification the decision is made by predicting the class for which the model gives the highest probability. We refer to it as the $argmax$ prediction. In a multi-class classification setting, confusion between classes can easily occur when dealing with a large number of classes. Furthermore, class confusion also happens at the geographical boundary of different classes (e.g. fields with different crops or roads around field). We use a region growing strategy to post-process the pixel-wise probability outputs instead of directly taking $argmax$ outputs. Specifically, for each class, the pixels that have highest probability value greater than 0.9 are considered as confident anchor pixels. Starting from these anchor pixels, we include all the pixels in their neighborhood which have at least 0.3 probability of belonging to the same class as the anchor pixels. Since the region growing strategy produces class-wise prediction maps, clashes between two or more class at certain pixels are bound to happen, in which case we assign unknown values to those pixels. We observe that majority of such clashes occur near the boundaries which is expected due to the reasons that were described above. As illustrated in Fig 4, this method is very effective in removing noise within fields and also removing confusion at boundaries by replacing them with ”unknown”. We store the STATT labels in arrays of shape (1098,1098) and have the naming convention as TILEID_YEAR_ROW_COL_PREPROCESSED_STATT_LABEL.npy. Figure 6. The classwise count of labels produced by STATT across all the acceptable grids in the form of a bar chart. The red bar represents the overall count of that class across the entire acceptable set, the green bar represents the count in the northern region and the blue bar represents the count in the southern region. The northern region is given by the tiles T10SEH, T10SEJ, T10SFG, T10SFH, T10SFJ, T10SGG and T10TEK whereas the southern region is given by the tiles T10SGF, T11SKA, T11SKV, and T11SLV. through this bar chart one can observe that there is rich crop variety in our dataset. One can also observe that some classes lie predominately in the north, such as Rice, some lie predominately in the south, such as Pistachio, and some have a good mix in both regions, such as Almonds ### 4.5. Final Dataset In summary, our dataset covers the entire California Central Valley Crop Belt using the 367 grids of cloud filtered multi-spectral images (each in (1098,1098,10)), and we call these image grids. For each image grid, we also provide both the raw and preprocessed CDL grid as well as STATT grid of size (1098,1098). The diagrammatic flowchart of the entire pipeline can be found in Figure 5. STATT labels are provided for a total of 442,456,668 pixels (4̃4,000 sq. km) covering 29 classes, of which 249,946,750 pixels (2̃5,000 sq. km) belong to one of the 21 crop classes and the remaining 192,509,918 pixels (1̃9,000 sq. km) belong to other 8 classes including unknown. The distribution of the 29 classes in the form of a bar chart is given in Figure 6. Figure 6 also shows the distributions class wise in the north vs south of the region, with The northern region given by the tiles T10SEH, T10SEJ, T10SFG, T10SFH, T10SFJ, T10SGG and T10TEK and the southern region given by the tiles T10SGF, T11SKA, T11SKV, and T11SLV. The entire dataset including Image Grids, CDL grids, preprocessed CDL grids and STATT grids for the acceptable grids as well as the Image grids and CDL grids for the rest of the entire region can be found in the link given below111https://drive.google.com/drive/folders/1EnXXRHNoTyIbM-_5p-P9pH4zH3xyTqBp?usp=sharing. Table 1. Confusion matrix between STATT labels and CDL labels on test grids. X axis (column data) represents the STATT predictions and Y axis (row data) represents CDL predictions. | | STATT ---|---|--- | Class | Corn | Cotton | Rice | Sunflower | Barley | Winter Wheat | Safflower | Dry Beans | Onions | Tomatoes | Cherries | Grapes | Citrus | Almonds | Walnut | Pistachio | Garlic | Olives | Pomegranates | Alfalfa | Hay | Barren | FallowIdle | ForestsCb | GrassCb | WetlandsCb | Water | Urban Crop Data Layer | Corn | 607390 | 3178 | 4282 | 164 | 17 | 3285 | 73 | 413 | 326 | 10341 | 338 | 12767 | 3 | 8373 | 726 | 85 | 0 | 26 | 2 | 13656 | 19615 | 0 | 16406 | 0 | 2938 | 773 | 946 | 10778 Cotton | 5629 | 3277971 | 272 | 0 | 0 | 112 | 28 | 1824 | 22 | 59832 | 9 | 10382 | 0 | 9657 | 1157 | 283 | 28 | 0 | 1 | 1777 | 92 | 1 | 6252 | 0 | 357 | 250 | 14 | 6490 Rice | 5416 | 0 | 6879520 | 269 | 0 | 0 | 62 | 5 | 0 | 5946 | 25 | 6351 | 0 | 395 | 637 | 9 | 0 | 33 | 0 | 1126 | 891 | 0 | 13152 | 0 | 22 | 53 | 1281 | 4948 Sunflower | 7841 | 1 | 1466 | 221533 | 0 | 36 | 2413 | 35 | 0 | 7755 | 0 | 2321 | 0 | 1813 | 4063 | 17 | 0 | 6 | 0 | 192 | 66 | 0 | 9210 | 0 | 65 | 189 | 218 | 2023 Barley | 286 | 213 | 0 | 0 | 15238 | 31066 | 222 | 0 | 6 | 13 | 0 | 59 | 0 | 8821 | 0 | 525 | 0 | 3 | 0 | 49 | 8979 | 8 | 96979 | 0 | 8498 | 0 | 0 | 1063 Winter Wheat | 35205 | 356 | 9 | 0 | 15 | 1145627 | 6270 | 4886 | 23840 | 3049 | 1051 | 3189 | 0 | 4996 | 313 | 267 | 2472 | 20 | 143 | 7324 | 28273 | 0 | 569444 | 0 | 85098 | 50 | 204 | 5277 Safflower | 40897 | 21 | 351 | 2139 | 0 | 617 | 383917 | 15 | 87569 | 48333 | 6 | 5438 | 0 | 596 | 616 | 56 | 12049 | 4 | 0 | 16077 | 525 | 0 | 64979 | 0 | 16257 | 13 | 23 | 2227 Dry Beans | 1529 | 2009 | 38 | 7 | 0 | 13148 | 2 | 94384 | 90 | 572 | 71 | 1350 | 0 | 400 | 33 | 1 | 888 | 0 | 0 | 2744 | 3380 | 0 | 4315 | 0 | 55 | 81 | 1 | 972 Onions | 9514 | 50 | 0 | 0 | 2 | 1001 | 8001 | 0 | 201520 | 16235 | 0 | 305 | 0 | 15 | 0 | 1 | 3979 | 0 | 0 | 555 | 16 | 0 | 18561 | 0 | 24 | 0 | 0 | 945 Tomatoes | 36578 | 30306 | 446 | 639 | 0 | 655 | 1598 | 345 | 19816 | 2421624 | 76 | 5568 | 0 | 8861 | 172 | 166 | 323 | 0 | 2 | 4824 | 384 | 0 | 42105 | 0 | 600 | 60 | 8 | 5831 Cherries | 12 | 155 | 0 | 0 | 0 | 6 | 0 | 0 | 0 | 0 | 45327 | 22724 | 26 | 5012 | 4857 | 2124 | 0 | 0 | 324 | 60 | 0 | 0 | 15426 | 0 | 5259 | 0 | 0 | 769 Grapes | 14290 | 12029 | 0 | 0 | 0 | 1184 | 31 | 23 | 1956 | 18507 | 1977 | 2555800 | 14 | 126264 | 4362 | 14492 | 0 | 2255 | 6647 | 8998 | 851 | 0 | 64457 | 0 | 11970 | 1 | 11 | 8969 Citrus | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1967 | 0 | 739 | 145307 | 620 | 434 | 9 | 3 | 4063 | 9 | 371 | 0 | 0 | 17482 | 0 | 931 | 0 | 0 | 1426 Almonds | 9401 | 5609 | 25 | 231 | 0 | 16234 | 1287 | 3807 | 14 | 2206 | 3129 | 113893 | 1560 | 7592014 | 85562 | 29228 | 2715 | 6785 | 3114 | 34172 | 427 | 3 | 285501 | 0 | 99096 | 138 | 31 | 40524 Walnut | 6270 | 2281 | 2811 | 3124 | 0 | 508 | 4707 | 110 | 0 | 72 | 3787 | 269005 | 0 | 91716 | 2792583 | 43332 | 0 | 399 | 694 | 44839 | 1568 | 4 | 141135 | 0 | 13121 | 5735 | 686 | 40591 Pistachio | 332 | 290 | 0 | 0 | 0 | 73 | 1 | 17 | 8 | 7 | 2365 | 14843 | 14 | 48152 | 4853 | 2273489 | 1 | 210 | 8372 | 2236 | 0 | 0 | 235936 | 0 | 63432 | 0 | 11 | 11139 Garlic | 1063 | 23 | 0 | 0 | 0 | 8566 | 91 | 464 | 6964 | 604 | 11 | 65 | 6 | 48 | 0 | 8 | 302008 | 0 | 0 | 131 | 0 | 0 | 11529 | 0 | 102 | 43 | 0 | 913 Olives | 429 | 0 | 3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 7524 | 10259 | 11251 | 1201 | 923 | 0 | 149718 | 0 | 516 | 12 | 6 | 24853 | 0 | 3977 | 0 | 0 | 4003 Pomegranates | 2 | 4611 | 0 | 0 | 0 | 0 | 0 | 2 | 1 | 2130 | 3140 | 12175 | 7 | 30375 | 56 | 17403 | 5 | 123 | 94072 | 361 | 0 | 0 | 50850 | 0 | 705 | 87 | 54 | 2882 Alfalfa | 31847 | 1599 | 322 | 23 | 0 | 11704 | 4852 | 7 | 6590 | 6543 | 860 | 27857 | 191 | 31837 | 5306 | 1852 | 1237 | 1087 | 130 | 1372785 | 14676 | 0 | 31217 | 0 | 8036 | 2733 | 271 | 12958 Hay | 13640 | 158 | 417 | 1407 | 0 | 26405 | 217 | 404 | 92 | 501 | 641 | 39422 | 624 | 25357 | 6998 | 1070 | 0 | 4805 | 6 | 144939 | 152060 | 1 | 96765 | 0 | 107317 | 171 | 120 | 20725 Barren | 0 | 150 | 51 | 0 | 12 | 0 | 0 | 0 | 0 | 14 | 1 | 278 | 0 | 359 | 144 | 75 | 0 | 40 | 1 | 42 | 4 | 20040 | 97624 | 0 | 106082 | 633 | 8816 | 38194 FallowIdle | 11712 | 17863 | 164556 | 986 | 44 | 34016 | 13008 | 7834 | 2990 | 71154 | 805 | 81176 | 76 | 125921 | 84253 | 89519 | 1102 | 7941 | 1363 | 32032 | 17392 | 1351 | 6817036 | 0 | 573836 | 7230 | 21056 | 262682 ForestsCb | 6761 | 0 | 4135 | 0 | 0 | 3 | 153 | 0 | 0 | 0 | 1721 | 7832 | 10142 | 2422 | 451 | 0 | 0 | 115216 | 0 | 39529 | 15 | 2 | 20653 | 0 | 257 | 731 | 48 | 1281 GrassCb | 12258 | 348 | 1042 | 0 | 823 | 11029 | 620 | 6 | 0 | 113 | 3004 | 81509 | 640 | 92248 | 17723 | 19635 | 0 | 26063 | 179 | 92681 | 141563 | 409 | 1307273 | 0 | 4677219 | 11878 | 2201 | 79275 WetlandsCb | 29639 | 614 | 32684 | 0 | 0 | 21 | 3 | 0 | 0 | 48 | 478 | 24263 | 0 | 811 | 7426 | 1226 | 0 | 31 | 2 | 8927 | 187 | 44 | 83276 | 0 | 76186 | 103289 | 19880 | 7644 Water | 271 | 0 | 1658 | 0 | 0 | 8 | 0 | 0 | 0 | 0 | 0 | 130 | 0 | 9 | 51 | 0 | 0 | 6 | 0 | 215 | 3 | 958 | 4940 | 0 | 2620 | 1748 | 920775 | 2100 Urban | 2469 | 9142 | 21946 | 574 | 0 | 3466 | 675 | 144 | 621 | 7711 | 384 | 28072 | 907 | 48990 | 22374 | 12213 | 971 | 4083 | 172 | 18503 | 2053 | 3045 | 201794 | 0 | 177117 | 2542 | 13400 | 2747186 FallowIdle - Fallow and Idle land; ForestsCb - Forests Combined; GrassCb - Grass Combined; WetlandsCb - Wetlands Combined Table 2. Precision, Recall, and F1-Score of STATT labels in the test region with CDL as groundtruth. We also mention support(in pixels), that is the count classwise of CDL labels used during evaluation (10000 pixels equals 1 sq.km). STATT --- CLASS | Precision | Recall | F1-score | Support | CLASS | Precision | Recall | F1-score | Support Fallow and Idle | 0.6587 | 0.8069 | 0.7253 | 8448934 | Safflower | 0.8965 | 0.5623 | 0.6911 | 682725 Almonds | 0.9172 | 0.9107 | 0.9139 | 8336706 | Hay | 0.3869 | 0.2360 | 0.2932 | 644262 Rice | 0.9668 | 0.9941 | 0.9803 | 6920141 | Wetlands Combined | 0.7462 | 0.2604 | 0.386 | 396679 Grass Combined | 0.7742 | 0.7109 | 0.7412 | 6579739 | Garlic | 0.9214 | 0.9079 | 0.9146 | 332639 Walnut | 0.9167 | 0.8050 | 0.8572 | 3469078 | Barren | 0.7746 | 0.0735 | 0.1343 | 272560 Cotton | 0.9730 | 0.9691 | 0.9710 | 3382440 | Sunflower | 0.9586 | 0.8479 | 0.8999 | 261263 Urban | 0.8265 | 0.8248 | 0.8257 | 3330554 | Onions | 0.5718 | 0.7729 | 0.6573 | 260724 Grapes | 0.7663 | 0.8952 | 0.8258 | 2855088 | Pomegranates | 0.8164 | 0.4295 | 0.5628 | 219041 Pistachio | 0.9065 | 0.8528 | 0.8788 | 2665781 | Olives | 0.4636 | 0.6974 | 0.557 | 214675 Tomatoes | 0.9018 | 0.9383 | 0.9197 | 2580987 | Forests Combined | 0.0000 | 0.0000 | 0.0000 | 211352 Winter Wheat | 0.8753 | 0.5944 | 0.7080 | 1927378 | Citrus | 0.8559 | 0.8382 | 0.8469 | 173361 Alfalfa | 0.7422 | 0.8708 | 0.8013 | 1576520 | Barley | 0.9435 | 0.0886 | 0.162 | 172028 Water | 0.9300 | 0.9843 | 0.9564 | 935492 | Dry Beans | 0.8227 | 0.7487 | 0.7839 | 126070 Corn | 0.6819 | 0.8472 | 0.7557 | 716901 | Cherries | 0.6550 | 0.4440 | 0.5293 | 102081 OVERALL | Precision | Recall | F1-score | Support | CROPS ONLY | Precision | Recall | F1-score | Support MEAN | 0.7732 | 0.6754 | 0.6885 | 57795199 | MEAN: | 0.8067 | 0.7262 | 0.7386 | 37,619,889 Weighted MEAN | 0.834 | 0.8307 | 0.8251 | 57795199 | Weighted MEAN | 0.8882 | 0.8699 | 0.8731 | 37,619,889 ACCURACY: | | | 0.8307 | | ACCURACY | | | 0.9303 | ## 5\. Evaluation In this section we present the quantitative analysis of the results of our approach on the test regions. Using the STATT and CDL labels we get the confusion matrix as shown in Table 1 for the pixels where both STATT and CDL are not unknown. We observe that out of the total 57,795,199 pixels, SAATT and CDL labels differ in 9,785,767 pixels (16.93%). Focusing only on pixels that are labeled as crop, disagreement drops to 6.97%. Table 2 shows precision, recall, and F1-scores for all classes while treating pre-processed CDL labels as ground truth. We notice that F1-score is usually high for classes that have high support (see left half of Table 2) and usually low for classes that have low support (right half of Table 2). As we discuss in the following, STATT labels are generally more accurate than those provided by CDL. Fig. 7 shows a comparison of the segmentation maps of STATT and the corresponding patch from the CDL layer. In all four triplets, We notice that STATT generally performs much better in detecting boundaries and removing noise. In the first triplet of the first column, we can see how a noisy field is replaced with a smooth prediction of fallow land. In the second we can see how a fallow prediction by CDL is replaced with cotton by STATT and it can be verified in the third image of the triplet, an image in July, that the field cannot be fallow as there is a crop present. In the first triplet of the second column, one can observe removal of erroneous cotton speckles present in the CDL map, and in the final triplet we can see smoothing of multiple fields by the STATT map over the region. Further, we analyze the pixels where our map does not match with CDL. We have noticed errors in the CDL layer at numerous locations throughout the crop belt which are mainly of two types: * • incorrect labeling of complete (or large parts of) fields * • spatially discontinuous label prediction (i.e., label of a pixel differs from its surrounding pixels that all belong to a different class) Figure 7. Segmentation map comparisons on some patches from CDL and STATT in the test regions, Each triplet shown depicts a situation where STATT produces better labels. For description on each triplet please refer to Section 5 Figure 8. Visual Analysis of Grid T10SGF_2018_5_4. One can observe from the visual images that many fields in this region are fallow throughout the year but CDL labels them as Winter Wheat (such as the field next to the triangular Cotton (red) field). However STATT does not make these mistakes and correctly labels the region as Fallow land. In the next few paragraphs we systemically discuss and analyze these cases on some of the fields within California Crop belt. First, we visually analyze and show the results of a sample of patches by looking at the satellite images over the entire year. Next, we provide visual analysis of a sample of NDVI time series. We assume that the NDVI time series of pixels where STATT and CDL agree are correct and we show that on pixels where STATT disagrees with CDL, the NDVI time series are similar to those pixels that have the same label as provided by STATT and where STATT and CDL agree. Finally, we provide a comprehensive (qualitative) analysis of all pixels where STATT and CDL disagree by quantifying the number of pixels that have NDVI series closer to the agreement NDVI series for each set of labels. ### 5.1. Visual analysis of a sample of patches The first way to compare our dataset and CDL is to visually inspect images over time, check the growing time, rate of greenness and harvest time to assign a label to the field, and then check whether CDL or STATT is correct. Although this method cannot be scaled to every field due to substantial manual effort and expertise needed regarding crop growing patterns, we can still use this approach to verify disagreement between CDL and STATT where one predicts fallow and idle land and the other predicts a crop. Since no crop is grown year around in a fallow or idle land, it should be easy to verify the correct prediction. We observed numerous cases in the California Central Valley crop belt where CDL predicted a crop and STATT predicted fallow land. On further investigation as to why so much confusion has happened, we observed in the CDL that some classes, such as almonds, grapes, and barley, are just carried over from the year before without new analysis. This is mainly a problem when the farmer decides not to plant a crop in that area that year or a drought occurs in that area that year and so in reality the pixel is fallow land but CDL will label it as a crop. In such cases even though STATT may label the pixel as Fallow land it will be taken as an error with respect to CDL. In particular, 2018 was a dry year for the California Central Valley and many farmers were not able to irrigate fields in 2018 that were wet and productive in 2017. We found this to be the main reason as to why the F1 score for Fallow and Idle land is low in the table in spite of a high count. An example of what was just described can be seen in Fig. 8. In this grid, We can observe numerous fields as fallow throughout the year (such as the one one next to the triangle shaped cotton field) but CDL labels them as crop (the field next to the triangle cotton field is labelled as winter wheat by CDL). Through this first method of visual analysis, we were able to verify many cases of fallow vs crop disagreement, in which the STATT prediction of fallow seems appropriate. Figure 9. Comparison of NDVI for some fields with disagreeemnt between CDL labels and STATT labels. Each triplet denotes a case where the labels produced by STATT are better than CDL, as the series of the field (represented in Green) lies closer to the series of the class denoted by STATT. ### 5.2. Visual analysis of a sample of NDVI time series Here we resolve the disagreement between STATT and CDL labels by analyzing the NDVI time series of the field in question (i.e. a continuous region where STATT and CDL differs. In each disagreement there are two classes in analysis, the CDL prediction class and the STATT prediction class. If the NDVI series of field lies closer to the characteristic NDVI series of the STATT prediction class than the CDL prediction class then we can say that the field is actually the STATT prediction class and vice versa. Now the question arises, how do we obtain this characteristic NDVI series of different classes in our dataset? To get the characteristic NDVI series we take the median (timestamp wise) of the NDVI series for pixels agreeing with the class of interest in the grid where the field of interest is located. What we mean by pixels of agreement are those pixels where CDL and STATT agree, i.e predict the same class at that pixel. we use only agreement pixels within the grid of the field because we found that across grids crops have different NDVI series due to local farmer practices, weather conditions and cloud cover patterns. We also use median to get the characteristic NDVI series due to the fact that it is better at handling outliers when compared to other strategies such as mean or mode. We now plot the characteristic NDVI series for both the CDL prediction class and the STATT prediction class on the same graph. We then plot the median NDVI series timestamp wise of all the pixels in the field of interest on the same graph and check which characteristic NDVI series it lies closer to. If the NDVI series of the field is closer to the characteristic series of the class labeled by STATT compared to the characteristics series of the class labeled by CDL, then we can say that STATT label was correct, and vice versa. We found that in a vast majority of cases, whenever there is a field of disagreement, the NDVI series of the field lies closer to the STATT prediction class signature than the CDL prediction class signature. Fig. 9 shows 8 triplets for some fields where we conducted this method of analysis. The first image in the triplet is the CDL prediction and the second image is the STATT prediction, and in each of these images there is a red boundary denoting the field of interest. One can observe that in all the triplets, the predicted class within the field of interest (i.e the red boundary) differs between the CDL image and the STATT image. The third image is the NDVI plot of the three timeseries described before, i.e the CDL prediction class characteristic NDVI series (denoted by the plot in the color of the CDL prediction class), the STATT prediction class characteristic NDVI series (denoted by the plot in the color of the STATT prediction class) and the NDVI series of the field of interest (denoted by the signature in the green color). To give a better understanding let us look at the top leftmost triplet of Fig. 9 in detail. This triplet shows a field which has been labelled as winter wheat by CDL but as fallow land by STATT. In the third image we can see the NDVI series signature of winter wheat in dark brown and that of fallow land in light brown (note that the colors of the lines are the same colors of the fields in the images). We can also see the green line plot in the image which denotes that of the field’s NDVI series. It can clearly be seen that the green plot lies much closer to the light brown plot (fallow land) and so we can say the STATT prediction of this field as fallow land is correct. Similarly the top rightmost triplet shows a field with pistachio (CDL prediction) vs Almond (STATT predication) and from the plot we can see that the green line lies closer to the greenish blue line (Almond) than when compared to the light blue line (Pistachio) showing that the STATT prediction in this field is correct. All other examples in Figure 9 similarly show that the green line lies closer to the STATT class NDVI line. The top two triplets of the right column show cases where CDL predicts a crop class and STATT predicts fallow land. The bottom next triplet of the right column show cases where CDL predicts fallow land but STATT predicts a non fallow class (Cotton). The last triplet in this column shows winter wheat vs corn. The top two triplets of the left column showcase confusion of almonds and pistachio in both ways between the two tree crops which are of high importance in the California region. The next triplet shows walnut vs alfalfa and the final triplet shows alfalfa vs hay. Figure 10. Class wise Area under the curve plots. The x axis represents the NMSE and the y axis represents the $Score(\cdot)$ value for the corresponding NMSE from x axis. The red and blue curves represent CDL and STATT, respectively. In each plot we also mention the F1-Score of that class as a measure of agreement between CDL and STATT. We can see that in classes with high F1 such as Garlic, where agreement is high, and in those with low F1 such as Olives, where agreement is low, STATT has a better curve than CDL. Table 3. Area under the curves (in Fig. 10) for each class along with number of agreement pixels and F1 score of class with CDL as groundtruth. | AREA UNDER THE CURVE | Count | ---|---|---|--- Class | CDL | STATT | Difference | Agreement | F1-Score Garlic | 0.4899 | 0.7409 | 0.2510 | 173908 | 0.9146 Citrus | 0.5097 | 0.7555 | 0.2458 | 26018 | 0.8469 Dry Beans | 0.4388 | 0.6803 | 0.2415 | 59647 | 0.7839 Tomatoes | 0.4708 | 0.6927 | 0.2218 | 1344877 | 0.9197 Olives | 0.5745 | 0.7741 | 0.1995 | 52639 | 0.5570 Corn | 0.4850 | 0.6177 | 0.1327 | 68350 | 0.7557 Almonds | 0.5959 | 0.7072 | 0.1112 | 2867928 | 0.9139 Alfalfa | 0.6933 | 0.8000 | 0.1067 | 477421 | 0.8013 Pomegranates | 0.7310 | 0.8114 | 0.0804 | 71381 | 0.5628 Onions | 0.7007 | 0.7628 | 0.0621 | 146608 | 0.6573 Grass Combined | 0.8334 | 0.8910 | 0.0576 | 1336303 | 0.7412 Barren | 0.7997 | 0.8550 | 0.0552 | 8902 | 0.1343 Fallow and Idle | 0.8396 | 0.8825 | 0.0429 | 2451705 | 0.7253 Rice | 0.5055 | 0.5481 | 0.0426 | 501687 | 0.9803 Cherries | 0.4864 | 0.5277 | 0.0413 | 28185 | 0.5293 Walnut | 0.8223 | 0.8519 | 0.0296 | 369057 | 0.8572 Grapes | 0.7197 | 0.7465 | 0.0269 | 435258 | 0.8258 Pistachio | 0.7559 | 0.7816 | 0.0257 | 1106181 | 0.8788 Cotton | 0.6727 | 0.6918 | 0.0192 | 2481209 | 0.9710 Winter Wheat | 0.6292 | 0.6403 | 0.0111 | 372512 | 0.7080 Hay | 0.7887 | 0.7879 | -0.0009 | 28640 | 0.2932 Safflower | 0.7749 | 0.7638 | -0.0112 | 125555 | 0.6911 Barley | 0.3051 | 0.2474 | -0.0577 | 424 | 0.1620 Sunflower | 0.6578 | 0.4333 | -0.2246 | 3842 | 0.8999 MEAN | 0.6440 | 0.7195 | | | ### 5.3. Comprehensive analysis of all pixels where STATT and CDL disagree The previous two methods prove to be very useful while doing field analysis and using a combination of the two we can show for each field who is correct. However, neither of these methods give a global perspective nor do they quantify how much better STATT’s predictions are when compared to those of CDL’s predictions. To address this issue, we use a third method of analysis in which we devise a function to measure closeness of pixels to ground reality, and after plotting the function, use area under the curve to establish which strategy, i.e. CDL or STATT, is better. After obtaining the map for STATT and CDL, we calculate the characteristic NDVI series gridwise for each class using the agreement pixels as described in the previous section. Now we consider a characteristic series to be valid only if there are at least $T$ pixels in agreement in the grid, and $T$ is set to 100 in this work. Now for each pixel of disagreement for each class we calculate the Normalised Mean Square Error (NMSE) with the characteristic NDVI series and the NDVI series of the the pixel of disagreement. For each strategy (CDL or STATT), we first sort all the disagreement pixels according to their NMSE. Then we compute $Score(E)$ for each strategy, which is defined to be the proportion of disagreement pixels with NMSE less than a particular error $E$ over all the disagreement pixels, i.e., $Score()$, for a particular error (E) as follows: (1) $\small Score(E)=\frac{\\#\,disagreement\,pixels\,in\,strategy\,with\,NMSE\,less\,than\,E}{Total\,No.\,of\,pixels\,of\,disagreement\,in\,strategy\,}$ where $strategy$ represents either CDL or STATT. What the function Score represents is the fraction of total disagreements pixels whose NMSE lies below a set threshold error denoted by E. The notion behind this function is that, the closer the NMSEs of the disagreement pixels are to zero, the faster Score rises as E rises. At the max error, the Score will be 1, as all NMSEs lie below the threshold. Our hypothesis is that the STATT disagreement pixels have lower errors and so Score will rise faster for STATT when compared to CDL. As a result, STATT will reach a higher Score faster and will thus have more area under the plot of Score until the max error. A plot of this function is constructed for each class with E starting from 0 and ranging up til maximum NMSE error recorded for that class, which we denote as $E_{max}$. Please note that $E_{max}$ changes from class to class and that $E_{max}$ could come from either a CDL disagreement pixel or a STATT disagreement pixel. We then calculate Area under the curve as follows: (2) $Area_{strategy}=(\int_{0}^{E_{max}}Score(E)\,dE)/E_{max}$ We divide the area of each plot by $E_{max}$ to keep it within the range (0,1).The plots of curve for each class can be seen in Fig. 10, with Blue representing STATT and red representing CDL. The areas under these curves for each strategy are summarized in Table 3. We can see that STATT has a higher area when compared to CDL in almost all the classes. STATT has lower area for a small number of classes which have low agreement count. We also see from the figure that in a lot of classes the blue line lies above the red line throughout the plot. This experiment solidifies our claim that STATT labels are closer to the ground reality than when compared to the labels provided by CDL. ## 6\. Conclusion In this paper we presented CalCROP21, a georeferenced data set for a diverse array of crops grown in the Central Valley of California. This dataset contains multi spectral Sentinel imagery along with crop labels at 10m resolution for year 2018 that are derived using a novel spatial-temporal deep learning method that makes use of noisy CDL labels available at 30m resolution. Our extensive analysis of this dataset demonstrates the superiority of our dataset over CDL. We have also released our processing pipeline and associated datasets that can be used by the community to generate crop labels for other years and for creating similar data sets for other parts of US. We anticipate this dataset will catalyze the innovation in machine learning research on remote sensing data (e.g., classifying multiple imbalanced classes and modeling heterogeneous data over space), and also enable the use of this information for studying crop distribution and its implications by the agricultural community. ## 7\. Acknowledgement This work was funded by the NSF awards 1838159 and 1739191. Access to computing facilities was provided by the Minnesota Supercomputing Institute. ## References * (1) * cdl (2021) 2021\. USDA NASS Cropland Data Layers. https://developers.google.com/earth-engine/datasets/catalog/USDA_NASS_CDL. * Basu et al. (2015) Saikat Basu, Sangram Ganguly, Supratik Mukhopadhyay, Robert DiBiano, Manohar Karki, and Ramakrishna Nemani. 2015. DeepSat: A Learning Framework for Satellite Imagery. In _Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems_ (Seattle, Washington) _(SIGSPATIAL ’15)_. Association for Computing Machinery, New York, NY, USA, Article 37, 10 pages. https://doi.org/10.1145/2820783.2820816 * Belden et al. (2012) Jason B Belden, Brittany Rae Hanson, Scott T McMurry, Loren M Smith, and David A Haukos. 2012\. Assessment of the effects of farming and conservation programs on pesticide deposition in high plains wetlands. _Environmental science & technology_ 46, 6 (2012), 3424–3432. * Boryan et al. (2012) Claire Boryan, Zhengwei Yang, and Liping Di. 2012. Deriving 2011 cultivated land cover data sets using usda national agricultural statistics service historic cropland data layers. In _2012 IEEE International Geoscience and Remote Sensing Symposium_. IEEE, 6297–6300. * Boryan et al. (2011) Claire Boryan, Zhengwei Yang, Rick Mueller, and Mike Craig. 2011\. Monitoring US agriculture: the US Department of Agriculture, National Agricultural Statistics Service, Cropland Data Layer Program. _Geocarto International_ 26, 5 (2011), 341–358. https://doi.org/10.1080/10106049.2011.562309 * CDL (2021) CDL 2021. USDA Cropland Data Layer. https://www.nass.usda.gov/Research_and_Science/Cropland/docs/MuellerICASVI_CDL.pdf. * Cibin et al. (2012) R Cibin, I Chaubey, and B Engel. 2012. Simulated watershed scale impacts of corn stover removal for biofuel on hydrology and water quality. _Hydrological processes_ 26, 11 (2012), 1629–1641. * Demir et al. (2018) Ilke Demir, Krzysztof Koperski, David Lindenbaum, Guan Pang, Jing Huang, Saikat Basu, Forest Hughes, Devis Tuia, and Ramesh Raskar. 2018. DeepGlobe 2018: A Challenge to Parse the Earth through Satellite Images. _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)_ (Jun 2018). https://doi.org/10.1109/cvprw.2018.00031 * Deng et al. (2009) Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009\. ImageNet: A large-scale hierarchical image database. In _2009 IEEE Conference on Computer Vision and Pattern Recognition_. 248–255. https://doi.org/10.1109/CVPR.2009.5206848 * Fitzgerald and Zimmerman (2013) Timothy Fitzgerald and Grant Zimmerman. 2013. Agriculture in the Tongue River Basin, Output, Water Quality, and Implications. (2013). * Ghosh et al. (2021a) Rahul Ghosh, Xiaowei Jia, and Vipin Kumar. 2021a. Land Cover Mapping in Limited Labels Scenario: A Survey. _arXiv preprint arXiv:2103.02429_ (2021). * Ghosh et al. (2021b) Rahul Ghosh, Praveen Ravirathinam, Xiaowei Jia, Chenxi Lin, Zhenong Jin, and Vipin Kumar. 2021b. Attention-augmented Spatio-Temporal Segmentation for Land Cover Mapping. arXiv:2105.02963 [cs.CV] * Hartz et al. (2011) Laura Hartz, Fritz Boettner, and Jason Clingerman. 2011\. Greenbrier Valley Local Food: The Possibilities and Potential. _Greenbrier Valley Economic Develeopment Corporation_ (2011). * Helber et al. (2017) Patrick Helber, Benjamin Bischke, Andreas Dengel, and Damian Borth. 2017. EuroSAT: A Novel Dataset and Deep Learning Benchmark for Land Use and Land Cover Classification. arXiv:1709.00029 [cs.CV] * Lark et al. (2021) Tyler J Lark, Ian H Schelly, and Holly K Gibbs. 2021\. Accuracy, Bias, and Improvements in Mapping Crops and Cropland across the United States Using the USDA Cropland Data Layer. _Remote Sensing_ 13, 5 (2021), 968. * Maggiori et al. (2017) Emmanuel Maggiori, Yuliya Tarabalka, Guillaume Charpiat, and Pierre Alliez. 2017. Can semantic labeling methods generalize to any city? the inria aerial image labeling benchmark. In _2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)_. 3226–3229. https://doi.org/10.1109/IGARSS.2017.8127684 * Painter et al. (2013) Kathleen Painter, Hilary Donlon, Stephanie Kane, et al. 2013\. Results of a 2012 survey of Idaho oilseed producers. _AE Extension Series-Department of Agricultural Economics and Rural Sociology, University of Idaho_ 13-01 (2013). * Penatti et al. (2015) Otávio A. B. Penatti, Keiller Nogueira, and Jefersson A. dos Santos. 2015. Do deep features generalize from everyday objects to remote sensing and aerial scenes domains?. In _2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)_. 44–51. https://doi.org/10.1109/CVPRW.2015.7301382 * Plourde et al. (2013) James D Plourde, Bryan C Pijanowski, and Burak K Pekin. 2013\. Evidence for increased monoculture cropping in the Central United States. _Agriculture, ecosystems & environment_ 165 (2013), 50–59. * Pritsolas and Pearson ([n.d.]) Joshua Pritsolas and Randall Pearson. [n.d.]. A Cautionary Tale: A Recent Paper’s Use of Research Based on the USDA Cropland Data Layer to Assess the Environmental Impacts of Claimed Cropland Expansion. ([n. d.]). * Rashford et al. (2013) Benjamin S Rashford, Shannon E Albeke, and David J Lewis. 2013\. Modeling grassland conversion: Challenges of using satellite imagery data. _American Journal of Agricultural Economics_ 95, 2 (2013), 404–411. * Reitsma et al. (2015) Kurtis D Reitsma, David E Clay, Sharon A Clay, Barry H Dunn, and C Reese. 2015. Does the US Cropland Data Layer Provide an Accurate Benchmark for Land-Use Change Estimates? _Agronomy Journal_ 108, 108 (2015), 226. * Schmitt et al. (2019) Michael Schmitt, Lloyd Haydn Hughes, Chunping Qiu, and Xiao Xiang Zhu. 2019. SEN12MS – A Curated Dataset of Georeferenced Multi-Spectral Sentinel-1/2 Imagery for Deep Learning and Data Fusion. arXiv:1906.07789 [cs.CV] * Sumbul et al. (2019) Gencer Sumbul, Marcela Charfuelan, Begum Demir, and Volker Markl. 2019. Bigearthnet: A Large-Scale Benchmark Archive for Remote Sensing Image Understanding. _IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium_ (Jul 2019). https://doi.org/10.1109/igarss.2019.8900532 * Wright and Wimberly (2013) Christopher K Wright and Michael C Wimberly. 2013. Recent land use change in the Western Corn Belt threatens grasslands and wetlands. _Proceedings of the National Academy of Sciences_ 110, 10 (2013), 4134–4139. * Xia et al. (2018) Gui-Song Xia, Xiang Bai, Jian Ding, Zhen Zhu, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, and Liangpei Zhang. 2018. DOTA: A Large-Scale Dataset for Object Detection in Aerial Images. In _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 3974–3983. https://doi.org/10.1109/CVPR.2018.00418 * Yang and Newsam (2010) Yi Yang and Shawn Newsam. 2010. Bag-of-Visual-Words and Spatial Extensions for Land-Use Classification. In _Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems_ (San Jose, California) _(GIS ’10)_. Association for Computing Machinery, New York, NY, USA, 270–279. https://doi.org/10.1145/1869790.1869829 NMSE SCATTERPLOT STATISTICS | ALL DISAGREEMENT | CROP DISAGREEMENT ---|---|--- TOTAL POINTS | 2681881 | 2027776 STATT BETTER | 1672366 | 1323883 CDL BETTER | 1009515 | 703893 STATT BETTER MEAN | 0.1321 | 0.1567 CDL BETTER MEAN | 0.0857 | 0.1091 Table 4. NMSE scatterplots ## 8\. Appendix ### 8.1. NMSE analysis In this section we propose another method of analysis, estimated F1 score analysis method. In this method we try to estimate the actual F1 score of CDL and STATT based on proximity of NDVI series of pixels with respect to the characteristic NDVI series using Normalised mean square error. Like the AUC analysis we calculate the characteristic NDVI series gridwise for each class using the agreement pixels and consider a characteristic series to be valid only if there are at least ’T’ pixels in agreement in the grid. Once again in this experiment, we set ’T’ to be 100. Once again for each pixel of disagreement for each class we calculate the mean square error with the characteristic NDVI series and the NDVI series of the the pixel of disagreement and store all these scores and then normalise each after all disagreement pixels series errors have been calculated. We then set a threshold below which the NMSE should be for a pixel so that it can be considered for F1 score calculation. We set this threshold by finding that threshold at which at least 25 to 45 percent of the disagreement pixels have an NMSE score less than that threshold. Note that in this step we are not distinguishing between CDL and STATT pixels, but consider overall all the pixels of disagreement. Now after setting the threshold, we then find out how many of these pixels that cross the threshold are from CDL and how many are from STATT. We also have the number of agreement pixels in that grid as well and also number of disagreement pixels from STATT and CDL for the class and the grid in question. Using these numbers we can calculate the F1 score for CDL and STATT separately using the formula: (3) $F1\\_Score_{strategy}=\frac{2\times Precision_{strategy}\times Recall_{strategy}}{Precision_{strategy}+Recall_{strategy}}$ (4) $Precision_{strategy}=\frac{count\\_thresholded_{strategy}+count\\_agreement}{count\\_disagree_{strategy}+count\\_agreement}$ (5) $Recall_{strategy}=\frac{count\\_thresholded_{strategy}+count\\_agreement}{count\\_thresholded_{total}+count\\_agreement}$ where $strategy$ represents either CDL or STATT. We conducted this analysis on all classes for which USDA reports statistics and the results can be found in Table. 5. As can be seen from the table STATT has a higher F1 score when compared to CDL on all but 3 classes. The table also verifies our fallow land proposition by a significantly higher f1 score. ### 8.2. NMSE Scatterplot In this section we present a scatter plot based method to globally show improvement over CDL overall and not class wise. As mentioned before, for each point of disagreement CDL predicts a class, which we call CDL class, and STATT predicts another class, which we call STATT class. Now as mentioned in the previous section, we create the characteristic NDVI series for each class using the agreement pixels for each class. Now for each disagreement pixel, we compare the Normalised Mean Square Error and plot in the form of a scatterplot shown in the left of Fig. 11. The right scatterplot represents a subset of these disagreement points where at least one of the strategies has predicted a crop class. Since the distinction between the methods is not exactly clear from the scatterplots, the statistics for both the plots are present in 4. From the table we can see that when we look at all the pixels overall STATT is closer to the respective characteristic NDVI class series in 1672366 pixels when compared to where CDL is closer,i.e 1009515 pixels. However, when we look at just the crop confusion pixels we can see STATT is better in almost double the amount of pixels that CDL is better in, thus showing global superiority of STATT when compared to CDL. Class | Nmse error threshold | $Count_{agreement}$ threshold | F1 CDL | F1 STATT | F1 USDA(rep) | % pixels ---|---|---|---|---|---|--- Almonds | 0.5 | 100 | 0.9513 | 0.9575 | 0.9516 | 0.4104 Rice | 0.2 | 100 | 0.9615 | 0.9845 | 0.9805 | 0.4616 Alfalfa | 0.3 | 100 | 0.8185 | 0.8612 | 0.8812 | 0.3162 Pistachio | 0.3 | 100 | 0.8012 | 0.9150 | 0.9632 | 0.2438 Grapes | 0.3 | 100 | 0.8945 | 0.8804 | 0.9830 | 0.4293 Fallow and Idle | 0.3 | 100 | 0.7229 | 0.8122 | 0.7183 | 0.5164 Cotton | 0.2 | 100 | 0.9532 | 0.9464 | 0.9314 | 0.4212 Walnut | 0.2 | 100 | 0.8859 | 0.8930 | 0.9514 | 0.5281 Tomatoes | 0.2 | 100 | 0.8829 | 0.9650 | 0.8764 | 0.3469 Winter Wheat | 0.2 | 100 | 0.8340 | 0.8976 | 0.7000 | 0.3003 Corn | 0.2 | 100 | 0.7734 | 0.8613 | 0.7530 | 0.4092 Citrus | 0.3 | 100 | 0.8407 | 0.8678 | 0.7583 | 0.2891 Sunflower | 0.2 | 100 | 0.9703 | 0.8630 | 0.7956 | 0.2856 Onions | 0.1 | 100 | 0.8064 | 0.8274 | 0.7553 | 0.2205 Olives | 0.2 | 100 | 0.8816 | 0.9663 | 0.9255 | 0.2298 Dry Beans | 0.3 | 100 | 0.9747 | 0.9929 | 0.6503 | 0.3472 Pomegranates | 0.2 | 100 | 0.7143 | 0.7796 | 0.9448 | 0.2401 Garlic | 0.2 | 100 | 0.9191 | 0.9572 | 0.8242 | 0.3481 Cherries | 0.4 | 100 | 0.9005 | 0.9240 | 0.9521 | 0.2533 Safflower | 0.1 | 100 | 0.8137 | 0.8083 | 0.6899 | 0.4173 AVG: | | | 0.8650 | 0.8980 | 0.8493 | Table 5. NMSE analysis table Figure 11. NMSE Scatterplot for all disagreement points as well as crop disagreement points
arxiv-papers
2021-07-26T22:20:16
2024-09-04T03:07:20.133415
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Rahul Ghosh, Praveen Ravirathinam, Xiaowei Jia, Ankush Khandelwal,\n David Mulla, Vipin Kumar", "submitter": "Rahul Ghosh", "url": "https://arxiv.org/abs/2107.12499" }
2107.12511
# Regularity properties of passive scalars with rough divergence-free drifts Dallas Albritton Courant Institute of Mathematical Sciences, New York University, New York, NY 10012 [email protected] and Hongjie Dong Division of Applied Mathematics, Brown University, 182 George Street, Providence, RI 02912 [email protected] ###### Abstract. We present sharp conditions on divergence-free drifts in Lebesgue spaces for the passive scalar advection-diffusion equation $\partial_{t}\theta-\Delta\theta+b\cdot\nabla\theta=0$ to satisfy local boundedness, a single-scale Harnack inequality, and upper bounds on fundamental solutions. We demonstrate these properties for drifts $b$ belonging to $L^{q}_{t}L^{p}_{x}$, where $\frac{2}{q}+\frac{n}{p}<2$, or $L^{p}_{x}L^{q}_{t}$, where $\frac{3}{q}+\frac{n-1}{p}<2$. For steady drifts, the condition reduces to $b\in L^{\frac{n-1}{2}+}$. The space $L^{1}_{t}L^{\infty}_{x}$ of drifts with ‘bounded total speed’ is a borderline case and plays a special role in the theory. To demonstrate sharpness, we construct counterexamples whose goal is to transport anomalous singularities into the domain ‘before’ they can be dissipated. ###### Contents 1. 1 Introduction 2. 2 Local boundedness and Harnack’s inequality 3. 3 Bounded total speed 4. 4 Counterexamples 5. 5 Upper bounds on fundamental solutions ## 1\. Introduction We consider the linear advection-diffusion equation $\partial_{t}\theta-\Delta\theta+b\cdot\nabla\theta=0.$ (A-D) The solution $\theta=\theta(x,t)$ is known as a _passive scalar_ , and the prescribed divergence-free velocity field $b=b(x,t)$ is known as the _drift_. Our goal is to understand, in detail, the regularity properties of (A-D) when the drift $b$ is _rough_. Rough divergence-free drifts arises naturally in the context of nonlinear PDEs in fluid dynamics. To understand what is ‘rough’, we recall the scaling symmetry $u\to u(\lambda x,\lambda^{2}t),\quad b\to\lambda b(\lambda x,\lambda^{2}t),\quad\lambda>0.$ (1.1) In dimensional analysis, one writes $[x]=L$, $[t]=L^{2}$, and $[b]=L^{-1}$. The scaling (1.1) identifies the Lebesgue spaces $L^{q}_{t}L^{p}_{x}$, where $\frac{2}{q}+\frac{n}{p}\leq 1$, as _(sub)critical_ spaces for the drift, meaning spaces whose norms do not grow upon ‘zooming in’ with the scaling symmetry. For example, $X=L^{\infty}_{t}L^{n}_{x},\,L^{2}_{t}L^{\infty}_{x},\,L^{n+2}_{t,x}$ (1.2) are _critical spaces_ , whose norms are dimensionless, i.e., invariant under the symmetry (1.1). Here, $n\geq 2$ is the spatial dimension. When $b$ belongs to one of the above critical Lebesgue spaces, it is not difficult to adapt the work of De Giorgi, Nash, and Moser [DG57, Nas58, Mos64] to demonstrate that weak solutions of (A-D) are Hölder continuous and satisfy Harnack’s inequality. The above threshold is known to be _sharp_ for Hölder continuity within the scale of Lebesgue spaces, see the illuminating counterexamples in [SVZ13, Wu21]. The divergence-free condition moreover allows access to drifts in the critical spaces $X=L^{\infty}_{t}L^{-1,\infty}_{x},L^{\infty}_{t}{\rm BMO}^{-1}_{x}$, considered by [Osa87, SSvZ12, QX19b]. In these spaces, it is furthermore possible to prove Gaussian upper and lower bounds on fundamental solutions in the spirit of Aronson [Aro67]. In this paper, we are concerned with _supercritical_ drifts, for which continuity may fail. Nonetheless, much of the regularity theory may be salvaged. The divergence-free structure plays a crucial role here,111The divergence-free structure plays a more subtle role in the critical case. Without this structure, the drift is required to be small in a critical Lebesgue space or Kato class, and local boundedness may depend on the ‘profile’ of the drift. as is already visible from the computation $\int(b\cdot\nabla\theta)\theta\phi^{2}\,dx\,dt=\int b\cdot\nabla\left(\frac{\theta^{2}}{2}\right)\phi^{2}\,dx\,dt=-\int\theta^{2}(b\cdot\nabla\phi)\phi.$ (1.3) With this well known observation, one may apply Moser’s iteration scheme to demonstrate that, when $b\in L^{q}_{t}L^{p}_{x}$ and $\frac{2}{q}+\frac{n}{p}<2$, solutions are _locally bounded_ , see [NUt11]. Typical examples are $X=L^{\infty}_{t}L^{\frac{n}{2}+}_{x},L^{\frac{n+2}{2}+}_{t,x}.$ (1.4) Under these conditions (and a weak background assumption), the Harnack inequality persists as a _single-scale Harnack inequality_ [IKR14, IKR16]: In the steady case $\theta=\theta(x)$, $\sup_{B_{R}}\theta\leq C_{R}\inf_{B_{R}}\theta,$ (1.5) where $C_{R}$ may become unbounded as $R\to 0^{+}$. Whereas a scale-invariant Harnack inequality implies Hölder continuity, it is perhaps less well known that a single-scale Harnack may hold in the absence of Hölder continuity. Finally, in this setting, pointwise upper bounds on fundamental solutions continue to hold, although they have ‘fat tails’ compared to their Gaussian counterparts [Zha04, QX19a]. Our first contribution is to understand the sharpness of the condition $b\in L^{q}_{t}L^{p}_{x}$, $\frac{2}{q}+\frac{n}{p}<2$. We find that $L^{1}_{t}L^{\infty}_{x}$, the space of drifts with ‘bounded total speed’ (in the terminology of [Tao13]), plays a special role and informs the counterexamples we construct in Section 4. We summarize the results pertaining to this condition in Theorem 1.1. In the steady case, there is an additional subtle feature, which is not well known and that we find surprising: Local boundedness continues to hold when $b\in L^{\frac{n-1}{2}+}$. To our knowledge, this ‘dimension reduction’ was first observed in this context by Kontovourkis [Kon07] in his thesis.222 This ‘dimension reduction’ itself goes back at least to work of Frehse and R$\overset{\circ}{\text{u}}$žička [FR96] on the steady Navier-Stokes equations in $n=6$. The ‘slicing’ is also exploited by Struwe in [Str88]. Heuristically, Kontovourkis’ key observation is as follows. Consider the basic $L^{2}$ energy estimate, in a ball $B_{r}$ without smooth cut-off. The drift contributes the boundary term $\int_{B_{r}}(b\cdot\nabla\theta)\theta\,dx=\int_{\partial B_{r}}\frac{\theta^{2}}{2}b\cdot n\,d\sigma,$ (1.6) where $d\sigma$ is the surface area measure. Since $\nabla\theta\in L^{2}(B_{R})$, on ‘many slices’ $r\in(R/2,R)$, we have $\nabla\theta\in L^{2}(\partial B_{r})$, with a quantitative bound. Similarly, $b$ belongs to $L^{\frac{n-1}{2}+}(\partial B_{r})$ on ‘many slices’. Thus, one may exploit Sobolev embedding on the sphere $\partial B_{r}$ to estimate the boundary term. This dimension reduction was recently rediscovered by Bella and Schäffner [BS21], who proved local boundedness and a single-scale Harnack inequality in the context of certain degenerate elliptic PDEs, which we review below. Since the work of Kontovourkis, it has been an interesting question, what dimension reduction holds in the parabolic setting? In particular, is $b\in L^{\frac{n+1}{2}+}_{t,x}$ enough for local boundedness? Very recently, X. Zhang [Zha20] generalized the work [BS21] of Bella and Schäffner to the parabolic setting, and among other things, demonstrated local boundedness under the condition $b\in L^{p}_{x}L^{q}_{t}$, $\frac{3}{q}+\frac{n-1}{p}<2$, $p\leq q$, see Corollary 1.5 therein. Crucially, the order of integration is reversed. The condition $b\in L^{\frac{n-1}{2}+}_{x}L^{\infty}_{t}$ implies the elliptic case of Kontovourkis. From this condition, we see that, perhaps, one dimension is not ‘reduced’, but rather hidden into the time variable. In Theorem 1.2, we present our second contribution, namely, (i) the parabolic Harnack inequality and pointwise upper bounds on fundamental solutions in this setting, and (ii) counterexamples which illustrate the meaning and sharpness of the ‘dimension reduction’. We now present the main results, which constitute a detailed picture of the local regularity theory for the passive scalar advection-diffusion equation (A-D) with supercritical drifts. Let $n\geq 2$, $\Omega\subset\mathbb{R}^{n}$ be a bounded domain, and $\Omega^{\prime}\subset\subset\Omega$ be a subdomain. Let $I=(S,T]$ and $I^{\prime}=(S^{\prime},T^{\prime}]\subset I$ be finite intervals such that $S<S^{\prime}$. Let $Q_{I}=\Omega\times I$ and $Q_{I}^{\prime}=\Omega^{\prime}\times I^{\prime}$. Let $p,q\in[1,+\infty]$. ###### Theorem 1.1 ($b\in L^{q}_{t}L^{p}_{x}$). _(Local boundedness)_ [NUt11] If $\zeta_{0}:=\frac{2}{q}+\frac{n}{p}<2,$ (1.7) then we have the following _quantitative local boundedness_ property: If $\theta\in L^{1}(Q_{I})\cap C^{\infty}(Q_{I})$ satisfies the drift-diffusion equation (A-D) in $Q_{I}$ with divergence-free drift $b\in C^{\infty}(Q_{I})$ and $b\in L^{q}_{t}L^{p}_{x}(Q_{I}),$ (1.8) then $\sup_{Q_{I}^{\prime}}|\theta|\lesssim\lVert\theta\rVert_{L^{1}(Q_{I})},$ (1.9) where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$, $I^{\prime}$, $p$, $q$, and $\lVert b\rVert_{L^{q}_{t}L^{p}_{x}(Q_{I})}$. _(Single-scale Harnack)_ [IKR16] If, additionally, $b\in L^{2}_{t}H^{-1}_{x}(Q_{I})$ and $\theta>0$, then we have the following _quantitative Harnack inequality_ : If $I_{1},I_{2}\subset\subset I$ are intervals satisfying $\sup I_{1}<\inf I_{2}$, then $\sup_{\Omega^{\prime}\times I_{1}}\theta\lesssim\inf_{\Omega^{\prime}\times I_{2}}\theta,$ (1.10) where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$, $I_{1}$, $I_{2}$, $p$, $q$, $\lVert b\rVert_{L^{q}_{t}L^{p}_{x}(Q_{I})}$, and $\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q_{I})}$. _(Bounded total speed)_ If $(p,q)=(\infty,1)$, then the above quantitative local boundedness property holds with constants depending on $b$ itself rather than $\|b\|_{L^{1}_{t}L^{\infty}_{x}(Q_{I})}$. (The property is false without this adjustment.) _(Sharpness)_ Let $Q=B_{1}\times(0,1)$. There exist a smooth divergence-free drift $b\in C^{\infty}(Q)$ belonging to $L^{q}_{t}L^{p}_{x}(Q)$ for all $(p,q)\in[1,+\infty]^{2}$ with $2/q+n/p=2$, $(p,q)\neq(\infty,1)$, and satisfying the following property. There exists a smooth solution $\theta\in L^{\infty}_{t}L^{1}_{x}\cap C^{\infty}(Q)$ to the advection-diffusion equation (A-D) in $Q$ with $\sup_{B_{1/2}\times(0,T)}|\theta|\to+\infty\text{ as }T\to 1_{-}.$ In particular, the above quantitative local boundedness property fails when $2/q+n/p=2$ and $q>1$. _(Upper bounds on fundamental solutions)_ [QX19a] If the divergence-free drift $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ belongs to $L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})$ and $1\leq\zeta_{0}<2$, then the fundamental solution $\Gamma=\Gamma(x,t;y,s)$ to the parabolic operator $L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies $\displaystyle\Gamma(x,t;y,s)$ $\displaystyle\leq C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$ (1.11) $\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$ for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$. Here, $\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}},\quad M_{0}=C\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4},\quad\theta_{2}=1-\frac{\zeta_{0}}{2}.$ (1.12) See Figure 1 for an illustration of Theorem 1.1. Figure 1. Divergence-free drift $b\in L^{q}_{t}L^{p}_{x}$ in dimension $n\geq 2$ (dimension $n=3$ illustrated above). _Region A_ ($2/q+n/p\leq 1$): Local boundedness, Harnack inequality, and Hölder continuity. _Region B_ ($1<2/q+n/p<2$ or $(p,q)=(\infty,1)$): Local boundedness and single-scale Harnack inequality. _Dashed line_ : Local boundedness is false. ###### Theorem 1.2 ($b\in L^{p}_{x}L^{q}_{t}$). _(Local boundedness)_ [Zha20] If $\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,\quad p\leq q,$ (1.13) then we have the following _quantitative local boundedness_ property: If $\theta\in L^{1}(Q_{I})\cap C^{\infty}(Q_{I})$ satisfies the drift-diffusion equation (A-D) in $Q_{I}$ with divergence-free drift $b\in C^{\infty}(Q_{I})$ and $b\in L^{p}_{x}L^{q}_{t}(Q_{I}),$ (1.14) then $\sup_{Q_{I}^{\prime}}|\theta|\lesssim\lVert\theta\rVert_{L^{1}(Q_{I})},$ (1.15) where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$, $I^{\prime}$, $p$, $q$, and $\lVert b\rVert_{L^{p}_{x}L^{q}_{t}(Q_{I})}$. _(Single-scale Harnack)_ If, additionally, $b\in L^{2}_{t}H^{-1}_{x}(Q_{I})$ and $\theta>0$, then we have the following _quantitative Harnack inequality_ : If $I_{1},I_{2}\subset\subset I$ are intervals satisfying $\sup I_{1}<\inf I_{2}$, then $\sup_{\Omega^{\prime}\times I_{1}}\theta\lesssim\inf_{\Omega^{\prime}\times I_{2}}\theta,$ (1.16) where the implied constant depends on $n$, $\Omega$, $\Omega^{\prime}$, $I$, $I_{1}$, $I_{2}$, $p$, $q$, $\lVert b\rVert_{L^{p}_{x}L^{q}_{t}(Q_{I})}$, and $\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q_{I})}$. _(Sharpness, steady case)_. Let $n\geq 3$. The quantitative local boundedness property fails for steady drifts $b\in L^{\frac{n-1}{2}}(B)$ and steady solutions $\theta$ in the ball $B$. _(Sharpness, time-dependent case)_. Let $n\geq 2$ and $Q=B_{1}\times(0,1)$. There exist a smooth divergence-free drift $b\in C^{\infty}(Q)$ belonging to $L^{p}_{x}L^{q}_{t}(Q)$ for all $p,q\in[1,+\infty]$ with $p\leq q$ and $3/q+(n-1)/p>2$ and satisfying the following property. There exists a smooth solution $\theta\in L^{\infty}_{t}L^{1}_{x}\cap C^{\infty}(Q)$ to the advection-diffusion equation (A-D) in $Q$ with $\sup_{B_{1/2}\times(0,T)}|\theta|\to+\infty\text{ as }T\to 1_{-}.$ In particular, the above quantitative local boundedness property fails when $3/q+(n-1)/p>2$ and $p\leq q$. Finally, the drift additionally belongs to $L^{q}_{t}L^{p}_{x}(Q)$ for all $(p,q)\in[1,+\infty]^{2}$ with $2/q+n/p>2$. _(Upper bounds on fundamental solutions)_ If the divergence-free drift $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ belongs to $L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})$ and $1\leq\zeta_{0}<2$, then the fundamental solution $\Gamma=\Gamma(x,t;y,s)$ to the parabolic operator $L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies $\displaystyle\Gamma(x,t;y,s)$ $\displaystyle\leq C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$ (1.17) $\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$ for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$. Here, $\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}},\quad M_{0}=C\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4},\quad\theta_{2}=1-\frac{\zeta_{0}}{2}.$ (1.18) See Figures 2 and 3 for an illustration of Theorem 1.2. Figure 2. Divergence-free drift $b\in L^{p}_{x}L^{q}_{t}$, dimension $n\geq 3$ (dimension $n=4$ illustrated above). Local boundedness and single-scale Harnack inequality. Figure 3. Divergence-free drift $b\in L^{p}_{x}L^{q}_{t}$, dimension $n=2$. Local boundedness and single-scale Harnack inequality. We prove Theorems 1.1 and 1.2, including the known results, in a self- contained way below. ###### Remark 1.3. The local boundedness property and Harnack inequality in Theorems 1.1 and 1.2 can be easily extended to accomodate drifts satisfying $\operatorname{div}b\leq 0$ (with the background assumption $b\in L^{2}_{t,x}(Q_{I})$ in the Harnack inequality). These properties and the fundamental solution estimates can also be extended to divergence-form elliptic operators $\operatorname{div}a\nabla\cdot$ with bounded, uniformly elliptic $a$. ###### Remark 1.4. Our condition $b\in L^{2}_{t}H^{-1}_{x}(Q_{I})$ appears to be new and is used to connect the forward- and backward-in-time regions in the Harnack inequality, see Lemma 2.11. In contrast, the background condition in the single-scale Harnack inequality in [IKR16] is $b\in L^{\infty}_{t}L^{2}_{x}(Q_{I})$. ### Discussion of dimension reduction principle The ‘slicing’ described above in the steady setting is more subtle in the time-dependent setting because the anisotropic condition $\theta\in L^{\infty}_{t}L^{2}_{x}$ does not restrict well to slices in the radial variable $r$; compare this to the isotropic condition $\nabla\theta\in L^{2}_{t,x}$. Indeed, to ‘slice’ in a variable, it seems necessary for that variable to be summed ‘last’ (that is, on the outside) in the norm. The condition $b\in L^{p}_{x}L^{q}_{t}$, $p\leq q$, $\frac{3}{q}+\frac{n-1}{p}<2$, in Theorem 1.2 comes, roughly speaking, from interpolating between the isotropic condition $b\in L^{\frac{n+2}{2}+}_{t,x}$, in which the order of integration may be changed freely, and the dimensionally reduced condition $b\in L^{\frac{n-1}{2}+}_{x}L^{\infty}_{t}$, which implies that $b\in L^{\infty}_{t}L^{\frac{n-1}{2}+}_{\sigma}(\partial B_{r}\times I)$ on ‘many slices’, say, a set of $r\in A\subset(1/2,1)$ with measure $|A|>1/4$. Local boundedness under this condition was already observed by X. Zhang in [Zha20, Corollary 1.5], and the counterexamples we construct answer an open question in Remark 1.6 therein. Our proof of local boundedness and the Harnack inequality is built on a certain _form boundedness condition_ (FBC), see Section 2, which subsumes a wide variety of possible assumptions on $b$. For example, in Proposition 2.3, we verify (FBC) not only in the context of Theorems 1.1 and 1.2 but also under the more general conditions $b\in L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R}\setminus B_{R/2})\times I),\quad\beta\geq\frac{n}{2},\quad\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}<2$ (1.19) and $b\in L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus B_{R/2})\times I),\quad p\leq q,\quad\frac{3}{q}+\frac{n-1}{p}<2.$ (1.20) Furthermore, we allow arbitrarily low integrability $\kappa>0$ in the radial variable; the slicing method does not require high integrability. Our proof of upper bounds on fundamental solutions is centered on a variant ($\widetilde{\text{FBC}}$) of the form boundedness condition, see Section 5, partially inspired by the work of Qi S. Zhang [Zha04]. We now describe the work [BS21], which was generalized to the parabolic setting in [Zha20]. The conditions in [BS21] are on the ellipticity matrix $a$, which is allowed to be degenerate: Define $\lambda(x):=\inf_{|\xi|=1}\xi\cdot a(x)\xi,\quad\mu(x):=\sup_{|\xi|=1}\frac{|a(x)\xi|^{2}}{\xi\cdot a(x)\xi}.$ (1.21) If $n\geq 2$, $p,q\in(1,+\infty]$, and $\lambda^{-1}\in L^{q}(B),\quad\mu\in L^{p}(B),\quad\frac{1}{p}+\frac{1}{q}<\frac{2}{n-1},$ (1.22) then weak solutions of $-\operatorname{div}a\nabla u=0$ are locally bounded and satisfy a single-scale Harnack inequality. The analogous condition with $\frac{2}{n}$ on the right-hand side is due to Trudinger in [Tru71]. By examples in [FSSC98], the right-hand side cannot be improved to $\frac{2}{n-1}+\varepsilon$. Divergence-free drifts $b$ belong to the above framework: Under general conditions, it is possible to realize $b$ as the divergence of an antisymmetric _stream matrix_ : $b_{i}=d_{ij,i}$. Then we have $-\Delta\theta+b\cdot\nabla\theta=-\operatorname{div}[(I+d)\nabla\theta]$, and $\mu$ captures the antisymmetric part $d$. The steady examples we construct in Section 4 handle the equality case in (1.22). We mention also the works [BS20b, BS20a]. Earlier, it was hoped that the dimension reduction could be further adapted to treat the case $b\in L^{\frac{n+1}{2}+}_{t,x}$ in the parabolic setting by estimating a half-derivative in time: $|\partial_{t}|^{1/2}\theta\in L^{2}_{t,x}$, since this condition is better adapted to slicing than $\theta\in L^{\infty}_{t}L^{2}_{x}$. On the other hand, our counterexamples rule out this possibility. Half time derivatives in parabolic PDE go back, at least, to [LSUt68, Chapter III, Section 4], see [ABES19] for further discussion. ### Discussion of counterexamples and ‘bounded total speed’ Solutions of (A-D) in the whole space and evolving from initial data $\theta_{0}\in L^{1}(\mathbb{R}^{n})$ become bounded instantaneously. This is captured by the famous Nash estimate [Nas58]: $\|\theta(\cdot,t)\|_{L^{\infty}(\mathbb{R}^{n})}\lesssim t^{-\frac{n}{2}}\|\theta_{0}\|_{L^{1}(\mathbb{R}^{n})},$ (1.23) where the implied constant is _independent_ of the divergence-free drift $b$. The Nash estimate indicates that a divergence-free drift does not impede smoothing, in the sense of boundedness, of a density, even if the density is initially a Dirac mass. Therefore, for rough drifts, local boundedness must be violated in a different way: The danger is that the drift can ‘drag’ an anomolous singularity into the domain of observation from outside. There is a competition between the drift, which transports the singularity with some speed, and the diffusion, which smooths the singularity at some rate. Will the singularity, entering from outside, be smoothed before it can be observed inside the domain? Consider a Dirac mass $\delta_{x=-\vec{e_{1}}}$, which we seek to transport inside the domain. If one can transport the Dirac mass inside $B_{1/2}$ _instantaneously_ , one can violate local boundedness. This can be done easily via the drift $b(x,t)=\delta_{t=0}\vec{e}_{1}$, which is singular in time. This example already demonstrates the importance of the space $L^{1}_{t}L^{\infty}_{x}$, whose drifts cannot transport the mass inside arbitrarily quickly. To improve this example, we seek the most efficient way to transport the Dirac mass. Heuristically, the evolution of the Dirac mass is mostly supported in a ball of radius $R(t)\sim\sqrt{t}$. Therefore, we define our drift $b$ to be $S(t)\vec{e}_{1}$ restricted to this support. That is, the drift lives on a ball of radius $R(t)$ moving in the $x_{1}$-direction at speed $S(t)$. Since we wish to move the Dirac mass instantaneously, we guess that $S(t)\sim 1/t$. A back-of-the-envelope calculation gives $\|b\|_{L^{q}_{t}L^{p}_{x}}^{q}\sim\int_{0}^{1}S(t)^{q}R(t)^{\frac{nq}{p}}\,dt\sim\int_{0}^{1}t^{-q+\frac{nq}{2p}}\,dt.$ (1.24) The above quantity is finite when $2/q+n/p>2$; more care is required to get the borderline cases in Theorem 1.1, see Section 4. This heuristic is the basis for our time-dependent counterexamples in Section 4, except that we use appropriate subsolutions to keep the compact support property, we glue together many of these Dirac masses, and $S(t)$ must be chosen more carefully. The above transport-vs.-smoothing phenomenon is also responsible for the ‘fat tails’ in the upper bounds (1.11) and (1.17) on the fundamental solutions. These upper bounds do not align with the Nash estimate (1.23) because the Nash estimate does not effectively capture spatial localization. The elliptic counterexample with $b\in L^{\frac{n-1}{2}}$ is achieved by introducing an ansatz which reduces the problem to counterexamples for the steady Schrödinger equation $-\Delta u+Vu=0$ in dimension $n-1$. These steady counterexamples are singular on a line through the domain, as they must be to respect the maximum principle. The time-dependent counterexamples in $L^{p}_{x}L^{q}_{t}$ seem to be more subtle, and we only exhibit them in the non-borderline cases $\zeta_{0}=\frac{3}{q}+\frac{n-1}{p}>2$ and $p\leq q$. When $\zeta_{0}=2$, we have counterexamples in the cases $p=q=\frac{n+2}{2}$ and $(p,q)=(\frac{n-1}{2},+\infty)$ (the steady example). We believe that local boundedness fails also between these two points, but the counterexamples are yet to be exhibited, see Remark 4.4. ### Review of existing literature Following the seminal works of De Giorgi [DG57] and Nash [Nas58], Moser introduced his parabolic Harnack inequality [Mos64, Mos67] (see [Mos61] for the elliptic case), whose original proof relied on a parabolic generalization of the John-Nirenberg theorem concerning exponential integrability of ${\rm BMO}$ functions. Later, Moser published a simplified proof [Mos71], whose basic methods we follow. In [SSvZ12], Seregin, Silvestre, Šverák, and Zlatoš generalized Moser’s methods to accomodate drifts in $L^{\infty}_{t}{\rm BMO}^{-1}_{x}$. For recent work on boundary behavior in this setting, see [LP19, HLMP21]. Generalizations to critical Morrey spaces and the supercritical Lebesgue spaces are due to [NUt11, IKR14, IKR16, Ign14]. The Gaussian estimates on fundamental solutions were discovered by Aronson [Aro67] and were generalized to divergence-free drifts by Osada in [Osa87] ($L^{\infty}_{t}L^{-1,\infty}_{x}$) and Qian and Xi ($L^{\infty}_{t}{\rm BMO}^{-1}_{x}$) in [QX19b, QX19a]. Important contributions are due to [Zha04], who developed Gaussian-like upper bounds in the supercritical case $b\in L^{\frac{n}{2}+}(\mathbb{R}^{n})$, $n\geq 4$, and [LZ04, MS04, Sem06], among others. For recent progress on Green’s function estimates with sharp conditions on lower order terms, see [DK18, KS19, Sak20, Mou19]. The primary examples concerning the regularity of solutions to (A-D) can be found in [SSvZ12, SVZ13, Wu21]. Counterexamples to continuity with time- dependent drifts can be constructed by colliding two discs of $+1$ (subsolution) and $-1$ (supersolution) with radii $R(t)\sim\sqrt{1-t}$ and speeds $S(t)\sim 1/\sqrt{1-t}$. The parabolic counterexamples with _steady_ velocity fields constructed therein are more challenging. See [Fil13, FS18] for examples in the elliptic setting. We also mention Zhikov’s counterexamples [Zhi04] to uniqueness when $b$ does not belong to $L^{2}$, whereas weak solutions with zero Dirichlet conditions are known to be unique when $b\in L^{2}$ [Zha04]. For recent counterexamples in the regularity theory of parabolic systems based on self-similarity, see [Moo17]. ###### Remark 1.5. At a technical level, there is a small but, perhaps, non-trivial gap in the proof of the weak Harnack inequality in [IKR16], see (3.22) therein, where it is claimed that $\log_{+}(\theta/\mathbf{K})$ is a supersolution. This seems related to a step in the proof of Lemma 6.20, p. 124, in Lieberman’s book [Lie96], which we had difficulty following, see the first inequality therein. Both of these are related to improving the weak $L^{1}$ inequality. We opt to follow Moser’s proof in [Mos71] more directly and skip the weak Harnack inequality. In principle, one could directly apply the parabolic John- Nirenberg inequality in [Mos64, FG85] to obtain the weak Harnack inequality. ## 2\. Local boundedness and Harnack’s inequality Let $b$ be a smooth, divergence-free vector field defined on $B_{R_{0}}\times I_{0}$, where $R_{0}>0$ and $I_{0}$ is an open interval. In the sequel, we will use a _form boundedness condition_ , which we denote by (FBC): > There exist constants $M,N,\alpha>0$, $\varepsilon\in[0,1/2)$, and > $\delta\in(0,1]$ satisfying the following property. For every > $R\in[R_{0}/2,R_{0}]$, subinterval $I\subset I_{0}$, and Lipschitz $u\in > W^{1,\infty}(B_{R}\times I)$, there exists a measurable set > $A=A(\varrho,R,I,u)\subset(\varrho,R)$ with $|A|\geq\delta(R-\varrho)$ and > satisfying > > $\displaystyle-\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times > I}\frac{|u|^{2}}{2}(b\cdot > n)\,dx\,dt\leq\frac{MR_{0}^{\alpha}}{\delta^{\alpha}R_{0}^{2}(R-\varrho)^{\alpha}}\int\kern-3.39996pt\int_{(B_{R}\setminus > B_{\varrho})\times I}|u|^{2}\,dx\,dt$ (FBC) > $\displaystyle\quad\quad+N\int\kern-3.39996pt\int_{(B_{R}\setminus > B_{\varrho})\times I}|\nabla u|^{2}\,dx\,dt+\varepsilon\sup_{t\in > I}\int_{B_{R}}|u(x,t)|^{2}\,dx,$ > > where $B_{A}=\cup_{r\in A}\partial B_{r}$ and $n$ is the outer unit normal. The LHS of (FBC) appears on the RHS of the energy estimates. In the situations we consider, $M$ may depend on $R_{0}$, and we can predict its dependence based on dimensional analysis. For example, since $b$ has dimensions of $L^{-1}$, the quantity $R_{0}^{1-\frac{2}{q}-\frac{n}{p}}\|b\|_{L^{q}_{t}L^{p}_{x}(B_{R_{0}}\times R_{0}^{2}I)}$ is dimensionless. In Proposition 2.3, we show that (FBC) is satisfied under the hypotheses of Theorems 1.1 and 1.2. _Notation_. In this section, $R_{0}/2\leq\varrho<R\leq R_{0}$ and $-\infty<T<\tau<0$. Let us introduce the backward parabolic cylinders $Q_{R,T}=B_{R}\times(T,0)$. Our working assumptions are that $\theta$ is a non-negative Lipschitz function and $b$ is a smooth, divergence-free vector field. To give precise constants, we will frequently use the notation $\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)=\frac{1}{\delta^{2}(R-r)^{2}}+\frac{MR_{0}^{\alpha}}{\delta^{\alpha}R_{0}^{2}(R-r)^{\alpha}}+\frac{1}{\tau-T}$ (2.1) involving the various parameters from (FBC). Our convention throughout the paper is that all implied constants may depend on $n$. ###### Theorem 2.1 (Local boundedness). Let $\theta$ be a non-negative Lipschitz subsolution and $b$ satisfy (FBC) on $Q_{R,T}$. Then, for all $\gamma\in(0,2]$, $\sup_{Q_{\varrho,\tau}}\theta\lesssim_{N,\alpha,\varepsilon,\gamma}\mathbf{C}^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{R,T}\setminus Q_{\varrho,\tau})}.$ (2.2) ###### Theorem 2.2 (Harnack inequality). Let $\theta$ be a non-negative Lipschitz solution on $Q^{*}=B\times(-T^{*},T^{*})$. Let $b\in L^{2}_{t}H^{-1}_{x}(Q^{*};\mathbb{R}^{n})$ satisfying (FBC) on $Q^{*}$. Let $0<\ell<T^{*}$ be the time lag. Then $\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\theta\lesssim_{N,M,A,T^{*},\delta,\alpha,\varepsilon,\ell}\inf_{B_{1/2}\times(\ell,T^{*})}\theta,$ (2.3) where $A=\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(Q^{*};\mathbb{R}^{n})}^{2}$. ### 2.1. Verifying (FBC) We verify that (FBC) is satisfied in the setting of the main theorems: ###### Proposition 2.3 (Verifying FBC). Let $p,q,\beta,\gamma\in[1,+\infty]$, $\kappa\in(0,+\infty]$, and $b$ be a smooth, divergence-free vector field defined on $B_{R_{0}}\times I_{0}$. 1\. If $b\in L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0}),\quad\beta\geq\frac{n}{2},\quad\zeta_{0}:=\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}<2,$ (2.4) then $b$ satisfies (FBC) with $\alpha=1/\theta_{2}$, $A=(\varrho,R)$, $\delta=1$, $N=\varepsilon=1/4$, and $M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.5) where $\theta_{2}=1-\zeta_{0}/2$. 2\. If $b\in L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0}),\quad p\leq q,\quad\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (2.6) then $b$ satisfies (FBC) with $\alpha=(1/\kappa+(q-1)/q)/\theta_{2}$, $\delta=1/2$, $N=\varepsilon=1/4$, and $M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.7) where $\theta_{2}=1-\zeta_{0}/2$. ###### Corollary 2.4 (FBC in $L^{p}_{x}L^{q}_{t}$). Let $p,q\in[1,+\infty]$ and $b$ be as above. If $b\in L^{p}_{x}L^{q}_{t}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0}),\quad p\leq q,\quad\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (2.8) then $b$ satisfies (FBC) with $\alpha=(1/p+(q-1)/q)/\theta_{2}$, $\delta=1/2$, $N=\varepsilon=1/4$, and $M=C\left(R_{0}^{1-\zeta_{0}}\|b\|_{L^{p}_{x}L^{q}_{t}((B_{R_{0}}\setminus B_{R_{0}/2})\times I_{0})}\right)^{\frac{1}{\theta_{2}}}+\frac{1}{4},$ (2.9) where $\theta_{2}=1-\zeta_{0}/2$. By Minkowski’s inequality, (2.8) is a special case of (2.6) with $\kappa=p$. ###### Remark 2.5. Condition (2.4) automatically enforces $q\in(1,+\infty]$ and $\gamma\in\left(\frac{n-1}{2},+\infty\right]$. Condition (2.6) automatically enforces $q\in\left(\frac{n+2}{2},+\infty\right]$ and $p\in\left(\frac{n-1}{2},+\infty\right]$. ###### Proof of Proposition 2.3. First, we rescale $R_{0}=1$. Let $1/2\leq\varrho<R\leq 1$, $I\subset I_{0}$. We restrict to $n\geq 3$ and summarize $n=2$ afterward. Unless stated otherwise, the norms below are on $(B_{R}\setminus B_{\varrho})\times I$. 1\. Summary of embeddings for $u$. By the Sobolev embedding theorem, we have $\|u\|_{L^{2}_{t}L^{2^{*}_{n}}_{x}}\lesssim\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}},\quad 2^{*}_{n}=\frac{2n}{n-2}.$ (2.10) After interpolating with $\|u\|_{L^{\infty}_{t}L^{2}_{x}}$ and $\|u\|_{L^{2}_{t,x}}$, we have $\|u\|_{L^{q_{1}}_{t}L^{p_{1}}_{x}}\lesssim\|u\|_{L^{2}}^{\theta_{1}}(\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{1-\theta_{1}}$ (2.11) for suitable $\theta_{1}=\theta_{1}(q_{1},p_{1})\in(0,1)$ whenever $\frac{2}{q_{1}}+\frac{n}{p_{1}}>\frac{n}{2},\quad q_{1}\in[2,+\infty),\quad p_{1}\in[2,2^{*}_{n}).$ (2.12) Next, we employ the Sobolev embedding theorem on the spheres $\partial B_{r}$, $r\in(\varrho,R)$: $\|u\|_{L^{2}_{t}L^{2}_{r}L^{2^{*}_{n-1}}_{\sigma}}\lesssim\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}}.$ (2.13) Interpolating with (2.11), we have $\|u\|_{L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}}\lesssim\|u\|_{L^{2}}^{\theta_{2}}(\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{1-\theta_{2}}$ (2.14) for suitable $\theta_{2}=\theta_{2}(q_{2},\beta_{2},\gamma_{2})\in(0,1)$ whenever $\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}>\frac{n}{2},\quad q_{2}\in[2,+\infty),\quad\beta_{2}\in[2,2^{*}_{n}),\quad\gamma_{2}\in[2,2^{*}_{n-1}).$ (2.15) The condition (2.15) describes a region in the parameter space $\\{(1/q_{2},1/\beta_{2},1/\gamma_{2})\\}\subset\mathbb{R}^{3}$ in a tetrahedron with vertices $(1/2,1/2,1/2)$, $(1/2,1/2^{*}_{n},1/2^{*}_{n})$, $(1/2,1/2,1/2^{*}_{n-1})$, and $(0,1/2,1/2)$. We compute $\theta_{2}$ according to $\theta_{2}\left(\frac{n+2}{2}\right)+(1-\theta_{2})\left(\frac{n+2}{2}-1\right)=\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}.$ (2.16) 2\. Verifying (FBC) for condition (2.4). Choose $q_{2}/2=q^{\prime}$ and $\beta_{2}/2=\beta^{\prime}$, where ′ denotes Hölder conjugates. This is admissible according to the restrictions on $q$, $\beta$, $q_{2}$, and $\beta_{2}$ described in (2.4), Remark 2.5, and (2.15). We choose $\gamma_{2}$ to satisfy $\left(\frac{2}{q}+\frac{1}{\beta}+\frac{n-1}{\gamma}\right)+2\left(\frac{2}{q_{2}}+\frac{1}{\beta_{2}}+\frac{n-1}{\gamma_{2}}\right)=n+2.$ (2.17) This is possible according to the numerology in (2.4) and (2.15). Unfolding (2.17), we find $\gamma_{2}/2=\gamma^{\prime}$. Finally, we choose $A=(\varrho,R)$ and compute $\theta_{2}$ according to (2.16). Then $\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times I}\frac{|u|^{2}}{2}b\cdot n\,dx\,dt\right|\leq\frac{1}{R-\varrho}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}\|u\|_{L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}}^{2}$ (2.18) $\displaystyle\quad\overset{\eqref{eq:uinterpineq}}{\leq}\frac{C}{R-\varrho}\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}\|u\|_{L^{2}}^{2\theta_{2}}(\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{2-2\theta_{2}}$ $\displaystyle\quad\quad\leq C\frac{\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}}^{\frac{1}{\theta_{2}}}}{(R-\varrho)^{\frac{1}{\theta_{2}}}}\|u\|_{L^{2}}^{2}+\frac{1}{4}(\|u\|_{L^{2}}^{2}+\|\nabla u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}),$ where we used Young’s inequality in the last step. This implies (FBC). 3\. Verifying (FBC) for condition (2.6). First, we identify _good slices_ for $b$. Specifically, we apply Chebyshev’s inequality in $r$ to the integrable function $r\mapsto\big{\lVert}b|_{I\times\partial B_{r}}\big{\rVert}_{L^{q}_{t}L^{p}_{\sigma}(I\times\partial B_{r})}^{\kappa}$ (2.19) to obtain that, on a set $A=A(\varrho,R,I)$ of measure $|A|\geq(R-\varrho)/2$, we have $\lVert b\rVert_{L^{\infty}_{r}L^{q}_{t}L^{p}_{\sigma}(B_{A}\times I)}\lesssim\frac{1}{(R-\varrho)^{\frac{1}{\kappa}}}\lVert b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus B_{\varrho})\times I)}$ (2.20) where $B_{A}=\cup_{r\in A}\partial B_{r}$. Now we choose $q_{2}/2=q^{\prime}$, $\beta_{2}=q_{2}$, and $\gamma_{2}\in[2,2^{*}_{n-1})$ satisfying (2.15) and $\left(\frac{3}{q}+\frac{n-1}{p}\right)+2\left(\frac{3}{q_{2}}+\frac{n-1}{\gamma_{2}}\right)=n+2.$ (2.21) Unfolding (2.21), we discover $\gamma_{2}/2=p^{\prime}$. This allows us to compute $\theta_{2}$ according to (2.16). Moreover, since $q_{2}=\beta_{2}$ in (2.15), we have $L^{q_{2}}_{t}L^{\beta_{2}}_{r}L^{\gamma_{2}}_{\sigma}=L^{\beta_{2}}_{r}L^{q_{2}}_{t}L^{\gamma_{2}}_{\sigma}$. Then $\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times I}\frac{|u|^{2}}{2}b\cdot n\,dx\,dt\right|\leq\frac{C}{R-\varrho}\|b\|_{L^{\infty}_{r}L^{q}_{t}L^{p}_{\sigma}}(R-\varrho)^{1-\frac{2}{\beta_{2}}}\|u\|_{L^{\beta_{2}}_{r}L^{q_{2}}_{t}L^{\gamma_{2}}_{\sigma}}^{2}$ (2.22) $\displaystyle\quad\overset{\eqref{eq:uinterpineq}}{\leq}\frac{C}{(R-\varrho)^{\frac{1}{\kappa}+\frac{2}{\beta_{2}}}}\lVert b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{R}\setminus B_{\varrho})\times I)}\|u\|_{L^{2}}^{2\theta_{2}}(\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}}+\|u\|_{L^{\infty}_{t}L^{2}_{x}})^{2(1-\theta_{2})}$ $\displaystyle\quad\quad\leq C\frac{\lVert b\rVert_{L^{\kappa}_{r}L^{q}_{t}L^{p}_{\sigma}((B_{1}\setminus B_{1/2})\times I)}^{\frac{1}{\theta_{2}}}}{(R-\varrho)^{\frac{1}{\theta_{2}}(\frac{1}{\kappa}+\frac{2}{\beta_{2}})}}\|u\|_{L^{2}}^{2}+\frac{1}{4}(\|u\|_{L^{2}}^{2}+\|\nabla u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}).$ This completes the proof of (FBC). 4\. Dimension $n=2$. The Sobolev embedding (2.13) on the sphere bounds instead $\|u\|_{L^{2}_{t}L^{2}_{r}C^{1/2}_{\sigma}}\lesssim\|u\|_{L^{2}}+\|\nabla u\|_{L^{2}},$ so we must adjust the proof of the interpolation (2.14). After the initial interpolation step between $L^{2}_{t}L^{2^{*}_{n}}_{x}$, $L^{\infty}_{t}L^{2}_{x}$ and $L^{2}_{t,x}$ (where $2^{*}_{n}$ is now any large finite number), we apply the following Gagliardo-Nirenberg inequality on spheres: $\|u\|_{L^{q}(B_{r})}\lesssim\|u\|_{L^{p}(B_{r})}^{\theta}\|u\|_{C^{1/2}(B_{r})}^{1-\theta},\quad-\frac{n-1}{q}=\theta\left(-\frac{n-1}{p}\right)+\frac{1-\theta}{2},$ (2.23) where $p,q\in[1,+\infty]$, $\theta\in(0,1]$, and $r\in[1/2,1]$. This allows us to recover (2.14), where now $\gamma_{2}=+\infty$ is also allowed, and complete the proof. To prove (2.23), we first use local coordinates on the sphere and a partition of unity333Alternatively, since $n=2$, we could argue on the flat torus without a partition of unity. The argument we present here is more general. to reduce to functions $f$ on $\mathbb{R}^{n-1}$. Next, we use that $L^{p}\subset B^{-\frac{n-1}{p}}_{\infty,\infty}$, $C^{1/2}=B^{1/2}_{\infty,\infty}$, and real interpolation $[B^{-\frac{n-1}{p}}_{\infty,\infty},B^{1/2}_{\infty,\infty}]_{\theta,1}=B^{0}_{q,1}\subset L^{q}$ (2.24) to demonstrate $\|f\|_{L^{q}}\lesssim\|f\|_{L^{p}(B_{r})}^{\theta}\|f\|_{C^{1/2}(B_{r})}^{1-\theta}\lesssim\varepsilon^{\frac{1}{\theta}}\|f\|_{L^{p}(B_{r})}+\varepsilon^{-\frac{1}{1-\theta}}\|f\|_{C^{1/2}(B_{r})}.$ (2.25) We piece together $u$ from the functions $f$ and optimize in $\varepsilon$ to obtain (2.23). ∎ ###### Remark 2.6 (On $\widetilde{\text{FBC}}$). For pointwise upper bounds on fundamental solutions in Section 5, we require a global, revised form boundedness condition ($\widetilde{\text{FBC}}$), in which we allow $\varepsilon$ to vary in $(0,+\infty)$. We refine (2.18) by keeping track of the $\varepsilon$ dependence in Hardy’s inequality: $\displaystyle\left|\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times I}\frac{|u|^{2}}{2}b\cdot n\,dx\,dt\right|\leq\frac{C\|b\|_{L^{q}_{t}L^{\beta}_{r}L^{\gamma}_{\sigma}((B_{R}\setminus B_{\varrho})\times I)}^{\frac{1}{\theta_{2}}}}{\varepsilon^{\frac{1-\theta_{2}}{\theta_{2}}}(R-\varrho)^{\frac{1}{\theta_{2}}}}\|u\|_{L^{2}}^{2}+\varepsilon\left(\|u\|_{L^{2}}^{2}+\|\nabla u\|_{L^{2}}^{2}+\|u\|_{L^{\infty}_{t}L^{2}_{x}}^{2}\right),$ (2.26) A similar refinement holds in (2.22). We require these refinements in the justification of Lemma 5.3. ### 2.2. Proof of local boundedness To begin, we prove Cacciopoli’s inequality: ###### Lemma 2.7 (Cacciopoli inequality). Under the hypotheses of Theorem 2.1, $\sup_{t\in(\tau,0)}\int_{B_{r}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.27) ###### Proof of Lemma 2.7. Let $\eta\in C^{\infty}_{0}(T,+\infty)$ satisfying $0\leq\eta\leq 1$ on $\mathbb{R}$, $\eta\equiv 1$ on $(\tau,+\infty)$ and $0\leq d\eta/dt\lesssim 1/(\tau-T)$. Let $r\in(\varrho,R)$ and $t\in(\tau,0)$. To begin, we multiply by $\theta\eta^{2}$ and integrate over $B_{r}\times(T,t)$: $\displaystyle\frac{1}{2}\int_{B_{r}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{B_{r}\times(\tau,t)}|\nabla\theta|^{2}\,dx\,ds$ (2.28) $\displaystyle\quad\leq\int\kern-3.39996pt\int_{B_{R}\times(T,t)}|\theta|^{2}\frac{d\eta}{ds}\eta\,dx\,ds+\int\kern-3.39996pt\int_{\partial B_{r}\times(T,t)}\Big{(}\frac{d\theta}{dn}\theta\eta^{2}-\frac{\theta^{2}}{2}(b\cdot n)\eta^{2}\Big{)}\,d\sigma\,ds.$ Next, we average in the $r$ variable over the set of ‘good slices’, $A=A(\varrho,R,(T,t),\theta\eta)$, which was defined in (FBC): $\displaystyle\frac{1}{2}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{B_{\varrho}\times(\tau,t)}|\nabla\theta|^{2}\,dx\,ds$ (2.29) $\displaystyle\quad\leq\frac{C}{\tau-T}\int\kern-3.39996pt\int_{B_{R}\times(T,\tau)}|\theta|^{2}\,dx\,ds+\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\Big{(}\frac{d\theta}{dn}\theta\eta^{2}-\frac{\theta^{2}}{2}(b\cdot n)\eta^{2}\Big{)}\,dx\,ds,$ where $B_{A}=\cup_{r\in A}\partial B_{r}$. Let us estimate the term containing $d\theta/dn$: $\displaystyle\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\frac{d\theta}{dn}\theta\eta^{2}\,dx\,ds$ (2.30) $\displaystyle\quad\leq\frac{1}{\delta^{2}(R-r)^{2}}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,ds+\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,ds.$ To estimate the term containing $b$, we use (FBC) with $u=\theta\eta$: $\displaystyle-\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times(T,t)}\frac{\theta^{2}}{2}(b\cdot n)\eta^{2}\,dx\,ds\leq\frac{M}{\delta^{\alpha}(R-r)^{\alpha}}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,ds$ (2.31) $\displaystyle\quad+N\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,ds+\varepsilon\sup_{s\in(T,t)}\int_{B_{R}}|\theta(x,s)|^{2}\,dx.$ Combining everything and applying $\sup_{t\in(T,0)}$, we obtain $\displaystyle\frac{1}{2}\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\leq C\times\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt$ (2.32) $\displaystyle\quad\quad+(1+N)\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt+\varepsilon\sup_{t\in(T,0)}\int_{B_{R}}|\theta(x,t)|^{2}\,dx.$ By Widman’s hole-filling trick, there exists $\gamma:=\max\\{(N+1)/(N+2),2\varepsilon\\}\in(0,1)$ satisfying $\displaystyle\frac{1}{2(N+2)}\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\theta|^{2}\,dx\,dt\leq C(N)\times\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt$ (2.33) $\displaystyle\quad\quad+\gamma\int\kern-3.39996pt\int_{Q_{R,T}}|\nabla\theta|^{2}\,dx\,dt+\frac{\gamma}{2(N+2)}\sup_{t\in(T,0)}\int_{B_{R}}|\theta(x,t)|^{2}\,dx.$ To remove the extra terms on the RHS, we use a standard iteration argument on a sequence of scales (progressing ‘outward’) $\varrho_{0}=\varrho$, $\varrho_{k+1}=\varrho+(1-\lambda^{k+1})(R-\varrho)$, $R_{k}=\varrho_{k+1}$, $\tau_{0}=\tau$, $\tau_{k+1}=\tau+(1-\lambda^{2k+2})(T-\tau)$, $T_{k}=\tau_{k+1}$, $k=0,1,2,\ldots$, where $0<\lambda<1$ is defined by the relation $\lambda^{\max(\alpha,2)}=\gamma/2$. See [Giu03, p. 191, Lemma 6.1], for example. This gives the desired Cacciopoli inequality. ∎ Next, we require a simple corollary: ###### Corollary 2.8 (Interpolation inequality). Let $\chi=1+2/n$. Then $\left(\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\theta|^{2\chi}\,dx\,dt\right)^{\frac{1}{\chi}}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.34) ###### Proof. Let $0\leq\varphi\in C^{\infty}_{0}(B_{(R+\varrho)/2})$ satisfying $\varphi\equiv 1$ on $B_{\varrho}$ and $|\nabla\varphi|\lesssim 1/(R-\varrho)$. Using (2.27) at an intermediate scale, we find $\displaystyle\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\theta(x,t)\varphi|^{2}\,dx+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla(\theta\varphi)|^{2}\,dx\,dt\lesssim_{N,\alpha,\varepsilon}\mathbf{C}\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\theta|^{2}\,dx\,dt.$ (2.35) Then (2.34) follows from the Gagliardo-Nirenberg inequality on the whole space. ∎ We are now ready to use Moser’s iteration: ###### Proof of local boundedness. Let $\beta_{k}:=\chi^{k}$, where $k=0,1,2,\ldots$. A standard computation implies that $\theta^{\beta_{k}}$ is also a non-negative Lipschitz subsolution. Hence, it satisfies the Cacciopoli inequality (2.34) with $R_{k}=\varrho+2^{-k}(R-\varrho)$, $r_{k}=R_{k+1}$, $T_{k}=\tau-2^{-2k}(\tau-T)$, $\tau_{k}=T_{k+1}$, $k=0,1,2,\ldots$ (iterating inward). In other words, $\lVert\theta^{2\beta_{k+1}}\rVert_{L^{1}(Q_{\varrho_{k},\tau_{k}})}^{\frac{1}{\chi}}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}(\varrho_{k},\tau_{k},R_{k},T_{k},M,\delta,\alpha)\lVert\theta^{2\beta_{k}}\rVert_{L^{1}(Q_{R_{k},T_{k}}\setminus Q_{\varrho_{k},\tau_{k}})}.$ (2.36) We may expand the domain of integration on the RHS as necessary. Define $M_{0}:=\lVert\theta^{2}\rVert_{L^{1}(Q_{R_{0},T_{0}}\setminus Q_{\varrho_{0},\tau_{0}})}$ (2.37) and $M_{k+1}:=\lVert\theta^{2}\rVert_{L^{\beta_{k+1}}(Q_{\varrho_{k},\tau_{k}})}=\lVert\theta^{2\beta_{k+1}}\rVert_{L^{1}(Q_{\varrho_{k},\tau_{k}})}^{\frac{1}{\beta_{k+1}}},\quad k=0,1,2,\ldots$ (2.38) Raising (2.36) to $1/\beta_{k}$ and using Eq. (2.1) defining $\mathbf{C}$, we obtain $M_{k+1}\leq C(N,\alpha,\varepsilon)^{\frac{1}{\beta_{k}}}2^{\frac{\max(2,\alpha)k}{\beta_{k}}}\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)^{\frac{1}{\beta_{k}}}M_{k}.$ (2.39) Iterating, we have $M_{k+1}\leq C(N,\alpha,\varepsilon)^{\sum_{j=0}^{k}\frac{1}{\chi^{j}}}2^{\sum_{j=0}^{k}\frac{\max(2,\alpha)j}{\chi^{j}}}\mathbf{C}(\varrho,\tau,R,T,M,\delta,\alpha)^{\sum_{j=0}^{k}\frac{1}{\chi_{j}}}M_{0}.$ (2.40) Finally, we send $k\to+\infty$ and substitute $\sum_{j\geq 0}1/\chi^{j}=(n+2)/2$ to obtain $\lVert\theta\rVert_{L^{\infty}(Q_{\varrho,\tau})}\lesssim_{N,\alpha,\varepsilon}\mathbf{C}^{\frac{n+2}{4}}\lVert\theta\rVert_{L^{2}(Q_{R,T}\setminus Q_{\varrho,\tau})}.$ (2.41) We now demonstrate how to replace $L^{2}$ on the RHS of (2.34) with $L^{\gamma}$ ($0<\gamma<2$). To begin, use the interpolation inequality $\lVert\theta\rVert_{L^{2}}\leq\lVert\theta\rVert_{L^{\gamma}}^{\gamma/2}\lVert\theta\rVert_{L^{\infty}}^{1-\gamma/2}$ in (2.41) and split the product using Young’s inequality. This gives $\lVert\theta\rVert_{L^{\infty}(Q_{\varrho,\tau})}\leq C(N,\alpha,\varepsilon,\gamma)\mathbf{C}^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{R,T}\setminus Q_{\varrho,\tau})}+\frac{1}{2}\lVert\theta\rVert_{L^{\infty}(Q_{R,T})}.$ (2.42) The second term on the RHS is removed by iterating outward along a sequence of scales, as in the proof of the Cacciopoli inequality in Lemma 2.7. ∎ ###### Remark 2.9 (Elliptic case). The analogous elliptic result is $\sup_{B_{\varrho}}\theta\lesssim_{N,\alpha,\varepsilon,\gamma}\mathbf{C}^{\frac{n}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(B_{R}\setminus B_{\varrho})},$ (2.43) where $\mathbf{C}(\varrho,R,M,\delta,\alpha)=1/[\delta^{2}(R-\varrho)^{2}]+MR_{0}^{\alpha-2}/[\delta^{\alpha}(R-\varrho)^{\alpha}]$. The proof is the same except that $\chi=n/(n-2)$ and $\sum 1/\chi^{j}=n/2$. ### 2.3. Proof of Harnack inequality In this subsection, $\theta$ is a strictly positive Lipschitz solution.444There is no loss of generality if we replace $\theta$ by $\theta+\kappa$ and let $\kappa\to 0^{+}$. Then $\log\theta$ is well defined. Let $0\leq\psi\in C^{\infty}_{0}(B)$ be a radially decreasing function satisfying $\psi\equiv 1$ on $B_{3/4}$. We use the notation $f_{\rm avg}=\frac{1}{{\rm Vol}}\int_{\mathbb{R}^{n}}f\psi^{2}\,dx,\quad{\rm Vol}=\int_{\mathbb{R}^{n}}\psi^{2}\,dx,$ (2.44) whenever $f\in L^{1}_{\rm loc}(B)$. Let $\mathbf{K}=\exp\left(\log\theta(\cdot,0)\right)_{\rm avg}.$ (2.45) whose importance will be made clear in the proof of Lemma 2.11. Define $v=\log\left(\frac{\theta}{\mathbf{K}}\right).$ (2.46) Then $v(\cdot,0)_{\rm avg}=0$. A simple computation yields $|\nabla v|^{2}=\partial_{t}v-\Delta v+b\cdot\nabla v.$ (2.47) That is, $v$ is itself a supersolution, though it may not itself be positive. We crucially exploit that $|\nabla v|^{2}$ appears on the LHS of (2.47). First, we require the following decomposition of the drift: ###### Lemma 2.10 (Decomposition of drift). We have the following decomposition on $B_{3/4}\times(-T^{*},T^{*})$: $b=b_{1}+b_{2},\quad b_{1}=-\operatorname{div}a,\quad\operatorname{div}b_{2}=0,$ (2.48) where $a:B_{3/4}\times(-T^{*},T^{*})\to\mathbb{R}^{n\times n}_{\rm anti}$ is antisymmetric and $\|a\|_{L^{2}(B_{3/4}\times(-T^{*},T^{*}))}+\|b_{2}\|_{L^{2}(B_{3/4}\times(-T^{*},T^{*}))}\lesssim\|b\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})},$ (2.49) where $Q^{*}=B_{1}\times(-T^{*},T^{*})$. ###### Proof. Let $\phi\in C^{\infty}_{0}(B_{1})$ with $\phi\equiv 1$ on $B_{15/16}$. Let $\widetilde{b}=\phi b$. Hence, $\|\widetilde{b}\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})}\lesssim\|b\|_{L^{2}_{t}H^{-1}_{x}(Q^{*})}$. We may decompose $\widetilde{b}(\cdot,t)\in H^{-1}(\mathbb{R}^{n})$ into $\widetilde{b}_{1}(\cdot,t)\in\dot{H}^{-1}(\mathbb{R}^{n})$, whose Fourier transform is supported outside of $B_{2}$, and $\widetilde{b}_{2}(\cdot,t)\in L^{2}(\mathbb{R}^{n})$. Define $a_{ij}=\Delta^{-1}(-\partial_{j}\widetilde{b}_{1i}+\partial_{i}\widetilde{b}_{1j}),\quad g=\Delta^{-1}(-\operatorname{div}\widetilde{b}_{1}).$ (2.50) This amounts to performing the Hodge decomposition in $\mathbb{R}^{n}$ ‘by hand’.555We are simply exploiting the identity $\Delta=dd^{*}+d^{*}d$ on differential $k$-forms, up to a sign convention, for differential $1$-forms $\cong$ vector fields. Clearly, $a$ is antisymmetric, and we have the decomposition $-\widetilde{b}_{1}=\operatorname{div}a+\nabla g$ (2.51) and the estimates $\|a(\cdot,t)\|_{L^{2}(\mathbb{R}^{n})}+\|g(\cdot,t)\|_{L^{2}(\mathbb{R}^{n})}\lesssim\|\widetilde{b}_{1}(\cdot,t)\|_{\dot{H}^{-1}(\mathbb{R}^{n})}.$ (2.52) Similarly, we decompose $\widetilde{b}_{2}=\mathbb{P}\widetilde{b}_{2}+\mathbb{Q}\widetilde{b}_{2},$ (2.53) where $\mathbb{P}$ is the Leray (orthogonal) projector onto divergence-free fields, and $\mathbb{Q}=I-\mathbb{P}$ is the orthogonal projector onto gradient fields. We denote $\mathbb{Q}\widetilde{b}_{2}=\nabla f$. Since $\widetilde{b}=\widetilde{b}_{1}+\widetilde{b}_{2}=-\operatorname{div}a+\mathbb{P}\widetilde{b}_{2}+\nabla(f-g)$ is divergence free in $B_{7/8}$ on time slices, we have $\Delta(f-g)(\cdot,t)=0\text{ in }B_{7/8},$ (2.54) and by elliptic regularity, for all $k\geq 0$, $\|\nabla(f-g)(\cdot,t)\|_{H^{k}(B_{3/4})}\lesssim_{k}\|\widetilde{b}_{1}(\cdot,t)\|_{\dot{H}^{-1}(B_{7/8})}+\|\widetilde{b}_{2}(\cdot,t)\|_{L^{2}(B_{7/8})}.$ (2.55) Finally, we define $b_{2}=\mathbb{P}\widetilde{b}_{2}+\nabla(f-g)\in L^{2}_{t,x}(B_{3/4}\times(-T^{*},T^{*})),$ (2.56) which satisfies the claimed estimates and is divergence free in $B_{7/8}\times(-T^{*},T^{*})$. ∎ We now proceed with the proof of Harnack’s inequality: ###### Lemma 2.11. For all non-zero $t\in[-T^{*},T^{*}]$, we write $I_{t}=[0,t]$ if $t>0$ and $I_{t}=[t,0]$ if $t<0$. Then $-\operatorname{sgn}(t)v(\cdot,t)_{\rm avg}+\int_{I_{t}}\left(|\nabla v|^{2}(\cdot,s)\right)_{\rm avg}\,ds\lesssim|t|+\lVert b\rVert_{L^{2}_{t}H^{-1}_{x}(B\times I_{t})}^{2}.$ (2.57) ###### Proof. We multiply (2.47) by $\psi^{2}$ and integrate over $B\times I_{t}$: $\operatorname{sgn}(t)\int_{B}\left(v(x,0)-v(x,t)\right)\psi^{2}\,dx+\int\kern-3.39996pt\int_{B\times I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds\leq\int\kern-3.39996pt\int_{B\times I_{t}}2\psi\nabla\psi\cdot\nabla v+(b\cdot\nabla v)\psi^{2}\,dx\,ds.$ (2.58) By (2.45), $\int_{\mathbb{R}^{n}}v(x,0)\psi^{2}\,dx=0$. The first term on the RHS is easily estimated: $\int\kern-3.39996pt\int_{B\times I_{t}}2\psi\nabla\psi\cdot\nabla v\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds+C|t|.$ (2.59) To estimate the term containing $b$, we require the drift decomposition $b=b_{1}+b_{2}$ from Lemma 2.10. Then $\int\kern-3.39996pt\int_{B\times I_{t}}(b_{1}\cdot\nabla v)\psi^{2}\,dx\,ds=\int\kern-3.39996pt\int_{B\times I_{t}}2\psi a(\nabla\psi,\nabla v)\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds+C\lVert a\rVert_{L^{2}(B\times I_{t})}^{2}.$ (2.60) and $\int\kern-3.39996pt\int_{B\times I_{t}}(b_{2}\cdot\nabla v)\psi^{2}\,dx\,ds\leq\frac{1}{4}\int\kern-3.39996pt\int_{B\times I_{t}}|\nabla v|^{2}\psi^{2}\,dx\,ds+C\lVert b_{2}\rVert_{L^{2}(B\times I_{t})}^{2}.$ (2.61) Recall the estimate (2.49) from the decomposition. Combining (2.58)–(2.61) and dividing by ${\rm Vol}$ gives (2.57). ∎ In the following, we write $v=v_{+}-v_{-}$, where $v_{+},v_{-}\geq 0$. We also use the notation $A^{+}=\int_{0}^{T^{*}}\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\,dt,\quad A^{-}=\int_{-T^{*}}^{0}\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\,dt.$ (2.62) ###### Lemma 2.12 (Weak–$L^{1}$ estimates). With the above notation, we have $\lVert v_{+}\rVert_{L^{1,\infty}_{t,x}(B_{3/4}\times(-T^{*},0))}\lesssim 1+T^{*}(T^{*}+A^{-})$ (2.63) and $\lVert v_{-}\rVert_{L^{1,\infty}_{t,x}(B_{3/4}\times(0,T^{*}))}\lesssim 1+T^{*}(T^{*}+A^{+}).$ (2.64) ###### Proof. By (2.57) and a weighted Poincaré inequality [Mos64, Lemma 3, p. 120], $-\operatorname{sgn}(t)v_{\rm avg}(t)+\frac{1}{C_{1}}\int_{I_{t}}\left(|v-v_{\rm avg}|^{2}\right)_{\rm avg}\,ds\leq C_{0}\int_{I_{t}}\left(1+\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\right)ds,$ (2.65) where $C_{0}>0$ is the implied constant in (2.57). In the following, we focus on the case $t\in[-T^{*},0]$. We use (2.65) to obtain a sub/supersolution inequality corresponding to a quadratic ODE. First, we remove the forcing in the ODE by defining $p(x,t):=v(x,t)-C_{0}\underbrace{\int_{I_{t}}\left(1+\|b(\cdot,t)\|_{H^{-1}(B)}^{2}\right)ds}_{\leq T^{*}+A^{-}}.$ (2.66) Then (2.65) becomes $p_{\rm avg}(t)+\frac{1}{C_{1}}\int_{I_{t}}\left(|p-p_{\rm avg}|^{2}\right)_{\rm avg}\,ds\leq 0.$ (2.67) Let us introduce the super-level sets, whose measures $\eta$ appear as a coefficient in the ODE: $\eta(\mu,t):=\left|\\{x\in B_{3/4}:p(x,t)>\mu\\}\right|,\quad\mu>0.$ (2.68) Since $p_{\rm avg}\leq 0$, we have that $p(x,t)-p_{\rm avg}(t)>\mu-p_{\rm avg}(t)>0$ whenever $p(x,t)>\mu$. Then $p_{\rm avg}(t)+\frac{1}{C_{1}{\rm Vol}}\int_{I_{t}}\eta(\mu,s)(\mu-p_{\rm avg})^{2}\,ds\leq 0.$ (2.69) It is convenient to rephrase (2.69) in terms of a positive function evolving forward-in-time: $\bar{p}(t)=-p_{\rm avg}(-t)$ with $t\in[0,T^{*}]$. Then (2.69) becomes $\bar{p}(t)\geq\frac{1}{C_{1}{\rm Vol}}\int_{0}^{t}\eta(\mu,|s|)(\mu+\bar{p}(s))^{2}\,ds.$ (2.70) The above inequality means that $\bar{p}$ is a supersolution of the quadratic ODE $\dot{q}=\frac{1}{C_{1}{\rm Vol}}\times\eta(\mu,|t|)(\mu+q)^{2}$ (2.71) with $q(0)=0$. The above scalar ODE has a comparison principle. _A priori_ , since (2.71) is quadratic, its solutions may quickly blow-up depending on the size of $\eta(\mu,\cdot)$ and $\mu$. However, because $\bar{p}$ lies above the solution $q$, $q$ does not blow up, and we obtain a bound for the density $\eta(\mu,\cdot)$ in the following way. After separating variables in (2.71), we obtain $\frac{1}{C_{1}{\rm Vol}}\int_{0}^{T^{*}}\eta(\mu,|s|)\,ds=\frac{1}{\mu}-\frac{1}{\mu+q(T^{*})}\leq\frac{1}{\mu},$ (2.72) since $q\geq 0$. That is, $\lVert p_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}\lesssim 1.$ (2.73) Finally, since $\lVert\cdot\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$ is a quasi-norm and $v\leq p+C_{0}(T^{*}+A^{-})$ pointwise due to (2.66), we have $\displaystyle\lVert v_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$ $\displaystyle\leq 2\lVert p_{+}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}+2C_{0}\lVert T^{*}+A^{-}\rVert_{L^{1,\infty}(B_{3/4}\times(-T^{*},0))}$ (2.74) $\displaystyle\lesssim 1+T^{*}(T^{*}+A^{-}).$ The proof for $t\in[0,T^{*}]$ is similar except that one uses sub-level sets in (2.68) with $\mu<0$. ∎ We now require the following lemma of Moser [Mos71], which we quote almost directly, and in which we denote by $Q(\varrho)$, $\varrho>0$ any family of domains satisfying $Q(\varrho)\subset Q(r)$ for $0<\varrho<r$. ###### Lemma 2.13 (Lemma 3 in [Mos71]). Let $m,\zeta,c_{0}$, $1/2\leq\theta_{0}<1$ be positive constants, and let $w>0$ be a continuous function defined in a neighborhood of $Q(1)$ for which $\sup_{Q(\varrho)}w^{p}<\frac{c_{0}}{(r-\varrho)^{m}{\rm meas}(Q(1))}\int\kern-3.39996pt\int_{Q(r)}w^{p}\,dt\,dx$ (2.75) for all $\varrho,r,p$ satisfying $\frac{1}{2}\leq\theta_{0}\leq\varrho<r\leq 1,\quad 0<p<\zeta^{-1}.$ (2.76) Moreover, let ${\rm meas}\\{(x,t)\in Q(1):\log w>\mu\\}<\frac{c_{0}\zeta}{s}{\rm meas}(Q(1))$ (2.77) for all $\mu>0$. Then there exists a constant function $\gamma=\gamma(\theta_{0},m,c_{0})$ such that $\sup_{Q(\theta_{0})}w<\gamma^{\zeta}.$ (2.78) ###### Proof of Harnack inequality. We apply Lemma 2.13 to $w=\theta/\mathbf{K}$ with $Q(\varrho)=B_{\varrho}\times(-T^{*}+2\ell(1-\varrho),0)$ and $\theta_{0}=1/2$.666Technically, to satisfy the conditions in Lemma 2.13, $w=\theta/\mathbf{K}$ should be extended arbitrarily to be continuous in a neighborhood of $Q(1)$. Indeed, we recognize the requirement (2.75) as the local boundedness guaranteed by Theorem 2.1 and (2.77) as the weak $L^{1}$ estimate from Lemma 2.12. This gives $\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\frac{\theta}{\mathbf{K}}\lesssim 1.$ (2.79) Here, we suppress also the dependence on the time lag $\ell$. Meanwhile, $v_{-}=\log_{+}(\mathbf{K}/\theta)$ is a subsolution. Hence, $\lVert v_{-}\rVert_{L^{\infty}(B_{1/2}\times(\ell,T^{*}))}\lesssim\lVert v_{-}\rVert_{L^{1,\infty}(B_{3/4}\times(0,T^{*}))}.$ (2.80) On the other hand, $\frac{\mathbf{K}}{\inf\theta}=\sup\frac{\mathbf{K}}{\theta}=\exp\left(\sup\log\frac{\mathbf{K}}{\theta}\right)\leq\exp\left(\sup v_{-}\right)\lesssim\exp\left(\lVert v_{-}\rVert_{L^{1,\infty}}\right)\lesssim 1,$ (2.81) where the $\inf$ and $\sup$ are taken on $B_{1/2}\times(\ell,T^{*})$. Combining (2.79) and (2.81), we arrive at $\sup_{B_{1/2}\times(-T^{*}+\ell,0)}\theta\lesssim\mathbf{K}\lesssim\inf_{B_{1/2}\times(\ell,T^{*})}\theta,$ (2.82) as desired. ∎ ## 3\. Bounded total speed In this section, we prove the statements in Theorem 1.1 concerning the space $L^{1}_{t}L^{\infty}_{x}$. ###### Proposition 3.1 (Local boundedness). Let $T\in(-\infty,0)$ and $\tau\in(T,0)$. Let $b\colon Q_{1,T}\to\mathbb{R}^{n}$ be a smooth divergence-free drift satisfying $\lVert b\rVert_{L^{1}_{t}L^{\infty}_{x}(Q_{1,T})}\leq 1/8.$ (3.1) Let $\theta$ be a non-negative Lipschitz subsolution on $Q_{1,T}$. Then, for all $\gamma\in(0,2]$, we have $\|\theta\|_{L^{\infty}(Q_{1/2,\tau})}\lesssim_{\gamma}\left(1+\frac{1}{\tau-T}\right)^{\frac{n+2}{2\gamma}}\lVert\theta\rVert_{L^{\gamma}(Q_{1,T})}.$ (3.2) ###### Proof. For smooth $\lambda:[T,0]\to(0,+\infty)$, we define $x=\lambda y$ and $\widetilde{\theta}(y,t)=\theta(\lambda y,t).$ (3.3) That is, $\widetilde{\theta}$ is obtained by dynamically rescaling $\theta$ in space. The new PDE is $\partial_{t}\widetilde{\theta}-\frac{1}{\lambda^{2}}\Delta_{y}\widetilde{\theta}+\frac{1}{\lambda}\widetilde{b}\cdot\nabla_{y}\widetilde{\theta}\leq 0$ (3.4) where $\widetilde{b}(y,t)=b(\lambda y,t)-\dot{\lambda}y.$ (3.5) Choose $\lambda(T)=1$, $\dot{\lambda}=-2\|b(\cdot,t)\|_{L^{\infty}}$ when $t\in[T,0]$. Clearly, $3/4\leq\lambda\leq 1$. Our picture is that $\widetilde{\theta}$ dynamically ‘zooms in’ on $\theta$. In particular, using (3.1) and (3.5), $\widetilde{b}(\cdot,t)\cdot\frac{y}{|y|}\geq-\|b(\cdot,t)\|_{L^{\infty}}+2\|b(\cdot,t)\|_{L^{\infty}}|y|\geq 0\text{ when }y\in B_{1}\setminus B_{1/2},$ (3.6) and $\operatorname{div}\widetilde{b}=2n\|b(\cdot,t)\|_{L^{\infty}}\geq 0.$ (3.7) We now demonstrate Cacciopoli’s inequality in the new variables. Let $3/4\leq\varrho<R\leq 1$. Let $\varphi\in C^{\infty}_{0}(B_{R})$ be a radially symmetric and decreasing function satisfying $0\leq\varphi\leq 1$ on $\mathbb{R}^{n}$, $\varphi\equiv 1$ on $B_{\varrho}$, and $|\nabla\varphi|\lesssim 1/(R-\varrho)$. Let $\eta\in C^{\infty}_{0}(T,+\infty)$ satisfying $0\leq\eta\leq 1$ on $\mathbb{R}$, $\eta\equiv 1$ on $(\tau,0)$, and $|d\eta/dt|\lesssim 1/(\tau-T)$. Let $\Phi=\varphi^{2}\eta$. We integrate Eq. (3.4) against $\widetilde{\theta}\Phi$ on $B_{R}\times(T,t)$ for $t\in(\tau,0)$. Then $\displaystyle\frac{1}{2}\int|\widetilde{\theta}|^{2}(y,t)\Phi\,dy+\int\kern-3.39996pt\int\lambda^{-2}|\nabla\widetilde{\theta}|^{2}\Phi\,dy\,ds$ (3.8) $\displaystyle\quad\leq\frac{1}{2}\int\kern-3.39996pt\int|\widetilde{\theta}|^{2}\partial_{t}\Phi\,dy\,ds-\int\kern-3.39996pt\int\lambda^{-2}\widetilde{\theta}\nabla\widetilde{\theta}\cdot\nabla\Phi\,dy\,ds$ $\displaystyle\quad\quad+\frac{1}{2}\int\kern-3.39996pt\int\lambda^{-1}\underbrace{\widetilde{b}\cdot\nabla\Phi}_{\leq 0\text{ by }\eqref{eq:tildebpointsoutward}}|\widetilde{\theta}|^{2}\,dy\,ds+\frac{1}{2}\int\kern-3.39996pt\int\lambda^{-1}\operatorname{div}\widetilde{b}|\widetilde{\theta}|^{2}\Phi\,dy\,ds.$ While $\operatorname{div}\widetilde{b}$ has a disadvantageous sign, it simply acts as a bounded potential. Simple manipulations give the Cacciopoli inequality: $\displaystyle\sup_{t\in(\tau,0)}\int_{B_{\varrho}}|\widetilde{\theta}|^{2}(y,t)\,dy+\int\kern-3.39996pt\int_{Q_{\varrho,\tau}}|\nabla\widetilde{\theta}|^{2}\varphi^{2}\,dy\,ds$ (3.9) $\displaystyle\quad\lesssim\left(\frac{1}{\tau-T}+\frac{1}{(R-\varrho)^{2}}\right)\int\kern-3.39996pt\int_{Q_{R,T}\setminus Q_{\varrho,\tau}}|\widetilde{\theta}|^{2}\,dy\,ds.$ The remainder of the proof proceeds as in Theorem 2.1 except in the $(y,t)$ variables. Namely, we have the interpolation inequality as in Corollary 2.8, and $\widetilde{\theta}^{\beta}$ is a subsolution of (3.4) whenever $\beta\geq 1$. Therefore, we may perform Moser’s iteration verbatim. As in (2.42), the $L^{2}$ norm on the RHS may be replaced by the $L^{\gamma}$ norm. Finally, undoing the transformation yields the inequality (3.2) in the $(x,t)$ variables, since $(y,t)\in B_{R}\times\\{t\\}$ corresponds to $(x,t)\in B_{\lambda(t)R}\times\\{t\\}$. ∎ The quantitative local boundedness property in Theorem 1.1 follows from applying Proposition 3.1 and its rescalings on finitely many small time intervals. In Remark 4.3, we justify that the constant depends on the ‘profile’ of $b$ and not just its norm. ## 4\. Counterexamples ### 4.1. Elliptic counterexamples Let $n\geq 3$. Our counterexamples will be axisymmetric in ‘slab’ domains $B_{R}\times(0,1)$, where $R>0$ is arbitrary and $B_{R}$ is a ball in $\mathbb{R}^{n-1}$. We use the notation $x=(x^{\prime},z)$, where $x^{\prime}\in\mathbb{R}^{n-1}$, $r=|x^{\prime}|$, and $z\in(0,1)$. Let $\underaccent{\bar}{\theta}(x)=u(r)z,$ (4.1) $b(x)=V(r)e_{z}.$ (4.2) Since $b$ is a shear flow in the $e_{z}$ direction, it is divergence free. Then $-\Delta\underaccent{\bar}{\theta}+b\cdot\nabla\underaccent{\bar}{\theta}=-z\Delta_{x^{\prime}}u+Vu.$ (4.3) We will a construct a subsolution $\underaccent{\bar}{\theta}$ and supersolution $\bar{\theta}$ using the _steady Schrödinger equation_ $-\Delta u+Vu=0$ (4.4) in dimension $n-1$, where additionally $u\geq 0$ and $V\leq 0$. By the scale invariance in $x^{\prime}$, it will suffice to construct a solution at a single fixed length scale $R=R_{0}$. The way to proceed is well known. We define $u=\log\log\frac{1}{r},$ (4.5) $V=\frac{\Delta u}{u},$ (4.6) for $r\leq R_{0}\ll 1$ so that $u$ is well defined. A simple calculation verifies that $0\leq u\in H^{1}_{\rm loc}$, $\Delta u,V\leq 0$, and $\Delta u,V\in L^{(n-1)/2}_{\rm loc}$.777Since Schrödinger solutions with critical potentials $V$ belong to $L^{p}_{\rm loc}$ for all $p<\infty$ (see Han and Lin [HL97], Theorem 4.4), it is natural to choose $u$ with a $\log$. The double $\log$ ensures that $u$ has finite energy when $n=3$. Notice also that $\Delta u=-(r\log r^{-1})^{-2}$ when $n=3$. Therefore, $Vu=\Delta u\in L^{1}_{\rm loc}$, and the PDE (4.4) is satisfied in the sense of distributions. Using (4.3), we verify that $\underaccent{\bar}{\theta}$ is a distributional subsolution: $-\Delta\underaccent{\bar}{\theta}+b\cdot\nabla\underaccent{\bar}{\theta}=-z\Delta_{x^{\prime}}u+Vu=(1-z)Vu\leq 0\text{ in }B_{R_{0}}\times(0,1),$ (4.7) with equality at $\\{z=1\\}$. We also wish to control solutions from above. Since $\Delta u\leq 0$, we define $\bar{\theta}(x^{\prime},z)=u(r).$ (4.8) Clearly, $\underaccent{\bar}{\theta}\leq\bar{\theta}$, and $\bar{\theta}$ is a distributional supersolution: $-\Delta\bar{\theta}+b\cdot\nabla\bar{\theta}=-\Delta_{x^{\prime}}u\geq 0\text{ in }B_{R_{0}}\times(0,1).$ (4.9) We now construct smooth subsolutions and supersolutions approximating $\underaccent{\bar}{\theta}$ and $\bar{\theta}$ according to the above procedure. Let $\varphi$ be standard mollifier and $\varphi_{\varepsilon}=\frac{1}{\varepsilon^{n-1}}\varphi\left(\frac{\cdot}{\varepsilon}\right).$ (4.10) Define $u_{\varepsilon}=\varphi_{\varepsilon}\ast u$, $V_{\varepsilon}=\Delta u_{\varepsilon}/u_{\varepsilon}$, $b_{\varepsilon}=V_{\varepsilon}(r)e_{z}$, $\underaccent{\bar}{\theta}_{\varepsilon}=zu_{\varepsilon}(r)$, and $\bar{\theta}_{\varepsilon}=u_{\varepsilon}(r)$. Then $(\underaccent{\bar}{\theta}_{\varepsilon})$ and $(\bar{\theta}_{\varepsilon})$ trap a family $(\theta_{\varepsilon})$ of smooth solutions to the PDEs $-\Delta\theta_{\varepsilon}+b_{\varepsilon}\cdot\nabla\theta_{\varepsilon}=0\text{ on }B_{R_{0}/2}\times(0,1)$ (4.11) when $\varepsilon\in(0,R_{0}/2)$. Moreover, we have the desired estimates $\sup_{\varepsilon\in(0,R_{0}/2)}\|\theta_{\varepsilon}\|_{L^{p}(B_{R_{0}/2}\times(0,1))}\leq\|\bar{\theta}\|_{L^{p}(B_{R_{0}}\times(0,1))}<+\infty,\quad p\in[1,+\infty),$ (4.12) $\sup_{\varepsilon\in(0,R_{0}/2)}\|V_{\varepsilon}\|_{L^{\frac{n-1}{2}}(B_{R_{0}/2})}\lesssim\sup_{\varepsilon}\|\Delta u_{\varepsilon}\|_{L^{\frac{n-1}{2}}(B_{R_{0}/2})}\lesssim\|\Delta u\|_{L^{\frac{n-1}{2}}(B_{R_{0}})}<+\infty,$ (4.13) and the singularity as $\varepsilon\to 0^{+}$: $\sup_{B_{\frac{R_{0}}{4}}\times(\frac{1}{4},\frac{3}{4})}\theta_{\varepsilon}\geq\sup_{B_{\frac{R_{0}}{4}}\times(\frac{1}{4},\frac{3}{4})}\underaccent{\bar}{\theta}_{\varepsilon}\to+\infty\text{ as }\varepsilon\to 0^{+}.$ (4.14) ###### Remark 4.1 (Line singularity). The solutions constructed above are singular on the $z$-axis, as the maximum principle demands. ###### Remark 4.2 (Time-dependent examples). The above analysis of unbounded solutions for the steady Schrödinger equation with critical potential is readily adapted to the parabolic PDE $\partial_{t}u-\Delta u+Vu=f$ in $B_{R_{0}}\times(-T_{0},0)\subset\mathbb{R}^{n+1}$, $n\geq 2$, (i) with potential $V$ belonging to $L^{q}_{t}L^{p}_{x}$, $2/q+n/p=2$, $q>1$, and zero force, or (ii) with force $f$ belonging to the same space and zero potential. For example, one can define $u=\log\log(-t+r^{2})$, $V=-(\partial_{t}u-\Delta u)/u$, and $f=0$. The case $q=1$ is an endpoint case in which solutions remain bounded. These examples are presumably well known, although we do not know a suitable reference. ### 4.2. Parabolic counterexamples ###### Proof of borderline cases: $L^{q}_{t}L^{p}_{x}$, $\frac{2}{q}+\frac{n}{p}=2$, $q>1$. 1\. A heat subsolution. Let $\Gamma(x,t)=(4\pi t)^{-n/2}e^{-\frac{|x|^{2}}{4t}}$ (4.15) be the heat kernel. Let $E(x,t)=(\Gamma-c_{n})_{+},$ (4.16) where $c_{n}=(8\pi)^{-n/2}$. Then $E$ is globally Lipschitz away from $t=0$, and $E(\cdot,t)$ is supported in the ball $B_{R(t)}$, where $R(t)^{2}=2nt\log\frac{2}{t},\quad t<2,$ (4.17) and $E$ vanishes in $t\geq 2$. 2\. A steady, compactly supported drift. There exists a divergence-free vector field $U\in C^{\infty}_{0}(B_{4})$ satisfying $U\equiv\vec{e}_{1}\text{ when }|x|\leq 2.$ (4.18) Here is a construction: Let $\phi\in C^{\infty}_{0}(B_{4})$ be a radially symmetric cut-off function such that $\phi\equiv 1$ on $B_{3}$. By applying Bogovskii’s operator in the annulus $B_{4}\setminus\overline{B_{2}}$, see [Gal11, Theorem III.3.3, p. 179], there exists $W\in C^{\infty}_{0}(B_{4}\setminus\overline{B_{2}})$ solving $\operatorname{div}W=-\operatorname{div}(\phi\vec{e}_{1})\in C^{\infty}_{0}(B_{4}\setminus\overline{B_{2}}).$ (4.19) Notably, the property of compact support is preserved. Finally, we define $U=\phi\vec{e}_{1}+W.$ (4.20) 3\. Building blocks. Let $0\leq S\in C^{\infty}_{0}(0,1)$ and $X\colon\mathbb{R}\to\mathbb{R}^{n}$ be the solution of the ODE $\dot{X}(t)=S(t)\vec{e}_{1},\quad X(0)=-10n\vec{e}_{1}.$ (4.21) Define $b_{S}(x,t)=S(t)U\left(\frac{x-X(t)}{R(t)}\right),$ (4.22) where $R(t)$ was defined in (4.17) above, and $E_{S}(x,t)=E(x-X(t),t).$ (4.23) Then $E_{S}$ is a subsolution: $\left(\partial_{t}-\Delta+b_{S}\cdot\nabla\right)E_{S}\leq 0\quad\text{ on }\mathbb{R}^{n}\times(0,1).$ (4.24) If $[a,a^{\prime}]\subset(0,1)$, $S\in C^{\infty}_{0}(a,a^{\prime})$, and $\int S\,dt\geq 20n$, then we have $E_{S}(\cdot,t)|_{B_{3}}\equiv 0$ when $t\leq a$ or $t\geq a^{\prime}$. Additionally, $E_{S}(\cdot,\widetilde{t})=E(\cdot,\widetilde{t})$ for some $\widetilde{t}\in(a,a^{\prime})$. We also consider the solution $\Phi_{S}$ to the PDE: $\displaystyle\left(\partial_{t}-\Delta+b_{S}\cdot\nabla\right)\Phi_{S}$ $\displaystyle=0\quad\text{ on }\mathbb{R}^{n+1}\setminus\\{(X(0),0)\\}$ (4.25) $\displaystyle\Phi_{S}|_{t=0}$ $\displaystyle=\delta_{x=X(0)},$ which for short times $|t|\ll 1$ and negative times is equal to the heat kernel $\Gamma(x-X(0),t)$. By the comparison principle, $E_{S}\leq\Phi_{S}.$ (4.26) We have the following measurements on the size of the drift: $\|b_{S}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}^{q}\lesssim\int_{\mathbb{R}}S(t)^{q}R(t)^{\frac{nq}{p}}\,dt,$ (4.27) where $1\leq p,q<+\infty$, and $\|b_{S}\|_{L^{1}_{t}L^{\infty}_{x}(\mathbb{R}^{n+1})}=\|U\|_{L^{\infty}(\mathbb{R}^{n})}\int_{\mathbb{R}}S(t)\,dt.$ (4.28) 4\. Large displacement. For $S_{k}\in C^{\infty}_{0}(t_{k},t_{k}^{\prime})$, $k\geq 1$, with $t_{k}=o_{k\to+\infty}(1)$ and $[t_{k},t_{k}^{\prime}]\subset(0,1)$ disjoint-in-$k$, we consider the drifts $b_{S_{k}}$. Let $M>0$. We claim that it is possible to choose $S_{k}$ satisfying $\lVert b_{S_{k}}\rVert_{L^{1}_{t}L^{\infty}_{x}(\mathbb{R}^{n+1})}=M$ (4.29) and $\left\|\sum_{k\geq 1}b_{S_{k}}\right\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}<+\infty$ (4.30) for all $p,q\in[1,+\infty]$ satisfying $2/q+n/p=2$ and $q>1$. Indeed, consider $\bar{S}(t)=\left(t\log t^{-1}\log\log t^{-1}\right)^{-1}$ (4.31) when $t\leq c_{0}$ so that the above expression is well defined, and extended smoothly on $[c_{0},1]$. We ask also that $t_{1}\leq c_{0}$. Since $\int_{a}^{a^{\prime}}\bar{S}(t)dt=\log\log\log t^{-1}\big{|}_{a}^{a^{\prime}}$ (4.32) when $a^{\prime}\leq c_{0}$, we have $\int_{t=0}^{1}\bar{S}(t)\,dt=+\infty,$ (4.33) whereas $\displaystyle\int_{t=0}^{1}\bar{S}(t)^{q}R(t)^{\frac{nq}{p}}\,dt$ $\displaystyle\leq O(1)+C_{n}\int_{t=0}^{c_{0}}(t\log t^{-1})^{-q+\frac{nq}{2p}}(\log\log t^{-1})^{-q}\,dt$ (4.34) $\displaystyle\leq O(1)+C_{n}\int_{t=0}^{c_{0}}(t\log t^{-1})^{-1}(\log\log t^{-1})^{-q}\,dt<+\infty$ when $q\in(1,+\infty)$. The case $q=+\infty$ is similar. We choose $S_{k}=\bar{S}(t)\varphi_{k}$ with suitable smooth cut-offs $\varphi_{k}$ to complete the proof of the claim. 5\. Unbounded solution. We choose $M=20n$ and a suitable sequence of $S_{k}$ as above. We reorder the building blocks we defined above so that the $k$th subsolution and $k$th drift are ‘activated’ on times $(1-t_{k}^{\prime},1-t_{k})$. Define $b_{k}(\cdot,t)=b_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k}),\quad b=\sum_{k\geq 1}b_{k}$ (4.35) and, for size parameters $A_{k}\geq 0$, $E_{k}(\cdot,t)=E_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k})\mathbf{1}_{(1-t_{k}^{\prime},1-t_{k})},\quad E=\sum_{k\geq 1}A_{k}E_{k}.$ (4.36) Then $E$ is a subsolution of the PDE $(\partial_{t}-\Delta+b\cdot\nabla)E\leq 0\quad\text{ on }B_{3}\times(-\infty,1).$ (4.37) We further define $\Phi_{k}(\cdot,t)=\Phi_{S_{k}}(\cdot,t-(1-t_{k}^{\prime})+t_{k}),\quad\theta=\sum_{k\geq 1}A_{k}\Phi_{k},$ (4.38) which is a solution of the PDE $(\partial_{t}-\Delta+b\cdot\nabla)\theta=0\quad\text{ on }B_{2}\times(-\infty,1).$ (4.39) Since $E_{k}\leq\Phi_{k}$, we have that $E\leq\theta$ on $B_{2}\times(-\infty,1)$. Additionally, we have $\sup_{t}A_{k}\|E_{k}(\cdot,t)\|_{L^{\infty}(B_{1})}\geq A_{k}\|E_{k}(\cdot,1-\widetilde{t}_{k})\|_{L^{\infty}(B_{1})}\gtrsim A_{k}{t_{k}^{\prime}}^{-n/2},$ (4.40) where $\widetilde{t}_{k}\in(t_{k},t_{k}^{\prime})$ satisfies $X_{S_{k}}(\widetilde{t_{k}})=0$. Therefore, by the comparison principle and (4.40), we have $\limsup_{t\to 1_{-}}\|\theta(\cdot,t)\|_{L^{\infty}(B_{1})}\gtrsim\limsup_{k\to+\infty}A_{k}{t_{k}^{\prime}}^{-n/2}.$ (4.41) To control the solution from above, we use $\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}\leq\sum A_{k}.$ (4.42) Therefore, it is possible to choose $A_{k}\to 0$ as $k\to+\infty$ while keeping the $\limsup$ in (4.41) infinite. Hence, by ‘pruning’ the sequence of $A_{k}$ (meaning we pass to a subsequence, without relabeling), we can always ensure that $\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}<+\infty$.∎ ###### Remark 4.3. The sequence of solutions $\\{\theta_{k}\\}$ above demonstrates that the constant in the quantitative local boundedness property in Theorem 1.1 for drifts $b\in L^{1}_{t}L^{\infty}_{x}$ depends on the ‘profile’ of $b$ rather than just its norm. ###### Proof of non-borderline cases: $L^{p}_{x}L^{q}_{t}$, $\frac{3}{q}+\frac{n-1}{p}>2$, $p\leq q$. This construction exploits rescaled copies of $E$ and is, in a certain sense, self-similar. _1\. Building blocks_. Let $(t_{k})\subset(0,1)$ be an increasing sequence, with $t_{k}\to 1$ as $k\to+\infty$. Define $I_{k}=(t_{k},t_{k+1})$, $R_{k}^{2}=|I_{k}|$. Let $0\leq S\in C^{\infty}(0,1)$ satisfying $\int_{0}^{1}S(t)\,dt=M$ with $M=20n$. Define $X_{k}\colon\mathbb{R}\to\mathbb{R}^{n}$ to be the solution of the ODE $\dot{X}_{k}(t-t_{k})=\underbrace{\frac{1}{|I_{k}|}S\left(\frac{t}{|I_{k}|}\right)}_{=:S_{k}(t-t_{k})}\vec{e}_{1},\quad X_{k}(t_{k})=-10n\vec{e}_{1}.$ (4.43) The ‘total speed’ has been normalized: $\int|\dot{X}_{k}|\,dt=\int S\,dt=M$. Define also $b_{k}(x,t)=S_{k}(t)U\left(\frac{x-X_{k}(t)}{R_{k}}\right)$ (4.44) and $E_{k}(x,t)=\frac{1}{R_{k}^{n}}E\left(\frac{x-X_{k}(t)}{R_{k}},\frac{t-t_{k}}{|I_{k}|}\right).$ (4.45) Then $E_{k}$ is a subsolution: $\left(\partial_{t}-\Delta+b_{k}\cdot\nabla\right)E_{k}\leq 0\text{ on }\mathbb{R}^{n+1}\setminus\\{(X_{k}(t_{k}),t_{k})\\}$ (4.46) and satisfies many of the same properties as $E_{k}$ in the previous construction, among which is $E_{k}(\cdot,\widetilde{t_{k}})=\frac{1}{R_{k}^{n}}E\left(\frac{\cdot}{R_{k}},\widetilde{t}\right)$ (4.47) for some $\widetilde{t_{k}}\in(t_{k},t_{k+1})$ and $\widetilde{t}\in(0,1)$. We define the solution $\theta_{k}$ to the PDE: $\displaystyle\left(\partial_{t}-\Delta+b_{k}\cdot\nabla\right)\theta_{k}$ $\displaystyle=0\quad\text{ on }\mathbb{R}^{n+1}\setminus\\{(X_{k}(t_{k}),t_{k})\\}$ (4.48) $\displaystyle\theta_{k}|_{t=t_{k}}$ $\displaystyle=\delta_{x=X_{k}(t_{k})},$ which for short times $|t-t_{k}|\ll_{k}1$ and times $t<t_{k}$ is equal to the heat kernel $\Gamma(x-X_{k}(t_{k}),t)$. The comparison principle implies $E_{k}\leq\theta_{k}.$ (4.49) 2\. Estimating the drift. We now estimate the size of $b_{k}$. To begin, we estimate the $L^{q}_{t}L^{p}_{x}$ norms, $\frac{2}{q}+\frac{n}{p}>2$. Using the scalings from (4.44), we have $\max|b_{k}|\leq\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}|I_{k}|^{-1}$ (4.50) and $\|b_{k}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}\lesssim\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}|I_{k}|^{\frac{1}{q}-1}R_{k}^{\frac{n}{p}}\lesssim R_{k}^{\varepsilon(p,q)}=o_{k\to+\infty}(1),$ (4.51) since $|I_{k}|=R_{k}^{2}$. Next, we estimate the $L^{p}_{x^{\prime}}L^{\infty}_{x_{n}}L^{\widetilde{q}}_{t}$ norm, where $\frac{2}{\widetilde{q}}+\frac{n-1}{p}>2$. We are most interested when $\widetilde{q}=+\infty$ and $p=\frac{n-1}{2}-$, but it is not more effort to estimate this. Importantly, we have ${\rm supp}\;b_{k}\subset B^{\mathbb{R}^{n-1}}_{C_{n}R_{k}}\times(-C_{n},C_{n})\times I_{k}.$ (4.52) Using this and (4.50), we have $\|b_{k}\|_{L^{p}_{x^{\prime}}L^{\infty}_{x_{n}}L^{\widetilde{q}}_{t}(\mathbb{R}^{n+1})}\lesssim\|U\|_{L^{\infty}}\|S\|_{L^{\infty}}R_{k}^{\frac{n-1}{p}}|I_{k}|^{\frac{1}{\widetilde{q}}-1}\lesssim R_{k}^{\varepsilon(p,\widetilde{q})}=o_{k\to+\infty}(1).$ (4.53) Interpolating between (4.51) and (4.53) with $(p,\widetilde{q})=(\frac{n-1}{2}-,\infty)$, we thus obtain $\|b_{k}\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}=o_{k\to+\infty}(1)$ (4.54) when $\frac{3}{q}+\frac{n-1}{p}>2$ and $p\leq q$. After ‘pruning’ the sequence in $k$ (meaning we pass to a subsequence, without relabeling), we have $\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}\leq\sum\|b_{k}\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n+1})}<+\infty,\quad\frac{2}{q}+\frac{n}{p}>2$ (4.55) and $\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}\leq\sum\|b_{k}\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n+1})}<+\infty,\quad\frac{3}{q}+\frac{n-1}{p}>2,\quad p\leq q.$ (4.56) _3\. Concluding_. The remainder of the proof proceeds as before, with the notable difference that we do not need to reorder the blocks in time. To summarize, we have $\sup_{t}A_{k}\|E_{k}(\cdot,t)\|_{L^{\infty}(B_{1})}\geq A_{k}\|E_{k}(\cdot,\widetilde{t_{k}})\|_{L^{\infty}(B_{1})}\gtrsim A_{k}{R_{k}}^{-n},$ (4.57) where $\widetilde{t}_{k}\in(t_{k},t_{k+1})$ satisfies $X_{k}(\widetilde{t_{k}})=0$, and hence, $\limsup_{t\to 1_{-}}\|\theta(\cdot,t)\|_{L^{\infty}(B_{1})}\gtrsim\limsup_{k\to+\infty}A_{k}{R_{k}}^{-n}$ (4.58) To control the solution from above, we again use (4.42) and choose $A_{k}\to 0$ as $k\to+\infty$ while maintaining that the RHS (4.58) is infinite. By again ‘pruning’ the sequence in $k$, we have $\|\theta\|_{L^{\infty}_{t}L^{1}_{x}(\mathbb{R}^{n+1})}<+\infty$. This completes the proof. ∎ ###### Remark 4.4 (An open question). As mentioned in the introduction, we do not construct counterexamples in the endpoint cases $L^{p}_{x}L^{q}_{t}$, $\frac{3}{q}+\frac{n-1}{p}=2$, except when $p=q=\frac{n+2}{2}$ or $(p,q)=(\frac{n-1}{2},+\infty)$ (steady example constructed above). This seems to suggest, perhaps, that local boundedness should also fail on the line between these two points, but that the counterexamples may be more subtle. It would be interesting to construct these examples. Since each ‘block’ above is uniformly bounded in the desired spaces, we can say that, if local boundedness were to hold there, it must be depend on the ‘profile’ of $b$ and not just its norm, as in Remark 4.3. ## 5\. Upper bounds on fundamental solutions For the Gaussian-like upper bounds on fundamental solutions, we consider a divergence-free vector field $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ and $\alpha_{0}\geq 0$, $C_{0},M_{0}>0$ satisfying the following two properties: I. _Local boundedness_ : For each $x_{0}\in\mathbb{R}^{n}$, $R>0$, $t_{0}\in\mathbb{R}_{+}$, parabolic cylinder $Q_{R}(x_{0},t_{0})=B_{R}(x_{0})\times(t_{0}-R^{2},t_{0})\subset\mathbb{R}^{n}\times\mathbb{R}_{+}$, and Lipschitz solution $u\in W^{1,\infty}(Q_{R}(x_{0},t_{0}))$, we have $\|u\|_{L^{\infty}(Q_{R/2}(x_{0},t_{0}))}\leq C_{0}\left(\frac{M_{0}}{R^{\alpha_{0}+2}}+\frac{1}{R^{2}}\right)^{\frac{n+2}{4}}\|u\|_{L^{2}(Q_{R}(x_{0},t_{0}))}$ (5.1) II. _Global, revised form boundedness condition_ , which we denote ($\widetilde{\text{FBC}}$): > For each $x_{0}\in\mathbb{R}^{n}$, $R>0$, open interval > $I\subset\mathbb{R}_{+}$, and Lipschitz function $u\in > W^{1,\infty}(B_{R}\times I)$, there exists a measurable set > $A=A(x_{0},R,b)\subset(R/2,R)$ with $|A|\geq R/4$ and satisfying > > $\displaystyle\frac{1}{|A|}\int\kern-3.39996pt\int_{B_{A}\times > I}\frac{|u|^{2}}{2}(b\cdot > n)\,dx\,dt\leq\frac{M_{0}}{\varepsilon^{\alpha_{0}+1}R^{\alpha_{0}+2}}\int\kern-3.39996pt\int_{B_{R}\times > I}|u|^{2}\,dx\,dt$ ($\widetilde{\text{FBC}}$) > $\displaystyle\quad+\varepsilon\left(\frac{1}{R^{2}}\int\kern-3.39996pt\int_{B_{R}\times > I}|u|^{2}\,dx\,dt+\int\kern-3.39996pt\int_{B_{R}\times I}|\nabla > u|^{2}\,dx\,dt+\sup_{t\in I}\int_{B_{R}}|u(x,t)|^{2}\,dx\right),$ > > where $n$ is the unit outer normal direction and $B_{A}=\cup_{r\in > A}\partial B_{r}$. Under the above conditions, we have ###### Theorem 5.1 (Upper bounds on fundamental solutions). If $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ is a divergence-free vector field satisfying I and II, then the fundamental solution $\Gamma=\Gamma(x,t;y,s)$ to the parabolic operator $L=\partial_{t}-\Delta+b\cdot\nabla$ satisfies the following upper bounds: $\displaystyle\Gamma(x,t;y,s)\leq C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$ (5.2) $\displaystyle\quad\times\left[\exp\left(-\frac{c|x-y|^{2}}{t-s}\right)+\exp\left(-\frac{c|x-y|^{1+\frac{1}{1+\alpha_{0}}}}{((t-s)M_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right]$ (5.3) for all $x,y\in\mathbb{R}^{n}$ and $0\leq s<t<+\infty$, where $C,c>0$ may depend on $C_{0}$, $\alpha_{0}$, and $n$. ###### Remark 5.2 (Comments on I and II). Notice that ($\widetilde{\text{FBC}}$) in II bounds the _outflux_ of scalar through the domain. The _influx_ , which was bounded explicitly in (FBC), is handled implicitly by I. The parameter $\alpha_{0}$ in ($\widetilde{\text{FBC}}$) does not track the same information as the parameter $\alpha$ in (FBC). The constant $M_{0}$ in ($\widetilde{\text{FBC}}$) has dimensions $L^{\alpha_{0}}$, whereas the constant $M$ in (FBC) is dimensionless. The upper bound in (5.2) is dimensionally correct. Upon optimizing in $\varepsilon$, one discovers that ($\widetilde{\text{FBC}}$) is equivalent to an interpolation inequality, see the derivation in Remark 2.6. The above form is reflective of how the estimate is utilized below. It would be possible to incorporate a parameter $\delta_{0}\in(0,1/2)$ such that $|A|\geq\delta_{0}R$, as in (FBC). We verify that the above conditions are satisfied in the setting of the main theorems: ###### Lemma 5.3 (Verifying $\widetilde{\text{FBC}}$). Let $p,q\in[1,+\infty]$ and $b\in C^{\infty}_{0}(\mathbb{R}^{n}\times[0,+\infty))$ be a divergence-free vector field. 1\. If $b\in L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+}),\quad 1\leq\zeta_{0}:=\frac{2}{q}+\frac{n}{p}<2,$ (5.4) then $b$ satisfies I and II with $\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}}(=\frac{1}{\theta_{2}}-2)$, $M_{0}=C\|b\|_{L^{q}_{t}L^{p}_{x}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4}$, $C_{0}=C$, and $\theta_{2}=1-\frac{\zeta_{0}}{2}$. 2\. If $b\in L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+}),\quad p\leq q,\quad 1\leq\zeta_{0}:=\frac{3}{q}+\frac{n-1}{p}<2,$ (5.5) then $b$ satisfies I and II with $\alpha_{0}=\frac{\zeta_{0}-1}{\theta_{2}}(=\frac{1}{\theta_{2}}-2)$, $M_{0}=C\|b\|_{L^{p}_{x}L^{q}_{t}(\mathbb{R}^{n}\times\mathbb{R}_{+})}^{\frac{1}{\theta_{2}}}+\frac{1}{4}$, $C_{0}=C$, and $\theta_{2}=1-\frac{\zeta_{0}}{2}$. ###### Proof. I follows from Proposition 2.3, Theorem 2.1, and the translation and scaling symmetries. II follows from rescaling $R_{0}$ in Remark 2.6. ∎ ###### Proof of Theorem 5.1. By a translation of the coordinates, we need only consider $\Gamma(x_{0},t_{0};0,0)$ for $t_{0}>0$ and $x_{0}\in\mathbb{R}^{n}$. We adapt a method due to E. B. Davies [Dav87]. Let $\psi=\psi(|x|)=\psi(r)$ be a bounded radial Lipschitz function to be specified such that $\psi=0$ when $r<|x_{0}|/2$ and $\psi$ is a constant when $r\geq|x_{0}|$. For now, we record the property $|\nabla\psi|\leq\gamma$, where $\gamma>0$ will be specified later. _1\. Weighted energy estimates_. Let $f\in C^{\infty}_{0}(\mathbb{R}^{n})$ and $u$ be the solution to the equation $Lu=0$ in $\mathbb{R}^{n}\times\mathbb{R}^{+}$ with initial condition $u(0,\cdot)=e^{-\psi}f$. For $t\geq 0$, denote $J(t)=\frac{1}{2}\int_{\mathbb{R}^{n}}e^{2\psi(y)}u^{2}(y,t)\,dy.$ (5.6) Then, by integration by parts, for $t>0$, we have $\displaystyle\dot{J}(t)$ $\displaystyle=\int_{\mathbb{R}^{n}}e^{2\psi}u\partial_{t}u\,dy=\int_{\mathbb{R}^{n}}e^{2\psi}u(\Delta u-b\cdot\nabla u)\,dy$ $\displaystyle=-\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla u|^{2}\,dy-2\int_{\mathbb{R}^{n}}e^{2\psi}u\nabla u\cdot\nabla\psi\,dy-\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\frac{u^{2}}{2}\,dy$ $\displaystyle\leq-\frac{1}{2}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla u|^{2}\,dy+C\gamma^{2}J(t)+\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\psi u^{2}\,dy,$ where we applied Young’s inequality. Hence, $\displaystyle J(t)+\frac{1}{2}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla u|^{2}\,dy\,ds$ (5.7) $\displaystyle\quad\leq J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}b\cdot\nabla\psi u^{2}\,dy\,ds.$ Now for each $t>0$, we choose $\psi^{\prime}(r)=\gamma\mathbf{1}_{A}$, where $A=A(x_{0},|x_{0}|,b)$ is the set of ‘good slices’ from ($\widetilde{\text{FBC}}$) in II. By ($\widetilde{\text{FBC}}$) applied to $e^{\psi}u$, we have $\displaystyle J(t)+\frac{1}{2}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla u|^{2}\,dy\,ds$ $\displaystyle\leq J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\gamma\int_{0}^{t}\int_{B_{A}}e^{2\psi}b\cdot\frac{y}{|y|}u^{2}\,dy\,ds$ $\displaystyle\leq J(0)+C\gamma^{2}\int_{0}^{t}J(s)\,ds+\gamma\varepsilon|A|\left(\sup_{s\in[0,t]}J(s)+\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}|\nabla u|^{2}\,dy\,ds\right)$ $\displaystyle\quad+\gamma\varepsilon|A|\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}|\nabla\psi|^{2}u^{2}\,dy\,ds+\left(\frac{\gamma M_{0}|A|}{\varepsilon^{\alpha_{0}+1}(|x_{0}|/2)^{\alpha_{0}+2}}+\frac{\gamma\varepsilon|A|}{|x_{0}|^{2}}\right)\int_{0}^{t}\int_{B_{|x_{0}|}}e^{2\psi}u^{2}\,dy\,ds.$ Recall that $|A|\leq|x_{0}|/2$. We set $\varepsilon=(100|x_{0}|\gamma)^{-1}$ and take the supremum in $t$ in order to absorb the 3rd term on the right-hand side, which has coefficient $\gamma\varepsilon|A|$: $\displaystyle\frac{1}{2}\sup_{s\in[0,t]}J(s)+\frac{1}{4}\int_{0}^{t}\int_{\mathbb{R}^{n}}e^{2\psi}|\nabla u|^{2}\,dy\,ds$ $\displaystyle\quad\leq J(0)+\left(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2}\right)\int_{0}^{t}J(s)\,ds.$ Now, by the Gronwall inequality, $J(t)\leq CJ(0)e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$ (5.8) _2\. Duality argument_. For $s<t$, we define an operator $P^{\psi}_{s\to t}f(x)=e^{\psi(x)}\int_{\mathbb{R}^{n}}\Gamma(x,t;y,s)e^{-\psi(y)}f(y)\,dy.$ (5.9) By the local boundedness estimate (5.1) in I, for any $x\in\mathbb{R}^{n}$ and $R=\sqrt{t}$, $\displaystyle e^{-2\psi(x)}|P_{0\to t}^{\psi}f(x)|^{2}=|u(x,t))|^{2}\leq C_{0}\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\int_{0}^{t}\int_{B_{\sqrt{t}}(x)}u^{2}(y,s)\,dy\,ds.$ Thus, allowing $C$ to depend on $C_{0}$, from (5.8) we have $\displaystyle|P_{0\to t}^{\psi}f(x)|^{2}\leq C\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\int_{0}^{t}\int_{B_{\sqrt{t}}(x)}e^{2\psi(x)}u^{2}(y,s)\,dy\,ds$ $\displaystyle\leq C\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\sup_{y\in B_{\sqrt{t}}(x)}e^{2(\psi(x)-\psi(y))}\int_{0}^{t}J(s)\,ds$ $\displaystyle\overset{\eqref{eq1.23}}{\leq}Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}\times e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}J(0).$ Since $J(0)=\|f\|_{L^{2}}^{2}/2$, the above inequality together with a translation in time implies that $\displaystyle\|P_{s\to t}^{\psi}\|_{L^{2}\to L^{\infty}}^{2}\leq C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$ $\displaystyle\quad\cdot e^{2\gamma\min\\{\sqrt{t-s},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})(t-s)}J(0).$ By duality, we also have $\displaystyle\|P_{s\to t}^{\psi}\|_{L^{1}\to L^{2}}^{2}\leq C(t-s)\left(\frac{1}{t-s}+\frac{M_{0}}{(t-s)^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}$ $\displaystyle\quad\times e^{2\gamma\min\\{\sqrt{t-s},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})(t-s)}J(0).$ Therefore, $\displaystyle\|P_{0\to t}^{\psi}\|_{L^{1}\to L^{\infty}}\leq\|P_{0\to t/2}^{\psi}\|_{L^{1}\to L^{2}}\|P_{t/2\to t}^{\psi}\|_{L^{2}\to L^{\infty}}$ $\displaystyle\leq Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$ From (5.9), the above inequality implies that for any $x,y\in\mathbb{R}^{n}$, $\displaystyle e^{\psi(x)-\psi(y)}\Gamma(x,t;y,0)$ $\displaystyle\leq Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}.$ In particular, we have $\displaystyle\Gamma(x_{0},t;0,0)$ $\displaystyle\leq Ce^{-\psi(x_{0})}t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}e^{2\gamma\min\\{\sqrt{t},|x_{0}|/2\\}}e^{(C\gamma^{2}+CM_{0}\gamma^{2+\alpha_{0}}+|x_{0}|^{-2})t}$ $\displaystyle\leq Ct\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left\\{2\gamma\min\Big{(}\sqrt{t},\frac{|x_{0}|}{2}\Big{)}-\frac{\gamma|x_{0}|}{4}+C\gamma^{2}t+CM_{0}\gamma^{2+\alpha_{0}}t+|x_{0}|^{-2}t\right\\}$ since $\psi(0)=0$ and $\psi(x_{0})\geq\gamma|x_{0}|/4$. _3\. Optimizing $\gamma$_. In order to have a negative term in the exponential, we first consider $|x_{0}|\geq 16\sqrt{t}.$ (5.10) Then $2\min\Big{(}\sqrt{t},\frac{|x_{0}|}{2}\Big{)}-\frac{|x_{0}|}{4}\leq-\frac{|x_{0}|}{8}$ (5.11) Notice that final term in the exponential is already controlled: $t|x_{0}|^{-2}\lesssim 1.$ (5.12) Hence, $\Gamma(x_{0},t;0,0)\lesssim t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{1}{8}\gamma|x_{0}|+C\gamma^{2}t+CM_{0}\gamma^{2+\alpha_{0}}t\right).$ (5.13) The new expression inside the exponential is $-\frac{1}{8}\gamma|x_{0}|+\underbrace{C\gamma^{2}t}_{A}+\underbrace{CM_{0}\gamma^{2+\alpha_{0}}t}_{B}.$ (5.14) We divide space into an ‘inner region’ and ‘outer region’, and we anticipate that the rate of decay may be modified in the outer region, where $B$ dominates. _3a. Outer region_. We consider scalings of $\gamma$ in which $-\frac{1}{8}\gamma|x_{0}|$ overtakes $B$. Consider $M_{0}\gamma^{2+\alpha_{0}}t=\varepsilon\gamma|x_{0}|.$ (5.15) Then $\frac{1}{8}\gamma|x_{0}|\gg B$ when $\gamma^{1+\alpha_{0}}=\varepsilon M_{0}^{-1}\frac{|x_{0}|}{t}$ (5.16) and $\varepsilon\ll 1$. In this scaling, we have that $B\geq A$ ($CM_{0}\gamma^{2+\alpha_{0}}\geq C\gamma^{2}$) when $M_{0}\gamma^{\alpha_{0}}\geq 1,$ (5.17) or $\frac{M_{0}^{\frac{1}{\alpha_{0}}}|x_{0}|}{t}\geq\varepsilon^{-1}.$ (5.18) In this region, under the additional assumption (5.10), we have the exponential bound $\Gamma(x_{0},t;0,0)\lesssim t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{c|x_{0}|^{1+\frac{1}{1+\alpha_{0}}}}{(tM_{0})^{\frac{1}{1+\alpha_{0}}}}\right)$ (5.19) _3b. Inner region_. We now consider scalings of $\gamma$ in which $-\frac{1}{8}\gamma|x_{0}|$ overtakes the term $A$. Consider $\gamma^{2}t=\varepsilon\gamma|x_{0}|.$ (5.20) Then $\frac{1}{8}\gamma|x_{0}|\gg A$ when $\gamma=\varepsilon|x_{0}|/t$ (5.21) and $\varepsilon\ll 1$. In this scaling, we have that $A\geq B$ ($C\gamma^{2}\geq CM_{0}\gamma^{2+\alpha_{0}}$) when $M_{0}\gamma^{\alpha_{0}}\leq 1,$ (5.22) or $M_{0}^{\frac{1}{\alpha_{0}}}\frac{|x_{0}|}{t}\leq\varepsilon^{-1}.$ (5.23) In this region, under the additional assumption (5.10), we have the exponential bound $\Gamma(x_{0},t;0,0)\lesssim t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\exp\left(-\frac{c|x_{0}|^{2}}{t}\right).$ (5.24) _3c. Patching_. Combining (5.19) and (5.24), we have $\Gamma(x_{0},t;0,0)\lesssim t\left(\frac{1}{t}+\frac{M_{0}}{t^{1+\frac{\alpha_{0}}{2}}}\right)^{\frac{n+2}{2}}\left[\exp\left(-\frac{c|x_{0}|^{2}}{t}\right)+\exp\left(-\frac{c|x_{0}|^{1+\frac{1}{1+\alpha_{0}}}}{(tM_{0})^{\frac{1}{1+\alpha_{0}}}}\right)\right].$ (5.25) under the assumption (5.10). On the other hand, when $|x_{0}|\leq 16\sqrt{t}$, the fundamental solution is controlled by the Nash estimate [Nas58]: $\|\Gamma(\cdot,t;0,0)\|_{L^{\infty}(\mathbb{R}^{n})}\lesssim t^{-\frac{n}{2}},$ (5.26) which is independent of the divergence-free drift. This contributes to the prefactor in (5.25). The proof is complete. ∎ #### Acknowledgments DA thanks Vladimír Šverák for encouraging him to answer this question and helpful discussions. DA also thanks Tobias Barker and Simon Bortz for helpful discussions, especially concerning Remark 4.2, and their patience. DA was supported by the NDSEG Fellowship and NSF Postdoctoral Fellowship Grant No. 2002023. HD was partially supported by the Simons Foundation, Grant No. 709545, a Simons Fellowship, and the NSF under agreement DMS-2055244. ## References * [ABES19] Pascal Auscher, Simon Bortz, Moritz Egert, and Olli Saari. On regularity of weak solutions to linear parabolic systems with measurable coefficients. J. Math. Pures Appl. (9), 121:216–243, 2019. * [Aro67] D. G. Aronson. Bounds for the fundamental solution of a parabolic equation. Bull. Amer. Math. Soc., 73:890–896, 1967. * [BS20a] Peter Bella and Mathias Schäffner. Non-uniformly parabolic equations and applications to the random conductance model. arXiv preprint arXiv:2009.11535, 2020. * [BS20b] Peter Bella and Mathias Schäffner. On the regularity of minimizers for scalar integral functionals with $(p,q)$-growth. Anal. PDE, 13(7):2241–2257, 2020. * [BS21] Peter Bella and Mathias Schäffner. Local boundedness and Harnack inequality for solutions of linear nonuniformly elliptic equations. Comm. Pure Appl. Math., 74(3):453–477, 2021. * [Dav87] E. B. Davies. Explicit constants for Gaussian upper bounds on heat kernels. Amer. J. Math., 109(2):319–333, 1987. * [DG57] Ennio De Giorgi. Sulla differenziabilità e l’analiticità delle estremali degli integrali multipli regolari. Mem. Accad. Sci. Torino. Cl. Sci. Fis. Mat. Nat. (3), 3:25–43, 1957\. * [DK18] Hongjie Dong and Seick Kim. Fundamental solutions for second-order parabolic systems with drift terms. Proc. Amer. Math. Soc., 146(7):3019–3029, 2018. * [FG85] Eugene B. Fabes and Nicola Garofalo. Parabolic B.M.O. and Harnack’s inequality. Proc. Amer. Math. Soc., 95(1):63–69, 1985. * [Fil13] N. Filonov. On the regularity of solutions to the equation $-\Delta u+b\cdot\nabla u=0$. Zap. Nauchn. Sem. S.-Peterburg. Otdel. Mat. Inst. Steklov. (POMI), 410(Kraevye Zadachi Matematicheskoĭ Fiziki i Smezhnye Voprosy Teorii Funktsiĭ. 43):168–186, 189, 2013. * [FR96] Jens Frehse and Michael Ružička. Existence of regular solutions to the steady Navier-Stokes equations in bounded six-dimensional domains. Annali della Scuola Normale Superiore di Pisa-Classe di Scienze, 23(4):701–719, 1996. * [FS18] Nikolay Filonov and Timofey Shilkin. On some properties of weak solutions to elliptic equations with divergence-free drifts. In Mathematical analysis in fluid mechanics—selected recent results, volume 710 of Contemp. Math., pages 105–120. Amer. Math. Soc., [Providence], RI, [2018] ©2018. * [FSSC98] Bruno Franchi, Raul Serapioni, and Francesco Serra Cassano. Irregular solutions of linear degenerate elliptic equations. Potential Anal., 9(3):201–216, 1998. * [Gal11] G. P. Galdi. An introduction to the mathematical theory of the Navier-Stokes equations. Springer Monographs in Mathematics. Springer, New York, second edition, 2011. Steady-state problems. * [Giu03] Enrico Giusti. Direct methods in the calculus of variations. World Scientific Publishing Co., Inc., River Edge, NJ, 2003. * [HL97] Qing Han and Fanghua Lin. Elliptic partial differential equations, volume 1 of Courant Lecture Notes in Mathematics. New York University, Courant Institute of Mathematical Sciences, New York; American Mathematical Society, Providence, RI, 1997. * [HLMP21] Steve Hofmann, Linhan Li, Svitlana Mayboroda, and Jill Pipher. The dirichlet problem for elliptic operators having a BMO anti-symmetric part. Mathematische Annalen, June 2021. * [Ign14] Mihaela Ignatova. On the continuity of solutions to advection-diffusion equations with slightly super-critical divergence-free drifts. Adv. Nonlinear Anal., 3(2):81–86, 2014. * [IKR14] Mihaela Ignatova, Igor Kukavica, and Lenya Ryzhik. The Harnack inequality for second-order elliptic equations with divergence-free drifts. Commun. Math. Sci., 12(4):681–694, 2014. * [IKR16] Mihaela Ignatova, Igor Kukavica, and Lenya Ryzhik. The Harnack inequality for second-order parabolic equations with divergence-free drifts of low regularity. Comm. Partial Differential Equations, 41(2):208–226, 2016. * [Kon07] Michalis Kontovourkis. On elliptic equations with low-regularity divergence-free drift terms and the steady-state Navier-Stokes equations in higher dimensions. University of Minnesota, 2007. * [KS19] Seick Kim and Georgios Sakellaris. Green’s function for second order elliptic equations with singular lower order coefficients. Comm. Partial Differential Equations, 44(3):228–270, 2019. * [Lie96] Gary M. Lieberman. Second order parabolic differential equations. World Scientific Publishing Co., Inc., River Edge, NJ, 1996. * [LP19] Linhan Li and Jill Pipher. Boundary behavior of solutions of elliptic operators in divergence form with a BMO anti-symmetric part. Comm. Partial Differential Equations, 44(2):156–204, 2019. * [LSUt68] O. A. Ladyženskaja, V. A. Solonnikov, and N. N. Ural’ tseva. Linear and quasilinear equations of parabolic type. Translations of Mathematical Monographs, Vol. 23. American Mathematical Society, Providence, R.I., 1968. Translated from the Russian by S. Smith. * [LZ04] Vitali Liskevich and Qi S. Zhang. Extra regularity for parabolic equations with drift terms. Manuscripta Math., 113(2):191–209, 2004. * [Moo17] Connor Mooney. Finite time blowup for parabolic systems in two dimensions. Arch. Ration. Mech. Anal., 223(3):1039–1055, 2017. * [Mos61] Jürgen Moser. On Harnack’s theorem for elliptic differential equations. Comm. Pure Appl. Math., 14:577–591, 1961. * [Mos64] Jürgen Moser. A Harnack inequality for parabolic differential equations. Comm. Pure Appl. Math., 17:101–134, 1964. * [Mos67] Jürgen Moser. Correction to: “A Harnack inequality for parabolic differential equations”. Comm. Pure Appl. Math., 20:231–236, 1967. * [Mos71] J. Moser. On a pointwise estimate for parabolic differential equations. Comm. Pure Appl. Math., 24:727–740, 1971. * [Mou19] Mihalis Mourgoglou. Regularity theory and Green’s function for elliptic equations with lower order terms in unbounded domains. arXiv preprint arXiv:1904.04722, 2019. * [MS04] Pierre D. Milman and Yu. A. Semenov. Global heat kernel bounds via desingularizing weights. J. Funct. Anal., 212(2):373–398, 2004. * [Nas58] John Nash. Continuity of solutions of parabolic and elliptic equations. Amer. J. math, 80(4):931–954, 1958. * [NUt11] A. I. Nazarov and N. N. Ural’ tseva. The Harnack inequality and related properties of solutions of elliptic and parabolic equations with divergence-free lower-order coefficients. Algebra i Analiz, 23(1):136–168, 2011. * [Osa87] Hirofumi Osada. Diffusion processes with generators of generalized divergence form. J. Math. Kyoto Univ., 27(4):597–619, 1987. * [QX19a] Zhongmin Qian and Guangyu Xi. Parabolic equations with divergence-free drift in space $L^{\ell}_{t}L^{q}_{x}$. Indiana Univ. Math. J., 68(3):761–797, 2019. * [QX19b] Zhongmin Qian and Guangyu Xi. Parabolic equations with singular divergence-free drift vector fields. J. Lond. Math. Soc. (2), 100(1):17–40, 2019. * [Sak20] Georgios Sakellaris. Scale invariant regularity estimates for second order elliptic equations with lower order coefficients in optimal spaces. arXiv preprint arXiv:2005.14086, 2020. * [Sem06] Yu. A. Semenov. Regularity theorems for parabolic equations. J. Funct. Anal., 231(2):375–417, 2006. * [SSvZ12] Gregory Seregin, Luis Silvestre, Vladimír Šverák, and Andrej Zlatoš. On divergence-free drifts. J. Differential Equations, 252(1):505–540, 2012. * [Str88] Michael Struwe. On partial regularity results for the Navier-Stokes equations. Comm. Pure Appl. Math., 41(4):437–458, 1988. * [SVZ13] Luis Silvestre, Vlad Vicol, and Andrej Zlatoš. On the loss of continuity for super-critical drift-diffusion equations. Archive for Rational Mechanics and Analysis, 207(3):845–877, 2013\. * [Tao13] Terence Tao. Localisation and compactness properties of the Navier-Stokes global regularity problem. Anal. PDE, 6(1):25–107, 2013. * [Tru71] Neil S. Trudinger. On the regularity of generalized solutions of linear, non-uniformly elliptic equations. Arch. Rational Mech. Anal., 42:50–62, 1971. * [Wu21] Bian Wu. On supercritical divergence-free drifts. arXiv preprint arXiv:2106.02408, 2021. * [Zha04] Qi S. Zhang. A strong regularity result for parabolic equations. Communications in Mathematical Physics, 244(2):245–260, 2004. * [Zha20] Xicheng Zhang. Maximum principle for non-uniformly parabolic equations and applications. arXiv preprint arXiv:2012.05026, 2020. * [Zhi04] V. V. Zhikov. Remarks on the uniqueness of the solution of the Dirichlet problem for a second-order elliptic equation with lower order terms. Funktsional. Anal. i Prilozhen., 38(3):15–28, 2004.
arxiv-papers
2021-07-26T23:03:12
2024-09-04T03:07:20.156834
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Dallas Albritton, Hongjie Dong", "submitter": "Dallas Albritton", "url": "https://arxiv.org/abs/2107.12511" }
2107.12515
# On the improved no-local-collapsing theorem of Ricci flow Wangjian Jian Academy of Mathematics and Systems Science$\And$Hua Loo-Keng Key Laboratory of Mathematics, Chinese Academy of Sciences, Beijing, 100190, China. [email protected] ###### Abstract. In this note we derive an improved no-local-collapsing theorem of Ricci flow under the scalar curvature bound condition along the worldline of the basepoint. It is a refinement of Perelman’s no-local-collapsing theorem. ## 1\. Introduction In 1982, Hamilton [4] introduced the Ricci flow equation, which is defined by $\frac{\partial g(t)}{\partial t}=-2\textnormal{Ric}(g(t)).$ Since then, Ricci flow has became a very powerful tool in understanding the geometry and topology of Riemannian manifolds. In Perelman’s groundbreaking work [5] [6] [7], the Ricci flow was used to give the proof of the Poincaré and geometrization conjecture. The no-local-collapsing theorem of Perelman is important in his work of Ricci flow. In his work, whenever we need to take a Gromov-Hausdorff limit, we need to apply the no-local-collapsing theorem. Perelman introduced two approaches to prove the no-local-collapsing theorem: $\mathcal{W}$-entropy and spacetime geometry, and both of them have became very useful tool in the study of Ricci flow theory. Let us first recall Perelman’s no-local-collapsing theorem. ###### Theorem 1.1 (Perelman [5]). For any $A<\infty$ and dimension $n$, there exists $\kappa=\kappa(n,A)>0$ such that the following holds: Let $(M,(g(t))_{t\in[-r^{2}_{0},0]})$ be a Ricci flow on compact, $n$-dimensional manifold that satisfies: 1. (1) $|\textnormal{Rm}|\leq r_{0}^{-2}$, on $P(x_{0},-r_{0}^{2},r_{0};r_{0}^{2})$; 2. (2) $\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))\geq A^{-1}r_{0}^{n}$. Then for any other metric ball $B_{g(0)}(x,r)\subset B_{g(0)}(x_{0},Ar_{0})$ with $r\leq r_{0}$ and (1.1) $|\textnormal{Rm}|\leq r^{-2},~{}on~{}P(x,0,r;-r^{2}),$ we have (1.2) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq\kappa r^{n}.$ Next, let us recall some extensions of this no-local-collapsing theorem. In [13], Zhang localized Perelman’s $\mathcal{W}$-entropy and the differential Harnack inequality, and proved a uniform local Sobolev inequality for the metric ball $B_{g(0)}(x_{0},Ar_{0})$ (see [13, Theorem 6.3.2]). Then he showed that the curvature condition (1.1) in Theorem 1.1 can be relaxed to scalar curvature bound at the final time slice, namely (1.3) $R\leq r^{-2},~{}on~{}B_{g(0)}(x,r).$ Then, Wang [12] gave an independent proof of this improved no-local-collapsing theorem, where he can relax the curvature condition (1) in Theorem 1.1 to the Ricci curvature bound (1.4) $|\textnormal{Ric}|\leq r_{0}^{-2},~{}on~{}P(x_{0},-r_{0}^{2},r_{0};r_{0}^{2}),$ and Wang also found its application to Kähler-Ricci flow on smooth minimal models of general type. Lately, under the same curvature condition (1.4), Tian-Zhang [11] established a relative volume comparison theorem of Ricci flow, that is, they remove the non-collapsing condition (2) in Theorem 1.1 for the initial metric, and obtain (1.5) $\frac{\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))}{r_{0}^{n}}\geq\kappa\frac{\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))}{r^{n}}.$ Using this estimate, Song-Tian-Zhang [10] obtained the diameter bound for the long time solution of the normalized Kähler-Ricci flow under the assumption of a local Ricci curvature bound. The author and Song [9] gave an alternative proof of Tian-Zhang’s [11] relative volume comparison theorem by using the Nash entropy; using the idea of the proof, we obtained the diameter bound for the long time solution of the normalzied Kähler-Ricci flow without assuming local Ricci curvature bound. The Nash entropy used in [9] was introduced by Hein-Naber [8], where they obtained heat kernel bounds and $\varepsilon$-regularity theorem for Ricci flow. Later in [1], Bamler established systematic results on the Nash entropy and heat kernel bounds on Ricci flow background. With these bases, in [2] [3], Bamler established the compactness theory of Ricci flow and the structure theory of non-collapsed limits of Ricci flows. Our main result in this note is the following theorem which improves Perelman’s no-local-collapsing theorem. ###### Theorem 1.2. For any $A<\infty$ and dimension $n$, there exists $\kappa=\kappa(n,A)>0$ such that the following holds: Let $(M,(g(t))_{t\in[-2r^{2}_{0},0]})$ be a Ricci flow on compact, $n$-dimensional manifold, with a base point $x_{0}$ that satisfies: 1. (1) $R(x_{0},t)\leq\frac{A}{|t|}$, for $t\in[-r_{0}^{2},0)$; 2. (2) $\textnormal{Vol}_{g(-r_{0}^{2})}(B_{g(-r_{0}^{2})}(x_{0},r_{0}))\geq A^{-1}r_{0}^{n}$. Then for any other metric ball $B_{g(0)}(x,r)\subset B_{g(0)}(x_{0},Ar_{0})$ with $r\leq r_{0}$ and (1.6) $R\leq r^{-2},~{}on~{}B_{g(0)}(x,r),$ we have (1.7) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq\kappa r^{n}.$ In the proof of the theorem, we shall also use the Nash entropy and heat kernel bounds on Ricci flow background, which are establisehed by Bamler in [1]. The ingredient of the proof is that we need to estimate the $W_{1}$-distance of two points on the same worldline by using the heat kernel upper bound of Ricci flow. Acknowledgements The author would like to thank Gang Tian, Jian Song, Zhenlei Zhang, Yalong Shi for inspiring discussions. ## 2\. Preliminaries We recall some basic definitions and results of Ricci flow in this section. This is the framework establisehed by Bamler in [1]. Let $(M,(g(t))_{t\in I})$ be a smooth Ricci flow on a compact $n$-manifold with $I\subset\mathbb{R}$ being an interval. Let $(x_{0},t_{0})\in M\times I$ with $A,T^{-},T^{+}\geq 0$, the parabolic neighborhood is defined as $P(x_{0},t_{0},A;-T^{-},T^{+}):=B(x_{0},t_{0},A)\times([t_{0}-T^{-},t_{0}+T^{+}]\cap I).$ We consider the heat operator $\Box:=\partial_{t}-\Delta_{g(t)},$ and the conjugate heat operator $\Box^{*}:=-\partial_{t}-\Delta_{g(t)}+R,$ where $R$ denotes the scalar curvature at time $t$. For any $x,y\in M$ and $s,t\in I$ with $s\leq t$, we denote by $K(x,t;y,s)$ the heat kernel along the Ricci flow. That is, for fixed $(y,s)$, the function $K(\cdot,\cdot;y,s)$ is a heat kernel based at $(y,s)$: $\Box K(\cdot,\cdot;y,s)=0;~{}~{}~{}~{}\lim_{t\searrow s}K(\cdot,t;y,s)=\delta_{y},$ and for fixed $(x,t)$, the function $K(x,t;\cdot,\cdot)$ is a conjugate heat kernel based at $(x,t)$: $\Box^{*}K(x,t;\cdot,\cdot)=0;~{}~{}~{}~{}\lim_{s\nearrow s}K(x,t;\cdot,s)=\delta_{x}.$ ###### Definition 2.1. For $(x,t)\in M\times I$ and $s\in I$ with $s\leq t$, we denote by $\nu_{x,t;s}$ the conjugate heat kernel measure based at $(x,t)$ as follows: $d\nu_{x,t;s}:=K(x,t;\cdot,\cdot)dg(t)=:(4\pi\tau)^{-n/2}e^{-f}dg(t),$ where $\tau=t_{0}-t$ and $f\in C^{\infty}(M\times(I\cap(\infty,t)))$ is called the potential. Basically, in Bamler’s viewpoint, instead of considering a point $(x,t)$ in spcaetime, we shall consider its corresponding conjugate heat kernel measure $d\nu_{x,t;s}$ as defined above. Then Bamler used the $W_{1}$-Wasserstein distance to define distance between the conjugate heat kernel measures based at different points. If $\mu_{1}$ and $\mu_{2}$ denotes two probability measures on a complete manifold $M$ and $g$ is a Riemannian metric on $M$, then we define the $W_{1}$-distance between $\mu_{1}$ and $\mu_{2}$ by $d_{W_{1}}^{g}(\mu_{1},\mu_{2}):=\sup_{f}\left(\int_{M}fd\mu_{1}-\int_{M}fd\mu_{2}\right),$ where the supremum is taken over all bounded, $1$-Lipschitz function $f:M\to\mathbb{R}$. Bamler also used the important notion called variance, which in some sense is the $L^{2}$-norm of the probability measures on a Riemannian manifold. The definition is the following $\textnormal{Var}(\mu_{1},\mu_{2}):=\int_{M}\int_{M}d^{2}(\mu_{1},\mu_{2})d\mu_{1}(x_{1})d\mu_{2}(x_{2}).$ If $(M,(g(t))_{t\in I})$ is a Ricci flow and if there is chance of confusion, then we will also write $\textnormal{Var}_{t}$ for the variance with respect to the metric $g(t)$. We have the following basic relation between the variance and the $W_{1}$-distance: (2.1) $d^{g}_{W_{1}}(\mu_{1},\mu_{2})\leq\sqrt{\textnormal{Var}(\mu_{1},\mu_{2})},$ for any two probability measures. Now we can define the $H_{n}$-center of a given base point in Ricci flow. ###### Definition 2.2. A point $(z,t)\in M\times I$ is called an $H_{n}$-center of a point $(x_{0},t_{0})\in M\times I$ if $t\leq t_{0}$ and $\textnormal{Var}_{t}(\delta_{z},\nu_{x_{0},t_{0};t})\leq H_{n}(t_{0}-t).$ Given $(x_{0},t_{0})\in M\times I$ and $t\leq t_{0}$, there always exists at least one $z\in M$ such that $(z,t)\in M\times I$ is an $H_{n}$-center of $(x_{0},t_{0})$, (see [1, Proposition 3.12]),and for such $H_{n}$-center, using inequality (2.1), we always have $d^{g}_{W_{1}}(\delta_{z},\nu_{x_{0},t_{0};t})\leq\sqrt{\textnormal{Var}(\delta_{z},\nu_{x_{0},t_{0};t})}\leq\sqrt{H_{n}(t_{0}-t)}.$ Next, we come to define the so-called Nash entropy which was introduced by Hein-Naber [8]. Let $(M,g)$ be a closed Riemannian manifold of dimension $n$, $\tau>0$ and $d\nu=(4\pi\tau)^{-n/2}e^{-f}dg$ is a probability measure on $M$, where $f\in C^{\infty}(M)$, then the Nash entropy is defined by $\mathcal{N}[g,f,\tau]=\int_{M}fd\nu-\frac{n}{2}.$ Then we can define ###### Definition 2.3. Consider a conjugate heat kernel measure $d\nu_{x_{0},t_{0};t}:=K(x_{0},t_{0};\cdot,t)dg(t)=(4\pi\tau)^{-n/2}e^{-f_{t}}dg(t),$ based at some point $(x_{0},t_{0})\in M\times I$, where $\tau=t_{0}-t$, the pointed Nash entropy based at $(x_{0},t_{0})$ is defined as $\mathcal{N}_{x_{0},t_{0}}(\tau):=\mathcal{N}[g_{t_{0}-\tau},f_{t_{0}-\tau},\tau].$ We set $\mathcal{N}_{x_{0},t_{0}}(0)=0$. For $s<t_{0}$, $s\in I$, we will write $\mathcal{N}^{*}_{s}(x_{0},t_{0}):=\mathcal{N}_{x_{0},t_{0}}(t-s).$ The pointed Nash entropy $\mathcal{N}_{x_{0},t_{0}}(\tau)$ is non-increasing when $\tau\geq 0$ is increasing. For more basic properties of the pointed Nash entropy, We refer the readers to [1, Proposition 5.2]. (See also Hein-Naber’s work [8].) The following lemma is proved in [1, Theorem 5.9, Corollary 5.11]. ###### Lemma 2.4. If $R(\cdot,s)\geq R_{min}$ for some $s\in I$, then on $M\times I\cap\left((s,\infty)\right)$, (2.2) $|\nabla\mathcal{N}^{*}_{s}|\leq\left(\frac{n}{2(t-s)}+|R_{min}|\right)^{1/2}.$ Furthermore, if $s<t^{*}\leq\min{t_{1},t_{2}}$ and $s,t_{1},t_{2}\in I$, then for any $x_{1},x_{2}\in M$, (2.3) $\begin{split}&\mathcal{N}^{*}_{s}(x_{1},t_{1})-\mathcal{N}^{*}_{s}(x_{2},t_{2})\\\ \leq&\left(\frac{n}{2(t^{*}-s)}+|R_{min}|\right)^{1/2}d_{W_{1}}^{g(t^{*})}(\nu_{x_{1},t_{1}}(t^{*}),\nu_{x_{2},t_{2}}(t^{*}))+\frac{n}{2}\log\left(\frac{t_{2}-s}{t^{*}-s}\right).\\\ \end{split}$ The following volume non-collapsing estimate is proved in [1] as a generalization of Perelman’s $\kappa$-non-collapsing theorem. ###### Lemma 2.5. Let $(M,(g(t))_{t\in[-r^{2},0]})$ be a solution of the Ricci flow. If $R\leq r^{-2},~{}on~{}B_{g(0)}(x,r)\times[-r^{2},0],$ then (2.4) $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq c\exp(\mathcal{N}^{*}_{-r^{2}}(x,0))r^{n}.$ The following volume non-inflation estimate is also proved in [1]. ###### Lemma 2.6. Let $(M,(g(t))_{t\in[-r^{2},0]})$ be a solution of the Ricci flow. If $R\geq-r^{-2}$ on $M\times[-r^{2},0]$, then for any $A\geq 1$, there exists $C_{0}=C_{0}(n),C=C(n)>0$ such that (2.5) $\textnormal{Vol}_{g(0)}(x,Ar)\leq C\exp(\mathcal{N}^{*}_{-r^{2}}(x,0)+C_{0}A^{2})r^{n}.$ The following heat kernel upper bound estimate is proved in [1] (Theorem 7.2). ###### Lemma 2.7. Let $(M,(g(t))_{t\in I})$ be a solution of the Ricci flow. Suppose that $[s,t]\subset I$ and $R\geq R_{\min}$ on $M\times[s,t]$. Let $(z,s)\in M\times I$ be an $H_{n}$-center of $(x,t)\in M\times I$. Then for any $\varepsilon>0$ and $y\in M$, we have (2.6) $K(x,t;y,s)\leq\frac{C(R_{\min}(t-s),\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{2}_{s}(z,y)}{C(\varepsilon)(t-s)}\right).$ For more results on the entropy and heat kernel bounds on Ricci flow, we refer the readers to [1]. ## 3\. Proof of the improved no-local-collapsing theorem In this section, we come to prove Theorem 1.2. First, we need the following proposition. ###### Proposition 3.1. For any $T>0$, consider a smooth Ricci flow $(M,(g(t))_{t\in(-T,0)})$ on compact $n$-dimensional manifold, and choose $(s,t)\subset(-T,0)$ with $s+T>\varepsilon>0$. Consider a $C^{1}$ spacetime curve $\gamma:(0,t-s)\to M\times(-T,0)$ with $\gamma(\tau)\in M\times\left\\{t-\tau\right\\}$ between points $\gamma(0)=x$ and $\gamma(t-s)=y$. Then we have (3.1) $d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)\leq C(\varepsilon)\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}-\mathcal{N}_{x,t}(t-s)\right)^{\frac{1}{2}}\sqrt{t-s}.$ ###### Proof. This is obtain by Bamler in [3, Lemma 21.2], we include the proof for the convenience of the readers. First, from the definition of the reduced distance, we have $\ell_{(x,t)}(y,s)\leq\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}.$ Hence from the estimate of Perelman [5, Corollary 9.5], we have the following lower bound on the heat kernel (3.2) $\begin{split}K(x,t;y,s)\geq&\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\ell_{(x,t)}(y,s)\right)\\\ \geq&\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}\right).\\\ \end{split}$ But, since $s+T>\varepsilon$, we can apply the heat kernel upper bound estimate of Bamler, say Lemma 2.7, to obtain (3.3) $K(x,t;y,s)\leq\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{2}_{s}(z,y)}{C(\varepsilon)(t-s)}\right).$ where $(z,s)$ is an $H_{n}$-center of $(x,t)$. Hence by the triangle inequality and (2.1), we have (3.4) $\begin{split}&\left|d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)-d_{s}\left(y,z\right)\right|\\\ =&\left|d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)-d^{g(s)}_{W_{1}}\left(\delta_{y,s},\delta_{z,s}\right)\right|\\\ \leq&d^{g(s)}_{W_{1}}\left(\delta_{z,s},\nu_{x,t;s}\right)\leq\sqrt{\textnormal{Var}\left(\delta_{z,s},\nu_{x,t;s}\right)}\\\ \leq&\sqrt{H_{n}(t-s)}.\\\ \end{split}$ Hence, using the trivial inequality $(a-b)^{2}\geq\frac{a^{2}}{2}-4b^{2}$ for all $a,b\in\mathbb{R}$, we obtain $H_{n}(t-s)\geq\frac{1}{2}d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}-4d^{2}_{s}\left(y,z\right).$ Plugging this into inequality (3.3), we obtain (3.5) $\begin{split}K(x,t;y,s)\leq&\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)\right)\exp\left(-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}-C(n)(t-s)}{C(\varepsilon)(t-s)}\right)\\\ \leq&\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}}{C(\varepsilon)(t-s)}\right).\\\ \end{split}$ Combining (3.5) with (3.2),we obtain $\frac{1}{(4\pi(t-s))^{n/2}}\exp\left(-\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}\right)\leq\frac{C(\varepsilon)}{(t-s)^{n/2}}\exp\left(-\mathcal{N}_{x,t}(t-s)-\frac{d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)^{2}}{C(\varepsilon)(t-s)}\right).$ Rearranging this inequality, we obtain $d^{g(s)}_{W_{1}}\left(\delta_{y,s},\nu_{x,t;s}\right)\leq C(\varepsilon)\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{t-s}}-\mathcal{N}_{x,t}(t-s)\right)^{\frac{1}{2}}\sqrt{t-s},$ which finishes the proof of the proposition. ∎ Now we can prove Theorem 1.2. ###### Proof of Theorem 1.2. After parabolic rescaling, we may assume without loss of generality that $r_{0}=1$, and then $r\leq 1$. Let $\gamma:[0,1]\to M\times[-1,0]$ be the spacetime curve defined by: $\gamma(\tau)=(x_{0},-\tau),~{}~{}~{}\tau\in[0,1],$ which is what we usually called the worldline. Then from our assumption, we have $R(\gamma(\tau),-\tau)\leq\frac{A}{\tau},~{}~{}\forall\tau\in(0,1],$ and hence we can compute (3.6) $\begin{split}\mathcal{L}(\gamma)=&\int_{0}^{1}\sqrt{\tau}\left(|\gamma^{\prime}(\tau)|^{2}_{-\tau}+R(\gamma(\tau),-\tau)\right)d\tau\\\ =&\int_{0}^{1}\sqrt{\tau}R(\gamma(\tau),-\tau)d\tau\\\ \leq&\int_{0}^{1}\sqrt{\tau}\cdot\frac{A}{\tau}d\tau\\\ \leq&2A.\end{split}$ Next, by the monotonicity of the Nash entropy, we have that $0\geq\mathcal{N}_{x_{0},0}(1)\geq\mathcal{N}_{x_{0},0}(2)$, and hence $0\leq-\mathcal{N}_{x_{0},0}(1)\leq-\mathcal{N}_{x_{0},0}(2)$. Hence, we can apply Proposition 3.1 together with (3.6) to obtain (3.7) $\begin{split}&d^{g(-1)}_{W_{1}}\left(\delta_{x_{0},-1},\nu_{x_{0},0;-1}\right)\\\ \leq&C\left(1+\frac{\mathcal{L}(\gamma)}{2\sqrt{0-(-1)}}-\mathcal{N}_{x_{0},0}(1)\right)^{\frac{1}{2}}\sqrt{0-(-1)}\\\ \leq&C\left(1-\mathcal{N}_{x_{0},0}(1)\right)^{\frac{1}{2}}.\\\ \end{split}$ where $C=C(n,A)$. Hence, by applying the Harnack estimate of Nash entropy proved by Bamler, say Lemma 2.4, we have (3.8) $\begin{split}&\left|\mathcal{N}^{*}_{-2}(x_{0},-1)-\mathcal{N}^{*}_{-2}(x_{0},0)\right|\\\ \leq&\left(\frac{n}{2((-1)-(-2))}+n\right)^{\frac{1}{2}}d^{g(-1)}_{W_{1}}\left(\delta_{x_{0},-1},\nu_{x_{0},0;-1}\right)+\frac{n}{2}\log\left(\frac{0-(-2)}{(-1)-(-2)}\right)\\\ \leq&C\left(C-\mathcal{N}^{*}_{-2}(x_{0},0)\right)^{\frac{1}{2}}+C\\\ \leq&100C^{2}+\frac{1}{100}\left(C-\mathcal{N}^{*}_{-2}(x_{0},0)\right)+C.\end{split}$ Hence we obtain (3.9) $\frac{99}{100}\mathcal{N}_{-2}^{*}(x_{0},0)\geq\mathcal{N}_{-2}^{*}(x_{0},-1)-C$ But by the volume non-inflating estimate, say Lemma 2.6, since we can assumed without loss of generality that $R\geq-n$, we have $A^{-1}\leq\textnormal{Vol}_{g(-1)}(B_{g(-1)}(x_{0},1))\leq C\exp\left(\mathcal{N}_{x_{0},-1}(1)\right),$ which can be written as $\mathcal{N}_{-2}^{*}(x_{0},-1)=\mathcal{N}_{x_{0},-1}(1)\geq-C(n,A).$ Combining this with (3.9), we obtain (3.10) $\mathcal{N}_{-2}^{*}(x_{0},0)\geq-C,$ for some $C=C(n,A)\leq\infty$. Next, by the gradient estimate of the Nash entropy in Lemma 2.4 , we have (3.11) $\left|\mathcal{N}^{*}_{-2}(x_{0},0)-\mathcal{N}^{*}_{-2}(x,0)\right|\leq C(n)d_{0}(x_{0},x)\leq C(n)A,$ Combining (3.10) and (3.11) we obtain $\mathcal{N}_{x,0}(2)=\mathcal{N}^{*}_{-2}(x,0)\geq-C,$ Then we apply the monotonicity of the Nash entropy to obtain (note that $r\leq 1$) $\mathcal{N}_{x,0}(r^{2})\geq\mathcal{N}_{x,0}(2)\geq-C.$ But we have assumed that $R\leq r^{-2}$ on $B_{g(0)}(x,r)$, we can apply the lower volume bound estimate, say Lemma 2.5, to obtain that: $\textnormal{Vol}_{g(0)}(B_{g(0)}(x,r))\geq c(n)\exp\left(\mathcal{N}_{x,0}(r^{2})\right)r^{n}\geq\kappa(n,A)r^{n},$ which finishes the proof of the theorem. ∎ ## References * [1] Bamler, R., Entropy and heat kernel bounds on a Ricci flow background,arXiv:2008.07093. * [2] Bamler, R., Compactness theory of the space of Super Ricci flows, arXiv:2008.09298. * [3] Bamler, R., Structure theory of non-collapsed limits of Ricci flows, arXiv:2009.03243. * [4] Hamilton, R., Three-manifolds with positive Ricci curvature, J. Differential Geom, 1982, 17: 255–306. * [5] Perelman, G., The entropy formula for the Ricci flow and its geometric applications, preprint, math.DG/0211159. * [6] Perelman, G., Ricci flow with surgery on three-manifolds, preprint, math.DG/0303109v1. * [7] Perelman, G., Finite extinction time for the solutions to the Ricci flow on certain three manifolds, preprint, math.DG/0307245 * [8] Hein, H. and Naber, A., New logarithmic Sobolev inequalities and an $\varepsilon$-regularity theorem for the Ricci flow, Comm. Pure Appl. Math. 67 (2014), no. 9, 1543–1561. * [9] Jian, W. and Song, J., Diameter and Ricci curvature estimates for long-time solutions of the Kähler-Ricci flow, arXiv:2101.04277. * [10] Song, J., Tian, G. and Zhang, Z.L., Collapsing behavior of Ricci-flat Kahler metrics and long time solutions of the Kahler-Ricci flow, arXiv:1904.08345. * [11] Tian, G. and Zhang, Z.L., Relative volume comparison of Ricci Flow, Sci. China Math. (2021). https://doi.org/10.1007/s11425-021-1869-5. * [12] Wang, B., The local entropy along Ricci flow, Part A: the no-local-collapsing theorems, Camb. J. Math. 6 (2018), no. 3, 267-346. * [13] Zhang, Q.S., Sobolev Inequalities, Heat Kernels under Ricci Flow, and the Poincaré Conjecture, Boca Raton: CRC Press, 2011.
arxiv-papers
2021-07-26T23:37:26
2024-09-04T03:07:20.181150
{ "license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/", "authors": "Wangjian Jian", "submitter": "Wangjian Jian", "url": "https://arxiv.org/abs/2107.12515" }
2107.12519
# Proactive Composition of Mobile IoT Energy Services Abdallah Lakhdari School of Computer Science The University of Sydney, Australia [email protected] Athman Bouguettaya School of Computer Science The University of Sydney, Australia [email protected] ###### Abstract We propose a novel proactive composition framework of wireless energy services in a crowdsourced IoT environment. We define a new model for energy services and requests that includes providers’ and consumers’ mobility patterns and energy usage behavior. The proposed composition approach leverages the mobility and energy usage behavior to generate energy services and requests proactively. Preliminary experimental results demonstrate the effectiveness of generating proactive energy requests and composing proactive services. ###### Index Terms: Crowdsourcing; Wireless Energy; IoT; Proactive composition; energy service; Mobility; usage behavior; ## I Introduction The proliferation of the Internet of things (IoT), particularly wearables, may give rise to a self-sustained crowdsourced IoT ecosystem [1]. The augmented capabilities of IoT devices such as sensing and computing resources may be leveraged for peer-to-peer sharing. People can exchange a wide range of IoT services such as computing offloading, hotspot proxies, energy sharing, etc. These crowdsourced IoT services present a convenient, cost-effective, and sometimes the only possible solution for a resource-constrained device [2]. For instance, a passenger’s smartphone with low battery power may elect to receive energy from nearby wearables using Wifi [3]. The focus of this paper is on crowdsourcing IoT energy services. The concept of wireless crowdsharing has been recently introduced to provide IoT users with power access, anywhere anytime, through crowdsourcing[3][4]. We leverage the service paradigm to unlock the full potential of IoT energy crowdsourcing. We define an IoT Energy Service as the abstraction of energy wireless delivery from an IoT device (i.e., provider) to another device (i.e., consumer) [5]. Crowdsourcing IoT energy services has the potential of creating a green service exchange environment by recycling the unused IoT energy or relying on renewable energy sources. For example, an IoT device may share its spare energy with another IoT device in its vicinity. Another example, a smart shoe may harvest energy from the physical activity of its wearer [6][7]. Additionally, wireless charging allows energy crowdsharing to be a convenient alternative as the devices do not need to be tethered to a power point, nor use power banks. Crowdsourcing energy services can be deployed through already existing wireless power transfer technologies such as Energous111https://www.energous.com/ which can deliver up to 3 Watts power within a 5-meter distance to multiple receivers. Service composition is expected to play a vital role in the crowdsourced IoT environment. A single IoT energy service may not fulfill the requirement of a consumer due to the limited resources of wearables [8]. Instead, multiple services need to be composed to provision one energy request. Existing energy service composition frameworks mainly consist of the real-time discovery and selection of nearby energy services to accommodate an energy request. These techniques assume that a request can be fulfilled by the available energy services within its vicinity [9]. The focus of these composition techniques was only on the spatio-temporal composability [5] and addressing the challenges related to the energy fluctuation, the mobility, and the conflicts of the available services [10][11][12]. The crowdsourced IoT energy ecosystem is a dynamic environment that consists of providers and consumers congregating and moving across microcells boundaries. A microcell is any confined area in a smart city where people may gather (e.g., coffee shops, restaurants, museums, library), see figure 1. Energy service providers and consumers may have different spatio-temporal preferences. These preferences’ incongruity may severely impact the balance between energy services and existing energy requests. For instance, in a particular location at a specific time, an energy consumer might not find the required energy amount to fulfill their request. We propose a novel model for mobile crowdsourced energy services, a major extension of the deterministic energy service model in [5]. According to extensive experiments, it has been proven that human mobility is highly predictable [13]. This predictability can be related to the rough regularity of our daily routines [14]. We leverage these mobility patterns and the energy usage behavior of energy consumers and providers to propose a proactive composition approach. The proposed approach (i) proactively defines services and requests for energy providers and consumers, respectively, according to their spatio-temporal preferences and energy requirements. (ii) For each consumer, the proactive composition approach defines an optimal set of energy requests ahead of time after estimating their spatio-temporal preferences, their energy usage behavior, and the energy availability likelihood at each microcell. Figure 1: Crowdsourcing IoT energy services We propose a proactive service composition framework that captures and leverages the spatio-temporal preferences of energy providers and consumers. The proactive service composition identifies, for an energy request, when, where, and which set of energy services to compose. The goal is to avoid the under-provision of energy requests and balance the energy requests and services within and across microcells. Our proposed solution’s novelty is that energy services are composed seamlessly without affecting the usage behavior and the mobility patterns of service providers and consumers. First, the proposed composition framework anticipates the next required energy based on the energy usage behavior. The proactive composition, then, plans, ahead of time, the location, time, and required amount of one or multiple energy requests according to the consumer’s mobility pattern. Additionally, the proposed composition approach considers the availability of energy services within the microcells to be passed by the consumer. The composition framework determines the availability of energy services based on the energy usage behavior and the mobility patterns of the providers. The preferred solution is to select an optimal set of services and fulfill the requirement of an energy consumer without affecting the spatio-temporal preferences of the providers and consumers. The main contributions are: * • A novel model to represent the proactive energy services and requests by leveraging IoT users’ spatio-temporal preferences and their energy usage behavior. * • A proactive composition framework that automatically matches proactive service with proactive energy requests in a crowdsourced IoT environment. ## II Motivating scenario Figure 2: Student’s daily routine within the campus, spatio-temporal patterns and energy usage behavior We describe a scenario at the university campus where students move across, gather, and practice various activities in different confined places (i.e., microcells), e.g., library, study spaces, food court. We assume that students are incentivized to recycle the spare energy of their IoT devices by sharing it with nearby devices [15]. Energy providers advertise their energy services in different microcells within the smart campus according to their spatio- temporal preferences and their energy usage behavior. The advertisement presents a description of the provided service, e.g., location, start and end time, the provided energy amount. A centralized IoT coordinator processes all energy services, i.e., an edge server responsible for sharing crowdsourced IoT energy services (see figure 1). Typically, in an energy crowdsharing environment, whenever a student needs to recharge their smartphone, they launch an energy request in a microcell in the following form: User $x$ requires an amount of energy $E$ in the location $L$ during the period $[st~{},~{}et]$. The IoT coordinator then composes the available nearby energy services to fulfill the said energy request [5]. However, sometimes, it is unlikely to find the required energy amount in a specific location or a specific time. Figure 2 presents a student’s daily routine within the campus coupled with their energy usage behavior. For example, the student has a class from 9 to 11 am, a 30 minutes coffee break after the class, then an important meeting with their supervisor, lunch break, and finally a 2 hours study session in the library before heading to the gym at the end of the day. The daily routine is drawn as a sequence of spatio-temporal events. Each event is represented by location, time frame, and the student’s smartphone energy status (i.e., battery state of charge and the estimated required energy). The student’s smartphone is set to automatically launch an energy request to nearby IoT devices whenever the battery state of charge reaches a predefined threshold, e.g., 20%. In this case, an energy request would be launched by the student’s smartphone in the library at around 4 pm to crowdsource nearby energy services [5]. Unfortunately, it is unlikely for the student to fulfill their energy requirement at this time in the library due to a supply shortage. This shortage can be related to several reasons; for instance, energy providers may run out of their spare energy. Another reason could be that multiple devices are requesting energy to ensure the functioning of their devices for the rest of the day. A better solution to crowdsource energy is to leverage the mobility patterns of students with their energy usage behavior to proactively define when, where, and how much energy to request to fulfill their energy requirement. Leveraging the student’s spatio-temporal preferences and their flexibility would increase the likelihood of providing the requested energy along with an insignificant alteration of the student’s daily routine. Instead of launching an energy request re-actively whenever a State of Charge (SoC) threshold is reached [4], the proactive composition selects the optimal time, location, and energy amount to request to fulfill their requirement. For instance, it can be easily anticipated that the smartphone’s battery at 4 pm in the library would not suffice their energy requirement based on the student’s smartphone’s estimated energy consumption behavior (see figure 2). Figure 2 also depicts the energy availability likelihood at each microcell visited by the student requesting energy. In that case, the energy provision likelihood in the library is estimated to be very low (e.g., 20%) according to the energy usage and provision behavior of the existing providers in the library at that time. However, it is shown that the available energy in other microcells visited earlier by the student according to their daily routine, namely, 70% in a visited coffee shop and 80% in the food court at lunchtime. The framework leverages the knowledge about the energy availability across microcells, the energy consumption behavior, and the spatio-temporal preferences of the student requesting energy to define one or multiple energy requests in the class, the coffee shop, and the food court, respectively, to fulfill the anticipated energy requirement. ## III Proactive energy services and requests An energy service is the abstraction of the wireless delivery of energy from an IoT device to another. We extend the existing energy service model to a proactive energy service model [5]. The proactive service model leverages the spatio-temporal patterns of energy providers along with the usage behavior of their IoT devices to seamlessly define, advertise, and share their spare energy without affecting their daily routine preferences. Each individual may concur with a pattern for their spatio-temporal preferences [13]. They might regularly visit particular places at specific times. These habits may define the mobility patterns of individuals [14]. We leverage mobility and energy usage patterns to define a model for proactive energy services and requests. ### III-A Proactive energy service model We define an energy provider as an IoT user who is willing to share the spare energy of their devices with nearby IoT devices. We use energy services to abstract the energy sharing process. An energy service is the abstraction of the wireless delivery of energy from an IoT device to another [4]. In the previous energy service model. Energy provision was under the complete control of the IoT device owners. They manually advertise their services [5]. We extend the existing energy service model by formally representing the spatio-temporal patterns and the energy usage behavior of providers. The goal is to automatically define the optimal time, location, and energy amount to provide according to the daily routine of the provider. For example, if a provider $i$ usually spends half an hour in a particular restaurant $L_{i}$ at lunchtime $T_{i}$ and their battery state of charge is $SoC_{i}$, the proposed model would capture the spatio-temporal pattern $<L_{i},T_{i},SoC_{i}>$. In addition to capturing this pattern, the proactive energy service model estimates the energy usage distribution and verifies if it is enough energy for the rest of the day. Accordingly, the service model defines the energy amount to share $E_{i}$ while staying at that restaurant. We formally define a proactive energy service as follows: ###### Definition 1. A proactive energy service _ $PES$ is represented as a tuple $<S,P,F,Q,M,U>$, where: _ * • $S$ is a unique ID for the energy service * • $P$ is a unique ID for the provider222In the rest of the paper, we assume that an energy provider shares energy only from one IoT device. Hence, Energy providers refers to both the device sharing energy and the owner of the device. * • $F$ is the set of $PES$ functionalities offered by the service, * • $Q$ is a tuple of $<q_{1},q_{2},...,q_{n}>$, each $q_{i}$ denotes a QoS property of $PES$. [4]. * • $M$ is the mobility patterns of the provider $P$. * • $U$ represents the energy usage behavior of a provider $P$. ###### Definition 2. The quality attributes of an energy service _QoS is a set of parameters that allows energy consumers to distinguish among IoT energy services[5], namely:_ * • $l$ is the location of the consumer. * • $r$ is the range for a successful wireless energy transfer. * • $st$ and $et$ represent the start time and end time of an energy service respectively. * • $DEC$ is the deliverable energy capacity. * • $I$ is the intensity of the wirelessly transferred current. * • $Tsr$ represents the transmission success rate. * • $Rel_{i}$ is the reliability of the provider. ### III-B Proactive energy request model An energy consumer in the crowdsourced IoT environment is an IoT user who requests energy for their devices from nearby IoT devices. We define an energy request as an abstraction of the energy consumer requirement according to their spatio-temporal preferences [4]. In the existing energy service model. Energy consumption is under the complete control of the IoT device owners. They manually request energy according to their preferences [5]. Defining energy requests automatically, based on the anticipated mobility and usage behavior, increases the chances to fulfill the requirement of a consumer. For instance, a consumer might reserve proactive energy services ahead of time according to their preferences and the availability of services within the microcells visited by the consumer. ###### Definition 3. A proactive energy service request _is a tuple $Rq<t,l,RE,CI,du>$, where:_ * • $t$ is the timestamp when the energy request is launched. * • $l$ is the location of the consumer. We assume that the consumer is staying at their location $l$ within one microcell after launching their energy request. * • $RE$ represents the required amount of energy. * • $CI$ is the maximum intensity of the wireless current that a consuming IoT device can receive. * • $du$ refers to the charging period [4]. ### III-C Patterns of energy providers and consumers It has been proven that human mobility is highly predictable according to an extensive set of experiments on capturing the movement of millions of humans in metropolitan areas [13]. The regularity in human mobility could be reflected on the IoT devices associated with their owners to define the mobility patterns of energy services users in a crowdsourced IoT environment [9]. Additionally, the energy consumption behavior of IoT devices reflects the usage behavior of the devices by their owners. A recent study that adopted a crowdsourcing-based method to model the energy consumption of smartphones revealed a certain regularity in the energy consumption behavior tightly correlated with the daily routine activities of the smartphone owners [16]. Similarly, we leverage the captured regularity in the energy consumption behavior to automatically define energy services and requests in the crowdsourced IoT environment. In what follows, we define the mobility and the energy usage patterns of energy providers and consumers. ###### Definition 4. Mobility patterns _The mobility pattern $M$ of an IoT user in the crowdsourced IoT energy environment is the captured spatio-temporal sequence of the IoT user activities during their daily routine._ The daily routine spatio-temporal sequence can be represented as a probabilistic time series that denotes at each timestamp the availability likelihood of the IoT user $i$ in a specific location $loc_{i}$ at a particular time $t_{i}$. Formally, the mobility $M_{i}$ of an IoT user $i$ is a tuple $M_{i}(t_{i},loc_{i},\theta_{i})$. * • $t_{i}=\\{t_{i0},t_{i1},t_{i2},~{}..,t_{in}\\}$ is the set of timestamps. In this work, we consider a five minutes time interval between two consecutive timestamps. * • $loc_{i}=\\{loc_{i0},loc_{i1},~{}..,loc_{in}\\}$ is the set of visited locations by the IoT user $i$. * • $\theta_{i}$ is the likelihood that the provider $i$ is at location $loc_{i}$ at time $t_{i}$. Each $\theta_{ik}\in\theta_{i}=\\{\theta_{i0},\theta_{i1},\theta_{i2},~{}..,\theta_{in}\\}$ is the probability that IoT user $i$ is in the location $loc_{ik}$ at timestamp $t_{i}k$. $\theta_{i}<l_{i}=loc_{i}>=f(H_{i})$ The IoT user’s availability probability distribution function $f_{i}$ can be obtained by statistical methods applied on the historical records $H_{i}$ of the IoT user $i$ [17]. ###### Definition 5. Energy usage behavior _The usage behavior $U$ of an IoT user is the captured state of charge of the user’s battery during the day._ The IoT user’s battery state of charge patterns are represented as a time series that denotes at each timestamp the estimated battery level according to their historical record of energy usage. Similarly, the energy usage behavior $U_{i}$ can be formally represented as a tuple $U_{i}(t_{i},SoC_{i})$. * • $t_{i}=\\{t_{i0},t_{i1},t_{i2},~{}..,t_{in}\\}$ is the set of timestamps. In this work, we also consider a five minutes time interval between two consecutive timestamps to capture the energy usage behavior. * • $SoC_{i}=\\{SoC_{i0},SoC_{i1},SoC_{i2},~{}..,SoC_{in}\\}$ is the state of charge temporal sequence of the IoT users $i$. ###### Definition 6. The flexibility of energy consumers _is defined by their toleration to stick or change the anticipated microcell to visit at a specific time and their toleration to extend or shorten their stay time in that microcell_ Typically, according to the activities of our daily routine activities, some of the visited places are unchangeable. For example, a student cannot change the location or the time of their class from 9 to 11 am. However, it is obviously possible to change the venue to have a coffee or a lunch (see red and blue circles in figure 2). Additionally, the interval of time spent in regularly visited places e.g., coffee shops or food courts can be defined as a range between the minimum and the maximum duration a person would stay [18]. We incorporate the flexibility of energy consumers based on their toleration to change the microcell and the range of their usual stay in that microcell. The flexibility $Fx$ of an energy consumer $i$ is associated with their mobility pattern. It can be modeled as a tuple $Fx_{i}<A_{i},Ch_{i},Sr_{i}>$ where: * • $A_{i}$ is the availability distribution for all visited microcells $MCL$ during the daily routine of the energy consumer $i$. $MCL_{ik}\in MCL_{i}=\\{MCL_{i0},MCL_{i1},~{}..,MCL_{in}\\}$ * • $Ch_{i}$ is the corresponding distribution that indicates for each microcell if it is tolerated to be changed. * • $Sr_{i}$ is the tolerance distribution that indicates if the stay time can be extended or shortened in a visited microcell. The availability distribution of a consumer $i$ can be derived from the mobility pattern of that consumer $M_{i}$. The toleration distributions $Ch_{i}$ and $Sr_{i}$ can be presented as a binary sequence of the all the visited microcells $MCL$ during the daily routine of the energy consumer $i$ $MCL_{ik}\in MCL_{i}=\\{MCL_{i0},MCL_{i1},MCL_{i2},~{}..,MCL_{in}\\}$ as follows: $Ch_{ik}=1~{}if~{}MCL_{ik}~{}is~{}changeable;~{}~{}0~{}otherwise$ $Sr_{ik}=1~{}if~{}T<MCL_{ik}>~{}is~{}flexible;~{}~{}0~{}otherwise$ Where $T<MCL_{ik}>$ is the stay time interval of the energy consumer $i$ at the microcell $k$. Algorithm 1 Proactive composition algorithm 1:$<$ $Provider$, $Consumer$, $Microcell$ $>$ 2:$<Consumerplan>,~{}<ER>$ 3:Define mobility plan for each provider $ProvPlan$ 4:Define proactive services $<PES>$ 5:Generate the mobility graph MG 6:Estimate the energy availability 7:Define proactive requests $<ER>$ 8:Define mobility plan for each consumer $ConsPlan$ 9:return $ConsPlan$ ### III-D Proactive composition framework The proposed framework utilizes the previous definitions in the composition as follows (See Algorithm 1): 1. 1. According to the daily behavior of the energy provider, one or multiple energy services can be generated. The spatio-temporal quality attributes of these energy services (i.e., $l,st$ and $et$) are defined based on the mobility pattern $M$ of that provider, e.g., time spent in regularly visited places based on their daily activity model [13]. $DEC$ and $Rel_{i}$ are estimated by the energy usage model $U$ of their IoT device. $I$ and $Tsr$ are defined based on the specifications of the IoT devices sharing energy [9]. 2. 2. Similarly, according to the daily routine of the energy consumer, one or multiple energy requests can be generated. The spatio-temporal features of these energy requests (i.e., $l,st$ and $du$) are defined based on the mobility patterns of the energy consumer. $RE$ is estimated by the energy usage model of the IoT device. $CI$ is defined based on the specifications of the IoT devices requesting energy [5]. 3. 3. The framework creates a mobility graph where the nodes and the edges represent the microcells and the movement of IoT users between these microcells, respectively. 4. 4. The framework estimates the energy availability at each microcell based on the generated proactive services and the estimated energy to be shared by each service. 5. 5. The energy consumer then selects the microcells to visit according to the activity sequence of their daily routine and their anticipated energy requirement as follows: 1. (a) The consumer first identifies the flexible and the non-flexible activities based on their mobility pattern [10]. 2. (b) The consumer identifies their energy requirements during the day based on their energy usage behavior. 3. (c) The energy consumer defines their mobility plan in the form of a path within the energy availability graph. 4. (d) For each proactive energy request, the framework performs a spatio-temporal composition of the available energy services [9]. ## IV Preliminary experiments We conduct a set of experiments to evaluate the proposed concepts of proactive service and requests and the proactive composition. We assess the effectiveness of the proactive composition approach by measuring the ratio of successful requests in and across different microcells. We compare the proposed approach with a state-of-the-art algorithm, i.e., the spatio-temporal composition of energy services [5] and with a brute-force-based composition approach. Figure 3: Provisioning variation according to the energy availability ### IV-A Datasets and experiment environment To the best of our knowledge, it is challenging to find a dataset about the energy wireless transfer among human-centric IoT devices. We create a crowdsourced IoT environment scenario close to reality. We mimic the crowd’s energy harvesting and sharing behavior by utilizing QLD smartgrid333https://data.gov.au/dataset an energy sharing smart-grid of 25 houses in Australia. In our experiment, we define the energy service QoS parameters, the deliverable energy capacity $DEC$, and the intensity of the transferred current $I$ from the QLD smartgrid dataset. The transmission success rate $Tsr$ QoS parameter is randomly generated. Similarly, the energy requirement of a request $Rq.RE$ is also generated from the daily energy consumption of the houses. We use Yelp444https://www.yelp.com/dataset dataset to simulate the spatio- temporal features of energy services and requests. The dataset contains information about the crowd’s behavior in different venues in multiple cities. Our experiment only focuses on people’s check-ins information in confined areas, e.g., coffee shops. For each venue ($business\\_id$), we extract the crowd size ($Checkins$) at each hour ($hour$) of the day ($weekday$). We assume these people as IoT users. They may offer energy services from their IoT devices while staying in a confined area. We define spatio-temporal features of energy services and requests by generating the check-in and check- out timestamps of customers to microcells. For example, the start time $st$ of an energy service from an IoT user is the time of their check-ins into a coffee shop. Figure 4: Successful requests with different techniques ### IV-B Effectiveness We investigate the effectiveness of the proactive composition by comparing the number of successfully served requests by the three composition algorithms (see figure 4). This initial comparison aims to mention the overall behavior of the three composition techniques in three different settings. Namely, high availability (i.e., six energy services for one request), average availability of energy across microcells (i.e., three energy services for one request), scarce energy availability (i.e., one energy service for one energy request). As a baseline to compare with, the brute force composition technique requests energy from every visited microcell. It is expected to see the best behavior with this composition technique. The poor performance of the spatio-temporal composition is expected because the algorithm has not been designed to adjust according to the external environment. It is worth mentioning that with the change in the energy availability across microcells, the difference between the three techniques remains almost similar. The closeness between the brute force-based composition and the proactive composition is a positive indicator of the effectiveness of the proactive composition. We run another experiment to investigate the effectiveness of adapting energy requests to the energy availability within and across microcells. We change the ratio of number of services/number of requests from 1 to 9 and measure the received energy amount per request. Figure 3 presents the behavior of the three composition techniques. There is an apparent closeness between the behavior of the brute force-based composition and the proactive composition with a remarkable difference with the performance of the spatio-temporal composition. However, the experiment shows no significant difference between the spatio-temporal and the proactive composition algorithms when the energy availability is low, namely when the ratio number of services/number of requests is between 1 and 2.5. After these values, the proactive composition behavior improves significantly. Adjusting the energy requirements and proactively redefining energy requests according to the availability of energy services and spatio-temporal preferences would increase the chances of fulfilling the consumer’s requirements during their daily routine. ## V Conclusion We propose a novel proactive spatio-temporal composition framework to crowdsource energy services from IoT devices. The goal is to seamlessly meet users’ energy requirements in the dynamic crowdsourced IoT environment. We define a proactive energy service and request models to automatically generate services and requests according to the spatio-temporal and energy usage patterns of the providers and consumers respectively. The proactive composition approach anticipates the requirements of energy consumers and plans when, where, and how much energy to request for each energy consumer. Preliminary experiments show that proactively generating requests is able to balance the energy supply-demand in the crowdsourced energy market. ## References * [1] L. Atzori _et al._ , “The internet of things: A survey,” _Computer networks_ , vol. 54, no. 15, pp. 2787–2805, 2010. * [2] K. Habak _et al._ , “Femto clouds: Leveraging mobile devices to provide cloud service at the edge,” in _IEEE CLOUD_ , 2015. * [3] T.P. Raptis, “Online social network information can influence wireless crowd charging,” in _IEEE DCOSS_ , 2019. * [4] A. Lakhdari _et al._ , “Crowdsourcing energy as a service,” in _Springer ICSOC_ , 2018. * [5] A. Lakhdari _et al._ , “Composing energy services in a crowdsourced iot environment,” _IEEE TSC_ , 2020. * [6] Y.M. Choi _et al._ , “Wearable biomechanical energy harvesting technologies,” _MDPI Energies_ , 2017. * [7] M. Gorlatova _et al._ , “Movers and shakers: Kinetic energy harvesting for the internet of things,” in _ACM SIGMETRICS Performance Evaluation Review_ , 2014. * [8] A. Lakhdari _et al._ , “Crowdsharing wireless energy services,” in _2020 IEEE CIC_. USA: IEEE, 2020, pp. 18–24. * [9] A. Lakhdari and A. Bouguettaya, “Fluid composition of intermittent iot energy services,” in _SCC_. IEEE, 2020. * [10] A. Lakhdari _et al._ , “Elastic composition of crowdsourced iot energy services,” in _Mobiquitous_. EAI, 2020. * [11] A. Abusafia and A. Bouguettaya, “Reliability model for incentive-driven iot energy services,” in _Mobiquitous_ , 2020. * [12] D. Chaki _et al._ , “A conflict detection framework for iot services in multi-resident smart homes,” in _IEEE ICWS_ , 2020. * [13] M.C. Gonzalez _et al._ , “Understanding individual human mobility patterns,” _nature_ , 2008. * [14] Z. Yang _et al._ , “Mobility increases localizability: A survey on wireless indoor localization using inertial sensors,” _ACM Computing Surveys_ , 2015. * [15] A. Abusafia _et al._ , “Incentive-based selection and composition of iot energy services,” in _SCC (accepted)_. IEEE, 2020. * [16] E. Peltonen _et al._ , “Energy modeling of system settings: A crowdsourced approach,” in _PerCom_. IEEE, 2015\. * [17] S. Deng _et al._ , “Constraints-driven service composition in mobile cloud computing,” in _IEEE ICWS_ , 2016. * [18] T.M.T. Do and D. Gatica-Perez, “The places of our lives: Visiting patterns and automatic labeling from longitudinal smartphone data,” _IEEE Mobile Computing_ , 2013.
arxiv-papers
2021-07-26T23:48:47
2024-09-04T03:07:20.190976
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Abdallah Lakhdari and Athman Bouguettaya", "submitter": "Abdallah Lakhdari", "url": "https://arxiv.org/abs/2107.12519" }
2107.12528
# Abstract Differential Equations and Caputo Fractional Derivative Paulo M. de Carvalho-Neto Departamento de Matemática, Centro de Ciências Físicas e Matemáticas, Universidade Federal de Santa Catarina, Florianópolis - SC, Brazil [email protected] ###### Abstract. In this work I consider the abstract Cauchy problems with Caputo fractional time derivative of order $\alpha\in(0,1]$, and discuss the continuity of the respective solutions regarding the parameter $\alpha$. I also present a study about the continuity of the Mittag-Leffler families of operators (for $\alpha\in(0,1]$), induced by sectorial operators. ###### Key words and phrases: fractional differential equations, Mittag-Leffler operators, sectorial operators, semilinear equations ###### 2010 Mathematics Subject Classification: 26A33, 35R11, 33E12 ## 1\. Contextualization of the Main Problem Let me begin by presenting the abstract Cauchy problem $\left\\{\begin{array}[]{l}cD^{\alpha}_{t}u(t)=Au(t)+f(t,u(t)),\,\,\,t\geq 0,\\\ u(0)=u_{0}\in X,\end{array}\right.$ ($P_{\alpha}$) where $X$ is a Banach space over $\mathbb{C}$, $\alpha\in(0,1]$, $A:{D}(A)\subset X\rightarrow X$ is a sectorial operator, $f:[0,\infty)\times X\rightarrow X$ is a continuous function and $cD^{\alpha}_{t}$ denotes Caputo fractional derivative of order $\alpha$, when $\alpha\in(0,1)$, and denotes the standard derivative when $\alpha=1$. (see Section 2 for more details). In a previous work [3] (see also [4]), which was done with some collaborators, I have presented several results about the existence, uniqueness and continuation of mild solutions to problem ($P_{\alpha}$), when $\alpha\in(0,1)$. In fact, the results obtained in [3] are similar to the classical results that are obtained when $\alpha=1$. Therefore, in order to clarify the differences between these two situations, let me present the following notions and results. ###### Definition 1. Consider $\alpha\in(0,1]$ and $T$ a positive real value. * (a) A function $\phi_{\alpha}:[0,T]\rightarrow X$ is called a local mild solution of ($P_{\alpha}$) in $[0,T]$ if $\phi_{\alpha}\in C([0,T];X)$ and $\phi_{\alpha}(t)=\left\\{\begin{array}[]{ll}E_{\alpha}(At^{\alpha})u_{0}+\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})f(s,\phi_{\alpha}(s))ds,&\\\ &\textrm{if }\alpha\in(0,1),\vspace*{0.2cm}\\\ e^{At}u_{0}+\displaystyle\int_{0}^{t}e^{A(t-s)}f(s,\phi_{\alpha}(s))ds,&\textrm{if }\alpha=1,\end{array}\right.$ for every $t\in[0,T].$ * (b) A function $\phi:[0,T)\rightarrow X$ is called a local mild solution of ($P_{\alpha}$) in $[0,T)$, if for any $T^{*}\in(0,T)$, $\phi(t)$ is a local mild solution of ($P_{\alpha}$) in $[0,T^{*}]$. ###### Definition 2. Let $\alpha\in(0,1]$ be given. A function $\phi:[0,\infty)\rightarrow X$ is called a global mild solution of ($P_{\alpha}$), if for any $T^{*}>0$, $\phi(t)$ is a local mild solution of ($P_{\alpha}$) in $[0,T^{*}]$. It worths to recall that the family of operators $\\{e^{At}:t\geq 0\\}\subset\mathcal{L}(X)$ is the standard analytic semigroup generated by the sectorial operator $A$, while the families $\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}\subset\mathcal{L}(X)$ and $\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq 0\\}\subset\mathcal{L}(X)$, which are called Mittag-Leffler operators, are standard from the literature of fractional differential equations (see for instance [3], and references therein). However, for the completeness of this manuscript I also present more details about these operators in Section 2. By introducing the notions of continuation of mild solution and maximal local mild solution, it is possible to prove an interesting result, which was called in [3] “Blow up Alternative”. The “Blow up Alternative” was what motivated the discussion proposed in this work. ###### Definition 3. Let $\alpha\in(0,1]$ and let $\phi_{\alpha}:[0,{T})\rightarrow X$ be a local mild solution in $[0,{T})$ of problem ($P_{\alpha}$). If ${T^{*}}\geq{T}$ and ${\phi_{\alpha}}^{*}:[0,{T^{*}}]\rightarrow X$ is a local mild solution to ($P_{\alpha}$) in $[0,{T^{*}}]$, with ${\phi_{\alpha}}^{*}(t)=\phi_{\alpha}(t)$, for every $t\in[0,T)$, then I say that ${\phi_{\alpha}}^{*}(t)$ is a continuation of $\phi_{\alpha}(t)$ over $[0,{T^{*}}]$. ###### Definition 4. Consider $\alpha\in(0,1]$ and $\phi_{\alpha}:[0,T)\rightarrow X$. If $\phi(t)$ is a local mild solution of ($P_{\alpha}$) in $[0,T)$ that does not have a continuation in $[0,T]$, then I call it a maximal local mild solution of ($P_{\alpha}$) in $[0,T)$. ###### Theorem 5 (Blow up Alternative). Let $\alpha\in(0,1)$ and $f:[0,\infty)\times X\rightarrow X$ be a continuous function, locally Lipschitz in the second variable, uniformly with respect to the first variable, and bounded (i.e. it maps bounded sets onto bounded sets). Then problem ($P_{\alpha}$) has a global mild solution $\phi_{\alpha}(t)$ in $[0,\infty)$ or there exist $\omega_{\alpha}\in(0,\infty)$ such that $\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ is a maximal local mild solution in $[0,\omega_{\alpha})$, and in such a case, $\limsup_{t\rightarrow{\omega_{\alpha}}^{-}}\|\phi_{\alpha}(t)\|=\infty$. ###### Remark 6. Although in [3] I have not presented a proof for Theorem 5 in the case $\alpha=1$, it is simple to adapt such result. Therefore, since this proof does not bring any gain to the results discussed in this paper, I prefer to omit it from this manuscript. Theorem 5 is my main concern from now on. Observe that for each $\alpha\in(0,1)$ there exists $\omega_{\alpha}>0$ (it may occurs $\omega_{\alpha}=\infty$ for some values of $\alpha\in(0,1]$) and a respective maximal local mild solution (or global mild solution) $\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ to problem ($P_{\alpha}$). It is very natural that several questions can be raised from the facts emphasized above. In this paper, the main questions I discuss are the following: * Q1) Does $E_{\alpha}(At^{\alpha})$ converges to the semigroup $e^{At}$, when $\alpha\rightarrow 1^{-}$, in some sense? * Q2) Does $E_{\alpha,\alpha}(At^{\alpha})$ converges to the semigroup $e^{At}$, when $\alpha\rightarrow 1^{-}$, in some sense? * Q3) Is the intersection of every $[0,\omega_{\alpha})$ non trivial, i.e., $\\{0\\}\subsetneq\stackrel{{\scriptstyle[}}{{\alpha\in(0,1]}}]{}{\bigcap}[0,\omega_{\alpha})\,\,?$ * Q4) Does $\phi_{\alpha}(t)$ converges to $\phi_{1}(t)$, when $\alpha\rightarrow 1^{-}$, in some sense? The set of questions made above are called here the “Limit Problems”. The main objective of this work is to answer these questions as fully as possible. In order to describe the subjects dealt with in this work, I present a short summary of each of the following sections. Section 2 makes a small survey about the notions used in this manuscript as a whole. To be more precise, in this section I recall the notions of sectorial operators, analytical semigroups, Mittag-Leffler operators and Caputo fractional derivative of order $\alpha\in(0,1)$. Finally, in Section 3 I present the results that answer the four questions called the Limit Problems, while in Section 4 I present a short last discussion about the results obtained in Section 3. ## 2\. A Small Survey on Sectorial Operators and Fractional Calculus Let me begin by recalling the notions of sectorial operators and analytical semigroups. It worths to emphasize that for a complete discussion of these notions I may refer to [8, 9, 10, 13] and the references therein. ###### Definition 7. A semigroup of linear operators on $X$, or simply semigroup, is a family $\\{T(t):t\geq 0\\}\subset\mathcal{L}(X)$ such that: * i) $T(0)=I_{X}$, where $I=I_{X}$ is the identity operator in $X$. * ii) It holds that $T(t)T(s)=T(t+s)$, for any $t,s\geq 0$. ###### Definition 8. Assume that $\\{T(t):t\geq 0\\}$ is a semigroup. If it holds that $\lim_{t\rightarrow 0^{+}}T(t)x=x,$ for every $x\in X$, then I say that it is a $C_{0}$-semigroup. ###### Definition 9. Let $\\{T(t):t\geq 0\\}$ be a $C_{0}$-semigroup. Its Infinitesimal generator is the linear operator $A:{D}(A)\subset X\to X$, where ${D}(A):=\left\\{x\in X:\lim_{t\rightarrow 0^{+}}\dfrac{T(t)x-x}{t}\,\textrm{ exists}\right\\}$ and $Ax:=\lim_{t\rightarrow 0^{+}}\dfrac{T(t)x-x}{t}.$ From the definitions above, I may present the classical result that relates semigroups and the linear part of ($P_{\alpha}$), when $\alpha=1$. ###### Theorem 10. Suppose that $\\{T(t):t\geq 0\\}\subset\mathcal{L}(X)$ is a $C_{0}$-semigroup on $X$. If $A:{D}(A)\subset X\to X$ is the infinitesimal generator of $\\{T(t):t\geq 0\\}$, then $A$ is a closed and densely defined linear operator. Also, for any $x\in{D}(A)$ the application $[0,\infty)\ni t\to T(t)x\in X$ is continuously differentiable and $\dfrac{d}{dt}T(t)x=AT(t)x=T(t)Ax,\qquad\forall t>0.$ ###### Proof. See Theorems 10.3.1 and 10.3.3 in [9]. ∎ ###### Remark 11. From now on, to avoid confusion in this manuscript, whenever $A$ is the infinitesimal generator of $\\{T(t):t\geq 0\\}$, I shall write that $e^{At}$ instead of $T(t)$. Now I describe an important curve in the complex plane, that is used throughout the text. ###### Definition 12. The symbol $Ha$ denotes the Hankel’s path, if there exist $\epsilon>0$ and $\theta\in(\pi/2,\pi)$, where $Ha=Ha_{1}+Ha_{2}-Ha_{3}$, and the paths $Ha_{i}$ are given by $Ha=\left\\{\begin{array}[]{l}Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\\\ Ha_{2}:=\\{\epsilon e^{it}:t\in[-\theta,\theta)\\},\\\ Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.\end{array}\right.$ The following discussion provides a brief description of the basic results of the theory of sectorial operators and analytical semigroups. ###### Definition 13. Let $A:{D}(A)\subset X\to X$ be a closed and densely defined operator. The operator $A$ is said to be a sectorial operator if there exist $\theta\in(\pi/2,\pi)$ and $M_{\theta}>0$ such that $S_{\theta}:=\\{\lambda\in\mathbb{C}\,:\,|\arg(\lambda)|\leq\theta,\,\lambda\not=0\\}\subset\rho(A)$ and $\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in S_{\theta}.$ ###### Theorem 14. If $A:{D}(A)\subset X\to X$ is a sectorial operator, then $A$ generates a $C_{0}$-semigroup $\\{e^{At}:t\geq 0\\}$, which is given by $e^{At}=\dfrac{1}{2\pi i}\int_{Ha}{e^{\lambda t}(\lambda-A)^{-1}}\,d\lambda,\quad\forall t\geq 0,$ where $Ha\subset\rho(A)$. Moreover, there exists $M_{1}>0$ such that $\|e^{At}\|_{\mathcal{L}(X)}\leq M_{1},\quad\|Ae^{At}\|_{\mathcal{L}(X)}\leq(M_{1}/t),$ for every $t>0$. Finally, for any $x\in X$ the function $[0,\infty)\ni t\mapsto e^{At}x\in X$ is analytic and $\dfrac{d}{dt}e^{At}x=Ae^{At}x,$ for every $t>0$. ###### Proof. See Theorem 1.3.4 in [8] or Theorem 6.13 in [13, Chapter 2]. ∎ Now, let me draw our attention to the fractional calculus, the Mittag-Leffler functions and their relations with the sectorial operators. ###### Definition 15. For $\alpha\in(0,1)$ and $f:[0,T]\rightarrow{X}$, the Riemann-Liouville fractional integral of order $\alpha>0$ of $f(t)$ is defined by $J_{t}^{\alpha}f(t):=\dfrac{1}{\Gamma(\alpha)}\displaystyle\int_{0}^{t}{(t-s)^{\alpha-1}f(s)}\,ds,$ (1) for every $t\in[0,T]$ such that integral (1) exists. Above $\Gamma$ denotes the classical Euler’s gamma function. ###### Definition 16. For $\alpha\in(0,1)$ and $f:[0,T]\rightarrow{X}$, the Caputo fractional derivative of order $\alpha\in(0,1)$ of $f(t)$ is defined by $cD_{t_{0},t}^{\alpha}f(t):=\dfrac{d}{dt}\Big{\\{}J_{t}^{1-\alpha}\big{[}f(t)-f(0)\big{]}\Big{\\}},$ (2) for every $t\in[0,T]$ such that (2) exists. ###### Remark 17. I could have defined Caputo fractional derivative for any $\alpha>0$, however this is not the focus of this work. It also worths to emphasize that $cD_{t}^{1}$ is indeed equal to $(d/dt)$. I end this section presenting the Mittag-Leffler operators which are related with the solution of the linear part of ($P_{\alpha}$), when $\alpha\in(0,1)$ (confront the following result with Theorem 14). ###### Theorem 18. Let $\alpha\in(0,1)$ and suppose that $A:{D}(A)\subset X\to X$ is a sectorial operator. Then, the operators $E_{\alpha}(At^{\alpha}):=\frac{1}{2\pi i}\int_{Ha}e^{\lambda t}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}d\lambda,\quad t\geq 0,$ and $E_{\alpha,\alpha}(At^{\alpha}):=\frac{t^{1-\alpha}}{2\pi i}\int_{Ha}e^{\lambda t}(\lambda^{\alpha}-A)^{-1}d\lambda,\quad t\geq 0,\vspace*{0.2cm}$ where $Ha\subset\rho(A)$, are well defined. Furthermore, it holds that: * (i) $E_{\alpha}(At^{\alpha})x|_{t=0}=E_{\alpha,\alpha}(At^{\alpha})x|_{t=0}=x$, for any $x\in X$; * (ii) $E_{\alpha}(At^{\alpha})$ and $E_{\alpha,\alpha}(At^{\alpha})$ are strongly continuous, i.e., for each $x\in X$ $\lim_{t\rightarrow 0^{+}}{\|E_{\alpha}(At^{\alpha})x-x\|}=0\quad\textrm{and}\quad\lim_{t\rightarrow 0^{+}}{\|E_{\alpha,\alpha}(At^{\alpha})x-x\|}=0;$ * (iii) There exists a constant $M_{2}>0$ (uniform on $\alpha$) such that $\sup_{t\geq 0}{\|E_{\alpha}(At^{\alpha})\|_{\mathcal{L}(X)}}\leq M_{2}\quad\textrm{and}\quad\sup_{t\geq 0}{\|E_{\alpha,\alpha}(At^{\alpha})\|_{\mathcal{L}(X)}}\leq M_{2};$ * (iv) For each $x\in X$, the function $[0,\infty)\ni t\mapsto E_{\alpha}(At^{\alpha})x$ is analytic and it is the unique solution of $cD_{t}^{\alpha}E_{\alpha}(At^{\alpha})x=AE_{\alpha}(At^{\alpha})x,\qquad t>0.$ ###### Proof. See Theorem 2.1 in [3] and Theorem 2.44 in [4]. ∎ ###### Remark 19. For a more complete survey on the special functions named Mittag-Leffler, I suggest the very interesting book [6]. ## 3\. The Limit Problems Like it was pointed out in Section 1, here I focus my attention in the Limit Problems. At first, I would like to emphasize that the study I am proposing here was already discussed in the literature, however seeking to answer other questions. I can cite as examples two papers, namely [1, 11]. For instance, Almeida-Ferreira in [1] studied this kind of limit questions involving the solutions of the semilinear fractional partial differential equation, $\left\\{\begin{array}[]{ll}cD_{t}^{1+\alpha}u(t,x)=\triangle_{x}u(t,x)+|u(t,x)|^{\rho}u(t,x),&(t,x)\in[0,\infty)\times\mathbb{R}^{n},\\\ u(0,x)=u_{0}\textrm{ and }\partial_{t}u(0,x)=0,&x\in\mathbb{R}^{n},\end{array}\right.$ for $\alpha\in(0,1)$, which interpolates the semilinear heat and wave equations. They studied the existence, uniqueness and regularity of solution to this problem in Morrey spaces and then showed that when $\alpha\rightarrow 1^{-}$, the solution of the problem loses its native regularity. On the other hand, in [11] the authors discuss these kind of limits to $\alpha-$times resolvent families, which are not our main objective here. ### 3.1. Questions Q1) and Q2) In order to give a complete answer, let me begin by proving the following limit theorems. ###### Theorem 20. Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and $\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that $\alpha\in(0,1)$ and consider the Mittag-Leffler family of operators $\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$. Then, for each $t\geq 0$ I have that $\lim_{\alpha\rightarrow 1^{-}}{\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}}=0.$ Moreover, the convergence is uniform on every compact $S\subset(0,\infty)$, i.e., $\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in S}\big{[}\|E_{\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$ ###### Proof. Let me assume that $x\in X$ and $t>0$. Consider $\theta\in(\pi/2,\pi)$, $S_{\theta}$ the sector associated with the sectorial operator $A$ and $M_{\theta}>0$ such that $\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in S_{\theta}.$ (3) Choose $\epsilon>1$ and consider the Hankel’s path $Ha=Ha_{1}+Ha_{2}-Ha_{3}$, where $Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\ Ha_{2}:=\\{\epsilon e^{it}:t\in[-\theta,\theta]\\},\\\ Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.$ The choices made above ensures that $Ha\subset\rho(A)$, therefore observe by Theorem 14 and Theorem 18 that $E_{\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi i}\displaystyle\int_{Ha}e^{\lambda t}\Big{[}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}x-\lambda^{\alpha-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\\\ +\dfrac{1}{2\pi i}\displaystyle\int_{Ha}e^{\lambda t}\Big{[}\lambda^{\alpha-1}(\lambda-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda,$ what is equivalent to $E_{\alpha}(At^{\alpha})x-e^{At}x\\\ =\sum_{j=1}^{3}\left\\{\dfrac{1}{2\pi i}\displaystyle\int_{Ha_{i}}e^{\lambda t}\Big{[}\lambda^{\alpha-1}(\lambda^{\alpha}-A)^{-1}x-\lambda^{\alpha-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\right.\\\ \left.+\dfrac{1}{2\pi i}\displaystyle\int_{Ha_{i}}e^{\lambda t}\Big{[}\lambda^{\alpha-1}(\lambda-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda\right\\}.$ Using the first resolvent identity (see [5, Lemma 6]) in the first term in the right side of the above equality, I obtain the identity $E_{\alpha}(At^{\alpha})x-e^{At}x\\\ =\dfrac{1}{2\pi i}\left\\{\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda t}\Big{[}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{]}\,d\lambda\right.\right.\\\ \left.\left.+\displaystyle\int_{Ha_{i}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\\}\right\\}.$ (4) Now assume that $S\subset(0,\infty)$ is a compact set and define the real values $M_{1}=\min\\{s:s\in S\\}\quad\textrm{e}\quad M_{2}=\max\\{\epsilon\cos(s)t:s\in[-\theta,\theta]\textrm{ and }t\in S\\}.$ If $t\in S$, I have that: (i) Over $Ha_{1}$ $\int_{Ha_{1}}e^{\lambda t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\ =\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\big{(}\tau e^{i\theta}\big{)}^{\alpha-1}\Big{[}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{]}\\\ \times\Big{(}\big{(}\tau e^{i\theta}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\tau e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$ and $\displaystyle\int_{Ha_{1}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\\\ =\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\Big{[}\big{(}\tau e^{i\theta}\big{)}^{\alpha-1}-1\Big{]}\Big{(}\big{(}\tau e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$ from which, by considering the sectorial operator estimate (3), I deduce $\left\|\int_{Ha_{1}}e^{\lambda t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{1}(\alpha)\|x\|,$ for every $t\in S$, and $\left\|\displaystyle\int_{Ha_{1}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\ \leq M_{\theta}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{i\theta}\big{)}^{\alpha-1}-1\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{2}(\alpha)\|x\|,$ for every $t\in S$. (ii) Over $Ha_{2}$ $\int_{Ha_{2}}e^{\lambda t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\ =\int_{-\theta}^{\theta}e^{(\epsilon e^{i\tau})t}\Big{\\{}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}\Big{[}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{]}\\\ \times\Big{(}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\epsilon e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$ and $\displaystyle\int_{Ha_{2}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\\\ =\int_{-\theta}^{\theta}e^{(\epsilon e^{i\tau})t}\Big{\\{}\Big{[}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}-1\Big{]}\Big{(}\big{(}\epsilon e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$ by considering the sectorial operator estimate (3), I deduce $\left\|\int_{Ha_{2}}e^{\lambda t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq\dfrac{(M_{\theta})^{2}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]\\\ \leq\dfrac{(M_{\theta})^{2}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]=:\mathcal{J}_{3}(\alpha)\|x\|,$ for every $t\in S$, and $\left\|\displaystyle\int_{Ha_{2}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\ \leq\dfrac{M_{\theta}\|x\|}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau\right]=:\mathcal{J}_{4}(\alpha)\|x\|.$ for every $t\in S$. (iii) Over $Ha_{3}$ it is analogous to item (i), therefore $\left\|\int_{Ha_{1}}e^{\lambda t}\Big{\\{}\lambda^{\alpha-1}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{5}(\alpha)\|x\|,$ and $\left\|\displaystyle\int_{Ha_{1}}e^{\lambda t}[\lambda^{\alpha-1}-1](\lambda-A)^{-1}x\,d\lambda\right\|\\\ \leq M_{\theta}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}^{\alpha-1}-1\Big{|}}{\tau^{2}}\,d\tau\right]=:\mathcal{J}_{6}(\alpha)\|x\|.$ Therefore, I can estimate (4) by $\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\sum_{i=1}^{6}\mathcal{J}_{i}(\alpha),$ for every $t\in S$. A consequence of the dominated convergence theorem ensures that $\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{i}(\alpha)=0,$ for every $i\in\\{1,\ldots,6\\}$, therefore I deduce that $\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in S}\big{[}\|E_{\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$ This is the second part of the proof. The first part, for the case $t>0$, follows from this second part, while the first part is trivial when $t=0$. ∎ ###### Theorem 21. Consider $A:D(A)\subset X\rightarrow X$ a sectorial operator, $\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$ and $\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$ the Mittag-Leffler family of operators. Now assume that: * (i) $\\{\alpha_{n}\\}_{n=1}^{\infty}\subset(0,1]$ and $\alpha\in(0,1]$ is such that $\lim_{n\rightarrow\infty}\alpha_{n}=\alpha;$ * (ii) $\\{\sigma_{n}\\}_{n=1}^{\infty}\subset[0,\infty)$ such that $\lim_{n\rightarrow\infty}\sigma_{n}=0.$ Then, it holds that $\lim_{n\rightarrow\infty}\|E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})-E_{\alpha}(A(\sigma_{n})^{\alpha})\|_{\mathcal{L}(X)}=0.$ ###### Proof. By following the same process presented in the proof of Theorem 20, I deduce that $E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})x-E_{\alpha}(A(\sigma_{n})^{\alpha})x\\\ =\dfrac{1}{2\pi i}\left\\{\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda\sigma_{n}}\Big{[}\lambda^{\alpha_{n}-1}[\lambda^{\alpha}-\lambda^{\alpha_{n}}](\lambda^{\alpha_{n}}-A)^{-1}(\lambda^{\alpha}-A)^{-1}x\Big{]}\,d\lambda\right.\right.\\\ \left.\left.+\displaystyle\int_{Ha_{i}}e^{\lambda\sigma_{n}}[\lambda^{\alpha_{n}-1}-\lambda^{\alpha-1}](\lambda^{\alpha}-A)^{-1}x\,d\lambda\right\\}\right\\}.$ Last identity allows me to obtain the inequality $\|E_{\alpha}(-At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\sum_{i=1}^{6}\mathcal{J}_{i}(\alpha,\alpha_{n}),$ for every $t\in S$, where $\mathcal{J}_{1}(\alpha,\alpha_{n})=(M_{\theta})^{2}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau e^{i\theta}\big{)}^{\alpha}-\big{(}\tau e^{i\theta}\big{)}^{\alpha_{n}}\Big{|}}{\tau^{2}}\,d\tau\right],\\\ \mathcal{J}_{2}(\alpha,\alpha_{n})=M_{\theta}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau e^{i\theta}\big{)}^{\alpha_{n}-1}-\big{(}\tau e^{i\theta}\big{)}^{\alpha-1}\Big{|}}{\tau^{2}}\,d\tau\right],$ $\mathcal{J}_{3}(\alpha,\alpha_{n})=\dfrac{(M_{\theta})^{2}}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha_{n}}\Big{|}\,d\tau\right],\\\ \mathcal{J}_{4}(\alpha,\alpha_{n})=\dfrac{M_{\theta}}{\epsilon}\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha_{n}-1}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}\Big{|}\,d\tau\right],$ $\mathcal{J}_{5}(\alpha,\alpha_{n})=(M_{\theta})^{2}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}^{\alpha}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha_{n}}\Big{|}}{\tau^{2}}\,d\tau\right],\\\ \mathcal{J}_{6}(\alpha,\alpha_{n})=M_{\theta}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]\sigma_{n}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}^{\alpha_{n}-1}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha-1}\Big{|}}{\tau^{2}}\,d\tau\right].$ Again, the dominated convergence theorem ensures that $\lim_{n\rightarrow\infty}\mathcal{J}_{i}(\alpha,\alpha_{n})=0,$ for every $i\in\\{1,\ldots,6\\}$, therefore I obtain $\lim_{n\rightarrow\infty}\|E_{\alpha_{n}}(A(\sigma_{n})^{\alpha_{n}})-E_{\alpha}(A(\sigma_{n})^{\alpha})\|_{\mathcal{L}(X)}=0.$ ∎ ###### Theorem 22. Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and $\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that $\alpha\in(0,1)$ and consider the Mittag-Leffler family of operators $\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq 0\\}$. Then, for each $t\geq 0$ I have that $\lim_{\alpha\rightarrow 1^{-}}{\|E_{\alpha,\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}}=0.$ Moreover, the convergence is uniform on every compact $S\subset(0,\infty)$, i.e., $\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in S}\big{[}\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$ ###### Proof. Like I did in the proof of Theorem 20, let me assume that $x\in X$ and $t>0$. Consider $\theta\in(\pi/2,\pi)$, $S_{\theta}$ the sector associated with the sectorial operator $A$ and $M_{\theta}>0$ such that $\|(\lambda-A)^{-1}\|_{\mathcal{L}(X)}\leq\dfrac{M_{\theta}}{|\lambda|},\,\,\,\,\forall\,\lambda\in S_{\theta}.$ (5) Choose $\epsilon>1$ and consider the Hankel’s path $Ha=Ha_{1}+Ha_{2}-Ha_{3}$, where $Ha_{1}:=\\{te^{i\theta}:t\in[\epsilon,\infty)\\},\ Ha_{2}:=\\{\epsilon e^{it}:t\in[-\theta,\theta]\\},\\\ Ha_{3}:=\\{te^{-i\theta}:t\in[\epsilon,\infty)\\}.$ The choices made above ensures that $Ha\subset\rho(A)$, therefore observe by Theorem 14 and Theorem 18 that $E_{\alpha,\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi i}\displaystyle\int_{Ha_{i}}e^{\lambda t}\Big{[}(\lambda^{\alpha}-A)^{-1}x-(\lambda-A)^{-1}x\Big{]}\,d\lambda,$ what, thanks to the first resolvent identity (see [5, Lemma 6]), is equivalent to $E_{\alpha,\alpha}(At^{\alpha})x-e^{At}x=\dfrac{1}{2\pi i}\sum_{j=1}^{3}\left\\{\displaystyle\int_{Ha_{i}}e^{\lambda t}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\,d\lambda\right\\}.$ Now consider $S\subset(0,\infty)$ a compact set and $M_{1}=\min\\{s:s\in S\\}\quad\textrm{e}\quad M_{2}=\max\\{\epsilon\cos(s)t:s\in[-\theta,\theta]\textrm{ and }t\in S\\}.$ If $t\in S$, I have that: (i) Over $Ha_{1}$ $\int_{Ha_{1}}e^{\lambda t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\ =\int_{\epsilon}^{\infty}e^{(\tau e^{i\theta})t}\Big{\\{}\Big{[}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{]}\Big{(}\big{(}\tau e^{i\theta}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\tau e^{i\theta}\big{)}-A\Big{)}^{-1}x\Big{\\}}e^{i\theta}\,d\tau,$ from which, by considering the sectorial operator estimate (5), I deduce $\left\|\int_{Ha_{1}}e^{\lambda t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{\alpha+1}}\,d\tau\right]=:\mathcal{J}_{1}(\alpha)\|x\|,$ for every $t\in S$. (ii) Over $Ha_{2}$ $\int_{Ha_{2}}e^{\lambda t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\\\ =\int_{-\theta}^{\theta}e^{(\epsilon e^{i\tau})t}\Big{\\{}\Big{[}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{]}\Big{(}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}-A\Big{)}^{-1}\Big{(}\big{(}\epsilon e^{i\tau}\big{)}-A\Big{)}^{-1}x\Big{\\}}i\epsilon e^{i\tau}\,d\tau,$ and therefore, if I consider the sectorial operator estimate (5), I obtain $\left\|\int_{Ha_{2}}e^{\lambda t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq(M_{\theta})^{2}\epsilon^{-\alpha}\|x\|\left[\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}-\big{(}\epsilon e^{i\tau}\big{)}^{\alpha}\Big{|}\,d\tau\right]=:\mathcal{J}_{2}(\alpha)\|x\|,$ for every $t\in S$. (iii) Over $Ha_{3}$ it is analogous to item (i), therefore $\left\|\int_{Ha_{1}}e^{\lambda t}\Big{\\{}[\lambda-\lambda^{\alpha}](\lambda^{\alpha}-A)^{-1}(\lambda-A)^{-1}x\Big{\\}}\,d\lambda\right\|\\\ \leq(M_{\theta})^{2}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{\alpha+1}}\,d\tau\right]=:\mathcal{J}_{3}(\alpha)\|x\|.$ Thus, I achieve the estimate $\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\leq\mathcal{J}_{1}(\alpha)+\mathcal{J}_{2}(\alpha)+\mathcal{J}_{3}(\alpha),$ for every $t\in S$. A consequence of the dominated convergence theorem ensures $\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{1}(\alpha)=0,\quad\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{2}(\alpha)=0,\quad\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{3}(\alpha)=0,$ therefore I have $\lim_{\alpha\rightarrow 1^{-}}\left\\{{\max_{s\in S}\big{[}\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|_{\mathcal{L}(X)}\big{]}}\right\\}=0.$ This is the second part of the proof. The first part, for the case $t>0$, follows from this second part, while the first part is trivial when $t=0$. ∎ A natural question that arises at this point of this manuscript is: Is it possible to obtain other modes of convergence to these operators? To answer this question, I begin by presenting the following notion. ###### Definition 23. Let $S\subset\mathbb{R}$ and $p\geq 1$. The symbol $L^{p}(S;\mathcal{L}(X))$ is used to represent the set of all Bochner measurable functions $f:S\rightarrow\mathcal{L}(X)$ for which $\|f\|_{\mathcal{L}(X)}\in L^{p}(S;\mathbb{R})$, where $L^{p}(S;\mathbb{R})$ stands for the classical Lebesgue space. Moreover, $L^{p}(S;\mathcal{L}(X))$ is a Banach space when considered with the norm $\|f\|_{L^{p}(S;\mathcal{L}(X))}:=\left[\int_{S}{\|f(s)\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}.$ The vectorial spaces $L^{p}(S;\mathcal{L}(X))$ are called Bochner-Lebesgue spaces. For more details on the Bochner measurable functions and Bochner-Lebesgue integrable functions, I may refer to [2, 12] and references therein. Now I present the last theorem of this subsection. ###### Theorem 24. Let $A:D(A)\subset X\rightarrow X$ be a sectorial operator and $\\{e^{At}:t\geq 0\\}$ the $C_{0}-$semigroup generated by $A$. Now assume that $\alpha\in(0,1)$ and consider the Mittag-Leffler families $\\{E_{\alpha}(At^{\alpha}):t\geq 0\\}$ and $\\{E_{\alpha,\alpha}(At^{\alpha}):t\geq 0\\}$. If $p\geq 1$ and $S\subset\mathbb{R}^{+}$ is compact, then $e^{At}\in L^{p}(S;\mathcal{L}(X)),\quad E_{\alpha}(At^{\alpha})\in L^{p}(S;\mathcal{L}(X))\quad\textrm{and}\quad E_{\alpha,\alpha}(At^{\alpha})\in L^{p}(S;\mathcal{L}(X)).$ Moreover, it holds that $\lim_{\alpha\rightarrow 1^{-}}\left[\int_{S}{\|E_{\alpha}(As^{\alpha})-e^{As}\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}=0,\\\ \lim_{\alpha\rightarrow 1^{-}}\left[\int_{S}{\|E_{\alpha,\alpha}(As^{\alpha})-e^{As}\|^{p}_{\mathcal{L}(X)}}\,ds\right]^{1/p}=0.$ ###### Proof. Like it was done in the proof of Theorem 20, if I choose $\epsilon>1$ and $\theta\in(\pi/2,\pi)$, with the aid of Theorem 14, I can deduce the existence of $\widetilde{M}>0$ such that $\|e^{At}\|_{\mathcal{L}(X)}\leq\widetilde{M}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}}{\tau}\,d\tau+\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\,d\tau\right]$ for every $t\in S$. Thus, by considering Minkowski’s integral inequality (see Theorem 202 in [7]) and the triangular inequality of $L^{p}(S;X)$, I obtain $\left[\int_{S}\|e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\leq\widetilde{M}\left[\int_{S}\left(\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}}{\tau}\,d\tau+\int_{-\theta}^{\theta}e^{[\epsilon\cos(\tau)]t}\,d\tau\right)^{p}\,dt\right]^{1/p}\\\ \leq\widetilde{M}\left[\int_{\epsilon}^{\infty}\left(\dfrac{1}{\tau}\right)\left(\int_{S}{e^{p[\tau\cos(\theta)]t}}\,dt\right)^{1/p}\,d\tau+\int_{-\theta}^{\theta}\left(\int_{S}{e^{p[\epsilon\cos(\tau)]t}}\,dt\right)^{1/p}\,d\tau\right].$ Define $M_{1}=\min\\{s:s\in S\\}\geq 0$ and $M_{2}=\max\\{s:s\in S\\}\geq 0$. Since $\cos(\theta)<0$ and $\cos(\tau)\leq 1$, if $\tau\in[-\theta,\theta]$, I can estimate the right side of the above inequality by $\widetilde{M}\left[\int_{\epsilon}^{\infty}\left(\dfrac{1}{\tau}\right)\left(\int_{M_{1}}^{M_{2}}{e^{p[\tau\cos(\theta)]t}}\,dt\right)^{1/p}\,d\tau+\int_{-\theta}^{\theta}|S|^{1/p}{e^{\epsilon M_{2}}}\,d\tau\right],$ in order to obtain $\left[\int_{S}\|e^{At}|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\ \leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon M_{2}}}\right]<\infty,$ i.e., $e^{At}\in L^{p}(S;\mathcal{L}(X))$. Now, bearing in mind Theorem 18 and following the exact same steps done above, I can deduce that $\left[\int_{S}\|E_{\alpha}(At^{\alpha})|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\ \leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon M_{2}}}\right]<\infty,$ and $\left[\int_{S}\|E_{\alpha,\alpha}(At^{\alpha})|^{p}_{\mathcal{L}(X)}\,dt\right]^{1/p}\\\ \leq\widetilde{M}\left[\left\\{\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}}{\big{[}p\tau^{\alpha p+1}(-\cos(\theta))\big{]}^{1/p}}\,d\tau\right\\}+2\theta|S|^{1/p}{e^{\epsilon M_{2}}}\right]<\infty.$ i.e., $E_{\alpha}(At^{\alpha}),E_{\alpha,\alpha}(At^{\alpha})\in L^{p}(S;\mathcal{L}(X))$. Now, let me prove the convergence. Like it was done in the proof of Theorem 20, I deduce the existence of $\widetilde{M}>0$ such that $\|E_{\alpha}(-At^{\alpha})x-e^{At}x\|\leq\widetilde{M}\|x\|\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right.\\\ \left.+\int_{-\theta}^{\theta}e^{M_{2}}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau+\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau e^{-i\theta}\big{)}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right],$ for every $t\in S$. At first, observe that the triangular inequality of $L^{p}(S;X)$ ensures that $\left(\int_{S}\|E_{\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}\\\ \leq\widetilde{M}\Big{[}\mathcal{I}_{\alpha}(t)+\mathcal{J}_{\alpha}+\mathcal{K}_{\alpha}(t)\Big{]},$ where $\mathcal{I}_{\alpha}(t)=\left(\int_{S}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]^{p}dt\right)^{1/p},\\\ \mathcal{J}_{\alpha}=|S|^{1/p}e^{M_{2}}\left[\int_{-\theta}^{\theta}\Big{|}\big{(}\epsilon e^{i\tau}\big{)}^{\alpha-1}-1\Big{|}\,d\tau\right],\\\ \textrm{ and }\quad\mathcal{K}_{\alpha}(t)=\left(\int_{S}\left[\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]t}\Big{|}\big{(}\tau e^{-i\theta}\big{)}-\big{(}\tau e^{-i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\,d\tau\right]^{p}dt\right)^{1/p}.$ Like above, by applying Minkowski’s integral inequality (see Theorem 202 in [7]) I deduce that $\mathcal{I}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\left[\left(\int_{M_{1}}^{M_{2}}e^{[p\tau\cos(\theta)]t}dt\right)^{1/p}\dfrac{\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\tau^{2}}\right]\,d\tau,$ what implies in the estimate $\mathcal{I}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{i\theta}\big{)}-\big{(}\tau e^{i\theta}\big{)}^{\alpha}\Big{|}}{\big{[}p\tau^{2p+1}\big{(}-\cos(\theta)\big{)}\big{]}^{1/p}}\,d\tau=:\mathcal{I}_{\alpha}.$ Similarly, I obtain $\mathcal{K}_{\alpha}(t)\leq\int_{\epsilon}^{\infty}\dfrac{e^{[\tau\cos(\theta)]M_{1}}\Big{|}\big{(}\tau e^{-i\theta}\big{)}^{\alpha}-\big{(}\tau e^{-i\theta}\big{)}\Big{|}}{\big{[}p\tau^{2p+1}\big{(}-\cos(\theta)\big{)}\big{]}^{1/p}}\,d\tau=:\mathcal{K}_{\alpha}.$ Again, as a consequence of the dominated convergence theorem I deduce that $\lim_{\alpha\rightarrow 1^{-}}\mathcal{I}_{\alpha}=0,\quad\lim_{\alpha\rightarrow 1^{-}}\mathcal{J}_{\alpha}=0\quad\textrm{and}\quad\lim_{\alpha\rightarrow 1^{-}}\mathcal{K}_{\alpha}=0,$ therefore $\lim_{\alpha\rightarrow 1^{-}}\left(\int_{S}\|E_{\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}=0.$ By analogous arguments I also conclude that $\lim_{\alpha\rightarrow 1^{-}}\left(\int_{S}\|E_{\alpha,\alpha}(-At^{\alpha})-e^{At}\|^{p}_{\mathcal{L}(X)}\,dt\right)^{1/p}=0.$ ∎ ###### Remark 25. Observe that for $S\subset(0,\infty)$ the convergence presented in the above result becomes a consequence of Theorems 20 and 22. However, since I am considering $S\subset\mathbb{R}^{+}$, the above result is in fact more general. ### 3.2. Questions Q3) and Q4) In this subsection I begin to deal with the nonlinearity $f(t,x)$, introducing new computations to the results obtained so far. Recall that if $f(t,x)$ is a continuous function, locally Lipschitz in the second variable, uniformly with respect to the first variable, and bounded (i.e. it maps bounded sets onto bounded sets), Theorem 5 and Remark 6 ensure that for any $\alpha\in(0,1]$, there exists $w_{\alpha}>0$ (which can be $\infty$) and a unique maximal local mild solution (or global mild solution) $\phi_{\alpha}:[0,\omega_{\alpha})\rightarrow X$ of the Cauchy problem ($P_{\alpha}$). However there is no simple way to know if $\stackrel{{\scriptstyle[}}{{\alpha\in(0,1]}}]{}{\bigcap}[0,\omega_{\alpha})=\\{0\\},$ (6) which, if this is the case, would lead me to face the possibility of calculate the fractional limit of the family of functions $\\{\phi_{\alpha}(t):\alpha\in(0,1]\\}$, when $\alpha\rightarrow 1^{-}$, just to the constant value $\phi_{\alpha}(0)=u_{0}$. This is exactly what question Q3) intends to discuss. Let me begin by presenting the following result. ###### Theorem 26. Assume that $f:[0,\infty)\times X\rightarrow X$ is a continuous function, locally Lipschitz in the second variable, uniformly with respect to the first variable, and bounded (i.e. it maps bounded sets onto bounded sets), and consider problem ($P_{\alpha}$), for $\alpha\in(0,1]$. If $\phi_{\alpha}(t)$ is the maximal local mild solution of ($P_{\alpha}$) defined over the interval $[0,\omega_{\alpha})$ (which can be $(0,\infty)$ for some values of $\alpha$), then for each $\alpha_{0}\in(0,1)$, there exists $t_{\alpha_{0}}>0$ such that $[0,t_{\alpha_{0}}]\subset\stackrel{{\scriptstyle[}}{{\alpha\in[\alpha_{0},1]}}]{}{\bigcap}[0,\omega_{\alpha}).$ ###### Proof. Observe that for each $\alpha\in(0,1]$, Theorem 5 and Remark 6 ensure the existence and uniqueness of a maximal local mild solution (or global mild solution) of ($P_{\alpha}$), such that the maximal interval of existence for the solution $\phi_{\alpha}(t)$ is $[0,\infty)$ or a finite interval $[0,\omega_{\alpha})$ and, in such case, $\limsup_{t\rightarrow\omega_{\alpha}^{-}}\|\phi_{\alpha}(t)\|=\infty.$ (7) Since $f(t,x)$ is locally Lipschitz in the second variable, there exist $R_{0},L_{0}>0$ such that $\|f(t,x)-f(t,y)\|\leq L_{0}\|x-y\|$ for every $(t,x),(t,y)\in B\big{(}(0,u_{0}),R_{0}\big{)}$. Let $\alpha_{0}\in(0,1)$ and suppose that $\stackrel{{\scriptstyle[}}{{\alpha\in[\alpha_{0},1]}}]{}{\bigcap}[0,\omega_{\alpha})=\\{0\\}.$ Then, there should exist a sequence $\\{\alpha_{n}\\}_{n=1}^{\infty}\subset[\alpha_{0},1]$ and a related decreasing sequence of positive real numbers $\\{\omega_{\alpha_{n}}\\}_{n=1}^{\infty}$, such that $\lim_{n\rightarrow\infty}{\omega_{\alpha_{n}}}=0$. By choosing a subsequence of $\\{\omega_{\alpha_{n}}\\}_{n=1}^{\infty}$, if necessary, I can suppose that there exist $\alpha\in[\alpha_{0},1]$ such that $\alpha_{n}$ converges to $\alpha$ and a sequence $\\{\sigma_{n}\\}_{n=1}^{\infty}$ with the following properties: * (i) $0<\omega_{\alpha_{n+1}}<\sigma_{n}<\omega_{\alpha_{n}}$, for every $n\in\mathbb{N}$; * (ii) $\|\phi_{\alpha_{n}}(t)-u_{0}\|<R_{0}/2$, for $t\in[0,\sigma_{n})$, and $\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|=R_{0}/2$, for every $n\in\mathbb{N}$. This assertion follows mainly from (7). Now observe that $\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\leq\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-E_{{\alpha}}(A(\sigma_{n})^{{\alpha}})u_{0}\|\\\ +\|E_{{\alpha}}(A(\sigma_{n})^{{\alpha}})u_{0}-u_{0}\|,$ therefore, Theorems 18 and 21 ensure that $\lim_{n\rightarrow\infty}\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|=0.$ Thus, choose $N_{0}\in\mathbb{N}$ such that $\sigma_{n}<R_{0}/2\qquad\textrm{and}\qquad\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\leq R_{0}/4,$ for any $n\geq N_{0}$. Then, if $n\geq N_{0}$ I have $\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq\|E_{{\alpha_{n}}}(A(\sigma_{n})^{{\alpha_{n}}})u_{0}-u_{0}\|\\\ +\displaystyle\left\|\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{{\alpha_{n}},{\alpha_{n}}}(A(\sigma_{n}-s)^{{\alpha_{n}}})f(s,\phi_{\alpha_{n}}(s))ds\right\|,$ and therefore $\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq(R_{0}/4)\\\ +M_{2}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}\Big{[}\big{\|}f(s,\phi_{\alpha_{n}}(s))-f(s,u_{0})\big{\|}+\big{\|}f(s,u_{0})\big{\|}\Big{]}\,ds,$ where $M_{2}>0$ is given uniformly on $\alpha\in[\alpha_{0},1]$ by Theorem 18. Now, since $(\sigma_{n},\phi_{\alpha_{n}}(\sigma_{n})),(\sigma_{n},u_{0})\in B\big{(}(0,u_{0}),R_{0}\big{)}$, I have that $\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq(R_{0}/4)+M_{2}M_{3}\sigma_{n}+M_{2}L_{0}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}\|\phi_{\alpha_{n}}(s)-u_{0}\|\,ds,$ where $M_{3}={\max_{s\in[0,\omega_{\alpha_{1}}]}{\|f(s,0)\|}}.$ Finally, from [8, Lemma 7.1.1] I have that $\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|\leq\theta_{n}+\eta_{n}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{\alpha_{n},\alpha_{n}}\left(\eta_{n}(\sigma_{n}-s)\right)\theta_{n}\,ds,$ where $\eta_{n}=\big{[}M_{2}L_{0}\Gamma(\alpha_{n})\big{]}^{1/\alpha_{n}}$ and $\theta_{n}=(R_{0}/4)+M_{2}M_{3}\sigma_{n}$. Thus, using the dominated convergence theorem and Theorems 18, I deduce that $R_{0}/2=\lim_{n\rightarrow\infty}{\|\phi_{\alpha_{n}}(\sigma_{n})-u_{0}\|}\\\ \leq\lim_{n\rightarrow\infty}\theta_{n}+\left(\lim_{n\rightarrow\infty}\eta_{n}\right)\left[\lim_{n\rightarrow\infty}\displaystyle\int_{0}^{\sigma_{n}}(\sigma_{n}-s)^{{\alpha_{n}}-1}E_{\alpha_{n},\alpha_{n}}\left(\eta_{n}(\sigma_{n}-s)\right)\theta_{n}\,ds\right]\\\ =(R_{0}/4),$ what is a contradiction. This concludes the proof of this theorem. ∎ In order to give another characterization to the biggest interval contained in the set $\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})$, for each $\alpha_{0}\in(0,1)$, I present the following result. ###### Theorem 27. Consider same hypotheses of Theorem 26 and assume that for any $\alpha_{0}$ in $(0,1)$, there exists $\alpha\in[\alpha_{0},1]$ such that $\omega_{\alpha}<\infty$. Define $\Omega_{\alpha_{0}}:=\sup\\{t>0:[0,t]\subset\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})\\}.$ Then, I have that: * (i) for each $\alpha_{0}\in(0,1)$ it holds that $\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with }\omega_{\alpha}<\infty\\}=\Omega_{\alpha_{0}}$; * (ii) for each $\alpha_{0}\in(0,1)$ I have that $[0,\Omega_{\alpha_{0}})\subset[0,\omega_{\alpha})$, for every $\alpha\in[\alpha_{0},1]$; * (iii) if $\alpha_{1},\alpha_{2}\in(0,1]$, with $\alpha_{1}<\alpha_{2}$, then $\Omega_{\alpha_{1}}\leq\Omega_{\alpha_{2}}$. ###### Proof. $(i)$ Since by definition it holds that $\Omega_{\alpha_{0}}\leq\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with }\omega_{\alpha}<\infty\\},$ let me assume for an instant that $\Omega_{\alpha_{0}}<\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with }\omega_{\alpha}<\infty\\}$. If such is the case, by setting $r:=\left[\Omega_{\alpha_{0}}+\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with }\omega_{\alpha}<\infty\\}\right]/2,$ I could verify that $\Omega_{\alpha_{0}}+r\in\\{t>0:[0,t]\subset\cap_{\alpha\in[\alpha_{0},1]}[0,\omega_{\alpha})\\}$, what would lead me to the contradiction $\Omega_{\alpha_{0}}+r\leq\Omega_{\alpha_{0}}$. Therefore $\Omega_{\alpha_{0}}=\inf\\{\omega_{\alpha}:\alpha\in[\alpha_{0},1]\textrm{ with }\omega_{\alpha}<\infty\\},$ as I wanted. Finally item $(ii)$ follows from the definition of $\Omega_{\alpha_{0}}$, while item $(iii)$ is a directly consequence of the infimum properties. ∎ ###### Remark 28. It worths to emphasize the importance of the hypotheses: “for any $\alpha_{0}$ in $(0,1)$, there exists $\alpha\in[\alpha_{0},1]$ such that $\omega_{\alpha}<\infty$”. In fact, if this is not the case, there should exists $\tilde{\alpha}\in(0,1)$ such that for every $\alpha\in[\tilde{\alpha},1]$ I would have $[0,\omega_{\alpha})=[0,\infty).$ Now, let me change the subject a little and begin to address question Q4). ###### Theorem 29. Consider the Cauchy problem ($P_{\alpha}$) with $\alpha\in(0,1]$ and assume that function $f:[0,\infty)\times X\rightarrow X$ is continuous, locally Lipschitz in the second variable, uniformly with respect to the first variable, and bounded (i.e. it maps bounded sets onto bounded sets). Then, if $\phi_{\alpha}(t)$ is the maximum local mild solution (or global mild solution) of ($P_{\alpha}$) defined over $[0,\omega_{\alpha})$ (or $[0,\infty)$), there exists $t_{*}>0$ such that $\lim_{\alpha\rightarrow 1^{-}}{\|\phi_{\alpha}(t)-\phi_{1}(t)\|}=0,$ for every $t\in[0,t^{*}]$. ###### Proof. Observe that Theorem 5 and Remark 6 guarantee the existence of a maximal mild solution (or global mild solution) $\phi_{\alpha}(r)$ defined over a maximal interval of existence $[0,\omega_{\alpha})$ (or $[0,\infty)$), such that for $\alpha\in(0,1]$ satisfies $\phi_{\alpha}(t)=\left\\{\begin{array}[]{ll}E_{\alpha}(At^{\alpha})u_{0}+\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})f(s,\phi_{\alpha}(s))ds,&\\\ &\textrm{if }\alpha\in(0,1),\vspace*{0.2cm}\\\ e^{At}u_{0}+\displaystyle\int_{0}^{t}e^{A(t-s)}f(s,\phi_{\alpha}(s))ds,&\textrm{if }\alpha=1.\end{array}\right.$ Now I need to make two considerations. * (i) Note that Theorem 27 and Remark 28 ensure that $[0,\Omega_{1/2}/2]\subset\cap_{\alpha\in[1/2,1]}[0,\omega_{\alpha})\quad\textrm{or}\quad[0,\infty)\subset\cap_{\alpha\in[1/2,1]}[0,\omega_{\alpha}).$ In any case, it is not difficult to choose $t_{0}>0$ such that $[0,t_{0}]\subset[0,\omega_{\alpha})$, for every $\alpha\in[1/2,1]$. * (ii) Recall that $f(r,x)$ is locally Lipschitz in the second variable, i.e., there exist $R_{0},L_{0}>0$ such that $\|f(r,x)-f(r,y)\|\leq L_{0}\|x-y\|$ for every $(r,x),(r,y)\in B\big{(}(0,u_{0}),R_{0}\big{)}$. In that way, I can infer that there exists $t_{*}\in[0,t_{0}]$ such that $\cup_{\alpha\in[1/2,1]}\\{(t,\phi_{\alpha}(t)):t\in[0,t_{*}]\\}\subset B\big{(}(0,u_{0}),R_{0}/2\big{)},$ since otherwise, it would exist $\alpha_{*}\in[1/2,1]$ and two sequences of real numbers $\\{\alpha_{n}\\}_{n=1}^{\infty}\subset[1/2,1]$ and $\\{\tau_{n}\\}_{n=1}^{\infty}\subset[0,t_{0}]$, with $\alpha_{n}\rightarrow\alpha_{*}$ and $\tau_{n}\rightarrow 0$, when $n\rightarrow\infty$, that also satisfies $\|\phi_{\alpha_{n}}(t)-u_{0}\|<R_{0}/2$, for all $t\in[0,\tau_{n})$, and $\|\phi_{\alpha_{n}}(\tau_{n})-u_{0}\|=R_{0}/2$. However this construction, like the one given in the proof of Theorem 26, leads to a contradiction. * (iii) Define $N:=\sup\\{\|f(s,\phi_{1}(s))\|:s\in[0,t_{*}]\\}$, which is finite since $f(s,\phi_{1}(s))$ is continuous and $[0,t_{*}]$ is a compact interval. Taking into account considerations $(i)$, $(ii)$ and $(iii)$, I deduce that $\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq\|E_{\alpha}(At^{\alpha})u_{0}-e^{At}u_{0}\|\\\ +\left\|\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}E_{\alpha,\alpha}(A(t-s)^{\alpha})\Big{[}f(s,\phi_{\alpha}(s))-f(s,\phi_{1}(s)\Big{]}ds\right\|\hskip 85.35826pt\\\ +\left\|\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\Big{[}E_{\alpha,\alpha}(A(t-s)^{\alpha})-e^{A(t-s)}\Big{]}f(s,\phi_{1}(s))ds\right\|\\\ +\left\|\displaystyle\int_{0}^{t}\Big{[}(t-s)^{\alpha-1}-1\Big{]}e^{A(t-s)}f(s,\phi_{1}(s))ds\right\|,$ for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$, therefore, by considering also Theorems 14 and 18, I obtain $\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\|u_{0}\|\\\ +L_{0}M_{2}\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\|\phi_{\alpha}(s))-\phi_{1}(s)\|ds\\\ \hskip 170.71652pt+N\displaystyle\int_{0}^{t}s^{\alpha-1}\Big{\|}E_{\alpha,\alpha}(As^{\alpha})-e^{As}\Big{\|}_{\mathcal{L}(X)}ds\\\ +NM_{1}\displaystyle\int_{0}^{t}\big{[}s^{\alpha-1}-1\big{]}ds.$ for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$. Note that I may rewrite the above inequality as $\|\phi_{\alpha}(t)-\phi_{1}(t)\|\leq g_{\alpha}(t)+L_{0}M_{2}\displaystyle\int_{0}^{t}(t-s)^{\alpha-1}\|\phi_{\alpha}(s))-\phi_{1}(s)\|ds,$ (8) for every $\alpha\in[1/2,1]$ and $t\in[0,t_{*}]$, where $g_{\alpha}(t)=\|E_{\alpha}(At^{\alpha})-e^{At}\|_{\mathcal{L}(X)}\|u_{0}\|+N\displaystyle\int_{0}^{t}s^{\alpha-1}\Big{\|}E_{\alpha,\alpha}(As^{\alpha})-e^{As}\Big{\|}_{\mathcal{L}(X)}ds\\\ +NM_{1}\displaystyle\int_{0}^{t}\big{[}s^{\alpha-1}-1\big{]}ds.$ Finally, by considering [8, Lemma 7.1.1], I have that (8), the dominated convergence theorem, Theorems 20, 22 and 24 allow us to deduce that $\lim_{\alpha\rightarrow 1^{-}}\|\phi_{\alpha}(t)-\phi_{1}(t)\|=0,$ for each $t\in[0,t_{*}]$. This completes the proof of the theorem. ∎ ## 4\. Closing Remarks All the computations done in this manuscript could have being more general. I could have considered $\alpha_{0}\in(0,1]$ and studied the limit $\lim_{\alpha\rightarrow\alpha_{0}}{u_{\alpha}(t)}=u_{\alpha_{0}}(t),$ or, I could have considered the Cauchy problem with initial condition $u(t_{0})=u_{0}$. However, these two more general problems would only bring technical difficulties, since the computations would be analogous. That is why I avoided dealing with these situations here. As a final commentary, recall that I can consider “well-behaved” functions $f(t,x)$ in order to obtain better results. ###### Proposition 30. If $f:[0,\infty)\times X\rightarrow X$ is globally Lipschitz on the second variable, uniformly with respect to the first variable, that is, there exist $L>0$ such that $\|f(t,x)-f(t,y)\|\leq L\|x-y\|$ for every $x,y\in X$ and every $t\in[0,\infty)$, then $f$ maps bounded sets into bounded sets. ###### Proof. Just observe that for any $t\geq 0$ and $x\in X$ I have the inequality $\|f(t,x)\|\leq\|f(t,x)-f(t,0)\|+\|f(t,0)\|\leq L\|x\|+\|f(t,0)\|.$ ∎ Proposition 30 allows me to conclude that every solution of the Cauchy problem ($P_{\alpha}$), when $f(t,x)$ is globally Lipschitz on the second variable, uniformly with respect to the first variable, is defined in $[0,\infty)$ (this is a consequence of estimatives I have already done in this manuscript, Theorem 5, Remark 6 and [8, Lemma 7.1.1]). Therefore, I would be able to compute the limit done in Theorem 29 for every $t\in[0,\infty)$, in order to obtain a more general result. The discussion about functions $f(t,x)$ that are locally Lipschitz on the second variable, uniformly with respect to the first variable, deserves a more profound study, which is being developed. ## References * [1] M. F. Almeida, L. C. F. Ferreira, Self-similarity, symmetries and asymptotic behavior in Morrey spaces for a fractional wave equation, Differ. Integral Equ. 25(9-10) (2012), 957–976. * [2] W. Arendt, C.J.K. Batty, M. Hieber, F. Neubrander, Vector-Valued Laplace Transforms and Cauchy Problems, Birkhäuser, 2001 * [3] B. de Andrade, A. N. Carvalho, P. M. Carvalho-Neto, P. Marín-Rubio, Semilinear fractional differential equations: global solutions, critical non-linearities and comparison results, Topol. Methods Nonlinear Anal. 45 (2)(2015), 439–467. * [4] P. M. Carvalho-Neto, Fractional differential equations: a novel study of local and global solutions in Banach spaces, Ph.D. Thesis, Universidade de São Paulo, São Carlos, 2013. * [5] N. Dunford, J. T. Schwartz, Linear operators. Part I: General theory, New York, Interscience Publishers, 1958. * [6] R. Gorenflo, A. A. Kilbas, F. Mainardi, S. V. Rogosin, Mittag-Leffler functions, related topics and applications, Springer Monographs in Mathematics, Berlin Heidelberg, 2014. * [7] G. H. Hardy, J. E. Littlewood, G. Pólya, Inequalities, Cambridge Mathematical Library, 2nd ed, 1952. * [8] D. Henry, Geometric theory of semilinear parabolic equations, Lecture Notes in Mathematics 840, Springer-Verlag, Berlin, 1981. * [9] E. Hille, R. S. Phillips, Functional analysis and semi-groups, Publications Amer. Mathematical Soc., Colloquium Publications, Vol. 31, 1996. * [10] T. Kato, Perturbation theory for linear operators, Springer-Verlag, Berlin, 1995. * [11] M. Li and Q. Zheng, On spectral inclusions and approximations of $\alpha$-times resolvent families, Semigroup Forum 69 (2004), 356–368. * [12] J. Mikusiński, The Bochner integral, Mathematische Reihe, Birkhäuser, 1978. * [13] A. Pazy, Semigroups of linear operators and applications to partial differential equations, in Applied Mathematical Sciences, vol. 44, Springer, New York, NY, USA, 1983.
arxiv-papers
2021-07-27T00:23:37
2024-09-04T03:07:20.203314
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Paulo M. Carvalho-Neto", "submitter": "Paulo Mendes Carvalho Neto", "url": "https://arxiv.org/abs/2107.12528" }
2107.12534
# On the Construction of Protograph-based Partially Doped GLDPC Codes Jaewha Kim, Jae-Won Kim, and Jong-Seon No J. Kim is with the Department of Electrical and Computer Engineering, INMC, Seoul National University, Seoul 08826, Korea (e-mail: [email protected]).J.-W. Kim is with the Department of Electronic Engineering, Engineering Research Institute (ERI), Gyeongsang National University, South Korea (e-mail: [email protected]).J.-S. No with the Department of Electrical and Computer Engineering, INMC, Seoul National University, Seoul 08826, Korea (e-mail: [email protected]).J.-W. Kim is the corresponding author. ###### Abstract A generalized low-density parity-check (GLDPC) code is a class of codes, where single parity check nodes in a conventional low-density parity-check (LDPC) code are replaced by linear codes with higher parity check constraints. In this paper, we introduce a new method of constructing GLDPC codes by inserting the generalized check nodes for partial doping. While the conventional protograph GLDPC code dopes the protograph check nodes by replacing them with the generalized check nodes, a new GLDPC code is constructed by adding the generalized check nodes and partially doping the selected variable nodes to possess higher degrees of freedom, called a partially doped GLDPC (PD-GLDPC) code. The proposed PD-GLDPC codes can make it possible to do more accurate extrinsic information transfer (EXIT) analysis and the doping granularity can become finer in terms of the protograph than the conventional GLDPC code. We also propose the constraint for the typical minimum distance of PD-GLDPC codes and prove that the PD-GLDPC codes satisfying this condition have the linear minimum distance growth property. Furthermore, we obtain the threshold optimized protograph for both regular and irregular ensembles of the proposed PD-GLDPC codes over the binary erasure channel (BEC). Specifically, we propose the construction algorithms for both regular and irregular protograph-based PD-GLDPC codes that enable the construction of GLDPC codes with higher rates than the conventional ones. The block error rate performance of the proposed PD-GLDPC code shows that it has a reasonably good waterfall performance with low error floor and outperforms other LDPC codes for the same code rate, code length, and degree distribution. ###### Index Terms: Binary erasure channel (BEC), doping, generalized low-density parity-check (GLDPC) code, low-density parity-check (LDPC) code, partially doped GLDPC (PD- GLDPC) code, protograph, protograph extrinsic information transfer (PEXIT), typical minimum distance. ## I Introduction Low-density parity-check (LDPC) codes, first introduced in [1], have received many interests due to their low decoding complexity by the sparsity of the parity check matrix and Shannon capacity approaching error performance [2]. An LDPC code is defined over a bipartite graph consisting of variable nodes and single parity check (SPC) constraint nodes. A generalized LDPC (GLDPC) code was first introduced in [3], which is constructed by replacing (doping) some SPC nodes by generalized constraint (GC) nodes in a parity check matrix (PCM) of a linear code with a larger minimum distance [4]. This makes the LDPC code to have a larger minimum distance [5], faster decoding convergence [6], and a better asymptotic threshold at the cost of using additional decoding complexity and redundancy [7]. Many types of linear codes for GC nodes, also called as the component codes, are used in the GLDPC codes such as Hamming codes [8], Hadamard codes [9], Bose–Chaudhuri–Hocquenghem (BCH) codes, and Reed-Solomon (RS) codes [10]. The research of the GLDPC codes is extended to spatially coupled LDPC (SC-LDPC) codes [11, 12, 13] and doubly GLDPC (DGLDPC) codes [14, 15, 16]. While some capacity-approaching GLDPC codes were constructed using irregular random GLDPC codes [7, 17], there are limited works related to the capacity-approaching protograph-based GLDPC codes due to two difficulties of the code construction. First, since the rate-loss that is incurred during the doping process is not negligible, constructing a protograph GLDPC code for a medium to high code rate is difficult. Second, due to the high doping granularity, the optimization of protograph GLDPC codes is limited. In order to replace a specific SPC node with a GC node, the degree of the SPC node and length of the component code should be the same. Thus, the selection of SPC nodes to be replaced becomes limited, which makes the doping process difficult. In this paper, we propose a new construction method of protograph-based GLDPC code, called partially doped GLDPC (PD-GLDPC) codes, which resolves the limitations for the construction of the conventional protograph GLDPC codes. In the proposed construction, constraint rows for a GC node are added, rather than replaced by partially doping the selected variable nodes, to the parity check matrix after the lifting process of a protograph. Furthermore, we propose an optimized construction method of the protograph-based PD-GLDPC codes while the newly constructed code has a minimum distance that grows linearly with the block length of the code from the constraint for the existence of the typical minimum distance. Both the new optimized code construction method and its analysis of the proposed protograph-based PD-GLDPC codes are proposed in this paper, which makes the proposed protograph-based PD-GLDPC code approach the channel capacity. Specifically, by focusing the partial doping on the protograph variable nodes of degree 2, we construct protograph-based PD-GLDPC codes with a good waterfall performance. Furthermore, the proposed protograph-based PD-GLDPC codes have more accurate protograph extrinsic information transfer (PEXIT) analysis compared to conventional protograph GLDPC codes, which is due to the exact computation of the extrinsic information transfer (EXIT) for a protograph GC node in the proposed protograph-based PD-GLDPC codes. While a GC node in conventional protograph GLDPC codes computes the average mutual informations of its neighboring protograph variable nodes, a GC node in the proposed protograph-based PD-GLDPC codes computes the mutual information of single protograph variable node as its neighborhood. Thus, the computation of the PEXIT of a GC node becomes more accurate in the proposed PD-GLDPC codes. Since the proposed protograph-based PD-GLDPC codes are constructed through the doping process by adding new GC nodes of the error correcting codes connected to the subset of variable nodes lifted from single protograph variable node, the code construction can be made over any base matrix, regardless of the check node degree distribution of the original protograph. That is, the new rows for the doped GC nodes are added by the component code after lifting, where the lifting size is the multiple of the length of the component code and the variable nodes in each added row are lifted from single protograph variable node. Thus, the doping granularity can be much smaller than the conventional GLDPC codes, which enables much flexible construction of the proposed PD-GLDPC codes. Finally, we propose the optimization method to construct large protographs for the proposed protograph-based PD-GLDPC codes. Due to the large rate loss from protograph GC nodes, it is difficult to construct GLDPC codes with medium to high code rates from small protographs. The large protographs of high code rates constructed from the degree distribution based on the random ensemble enable the larger number of doping of GC nodes. Also, the number of doping of GC nodes can be varied according to the code rate of the initial protograph. The optimized balance between the number of doping nodes and the code rate of the initial protograph is given in the proposed protograph-based PD-GLDPC code. Furthermore, the construction of the proposed protograph-based PD-GLDPC codes with code rates $1/2$ and $1/4$ are presented in this paper. The rest of the paper is organized as follows. In Section II, we introduce some preliminaries on the binary erasure channel (BEC) and protograph GLDPC codes. Section III illustrates the proposed protograph-based PD-GLDPC code structure and derives its PEXIT analysis with performance comparison with the conventional GLDPC codes. The construction and optimization of protograph- based PD-GLDPC codes from regular and irregular protographs are given in Section IV. Section V shows the optimized results and error performance of the proposed codes. Section VI concludes the paper with some discussion of the results. ## II Backgrounds In this section, we introduce some notations and concepts of a binary erasure channel, protograph LDPC codes, and the construction method of conventional protograph GLDPC codes. The EXIT analysis and the decoding process of conventional GLDPC codes are also briefly introduced. ### II-A Protograph LDPC Code and BEC Let $\mathbb{x}=\\{x_{1},{\cdots},x_{k}\\},x_{i}\in\\{0,1\\}$ be a $k$-bit binary message vector, which is encoded via an $(n,k)$ linear code, forming an $n$-bit codeword $\mathbb{c}=\\{c_{1},{\cdots},c_{n}\\},c_{i}\in\\{0,1\\}$. The codeword passes through a memoryless BEC, where each bit is either erased with probability $\epsilon$ or correctly received. A protograph LDPC code is defined by a relatively small bipartite graph $G=(V,C,E)$ representing a protograph, where $V=\\{v_{1},{\cdots},v_{n_{v}}\\}$ is a set of variable nodes and $C=\\{c_{1},{\cdots},c_{n_{c}}\\}$ is a set of check nodes. Let $E$ be the set of edges $e$, where $e=(v,c)$ connects the variable node $v\in V$ and the check node $c\in C$. The bipartite graph can also be expressed in terms of an $n_{c}\times n_{v}$-sized base matrix ${\mathbb{B}}_{n_{c}\times n_{v}}=\\{b_{i,j}\\},i\in[n_{c}],j\in[n_{v}]$, where $b_{i,j}\in\\{0,1,2,{\cdots}\\}$ and $[A]$ is a set of positive integers less than or equal to a positive integer $A$. The rows represent the check nodes and the columns represent the variable nodes in the protograph. Each entry $b_{i,j}$ of the base matrix represents the number of edges connected between a variable node and a check node. Parallel edges are allowed and if there are no edges connected between $v_{j}$ and $c_{i}$, the entry $b_{i,j}$ is zero. The variable (check) node degree $deg(v_{j})$ ($deg(c_{i})$) is defined as the number of edges incident to itself. A protograph LDPC code [19] is constructed by copy-and-permute operation of $G$. The bipartite graph $G$ is copied by the lifting factor $N$ and the copies of each edge $e=(v,c)\in E$ are permuted among the copies of $v$ and $c$. In general, the large value of $N$ guarantees the sparseness of the code. ### II-B Construction of Protograph GLDPC Code [18] Conventionally, a protograph GLDPC code is constructed by replacing (doping) a check node of a protograph with a GC node that has a parity check constraint from an $(n_{i},k_{i},d_{min}^{i})$ linear code (component code), where $n_{i}$ ($k_{i}$) is the code length (dimension) and $d_{min}^{i}$ is the minimum distance of the component code for a check node $c_{i}$. The condition for replacement is that the check node degree should be exactly equal to the length of the component code, i.e., $deg(c_{i})=n_{i}$. Note that the original check node has the parity check constraint of an $(n_{i},k_{i})=(deg(c_{i}),deg(c_{i})-1)$ SPC code. The code rate $R$ of protograph GLDPC code is $R=1-\frac{m_{proto}}{n_{v}}$, where $m_{proto}=\sum_{i=1}^{n_{c}}(n_{i}-k_{i})$. While the minimum distance of an SPC node is 2, the variable nodes connected to the GC node will be protected by parity check constraints of the component code with the minimum distance larger than two. Fig. 1 is the conventional protograph GLDPC code of code rate $\frac{3}{7}$ by replacing an SPC node with the $(7,4)$ Hamming code. Figure 1: Conventional protograph GLDPC code construction by replacing an SPC node with a protograph GC node using the $(7,4)$ Hamming code as the component code. ### II-C PEXIT Analysis and Decoding Process of Protograph GLDPC Code Algorithm 1 The PEXIT analysis of a protograph GLDPC code [20] Step 1) Initialization Initialize $I_{ch}(j)=\epsilon$ for $j\in[n_{v}]$. Step 2) Message update from variable node to check node Update $I_{EV}(i,j)=1-\epsilon\prod_{t\in N(v_{j}),t\neq i}\bigl{(}1-I_{AV}(t,j)\bigr{)}$ for all $j\in[{n_{v}}]$, where $I_{EV}(i,j)=0$ if $b_{i,j}=0$. If $c_{i}$ is an SPC node, $I_{AV}(i,j)=I_{EC}(i,j)$ and if $c_{i}$ is a GC node, $I_{AV}(i,j)=I_{EGC}(i,j)$. Step 3) Message update from check node to variable node For all $i$, if $c_{i}$ is an SPC node, go to Step 3-1) and if $c_{i}$ is a GC node, go to Step 3-2). Step 3-1) $I_{EC}(i,j)=\prod_{t\in N(c_{i}),t\neq j}I_{AC}(i,t)$, where $I_{AC}(i,t)=I_{EV}(i,t)$. Step 3-2) For all $j\in$ $N(c_{i})$, compute $I_{EGC}(i,j)=\frac{1}{n_{i}}\sum_{h=1}^{n_{i}}\bigl{(}1-I_{AGC}(i)\bigr{)}^{h-1}\bigl{(}I_{AGC}(i)\bigr{)}^{n_{i}-h}[h\tilde{e}_{h}-(n_{i}-h+1)\tilde{e}_{h-1}],$ (1) where $I_{AGC}(i)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}I_{EV}(i,j)$. Step 4) APP mutual information computation For all $j\in[n_{v}],I_{APP}(j)=1-\epsilon\prod_{t\in N(v_{j})}\bigl{(}1-I_{AV}(t,j)\bigr{)}$. If $c_{t}$ is an SPC node, $I_{AV}(t,j)=I_{EC}(t,j)$ and if $c_{t}$ is a GC node, $I_{AV}(t,j)=I_{EGC}(t,j)$. Step 5) Convergence check of variable nodes Repeat Step 2)–4) until $I_{APP}(j)=1,$ for all $j\in[n_{v}]$. The asymptotic performance of the conventional protograph GLDPC codes is evaluated by the PEXIT analysis. We use the EXIT and PEXIT analyses of the GLDPC code over the BEC introduced in [20, 21, 22]. The PEXIT analysis tracks down the mutual information of extrinsic messages and a priori error probabilities of the variable nodes, SPC check nodes, and GC nodes of a protograph GLDPC code. Let $I_{ch}(j)$ be the channel information from the erasure channel for the protograph variable node $v_{j}$. In addition, $I_{EV}(i,j)$ $(I_{EC}(i,j))$ is the extrinsic information sent from $v_{j}$ ($c_{i}$) to $c_{i}$ ($v_{j}$) and $I_{AV}(i,j)$ $(I_{AC}(i,j))$ is the a priori mutual information of $v_{j}$ ($c_{i}$) sent from $c_{i}$ ($v_{j}$), where $c_{i}$ is an SPC node. For GC nodes, we use the notations $I_{AGC}(i)$ and $I_{EGC}(i,j)$ for a priori and extrinsic information. Let $N(c_{i})$ ($N(v_{j})$) be the set of variable (check) nodes incident to $c_{i}$ ($v_{j}$), i.e., neighborhood of $c_{i}$ ($v_{j}$). Finally, $I_{APP}(j)$ is a posteriori probability of $v_{j}$. To explain (1), if $c_{i}$ is a GC node with the $(n_{i},k_{i})$ Hamming code, the PEXIT of the GC node is computed from a closed form using the property of the simplex code, which is the dual code of a Hamming code. Also, $I_{AGC}(i)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}I_{EV}(i,j)$ is the average a priori mutual information for a GC node to compute the PEXIT message. In (1), we have $\tilde{e}_{h}=\sum_{t=1}^{h}t\sum_{u=0}^{t-1}(-1)^{u}2^{\binom{u}{t}}{k_{i}\brack t}{t\brack u}\binom{2^{t-u}}{h}.$ For two positive integers $a$ and $b$, we also have $\binom{a}{b}=\prod_{i=0}^{b-1}\frac{a-i}{b-i}$ and ${a\brack b}=\prod_{i=0}^{b-1}\frac{2^{a}-2^{i}}{2^{b}-2^{i}}$, where $\binom{a}{0}=1$ and ${a\brack 0}=1$. The PEXIT process is given in Alg. 1, which searches for the minimum $\epsilon$ to successfully decode, i.e., $I_{APP}(j)=1,$ for all $j\in[n_{v}]$, in asymptotic sense. Now, we briefly explain the decoding process of the conventional GLDPC codes [13]. The variable nodes process the conventional message-passing decoding over the BEC by sending correct extrinsic messages to the check nodes if any of the incoming bits from its neighborhood is not erased. The SPC nodes send correct extrinsic messages to the variable nodes if all of its incoming messages are correctly received, and send an erasure message otherwise. In this paper, the decoding of GC nodes is processed by the maximum likelihood (ML) decoder. For each iteration, a GC node $c_{i}$ with the $(n_{i},k_{i})$ component code receives the set of erasure locations $\\{e_{i}\\}$ from $N(c_{i})$. Let $H_{GC}$ be the parity check matrix of the component code and $H_{e}$ be the submatrix of $H_{GC}$ indexed with $\\{e_{i}\\}$. The decoder computes the Gaussian-elimination operation of $H_{e}$, making it into a reduced row echelon form $H_{e}^{reduced}$. If rank($H_{e}^{reduced}$)$=|\\{e_{i}\\}|$, the GC node solves all the input erasures and otherwise, the decoder corrects the erasures corresponding to the rows with weight 1 from $H_{e}^{reduced}$. The decoding complexity can be further reduced if the GC node exploits bounded distance decoding; however, the degradation of asymptotic performance is not negligible, as shown in [7]. ## III The Proposed Protograph-based PD-GLDPC Code (a) (b) (c) Figure 2: Block diagram of the construction process of conventional GLDPC codes and the proposed protograph-based PD-GLDPC codes. In this section, a new construction method of protograph-based GLDPC codes is proposed. While the conventional protograph GLDPC codes are constructed by replacing some protograph SPC nodes in the original protograph by GC nodes using the component code, the proposed protograph-based PD-GLDPC code is constructed by adding the GC nodes for the subset of variable nodes using component codes after the lifting process of the original protograph, where each GC node is connected to the variable nodes copied from single protograph variable node. A block diagram of the construction process of both codes together with the conventional random GLDPC code is given in Fig. 2. ### III-A Construction Method of Protograph-based PD-GLDPC Code Figure 3: An example of a proposed $({\mathbb{B}}_{2\times 3},7,4,14,1)$ protograph-based PD-GLDPC code construction, where ${\mathbb{B}}_{2\times 3}=[1\,1\,1;1\,0\,1]$ and $\pi$ is the $14\times 14$ sized permutation matrix. First, we define the partial doping for variable nodes using the addition of GC nodes to a lifted protograph, that is, the addition of rows for the parity check matrix by the component code, where each GC node is incident to variable nodes copied from single protograph variable node. Also, we define a partially doped protograph variable node as a protograph variable node incident to the added GC nodes. While the term doping in conventional GLDPC codes is used in the perspective of check nodes, we use the term partial doping in the perspective of variable nodes. Let ${\mathbb{B}}_{n_{c}\times n_{v}}$ be an $n_{c}\times n_{v}$ base matrix, where some protograph variable nodes are partially doped with a $(\mu,\kappa)$ component code after the lifting process. Let $x=0,1,2,{\cdots}$ be the number of the partially doped protograph variable nodes, where each protograph variable node is doped by $N/\mu$ component codes after the lifting process. Then, a proposed protograph-based PD-GLDPC code is defined with parameters $({\mathbb{B}}_{n_{c}\times n_{v}},\mu,\kappa,N,x)$. We assume that the component code used in the paper is the $(\mu,\kappa)$ Hamming code and that $\mu$ divides the lifting factor $N$ such that $N=\mu\beta$, where $\beta$ is a non-negative integer. The variable nodes copied from $x$ protograph variable nodes in the base matrix are partially doped by the GC nodes. That is, in the proposed PD-GLDPC code construction, the $N/\mu$ GC nodes are connected to the $N$ variable nodes lifted from each protograph variable node. Thus, the proposed construction method can choose the protograph variable nodes to protect by partial doping. An example of the proposed construction is given in Fig. 3, which illustrates the doping process by a $(7,4)$ component Hamming code over a $2\times 3$ base matrix. (a) (b) Figure 4: PCM of a protograph-based PD-GLDPC code. The basic concept of the proposed construction is to focus on the protection of the variable nodes lifted from a protograph variable node. Since $N$ is the multiple of the component code length, all the variable nodes lifted from single protograph variable node can be protected by using $\beta$ GC nodes. The parity check matrix for $\beta$ GC nodes, connected to the variable nodes lifted from a protograph variable node, $\textbf{H}_{\textbf{H}}$ is shown in Fig. 4(a), where $\textbf{H}_{Hamm}$ is the parity check matrix of the Hamming code. The constructed protograph-based PD-GLDPC code has a PCM ${\mathbb{H}}_{PD{\text{-}}GLDPC}$ as in Fig. 4(b), where the upper part is the PCM of the added $\beta x$ GC nodes and the lower part ${\mathbb{H}_{proto}}$ refers to the PCM of the LDPC code lifted from the original protograph. Since the doping proceeds after the lifting process, a protograph-based PD-GLDPC code cannot be expressed in terms of a protograph. Although for the proposed construction method, the number of partial doping doesn’t necessarily have to be a multiple of $\mu$, in order to make the number of added rows the multiple of the lifting size, similar to the size of the conventional one, we partially dope the protograph variable nodes by a granularity $\mu$, i.e., $x=0,\mu,2\mu,3\mu,{\cdots}$. Assuming that $x$ is a multiple of $\mu$, let $y$ be a non-negative integer representing the number of bulks of doped protograph variable nodes, where each bulk is a set of protograph variable nodes with size $\mu$, i.e., $y=\frac{x}{\mu}$. ### III-B The PEXIT Analysis of Protograph-based PD-GLDPC Codes Figure 5: An example of the Tanner graph representation of the proposed PD- GLDPC code from the protograph ${\mathbb{B}}_{2\times 3}=[1\,1\,1;1\,0\,1]$, where $x=1$. The PEXIT of the proposed protograph-based PD-GLDPC codes is similar to that of the conventional protograph GLDPC codes in Alg. 1 except for the EXIT of a GC node. Since the incoming mutual information of each GC node is obtained from only one protograph variable node in the proposed code, the average mutual information sent to each GC node is the same as the extrinsic message of the protograph variable node connected to the GC node. Let $b_{j},j\in[x]$ be the virtual node representing the set of $\beta$ GC nodes connected to the protograph variable node $v_{j}$. An example of the representation of a virtual node over a protograph is given in Fig. 5. Note that although $b_{j}$ is not a protograph node itself, it is possible to compute the PEXIT of a protograph-based PD-GLDPC code. Also, let $I_{EV}^{(b_{j})}(j)$ be the extrinsic information from $v_{j}$ to $b_{j}$ expressed as $I_{EV}^{(b_{j})}(j)=1-\epsilon\prod_{t\in N(v_{j})}(1-I_{AV}(t,j)),j\in[x].$ Since $b_{j}$ is solely connected to $v_{j}$, the index term for the extrinsic information from $v_{j}$ to $b_{j}$ is expressed by the notation of $j$ only. In order to compute the EXIT of $b_{j}$, let $I_{AGC}^{(b_{j})}(j)$ and $I_{EGC}^{(b_{j})}(j)$ be the a priori and extrinsic mutual informations of $b_{j}$, respectively. Note that the EXIT of each GC node is computed from single a priori mutual information to process single value of extrinsic mutual information for the neighboring variable nodes. For the conventional protograph GLDPC codes, the a priori mutual information of a protograph GC node is computed by averaging the extrinsic mutual information of its neighboring variable nodes. However, for the proposed protograph-based PD- GLDPC codes, since $b_{j}$ receives the extrinsic mutual information of $v_{j}$ only, it is clear that $I_{AGC}^{(b_{j})}(j)=I_{EV}^{(b_{j})}(j),\,j\in[x]$. We also compute the extrinsic mutual information from $b_{j}$ to $v_{j}$ denoted as $I_{EGC}^{(b_{j})}(j)$ using (1), given the a priori mutual information $I_{AGC}^{(b_{j})}(j)$, which is given as $I_{EGC}^{(b_{j})}(j)=\frac{1}{\mu}\sum_{h=1}^{\mu}\bigl{(}1-I_{AGC}^{(b_{j})}(j)\bigr{)}^{h-1}\bigl{(}I_{AGC}^{(b_{j})}(j)\bigr{)}^{\mu-h}[h\tilde{e}_{h}-(\mu-h+1)\tilde{e}_{h-1}].$ (2) Note that for the proposed protograph-based PD-GLDPC codes, the a priori (extrinsic) EXIT of the GC node is computed from the extrinsic (a priori) EXIT of single protograph variable node. While the EXIT of variable nodes and SPC nodes for the proposed protograph-based PD-GLDPC codes is the same as that of the conventional protograph GLDPC codes described in Alg. 1, the EXIT of the GC nodes in the proposed codes is changed to (2) whereas the conventional protograph GLDPC codes use (1). In general, as the portion of degree-2 variable nodes in the LDPC codes increases, the asymptotic performance is enhanced [23], but their minimum distance decreases and then the error floor becomes worse. Although the proposed protograph-based PD-GLDPC code construction method enables the partial doping for any variable nodes in the given protographs, we focus only on partial doping for degree-2 variable nodes as follows. First, we construct the original base matrix ${\mathbb{H}_{proto}}$ with the large portion of degree-2 variable nodes. Then, we partially dope some of the protograph variable nodes of degree-2 to increase the minimum distance and improve their performance. Thus, regular protographs of degree-2 variable nodes and irregular protographs with many degree-2 variable nodes are used for the construction of the proposed protograph-based PD-GLDPC codes. In terms of irregular ensemble LDPC codes, a large portion of degree-2 variable nodes enables the LDPC code to achieve the capacity approaching performance [24]. On the other hand, by reasonably selecting the number of partially doped variable nodes for degree-2, the property of the linear minimum distance growth with the length of the LDPC code can be guaranteed. Thus, when we design the proposed protograph-based PD-GLDPC codes, balancing the partial doping over degree-2 variable nodes enables both the existence of a typical minimum distance and a good asymptotic performance. ### III-C Condition for Typical Minimum Distance of Protograph-based PD-GLDPC Code The existence of a typical minimum distance in the given LDPC codes guarantees that their minimum distance grows linearly with the block length of the code in an asymptotic sense [25]. It was proved in [26] that a protograph LDPC code has a typical minimum distance if there is no cycle consisting of only degree-2 variable nodes in the protograph. Furthermore, in [27], the condition for a typical minimum distance of the conventional protograph GLDPC codes was given as follows. Assuming that there are no degree-2 variable nodes with double edges, i.e., no type 1 degree-2 variable nodes defined in [27], the neighborhoods of a check node $c_{i}$ that satisfy $d^{i}_{min}\geq N^{(dv2)}(c_{i})$ are removed along with its edges, where $N^{(dv2)}(c_{i})$ is the number of degree-2 variable nodes among the neighborhoods of $c_{i}$. This process is repeated until no further degree-2 variable nodes remain. Then, the GLDPC code has a typical minimum distance if all degree-2 variable nodes are removed. The proposed protograph-based PD-GLDPC code also has a similar approach to that of the conventional protograph GLDPC codes in [27]. However, since a GC node of the proposed protograph-based PD-GLDPC code is not well defined by a protograph node, the derivation of the weight enumerator of the proposed codeword is quite different from that of the conventional GLDPC code. Thus, the condition for the existence of the typical minimum distance of the proposed protograph-based PD-GLDPC codes is slightly different from that of the conventional protograph LDPC code. That is, the degree-2 variable nodes to be partially doped are initially excluded before the degree-2 variable node removing process stated in [26], because those variable nodes should be changed to the variable nodes of degrees higher than two by partial doping. Thus, we can regard the degree-2 variable nodes to be partially doped as the variable nodes with higher degrees. Then, we have the following theorem for the proposed protograph-based PD-GLPDC codes. ###### Theorem 1. For a $({\mathbb{B}}_{n_{c}\times n_{v}},\mu,\kappa,N,x)$ protograph-based PD- GLDPC code, if the undoped degree-2 variable nodes in the protograph have no cycles among themselves, the proposed protograph-based PD-GLDPC code has a typical minimum distance. ###### Proof. The proof is given in Appendix A. The existence of the typical minimum distance of the proposed protograph-based PD-GLDPC code guarantees that the minimum distance of the proposed code grows linearly with the code length of the LDPC code, and thus the proposed code has low error floor for the large code length. In the next section, we use Theorem 1 as the constraint to optimize the protograph in order to guarantee the existence of the typical minimum distance of the proposed protograph-based PD- GLDPC code. ### III-D Comparison between the Proposed PD-GLDPC Code and the Conventional Protograph GLDPC Code The main difference between the proposed protograph-based PD-GLDPC codes and the conventional protograph GLDPC codes is the perspective of doping. While the conventional protograph GLDPC code replaces an entire row, i.e., a protograph check node by the parity check matrix of the component code, the proposed protograph-based PD-GLDPC code appends some rows incident to the variable nodes copied from single protograph variable node. The focus of the conventional protograph GLDPC code is to choose a certain protograph check node, whereas the protograph-based PD-GLDPC code is focusing on choosing which protograph variable nodes are further protected by partial doping. The constraint for the conventional protograph GLDPC code is that the check nodes to be replaced should have the degree equal to the component code length, while the constraint for the proposed protograph-based PD-GLDPC codes is that the lifting size of a protograph should be the multiple of the component code length. The selection of the check nodes to be replaced in the conventional protograph GLDPC codes is generally difficult since it requires a combinatory search of either the best threshold, minimum distance, or convergence speed. Also, since many SPC nodes of a given base matrix connect the variable nodes with various degrees, it is very difficult to select the variable nodes to be partially doped for further protection in the conventional protograph GLDPC codes. Furthermore, the conventional protograph GLDPC code construction has two limitations in terms of PEXIT analysis and doping granularity. First, the PEXIT analysis of the conventional protograph GLDPC codes is not accurate because the PEXIT of the GC node is derived from averaged EXIT of $\mu$ (component code length) protograph variable nodes. Using a MAP-oriented computation as in Alg. 1, the GC node outputs a single value that represents the extrinsic mutual information for the $\mu$ protograph variable nodes. Thus, a GC node averages up the a priori mutual information of the $\mu$ neighborhood protograph variable nodes and outputs uniform extrinsic mutual information, which is similar to the EXIT analysis of a random ensemble LDPC code [21]. Since each GC node receives a priori inputs from $\mu$ different protograph variable nodes, the EXIT analysis is not accurate. Thus, the higher variance of the a priori mutual information from the average, the greater the deviation of the code between the threshold and the actual decoding performance. On the other hand, since the EXIT of a GC node in the proposed protograph-based PD-GLDPC code requires the a priori mutual information of the same protograph variable node, there is no deviation since the $\mu$ mutual information has the same value, which makes the PEXIT of the proposed code more accurate. The second limitation is that the conventional protograph GLDPC codes have large doping granularity of protograph variable nodes compared to that of the proposed one. By replacing a single protograph GC node by a component code with parameters $(\mu,\kappa)$, the $\mu$ protograph variable nodes are doped. Whereas, for every partial doping of $\beta$ GC nodes in the proposed protograph-based PD-GLDPC code, the variable nodes copied from single protograph variable node are partially doped. In other words, the doping granularity is one, which is smaller than the conventional protograph GLDPC codes. In summary, compared to the conventional protograph GLDPC codes, the proposed protograph-based PD-GLDPC code is more accurate in the PEXIT analysis and has the smaller doping granularity. ## IV Constructions of Protograph-based PD-GLDPC Codes In this section, a protograph-based PD-GLDPC code is constructed from both a regular protograph and an irregular protograph. Threshold optimization of protograph-based PD-GLDPC codes is also proposed. ### IV-A Construction from a Variable Node Regular Protograph Algorithm 2 The construction method of a protograph-based PD-GLDPC code from a variable node regular protograph Input: $w_{r}$, $\mu$, $\kappa$, $n_{v}$, $R$ Output: $y$, $\mathbb{B}_{n_{c}\times n_{v}}$ Step 1) Initialization For each $y$ in $\lceil\frac{n_{v}-n_{c}+1}{\mu}\rceil\leq y\leq\lfloor\frac{n_{v}}{\mu}\rfloor$, construct a variable node regular base matrix $\mathbb{B}$ of size $n_{c}\times n_{v}$ using the PEG method, where each variable node has degree-$w_{r}$ and $n_{c}=n_{v}(1-R)-(\mu-\kappa)y$. Step 2) Construction of the candidate protograph-based PD-GLDPC code For each $y$, partially dope $(\mu,\kappa)$ Hamming codes on $y\mu$ blocks of variable nodes in the base matrix. Step 3) Check the existence of the typical minimum distance For each $y$, $\lceil\frac{n_{v}-n_{c}+1}{\mu}\rceil\leq y\leq\lfloor\frac{n_{v}}{\mu}\rfloor$, if there exists any cycle for the submatrix induced by only undoped variable nodes of degree 2, re-initialize the base matrix as in Step 1) for that $y$. Step 4) Selection of the optimal protograph-based PD-GLDPC code For each $y$, compute the PEXIT threshold of the constructed protograph-based PD-GLDPC code and find $y$ with the best threshold. We define a variable node regular protograph as a protograph, where all of its variable nodes have the same degree. Similar to the conventional protograph GLDPC code construction, we introduce the construction process of a proposed protograph-based PD-GLDPC code from a regular protograph. In this paper, we have strictly satisfied the variable node regularity for the protograph while making the check nodes as regular as possible using the progressive edge- growth (PEG) algorithm [28]. Since the PEG algorithm is a random construction method, we have considered doping for variable nodes from the left part of the base matrix, i.e., doping for $v_{j},\,j=1,2,{\cdots},y\mu$. After lifting by $N$, the number of partially doped variable nodes is $\mu yN$ and each subset of size $\mu$ variable nodes lifted from a protograph variable node constitutes a Hamming code with PCM ${\mathbb{H}}_{Hamm}$ as a component code. Note that the number of dopings for the protograph variable nodes should be sufficient enough to satisfy the constraint for the existence of the typical minimum distance. The necessary condition of $y$ for the typical minimum distance condition is that the number of undoped degree-2 variable nodes is less than the number of check nodes of the original protograph, that is, $n_{v}-\mu y\leq n_{c}-1\leftrightarrow y\geq\frac{n_{v}-n_{c}+1}{\mu}.$ Furthermore, in order to satisfy the sufficient condition for the typical minimum distance, we make sure that the undoped degree-2 variable nodes do not form a protograph cycle among themselves. The code rate $R$ of the proposed protograph-based PD-GLDPC is derived as $R=1-\frac{n_{c}+(\mu-\kappa)y}{n_{v}}$, where for a given code rate and $n_{v}$, a protograph-based PD-GLDPC code is constructed. The construction of a protograph-based PD-GLDPC code from a regular protograph is summarized in Alg. 2. ### IV-B Differential Evolution-based Construction from Irregular Protograph Algorithm 3 Construction of $G_{c}$ and the protograph-based PD-GLDPC code Input: $\mu$, $\kappa$, $n_{v}$, $R$, $l$, $r$, $y_{max}$ Output: $y^{opt}$, $G_{c}$, $G_{p}$ Step 1) Optimize degree distribution of $G_{c}$ Optimize $\lambda_{G_{c}}(x)=\lambda_{2}x+\lambda_{3}x^{2}+\lambda_{4}x^{3}+\lambda_{5}x^{4}+\lambda_{6}x^{5}+\lambda_{l}x^{l-1}$ and $\rho_{G_{c}}(x)=\rho_{r-1}x^{r-2}+\rho_{r}x^{r-1}$ using differential evolution under constraints (a)$\sim$(c): (a) Rate constraint $R=1-\frac{\int_{0}^{1}\rho_{G_{c}}(x)dx}{\int_{0}^{1}\lambda_{G_{c}}(x)dx},0\leq\lambda_{i}\leq 1,0\leq\rho_{i}\leq 1$, (b) Typical minimum distance constraint $\frac{\lambda_{2}/2}{\Sigma}\times n_{v}\leq n_{c}-y_{max}(\mu-\kappa)\leftrightarrow\lambda_{2}\leq\frac{2\Sigma\\{n_{c}-1-y_{max}(\mu-\kappa)\\}}{n_{v}}$, and (c) $G_{p}$ existence constraint $\lambda_{3}\geq\frac{12\Sigma y_{max}}{n_{v}},\lambda_{4}\geq\frac{24\Sigma y_{max}}{n_{v}},\lambda_{5}\geq\frac{20\Sigma y_{max}}{n_{v}},\lambda_{6}\geq\frac{6\Sigma y_{max}}{n_{v}}$. Step 2) Construction of $G_{c}$ From the optimized degree distribution and by using the random PEG algorithm, construct $G_{c}$ defined as $\mathbb{D}^{(2,3,4,5,6,l)}=(a,b,c,d,e,f)$. Step 3) Optimization of $G_{p}$ For each $y=1,2,{\cdots},y_{max}$, construct $G_{p}$ defined as $\mathbb{D}^{(2,3,4,5,6,l)}=(a+15y,b-4y,c-6y,d-4y,e-y,f)$ and choose $y^{opt}\in\\{y\\}$ with the best threshold. Step 4) Typical minimum distance check of the protograph-based PD-GLDPC code For the chosen $y^{opt}$ and $G_{p}$, if there exists any degree-2 cycle for the submatrix induced by undoped variable nodes, go to Step 2). Otherwise, output $y^{opt}$ and $G_{p}$. An optimization of an irregular protograph ensemble is made by initially obtaining the degree distribution of the random ensemble using differential evolution [29] and constructing the protograph via the PEG algorithm for the construction of the proposed protograph-based PD-GLPDC codes from irregular protographs. In this paper, in order to make the check node degrees as even as possible, we try to construct the protograph from the degree distribution of a random ensemble. We define $G_{c}$ as the optimized protograph of the conventional LDPC code and $G_{p}$ as the initial irregular protograph that is used to construct the protograph-based PD-GLDPC code. $G_{c}$ is constructed to have the same variable node degree distribution as the protograph-based PD- GLDPC code constructed from $G_{p}$ after lifting by $N$. Let $\lambda_{G_{c}}(x)$ and $\rho_{G_{c}}(x)$ be the variable and check node degree distributions of irregular ensemble to construct $G_{c}$, which is the optimized protograph for the conventional LDPC codes. In this paper, we assume the degree distribution of the ensemble of $\lambda_{G_{c}}(x)=\lambda_{2}x+\lambda_{3}x^{2}+\lambda_{4}x^{3}+\lambda_{5}x^{4}+\lambda_{6}x^{5}+\lambda_{l}x^{l-1}$ and $\rho_{G_{c}}(x)=\rho_{r-1}x^{r-2}+\rho_{r}x^{r-1}$, where $\lambda_{i}$ and $\rho_{i}$ are the portions of edges of variable and check nodes of degree-$i$. Using the optimized degree distributions of $\lambda_{G_{c}}(x)$ and $\rho_{G_{c}}(x)$, a protograph $G_{c}$ is constructed by the PEG algorithm. For the description of the protographs that construct the conventional LDPC codes and the proposed protograph-based PD-GLDPC codes, let ${\mathbb{D}}^{\mathbb{dv}}=(a_{1},{\cdots},a_{max})$ be a $|\mathbb{dv}|$-sized vector defining the numbers of protograph variable nodes, where $a_{i}$ is the number of protograph variable nodes of degree $l_{i}$ and $\mathbb{dv}=\\{l_{1},l_{2},{\cdots},l_{max}\\}$ is a set of variable node degrees that exist in the protograph. That is, the protograph- based PD-GLDPC code is constructed from an $n_{c}\times n_{v}$-sized protograph with ${\mathbb{D}}^{\mathbb{dv}}$ by using the PEG algorithm. Unlike the regular protograph case, in order to make the same variable node degree distributions of $G_{c}$ and the protograph-based PD-GLDPC constructed from $G_{p}$ after lifting by $N$, an optimization of $\lambda_{G_{c}}(x)$ and $\rho_{G_{c}}(x)$ should be constrained by $y_{max}$, which is the maximum number of bulks of protograph variable nodes allowed to be partially doped in $G_{p}$. Then, we make sure that the check node degrees should be as even as possible for both codes. A protograph-based PD-GLDPC code is constructed by doping $y\mu$ protograph variable nodes in $G_{p}$. Construction of a protograph-based PD-GLDPC code from $G_{p}$ is optimized by ranging the doping bulk $y$, $1\leq y\leq y_{max}$. That is, we search for the optimal value $y$ which maximizes the coding gain between the protograph-based PD-GLDPC codes constructed from $G_{p}$ and the conventional protograph LDPC codes constructed from $G_{c}$. Conditions for the degree distributions in order to construct $G_{c}$ are derived as follows. The conditions need to guarantee two criteria: i) The variable node degree distributions of the protograph LDPC code constructed from $G_{c}$ and the protograph-based PD-GLDPC code constructed from $G_{p}$ after lifting by $N$ are the same and ii) a typical minimum distance exists for both codes. In this paper, we assume that $\mu y_{max}$ variable nodes are partially doped only from the degree-2 protograph variable nodes. For the maximum number of $y_{max}$ bulks of partially doped protograph variable nodes using the PCM of the $(15,11)$ Hamming code, the degree distribution of $G_{p}$ should be $\mathbb{D}^{(2,3,4,5,6,20)}=(a+15y_{max},b-4y_{max},c-6y_{max},d-4y_{max},e-y_{max},f).$ For the existence constraint of the typical minimum distance, the degree distribution parameters should be non-negative. The parameters $a$$\sim$$f$ are approximated by the PEG construction as $a\approx\lfloor n_{v}\frac{\lambda_{2}/2}{\Sigma}\rfloor,b\approx\lfloor n_{v}\frac{\lambda_{3}/3}{\Sigma}\rfloor,c\approx\lfloor n_{v}\frac{\lambda_{4}/4}{\Sigma}\rfloor,d\approx\lfloor n_{v}\frac{\lambda_{5}/5}{\Sigma}\rfloor,e\approx\lfloor n_{v}\frac{\lambda_{6}/6}{\Sigma}\rfloor,\,{\rm{and}}\,f\approx\lfloor n_{v}\frac{\lambda_{l}/l}{\Sigma}\rfloor,$ where $\Sigma=\int_{0}^{1}\lambda_{G_{c}}(x)dx$. For the realization of the protograph from the degree distribution using the PEG algorithm, if the summation $a+b+c+d+e+f$ is lower than $n_{v}$, the values of $a$$\sim$$f$ are added by 1 in order starting from the lowest variable node degree until the summation is equal to $n_{v}$. If $G_{c}$ is determined for a given $y_{max}$ as a variable node degree distribution of $\mathbb{D}^{(2,3,4,5,6,20)}=(a,b,c,d,e,f)$, where $a+b+c+d+e+f=n_{v}$, $G_{p}$ defined by $\mathbb{D}^{(2,3,4,5,6,20)}=(a+15y,b-4y,c-6y,d-4y,e-y,f)$ can be constructed for $y=1,{\cdots},y_{max}$. By allowing the PEG algorithm of the variable node degree distribution over a base matrix with size $\\{n_{c}-(\mu-\kappa)y\\}\times n_{v}$, both the code rate and the variable node degree distributions for $G_{c}$ and the proposed protograph-based PD- GLDPC codes constructed from $G_{p}$ after lifting by $N$ are matched. We search for the value of $y$, which has the best PEXIT threshold while having a typical minimum distance. The optimized doping value is denoted as $y^{opt}$. The construction of $G_{c}$ and the PD-GLDPC code is described in Alg. 3. ## V Numerical Results and Analysis In this section, we propose the optimized protograph design and show the BLER of the proposed protograph-based PD-GLDPC codes. The performance of the conventional protograph LDPC code is compared with that of the proposed protograph-based PD-GLDPC code. In order to make this comparison, we construct a protograph ensemble that has the same variable node degree distribution as that of the proposed protograph-based PD-GLDPC code. ### V-A Simulation Results for Optimized Protograph-based PD-GLDPC Code from Regular Protograph (a) (b) Figure 6: Comparison of threshold and BLER for the regular LDPC codes, irregular protograph LDPC codes, and the protograph-based PD-GLDPC codes from a regular protograph for code rates $1/2$ and $1/4$. For numerical analysis, we use a $(15,11)$ systematic Hamming code as the component code. For a half-rate code, we construct a $({\mathbb{B}}_{\\{200-4y\\}\times 400},15,11,75,15y)$ protograph-based PD- GLDPC code, for a given $y$. Since the doping of single protograph variable node requires $\mu-\kappa=4$ additional protograph rows, the original protograph should have a total of $200-4y$ rows to construct a half-rate protograph-based PD-GLDPC code. In order to satisfy the typical minimum distance property for the proposed PD-GLDPC code, we make sure that there are no cycles among the undoped degree-2 variable nodes if $y\geq\frac{400-(200-4y)+1}{15}\leftrightarrow y\geq\frac{400-200+1}{11}\approx 18.27$ during the PEG process of regular base matrix construction. For $y=19,20,{\cdots}$, the best threshold is when $y=19$, having a BEC threshold of 0.444. For comparison, we construct a $(3,6)$ regular protograph with size $200\times 400$ and lift it by $75$, which has a threshold of 0.429. Also, by comparing an irregular protograph LDPC code that has the same degree distribution as the constructed protograph- based PD-GLDPC code, we can find the performance gain from BP decoding to MAP decoding over GC nodes. Since the doping of protograph variable nodes in the proposed protograph-based PD-GLDPC codes occurs only over degree-2 variable nodes, the degrees of $y\mu$ protograph variable nodes will change. Since the parity check matrix of a $(15,11)$ systematic Hamming code has 4 degree-1 columns, 6 degree-2 columns, 4 degree-3 columns, and 1 degree-4 column, the conventional irregular LDPC protograph without doping having the same variable node degree distribution with the proposed protograph-based PD-GLDPC code is defined as ${\mathbb{D}}^{(2,3,4,5,6)}=(115,76,114,76,19)$. Irregular protograph LDPC code and the (3,6) regular protograph LDPC code are constructed from the $200\times 400$ protograph and the protograph-based PD- GLDPC code is constructed from the $124\times 200$ protograph with $x=y\mu=285$. The irregular protograph LDPC code also has the same variable node degree distribution as the proposed protograph-based PD-GLDPC code, where it is defined by $\mathbb{D}^{(2,3,4,5,6)}=(115,76,114,76,19)$. Using the PEG algorithm, we construct the irregular protograph LDPC code, having a threshold of 0.4234. The BLER performances of the constructed irregular protograph LDPC code, protograph-based PD-GLDPC code, and a $(3,6)$ regular code with $(n,k)=(30000,15000)$ are shown in Fig. 6(a), where all three codes are half rate LDPC codes constructed by $N=75$. The coding gain of the constructed protograph-based PD-GLDPC code is 0.021 and 0.015 compared to irregular protograph LDPC code and $(3,6)$ regular protograph LDPC code, respectively. Similarly, we construct a $({\mathbb{B}}_{\\{300-4y\\}\times 400},15,11,105,15y)$ protograph-based PD-GLDPC code for code rate $1/4$. For $y\geq\frac{400-(300-4y)+1}{15}\leftrightarrow y\geq\frac{400-300+1}{11}\approx 9.18$, the optimized threshold is the highest value $0.6935$ at $y=10$. Similar to the half-rate case, we construct a $(3,4)$ regular protograph LDPC code using the PEG algorithm to have a threshold of $0.647$. The irregular protograph ensemble has a variable degree distribution of ${\mathbb{D}}^{(2,3,4,5,6)}=(250,40,60,40,10)$ and the threshold is $0.6883$. The irregular protograph LDPC code and the $(3,4)$ regular protograph LDPC code are constructed from the $300\times 400$ protograph and the protograph-based PD-GLDPC code is constructed from the $260\times 400$ protograph with $x=y\mu=150$. The irregular protograph also has the same variable node degree distribution as the protograph-based PD- GLDPC code, where it is defined by $\mathbb{D}^{(2,3,4,5,6)}=(250,40,60,40,10)$. All the codes are lifted by $105$ to make $(42000,10500)$ codes and the numerical results are in Fig. 6(b). The coding gain of the constructed protograph-based PD-GLDPC code is 0.0052 and 0.0465 compared to irregular protograph LDPC code and $(3,4)$ regular protograph LDPC code, respectively. ### V-B Simulation Result for Optimized Protograph-based PD-GLDPC Code from Irregular Protograph Figure 7: Comparison of threshold and BLER for the irregular protograph LDPC code from $G_{c}$, the conventional random ensemble GLDPC code from [17], and the protograph-based PD-GLDPC code from $G_{p}$ for code rate $1/2$. TABLE I: Simulation results for optimized protograph-based PD-GLDPC code from irregular protographs $y_{max}$ | $\lambda_{G_{c}}(x),\rho_{G_{c}}(x)$ (threshold) | | $G_{c}$ protograph --- $\mathbb{D}^{(2,3,4,5,6,20)}$ / $G_{c}$ threshold | $G_{p}$ protograph --- $\mathbb{D}^{(2,3,4,5,20)}$, $y^{opt}$ / PD-GLDPC threshold Coding gain 5 | | $\lambda_{G_{c}}(x)=0.2049x+0.2489x^{2}+0.1150x^{3}$ --- $+0.074x^{4}+0.0210x^{5}+0.3363x^{19}$ $\rho_{G_{c}}(x)=0.9735x^{7}+0.0265x^{8}$ ($0.4815$) | $(165,134,47,23,5,26)$ --- / $0.4620$ | $(240,114,17,3,26)$, $y^{opt}=5$ --- / $0.4699$ $0.0079$ 10 | | $\lambda_{G_{c}}(x)=0.1894x+0.2255x^{2}+0.1431x^{3}$ --- $+0.1191x^{4}+0.0357x^{5}+0.2872x^{19}$ $\rho_{G_{c}}(x)=0.9908x^{7}+0.0012x^{8}$ ($0.4696$) | $(152,121,57,38,9,23)$ --- / $0.4523$ | $(287,85,3,2,23)$, $y^{opt}=9$ --- / $0.4638$ $0.0115$ 15 | | $\lambda_{G_{c}}(x)=0.1632x+0.1758x^{2}+0.2143x^{3}$ --- $+0.1827x^{4}+0.0543x^{5}+0.2098x^{19}$ $\rho_{G_{c}}(x)=0.9940x^{7}+0.0060x^{8}$ ($0.4476$) | $(131,94,86,59,14,16)$ --- / $0.4352$ | $(341,38,2,3,16)$, $y^{opt}=14$ --- / $0.4534$ $0.0182$ The construction for the protograph of the conventional protograph LDPC code, $G_{c}$ is made for $y_{max}=5,10,15$ for the half-rate protograph ensemble. The numerical results are summarized in Table I, where the coding gain given for the proposed PD-GLDPC code is compared to the conventional protograph LDPC code with equal degree distribution. The random ensemble-based GLDPC code with threshold $0.466$ in [17] is represented as a variable node ensemble $\lambda(x)=0.8x^{2}+0.01x^{3}+0.01x^{5}+0.18x^{7}$ and a doping portion of $40\%$ by Hamming code. Fig. 7 shows the performance comparison of three half- rate codes which are the irregular protograph LDPC code constructed from $G_{c}$, a random ensemble-based GLDPC code in [17], and the proposed protograph-based PD-GLDPC code constructed from $G_{p}$, where $y_{max}=5$. All three codes in Fig. 7 are $(n,k)=(30000,15000)$ codes of half-rate, where $G_{c}$ is defined as $\mathbb{D}^{(2,3,4,5,6,20)}=(165,134,47,23,5,26)$ and has the same variable node degree distribution as the PD-GLDPC code after lifting by $N=105$. $x=y\mu=75$ protograph variable nodes are partially doped in the PD-GLDPC code. The constructed protograph-based PD-GLDPC code for $y_{max}=5$ has a coding gain of 0.0079 and 0.0039 compared to the GLDPC code in [17] and the irregular protograph LDPC from $G_{c}$, respectively. Fig. 7 shows that the proposed protograph-based PD-GLDPC code has a good performance both in the waterfall and low error floor region due to the fact that the code is optimized by increasing the doping as much as possible, and at the same time, the typical minimum distance constraint is satisfied. In terms of the asymptotic analysis, increasing the portion of degree-2 variable nodes increases the possibility of the code to approach the channel capacity [24]. However, the existence of a typical minimum distance of the protograph is also important, which upper bounds the portion of degree-2 variable nodes in the LDPC code. Thus, balancing of degree-2 variable nodes is needed in order to satisfy both a typical minimum distance condition and a good threshold. The proposed protograph-based PD-GLDPC code guarantees the balancing of the degree-2 variable nodes by carefully choosing the rate of the protograph code and the number of doping on degree-2 variable nodes. Figure 8: Comparison of threshold and BLER for the irregular protograph LDPC code from $G_{c}$ and the proposed protograph-based PD-GLDPC code from $G_{p}$ for code rate $1/4$. Similarly, the construction of $G_{c}$ is made for the code rate $1/4$ case. We simulate the proposed protograph-based PD-GLDPC with the small doping case, where the optimization of random ensemble for $G_{c}$ is done under the constraint $y_{max}=3$. The degree distribution of the optimized results is obtained as $\lambda_{G_{c}}(x)=0.2858x+0.1218x^{2}+0.0533x^{3}+0.0369x^{4}+0.0095x^{5}+0.4927x^{29},$ $\rho_{G_{c}}(x)=0.9995x^{5}+0.0005x^{6},$ which makes $G_{c}$ with $\mathbb{D}^{(2,3,4,5,6,30)}=(258,74,24,13,2,29)$ via the PEG algorithm. The threshold of the proposed protograph-based PD-GLDPC code is best when $y=2$ and for this instance, $G_{p}$ is then defined as $\mathbb{D}^{(2,3,4,5,30)}=(288,66,12,5,29)$. Both codes are $(n,k)=(42000,10500)$ codes of code rate $1/4$, where $G_{c}$ is defined as $\mathbb{D}^{(2,3,4,5,6,30)}=(258,74,24,13,2,29)$ and has the same variable node degree distribution as $G_{p}$ after lifting by $N=105$. $x=y\mu=30$ protograph variable nodes are partially doped in the protograph-based PD-GLDPC code. The simulation result of both the irregular protograph LDPC code and the proposed protograph-based PD-GLDPC code are shown for the same variable node degree distribution in Fig. 8. The thresholds of $G_{c}$ and the proposed PD- GLDPC code are 0.6702 and 0.7031, respectively, where the coding gain is 0.0329 compared to the irregular protograph LDPC code. ## VI Conclusion We proposed a new construction method of a protograph-based PD-GLDPC code that has advantages the accuracy of the PEXIT analysis and a finer granularity of the protograph node doping compared to the conventional protograph GLDPC codes. Also, the proposed optimized PD-GLDPC codes constructed from regular and irregular protographs have good BLER performances compared to the regular protograph LDPC codes and conventional GLDPC code constructed from irregular random ensemble. While the PEXIT of a conventional GLDPC code over a GC node averages out the a priori and extrinsic mutual information, the proposed protograph-based PD-GLDPC code does not need such an averaging process because the mutual information exchanges over the same protograph variable node. Furthermore, since it is possible to partially dope the protograph variable nodes with a granularity 1, the design of a protograph-based PD-GLDPC code becomes more flexible in terms of balancing the rate loss and doping. ## Appendix A Proof of Theorem 1: The Constraint for the Existence of the Typical Minimum Distance of the Proposed Protograph-based PD-GLDPC Codes A proof for the constraint of the existence of a typical minimum distance for the proposed protograph-based PD-GLDPC codes is given in this appendix. Similar to that in [27], a typical minimum distance is driven by the weight enumerator analysis over the lifted protograph. In order to use the notations in [27], we’ve distinguished the indexing notations during the enumeration for the partially doped variable nodes using ′. Also, the $c_{j}$ and $v_{i}$ notations are used for the check nodes and the variable nodes, respectively. Suppose that the proposed protograph-based PD-GLDPC code is constructed from the protograph defined by $G=(V,C,E)$ and the $x$ variable nodes are partially doped, where component codes are identical with the parameters $(\mu,\kappa)$. We are given a variable node set $V=\\{v_{1},{\cdots},v_{n_{v}}\\}$ and a check node set $C_{PD{\text{-}}GLDPC}=B_{Hamm}\cup C=\\{b_{1},{\cdots},b_{x}\\}\cup\\{c_{1},{\cdots},c_{n_{c}}\\}$ for the protograph. It is important to note that the GC node set $B_{Hamm}$ is not defined over a protograph. However, the codeword enumeration can be made when the protograph is lifted, where $b_{i^{\prime}},i^{\prime}\in[x]$ is a virtual check node that represents the Hamming check nodes used for partial doping for $v_{i^{\prime}}$ in the original protograph. Although $b_{i^{\prime}}$ is not a protograph check node, we define it for the enumeration of the partially doped protograph variable nodes. The protograph-based PD-GLDPC code is constructed by lifting the graph $G$ by $N$ times and permuting the replicated edges. Each $v_{i}$ ($c_{j}$) has degree $q_{v_{i}}$ ($q_{c_{j}}$) and each $b_{i^{\prime}}$ has degree $\mu$. For the enumeration of the GC node $b_{i^{\prime}}$, we can think of it as a protograph node of degree $\mu$ that is lifted by a factor of $\frac{N}{\mu}$. The upper bound of the weight enumerator of the proposed protograph-based PD-GLDPC code with weight $d$, denoted as $A_{d}^{PD{\text{-}}GLDPC}$ is derived as follows. Let $w_{m,u},u\in[q_{v_{m}}]$ be the $u$th edge weight from a variable node $v_{m}$. For a partially doped variable node $v_{m},m\in[x]$, there are $\mu$ weights sent towards the incident GC node, where the $u$th weight is defined as $w^{\prime}_{m,u},u\in[\mu]$. For a given input weight vector $\mathbb{d}=(d_{1},{\cdots},d_{n_{v}})$, we need to calculate $A^{PD{\text{-}}GLDPC}(\mathbb{d})$ and sum it over every instance of $\mathbb{d}$ that satisfies $d=d_{1}+{\cdots}+d_{n_{v}}$. For input $d_{i^{\prime}},i^{\prime}\in[x]$, it is clear that $\sum_{i=1}^{\mu}w^{\prime}_{m,i}=d_{i^{\prime}}$ because the extrinsic weight $w^{\prime}_{m,i}$ consists of weights solely from $v_{m}$. We introduce the following notations: * • $A^{v_{i}}_{d_{i}}(\mathbb{w}_{i})=\binom{N}{d_{i}}\delta_{d_{i},w_{i,1}},{\cdots},\delta_{d_{i},w_{i,q_{v_{i}}}}=\begin{cases}\binom{N}{d_{i}},\quad\mbox{if}\,w_{i,j}=d_{i},\forall j\in[q_{v_{i}}]\\\ 0,\quad\mbox{otherwise}\end{cases}$ is the vector weight enumerator for a variable node $v_{i}$ of the protograph [27]. * • $A^{c_{j}}(\mathbb{z}_{j})$ is the vector weight enumerator for a check node $c_{j}$ of the original protograph, for the incoming weight vector $\mathbb{z}_{j}=[z_{j,1},{\cdots},z_{j,q_{c_{j}}}]$ [27]. * • $B_{d_{i^{\prime}}}^{v_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})=\begin{cases}1,\quad\mbox{for}\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\\ 0,\quad\mbox{otherwise}\end{cases}$ is the vector weight enumerator for partially doped variable nodes $v_{i^{\prime}},\,i^{\prime}\in[x]$. * • $B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})$ is the vector weight enumerator for check nodes that are created during the lifting process given the weight vector $\mathbb{w}^{\prime}_{i^{\prime}}$. $A^{b_{i^{\prime}}}(d_{i^{\prime}})$ is the summation of enumerators over all possible $\mathbb{w}^{\prime}_{i^{\prime}}$ values given that $w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}$ satisfying $\displaystyle A^{b_{i^{\prime}}}(d_{i^{\prime}})=\sum_{\mathbb{w}^{\prime}}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})=\sum_{\mathbb{w}^{\prime}}\sum_{\\{\mathbb{m}\\}}C(\frac{N}{\mu};m_{1},{\cdots},m_{K}),$ where $\mathbb{w}^{\prime}=(w_{1}^{\prime},{\cdots},w_{\mu}^{\prime})$ such that $\sum_{i=1}^{\mu}w_{1}^{\prime}=d_{k}^{\prime},\,w_{i}^{\prime}\leq\frac{N}{\mu}.$ Then, the weight enumerator is given as $\displaystyle A_{d}^{PD-GLDPC}=\sum_{\\{\mathbb{d}\\}}A^{PD- GLDPC}(\mathbb{d}),$ where $\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})$ $\displaystyle=\frac{\prod_{i=1}^{n_{v}}A^{v_{i}}_{d_{i}}(\mathbb{w}_{i})\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{z}_{j})\times\prod_{i^{\prime}=1}^{x}B_{d_{i^{\prime}}}^{v_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{s=1}^{n_{v}}\prod_{r=1}^{q_{v_{s}}}\binom{N}{w_{s,r}}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}}$ $\displaystyle=\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}}.$ The solution to the equation $\mathbb{w}^{\prime}=\mathbb{m}\mathbb{M^{C}}$ is given as $\mathbb{m}=\\{m_{1},{\cdots},m_{K}\\}$. The term $\binom{\frac{N}{\mu}}{w^{\prime}_{s^{\prime},r^{\prime}}}$ is lower bounded by $(\frac{N}{\mu})^{w^{\prime}_{s^{\prime},r^{\prime}}}e^{-w^{\prime}_{s^{\prime},r^{\prime}}\cdot{\rm{ln}}\,w^{\prime}_{s^{\prime},r^{\prime}}}$. Then, $A^{PD-GLDPC}(\mathbb{d})$ can be upper bounded as $\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})$ $\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}\prod_{r^{\prime}=1}^{\mu}(\frac{N}{\mu})^{w^{\prime}_{s^{\prime},r^{\prime}}}e^{-w^{\prime}_{s^{\prime},r^{\prime}}\cdot{\rm{ln}}\,w^{\prime}_{s^{\prime},r^{\prime}}}}$ $\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times\prod_{s^{\prime}=1}^{x}(\frac{N}{\mu})^{d_{s^{\prime}}}e^{-d_{s^{\prime}}\cdot{\rm{ln}}\,d_{s^{\prime}}}}$ $\displaystyle\leq\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}}$ $\displaystyle=\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}B^{b_{i^{\prime}}}(\mathbb{w}^{\prime}_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}}$ $\displaystyle=\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})\times\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}\times(\frac{N}{\mu})^{P}e^{-P\cdot{\rm{ln}}\,P}},$ (3) where $P=\sum_{s^{\prime}=1}^{x}d_{s^{\prime}}$ is the total weight of the $x$ partially doped variable nodes. Then $\sum_{t}(t\cdot{\rm{ln}}\,t)\leq(\sum_{t}t)\cdot{\rm{ln}}\,(\sum_{t}t)$ is used for the second and the third inequalities in (3). It was shown in (18) of [27] that the inequality $\frac{\prod_{j=1}^{n_{c}}A^{c_{j}}(\mathbb{d}_{j})}{\prod_{i=1}^{n_{v}}\binom{N}{d_{i}}^{q_{v_{i}}-1}}\leq\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$ holds, where $d_{min}^{(c)}$ is the minimum distance of an SPC component code for the original protograph and $k_{max}^{(c)}$ is the maximum number of codewords of an SPC component code. Using the similar notations in [27], let $d_{min}^{(b)}$ and $k^{(b)}$ be the minimum distance and the number of codewords of the $(\mu,\kappa)$ component code for the GC nodes. Then, $\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})$ is upper bounded as $\displaystyle\prod_{i^{\prime}=1}^{x}A^{b_{i^{\prime}}}(d_{i^{\prime}})$ $\displaystyle\leq\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}\prod_{i=1}^{\mu}{(\frac{N}{\mu})}^{\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}}e^{\frac{(2+k^{\prime}_{i^{\prime}}ln\,2)}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}-\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}{\rm{ln}}\,w^{\prime}_{i^{\prime},i}}$ $\displaystyle=\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\sum_{i=1}^{\mu}\frac{1}{d_{min}^{(b)}}w^{\prime}_{i^{\prime},i}{\rm{ln}}\,w^{\prime}_{i^{\prime},i}}$ $\displaystyle\leq\prod_{i^{\prime}=1}^{x}\sum_{\\{\mathbb{w}^{\prime}_{i^{\prime}}:\,w^{\prime}_{i^{\prime},1}+{\cdots}+w^{\prime}_{i^{\prime},\mu}=d_{i^{\prime}}\\}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}$ $\displaystyle\leq\prod_{i^{\prime}=1}^{x}\binom{d_{i^{\prime}}+\mu-1}{d_{i^{\prime}}}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}.$ (4) For the inequality in the third line of (4), we use the fact that $\sum_{i=1}^{p}t_{i}{\rm{ln}}\,t_{i}\leq s\cdot{\rm{ln}}\,\frac{s}{p}$ with $s=t_{1}+{\cdots}+t_{p}$, which is clear by using the derivative on the multivariable function that consists of independent $t_{i}$’s. The equality is satisfied when all $t_{i}$ values are the same. Going back to (3), let $f(P)=\frac{1}{\binom{N}{\mu}^{P}e^{-P{\rm{ln}}\,P}}$ for convenience. Then we have $\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq$ $\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$ $\displaystyle\times\prod_{i^{\prime}=1}^{x}e^{d_{i^{\prime}}+\mu-1}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{\prime}_{i^{\prime}}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}\times f(P)$ $\displaystyle\leq$ $\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}$ $\displaystyle\times e^{x(\mu-1)}e^{P}\prod_{i^{\prime}=1}^{x}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}\times f(P).$ (5) We classify the variable nodes in the protograph into three groups before doping: * • Protograph variable nodes of degrees higher than 2 * • Protograph variable nodes of degree 2 to be partially doped * • Protograph other variable nodes of degree 2. We also separate the weights of codewords after lifting into three parts according to the three groups of variable nodes: $u_{i}$, $p_{z}$, and $l_{j}$, where $u_{i}$ is the weight of the sub-codeword corresponding to a protograph variable node $v_{i}$ of degree higher than 2 and $p_{z}$ and $l_{j}$ are the weights of codewords of each partially doped and undoped protograph variable node $v_{z}$ and $v_{j}$ of degree 2 from the protograph, respectively. The sum of sub-codeword weights for each group of variable nodes is given as $U=\sum_{i}u_{i}$, $P=\sum_{z}p_{z}$, and $L=\sum_{j}l_{j}$. It is clear that for the total codeword weight $d$, $d=U+P+L$. Then, the upper bound of the first term in (5) is written as $\displaystyle\prod_{i=1}^{n_{v}}e^{(q_{v_{i}}-1-\frac{q_{v_{i}}}{d_{min}^{(c)}})d_{i}{\rm{ln}}\,\frac{d_{i}}{N}+\frac{q_{v_{i}}(2+k_{max}^{(c)}{\rm{ln}\,2)}}{d_{min}^{(c)}}d_{i}}\leq$ $\displaystyle e^{(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)}$ $\displaystyle\times e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot L}\cdot e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot P},$ (6) which is derived by using three weight groups of codewords similar to (20) of [27]. We share the same inequality $u_{i}<Ne^{-\frac{(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}-1}}$ over the given codeword weight $d$ as in [27]. Using the derivation in [27], the upper bound of the second term of (5) can be derived as $\displaystyle\prod_{i^{\prime}=1}^{x}(\frac{N}{\mu})^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}=\prod_{i^{\prime}=1}^{x}e^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{N}{\mu}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}-\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{d_{i^{\prime}}}{\mu}}$ $\displaystyle=\prod_{i^{\prime}=1}^{x}e^{\frac{1}{d_{min}^{(b)}}d_{i^{\prime}}{\rm{ln}}\,\frac{N}{d_{i^{\prime}}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}d_{i^{\prime}}}=\prod_{z=1}^{x}e^{\frac{1}{d_{min}^{(b)}}p_{z}{\rm{ln}}\,\frac{N}{p_{z}}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}p_{z}}$ $\displaystyle\leq e^{\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P}.$ (7) Using (6) and (7), the upper bound of $A^{PD{\text{-}}GLDPC}(\mathbb{d})$ is derived in terms of $E(d,P,L)$ as follows: $\displaystyle A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq$ $\displaystyle e^{\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}}e^{\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P}\cdot e^{(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)}$ $\displaystyle\times e^{\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(P+L)}\cdot e^{x(\mu-1)}e^{P}\cdot f(P).$ (8) Let $E(d,P,L)$ be the parameter satisfying $A^{PD{\text{-}}GLDPC}(\mathbb{d})\leq e^{x(\mu-1)}\cdot e^{E(d,P,L)}$. Then, from the upper bound in (8), $E(d,P,L)$ is given as $\displaystyle E(d,P,L)=$ $\displaystyle\frac{1}{d_{min}^{(b)}}P\cdot{\rm{ln}}\,\frac{Nx}{P}+\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}P+(2-\frac{3}{d_{min}^{(c)}})(d-P-L){\rm{ln}}\,\frac{d-P-L}{N}$ $\displaystyle+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-P-L)+\frac{2(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(P+L)+P+P{\rm{ln}}\,P-P{\rm{ln}}\,\frac{N}{\mu}.$ Assuming that there are no type 1 degree-2 variable nodes defined in [27] and there are no cycles consisting only of undoped variable nodes of degree-2, we use the result of (22) in [27] such that the inequality $l_{2,k}^{(c_{j})}\leq\frac{1}{d_{min}^{(c_{j})}}(L_{2}^{(c_{j})}+\sum_{i}w_{i}^{(c_{j})})$ is satisfied for all $j\in[n_{c}]$, where $l_{2,k}^{(c_{j})}$ is the weight of the degree-2 undoped variable node of $G_{p}$ and the total weight of them is denoted as $L_{2}^{(c_{j})}$ for check node $c_{j}$. Similar to the result in [27], we can derive the upper bound $L\leq\gamma(U+P)$, which is the same as $L\leq\frac{\gamma}{1+\gamma}d$. Now, the upper bound of $E(d,P,L)$ needs to be derived for independent values $L$ and $P$. The first and second partial derivatives of $E(d,P,L)$ by $P$ are given as $\displaystyle\frac{dE}{dP}=$ $\displaystyle\frac{1}{d_{min}^{(b)}}\cdot{\rm{ln}}\,\frac{Nx}{eP}+\frac{(2+k^{(b)}{\rm{ln}}\,2)}{d_{min}^{(b)}}-(2-\frac{3}{d_{min}^{(c)}}){\rm{ln}}\,\frac{e(d-P-L)}{N}-\frac{(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}}$ $\displaystyle+1+{\rm{ln}}\,P+1-{\rm{ln}}\,\frac{N}{\mu}<0,$ $\displaystyle\frac{d^{2}E}{dP^{2}}=$ $\displaystyle-\frac{1}{d_{min}^{(b)}P}+(2-\frac{3}{d_{min}^{(c)}})\cdot\frac{1}{d-P-L}+\frac{1}{P}>0.$ Since the first derivative over $P$ is negative and the second derivative is positive, $E(d,P,L)$ is upper bounded by $\underset{P\to 0+}{\lim}E(d,P,L)=(2-\frac{3}{d_{min}^{(c)}})(d-L){\rm{ln}}\,\frac{d-L}{N}+\frac{3(2+k_{max}^{(c)})}{d_{min}^{(c)}}\cdot(d-L)+\frac{2(2+k_{max}^{(c)}{\rm{ln}}\,2)}{d_{min}^{(c)}}L.$ Since the resulting upper bound of $E(d,L)$ is the same as (37) in [27], the rest of the proof is the same as that in [27] and thus the proposed constraint guarantees the existence of typical minimum distance of the proposed protograph-based PD-GLDPC code. ## Acknowledgment The authors would like to thank… ## References * [1] R. G. Gallager, “Low-density parity-check codes,” _IRE Trans. Inf. Theory_ , vol. 8, no. 1, pp. 21–28, Jan. 1962. * [2] D. J. C. MacKay and R. M. Neal, “Near shannon limit performance of low density parity check codes,” _IEEE Electron. Lett._ , vol. 32, no. 18, pp. 1645–1646, 1996. * [3] R. M. Tanner, “A recursive approach to low complexity codes,” _IEEE Trans. Inf. Theory_ , vol. 27, no. 5, pp. 533–547, Sep. 1981. * [4] G. Liva and W. E. Ryan, “Short low-error-floor Tanner codes with Hamming nodes,” in _Proc. IEEE MILCOM_ , 2005. * [5] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “Enumerators for protograph-based ensembles of LDPC and generalized LDPC codes,” _IEEE Trans. Inf. Theory_ , vol. 57, no. 2, pp. 858–886, Feb. 2011. * [6] I. P. Mulholland, E. Paolini, and M. F. Flanagan, “Design of LDPC code ensembles with fast convergence properties,” in _Proc. IEEE BlackSeaCom_ , 2015. * [7] Y. Liu, P. M. Olmos, and T. Koch, “A probabilistic peeling decoder to efficiently analyze generalized LDPC codes over the BEC,” _IEEE Trans. Inf. Theory_ , vol. 65, no. 8, pp. 4831–4853, Aug. 2019. * [8] M. Lentmaier and K. S. Zigangirov, “On generalized low-density parity-check codes based on Hamming component codes,” _IEEE Commun. Lett._ , vol. 3, no. 8, pp. 248–250, Aug. 1999. * [9] G. Yue, L. Ping, and X. Wang, “Generalized low-density parity-check codes based on Hadamard constraints,” _IEEE Trans. Inf. Theory_ , vol. 53, no. 3, pp. 1058–1079, Mar. 2007. * [10] N. Miladinovic and M. Fossorier, “Generalized LDPC codes with Reed-Solomon and BCH codes as component codes for binary channels,” in _Proc. IEEE GLOBECOM_ , 2005. * [11] D. G. M. Mitchell, M. Lentmaier, and D. J. Costello, “On the minimum distance of generalized spatially coupled LDPC codes,” in _Proc. IEEE ISIT_ , Jul. 2013. * [12] P. M. Olmos, D. G. M. Mitchell, and D. J. Costello, “Analyzing the finite-length performance of generalized LDPC codes,” in _Proc. IEEE ISIT_ , Jun. 2015. * [13] D. G. M. Mitchell, P. M. Olmos, M. Lentmaier, and D. J. Costello, “Spatially coupled generalized LDPC codes: Asymptotic analysis and finite length scaling,” _IEEE Trans. Inf. Theory_ , vol. 67, no. 6, pp. 3708–3723, Jun. 2021. * [14] E. Paolini, M. P. C. Fossorier, and M. Chiani, “Generalized and doubly generalized LDPC codes with random component codes for the binary erasure channel,” _IEEE Trans. Inf. Theory_ , vol. 56, no. 4, pp. 1651–1672, Apr. 2010. * [15] Y. Wang and M. Fossorier, “Doubly generalized LDPC codes,” in _Proc. IEEE ISIT_. 2006. * [16] Y. Wang and M. Fossorier, “Doubly generalized LDPC codes over the AWGN channel,” _IEEE Trans. Commun._ , vol. 57, no. 5, pp. 1312–1319, May 2009. * [17] R. Guan and L. Zhang, “Hybrid Hamming GLDPC codes over the binary erasure channel,” in _Proc. IEEE ASID_ , 2017. * [18] G. Liva, W. E. Ryan, and M. Chiani, “Quasi-cyclic generalized LDPC codes with low error floors,” _IEEE Trans. Commun._ , vol. 56, no. 1, pp. 49–57, Jan. 2008. * [19] J. Thorpe, “Low-density parity-check (LDPC) codes constructed from protographs,” Jet Propulsion Lab., Pasadena, CA, INP Progress Rep. 42–154, 2003. * [20] Y. Yu, Y. Han, and L. Zhang, “Hamming-GLDPC codes in BEC and AWGN channel,” in _Proc. IEEE ICWMMN_ , 2015. * [21] A. Ashikhmin, G. Kramer, and S. ten Brink, “Extrinsic information transfer functions: Model and erasure channel properties,” in _IEEE Tran. Inf. Theory_ , vol. 50, no. 11, pp. 2657–2673, Nov. 2004. * [22] G. Liva and M. Chiani, “Protograph LDPC codes design based on EXIT analysis,” in _Proc. IEEE GLOBECOM_ , 2007. * [23] A. K. Pradhan, A. Thangaraj, and A. Subramanian, “Construction of near-capacity protograph LDPC code sequences with block-error thresholds,” _IEEE Trans. Commun._ , vol. 64, no. 1, pp. 27–37, Jan. 2016. * [24] C. Di, T. J. Richardson, and R. L. Urbanke, “Weight distribution of low-density parity-check codes,” _IEEE Trans. Inf. Theory_ , vol. 52, no. 11, pp. 4839–4855, Nov. 2006. * [25] R. G. Gallager, _Low-density parity-check codes_. Cambridge, MA: MIT Press, 1963. * [26] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “On the existence of typical minimum distance for protograph-based LDPC codes,” in _Proc. IEEE ITA_ , 2010. * [27] S. Abu-Surra, D. Divsalar, and W. E. Ryan, “On the typical minimum distance of protograph-based generalized LDPC codes,” in _Proc. IEEE ISIT_ , 2010, * [28] Xiao-Yu Hu, E. Eleftheriou, and D. M. Arnold, “Regular and irregular progressive edge-growth Tanner graphs,” _IEEE Trans. Inf. Theory_ , vol. 51, no. 1, pp. 386–398, Jan. 2005. * [29] A. Shokrollahi and R. Storn, “Design of efficient erasure codes with differential evolution,” in _Proc. IEEE ISIT_ , 2000.
arxiv-papers
2021-07-27T00:56:54
2024-09-04T03:07:20.217615
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jaewha Kim, Jae-Won Kim, Hee-Youl Kwak, and Jong-Seon No", "submitter": "Jaewha Kim", "url": "https://arxiv.org/abs/2107.12534" }
2107.12535
# Existence of solutions to a generalized self-dual Chern-Simons equation on graphs Yingshu Lü ***Email address: [email protected]. Peirong Zhong †††Email address: [email protected]. ###### Abstract Let $G=(V,E)$ be a connected finite graph and $\Delta$ the usual graph Laplacian. In this paper, we consider a generalized self-dual Chern-Simons equation on the graph $G$ $\displaystyle\Delta{u}=-\lambda{e^{F(u)}[e^{F(u)}-1]^{2}}+4\pi\sum_{i=1}^{M}{\delta_{p_{j}}},$ (0.1) where $\displaystyle F(u)=\begin{cases}\widetilde{F}(u),\ \quad u\leq 0,\\\ 0,\quad\quad\quad u>0,\end{cases}$ $\widetilde{F}(u)$ satisfies $u=1+{\widetilde{F}(u)}-e^{\widetilde{F}(u)}$, $\lambda>0$, $M$ is any fixed positive integer, $\delta_{p_{j}}$ is the Dirac delta mass at the vertex $p_{j}$, and $p_{1}$, $p_{2}$, $\cdots$, $p_{M}$ are arbitrarily chosen distinct vertices on the graph. We first prove that there is a critical value ${\lambda}_{c}$ such that if $\lambda\geq{\lambda}_{c}$, then the generalized self-dual Chern-Simons equation has a solution $u_{\lambda}$. Applying the existence result, we develop a new method to construct a solution of the equation (0.1) which is monotonic with respect to $\lambda$ when $\lambda\geq{\lambda}_{c}$. Then we establish that there exist at least two solutions of the equation via the variational method for $\lambda>{\lambda}_{c}$. Furthermore, we give a fine estimate of the monotone solution which can be applied to other related problems. School of Mathematical Sciences, Fudan University, Shanghai, China _Keyword: Chern-Simons equation, finite graph, existence, the variational method_ Mathematics Subject Classification: 35A01, 35A15, 35R02 ## 1 Introduction In this paper, we study the following generalized self-dual Chern-Simons equation on a connected finite graph $G$ $\Delta{u}=-\lambda{e^{F(u)}[e^{F(u)}-1]^{2}}+4\pi\sum_{i=1}^{M}{\delta_{p_{j}}},$ (1.1) where $\Delta$ is the graph Laplacian, $\displaystyle F(u)=\begin{cases}\widetilde{F}(u),\ \quad u\leq 0,\\\ 0,\quad\quad\quad u>0,\end{cases}$ (1.2) $\widetilde{F}(u)$ satisfies $u=1+{\widetilde{F}(u)}-e^{\widetilde{F}(u)}$, $p_{1},p_{2},...,p_{M}$ are distinct points in the graph $G$ and $\delta_{p_{j}}$ satisfies $\displaystyle\delta_{p_{j}}=\begin{cases}1,\ \quad\mbox{at $p_{j}$}\\\ 0,\quad\mbox{otherwise}.\end{cases}$ Note that if $F(u)=u$, then the solutions of the generalized self-dual Chern- Simons model is referred to as vortices. We remark that the notion of vortices play important roles in many aspects of sciences including superconductivity [15], optics [2], quantum Hall effects [19], for which one can read. The study of vortices in (2+1)-dimensional Chern-Simons gauge theory has attracted much attention recently. One of the important features of these vortices, which differs from Nielsen-Olesen vortices [18], is that they are magnetically and elecrically charged. In the Chern-Simons model, the Yang- Mills (or Maxwell) term does not appear in the action Lagrangian density and only the Chern-Simons term governs eletromagnetism. Under the condition that the Higgs potential takes a sextic form, the static equations of motion can be deduced by reducing a system of second-order differential equations to a self- dual system of first-order equations, and then the topological multivortices [20],[24], non-topological multivortices[3]-[6],[21], and doubly periodic vortices [11] can all be studied rigorously in mathematical methods. A generalized self-dual Chern-Simons model was later proposed by [12] and now plays an important role in various areas of physics, many researchers did a lot of significant work on the existence of non-topological vortices and topological vortices in this Chern-Simons model [5],[23],[25]. However, the existence of double periodic vortices in this Chern-Simons model had been an open problem, until recently Han solved this problem in [11]. He reduced the generalized self-dual Chern-Simons equation to a quasilinear elliptic equation by appropriate transformations, and established the existence of double periodic vortices of the Chern-Simons model by the methods of subsolutions and supersolutions. In this paper, we investigate the existence of the solutions to the generalized Chern-Simons equation on a connected finite graph. In recent years, the research on the elliptic equations on graphs has attracted attention increasingly from scientists. Grigor’yan, Lin and Yang [7] considered the Kazdan-Warner equation on a finite graph, where the Kazdan- Warner equation was initially studied on a manifold [16]. In [7], they gave the solvability of the following equation depending on the sign of $c$ $\Delta u=c-he^{u},$ where $c$ is a constant and $h:V\to\mathbb{R}$ is a function. For more results of solvability of the Kazdan-Warner equation, we refer readers to [8]-[10],[17]. The Kazdan-Warner equation is closely related to the mean field equation investigated originally in the prescribed curvature problem in geometry. Huang, Lin and Yau [14] proved the existence of solution to the following two mean field equations $\displaystyle\Delta u+e^{u}=\rho\delta_{0},$ (1.3) and $\Delta u=\lambda e^{u}(e^{u}-1)+4\pi\sum_{j=1}^{M}\delta_{p_{j}}$ on an arbitrary connected finite graph, where $\rho>0$ and $\lambda>0$ are constants. From these results, we study the generalized Chern-Simons equation (1.1) on a finite graph $G$. Inspired by the idea from [22], we first show that there is a critical value $\lambda_{c}$ depending on the graph $G$ such that if $\lambda>\lambda_{c}$, the equation (1.1) has a solution via the variation method. Moreover, the existence of the solutions to the equation (1.1) also holds when $\lambda=\lambda_{c}$ by the properties of finite graphs. Applying the existence result for $\lambda\geq{\lambda}_{c}$, we put forward a new idea to construct a solution of the equation (1.1) which is monotonic with respect to $\lambda$. With the aid of the existence results and Mountain Pass theorem, we show that there exist at least two solutions of the equation (1.1). The crucial point is that we apply the properties of the equation on the finite graph to prove the Palais-Smale condition used in Mountain Pass theorem which is different from the equations on Euclidean spaces. Furthermore, under the monotonicity property of the solutions, we give a fine estimate of the solutions for almost everywhere $\lambda>{\lambda}_{c}$. The organization of the paper is as follows. In Section 2, we introduce the notations and preliminaries of the paper and then state our main results. In Section 3, we present the existence of the solution to the generalized self- dual Chern-Simons equation. A fine result about the solutions is established in Section 4. ## 2 Settings and Main Results Let $G=(V,E)$ be a connected finite graph. For any edge $xy\in E$, we assume that the symmetric weights $\omega_{xy}=\omega_{yx}$ satisfying $\omega_{xy}>0$. Let $\mu:V\to{\mathbb{R}^{+}}$ be a finite measure. For any function $u:V\to\mathbb{R}$, the Laplace operator acting on $u$ is defined by $\Delta{u}(x)=\frac{1}{\mu(x)}\sum_{y\sim{x}}\omega_{yx}[u(y)-u(x)],$ (2.1) where $y\sim x$ means ${xy}\in E$. The associated gradient form stands for $\displaystyle\Gamma{(u,v)}(x)=\frac{1}{2\mu(x)}\sum_{y\sim x}\omega_{xy}(u(y)-u(x))(v(y)-v(x))$ (2.2) for any $u,v:V\to\mathbb{R}$. For any function $f:V\to\mathbb{R}$, an integral of $f$ over $V$ is defined by $\displaystyle\int_{V}fd\mu=\sum_{x\in V}\mu(x)f(x),$ (2.3) and then $\frac{1}{2}\int_{V}{|\nabla u|}^{2}d\mu:=\frac{1}{2}\sum_{x\in V}\sum_{y\sim{x}}\omega_{xy}{[u(y)-u(x)]}^{2}.$ (2.4) Define a Sobolev space and a norm by $\displaystyle W^{1,2}(V)=\\{u:V\to\mathbb{R}|\int_{V}(|\nabla u|^{2}+u^{2})d\mu<+\infty\\},$ and $\displaystyle\|u\|_{W^{1,2}(V)}=\left(\int_{V}(|\nabla u|^{2}+u^{2})d\mu\right)^{\frac{1}{2}}$ respectively. Since $G$ is a finite graph, the Sobolev space $W^{1,2}(V)$ is the set of all functions on $V$, a finite dimensional linear space. Then the following Sobolev embedding was introduced in [[7], Lemma 5]. ###### Lemma 2.1. Let $G=(V,E)$ be a finite graph. The Sobolev space $W^{1,2}(V)$ is pre- compact. Namely, if $\\{u_{j}\\}$ is bounded in $W^{1,2}(V)$, then there exists some $u\in W^{1,2}(V)$ such that up to a subsequence, $u_{j}\to u$ in $W^{1,2}(V)$. Let $(X,\|\cdot\|)$ be a Banach space, $J:X\to\mathbb{R}$ be a functional. In order to prove the existence of the solutions of the equation (1.1), we first need the following Palais-Smale condition. ###### Definition 2.1. A functional $J\in C^{1}(X,\mathbb{R})$ satisfies the Palais-Smale condition if each sequence $\\{u_{k}\\}\subset X$ such that $\displaystyle(1)\ J(u_{k})\to c\ \mbox{for some constant}\ c,\ as\ k\to+\infty,$ $\displaystyle(2)\ \|J^{\prime}(u_{k})\|\to 0\ \mbox{in}\ X,\ as\ k\to+\infty$ is precompact in $X$. With the help of the Palais-Smale condition, Ambrosetti and Rabinowitz established the following Mountain Pass theorem [1]. ###### Lemma 2.2. Let $(X,\|\cdot\|)$ be a Banach space, $J\in C^{1}(X,\mathbb{R})$, $e\in X$ and $r>0$ such that $\|e\|>r$ and $\displaystyle b:=\inf_{\|u\|=r}J(u)>J(0)\geq J(e).$ If $J$ satisfies the Palais-Smale condition with $c:=\inf_{\gamma\in\Gamma}\max_{t\in[0,1]}J(\gamma{(t)})$, where $\Gamma:=\\{\gamma\in C([0,1],X)|\ \gamma(0)=0,\gamma(1)=e\\},$ then $c$ is a critical value of $J$. Our first main result in this paper can be stated as follows. ###### Theorem 2.1. There is a critical value $\lambda_{c}$ depending on $G$ satisfying $\lambda_{c}\geq\frac{27\pi M}{|V|}$ (2.5) such that (i) If $\lambda\geq\lambda_{c}$, the equation (1.1) has a solution $u_{\lambda}$ on $G$, and if $\lambda<\lambda_{c}$, the equation (1.1) has no solution. (ii) If $\lambda\geq\lambda_{c}$, there exists a solution $\tilde{u}_{\lambda}$ of the equation (1.1) on $G$ satisfying $\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}$ when $\lambda_{1}>\lambda_{2}$. (iii) If $\lambda>\lambda_{c}$, the equation (1.1) admits at least two solutions on $G$. Let $u_{0}$ be a solution of the Poisson equation $\displaystyle\Delta u_{0}=-\frac{4\pi M}{|V|}+4\pi\sum_{j=1}^{M}\delta_{p_{j}}.$ (2.6) As is well known, the solution of (2.6) exists if the integral of the right hand side is equal to 0. Inserting $u=u_{0}+v$ into the equation (1.1) yields $\displaystyle\Delta v=-\lambda{e^{F(u_{0}+v)}[e^{F(u_{0}+v)}-1]^{2}}+\frac{4\pi M}{|V|}.$ (2.7) By Theorem 2.1, we investigate the existence result of the equation (1.1) and show that $\tilde{v}_{\lambda}(=\tilde{u}_{\lambda}-u_{0})$ is a local minimum of the functional related to the equation (2.7) when $\lambda>\lambda_{c}$. For the solution $\tilde{v}_{\lambda}$, we give a further result as follows. ###### Theorem 2.2. The solution $\tilde{v}_{\lambda}$ is a strict local minimum of the functional related to the equation (2.7) for almost everywhere $\lambda>\lambda_{c}$. ###### Remark 2.1. (i) In [13], Hou and Sun gave the same existence result of the equation (1.1) as $(i)$ in Theorem 2.1 by the method of the subsolutions and supersolutions for $\lambda>\lambda_{c}$ and further proved that the solution $\hat{u}_{\lambda}$ is increasing respect to $\lambda$. In this paper, we prove the existence result of (1.1) by another method, i.e. the variational method. Since our method is variational, we cannot get the monotonicity of the solution directly. This implies that the solution $\hat{u}_{\lambda}$ (obtained in [13]) may be different from the solution $u_{\lambda}$ of (1.1). (ii) Hou and Sun [13] established the existence result of (1.1) at $\lambda=\lambda_{c}$ by the integral estimation method. In our paper, we apply properties of the equation on the finite graph and the contradiction argument. (iii) We give not only the existence of the single solution, but also the existence of multiple solutions. To achieve this, we first put forward a new method to construct a solution $\tilde{u}_{\lambda}$ of the equation (1.1) which is monotonic with respect to $\lambda$. This implies that $\tilde{v}_{\lambda}$ is monotonic with respect to $\lambda$. Then we establish that $\tilde{v}_{\lambda}$ is a local minimum of the functional related to the equation (2.7) when $\lambda>\lambda_{c}$ by the monotonicity of $\tilde{v}_{\lambda}$. With the help of this result and the variational method, we show that the equation (1.1) admits at least two solutions on $G$ when $\lambda>\lambda_{c}$. ## 3 Existence of solutions for the Chern-Simons equations This section devotes to the proof of Theorem 2.1. We establish the existence result of the solutions to the equation (1.1) by the variation methods. To achieve this purpose, we first prove some basic lemmas. ###### Definition 3.1. We say that $\underline{u}$ is a sub-solution of (1.1) if $\Delta{\underline{u}}\geq-\lambda{e^{F(\underline{u})}[e^{F(\underline{u})}-1]^{2}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}$ (3.1) for any $x\in V$. ###### Lemma 3.1. If $\underline{u}$ is a sub-solution to (1.1), then $\underline{u}$ is non- positive on $V$. ###### Proof.. Let $\Omega_{1}=\\{x\in V|{\underline{u}}(x)>0\\},\quad\ \Omega_{2}=\\{x\in V|{\underline{u}}(x)\leq 0\\}.$ (3.2) If $\Omega_{1}$ is empty, then the conclusion holds. If $\Omega_{1}$ is non- empty, we first claim that $\Omega_{1}\neq V$. Suppose that the claim does not hold, then $\Delta{\underline{u}}\geq 4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\ \quad\mbox{in}\quad{\Omega}_{1}.$ (3.3) Summing the two sides of the above equation, one can obtain that the left hand side of (3.3) is equal to zero and the right side of (3.3) is equal to $4\pi M$. This leads to a contradiction. Since $\Delta{\underline{u}}\geq-\lambda{e^{F(\underline{u})}[e^{F(\underline{u})}-1]^{2}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\quad\mbox{in}\quad{\Omega}_{1},$ and from (1.2), one has $\Delta{\underline{u}}\geq 4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\geq 0\quad\mbox{in}\quad{\Omega}_{1}.$ Therefore, $\underline{u}$ is a sub-harmonic function in $\Omega_{1}$. Since $\Omega_{1}$ and $\Omega_{2}$ are non-empty, it follows from the maximum principle on graphs that $\max\limits_{{\Omega}_{1}}\underline{u}\leq 0.$ This implies that $\underline{u}(x)\leq 0\quad\mbox{in}\quad{\Omega}_{1},$ which contradicts with the definition of $\Omega_{1}$. Therefore, $\underline{u}$ is non-positive on $V$. ∎ ###### Remark 3.1. If $u$ is a solution to (1.1), then $u$ is non-positive on $V$. According to (1.1) and Remark 3.1, one can easily see that $\Delta u\geq-\frac{4}{27}\lambda+4\pi\sum_{j=1}^{M}\delta_{p_{j}}.$ (3.4) Summing the two sides of the above equation yields $\lambda\geq\frac{27\pi M}{|V|}.$ (3.5) This is a necessary condition for the existence of solutions to (1.1). In order to prove the existence of the solutions to the equation (1.1), with the aid of the decomposition $u=u_{0}+v$ and the equation (2.7), we only need to consider the existence result of the equation (2.7). ###### Lemma 3.2. If $\underline{v}$ is a subsolution of the equation (2.7), then there exists a solution $v^{*}$ of the equation (2.7). ###### Proof.. Define the functional $J:W^{1,2}(V)\to\mathbb{R}$ by $J(v)=\frac{1}{2}\int_{V}{|\nabla v|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v)}-1]^{4}+\frac{4\pi M}{|V|}\int_{V}v,$ (3.6) and let the functional $J$ among all functions $v$ belonging to the set $\displaystyle\mathcal{A}:=\\{v\in W^{1,2}(V)|v\geq\underline{v}\ a.e.\ \mbox{in}\ V\\},$ (3.7) Denote $\displaystyle J_{0}=\inf_{\mathcal{A}}J(v).$ Then there exists a sequence $\\{v_{n}\\}\subset\mathcal{A}$ such that $J(v_{n})\to J_{0}$. We claim that $\\{v_{n}\\}$ is bounded in $W^{1,2}(V)$. In fact, we only need to prove that $\\{v_{n}(x)\\}$ is bounded for any $x\in V$. Suppose not, then there exists a point $x^{k}\in V$ and a subsequence $\\{v_{n_{k}}\\}\subset\\{v_{n}\\}$ such that $\displaystyle v_{n_{k}}(x^{k})\rightarrow+\infty,\ \ \mbox{as}\ k\to+\infty.$ (3.8) It follows from (3.6) that $\displaystyle J(v_{n_{k}})$ $\displaystyle=$ $\displaystyle\frac{1}{2}\int_{V}{|\nabla v_{n_{k}}|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{n_{k}})}-1]^{4}+\frac{4\pi M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle\geq$ $\displaystyle\frac{4\pi M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle=$ $\displaystyle\frac{4\pi M}{|V|}\int_{V\backslash\\{x^{k}\\}}v_{n_{k}}+\frac{4\pi M}{|V|}\mu(x^{k})v_{n_{k}}(x^{k})\rightarrow+\infty,\ \ \mbox{as}\ k\to+\infty.$ This is impossible. Thus, $\\{v_{n}(x)\\}$ is bounded for any $x\in V$, and therefore $\\{v_{n}\\}$ is bounded in $W^{1,2}(V)$. Applying the Sobolev embedding theorem(Lemma 2.1), there exists a subsequence $\\{v_{n_{l}}\\}\subset\\{v_{n}\\}$ and $v^{*}\in W^{1,2}(V)$ such that $v_{n_{l}}\to v^{*}$ as $l\to+\infty$. One can easily see that $v^{*}\in\mathcal{A}$. Hence, one has $\displaystyle J_{0}=J(v^{*}).$ In the following, we prove that $v^{*}$ is a critical point for $J$ in $W^{1,2}(V)$. For any $\psi\in W^{1,2}(V)$, $\tau>0$, let $\displaystyle v^{\tau}=v^{*}+\tau\psi+{\psi}^{\tau},$ (3.10) with ${\psi}^{\tau}=\\{v^{*}+\tau\psi-\underline{v}\\}_{-}\geq 0\ \ a.e.\ \mbox{in}\ V$. Then, one has $\displaystyle v^{\tau}\geq\underline{v}\ \ \ \ a.e.\ \mbox{in}\ V.$ (3.11) This implies that $v^{\tau}\in\mathcal{A}$. Hence, we have $\displaystyle 0$ $\displaystyle\leq$ $\displaystyle\frac{J(v^{\tau})-J(v^{*})}{\tau}$ $\displaystyle=$ $\displaystyle\frac{1}{2\tau}\int_{V}({|\nabla v^{\tau}|}^{2}-|\nabla v^{*}|^{2})+\frac{\lambda}{4\tau}\int_{V}\\{[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}\\}+\frac{4\pi M}{|V|\tau}\int_{V}(v^{\tau}-v^{*})$ $\displaystyle=$ $\displaystyle\frac{1}{\tau}\int_{V}(\nabla v^{*}\cdot\nabla(\tau\psi+{\psi}^{\tau}))+\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi$ $\displaystyle\ \ +\frac{\lambda}{4\tau}\int_{V}\left[\\{[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}\\}+4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi\right]$ $\displaystyle\ \ \ +\frac{4\pi M}{|V|}\int_{V}\psi+\frac{4\pi M}{|V|\tau}\int_{V}{\psi}^{\tau}.$ Thus, $\displaystyle\int_{V}\nabla v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi M}{|V|}\int_{V}\psi$ $\displaystyle\geq$ $\displaystyle-\frac{1}{\tau}\int_{V}\nabla v^{*}\cdot\nabla{\psi}^{\tau}-\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}-\frac{\lambda}{4\tau}\int_{V}[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}$ $\displaystyle\ \ +4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+4{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}$ $\displaystyle\ \ +\frac{\lambda}{\tau}\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}-\frac{4\pi M}{|V|\tau}\int_{V}{\psi}^{\tau}.$ By Taylor expansion, one has $\displaystyle\\!\\!\\!\\!\\!\\!\\!\\!\\!-\frac{\lambda}{4\tau}\int_{V}[e^{F(u_{0}+v^{\tau})}-1]^{4}-[e^{F(u_{0}+v^{*})}-1]^{4}+4\tau{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi$ (3.12) $\displaystyle\ \ \ \ \ +4{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}{\psi}^{\tau}=O(\tau).$ It follows from the fact that $\frac{1}{2\tau}\int_{V}{|\nabla(\tau\psi+{\psi}^{\tau})|}^{2}=O(\tau)$ and (3.12) that $\displaystyle\int_{V}\nabla v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi M}{|V|}\int_{V}\psi$ $\displaystyle\geq O(\tau)-\frac{1}{\tau}\int_{V}(\nabla v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}-\frac{1}{\tau}\int_{V}\nabla\underline{v}\cdot\nabla{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}{\psi}^{\tau}$ $\displaystyle\ \ \ \ \ \ \ \ \ \ -\frac{4\pi M}{|V|\tau}\int_{V}{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau}$ $\displaystyle\geq O(\tau)-\frac{1}{\tau}\int_{V}(\nabla v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}+\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau},$ $\displaystyle:=O(\tau)+I_{1}+I_{2},$ where the last inequality follows by the fact that $\underline{v}$ is the subsolution of the equation (1.1). Denote $\displaystyle V_{0}=\\{x\in V|v^{*}(x)=\underline{v}(x)\\}\ \ \ \mbox{and}\ \ \ V_{1}=\\{x\in V|v^{*}(x)>\underline{v}(x)\\}.$ One can see that ${\psi}^{\tau}(x)=0$ for sufficiently small $\tau$ when $x\in V_{1}$. Thus, one has $\displaystyle I_{1}$ $\displaystyle=$ $\displaystyle-\frac{1}{\tau}\int_{V}(\nabla v^{*}-\nabla\underline{v})\cdot\nabla{\psi}^{\tau}$ $\displaystyle=$ $\displaystyle-\frac{1}{\tau}\sum_{x\in V}\sum_{y\sim{x}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$ $\displaystyle=$ $\displaystyle-\frac{1}{\tau}\sum_{x\in V_{0}}\left\\{[\sum_{y\sim{x},y\in V_{0}}+\sum_{y\sim{x},y\in V_{1}}]\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))\right\\}$ $\displaystyle\ \ \ \ -\frac{1}{\tau}\sum_{x\in V_{1}}\left\\{[\sum_{y\sim{x},y\in V_{0}}+\sum_{y\sim{x},y\in V_{1}}]\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))\right\\}$ $\displaystyle=$ $\displaystyle-\frac{1}{\tau}\sum_{x\in V_{0}}\sum_{y\sim{x},y\in V_{1}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$ $\displaystyle\ \ \ \ -\frac{1}{\tau}\sum_{x\in V_{1}}\sum_{y\sim{x},y\in V_{0}}\omega_{xy}{[(v^{*}-\underline{v})(y)-(v^{*}-\underline{v})(x)]}({\psi}^{\tau}(y)-{\psi}^{\tau}(x))$ $\displaystyle\geq$ $\displaystyle 0$ for sufficiently small $\tau$. Similarly, one can obtain that $\displaystyle I_{2}=\frac{\lambda}{\tau}\int_{V}\left\\{{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}-{e^{F(u_{0}+\underline{v})}[e^{F(u_{0}+\underline{v})}-1]^{2}}\right\\}{\psi}^{\tau}=0.$ (3.14) Therefore, $\displaystyle\int_{V}\nabla v^{*}\cdot\nabla\psi-\lambda\int_{V}{e^{F(u_{0}+v^{*})}[e^{F(u_{0}+v^{*})}-1]^{2}}\psi+\frac{4\pi M}{|V|}\int_{V}\psi\geq 0\ \ \mbox{as}\ \tau\to 0^{+}.$ (3.15) This implies that $<J^{\prime}(v^{*}),\psi>\ \geq 0$ for any $\psi\in W^{1,2}(V)$. Replacing $\psi$ with $-\psi$ we obtain the reverse inequality, i.e. $<J^{\prime}(v^{*}),\psi>\ \leq 0$. Hence, we obtain that $v^{*}$ is a critical point for $J$ in $W^{1,2}(V)$. ∎ ###### Lemma 3.3. If $\lambda>0$ is sufficiently large, then (1.1) has a solution on $G$. ###### Proof.. Choose ${\underline{u}}=-c$ to be a constant function. Then $\Delta\underline{u}=0.$ (3.16) If $\lambda$ is sufficient large, one has ${-\lambda}{{e^{F(\underline{u})}}{[{e^{F(\underline{u})}}-1]^{2}}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}\leq 0.$ (3.17) Therefore, $\Delta\underline{u}\geq{-\lambda}{{e^{F(\underline{u})}}{[{e^{F(\underline{u})}}-1]^{2}}}+4\pi\sum_{j=1}^{M}{\delta_{p_{j}}}.$ (3.18) This implies that $\underline{u}$ is a subsolution of (1.1). It follows from Lemma 3.2 that the equation (1.1) has a solution on $G$ for $\lambda$ sufficiently large. This completes the proof of the lemma. ∎ ###### Lemma 3.4. There is a critical value $\lambda_{c}$ depending on $G$ satisfying $\lambda_{c}\geq\frac{27\pi M}{|V|}$ (3.19) such that when $\lambda>\lambda_{c}$, the equation (1.1) has a solution $u_{\lambda}$. ###### Proof.. Denote $\Lambda=\\{\lambda>0|\lambda\ \mbox{is such that (\ref{one}) has a solution}\\}.$ (3.20) We show that $\Lambda$ is an interval. If $\hat{\lambda}\in\Lambda$, denote by $\hat{u}=u_{0}+\hat{v}$ a solution of (1.1) at $\lambda=\hat{\lambda}$, where $\hat{v}$ is the corresponding solution of the equation (2.7). If $\lambda\geq\hat{\lambda},$ one has $\displaystyle\Delta{\hat{v}}$ $\displaystyle={-\hat{\lambda}}{e^{F({u_{0}+\hat{v}})}}{[{e^{F({u_{0}+\hat{v}})}}-1]^{2}}+\frac{4\pi M}{|V|}$ (3.21) $\displaystyle\geq{-\lambda}{e^{F({u_{0}+\hat{v}})}}{[{e^{F({u_{0}+\hat{v}})}}-1]^{2}}+\frac{4\pi M}{|V|}.$ This implies that ${\hat{v}}$ is a subsolution of the equation (2.7) on $G$ for any $\lambda\geq\hat{\lambda}$. Then by Lemma 3.2, one can obtain the existence of the solutions $v_{\lambda}$ to the equation (2.7) for any $\lambda\geq\hat{\lambda}$. Thus, the equation (1.1) has a solution for any $\lambda\geq\hat{\lambda}$. It implies that $[\hat{\lambda},+\infty)\subset\Lambda.$ Set ${\lambda}_{c}=\mbox{inf}\\{\lambda|\lambda\in\Lambda\\}.$ (3.22) It follows from (3.5) that $\lambda\geq\frac{27\pi M}{|V|}\ \ \mbox{for any }\lambda>\lambda_{c}.$ Taking the limit, one can arrive at ${\lambda}_{c}\geq\frac{27\pi M}{|V|}.$ ∎ In the following, we show that the existence of the solutions to the equation (1.1) on $G$ if $\lambda=\lambda_{c}.$ ###### Lemma 3.5. If $\lambda=\lambda_{c}$, then (1.1) has a solution $u_{\lambda}$. ###### Proof.. Choose a sequence ${\lambda}_{n}\to{\lambda}_{c}$ as $n\to+\infty$. After passing to a subsequence of $\\{\lambda_{n}\\}$, we may assume that $u_{\lambda_{n}}(x)$ converges to a limit point in $[-\infty,0]$ for any $x\in V$, and we denote this limit by $u(x)$. We prove that $u(x)\in(-\infty,0]$ for any $x\in V$. Suppose not. Then we have two cases: _Case (i)_. $\displaystyle{\lim_{n\to\infty}}{u_{\lambda_{n}}}(x)=-\infty\ \mbox{ for any }x\in V.$ (3.23) _Case (ii)_. There exists $x\in V$ such that ${\lim_{n\to\infty}}{u_{\lambda_{n}}}(x)$ exists in $(-\infty,0]$. If _Case (i)_ holds, when ${\lambda_{n}\to\lambda_{c}}$, summing the two sides of (1.1) yields that the left hand side of (1.1) approaches $0$ and the right hand side remains at least $2\pi$. This leads to a contradiction. If _Case (ii)_ holds, we split $V$ into two subsets $V_{1}$ and $V_{2}$, where $\displaystyle V_{1}$ $\displaystyle=\left\\{x\in V\Big{|}\lim_{n\to\infty}{u_{\lambda_{n}}}(x)=-\infty\right\\}$ $\displaystyle V_{2}$ $\displaystyle=\left\\{x\in V\Big{|}\lim_{n\to\infty}{u_{\lambda_{n}}}(x)\ \mbox{exists in }(-\infty,0]\right\\}.$ (3.24) If $V_{1}$ is empty, then Lemma 3.5 holds. In the following, we consider that both $V_{1}$ and $V_{2}$ are non-empty sets. Since $G$ is a connected finite graph, one may choose $x_{2}\in V_{2}$ such that there exists $x_{1}\in V_{1}$ satisfying $x_{1}\sim x_{2}$. Then $\displaystyle\Delta{u_{\lambda_{n}}}(x_{2})$ $\displaystyle=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$ (3.25) $\displaystyle=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in V_{1}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]+\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in V_{2}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$ $\displaystyle:=I_{1}+I_{2}.$ Now we calculate $I_{1}$ and $I_{2}$ respectively. It follows from (3) that $I_{1}=\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in V_{1}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]\to-\infty\ \ \mbox{as}\ n\to\infty.$ (3.26) For $I_{2}$, since $x_{2},y\in V_{2}$, the limit of ${u_{\lambda_{n}}}$ as ${\lambda_{n}}$ tends to $\lambda_{c}$ exists. One can obtain that $\frac{1}{\mu(x_{2})}\sum_{y\sim{x_{2}},y\in V_{2}}\omega_{y{x_{2}}}[{u_{\lambda_{n}}}(y)-{u_{\lambda_{n}}}(x_{2})]$ (3.27) is bounded. Taking the limit ${\lambda_{n}}\to\lambda_{c}$, one has $\Delta{u_{\lambda_{n}}}(x_{2})\to-\infty.$ (3.28) However, it follows from (1.1) that $\Delta{u_{\lambda_{n}}}(x_{2})$ is finite, which is a contradiction with (3.28). This completes the proof of the lemma. ∎ Combining Lemma 3.4 and Lemma 3.5, one can obtain that the equation (1.1) has a solution $u_{\lambda}$ on $G$ when $\lambda\geq\lambda_{c}$. Hence, the statement (i) of Theorem 2.1 is proved. In the following, with the aid of Lemma 3.2, we prove that there exists a solution $\tilde{u}_{\lambda}$ to the equation (1.1) satisfying $\tilde{u}_{\lambda}$ is increasing with respect to $\lambda$. ###### Lemma 3.6. There is a critical value $\lambda_{c}$ depending on $G$ satisfying $\lambda_{c}\geq\frac{27\pi M}{|V|}$ such that equation (1.1) has a solution $\tilde{u}_{\lambda}$ on $G$ for any $\lambda\geq\lambda_{c}$, and $\displaystyle\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}\ \ \mbox{when}\ \lambda_{1}>\lambda_{2}.$ (3.29) ###### Proof.. Equation (1.1) has a solution $u_{\lambda}$ on $G$ when $\lambda\geq\lambda_{c}$, and we denote the set of solvability parameters by $\tilde{\Lambda}:=[{\lambda}_{c},+\infty)$. We fix a solution of equation (1.1) with parameter $\lambda=\lambda_{c}$, and denote it by $u_{\lambda_{c}}$. For any fixed $m\in\mathbb{N}$, let $\displaystyle\tilde{\Lambda}=\bigcup_{k=0}^{\infty}\tilde{\Lambda}_{km},$ where $\displaystyle\tilde{\Lambda}_{km}:=[{\lambda}_{c}+\frac{k}{2^{m}},{\lambda}_{c}+\frac{k+1}{2^{m}}]\ \ (k\in\mathbb{N}).$ Note that for any $\lambda>\lambda_{c}$, $u_{\lambda_{c}}$ is a subsolution of the equation (1.1) with parameter $\lambda$. It then follows from the argument of Lemma 3.2 that for any $\lambda\in({\lambda}_{c},{\lambda}_{c}+\frac{1}{2^{m}}]$, there exists a solution $u_{\lambda,m}$ of (1.1) such that $\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}},\ \ \ \lambda\in\tilde{\Lambda}_{0m}.$ Now consider the solution $u_{{\lambda}_{c}+\frac{1}{2^{m}},m}$. Similarly, since $u_{{\lambda}_{c}+\frac{1}{2^{m}},m}$ is a subsolution of equation (1.1) with parameter $\lambda>\lambda_{c}+\frac{1}{2^{m}}$, by the argument of Lemma 3.2, one can find a solution $u_{\lambda,m}$ of the equation (1.1) for any $\lambda\in({\lambda}_{c}+\frac{1}{2^{m}},{\lambda}_{c}+\frac{2}{2^{m}}]$ such that $\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}+\frac{1}{2^{m}},m},\ \ \ \lambda\in\tilde{\Lambda}_{1m}.$ Repeating the process above yields that for any $\lambda\in[{\lambda}_{c},+\infty)$, there exists a solution $u_{\lambda,m}$ of equation (1.1) with parameter $\lambda$, and if $\lambda\in\tilde{\Lambda}_{km}$ for some $k\in\\{0,1,2,...\\}$, then $\displaystyle u_{\lambda,m}\geq u_{{\lambda}_{c}+\frac{k}{2^{m}},m}.$ Here, for convenience, we let $u_{\lambda_{c},m}=u_{\lambda_{c}}$. Then we have constructed an increasing sequence $\displaystyle u_{\lambda_{c},m}\leq u_{\lambda_{c}+\frac{1}{2^{m}},m}\leq u_{\lambda_{c}+\frac{2}{2^{m}},m}\leq\cdots$ (3.30) for any $m\in\mathbb{N}$. Now define $\displaystyle Q:=\left\\{{\lambda}_{c}+\frac{j}{2^{m}}\Big{|}m\in\mathbb{N},\ j\in\mathbb{N}\ \mbox{odd}\right\\}.$ (3.31) We rearrange the elements in the countable set $Q$ and list them as $Q=\\{q_{l}:l\in\mathbb{N}\\}$. For any $q_{l}\in Q$, we have constructed a sequence of solutions $\\{u_{q_{l},m}\\}_{m\in\mathbb{N}}$ of equation (1.1) with parameter $\lambda=q_{l}$. Since the functions $u_{q_{l},m}$ $(l,m\in\mathbb{N})$ are defined on the finite connected graph $G=(V,E)$ and $\displaystyle u_{\lambda_{c}}\leq u_{q_{l},m}\leq 0\ \ (\forall l,m\in\mathbb{N})$ there exists a subsequence $\\{n_{i}\\}\subset\mathbb{N}$ such that, for any $q_{l}\in Q$, $\\{u_{q_{l},n_{i}}\\}$ converges as $i\to\infty$. Define $\displaystyle u_{q_{l}}:=\lim_{i\to\infty}u_{q_{l},n_{i}},$ and let $\displaystyle U=\\{u_{q_{l}}|q_{l}\in Q\\}.$ (3.32) It follows from (3.30) that if $q_{l_{1}},q_{l_{2}}\in Q$, $q_{l_{1}}<q_{l_{2}}$ and $i$ is sufficiently large, then $\displaystyle u_{q_{l_{1}},n_{i}}\leq u_{q_{l_{2}},n_{i}}$ and hence by taking limits as $i\to\infty$ we have $\displaystyle u_{q_{l_{1}}}\leq u_{q_{l_{2}}}\ \ (q_{l_{1}}<q_{l_{2}}).$ (3.33) This implies that $\\{u_{\lambda}:\lambda\in Q\\}$ is an increasing sequence with respect to the parameter $\lambda\in Q$. Now for any $\lambda\geq\lambda_{c}$, there exists an increasing sequence $\\{q_{l}\\}\subset Q$ such that $q_{l}\to\lambda$. The increasing sequence $\\{u_{q_{l}}\\}$ then has a limit and we define $\displaystyle\tilde{u}_{\lambda}:=\lim_{l\to\infty}u_{q_{l}}.$ (3.34) Then $\tilde{u}_{\lambda}$ is a solution of equation (1.1) for the parameter $\lambda\in\tilde{\Lambda}$. Let $\displaystyle\bar{U}=\\{\tilde{u}_{\lambda}|\lambda\in[{\lambda}_{c},+\infty)\\}.$ (3.35) It follows from (3.33) and (3.34) that if $\lambda_{1}>\lambda_{2}$, then $\displaystyle\tilde{u}_{\lambda_{1}}\geq\tilde{u}_{\lambda_{2}}.$ (3.36) Hence, $\tilde{u}_{\lambda}$ is increasing with respect to $\lambda\in[\lambda_{c},\infty)$. This completes the proof of the lemma. ∎ By Lemma 3.6, the statement (ii) of Theorem 2.1 is proved. From Lemma 3.6 and the maximum principle, we can obtain that $\tilde{u}_{\lambda}>\tilde{u}_{{\lambda}_{c}}$ when $\lambda>\lambda_{c}$. Thus, $\tilde{v}_{\lambda}(=\tilde{u}_{\lambda}-u_{0})$ is the local minimum point of the functional $J$ for any $\lambda>\lambda_{c}$. If $v_{\lambda}$ obtained by Lemma 3.4 is different from $\tilde{v}_{\lambda}$. Then we have already found a second solution. If $v_{\lambda}$ is equal to $\tilde{v}_{\lambda}$ as the local minimum of the functional $J$, there exists ${\rho}_{\lambda}$ such that $\displaystyle J(v_{\lambda})\leq J(v)\ \ \mbox{for any}\ \ \|v-v_{\lambda}\|\leq{\rho}_{\lambda}.$ (3.37) Then we have the following two cases. Case (i). For any $\rho\in(0,{\rho}_{\lambda})$, one has $\displaystyle\inf_{\|v-v_{\lambda}\|=\rho}J=J(v_{\lambda})(:={\eta}_{\lambda}).$ (3.38) Thus, there is a local minimum $v_{\rho}$ of $J$ satisfying $\|v_{\rho}-v_{\lambda}\|=\rho$ and $J(v_{\lambda})={\eta}_{\lambda}$ for any $\rho\in(0,{\rho}_{\lambda})$. Therefore, one can obtain a one-parameter family of solutions to the equation (1.1). Case (ii). There exists $r_{\lambda}\in(0,{\rho}_{\lambda})$ such that $J(v_{\lambda})<\inf_{\|w-v_{\lambda}\|=r_{\lambda}}J(w).$ (3.39) In the following, we prove that there is a second solution of (1.1) on $G$ for $\lambda>\lambda_{c}$ by Mountain Pass theorem. We first show that $J(v)$ satisfies the Palais-Smale condition in order to apply Mountain Pass theorem for the functional $J$. ###### Lemma 3.7. Every sequence $\\{v_{n}\\}\subset W^{1,2}(V)$ admits a convergent subsequence if $\\{v_{n}\\}\subset W^{1,2}(V)$ satisfies $\displaystyle(1)\ J(v_{n})\to c\ \mbox{for some constant}\ c,\ as\ n\to+\infty,$ (3.40) $\displaystyle(2)\ \|J^{\prime}(v_{n})\|\to 0\ \mbox{in}\ W^{1,2}(V),\ as\ n\to+\infty.$ (3.41) ###### Proof.. It follows from (3.41) that $|\int_{V}\nabla{v_{n}}\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+v_{n})}[e^{F(u_{0}+v_{n})}-1]^{2}\varphi+\frac{4\pi M}{|V|}\int_{V}\varphi|\leq\varepsilon_{n}\|\varphi\|,$ (3.42) where $\varphi\in W^{1,2}(V)$ and $\varepsilon_{n}\to 0$ as $n\to+\infty$. By taking $\varphi=-1$, one has $0<c\leq\int_{V}e^{F(u_{0}+v_{n})}[e^{F(u_{0}+v_{n})}-1]^{2}\leq C,$ (3.43) where $c$ and $C$ are constants depending only on $\lambda$. We claim that $\\{v_{n}(x)\\}$ is bounded for any $x\in V$. Suppose that the claim is not true, there exists a point $x^{k}\in V$ and a subsequence $\\{v_{n_{k}}(x^{k})\\}\subset\\{v_{n}\\}$ tends to $+\infty$ or $-\infty$ as $k\to+\infty$. Without loss of generality, we assume that $\\{v_{n_{k}}(x^{k})\\}$ tends to $+\infty$ as $k\to+\infty$. In the following, for the subsequence $\\{v_{n_{k}}\\}$, we first show that there exists a point $\hat{x}\in V$ such that $\\{v_{n_{k}}(\hat{x})\\}$ is bounded. If not, one can obtain that $\\{v_{n_{k}}(y)\\}$ tends to $+\infty$ or $-\infty$ for any point $y\in V$ as $k\to+\infty$. Therefore, one can derive that $\int_{V}e^{F((u_{0}+v_{n_{k}})(y))}[e^{F({(u_{0}+v_{n_{k}})(y)})}-1]^{2}\rightarrow 0,\ \ \mbox{as}\ k\rightarrow+\infty,$ (3.44) which contradicts with (3.43). Let $L_{k}:=\max\limits_{V}|v_{n_{k}}(x)|=v_{n_{k}}(x^{k}).$ (3.45) From (3.40), one has $\displaystyle J(v_{n_{k}})$ $\displaystyle=\frac{1}{2}\int_{V}{|\nabla v_{n_{k}}|}^{2}+\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{n_{k}})}-1]^{4}+\frac{4\pi M}{|V|}\int_{V}v_{n_{k}}$ $\displaystyle=c+o_{n}(1).$ (3.46) Combining (2.4) and (3) yields that $c\geq\frac{1}{2}\sum_{x\in V}\sum_{y\sim{x}}\omega_{xy}{[v_{n_{k}}(y)-v_{n_{k}}(x)]}^{2}-4\pi ML_{k}.$ (3.47) It implies that $|v_{n_{k}}(x)-v_{n_{k}}(y)|\leq C\sqrt{c+4\pi ML_{k}},\ x\sim y\ ,\mbox{for any }x,\ y\in V,$ (3.48) where $C$ is a constant. Since the graph $G$ is finite and connected, there is a path $\\{x_{i}\\}_{i=0}^{l}\subset G$ between $\hat{x}$ and $x^{k}$ for $l\in\mathbb{N}$, that is $\displaystyle\hat{x}=x_{0}\sim x_{1}\sim x_{2}\sim\cdots\sim x_{l}=x^{k}.$ (3.49) Combining (3.48) and (3.49), one can obtain that $\displaystyle v_{n_{k}}(\hat{x})$ $\displaystyle\geq v_{n_{k}}(x^{k})-(l-1)C\sqrt{c+4\pi ML_{k}}$ $\displaystyle=L_{k}-(l-1)C\sqrt{c+4\pi ML_{k}}$ $\displaystyle\to+\infty,\ \ \mbox{as}\ k\rightarrow+\infty.$ (3.50) This is a contradiction with the conclusion that $\\{v_{n_{k}}(\hat{x})\\}$ is bounded. Therefore, $\\{v_{n}(x)\\}$ is bounded for any $x\in V$. This implies that $\\{v_{n}(x)\\}$ is bounded in $W^{1,2}(V)$. Applying Sobolev embedding theorem(Lemma 2.1), there exists a subsequence ${v_{n_{k}}(x)}$ converges to some function $v(x)$ in $W^{1,2}(V)$. Hence, the Palais-Smale condition holds. ∎ For $Q>0$, one has $\displaystyle J(v_{\lambda}-Q)-J(v_{\lambda})$ $\displaystyle=$ $\displaystyle\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{\lambda}-Q)}-1]^{4}-\frac{\lambda}{4}\int_{V}[e^{F(u_{0}+v_{\lambda})}-1]^{4}-4\pi MQ$ $\displaystyle\to$ $\displaystyle-\infty,\ \ \mbox{as}\ Q\to+\infty.$ Thus, one has $\displaystyle J(v_{\lambda}-Q_{0})<J(v_{\lambda})\ \ \mbox{for some}\ Q_{0}>r_{\lambda}>0\ \mbox{sufficiently large}.$ (3.51) Let $\displaystyle\Gamma:=\\{\gamma\in C([0,1],W^{1,2}(V))|\gamma{(0)}=v_{\lambda},\ \gamma{(1)}=v_{\lambda}-Q_{0}\\},$ and set $\displaystyle c=\inf_{\gamma\in\Gamma}\max_{0\leq t\leq 1}J(\gamma(t)).$ It follows from (3.39) that $c>J(v_{\lambda})$. From Lemma 3.7, applying Mountain Pass theorem(Lemma 2.2), we conclude that $c$ defines a critical value of $J$. Since $c>J(v_{\lambda})$, the corresponding critical point yields to a second solution for (2.7). Therefore, there exists a second solution to the equation (1.1). Hence, the statement (iii) of Theorem 2.1 is proved. This completes the proof of Theorem 2.1. ## 4 The Proof of Theorem 2.2 In this section, we prove Theorem 2.2. From the analysis in Section 3, we know that $\tilde{v}_{\lambda}$ is a local minimum of the functional $J(v)$ for $\lambda>\lambda_{c}$. In the following, we show that $\tilde{v}_{\lambda}$ is a strict local minimum of the functional $J$ for almost everywhere $\lambda>\lambda_{c}$. ###### Proof.. It follows from Lemma 3.6 that $\tilde{v}_{\lambda}$ is increasing with respect to $\lambda$ for $\lambda>\lambda_{c}$. This guaranties that $\bar{v}_{\lambda}:=\frac{d\tilde{v}_{\lambda}}{d\lambda}$ (4.1) is well-defined for almost everywhere $\lambda>\lambda_{c}$, and therefore $\bar{v}_{\lambda}\geq 0\ a.e.$ in $V$. Taking the derivative of both sides of the equation (2.7) with respect to $\lambda$ yields that $\Delta\bar{v}_{\lambda}=-e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}-\lambda e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]\cdot\bar{v}_{\lambda}.$ (4.2) From the fact that $\tilde{v}_{\lambda}$ is the critical point of $J(v)$, one can derive that $0=<J^{\prime}(\tilde{v}_{\lambda}),\varphi>=\int_{V}\nabla\tilde{v}_{\lambda}\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}\varphi+\frac{4\pi M}{|V|}\int_{V}\varphi,$ (4.3) and $\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})\psi,\varphi>$ $\displaystyle=\int_{V}\nabla\psi\cdot\nabla\varphi-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]\varphi\psi$ (4.4) for any $\varphi,\psi\in W^{1,2}(V)$. From (4.4), one can see that $J^{\prime\prime}(\tilde{v}_{\lambda})h=-\Delta h-\lambda e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h\ \ \mbox{for any }h\in W^{1,2}(V).$ (4.5) Then $<J^{\prime\prime}(\tilde{v}_{\lambda})h,g>=<J^{\prime\prime}(\tilde{v}_{\lambda})g,h>\ \mbox{for any }h,g\in W^{1,2}(V).$ This implies that $J^{\prime\prime}(\tilde{v}_{\lambda})$ is a symmetric and linear operator from $W^{1,2}(V)$ to $W^{1,2}(V)$. Denote $\mu_{1},\mu_{2},\cdots,\mu_{|V|}$ be the eigenvalues of $J^{\prime\prime}(\tilde{v}_{\lambda})$ satisfying $\mu_{1}\leq\mu_{2}\leq\cdots\leq\mu_{|V|}$ and ${\theta}_{1},\dots,{\theta}_{|V|}$ be the related eigenvectors of $J^{\prime\prime}(\tilde{v}_{\lambda})$, i.e. $J^{\prime\prime}(\tilde{v}_{\lambda}){\theta}_{i}=\mu_{i}{\theta}_{i},$ where $<{\theta}_{i},{\theta}_{j}>=\delta_{ij},$ for any $i,j=1,2,\cdots,|V|$. Then the eigenvalue $\mu_{1}=\inf_{h\in{W^{1,2}(V)}}\frac{<J^{\prime\prime}(\tilde{v}_{\lambda})h,h>}{<h,h>}.$ In the following, we prove that $\mu_{1}>0$. Noting that $\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})h,h>$ $\displaystyle=\int_{V}|\nabla h|^{2}-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h^{2}$ (4.6) $\displaystyle=\sum_{x\in V}\sum_{y\sim{x}}\omega_{xy}{[h(y)-h(x)]}^{2}-\lambda\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[1-3e^{F(u_{0}+\tilde{v}_{\lambda})}]h^{2}.$ Let $\tilde{h}=(|h_{1}|,|h_{2}|,\dots,|h_{|V|}|)$ for any $h=(h_{1},h_{2},\dots,h_{|V|})\in W^{1,2}(V)$, it follows from (4.6) that $<J^{\prime\prime}(\tilde{v}_{\lambda})\tilde{h},\tilde{h}>\ \leq\ <J^{\prime\prime}(\tilde{v}_{\lambda})h,h>.$ (4.7) Thus, one can obtain that all of the components of $\theta_{1}$ have the same sign. Without loss of generality, we assume that they are all non-negative, i.e. $\displaystyle\theta_{1,x_{i}}\geq 0,\ \ \mbox{for}\ \ 1\leq i\leq|V|,\ x_{i}\in V.$ (4.8) Taking $\psi=\bar{v}_{\lambda}$, it follows from (4.4) that $\displaystyle<J^{\prime\prime}(\tilde{v}_{\lambda})\bar{v}_{\lambda},\varphi>=\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}\varphi$ (4.9) for any $\varphi\in W^{1,2}(V)$. Let $\varphi={\theta}_{1}$, one has $<J^{\prime\prime}(u_{\lambda})\bar{v}_{\lambda},{\theta}_{1}>=\int_{V}e^{F(u_{0}+\tilde{v}_{\lambda})}[e^{F(u_{0}+\tilde{v}_{\lambda})}-1]^{2}{\theta_{1}}>0.$ (4.10) Since $\bar{v}_{\lambda}\in W^{1,2}(V)$, then $\bar{v}_{\lambda}$ can be represented by $\bar{v}_{\lambda}=\sum_{i=1}^{|V|}a_{i}{\theta_{i}},$ where $a_{i}=<\bar{v}_{\lambda},\theta_{i}>$, $1\leq i\leq|V|$. One can see that $a_{1}\geq 0$, and $0<\ <J^{\prime\prime}(\tilde{v}_{\lambda})\bar{v}_{\lambda},{\theta_{1}}>=a_{1}\mu_{1}.$ Thus, one has $\displaystyle\mu_{1}>0.$ (4.11) Therefore, $\tilde{v}_{\lambda}$ is the strictly minimum of $J(\tilde{v}_{\lambda})$ for almost everywhere $\lambda>\lambda_{c}$. This implies that for almost everywhere $\lambda$, there exists $r_{\lambda}$ such that $J(\tilde{v}_{\lambda})<\inf_{\|w-\tilde{v}_{\lambda}\|=r_{\lambda}}J(w).$ (4.12) This completes the proof of Theorem 2.2. ∎ ## 5 Acknowledgement The authors would like to thank Professor Genggeng Huang for his interest in this work and for many helpful discussions. ## References * [1] A. Ambrosetti, P. Rabinowitz, _Dual variational methods in critical point theory and applications_ , J. Funct. Anal. 14 (1973), 349-381. * [2] A. Bezryadina, E. Eugenieva, Z. Chen, _Self-trapping and flipping of double-charged vortices in opticall induced photonic lattices_ , Optim. Lett.31(2006), 2456-2458. * [3] X. Chen, S. Hastings, J .B .McLeod, Y .Yang, _A nonlinear elliptic equation arising from gauge field theory and cosmology_ , Proc. Roy. Soc. London Ser. A 446 (1994), no. 1928, 453-478. * [4] D. Chae, O. Y. Imanuvilov, _The existence of non-topological multivortex solutions in the relativistic self-dual Chern-Simons theory_ , Comm. Math. Phys. 215 (2000), no. 1, 119-142. * [5] D. Chae, O. Y. Imanuvilov, _Non-topological solutions in the generalized self-dual Chern-Simons-Higgs theory_ , Calc. Var. Partial Differential Equations 16 (2003), no. 1, 47-61. * [6] H. Chan, C. C. Fu, C. S. Lin, _Non-topological multi-vortex solutions to the self-dual Chern-Simons-Higgs equation_ , Comm. Math. Phys. 231 (2002), no. 2, 189-221. * [7] A. Grigor’yan, Y. Lin, Y. Yang, _Kazdan-Warner equation on graph_ , Calc. Var. Partial Differential Equations 55 (2016), no. 4, Art. 92, 13 pp. * [8] A. Grigor’yan, Y. Lin, Y. Yang, _Existence of positive solutions to some nonlinear equations on locally finite graphs_ , Sci. China Math. 60 (2017), no. 7, 1311-1324. * [9] H. Ge, _Kazdan-Warner equation on graph in the negative case_ , J. Math. Anal. Appl. 453 (2017), no. 2, 1022-1027. * [10] H. B. Ge, W. F. Jiang, _Kazdan-Warner equation on infinite graphs_ , J. Korean Math. Soc. 55 (2018), 1091-1101. * [11] X. Han, _Existence of doubly periodic vortices in a generalized Chern-Simons model_ , Nonlinear Anal. Real World Appl. 16 (2014), 90-102. * [12] J. Hong, Y. Kim, P. Y. Pac, _Multivortex solutions of the abelian Chern-Simons-Higgs theory_ , Phys. Rev. Lett. 64 (1990), no. 19, 2230-2233. * [13] S. Hou, J. Sun, _Existence of solutions to Chern-Simons-Higgs equations on graphs_ , preprint. * [14] A. Huang, Y. Lin, Yau. Shing-Tung, _Existence of solutions to mean field equations on graphs_ , Comm. Math. Phys. 377 (2020), no. 1, 613-621. * [15] A. Jaffe, C. H. Taubes, _Vortices and monopoles_ , Structure of static gauge theories. Progress in Physics, 2. Birkhäuser, Boston, Mass., 1980. * [16] J. Kazdan, F. W. Warner, _Curvature functions for compact 2-manifolds_ , Ann. of Math. (2) 99 (1974), 14-47. * [17] M. Keller, M. Schwarz, _The Kazdan-Warner equation on canonically compactifiable graphs_ , Calc. Var. Partial Differential Equations 57 (2018), no. 2, Paper No. 70, 18 pp. * [18] H. B. Nielsen, P. Olesen, _Vortex-line models for dual strings_ , Nucl. Phys. B61 (1973), 45-61. * [19] J. B. Sokoloff, Charged vortex excitations in quantum Hall systems, Phys. Rev. B 31(1985), 1924-1928. * [20] J. Spruck, Y. Yang, _Topological solutions in the self-dual Chern-Simons theory: existence and approximation_ , Ann. Inst. H. Poincaré Anal. Non Linéaire 12 (1995), no. 1, 75-97. * [21] J. Spruck, Y. Yang, _The existence of nontopological solitons in the self-dual Chern-Simons theory_ , Comm. Math. Phys. 149 (1992), no. 2, 361-376. * [22] G. Tarantello, _Multiple condensate solutions for the Chern-Simons-Higgs theory_ , J. Math. Phys. 37 (1996), no. 8, 3769-3796. * [23] D. H. Tchrakian, Y. Yang, _The existence of generalised self-dual Chern-Simons vortices_ , Lett. Math. Phys. 36 (1996), no. 4, 403-413. * [24] R. Wang, _The existence of Chern-Simons vortices_ , Comm. Math. Phys. 137 (1991), no. 3, 587-597. * [25] Y. Yang, _Chern-Simons solitons and a nonlinear elliptic equation_ , Helv. Phys. Acta 71 (1998), no. 5, 573-585.
arxiv-papers
2021-07-27T00:57:38
2024-09-04T03:07:20.232983
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yingshu L\\\"u and Peirong Zhong", "submitter": "Yingshu L\\\"u", "url": "https://arxiv.org/abs/2107.12535" }
2107.12536
# A Data-Driven Biophysical Computational Model of Parkinson’s Disease based on Marmoset Monkeys Caetano M. Ranieri Institute of Mathematical and Computer Sciences University of Sao Paulo Sao Carlos, SP, Brazil [email protected] &Jhielson M. Pimentel Edinburgh Centre for Robotics Heriot-Watt University Edinburgh, Scotland, UK [email protected] &Marcelo R. Romano School of Electrical and Computer Engineering University of Campinas Campinas, SP, Brazil [email protected] &Leonardo A. Elias School of Electrical and Computer Engineering University of Campinas Campinas, SP, Brazil [email protected] &Roseli A. F. Romero Institute of Mathematical and Computer Sciences University of Sao Paulo Sao Carlos, SP, Brazil [email protected] &Michael A. Lones Edinburgh Centre for Robotics Heriot-Watt University Edinburgh, Scotland, UK [email protected] &Mariana F. P. Araujo Health Sciences Centre Federal University of Espirito Santo Vitoria, ES, Brazil [email protected] &Patricia A. Vargas Edinburgh Centre for Robotics Heriot-Watt University Edinburgh, Scotland, UK [email protected] &Renan C. Moioli Digital Metropolis Institute Federal University of Rio Grande do Norte Natal, RN, Brazil [email protected] ###### Abstract In this work we propose a new biophysical computational model of brain regions relevant to Parkinson’s Disease (PD) based on local field potential data collected from the brain of marmoset monkeys. Parkinson’s disease is a neurodegenerative disorder, linked to the death of dopaminergic neurons at the substantia nigra pars compacta, which affects the normal dynamics of the basal ganglia-thalamus-cortex (BG-T-C) neuronal circuit of the brain. Although there are multiple mechanisms underlying the disease, a complete description of those mechanisms and molecular pathogenesis are still missing, and there is still no cure. To address this gap, computational models that resemble neurobiological aspects found in animal models have been proposed. In our model, we performed a data-driven approach in which a set of biologically constrained parameters is optimised using differential evolution. Evolved models successfully resembled single-neuron mean firing rates and spectral signatures of local field potentials from healthy and parkinsonian marmoset brain data. As far as we are concerned, this is the first computational model of Parkinson’s Disease based on simultaneous electrophysiological recordings from seven brain regions of Marmoset monkeys. Results show that the proposed model could facilitate the investigation of the mechanisms of PD and support the development of techniques that can indicate new therapies. It could also be applied to other computational neuroscience problems in which biological data could be used to fit multi-scale models of brain circuits. _K_ eywords basal ganglia $\cdot$ brain modelling $\cdot$ computational modelling $\cdot$ evolutionary computation $\cdot$ neural engineering $\cdot$ Parkinson’s Disease $\cdot$ 6-OHDA lesioned marmoset model ## 1 Introduction Parkinson’s disease (PD) affects more than 3% of people over 65 years old, with figures set to double in the next 15 years [71]. It is a neurodegenerative disease, whose symptoms include cognitive and motor deficits. In late stages, it can also lead to depression and dementia [93]. There is still no cure, and current therapies are only able to provide symptomatic relief. PD is characterised by a dopaminergic neuronal loss within the substantia nigra pars compacta (SNc), which leads to a dysfunction of the basal ganglia- thalamus-cortex (BG-T-C) circuit. The BG-T-C circuit is a neuronal network with parallel loops that are involved in motor control, cognition, and processing of rewards and emotions [64, 78]. There are also links between the degeneration of dopamine neurons within those brain regions and changes in electrophysiological behaviour [25]. Brain regions linked to PD present complex interactions, with mutual excitatory and inhibitory feedback loops, which limit a comprehensive understanding of the physiopathology of the disease. Studies aiming at investigating the mechanisms underlying PD often use animal models. In classic animal models of PD, symptoms are elicited by delivering neurotoxins that damage the SNc dopaminergic neurons, such as 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP) and 6-hydroxidopamine (6-OHDA), or chemicals that transiently inhibit dopamine production, such as alpha-methyl-p-tyrosine (AMPT) [41]. Antipsychotics like haloperidol are also used, but have side effects that may promote dystonia and parkinsonism [38]. To date, no animal model of PD fully reproduces human features of the disease. In addition, due to experimental limitations, animal data often include only a limited set of PD-related brain regions, with subjects engaged in different behavioural settings. In this context, computational models, with biologically informed constraints that can be selectively altered, are a promising, complementary approach to advance our knowledge about PD beyond that obtained from anatomical and physiological studies [36, 62]. Some PD-related anomalies observed in animal models, and efforts to reproduce those in computational models, are presented by Rubin et al. [83]. All mammals have a similar set of BG structures that are similarly connected with thalamic and cortical structures. Nevertheless, recent studies suggest subtle differences between species [47, 30, 105, 7], also in the neuropathophysiology of PD [41, 17], with primates (including marmosets) being more similar to humans than rodents. For example, there are differences in the distribution of dopaminergic neurons in the substantia nigra of rats and primates, and the subthalamic nucleus and internal globus pallidus of rats have less neurons containing parvalbumin than primates [30]. Thus, a primate computational model of PD is of paramount importance. In this work, we developed a new computational model of PD based on published data from the BG-T-C brain circuit of marmoset monkeys [16]. We built upon a neuronal computational model of rat models of PD, developed and made available by Kumaravelu et al. [43], and adjusted its parameters to match the electrophysiology data from the 6-OHDA+AMPT marmoset model of PD [88, 87]. It is important to highlight that, in our work, we are using the LFP signal data to tune and validate our model, not spikes or other biosignals, thus the whole optimisation framework relates to LFP-based metrics. The main contributions of this paper are: (i) the first computational model of PD validated on simultaneous, multi-site electrophysiological recordings (e.g., LFP recordings) from a marmoset monkey model of the disease and (ii) an optimisation framework that can easily include novel biophysical parameters as soon as they become available. This paper is organised as follows. In Section 2, models of the BG-T-C network and the anomalies caused by PD are discussed, with focus on computational modelling of the disease. In Section 3, the building blocks of the computational model are depicted, as well as the free parameters that were optimised, the algorithm to update those parameters, the experimental setup, and the evaluation protocol. In Section 4, the results are presented regarding the optimisation process, the parameters learnt by the machine learning algorithms, and the metrics observed on the simulations of the computational models provided, considering spectral densities from simulated LFP, dynamics of the firing rates from simulated neurons, and coherence analyses. In Section 5, a discussion is presented in order to contextualise our results and compare them with the expectations from the data from animal models, and knowledge from the literature. Section 6 concludes the paper. ## 2 Related Work A commonly used model to explain how PD affects the neural connections within the BG-T-C circuit, also known as the motor loop, is the so-called classic model, illustrated in Figure 1a. It consists of projections from primary motor (M1) and somatosensory cortical areas to BG input structures, specifically the putamen (PUT) and the subthalamic nucleus (STN). In PUT, the cortical projections establish excitatory glutamatergic synapses with medium spiny neurons (MSNs). The MSNs establish two distinct pathways to the BG output nuclei (globus pallidus pars interna – GPi and substantia nigra pars reticulata – SNr). The MSNs from the direct pathway (dMSN) directly project to the GPi/SNr, while the MSNs from the indirect pathway (iMSN) project to the globus pallidus pars externa (GPe), which in turn send projections to the GPi/SNr directly or indirectly via the STN (for reviews, see Obeso et al. [64], Lanciego et al. [45], and McGregor and Nelson [52]). The cortical projection to the STN establish a third pathway, often called the hyperdirect pathway [61]. Activation of the direct pathway facilitates movement by inhibiting the activity of GPi/SNr, thus reducing the inhibition of the ventral anterior nucleus (VA) and the ventral lateral nucleus (VL) and increasing the excitatory thalamic input to the motor cortex. Activation of the indirect and hyperdirect pathways, on the other hand, inhibit movement by increasing the inhibitory activity of the GPi/SNr over the VA/VL, hence decreasing the excitatory thalamic input to the motor cortex. The activity of the motor loop is modulated by dopaminergic projections from SNc to PUT. The main effect of dopamine (DA) release in PUT is movement facilitation, since DA increases the excitability of the dMSNs and decreases the excitability of the iMSNs. In PD, the depletion of striatal DA leads to an enhanced activation of the indirect pathway and a decreased activation of the direct pathway, resulting in the characteristic motor symptoms of this neural disorder [97]. In addition to changes in firing rates, the functional imbalance within the motor loop in PD also disrupts the firing patterns within each nucleus and amongst the structures of the BG-T-C circuit, increasing neuronal synchronisation, neuronal bursting, and enhancing the oscillatory activity at the beta frequency band [24]. Figure 1: Models of the basal ganglia-thalamus-cortex (BG-T-C) circuit, central to the underlying mechanisms of Parkinson’s Disease (PD), including excitatory (blue) and inhibitory (red) connections between the regions involved. (a) Classical model of BG-T-C circuit. The motor loop in the mammalian brain is formed by the motor cortex (M1), the thalamus (TH) — composed of structures such as the ventral anterior nucleus (VA), the ventral lateral nucleus (VL), and the ventral posterolateral nucleus (VPL) —, and the basal ganglia (BG), the latter composed of a subset of structures: the striatum, which itself includes the putamen (PUT) and the caudate nucleus, the globus pallidus, divided into pars interna (GPi) and pars externa (GPe), the subthalamic nucleus (STN), and the substantia nigra, divided into pars compacta (SNc) and pars reticulata (SNr). PD is caused by the loss of dopaminergic neurons in the SNc, which weakens the connections represented by dashed lines and leads to malfunctioning of both direct and indirect pathways. (b) BG-T-C network used in this work, based on [43]. The cortex is represented by regular spiking (CtxRS) excitatory neurons and fast spiking (CtxFSI) inhibitory interneurons. The direct and indirect pathways in the striatum were modelled separately, representing the medium spiny neurons (MSNs) modulation by D1 and D2 dopamine receptors, respectively. Bilateral 6-OHDA lesions in the marmoset medial forebrain bundle induce several PD motor symptoms, including impairments in fine motor skills, limb rigidity, bradykinesia, hypokinesia, and gait impairments. Alpha-methyl-p- tyrosine (AMPT) administration to 6-OHDA lesioned marmosets can transiently increase the severity of these symptoms. However, like MPTP macaques, these animals do not exhibit resting tremor. Santana et al. [87] provides an extensive characterisation of these symptoms, that were quantified through manual scoring (adapted version of the unified PD rating scale for marmosets), automated assessments of spontaneous motor activity in their home cages (using actimeters), and automated motion tracking while the animals explored two experimental apparatuses. Computational models are established tools to facilitate understanding of neural disorders [90, 86, 68] and, in the context of PD, accommodate several levels of description and range from focusing on disease mechanisms to understanding anomalous neuronal synchronisation [36]. For instance, Pavlides et al. [66] conducted a detailed study to help unveil the mechanisms underlying beta-band oscillations in PD and compared computational model predictions with experimental data. Muddapu et al. [58] studied loss of dopaminergic cells in the SNc due to neural dynamics between SNc and STN, shedding light on the relevance of ongoing neural activity and neural loss. Gurney et al. [27] described mounting evidence relating the BG-T-C network and action selection mechanisms; actually, computational models showed a close relationship between action selection and BG-T-C oscillatory activity [34, 33, 53]. Moren et al. [57] proposed a model of the spiking neurons within the BG-T-C circuit, in order to observe the asynchronous firing rates around the 15 Hz beta-range oscillations, as well as on lower frequency bands. Terman et al. [100] developed a conductance-based computational network model which shed light on the mechanisms underlying the neural dynamics of STN and GPe, a model which was further developed by Rubin et al. [82] to investigate the effects of deep brain stimulation (DBS) to eliminate anomalous synchronisation within the BG-T-C network in the PD condition. In fact, one of the key areas in which computational models serve as an invaluable tool for developing novel therapies is that related to predicting the effects of DBS [35, 49]. Other computational models of the BG-T-C network and its relashionship with PD are presented by Farokhniaee and Lowery [21], and Fleming et al. [22]. Particularly important for the developments of this work is the research by Kumaravelu et al. [43], which, based on a collection of previously published studies, developed a computational model of the BG-T-C network tuned for the 6-OHDA rat model of PD (Fig. 1b). Compared to other computational models [36], it was the first to specifically consider 6-OHDA and a single species. Most computational models related to BG-T-C dynamics rely on rodent data [34, 48, 40], with only a handful focusing on primate data [47, 102]. Research by Shouno et al. [92], for instance, provided a spiking neuron model of the recurrent STN-GPe circuit for studying dysfunctions in oscillations within the 8-15 Hz (alpha) frequency band for PD primate models. In this work, we present a computational model to resemble neurophysiological activity of healthy and PD marmoset monkeys, based on the model by Kumaravelu et al. [43], and in multisite, simultaneous LFP recordings from animal models. ## 3 Methods To provide a computational model of the BG-T-C circuit for PD-related features in primates, we began by re-writing the code by Kumaravelu et al. [43], originally implemented in Matlab. We have ported the original code to the Python programming language, with the NetPyNE framework and the libraries from the NEURON simulator [31, 19]. Then, we performed a series of adaptations and employed a data-driven approach to calibrate a set of parameters, in order to derive a model that resembles local field potentials from marmoset data [88, 87]. More specifically, we employed an optimisation technique called differential evolution (DE), an algorithm based on evolutionary computation [2, 14]. This approach consists of optimising a predefined set of parameters (i.e., genotype) by gradually adapting them through successive steps (i.e., generations), providing variability and selection of the best solutions (i.e., individuals) through mechanisms analogous to biological evolution. In the model by Kumaravelu et al. [43], neuronal connectivity and membrane initial conditions can be stochastic, and neuronal models include synaptic transmission delay. All currents (ionic, synaptic, leakage, and bias) are not subjected to noise. The model is general in the sense that it mimics the BG- T-C neural dynamics of rodents that are not engaged in any specific behavioural task. Thus, the dataset employed in our work was suitable to calibrate such a model, since it was collected from marmoset monkeys that were moving freely, without any event- or time-based stimulation. After having calibrated our marmoset model, different analyses were performed in order to enhance and validate it. The dataset used as ground truth for adjusting the parameters of the computational model is not publicly available due to legal restriction, but it is available from the corresponding author on reasonable request. The next subsections will provide a detailed description of the methods employed. The code to reproduce the results from this paper, including the machine learning framework and the analyses of the results, is publicly available at https://github.com/cmranieri/MarmosetModel. ### 3.1 Computational Model The computational model was based on Kumaravelu et al. [43]. Their model was build to reproduce the neurophysiological behaviour from rats based on data from healthy and 6-OHDA-lesioned individuals. As an initial step, we constructed an alternative implementation for their model within the NetPyNE framework, and we validated this implementation by comparing its outputs with those reported in [43]. Briefly, eight brain structures were modelled and connected based on a simplified version of the classic model (Figure 1b). In particular, the direct and indirect pathway in the striatum were modelled separately representing the MSN modulation by D1 and D2 dopamine receptors, respectively [52]. The cortex is represented by regular spiking (RS) excitatory neurons and fast spiking (FSI) inhibitory interneurons. Neurons from all but cortical regions were modelled using a biophysically based Hodgkin–Huxley [32] single-compartment model, whereas cortical neurons were constructed based on the computationally efficient Izhikevich’s model [37]. The reasoning for different neuronal models lies on the fact that PD effects are captured by altering specific conductances in selected structures (see below), thus a conductance-based model is more suitable at these locations. Finally, a bias current was added in the TH, GPe, and GPi, accounting for the inputs not explicitly modelled. Remarkably, even though no oscillatory inputs are present in the model, synaptic delays and network interactions by means of recurrent connections promote sustained firing rate oscillations. For a detailed description of connectivity schemes and other implementation details, the reader is referred to Kumaravelu et al. [43]. The computational model described above can shift from the simulations of the healthy to the PD condition by altering three conductances [43]: decreasing the maximal M-type potassium conductance in direct and indirect MSN neurons (MSN firing disfunction) from 2.6 to 1.5 $mS/cm^{2}$; decreasing the maximal corticostriatal synaptic conductance (reduced sensitivity of direct MSN to cortical inputs) from 0.07 to 0.026 $mS/cm^{2}$; and increasing the maximal GPe axonal collaterals synaptic conductance from 0.125 to 0.5 $mS/cm^{2}$ (increase of GPe neuronal firing). This is implemented in the model with a control flag. One major addition to the model developed here is the simulation of local field potentials (LFP). These measurements are related to the extracellular activity produced by action potentials of the neurons within a brain region [26]. A discussion on the dynamics of LFP signals within the basal ganglia and its consequences to humans, especially regarding conditions such as PD, was presented by Brown and Williams [9]. In our work, first, each simulated brain region is assigned to a spatial 3D coordinate that matches that used in the stereotaxic surgery where electrodes were placed in the real marmoset monkeys [67, 88]. Then, a simulated electrode is placed at the centre of each region. In our model, each neuron is represented as a single cylindrical compartment with a membrane area of 100 $\mu m^{2}$. For each electrode, NetPyNE estimates the simulated LFP by summing the extracellular potential contributed by each neuronal segment (based on the transmembrane current generated from the single cylindrical source neuron), calculated using the “line source approximation” method and assuming an Ohmic extracellular medium with conductivity $\sigma=0.30$ $mS/mm$ [65]. Thus, the electrical activity of neurons from each brain region contributes to the waveforms recorded at each electrode (subject to extracellular medium attenuation). ### 3.2 Dataset and preprocessing procedures The dataset we used in the present work is based on a previous study by Santana et al. [88]. Our dataset includes data from three adult males and one adult female common marmosets (i.e., Callithrix jacchus). Data from two males were part of the aforementioned study; data from one male and one female are novel and followed exactly the same experimental procedures. A short summary is presented in the next subsection, followed by the preprocessing steps. #### 3.2.1 Dataset The animals, weighing 300–550 g, were housed in a vivarium with natural light cycle (12/12 hr) and outdoor temperature. All animal procedures followed approved ethics committee protocols (CEUA-AASDAP 08/2011, 11/2011 and 03/2015) strictly in accordance with the National Institutes of Health (NIH) Guide for the Care and Use of Laboratory Animals. PD symptoms were elicited in all three male animals with injections of 6-OHDA toxin in the medial forebrain bundle under deep anaesthesia [87, 88]. Prior to neural recordings, animals that received 6-OHDA were subjected to acute pharmacological inhibition of dopamine synthesis (subcutaneous injections of AMPT $2\times 3240$ mg/kg) to further exacerbate PD motor symptoms, mimicking a more severe stage of the disease. Although 6-OHDA lesions impact on both behavioural and electrophysiological features in all animals [87, 88], there are individual differences at earlier stages of dopaminergic depletion that could hinder our model development considering the relatively low number of subjects. Both healthy and PD animals were implanted each with two custom-made microelectrode arrays composed of 32 microwires (one array in each hemisphere). The wires were 50 $\mu m$ in diameter and were organised in bundles aimed to reach distinct areas of the BG-T-C system. Before the surgery, the animals were sedated with ketamine (10-20 mg/kg i.m.) and atropine (0.05 mg/kg i.m.), followed by deep anesthesia with isoflurane 1-5% in oxygen at 1-1.5 L/min. The arrays were then implanted using a stereotaxic manipulator to position electrodes at the targeted BG-T-C coordinates, which were determined using Stephan et al. [96] and Paxinos et al. [67] stereotaxic atlas. The microelectrode array and the implant procedures were thoroughly described in Budoff et al. [10]. Once the animals recovered from the surgery, recording sessions were performed in fully awaken animals behaving freely. LFPs were sampled at 1,000 Hz and recorded using a 64 multi-channel recording system (Plexon). The position of the recording microelectrodes were verified postmortem through either tyrosine hydroxylase (TH) staining or Nissl staining. Similarly, the extent of dopaminergic lesions were verified through the quantification of striatal fiber density and dopaminergic midbrain cells in TH-stained sections. Further experimental details are described in Santana et al. [88]. #### 3.2.2 Preprocessing For our study, in total, 14 and 16 recording sessions were taken for the healthy and PD conditions, respectively, considering the brain hemispheres independent from each other. For the PD condition, we recorded from M1, PUT, GPe, GPi, ventral lateral (VL) and ventral posterolateral (VPL) thalamic nuclei, and STN, whereas for the healthy animal regions M1, PUT, GPe, and GPi were recorded. The raw data was organised so that, for each recording session, a data structure with $N_{\text{elec}}\times N_{T}$ was provided, where $N_{\text{elec}}$ is the number of electrodes recorded and $N_{T}$ is the number of samples of the recording session (variable but typically lasting for several minutes). Figure 2 illustrates the preprocessing steps adopted after data acquisition. For each channel, the pipeline began with a zero-lag low-pass filter (cutoff frequency of 250 Hz) and a high-pass filter (cutoff frequency of 0.50 Hz), to eliminate frequencies that are outside the LFP scope and may relate to electrical or mechanical interference. Then, we minimised power grid interference (hum) with a notch filter centred at 60 Hz and its harmonics (120 Hz and 180 Hz). Each resulting signal was then scaled according to a z-score normalisation, to account for the possible differences in signal amplitude due to different electrode impedance. Figure 2: Data acquisition and preprocessing steps implemented in out method. Depending on the monkey condition (healthy or PD), different regions of the brain were recorded. The input data was composed of a whole recording session, with variable lengths and numbers of channels (i.e., electrodes) per region. After preprocessing, the data was transformed into 2-seconds-long segments with seven channels, each related to one of the regions analysed. In the next step, we computed the cross-correlation matrix $Q$ according to Equation 1, where $C_{ij}$ is the covariance matrix of the filtered and z-scored signals from electrodes $i$ and $j$, which are located exclusively within a brain region. Channels within each region with mean correlation coefficient below the threshold of 0.70 were discarded. This procedure was employed because electrodes in each recorded region are placed very close to each other (see electrode and surgical procedures above), thus we expect LFP signals to be highly correlated (if they are not, it may relate to a noisy electrode signal) [12]. $Q_{ij}=\frac{C_{ij}}{\sqrt{C_{ii}\cdot C_{jj}}}$ (1) All remaining LFP channels within a brain region were averaged, which provided one data matrix for each recording session with dimensions $N_{R}\times N_{T}$, where $N_{R}$ is the number of brain regions recorded. These average LFP values were computed based solely on channels within each region. Next, we segmented each time-series in 2-second segments, which was the same length as the computational model simulations (see Section 3.3 for details). Considering the data sampling rate (1,000 Hz) and frequencies of interest (up to 50 Hz), 2-second segments provide enough data for our analyses. Prohibitively noisy segments were discarded using two criteria: first, segments with abnormal amplitudes, detected using an upper threshold of 0.20 for the absolute value of the mean of the signal over time; second, segments with limited (abnormal) oscillatory patterns, detected using a lower threshold of 0.10 for the amplitude standard deviation and a minimum threshold of 10 amplitude peaks. For each recording session, our preprocessed dataset had a final shape of $N_{R}\times 2000\times N_{\text{seg}}$, where $N_{\text{seg}}$ is the resulting number of segments. In the dataset adopted for this work, whether animals were still or moving could have a profound effect on brain oscillatory activity and synchronisation metrics, because all animals were behaving freely and were not engaged in any particular behavioural task during the recording sessions. In fact, especially in motor and pre-motor regions, modulations in neural oscillatory dynamics linked to motor activity are well characterised (see Armstrong et al. [1] for a review), and recent studies show that even breathing can modulate neural oscillations [103]. However, we understand that action initiation, movement, or breathing have low influence on averaged LFP amplitude values computed, given that the 2-second window segments were randomly selected without time alignment to any specific movement or action. ### 3.3 Evolutionary Algorithm Evolutionary algorithms are optimisation techniques in which a set of parameters, called genotypes, are gradually recombined and changed according to mechanisms analogous to those of biological evolution, in order to maximise a fitness function dependent of those parameters [2]. Differential evolution (DE) [75] was employed to fit the computational model parameters so that it matches the LFP beta-band power spectrum observed in the marmoset data. The overall structure of the model was preserved from Kumaravelu et al. [43], while a set of conductances, background currents and synaptic modulations, as well as the numbers of neurons in each region of the BG-T-C circuit, were calibrated through the evolutionary algorithm. The connectivity, the delays, the synaptic mechanisms, the remaining conductances, and all other parameters were kept as in the original model (see Section 3 from the Supplementary Material). More specifically, fourteen parameters compose the set of parameters to be optimised (i.e., the genotype). Parameter $I_{TH}$ ($\mu A/cm^{2}$) relates to cerebellar input currents to the thalamus, which are linked to sensorimotor inputs [50]. Parameters $I_{GPe}$ ($\mu A/cm^{2}$) and $I_{GPi}$ ($\mu A/cm^{2}$) relate to currents at GPe and GPi, respectively, from all sources that were not explicitly modelled. The next two parameters, $g_{STN\\_KCA}$ (nS/cm2) and $g_{GP\\_AHP}$ (nS/cm2), refer to the maximum slow potassium conductance yielding afterhyperpolarization (AHP) at the STN and the calcium- activated potassium conductance at GPe and GPi, respectively. The sixth parameter, $g_{syn\\_CTX\\_STR}$ (nS/cm2), modifies the synaptic conductance from cortex (CTX) to striatum (STR). Finally, parameters seven to 14 map to the number of neurons in each modelled region. All of the aforementioned parameters were chosen because they have a direct influence on the firing rates of neurons within each region, which in turn affect the LFP [65]. Also, comparing marmoset with rodent literature, there is very limited quantitative work on the anatomical and neurophysiological parameters of the BG-T-C neuronal network. Table 1: Free parameters of the computational model, optimised by DE to fit the marmoset data. ID | Parameter | Range | Description ---|---|---|--- 1 | $I_{\text{TH}}$ | $[0.6,1.8]$ | Background currents at TH ($\mu A/cm^{2}$) 2 | $I_{\text{GPe}}$ | $[1.5,4.5]$ | Background currents at GPe ($\mu A/cm^{2}$) 3 | $I_{\text{GPi}}$ | $[1.5,4.5]$ | Background currents at GPi ($\mu A/cm^{2}$) 4 | $\bar{g_{\text{STN\\_KCa}}}$ | $[2.5,7.5]$ | $Ca^{2+}$–dependent AHP $K^{+}$ conductance | | | at STN ($mS/cm^{2}$) 5 | $g_{\text{GP\\_AHP}}$ | $[5.0,15.0]$ | $Ca^{2+}$–dependent AHP $K^{+}$ conductance | | | at GPe and GPi ($mS/cm^{2}$) 6 | $g_{\text{syn\\_ctx\\_str}}$ | $[0.8,1.2]$ | Synaptic modulation from cortex to | | | striatum ($mS/cm^{2}$) 7 | $n_{\text{GPe}}$ | $[10,30]$ | Number of GPe neurons 8 | $n_{\text{GPi}}$ | $[10,30]$ | Number of GPi neurons 9 | $n_{\text{TH}}$ | $[10,30]$ | Number of TH neurons 10 | $n_{\text{StrD1}}$ | $[10,30]$ | Number of StrD1 neurons 11 | $n_{\text{StrD2}}$ | $[10,30]$ | Number of StrD2 neurons 12 | $n_{\text{CTX\\_RS}}$ | $[10,30]$ | Number of CTX_RS neurons 13 | $n_{\text{CTX\\_FSI}}$ | $[10,30]$ | Number of CTX_FSI neurons 14 | $n_{\text{STN}}$ | $[10,30]$ | Number of STN neurons In the DE, each individual from the population was a model $M(G)$ that consisted of an adaptation of the model of Kumaravelu et al. [43] in the PD condition, in which the parameters of Table 1 were set to the values defined by genotype $G$. Each model $M(G)$ was simulated for $t_{sim}=2000$ milliseconds, and the spike trains from each neuron and LFPs from each virtual electrode were recorded. The LFP recordings were applied to calculate the fitness function $f(M)$ as follows. Given a categorical set $R$ containing $N_{R}$ brain regions, the mean power spectral density (PSD) of the LFP from the electrode placed in region $r\in R$ is denoted by $S_{r}$ and defined in Equation 2, where $[\omega_{a},\omega_{b}]$ is the frequency interval of interest and $\hat{P}_{r}(\omega)$ is the periodogram computed with Welch’s method [77]. $S_{r}(\omega_{a},\omega_{b})=\int_{\omega_{a}}^{\omega_{b}}\hat{P}_{r}(\omega)d\omega$ (2) According to the literature on the electrophysiology of PD [71, 101], a noticeable abnormality is observed typically at the centre of the beta frequency band of LFP recordings from the basal ganglia of PD individuals. This frequency band corresponds approximately to the interval [13,30] Hz, although this range varies within human patients and animal model species. For the formulation of the fitness function, let a coefficient $y_{r}$ be the summation of the beta-band mean PSD plus the mean PSD of adjacent bands, composing the interval [8,50] Hz, normalised by the mean PSD of all frequencies up to $50$ Hz, as stated in Equation 3. This broader interval was defined to account for possible wider spectrum modulations in adjacent bands. $y_{r}=\frac{S_{r}(8,50)}{S_{r}(0.5,50)}$ (3) The fitness function $f(M)$ is defined in Equation 4, where $y_{r(target)}$ is the average value of Equation 3 calculated from the preprocessed data of all marmosets of PD condition, and $y_{r(M)}$ is calculated considering the simulated LFP of a computational model $M$. Notice that the healthy marmoset condition lacks readings from TH and STN regions (i.e., no electrodes were implanted in these regions). In addition, the dataset includes three PD model animals. For this reason, DE optimised parameters for mimicking the PD condition. Fitness values vary from 0, if simulated and marmoset data LFP in all brain regions substantially differ, to $N_{R}$, if they match. $f(M)=N_{R}-\sum_{r\in R}\min\left\\{1,\left|\frac{y_{r}(M)-y_{r}(target)}{y_{r}(target)}\right|\right\\}$ (4) Eight brain regions are simulated, thus $N_{R}=8$. PSD target values for the simulated regions StrD1 and StrD2 are drawn from marmoset LFP PSD values for PUT. Simulated TH is tuned based on the average PSD from marmoset VL and VPL, and simulated CtxRS and CTxFSI are tuned based on marmoset M1. Simulated GPe, GPi, and STN LFP PSDs are matched to the respective marmoset LFP PSDs. The DE initial population was set to 200 individuals, whose initial parameters were drawn from a random uniform distribution in the interval $[0,1]$. Parameters were normalised to the ranges listed in Table 1 (i.e., the actual values set in the computational model) only at simulation time. In each DE generation, a set of 20 individuals were selected through tournaments of size two. Pairs of those selected individuals were randomly chosen, in order to generate two offspring by applying uniform crossover. This led to a child population of size 20. The mutation rate was set to 10% and followed a normal distribution $\mathcal{N}(\mu=0.0,\sigma=0.3)$. The DE implements generational replacement with elitism, with only one elite individual of the parent population being kept, resulting in a population size of 21 individuals. Each model $M(G_{k})$, where $k\in\\{1,\dots,N_{M}\\}$, was evolved for $N_{gen}=60$ generations. We have performed 150 evolutionary runs, so that the highest fitness individual of each run was selected to compose the set $\mathcal{G}=\\{G_{1},\dots,G_{N_{M}}\\}$ of evolved genotypes. ### 3.4 Clustering Upon completion of parameter optimisation by DE, we investigated whether high fitness individuals had different genotypes. The rationale is that different parameter sets, even if biologically plausible, could lead to incompatible healthy and PD network dynamics [4]. Considering that the fitness function was computed based on LFP values of the PD condition only, and that the healthy condition was obtained by changing the same parameters listed by Kumaravelu et al. [43], there was no guarantee that the genotypes evolved would lead necessarily to models that resemble the healthy and PD conditions of the animal models. For this reason, we performed a clustering analysis [106] to the set $\mathcal{G}$ of evolved genotypes, which we could then evaluate separately based on their spectral densities. This validation step is based on the fact that PD individuals present a peak at the beta band (13-30 Hz) when compared to healthy individuals [101]. Let $\mathcal{C}=\\{C_{1},\dots,C_{n_{c}}\\}$ be a set of clusters, with $C_{p}=\\{G_{1},\dots,G_{n_{p}}\\}$, where $n_{c}$ is the number of clusters, $p\in\\{1,\dots,n_{p}\\}$, and $n_{p}$ is the total number of genotypes within cluster $p$. Considering $s_{p}(G_{k})$ to be the sample silhouette [81] of genotype $G_{k}$ with respect to $C_{p}\in\mathcal{C}$, consider $s_{p}(G_{k})\geq s_{p}(G_{k+1})$ for all $k\in[1,P]$, it is, each cluster is ordered from highest to lowest silhouette. In exploratory experiments (not shown), we investigated different clustering paradigms, namely K-means, density-based spatial clustering of applications with noise (DBSCAN), and agglomerative clustering. Based on these experiments, we opted for the K-means algorithm with two centroids (i.e., $p=2$), because this configuration led to the highest mean silhouette score. Hence, the K-means algorithm was fed with all the individuals with the highest fitness per evolutionary run (i.e., set $\mathcal{G}$), and the Euclidean distances for the algorithm were computed on the 14 normalised parameters of the genotype. ### 3.5 Computational model spike and LFP analysis The different clusters of genotypes were compared with respect to their parameter values, spike firing rates and LFP power spectra. For each cluster, the 50 highest fitness genotypes were chosen for the following analyses. Spectral analysis was performed by simulating $C_{p}[1,\dots,50]$, for $t_{sim}=2000$ milliseconds, in both healthy and PD conditions. Thus, for each condition, $50$ simulated LFP recordings were analysed per cluster for each condition. Since we simulated the same individuals (i.e., sets of parameters), with the same seeds for generation of random numbers, in each of the conditions (healthy and PD), the samples across these conditions were considered to be dependent. The PSDs were computed and evaluated with respect to the mean of the density spectrum per cluster, and the average power at the beta band. For PSD analyses on the LFP of either the animal and computational models, to highlight the presence of a peak in the beta band in the PD condition, a ratio $R$ was defined as in Equation 5, where $\hat{P}_{r}^{PD}(\omega)$ and $\hat{P}_{r}^{H}(\omega)$ are the mean spectral power across the PD and healthy models, respectively, for frequency $\omega$. A lower threshold value $\epsilon$ was defined because, for denominators too close to zero, the ratio may lead to high values that actually have little meaning for interpretation. For the analyses with the animal models, $\epsilon$ was defined as the median power across the mean spectrum of the healthy condition. For the computational models, it was set to the $80$th percentile of the healthy spectrum. $R(\omega)=\begin{cases}\frac{\hat{P}_{r}^{PD}(\omega)}{\hat{P}_{r}^{H}(\omega)}\quad,\quad\hat{P}_{r}^{H}(\omega)>\epsilon\\\ 0\quad,\quad\text{otherwise}\end{cases}$ (5) Regarding spike dynamics, the models within each cluster were simulated for $t_{sim}=2000$ milliseconds with time step size $dt=0.10$ milliseconds, always with the same seed for random number generation, and the firing frequency of all neurons was calculated in $50$ time bins, each corresponding to $20$ milliseconds. ### 3.6 Computational model validation Considering that different currents, conductances, and numbers of neurons may influence the firing rate in each simulated brain region, which in turn modulates the LFP power spectra, one may conclude that even if there are different clusters, their neural dynamics are comparable because both clusters are formed by high fitness individuals. However, even if our computational model was optimised to replicate the LFP power spectra from marmoset animal models of PD, it should also mimic the power spectra from healthy marmosets (by changing selected conductances, see Section 3.1). In other words, if the computational model accurately captures the physiological phenomena responsible for the different beta-band centred LFP power spectra from PD marmoset monkeys, it should also replicate the healthy spectra (a scenario in which it was not evolved). Therefore, we first confirmed that our marmoset animal model of PD presented frequency spectra in accordance with previous works, following Section 3.2. Then, we investigated whether the computational model would also capture this phenomena. For that, for each genotype cluster found (Section 3.4), we compared the LFP power spectra from the evolved PD computational model with that from the healthy model. This was performed by modifying a predefined set of conductances in the simulation (Section 3.1). To highlight the differences, we first analysed the ratios between the mean PSD of the PD and healthy simulated individuals from each cluster. During evolution, fitness is given by LFP PSD in the vicinity of the beta band calculated in the whole $t_{sim}=2000ms$ sequence, hence it is possible that the same spectra relate to different LFP rhythms over shorter time scales. Thus, different neuronal spiking dynamics may lead to similar LFP dynamics over time. Moreover, spikes from single neurons are noisy and vary considerably over time and over repeated simulations. With large recordings, joint neuronal averages over time may hinder comprehension of neural population dynamics. Finally, one of the advantages of computational models such as the one used here is the direct access of each neuron state at any given time, but it is not trivial to interpret the dynamics of large populations of neurons over time. To clarify these issues, we studied low- dimensional neuronal trajectories for both healthy and PD computational model conditions [15]. To compute the neuronal trajectories, we first calculated the firing frequencies for all neurons from each simulated model in a particular cluster and condition (i.e., healthy and PD), based on the mean firing rates (MFR) taken from bins of size $50$ ms. Since the number of neurons within each region varies from 10 to 30 (see Table 1), and there are eight regions considered for the computational model, this procedure generates time series with high dimensionality, ranging from 80 to 240, which would be difficult to visualise and analyse. To reduce the dimensionality, we employed principal component analysis (PCA) [109]; that is, we analysed neural trajectories by projecting high-dimensional neural population activity in a 3D space using PCA of the spike MFR time series. However, what if, instead of clearly occupying different regions in the state space, neuronal responses from the same conditions result in similar paths in the reduced dimensional space? To address this hypothesis and to compare PCA trajectories, we used Dynamic Time Warping (DTW) with Euclidean distance [60]. DTW finds the optimum non-linear alignment between two time series, hence it can estimate whether neuronal trajectories share a similar path, regardless of initial conditions. In the analysis performed, we employed the fastdtw Python package, which implements the method proposed by Salvador and Chan [85]. Each pair of three-dimensional time series, computed from the MFR signals and dimensionally reduced with PCA, was fed to the algorithm, which provided, as output, a scalar proportional to the dissimilarity between the two time series being compared. More specifically, we compared the similarity of all possible pairs of neural trajectories considering all individuals within the clusters (healthy and PD dynamics). We compared all pairs of trajectories generated by individuals within the same condition (healthy or PD), which gave a measurement of how different the healthy or PD individuals are compared to each other (i.e., within-group comparison), and we compared pairs of trajectories between healthy and PD conditions (i.e., between-groups comparison). Finally, one of the hallmarks of PD is the anomalous widespread synchronisation in the BG-T-C network. To validate our model in that respect, we calculated the magnitude-squared coherence between nuclei and intranucleus. Based on a similar analysis performed in healthy and PD marmosets reported in Santana et al. [88], we expect a widespread increase in this metric. The magnitude-squared coherence was calculated from the spike trains of neurons of each nucleus using Welch’s method with Hanning windowing without overlap and with spectral resolution of 1 Hz. The average was taken as recommended by Bendat and Piersol [5]: the squared value of the average of the cross spectra divided by the product of the mean values of the auto spectra of each nucleus. The value of the magnitude-squared coherence between brain regions $r_{A}$ and $r_{B}$, defined as $C(r_{A},r_{B})$, was computed as in Equation 6, where $N_{A}$ is the number of neurons in region $r_{A}$, and $N_{B}$ is the number of neurons in region $r_{B}$, and $S(r_{x}^{m},r_{y}^{n})$ is the cross spectrum between the spike trains from the $m$-th neuron from region $r_{x}$ and the $n$-th neuron from region $r_{y}$. $C(r_{A},r_{B})=\frac{\left[\frac{1}{N_{A}\cdot N_{B}}\sum\limits_{i=1}^{N_{A}}\sum\limits_{j=1}^{N_{B}}S(r_{A}^{i},r_{B}^{j})\right]^{2}}{\left[\frac{1}{N_{A}}\sum\limits_{i=1}^{N_{A}}S(r_{A}^{i},r_{A}^{i})\right]\cdot\left[\frac{1}{N_{B}}\sum\limits_{i=1}^{N_{B}}S(r_{B}^{i},r_{B}^{i})\right]}$ (6) Then, we considered the peak of the coherence in the 7-30 Hz band to highlight PD-related effects [88]. The significance level for coherence was defined as $1-(1-\alpha)^{1/(L-1)}$ [80], with $\alpha=0.95$ and $L=100$, because the windowing was done with 100 segments and we adopted as 95% the significance level. As the computational models have eight nuclei, an $8\times 8$ matrix was constructed, representing the coherence between each pairs of nuclei. The median of this matrix was considered as the global coupling metric between nuclei in each simulation, because it is less sensitive to outliers than the mean. ## 4 Results Based on two-seconds-long segments, computed according to the data preprocessing steps described in Section 3.2, (see Figure 3a for a sample), the PSDs of LFPs from healthy and PD marmosets were computed (see Figure 3b for the average spectrum). In all regions of the PD subjects, an increased PSD magnitude from 5 Hz to 25 Hz was observed, which is in accordance with the reported electrophysiological signatures of PD [101]. Figure 3: Animal data from marmoset monkeys, collected through electrodes implanted to each region of the BG-T-C circuit in a previous study [88], and made available for our research. (a) Example of a two-second time window of the preprocessed LFP of a PD-induced (i.e., 6-OHDA lesioned) marmoset. For a clearer visualisation, signals were bandpass filtered to the [8,50] Hz interval, only for this panel. (b) Top two rows show the mean power density spectra (PSD) over all segments for the healthy (blue) and PD (red) marmosets (data for each individual marmoset is included as supplementary material). For thalamic regions (i.e., VL and VPL) and STN, only 6-OHDA lesioned hemispheres are represented, since these regions were not recorded in the healthy marmoset. PSDs were normalised by the maximum PSD value for each time window. The bottom row shows the ratio (R) between PD and healthy PSD for each frequency (see Equation 5). To improve visualisation, $\epsilon$ is set to the median of the healthy spectrum. a.u.: arbitrary units. From the estimated LFP power spectra from PD marmosets, the target LFP power spectra values for the computational marmoset model were computed as in Equation 3. The results, presented in Table 2, were fed to the DE fitness function (Equation 4). Table 2: Target LFP power spectra values for the computational marmoset model, calculated from data from marmoset monkeys in the PD condition (Equation 3). $y_{StrD1}$ | $y_{StrD2}$ | $y_{TH}$ | $y_{GPi}$ | $y_{GPe}$ | $y_{CtxRS}$ | $y_{CtxFSI}$ | $y_{STN}$ ---|---|---|---|---|---|---|--- 0.44 | 0.44 | 0.38 | 0.46 | 0.42 | 0.39 | 0.39 | 0.37 ### 4.1 Evolutionary algorithm successfully found high fitness genotypes After running the DE $N_{M}=150$ times, the resulting set of high fitness individuals $\mathcal{G}$ (i.e., the highest fitness individual in the population at the end of each of the 60 generations at each evolutionary run) was analysed. The fitness values of all individuals were recorded at all generations of each evolutionary run. Figure 4 reports the best and mean individual fitness across generations, and the distribution of those values at the end of the evolutionary runs. Concretely, the best individual in a given generation is the set of parameters that led to the highest fitness value according to Equation 4. The mean individual fitness across generations refers to the average fitness of all individuals achieved at each generation. Regarding the best individual fitness curve, results show that, at every evolutionary run, the initial population contained at least one individual with fitness value close to 6, and that value improved by approximately 1 at the end of evolution (the maximum fitness value possible is $8.0$, see Equation 4). Considering the whole population, the initial average fitness was low (approximately 4.5), reaching a plateau close to 5.75 as evolution progressed. The mean fitness across individuals and the best individual’s fitness have marginal improvement after generation 40, thus the DE was stopped at $N_{gen}=60$ generations. Figure 4: Fitness values $f(M)$ (Equation 4) per generation of the evolutionary algorithm (box plots summarising the $k=150$ runs at each generation). The genotypes (i.e., parameter sets for the free parameters elicited in Table 1) were meant to maximise $f$, which, by definition, would be upper bounded at $8.0$. The upper row refers to the highest fitness individuals at each evolutionary run, and the lower row refers to the mean fitness values of all individuals. (a) Box plots of the best (upper row) and mean (lower row) fitness values at each generation. Outliers were represented by black diamonds. (b) Probability distribution of the best (upper row) and mean (lower row) fitness. For all $G\in\mathcal{G}$, we looked at the distribution of parameter values for clusters $C_{1}$ and $C_{2}$, represented in Figure 5. Both clusters present similar distributions for most of the parameters, either with small variance (e.g., the numbers of neurons at the cortex populations) or more uniform distributions with high variance (e.g., the number of neurons at the striatum). Other parameters, such as $I_{\text{TH}}$ and $I_{\text{GPe}}$, had a clear mean peak and reduced variance in the distribution for $C_{2}$, but a large variance for $C_{1}$. Figure 5: Violin plots showing the distribution of each free parameter (see Table 1) across the best individuals found at each run of the evolutionary algorithm employed for optimising this set of parameters (i.e., genotype). Although scales vary across parameters (see Table 1), all parameters were linearly scaled (i.e., normalised) to the interval $[0,1]$ at evolution time. For example, for parameters 7-14 (i.e., the numbers of neurons), a value of zero corresponds to the lower bound of the parameter interval, that is, 10 neurons. a.u.: arbitrary units. ### 4.2 High fitness genotypes form two clusters A set of 150 high fitness individuals was generated by repeatedly running the evolutionary algorithm with different seeds. It is possible that high fitness individuals do not have a unique parameter distribution, and diverse parameter settings could lead to high fitness values. To investigate this issue, we performed a clustering analysis based on the evolved individuals. Following the methods from Section 3.4, the K-means algorithm was employed to determine $p=2$ clusters. Figure 6 provides a radar plot representation of genotypes learnt for each cluster, and the correspondence between the mean value of each parameter and those of the rat computational model by Kumaravelu et al. [43]. Figure 6a shows 4 representative genotypes $c_{p}[1,\dots,4]$, chosen based on the highest silhouettes with respect to each cluster. For comparison, the parameters from the rat model [43] are superposed with the mean values between all individuals from both clusters in Figure 6b. This representation highlights substantial differences between clusters. For instance, the $I_{GPe}$ is at its maximum value in $C_{2}$, while it shows a much lower value for $C_{1}$. On the other hand, the number of neurons at the GPe is higher in $C_{1}$ than in $C_{2}$. Figure 6: Radar representations of the genotypes (i.e., sets of parameters, see Table 1) from individuals at each cluster obtained by applying the K-means algorithm, applying these parameters as features for the clustering technique. Although scales vary across parameters (see Table 1), all parameters were linearly scaled (i.e., normalised) to the interval $[0,1]$ at evolution time. For example, for parameters 7-14 (i.e., the numbers of neurons), a value of zero corresponds to the lower bound of the parameter interval, that is, 10 neurons. The first row represents cluster $C_{1}$ and the second row cluster $C_{2}$. (a) Four individuals with the highest silhouettes with respect to each cluster. Data at the left refers to the fitness $f$ computed as in Equation 4. (b) Comparison between the parameters of the rat model and the mean values from each cluster. As in Figure 5, parameter values were scaled to the ranges shown in Table 1, except parameter 4 ($\bar{g_{\text{STN\\_KCa}}}$) of the rat model, whose original value is 1.0 $mS/cm^{2}$. ### 4.3 Healthy and PD spectral signatures from computational model resembles those from marmoset monkeys Regarding the spectral analyses of simulated sessions of the computational model, we employed the same procedure for normalisation as we did for the spectra of the animal model (see Figure 3); that is, we normalised each data segment by the maximum value. The sample signals of Figure 7a, shown as an example, were bandpass-filtered to the same range as in Figure 3a to the interval [8-50] Hz. The mean spectral power and the ratio $R$ are shown for the healthy and PD conditions for each cluster in Figure 7b (see Equation 5). In $C_{1}$, results show higher magnitudes of most frequencies up to 50 Hz for PD models, a fact that is less visible for $C_{2}$. The mean PSD ratio from genotypes $G\in C_{2}$ is close to 1 regardless of frequency range and brain region, whereas genotypes $G\in C_{1}$ show prominent peaks in beta frequencies. A detailed analysis of box-plots (Figure 7c) confirm the significant differences in the beta band for cluster $C_{1}$ only. Considering the spectral densities from the LFP data from animal models (Figure 3b), in which we observe a significant difference in the beta band, results displayed in Figure 7c confirm that spectral signatures from genotypes in $C_{1}$ resemble those from marmoset monkeys. Notice that the LFP mean PSDs from the computational model (Figure 7b) has a different shape compared to that from the animal LFP (Figure 3b), but the spectral signature is similar in both healthy and PD conditions and resemble those from marmoset monkeys. This can be explained by the relatively small number of neurons simulated in the computational model [65]. Therefore, for the forthcoming analyses, only $G\in C_{1}$ will be considered. Figure 7: Extracellular activity simulated by the computational models resulting from the parameters optimised (i.e., genotypes computed with the evolutionary algorithm), modelled as local field potentials (LFP) at the centre of the regions involved in the BG-T-C circuit. The clusters $C_{1}$ and $C_{2}$ were computed by applying the K-means technique directly to the genotypes, hence were not influenced by the simulated neurophysiological activity. (a) Example of simulated LFPs for the highest silhouette evolved individual from cluster $C_{1}$, PD condition. For a clearer visualisation, signals were bandpass filtered to the [8,50] Hz interval, only for this panel. Compare with Figure 3a. (b) Mean PSD for healthy (blue) and PD (red) conditions from the 50 models with the highest silhouette of each cluster, normalised by maximum PSD value for each time window, followed by the ratio $R$ between PD and healthy PSD for each frequency (see Equation 5). To improve visualisation, $\epsilon$ is set to the percentile $80$ of the healthy spectrum. (c) Box plot regarding the beta band (13-30 Hz) of the LFP from the 50 models with the highest silhouette of clusters 1 (left) and 2 (right). Outliers were represented by black diamonds. Unpaired t-tests were applied to evaluate statistical significance against the null hypothesis that H and PD values are drawn from the same underlying distribution (p-value notation: $p>0.05\rightarrow\text{ns}$; $p\in[0.01,0.05]\rightarrow\text{*}$; $p\in[0.01,0.001]\rightarrow\text{**}$; $p\in[0.001,0.0001]\rightarrow\text{***}$; $p<0.0001\rightarrow\text{****}$). a.u.: arbitrary units. ### 4.4 Spike activity from healthy models are significantly different from those of PD models Regarding spike activity, the marmosets’ dataset was not provided with a representative set of spike trains from all regions of the circuit, hence they were not a suitable ground truth for validating the activity from the computational model. For this reason, the spikes synthesised by the computational model were analysed based on evidence from the literature [73]. First, we assessed the differences in mean firing rates (MFR) between the healthy and PD conditions for the marmoset-based computational models in cluster $C_{1}$. Figure 8a shows the simulated MFR in each brain region for $t_{sim}=2000$ ms, considering the 50 models in $C_{1}$ with the highest silhouette with respect to the cluster. Results indicate a counter-intuitive relationship between the MFR and the LFP power spectra observed in Figure 7c. Consider, for instance, the GPe and GPi. Both regions show a higher beta-band LFP magnitude in PD condition, but while GPi MFR in PD condition is higher than that from healthy condition, GPe MFR is the opposite. From Figure 8b and Figure 8c, we observe that neuronal trajectories are intertwined, with no clear difference in the reduced-dimension state space. This is justified by the relatively mild, though statistically significant, differences in MFR (Figure 8a). As described in Section 3.5, neuronal trajectories were compared with DTW in three scenarios: healthy vs healthy models (HxH), PD vs PD models (PDxPD), and healthy vs PD models (HxPD). As $len(C_{1})=53$, the number of pairs from which the DTW was computed was $len(DTW_{C_{1}})=\binom{53}{2}=1378$ for each scenario. The results from this analysis are shown in Figure 8d, in which the scalar outputs of the DTW algorithm are considered for all possible pairs within groups, for the HxH and PDxPD comparisons, or between groups, for the HxPD comparisons. Since two trajectories generated by the same individual were not compared on any of the analyses, we have computed statistical significance using unpaired tests, differently from the remaining analyses in the paper. Figure 8: Firing rates and dynamics regarding the spike activity simulated with the computational models derived by the parameter sets from cluster $C_{1}$. Simulations were ran for $t_{sim}=2000ms$. (a) Mean firing rates for each region in cluster (means and standard deviations). (b) Projection of three principal components of the most representative individual (i.e., highest silhouette) of cluster $C_{1}$, where $Z_{1}$, $Z_{2}$ and $Z_{3}$ are the principal components with the highest variance. (c) Representation of those components using contour lines. (d) Box plot of the DTW between the dynamics of one simulation of all genotypes belonging to cluster $C_{1}$. All simulations were performed with the same seed for the generation of random numbers. Higher DTW values mean that the pairs of trajectories being compared are less similar to each other. Unpaired t-tests were applied to evaluate statistical significance in (a), against the null hypothesis that H and PD MFR values at each region are drawn from the same underlying distribution, and in (d), against the null hypothesis that a given pair of DTW vectors is drawn from the same distribution as each of the others (p-value notation: $p>0.05\rightarrow\text{ns}$; $p\in[0.01,0.05]\rightarrow\text{*}$; $p\in[0.001,0.0001]\rightarrow\text{***}$; $p<0.0001\rightarrow\text{****}$). a.u.: arbitrary units. Trajectories from the HxH scenario were statistically more similar than trajectories from the other conditions. Thus, the intertwined trajectories observed in PCA (Figure 8b and Figure 8c) in fact relate to significant differences between healthy and PD neuronal dynamics. Interestingly, PDxPD trajectories differ more than those from HxH, which can be interpreted as a less homogeneous, regarding neuronal dynamics, genotype to phenotype mapping. ### 4.5 Healthy and PD spike coherences from the computational model resemble that from marmoset monkeys To conclude our model validation, we selected the top five genotypes with highest silhouette from cluster $C_{1}$ and calculated the magnitude-squared coherence (MSC) within and between each simulated brain region (Section 4.5) for healthy and PD conditions. Results revealed that computational models ran in the healthy condition provided a lower peak MSC in the 13-30 Hz band when compared to that from the PD condition (Figure 9a), with two important observations: genotype I has higher peak MSC when compared to the other 4 genotypes in the healthy condition, and genotypes II and III have a lower widespread peak MSC when in the PD condition compared to that from other genotypes in the same condition. Statistical analysis confirmed the significant differences in all five genotypes when comparing the global coupling metric (see Section 3.6 and Equation 6) between healthy and PD conditions (Figure 9b); that is, PD models present a higher widespread coherence in the 13-30 Hz band than that observed in healthy models. Figure 9: Coherence analyses computed for the spike activity of the five parameter sets, optimised through the evolutionary algorithm, with the highest silhouettes with respect to cluster $C_{1}$. These parameter sets were used to construct the healthy and PD computational models that were considered in the coherence analyses. (a) Peak magnitude-squared coherence (MSC) in the 13-30 Hz band within and between each simulated brain region for the top five genotypes with highest silhouette from cluster $C_{1}$. Only connections whose peak MSC values are above significance level are shown. (b) Global coupling metric (median value of the MSC matrix) between brain regions for healthy and PD conditions (see Section 3.6 and Equation 6). (p–value notation: $p<0.0001\rightarrow\text{****}$) ## 5 Discussion Marmoset monkeys are prominent in neuroscience research [16, 39, 56, 54]. Although there are anatomical and physiological differences between BG-T-C circuit in rodents and primates, neurophysiological data from rodents are far more available than from primates. Considering the similarities on the overall structure of the BG-T-C circuit among all vertebrates [41], we assumed that the rat model presented by Kumaravelu et al. [43] was a suitable starting point to build a computational model of those structures in primates. The core hypothesis was that, by keeping the same brain regions and connectivity patterns of the rat model and modifying a set of parameters, the computational model could reproduce neural dynamics of healthy and PD marmoset conditions. The dataset used in this work included simultaneous LFP recordings from regions of the BG-T-C network and power spectra (PSD) analysis revealed significantly higher 13 to 30 Hz LFP PSD magnitudes for PD marmosets in all regions. This result might be interpreted cautiously, given that one healthy marmoset is being compared to three PD marmosets. Also, results refer to a broad range of frequencies, hence different interval choices may influence the analysis. Nonetheless, one would expect a widespread significant increase in LFP power centred in (but not limited to) the beta band in PD affected brains [88, 101]. Regarding the MFR results from the computational model (Figure 8a), there are significant differences between the healthy and PD conditions. Single-neuron firing rates vary considerably depending on animal species, whether the animal is fully awaken, engaged in behavioural tasks, or anaesthetised [30, 105, 52]). Data from human subjects, even though scarce, are in line with animal results [18]. Moreover, there is a great neuronal diversity within the BG-T-C network, both in terms of neuronal physiology and connectivity, which have been shown to have a non-trivial relationship with field potentials [91, 8, 33, 6]. Our model takes into account this diversity, which was shown in Figures 8b and 8c; nevertheless, the reported MFR are in agreement with the literature: comparing PD with healthy conditions, a higher MFR in GPi, STN, and Str, and a lower MFR in GPe, TH, and CTX. The data-driven modelling strategy adopted in this paper is consolidated in computational neuroscience literature [63], but often leads to multiple models fitting a particular data set [4]. Therefore, model optimisation should be followed by a model selection phase. We clustered high fitness solutions with respect to evolved parameters and obtained two clusters, and found two clear sets of parameters that reproduce the increased beta-band oscillations observed in PD marmosets [88]. However, when perturbing the model to shift from PD to healthy dynamics, only one of the clusters fitted the marmoset data. Notably, we evolved solutions based on LFP data but computational model firing rates resemble those reported in previous works [105, 46, 18]. Nevertheless, as data becomes available, future works should explore different fitness functions based on single-neuron activities or other features of LFP. Lastly, in this context, our simulated neurons are formed by a single cylindrical compartment, thus future works should consider using neurons with more complex compartments and connections, possibly including multiple dendritic branches and active ionic channels. This would lead to more realistic simulated LFP signals [65], but at the expense of heavier computing resources. One of the great challenges in neuroscience is to link the activity of large neural populations to motor and cognitive behaviours. One strategy is to study the intrinsic high-dimensional dynamics of neural populations from its low- dimensional dynamics given by time-varying trajectories [15, 99], thus emphasising circuit over single-neuron function. For example, Humphries et al. [36] showed that neural low-dimensional dynamics given by PCA of neuronal activity can explain Aplysia rhythmic movement control and propose that only the low-dimensional dynamics are consistent within and between nervous systems. Also, the shape and amplitude of neural trajectories can explain different behavioural outcomes [28]. Combining PCA and DTW, we found that neural trajectories from high-fitness models are more similar in healthy conditions than in PD conditions. This is in line with results from Russo et al. [84], who demonstrated, using computer simulations, later confirmed by data from the supplementary motor area in monkeys, that low trajectory divergence is essential in neural circuits involved in action control. PCA is a simple, established method for dimensionality reduction, but other computational tools tailored to neuronal data, such as Gaussian-Process Factor Analysis (GPFA) [110] and jPCA [13], should be considered in further analyses. Another possible approach is to use more advanced machine learning methods to identify PD-related features from neural data, as demonstrated by Ranieri et al. [76], who employed a deep learning framework to unveil PD features from marmoset data. Finally, as part of our model validation, we assessed functional coupling within and between simulated brain regions by means of coherence between spike trains. In contrast to structural coupling, characterised by physical neuronal connections, functional connectivity is an emergent phenomenon commonly linked to synchronisation in neural rhythms at diverse spatiotemporal scales and is the basis of neural communication and cognitive processing [94, 11, 23, 44]. Several neural disorders, including PD, present a disruption in functional connectivity [104, 51, 29]. In particular, Santana et al. [88] showed that 6-OHDA marmoset models of PD have a widespread coherence peak in the beta band when compared to healthy individuals. Our computational model is in line with this result, which is relevant not only as further evidence of its biological plausibility, but also because one of the established therapies to alleviate PD motor symptoms is the use of deep brain stimulation (DBS) [71]. Thus, we believe that the work presented here can be used to test hypotheses that employ DBS. For instance, Romano et al. [79] performed a comprehensive analysis of frequency-dependent effects of DBS on the same model that we used here, tuned for rodent data [43], and found that neural oscillatory modulations were similar to those observed in electrical brain and spinal cord stimulation of primates [107, 88]. Certain simplifications inherent to our approach should also be mentioned, as they may serve as inspiration for improvements in future research. In our work, LFP generation followed the method described in Parasuram et al. [65], and implemented in NetPyNE, which does not consider the influence of sinks. Despite being a simplification, the method has been able to reproduce features of real LFP data, and is computationally feasible. In this approach, LFP waveforms are directly related to transmembrane ionic currents from each neuronal source, which in turn relate to neuronal firing rates, and electrode position. As we have assigned coordinates to the simulated electrodes corresponding to the centre of each simulated region, we can assume that simulated LFP dynamics are due to altered spiking activity in multiple neuronal sources from different brain regions. Likewise Kumaravelu et al. [43] and previous seminal BG-T-C modelling works such as Humphries et al. [34], and van Albada and Robinson [105], we did not model any structural synaptic plasticity mechanisms. Our synapses were modelled as bi-exponential and alpha synapses, including transmission delays. Nevertheless, as model dynamics unfold, functional plasticity mechanisms may take place in the sense that the closed-loop, recursive network architecture could lead to single neurons and brain regions whose electrical activity are sensitive to past network states. In fact, the depletion of dopamine, one of the hallmarks of PD, affects structural and functional plasticity. Our model considers the loss of dopaminergic neurons (see Section 3.1, for a complete description), thus we believe that the model is suited for the investigation of functional plasticity phenomena. This analysis is beyond the scope of our work, but the reader can relate the change in oscillatory neural dynamics we described to different functional states. For instance, Humphries et al. [34] show that action selection in the BG is closely linked to oscillatory activity. There are several directions for future work. Based on the study of Wang et al. [108], a phase amplitude coupling analysis in the STN in our computational model may shed light on the different aspects of LFP oscillations observed in healthy and PD conditions, as well as the mechanisms underlying these oscillations. In another perspective, most PD computational models do not consider brain-body-environment interactions. Embodied cognitive science studies have provided solid evidence that neural activity is shaped by such interactions [20, 69, 3, 59]. In PD and other neural disorders, body- environment interactions influence motor control [95, 89], but its impact on neural dynamics remains unclear. Moreover, the BG-T-C neuronal network is clearly related to action selection and decision making [34, 55, 98]. Therefore, we believe that associating our marmoset-based computational model with a physical robot may offer an alternative approach to elucidate the mechanisms underlying brain-body-environment interactions in PD [27, 72, 42, 74, 70]. A possible approach would be to employ this computational model in a sensorimotor loop based on visual inputs from video cameras and motor outputs to actuators such as the robot’s motors. In this scenario, computer vision algorithms would transform the images into stimuli for the computational model, so that the resulting currents and action potentials would be used to generate perturbations that would govern the behaviours of the actuators. The resulting framework could become a new tool for studying the underlying mechanisms of PD and the effects of different interventions regarding the simulated circuit. ## 6 Conclusions Computational models are invaluable tools for advancing our knowledge of the neural dynamics of our brain, either under healthy conditions or with neurological disorders. Even though the physiopathology underlying PD shares similarities across vertebrate species, there are important, species-specific differences in the anatomy and neural dynamics of the BG-T-C circuit. For example, the number of neurons in the GPe is considerably increased in primate models, when compared to rodent models. Hence, the design of a primate computational model of PD is of paramount importance. In this work, we created the first computational model of the dynamics of BG-T-C motor circuit based on data from Marmoset monkeys both in healthy and parkinsonian conditions. Our data-driven approach used simultaneous, multisite electrophysiological recordings from healthy and 6-OHDA+AMPT marmoset models of PD. We are aware that there are simplifications in our computational model; nevertheless, results show that LFP power spectral densities at frequencies of interest, firing frequency dynamics, and spike coherence resemble those from healthy and PD marmosets. Electrophysiological datasets from animal models often do not include comprehensive biophysical data such as single-neuron membrane conductances and neuronal cell densities. These parameters were central for building a biophysical computational model. Thus, to address this gap, we used an optimisation algorithm (differential evolution) to search the multidimensional model parameter space for solutions that could reproduce features of the animal LFP recordings. Our model was based on a well known rat model of PD [43]. The main aspects of novelty in our modelling approach are: 1) we use a marmoset monkey BG-T-C electrophysiological database; 2) we added LFP simulations to the model, in addition to spike dynamics; and 3) we developed a DE-based optimisation to search for unknown parameters. With this framework, we were able to reproduce several of the previously reported PD electrophysiological biomarkers observed and recorded from marmoset monkeys. Our computational model presents beta-band LFP power spectra differences between the healthy and the PD conditions, which Wang et al. [108] also found in human patients with dystonia. This is in line with a body of literature that shows that beta-band LFP modulations are not a PD-specific biomarker (see Poewe et al. [71] and references therein). Although our model is focused on PD, the electrophysiological features we use are known to be related to other neural disorders and thus should not be considered as exclusive to PD. ## Acknowledgement This work is part of the Neuro4PD project, granted by Royal Society and Newton Fund (NAF\R2\180773), and São Paulo Research Foundation (FAPESP), grants 2017/02377-5 and 2018/25902-0. Moioli and Araujo acknowledge the support from the National Institute of Science and Technology, program Brain Machine Interface (INCT INCEMAQ) of the National Council for Scientific and Technological Development(CNPq/MCTI), the Rio Grande do Norte Research Foundation (FAPERN), the Coordination for the Improvement of Higher Education Personnel (CAPES), the Brazilian Innovation Agency (FINEP), and the Ministry of Education (MEC). Romano was the recipient of a master’s scholarship from FAPESP, grant 2018/11075-5. Elias is funded by a CNPq Research Productivity Grant (312442/2017-3). This research was carried out using the computational resources from the Center for Mathematical Sciences Applied to Industry (CeMEAI) funded by FAPESP, grant 2013/07375-0. Additional resources were provided by the Robotics Lab within the Edinburgh Centre for Robotics, and by the Nvidia Grants program. ## References * [1] Samuel Armstrong, Martin V. Sale, and Ross Cunnington. Neural oscillations and the initiation of voluntary movement. Frontiers in Psychology, 9:2509, 2018. * [2] Daniel Ashlock. Evolutionary computation for modeling and optimization. Springer Science & Business Media, 2006. * [3] Paul B Badcock, Karl J Friston, and Maxwell JD Ramstead. The hierarchically mechanistic mind: A free-energy formulation of the human psyche. Physics of life Reviews, 31:104–121, 2019. * [4] Jyotika Bahuguna, Tom Tetzlaff, Arvind Kumar, Jeanette Hellgren Kotaleski, and Abigail Morrison. Homologous basal ganglia network models in physiological and Parkinsonian conditions. Frontiers in Computational Neuroscience, 11(August):1–21, 2017\. * [5] Julius S. Bendat and Allan G. Piersol. Random Data: Analysis and Measurement Procedures. John Wiley and Sons, Inc., USA, 4th edition, 2010. * [6] Liora Benhamou, Maya Bronfeld, Izhar Bar-Gad, and Dana Cohen. Globus Pallidus External Segment Neuron Classification in Freely Moving Rats: A Comparison to Primates. PLoS ONE, 7(9), 2012. * [7] Sarah F. Beul, Helen Barbas, and Claus C. Hilgetag. A Predictive Structural Model of the Primate Connectome. Scientific Reports, 7:1–30, 2017. * [8] J. P. Bolam, J. J. Hanley, P. A. C. Booth, and M. D. Bevan. Synaptic organisation of the basal ganglia. Journal of anatomy, 196:527–542, 2000. * [9] Peter Brown and David Williams. Basal ganglia local field potential activity: character and functional significance in the human. Clinical neurophysiology, 116(11):2510–2519, 2005. * [10] S. A. Budoff, J. F. Rodrigues Neto, V. Arboés, M. S. L. Nascimento, C. B. Kunicki, and M. F. P. Araújo. Stereotaxic surgery for implantation of microelectrode arrays in the common marmoset (callithrix jacchus). J. Vis. Exp., 151(e60240), 2019. * [11] György Buzsáki. Neural Syntax: Cell Assemblies, Synapsembles, and Readers. Neuron, 68(3):362–385, 2010. * [12] György Buzsáki, Costas A Anastassiou, and Christof Koch. The origin of extracellular fields and currents–EEG, ECoG, LFP and spikes. Nature reviews. Neuroscience, 13(6):407–20, 5 2012. * [13] Mark M. Churchland, John P. Cunningham, Matthew T. Kaufman, Justin D. Foster, Paul Nuyujukian, Stephen I. Ryu, Krishna V. Shenoy, and Krishna V. Shenoy. Neural population dynamics during reaching. Nature, 487(7405):51–56, 2012. * [14] David Corne and Michael Adam Lones. Evolutionary algorithms. In Handbook of Heuristics. Springer, 2018. * [15] John P. Cunningham and Byron M. Yu. Dimensionality reduction for large-scale neural recordings. Nature Neuroscience, 17(11):1500–1509, 2014. * [16] D. Cyranoski. Marmoset model takes centre stage. Nature, 459(492), 2009. * [17] Ted M. Dawson, Todd E. Golde, and Clotilde Lagier-Tourenne. Animal models of neurodegenerative diseases. Nature Neuroscience, 21(10):1370–1379, 2018. * [18] G. Du, P. Zhuang, M. Hallett, Y. Q. Zhang, J. Y. Li, and Y. J. Li. Properties of oscillatory neuronal activity in the basal ganglia and thalamus in patients with Parkinson’s disease. Translational Neurodegeneration, 7(1):1–13, 2018. * [19] Salvador Dura-Bernal, Benjamin A Suter, Padraig Gleeson, Matteo Cantarelli, Adrian Quintana, Facundo Rodriguez, David J Kedziora, George L Chadderdon, Cliff C Kerr, Samuel A Neymotin, Robert A McDougal, Michael Hines, Gordon MG Shepherd, and William W Lytton. Netpyne, a tool for data-driven multiscale modeling of brain circuits. eLife, 8:e44494, apr 2019. * [20] Andreas K. Engel, Pascal Fries, and Wolf Singer. Dynamic predictions: Oscillations and synchrony in top–down processing. Nature Reviews Neuroscience, 2(10):704–716, 2001. * [21] AmirAli Farokhniaee and Madeleine M Lowery. Cortical network effects of subthalamic deep brain stimulation in a thalamo-cortical microcircuit model. Journal of Neural Engineering, 18(5):056006, 2021. * [22] John E Fleming, Eleanor Dunn, and Madeleine M Lowery. Simulation of closed-loop deep brain stimulation control schemes for suppression of pathological beta oscillations in parkinson’s disease. Frontiers in neuroscience, 14:166, 2020. * [23] Pascal Fries. Rhythms for Cognition: Communication through Coherence. Neuron, 88(1):220–235, 2015. * [24] Adriana Galvan, Annaelle Devergnas, and Thomas Wichmann. Alterations in neuronal activity in basal ganglia-thalamocortical circuits in the parkinsonian state. Frontiers in Neuroanatomy, 9(February):5, 2015. * [25] Adriana Galvan and Thomas Wichmann. Pathophysiology of parkinsonism. Clinical neurophysiology, 119(7):1459–1474, 2008. * [26] Carl Gold, Darrell A Henze, Christof Koch, and Gyorgy Buzsaki. On the origin of the extracellular action potential waveform: a modeling study. Journal of neurophysiology, 95(5):3113–3128, 2006. * [27] Kevin Gurney, Tony J. Prescott, Jeffery R. Wickens, and Peter Redgrave. Computational models of the basal ganglia: from robots to membranes. Trends in Neurosciences, 27(8):453 – 459, 2004. * [28] Jorge Gámez, Germán Mendoza, Luis Prado, Abraham Betancourt, and Hugo Merchant. The amplitude in periodic neural state trajectories underlies the tempo of rhythmic tapping. PLOS Biology, 17(4):1–32, 04 2019. * [29] P. Halje, Ivani Brys, Juan J. Mariman, Claudio Da Cunha, Romulo Fuentes, and Per Petersson. Oscillations in cortico-basal ganglia circuits: Implications for parkinson’s disease and other neurologic and psychiatric conditions. Journal of Neurophysiology, 122(1):203–231, 2019. * [30] Craig Denis Hardman, Jasmine Monica Henderson, David Isaac Finkelstein, Malcolm Kenneth Horne, George Paxinos, and Glenda Margaret Halliday. Comparison of the basal ganglia in rats, marmosets, macaques, baboons, and humans: Volume and neuronal number for the output, internal relay, and striatal modulating nuclei. Journal of Comparative Neurology, 445(3):238–255, 2002. * [31] Michael Hines, Andrew Davison, and Eilif Muller. Neuron and python. Frontiers in Neuroinformatics, 3:1, 2009. * [32] Allan L Hodgkin and Andrew F Huxley. Currents carried by sodium and potassium ions through the membrane of the giant axon of loligo. The Journal of physiology, 116(4):449–472, 1952. * [33] A. J. N. Holgado, J. R. Terry, and R. Bogacz. Conditions for the Generation of Beta Oscillations in the Subthalamic Nucleus-Globus Pallidus Network. Journal of Neuroscience, 30(37):12340–12352, 2010. * [34] M. D. Humphries, R. D. Stewart, and K. N. Gurney. A Physiologically Plausible Model of Action Selection and Oscillatory Activity in the Basal Ganglia. Journal of Neuroscience, 26(50):12921–12942, 2006. * [35] Mark Humphries and Kevin Gurney. Network effects of subthalamic deep brain stimulation drive a unique mixture of responses in basal ganglia output. The European journal of neuroscience, 36:2240–51, 07 2012. * [36] Mark D. Humphries, Jose Angel Obeso, and Jakob Kisbye Dreyer. Insights into Parkinson’s disease from computational models of the basal ganglia. Journal of Neurology, Neurosurgery and Psychiatry, 40, 2018. * [37] E. M. Izhikevich. Simple model of spiking neurons. IEEE Transactions on Neural Networks, 14(6):1569–1572, 2003. * [38] Geetika Kharkwal, Karen Brami-Cherrier, José E. Lizardi-Ortiz, Alexandra B. Nelson, Maria Ramos, Daniel Del Barrio, David Sulzer, Anatol C. Kreitzer, and Emiliana Borrelli. Parkinsonism driven by antipsychotics originates from dopaminergic control of striatal cholinergic interneurons. Neuron, 91(1):67–78, 2016. * [39] Noriyuki Kishi, Kenya Sato, Erika Sasaki, and Hideyuki Okano. Common marmoset as a new model animal for neuroscience research and genome editing technology. Development Growth and Differentiation, 56(1):53–62, 2014. * [40] Lucas A. Koelman and Madeleine M. Lowery. Beta-band resonance and intrinsic oscillations in a biophysically detailed model of the subthalamic nucleus-globus pallidus network. Frontiers in Computational Neuroscience, 13:77, 2019. * [41] James B. Koprich, Lorraine V. Kalia, and Jonathan M. Brotchie. Animal models of $\alpha$-synucleinopathy for Parkinson disease drug development. Nature Reviews Neuroscience, 18(9):515–529, 8 2017. * [42] Jeffrey L. Krichmar. Neurorobotics—a thriving community and a promising pathway toward intelligent cognitive robots. Frontiers in Neurorobotics, 12:42, 2018. * [43] Karthik Kumaravelu, David T. Brocker, and Warren M. Grill. A biophysical model of the cortex-basal ganglia-thalamus network in the 6-OHDA lesioned rat model of Parkinson’s disease. Journal of Computational Neuroscience, 40(2):207–229, 4 2016. * [44] Peter Lakatos, Joachim Gross, and Gregor Thut. A New Unifying Account of the Roles of Neuronal Entrainment. Current Biology, 29(18):R890–R905, 2019. * [45] José Lanciego, Natasha Luquin, and José Obeso. Functional neuroanatomy of the basal ganglia. Cold Spring Harbor perspectives in medicine, 2, 10 2012. * [46] Xiaoyu Li, Ping Zhuang, and Yongjie Li. Altered neuronal firing pattern of the basal ganglia nucleus plays a role in levodopa-induced dyskinesia in patients with parkinson’s disease. Frontiers in Human Neuroscience, 9:630, 2015. * [47] Jean Liénard and Benoît Girard. A biologically constrained model of the whole basal ganglia addressing the paradoxes of connections and selection. Journal of Computational Neuroscience, 36(3):445–468, 2014. * [48] Mikael Lindahl and Jeanette Hellgren Kotaleski. Untangling basal ganglia network dynamics and function: Role of dopamine depletion and inhibition investigated in a spiking network model. eNeuro, 3(6), 2016. * [49] M. Lu, X. Wei, Y. Che, J. Wang, and K. A. Loparo. Application of reinforcement learning to deep brain stimulation in a computational model of parkinson’s disease. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 28(1):339–349, 2020. * [50] Mario Manto, Donna L. Gruol, Jeremy D. Schmahmann, Noriyuki Koibuchi, and Ferdinando Rossi. Handbook of the cerebellum and cerebellar disorders. Handbook of the Cerebellum and Cerebellar Disorders, pages 1–2424, 2013. * [51] Daniel H. Mathalon and Vikaas S. Sohal. Neural oscillations and synchrony in brain dysfunction and neuropsychiatric disorders it’s about time. JAMA Psychiatry, 72(8):840–844, 2015. * [52] Matthew M. McGregor and Alexandra B. Nelson. Circuit Mechanisms of Parkinson’s Disease, 3 2019. * [53] Robert Merrison-Hort, Nada Yousif, Andrea Ferrario, and Roman Borisyuk. Oscillatory Neural Models of the Basal Ganglia for Action Selection in Healthy and Parkinsonian Cases, pages 149–189. Springer International Publishing, Cham, 2017. * [54] Cory T. Miller, Winrich A. Freiwald, David A. Leopold, Jude F. Mitchell, Afonso C. Silva, and Xiaoqin Wang. Marmosets: A Neuroscientific Model of Human Social Behavior. Neuron, 90(2):219–233, 2016. * [55] Jonathan W. Mink. Basal ganglia mechanisms in action selection, plasticity, and dystonia. European Journal of Paediatric Neurology, 22(2):225 – 229, 2018\. Movement Disorders. * [56] Jude F. Mitchell and David A. Leopold. The marmoset monkey as a model for visual neuroscience. Neuroscience Research, 93:20 – 46, 2015. Marmoset Neuroscience. * [57] Jan Morén, Jun Igarashi, Osamu Shouno, Junichiro Yoshimoto, and Kenji Doya. Dynamics of basal ganglia and thalamus in parkinsonian tremor. In Multiscale Models of Brain Disorders, pages 13–20. Springer, 2019. * [58] Vignayanandam Ravindernath Muddapu, Alekhya Mandali, V. Srinivasa Chakravarthy, and Srikanth Ramaswamy. A computational model of loss of dopaminergic cells in parkinson’s disease due to glutamate-induced excitotoxicity. Frontiers in Neural Circuits, 13:11, 2019. * [59] Simon Musall, Anne E Urai, David Sussillo, and Anne K Churchland. Harnessing behavioral diversity to understand neural computations for cognition. Current Opinion in Neurobiology, 58:229 – 238, 2019. Computational Neuroscience. * [60] Meinard Müller. Dynamic Time Warping, pages 69–84. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007. * [61] Atsushi Nambu, Hironobu Tokuno, and Masahiko Takada. Functional significance of the cortico-subthalamo-pallidal ’hyperdirect’ pathway. Neuroscience Research, 43(2):111–117, 2002. * [62] Eva M Navarro-Lopez, Utku Çelikok, and Neslihan S Şengör. A dynamical model for the basal ganglia-thalamo-cortical oscillatory activity and its implications in parkinson’s disease. Cognitive Neurodynamics, pages 1–28, 2020. * [63] Christian Nowke, Sandra Diaz-Pier, Benjamin Weyers, Bernd Hentschel, Abigail Morrison, Torsten W. Kuhlen, and Alexander Peyser. Toward rigorous parameterization of underconstrained neural network models through interactive visualization and steering of connectivity generation. Frontiers in Neuroinformatics, 12:32, 2018. * [64] Jose A. Obeso, Concepcio Marin, C. Rodriguez-Oroz, Javier Blesa, B. Benitez-Temiño, Juan Mena-Segovia, Manuel Rodríguez, and C. Warren Olanow. The basal ganglia in Parkinson’s disease: Current concepts and unexplained observations. Annals of Neurology, 64(S2):S30–S46, 1 2009. * [65] Harilal Parasuram, Bipin Nair, Egidio D’Angelo, Michael Hines, Giovanni Naldi, and Shyam Diwakar. Computational modeling of single neuron extracellular electric potentials and network local field potentials using lfpsim. Frontiers in Computational Neuroscience, 10:65, 2016. * [66] Alex Pavlides, S. John Hogan, and Rafal Bogacz. Computational models describing possible mechanisms for generation of excessive beta oscillations in parkinson’s disease. PLOS Computational Biology, 11:1–29, 12 2015. * [67] George Paxinos, Charles Watson, Michael Petrides, Marcello Rosa, and Hironobu Tokuno. The marmoset brain in stereotaxic coordinates. Academic Press, 2012. * [68] Rodrigo Pena, Cesar Ceballos, Júnia de Deus, Antonio Roque, Norberto Garcia-Cairasco, Ricardo Leao, and Alexandra Cunha. Modeling hippocampal ca1 gabaergic synapses of audiogenic rats. International Journal of Neural Systems, 30:2050022, 03 2020. * [69] Rolf Pfeifer and Josh C. Bongard. How the Body Shapes the Way We Think: A New View of Intelligence (Bradford Books). The MIT Press, 2006. * [70] Jhielson M. Pimentel, Renan C. Moioli, Mariana F. P. de Araujo, Caetano M. Ranieri, Roseli A. F. Romero, Frank Broz, and Patricia A. Vargas. Neuro4pd: An initial neurorobotics model of parkinson’s disease. Frontiers in Neurorobotics, 15:88, 2021. * [71] Werner Poewe, Klaus Seppi, Caroline M. Tanner, Glenda M. Halliday, Patrik Brundin, Jens Volkmann, Anette Eleonore Schrag, and Anthony E. Lang. Parkinson disease. Nature Reviews Disease Primers, 3:1–21, 2017. * [72] Tony Prescott, Fernando González, Kevin Gurney, Mark Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural networks : the official journal of the International Neural Network Society, 19:31–61, 02 2006. * [73] Tony J. Prescott, Fernando M. Montes González, Kevin Gurney, Mark D. Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural Networks, 19(1):31–61, 1 2006. * [74] Savva Pronin, Liam Wellacott, Jhielson M Pimentel, Renan C Moioli, and Patricia A Vargas. Neurorobotic Models of Neurological Disorders: A Mini Review. Frontiers in Neurorobotics, 15:26, 2021. * [75] Kenneth Price Rainer Storn. Differential Evolution – A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces. Journal of Global Optimization, 11:341–359, 1997. * [76] C. M. Ranieri, R. C. Moioli, R. A. F. Romero, M. F. P. de Araújo, M. B. De Santana, J. M. Pimentel, and P. A. Vargas. Unveiling parkinson’s disease features from a primate model with deep neural networks. In 2020 International Joint Conference on Neural Networks (IJCNN), pages 1–8, 2020. * [77] K. Deergha Rao, M.N.S. Swamy, K. Deergha Rao, and M.N.S. Swamy. Spectral analysis of signals. In Digital Signal Processing, pages 721–751. Springer Singapore, 2018. * [78] Peter Redgrave, Manuel Rodriguez, Yoland Smith, Maria C. Rodriguez-Oroz, Stephane Lehericy, Hagai Bergman, Yves Agid, Mahlon R. Delong, and Jose A. Obeso. Goal-directed and habitual control in the basal ganglia: Implications for Parkinson’s disease. Nature Reviews Neuroscience, 11(11):760–772, 2010. * [79] M. R. Romano, R. C. Moioli, and L. A. Elias. Evaluation of frequency-dependent effects of deep brain stimulation in a cortex-basal ganglia-thalamus network model of parkinson’s disease*. In 2020 42nd Annual International Conference of the IEEE Engineering in Medicine Biology Society (EMBC), pages 3638–3641, 2020. * [80] J.R. Rosenberg, A.M. Amjad, P. Breeze, D.R. Brillinger, and D.M. Halliday. The fourier approach to the identification of functional coupling between neuronal spike trains. Progress in Biophysics and Molecular Biology, 53(1):1 – 31, 1989\. * [81] Peter J Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics, 20:53–65, 1987\. * [82] Jonathan Rubin and David Terman. High frequency stimulation of the subthalamic nucleus eliminates pathological thalamic rhythmicity in a computational model. Journal of computational neuroscience, 16:211–35, 05 2004. * [83] Jonathan E Rubin, Cameron C McIntyre, Robert S Turner, and Thomas Wichmann. Basal ganglia activity patterns in parkinsonism and computational modeling of their downstream effects. European Journal of Neuroscience, 36(2):2213–2228, 2012. * [84] Abigail A. Russo, Ramin Khajeh, Sean R. Bittner, Sean M. Perkins, John P. Cunningham, Laurence F. Abbott, and Mark M. Churchland. Neural trajectories in the supplementary motor area and primary motor cortex exhibit distinct geometries, compatible with different classes of computation. bioRxiv, 2019. * [85] Stan Salvador and Philip Chan. Toward accurate dynamic time warping in linear time and space. Intelligent Data Analysis, 11(5):561–580, 2007. * [86] Terence D. Sanger. A computational model of deep-brain stimulation for acquired dystonia in children. Frontiers in Computational Neuroscience, 12:77, 2018. * [87] M. Santana, T. Palmér, H. Simplício, R. Fuentes, and P. Petersson. Characterization of long-term motor deficits in the 6-OHDA model of Parkinson’s disease in the common marmoset. Behavioural Brain Research, 290:90–101, 2015. * [88] Maxwell B. Santana, Pär Halje, Hougelle Simplício, Ulrike Richter, Marco Aurelio M. Freire, Per Petersson, Romulo Fuentes, and Miguel A.L. Nicolelis. Spinal cord stimulation alleviates motor deficits in a primate model of Parkinson Disease. Neuron, 84(4):716–722, 11 2014. * [89] Luis Santos, Javier Fernandez-Rio, Kristian Winge, Beatriz Barragán-Pérez, Vicente Rodríguez-Pérez, Vicente González-Díez, Miguel Blanco-Traba, Oscar E. Suman, Charles Philip Gabel, and Javier Rodríguez-Gómez. Effects of supervised slackline training on postural instability, freezing of gait, and falls efficacy in people with parkinson’s disease. Disability and Rehabilitation, 39(16):1573–1580, 2017. PMID: 27416005. * [90] Henning Schroll and Fred Hamker. Computational models of basal-ganglia pathway functions: focus on functional neuroanatomy. Frontiers in Systems Neuroscience, 7:122, 2013. * [91] A. Sharott, C. K. E. Moll, G. Engler, M. Denker, S. Grun, and A. K. Engel. Different Subtypes of Striatal Neurons Are Selectively Modulated by Cortical Oscillations. Journal of Neuroscience, 29(14):4571–4585, 2009. * [92] Osamu Shouno, Yoshihisa Tachibana, Atsushi Nambu, and Kenji Doya. Computational model of recurrent subthalamo-pallidal circuit for generation of parkinsonian oscillations. Frontiers in neuroanatomy, 11:21, 2017. * [93] J. Shulman, P. De Jager, and M. Feany. Parkinson’s disease: Genetics and pathogenesis. Parkinson’s Disease: Genetics and Pathogenesis, pages 1–386, 2011\. * [94] W. Singer. Neuronal Synchrony: A Versatile Code for the Definition of Relations? Neuron, 24:49–65, 1999. * [95] Anke H. Snijders and Bastiaan R. Bloem. Cycling for freezing of gait. New England Journal of Medicine, 362(13):e46, 2010. PMID: 20357278. * [96] H. Stephan, G. Baron, and W. K. Schwerdtfeger. The Brain of the Common Marmoset (Callithrix jacchus). Springer-Verlag Berlin Heidelberg, 1980. * [97] D. James Surmeier, Steven M. Graves, and Weixing Shen. Dopaminergic modulation of striatal networks in health and Parkinson’s disease. Current Opinion in Neurobiology, 29:109–117, 2014. * [98] Shreyas M. Suryanarayana, Jeanette Hellgren Kotaleski, Sten Grillner, and Kevin N. Gurney. Roles for globus pallidus externa revealed in a computational model of action selection in the basal ganglia. Neural Networks, 109:113–136, 2019. * [99] David Sussillo. Neural circuits as computational dynamical systems. Current Opinion in Neurobiology, 25:156–163, 2014. * [100] D Terman, J E Rubin, A C Yew, and C J Wilson. Activity Patterns in a Model for the Subthalamopallidal Network of the Basal Ganglia. The Journal of Neuroscience, 22(7):1–14, 2002. * [101] Gerd Tinkhauser, Alek Pogosyan, Huiling Tan, Damian M. Herz, Andrea A. Kühn, and Peter Brown. Beta burst dynamics in Parkinson’s disease off and on dopaminergic medication. Brain, 140(11):2968–2981, 11 2017. * [102] Meropi Topalidou, Daisuke Kase, Thomas Boraud, and Nicolas P. Rougier. A computational model of dual competition between the basal ganglia and the cortex. eNeuro, 5(6), 2018. * [103] Adriano BL Tort, Maximilian Hammer, Jiaojiao Zhang, Jurij Brankačk, and Andreas Draguhn. Causal relations between cortical network oscillations and breathing frequency. bioRxiv, 2020. * [104] Peter J. Uhlhaas and Wolf Singer. Abnormal neural oscillations and synchrony in schizophrenia. Nature Reviews Neuroscience, 11(2):100–113, 2010. * [105] S. J. van Albada and P. A. Robinson. Mean-field modeling of the basal ganglia-thalamocortical system. I. Firing rates in healthy and parkinsonian states. Journal of Theoretical Biology, 257(4):642–663, 2009. * [106] Manish Verma, Mauly Srivastava, Neha Chack, Atul Kumar Diswar, and Nidhi Gupta. A comparative study of various clustering algorithms in data mining. International Journal of Engineering Research and Applications (IJERA), 2(3):1379–1384, 2012. * [107] Doris D. Wang, Coralie de Hemptinne, Svjetlana Miocinovic, Jill L. Ostrem, Nicholas B. Galifianakis, Marta San Luciano, and Philip A. Starr. Pallidal deep-brain stimulation disrupts pallidal beta oscillations and coherence with primary motor cortex in parkinson’s disease. Journal of Neuroscience, 38(19):4556–4568, 2018. * [108] Doris D Wang, Coralie de Hemptinne, Svjetlana Miocinovic, Salman E Qasim, Andrew M Miller, Jill L Ostrem, Nicholas B Galifianakis, Marta San Luciano, and Philip A Starr. Subthalamic local field potentials in parkinson’s disease and isolated dystonia: an evaluation of potential biomarkers. Neurobiology of disease, 89:213–222, 2016. * [109] Svante Wold, Kim Esbensen, and Paul Geladi. Principal component analysis. Chemometrics and intelligent laboratory systems, 2(1-3):37–52, 1987\. * [110] Byron M. Yu, John P. Cunningham, Gopal Santhanam, Stephen I. Ryu, Krishna V. Shenoy, and Maneesh Sahani. Gaussian-process factor analysis for low-dimensional single-trial analysis of neural population activity. Journal of Neurophysiology, 102(1):614–635, 2009. PMID: 19357332.
arxiv-papers
2021-07-27T01:09:11
2024-09-04T03:07:20.248418
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Caetano M. Ranieri, Jhielson M. Pimentel, Marcelo R. Romano, Leonardo\n A. Elias, Roseli A. F. Romero, Michael A. Lones, Mariana F. P. Araujo,\n Patricia A. Vargas, Renan C. Moioli", "submitter": "Caetano Mazzoni Ranieri", "url": "https://arxiv.org/abs/2107.12536" }
2107.12540
# A Neurorobotics Approach to Behaviour Selection based on Human Activity Recognition Caetano M. Ranieri Institute of Mathematical and Computer Sciences University of Sao Paulo Sao Carlos, SP, Brazil [email protected] &Renan C. Moioli Digital Metropolis Institute Federal University of Rio Grande do Norte Natal, RN, Brazil [email protected] &Patricia A. Vargas Edinburgh Centre for Robotics Heriot-Watt University Edinburgh, Scotland, UK [email protected] &Roseli A. F. Romero Institute of Mathematical and Computer Sciences University of Sao Paulo Sao Carlos, SP, Brazil [email protected] ###### Abstract Behaviour selection has been an active research topic for robotics, in particular in the field of human-robot interaction. For a robot to interact effectively and autonomously with humans, the coupling between techniques for human activity recognition, based on sensing information, and robot behaviour selection, based on decision-making mechanisms, is of paramount importance. However, most approaches to date consist of deterministic associations between the recognised activities and the robot behaviours, neglecting the uncertainty inherent to sequential predictions in real-time applications. In this paper, we address this gap by presenting a neurorobotics approach based on computational models that resemble neurophysiological aspects of living beings. This neurorobotics approach was compared to a non-bioinspired, heuristics-based approach. To evaluate both approaches, a robot simulation is developed, in which a mobile robot has to accomplish tasks according to the activity being performed by the inhabitant of an intelligent home. The outcomes of each approach were evaluated according to the number of correct outcomes provided by the robot. Results revealed that the neurorobotics approach is advantageous, especially considering the computational models based on more complex animals. _K_ eywords Behaviour selection $\cdot$ Human activity recognition $\cdot$ Robot simulation $\cdot$ Neurorobotics $\cdot$ Bioinspired computational model ## 1 Introduction Truly autonomous behaviour is still not the norm for robots designed to interact socially with humans [6]. In general, behaviour selection has been an active research topic for robotics in general, and human-robot interaction in particular [19]. In this context, the need for a real-time understanding of human actions is of paramount importance for the robotic agent to behave proactively and effectively. Such a requirement could be achieved with techniques for human activity recognition [32]. When dealing with complex modalities (e.g., videos or data from inertial units), activity recognition approaches often rely on machine learning. For instance, video-based activity recognition have been approached by architectures based on convolutional and recurrent neural networks [15, 29]. For inertial data, similar architectures have been proposed, processing either raw data [35, 10] or descriptors obtained through feature extraction methods [47, 1]. To provide a wider range of possibilities, robots may act symbiotically with other pervasive devices, such as wearable technologies or ambient sensors in intelligent environments, which may provide additional capabilities for sensing and acting based on application-specific components [2]. When synchronised data from different sensors are available, activity recognition techniques may rely on multiple sensor modalities to provide more accurate results, giving rise to techniques for multimodal activity recognition [28, 17, 43]. Although human activity recognition has been a quite fertile field of research, few approaches have been developed to link the outputs from those algorithms into actual response behaviours from a robot. Related works usually consist of direct associations between the recognised activities and the response behaviours [11, 25, 44]. One of the possibilities consist of combining computational neuroscience to the robotics scenarios, characterising the field of neurorobotics [51], which may build upon different biological aspects that influence the behaviour of living beings. Li et al. [24] provided a comprehensive survey on neurorobotics systems (NRS) and the different components that may integrate them. According to the authors, a generalised framework can be depicted for most NRSs in the literature, composed of a simulated brain, which is fed with sensory signals from a body and turns them into control signals for a hierarchical controller, responsible for decoding these signals into control commands for the body, which actuates and senses an external environment. Bioinspired strategies may be introduced to different aspects of the framework, according to the required task of a particular study. The basal ganglia, a group of subcortical nuclei present in the vertebrate’s brain, is known to have an important role in action selection mechanisms, especially regarding striatal circuits [30]. The so-called direct and indirect pathways are characterised by competitive or complementary functions that mediate the excitation of the motor system based on inputs from the motivational system of an individual, deciding whether to ”go” or to ”stop” performing a certain behaviour [4]. The potential roles of such a mechanism in robotic frameworks have also been evaluated, including simulations in which bioinspired networks receiving different stimuli are expected to respond with different behaviours, resulting in cooperative interactions that produce robot behaviours [3]. In this paper, we present a neurorobotics model which embeds computational models of the basal ganglia-thalamus-cortex (BG-T-C) circuit [22, 40] to provide a decision-making mechanism for a robot - in this context, we may call it a neurorobot. The neurorobotics approach has been proposed for enhancing the decision-making mechanism, as suggested by related researches in neurorobotics [26, 33]. It consisted of simulating neurophysiological aspects within a cognitive framework, in which different stimuli was introduced to certain brain structures within the circuit, according to real-time outputs of the activity recognition module. The resulting spike trains from the neurorobotics model were then converted to neural firing frequencies across brain regions, which would be further decoded using convolutional neural networks, in order to infer the most suitable response behaviour for the robot. The application scenario is a simulated smart home, in which an activity recognition model, presented in [41] for the HWU-USP activities dataset [38], was employed in human-robot interaction tasks, using a mobile robot. In summary, the robot needs to produce response behaviours according to the contextual information inferred by the user (i.e., the recognised activity). The neurorobotics approach, which is the central contribution of this work, was compared to a heuristics approach, in which a deterministic behaviour selection mechanism was considered using simple heuristics that associate recognised activities to robot behaviours. This neurorobotics approach embedded two computational models, one that resembled neurophysiological data of rodents (i.e., the rat model), and one that resembled data from marmoset monkeys (i.e., the primate model). The different factors considered for this study were evaluated according to the relative number of correct outcomes of the robot simulation. Considering the activity recognition framework, the results have confirmed that more accurate classifiers for the activity recognition module led to a greater number of robot tasks successfully completed. Although the performances of the heuristic and neurorobotics approaches varied according to the computational model embedded, the study confirmed that the most complex neurorobotics model (i.e., the marmoset-based model of the BG-T-C circuit) led to an increased performance in relation to the heuristic approaches when a more accurate activity recogniser was considered (i.e., the video-based classifier). The remainder of this paper is organised as follows. The brain structures considered for this neurorobotics approach and the computational modelling adopted are presented in Section 2. In Section 3, are presented the general aspects of the robotic system, and the integration between each of its modules. In Section 4, the neurorobotics approach is detailed. In Section 5, the methods and implementations are depicted. The corresponding results are presented in Section 6 and discussed in Section 7. Finally, the concluding remarks and directions for future research are provided in Section 8. ## 2 The BG-T-C Circuit and Original Computational Models In this section, we present the basic concepts on the brain structures present in the basal ganglia-thalamus-cortex (BG-T-C) circuit, and the original computational modelling. The BG-T-C circuit, illustrated in Figure 1, is formed by the motor cortex (M1), the thalamus (TH), and the basal ganglia (BG), the latter composed of a subset of structures: the striatum (Str), the globus pallidus, divided into pars interna (GPi) and pars externa (GPe), the subthalamic nucleus (STN), and the substantia nigra, divided into pars compacta (SNc) and pars reticulata (SNr). In [31], is provided a discussion about the mechanisms of this circuit and presented models to describe it. The most useful model to explain the connections within this circuit, especially those affected by PD, is the so- called classic model, illustrated in Figure 1(a). (a) Classic model, as described by [31]. (b) Computational model, as designed by [22] for rodent data, and adapted by [40] for primate data. Figure 1: Schematic representations of the classic and computational models of the BG-T-C circuit. In the connections, excitatory synapses are shown as blue arrows, and inhibitory synapses, as red squares. The pathways start with an excitatory connection from the cortex to the striatum, which projects its output neurons, named medium spiny neurons (MSN), to other structures inside the BG. In the direct pathway, the direct MSN (dMSN) inhibits the GPi, which reduces its inhibition to the TH. Then, it excites the motor cortex. In the indirect pathway, the indirect MSN (iMSN) inhibits the GPe, which reduces its inhibition to the STN, which excites the GPi. Thus, this results on inhibition of the TH and absence of excitatory outputs to the motor cortex. In other words, the direct pathway excites the cortex (i.e., positive feedback loop), while the indirect pathway inhibits it (i.e., negative feedback loop). In [22], a computational model of the BG-C-T circuit, originaly developed to study the underlying mechanisms of Parkinson’s Disease (PD), was proposed and implemented based on neural data from healthy and PD-induced (i.e., 6-OHDA lesioned) rats [18]. Eight brain structures were modelled and connected based on a simplified version of the classic model (see Figure 1(b)). In particular, the direct and indirect pathways were modelled separately representing the MSN modulation by D1 and D2 dopamine receptors in the striatum (i.e., StrD1 and StrD2, respectively). The cortex is represented by regular spiking (RS) excitatory neurons and fast spiking (FSI) inhibitory interneurons (i.e., CtxRS and CtxFSI, respectively). A bias current was added in the TH, GPe, and GPi, accounting for the inputs not explicitly modelled. This model was designed with the ability to shift from the simulation of healthy to the PD status, which is done by altering certain conductances. Although all mammals have a similar set of BG structures that are similarly connected with thalamic and cortical structures, subtle differences between species may be found, with primates being more similar to humans than rodents [27, 21, 7]. A data-driven approach was proposed in [40] to obtain a primate- based computational model of the BG-T-C circuit and the mechanisms of PD. The resulting marmoset computational model was evaluated based on the differences between healthy and PD individuals, with respect to the spectral signature of the brain activity [49], the dynamics of the firing rates of neurons across brain regions [50], and the coherence between spike trains [14]. The implementation used in [40] built on a Python translation of the original computational model of [22], originally made by [46] using the NetPyNE framework and the libraries from the NEURON simulator [8]. Based on the results of the machine learning framework, a practical setup of either the rat or marmoset computational models was made available. The adaptations performed in this work to the original computational models (see Subsection 4.1) were based on the code made available by the authors. For all neurorobotics model evaluations, we considered both the rat and primate computational models, always with the healthy state set on. ## 3 Integrated System The modules of the application scenario, and the interactions between them, are illustrated in Figure 2. In this scenario, the human activities are inferred by a machine learning algorithm, and the supporting behaviours are performed by a mobile robot placed in a simulated environment, composing an ambient assisted living (AAL) application [5]. The general information flow was: given the multimodal data provided by a set of sensors within a sensed environment, apply an activity recognition module to classify such data into a set of predefined human activities, and produce correspondent response behaviours for a mobile robot. The neurorobotics approach was compared to a heuristics approach. The heuristics approach (Figure 2(a)) consisted of associating the predictions of the activity recognition module to response behaviours based on simple heuristics, presented in Subsection 5.4. In the neurorobotics approach (Figure 2(b)), the predictions from the activity recognition module were employed to stimulate a bioinspired computational model, whose outputs (i.e., neural firing frequencies of brain simulated regions) were decoded by a CNN-based decoder, which provided the decisions for the mobile robot. (a) Heuristics approach: the predictions from the activity recognition module are fed directly to the mobile robot. (b) Neurorobotics approach: the predictions are used as stimuli for the embedded, bioinspired computational model of the BG-T-C circuit, which simulates neural activity that is further interpreted by a CNN-based decoder, responsible for deciding the behaviour to be performed by the robot. Both the bioinspired computational model and the CNN-based decoder compose the neurorobotics model presented in this research. Figure 2: Interaction between modules for the application scenario proposed. More specifically, a sensed environment consisted of a previously collected dataset [38], composed by a set of recording sessions $X$, with each $x\in X$ associated to an activity $a\in A=\\{a_{1},\dots,a_{N_{A}}\\}$, where $N_{A}$ is the number of classes (i.e., labels) considered for this dataset. The function describing these associations is given by Equation 1. $\begin{split}f_{A}:X\rightarrow A\Longleftrightarrow f_{A}(x)=a,\\\ x\in X,\quad a\in A\end{split}$ (1) Each data tuple $x(t)$ comprises a segment, with a previously defined length, of a recording session $x$ starting at timestep $t\in T_{x}=\\{1,\dots,N_{T_{X}}\\}$, equally spaced among them, to be segmented from $x$. The activity recognition module is a machine learning classifier $g\in G$, which might associate a recording session $x\in X$ at timestep $t\in T_{X}$ to an activity $a\in A$, through a prediction vector $y_{x}^{t}\in Y$ (see Equation 2). In other words, considering that $a$ is unknown at inference time, the inference model $g$, learned from labelled samples, provides a prediction vector $y_{x}^{t}$, where $y_{x}^{t}(a)$ is the probability that a given input $x(t)$ corresponds to activity $a$. $\begin{split}g:X\times T\rightarrow Y\Longleftrightarrow g(x,t)=y_{x}^{t},\\\ x\in X,\quad t\in T,\quad y_{x}^{t}\in Y\end{split}$ (2) The application scenario was designed so that each activity in $A$ was associated to a desired response for the mobile robot. We defined a set of response behaviours $B=\\{b1,\dots,b_{N_{B}}\\}$, so that each human activity $a\in A$ can be, but not necessarily is, associated to a response behaviour of the robot. The ”no action” behaviour is denoted as $b_{\emptyset}$. Hence, the function that associates recognised activities to response behaviours is given by Equation 3. $\begin{split}f_{B}:A\rightarrow B\cup\\{b_{\emptyset}\\}\Longleftrightarrow f_{B}(a)=b,\\\ a\in A,\quad b\in B\cup\\{b_{\emptyset}\\}\end{split}$ (3) The robot simulation would be considered successfully completed if: * • For an activity $a$ being performed in the environment in a session $x$, the robot completed an expected response behaviour $b\in B$ before $x$ was finished; or * • No response behaviour was expected (i.e., $f_{B}(a)=b_{\emptyset}$) and the robot did not complete any of the behaviours in $B$. It is worth to notice that, according to this evaluation policy, besides an accuracy requirement (i.e., the correct behaviour must be given in response to a human activity), there was also a time constraint that must be satisfied (i.e., if required, the response behaviour must be completed while the human is still performing the given activity). Since, by definition, $f_{A}(x)=a$ is not known at runtime, and can only be inferred by a classifier $g\in G$ as successive prediction vectors $y_{x}^{t}$ are provided, a decision-making mechanism was needed to perform adaptive decisions based on partial, time-localised predictions. To this aim, we proposed the neurorobotics model presented in Section 4, and compared it to a simple heuristics-based approach as described in Section 5. ## 4 The Neurorobotics Model The neurorobotics model embeds the bioinspired computational model and the CNN-based decoder (see Figure 2). It consists of simulating and decoding the neurophysiological mechanisms of the basal ganglia-thalamus-cortex (BG-T-C) circuit in mammals (see Section 2), responsible for abilities such as motor control, decision-making, and learning [12, 26, 33]. As already stated in Section 2, both the rat-based [22] and the marmoset-based [40] computational models were evaluated as a decision-making mechanism of the neurorobotics model. ### 4.1 Bioinspired Computational Model Motivated by the work of [33], two key modifications were introduced to the computational models of the BG-T-C circuit adopted in this work [22, 40]. First, an additional structure, called prefrontal cortex (PFC), was included as a variable source of excitatory stimuli towards the striatum (see Figure 3(a)). Second, $N_{C}=N_{B}$ populations of neurons were implemented as independent channels $c\in C$, each associated to exactly one response behaviour $b\in B$ (see Figure 3(b)), as defined in Equation 4. $\begin{split}f_{C}:B\rightarrow C\Longleftrightarrow f_{C}(c)=b,\\\ b\in B,\quad c\in C\end{split}$ (4) (a) Schematic representation of the computational model as adapted in this work. In the connections, excitatory synapses are shown as blue or green arrows, and inhibitory synapses, as red squares. The blue arrows and red squares correspond to the original synapses as designed by [22] and adapted by [40], while the green arrows are the adaptations provided in this work to allow the stimulation of the circuit in the context of the application scenario proposed. (b) Predictions from the activity recognition module are interpreted as stimulation originated on the prefrontal cortex (PFC), which selectively stimulates different populations of the computational model, each associated to one response behaviour of the robot. Figure 3: Adapted version of the computational model of the BG-T-C circuit. At each timestep, the channels $c\in C$ received a stimulus $s\in S=\\{s_{1},\dots,s_{N_{C}}\\}$, whose intensity was based on the linear combination between a prediction vector $y_{x}^{t}$ and a weight function $f_{W}$, given by Equation 5. The actual value of $s$ is given by function $f_{S}$, defined as in Equation 6. $\begin{split}f_{W}:C\times A\rightarrow\\{0,1\\}\Longleftrightarrow f_{W}(c,a)=\begin{cases}1,\quad\text{if }f_{B}(a)=f_{C}(c)\\\ 0,\quad\text{otherwise}\end{cases}\\\ c\in C,\quad a\in A\end{split}$ (5) $\begin{split}f_{S}:C\times A\rightarrow S\Longleftrightarrow f_{S}(c,a)=s=\sum_{a\in A}f_{W}(c,a)\cdot y_{x}^{t}(a)\\\ c\in C,\quad a\in A,\quad s\in S\end{split}$ (6) Considering that, as ensured by the softmax activation on the classifiers, $\sum_{a\in A}y_{x}^{t}(a)=1$, then $s\in[0,1]\mu A/cm^{2}$, which has shown to be a stable, biologically plausible interval. For a recording sequence $x$, the set of prediction vectors $y_{x}$ is employed to update periodically each stimulus $s\in S$, during the course of a corresponding simulation of the computational model (not to be confused with the robot simulation). For each simulation, $N_{T_{\text{sim}}}$ subsequent updates would be done for all $s\in S$, computed for the timesteps in $y_{x}$. A simulation, after finished, produced a spike train for each of the brain regions modelled, contemplating all its length (i.e., all $N_{T_{\text{sim}}}$ updates were considered). The neural firing frequencies were computed according to [23], with the parameters detailed in Subsection 5.3, and summed across each region of each channel, resulting in $N_{R}\cdot N_{C}$ output signals for each simulation, each with length $L_{U}$, where $N_{R}=8$ is the number of regions (see Figure 1b). Formally, let $u_{x}^{g,m}\in U$ be defined as the output for a given simulation, where $x\in X$ is a recording session, $g\in G$ is the classifier employed for activity recognition, and $m\in M$, a computational model. Therefore, let a simulation be defined as $f_{U}$ (see Equation 7), whose output is as a multivariate time-series with $N_{R}\cdot N_{C}$ variables and $L_{U}$ timesteps. $\begin{split}f_{U}:X\times G\times M\rightarrow U\Longleftrightarrow f_{U}(x,g,m)=u_{x}^{g,m}\\\ (x,g,m)\in X\times G\times M,\quad u\in U\end{split}$ (7) After the simulations were completed, the spike trains at the cortex populations were converted into temporal signals (i.e., neural firing frequencies) based on the mean firing rates across brain regions [23]. The resulting signals were segmented in smaller windows and applied to train and evaluate a convolutional neural network (CNN), which would be employed to determine the decision of the robot at each timestep of the robot simulation (i.e., the CNN-based decoder). More details on the implementation of the CNN- based decoder are presented in the next section. ### 4.2 CNN-Based Decoder Each simulation of the computational model provided the summed neural firing frequencies of each channel and brain region, generating a data structure $u_{x}^{g,m}$, associated to the whole recording session that generated it. As a requirement to provide a realistic scenario for the robot simulation, time- localised decisions were required, which must be taken based only in past events. In other words, at a timestep $t_{\text{robot}}=i$ of the robot simulation, only predictions obtained on timesteps $t_{j},j<i$ could be taken into account when providing a response behaviour to the robot. To fulfil this requirement, each instance $u_{x}^{g,m}$, correspondent to the recording session $x\in X$ in the set of conditions $g\in G$ and $m\in M$ (see Equation 7), was segmented in windows of $N_{V}$ timesteps, with partial superposition, producing $N_{\text{segs}}$ segments. Considering $N_{X}$ recording sessions in a given set of conditions, the function $f_{v}$ would generate a total of $N_{X}\cdot N_{\text{segs}}$ instances $v\in V$, as defined in Equation 8. $\begin{split}f_{v}:U\times T\rightarrow V\Longleftrightarrow f_{v}(u_{x}^{g,m},t)=v=u_{x}^{g,m}[t,t+N_{V}]\\\ u_{x}^{g,m}\in U,\qquad t\in T\quad|\quad t+N_{V}<L_{U},\qquad v\in V\end{split}$ (8) The resulting segments were employed to train a machine learning decoder (i.e., the CNN-based decoder). We considered only the cortex regions to compose the input tuples for the decoder, aiming to preserve biological plausibility regarding this aspect. Given that each channel of the computational model has two cortex regions (i.e., cortex RS and FSI), and that the experiments were performed with $N_{C}$ channels, associated to the response behaviours $b\in B$, the resulting instances $v$ had shape $N_{V}\times 2N_{C}$. The decoder $f_{Q}$ might be trained to provide a decision vector $q_{x}^{t}$, which corresponds to the probability that a given segment of cortex firing frequencies, given by$v=f_{v}(u_{x}^{g,m},t)$, might be associated to a behaviour in $B\cup\\{b_{\emptyset}\\}$. This decoding function may be defined as in Equation 9. $\begin{split}f_{Q}:V\rightarrow Q\Longleftrightarrow f_{Q}(v)=q_{x}^{t},\\\ v\in V,\quad q_{x}^{t}\in Q\end{split}$ (9) We have adopted a one-dimensional convolutional neural network (CNN) as decoder, which has shown to provide state-of-the-art results in related work [42] (for the architectural choices and hyperparameter settings, see Subsection 5.3). Classification metrics were provided considering that the categorical output is chosen according to Equation 10, where $d_{Q}$ corresponds to a response behaviour. $d_{Q}:Q\rightarrow B\Longleftrightarrow d_{Q}(q_{x}^{t})=argmax(q_{x}^{t})$ (10) Finally, the decisions decoded would be fed to the robot simulation and turned into commands, as discussed in Subsection 5.4. ## 5 Methods In Figure 4, the different factors assessed in this work, already mentioned, are illustrated. Both the heuristics and the neurorobotics approaches were evaluated with two different models of the activity recognition module: the IMU + ambient and the video-based (see Subsection 5.1). For the heuristics approach, a couple heuristics was considered and compared: the window and the exponential (see Subsection 5.4). For the neurorobotics approach, the rat and marmoset computational models were assessed (see Subsections 4.1 and 4.2). Figure 4: Factors and conditions analysed for the heuristics and neurorobotics approaches. For both approaches, two models for the activity recognition module were considered: the IMU + ambient and the video-based. For the heuristics approach, two approaches were analysed for the decision-making mechanism: window or exponential (see Subsection 5.4). For the neurorobotics approach, two computational models of the BG-T-C circuit were considered: the rat-based and the marmoset-based. All code was developed in Python language. The machine learning techniques presented for the activity recognition and the CNN-based decoder were implemented with the Tensorflow/Keras framework. The computational models were implemented using the NetPyNE platform [8]. The robot simulation was implemented in the Gazebo simulator [20] with the Robot Operating System (ROS) [37] as a middleware. The next subsections will provide the implementation details of this work. ### 5.1 Dataset and Classifiers We have adopted the HWU-USP activities dataset [38], a multimodal and heterogeneous dataset of human activities recorded in the Robotic Assisted Living Testbed (RALT), at Heriot-Watt University (UK). It is composed by readings of ambient sensors (e.g., switches at wardrobes and drawers, presence detectors, power measurements), inertial units attached to the waist and to the dominant wrist of the subjects, and videos. A set of nine well-defined, pre-segmented activities of daily living was performed by the 16 participants of the data collection. A total of $N_{X}=144$ recording sessions were provided, all of them pre-segmented and labelled (i.e., $X$, $A$ and $f_{A}$ were provided). The length of the recording sessions varied from less than 25 to over 100 seconds, with high variance either between-classes and between- subjects. As the activity recognition module, we have employed the framework presented and evaluated in [41]. This was composed by different time-localised classifiers based on artificial neural networks, each focused on a particular modality (i.e., set of similar sensors) or set of modalities. We adopted a couple pre-trained classifiers (i.e., the IMU + ambient and the video-based classifiers) from the framework to provide the prediction vectors, respecting the between-subjects 8-fold approach for training and evaluating. Let those classifiers be denoted by $g_{\text{I+A}}\in G$ and $g_{\text{video}}\in G$, respectively. Although both classifiers were described in [41], we give a brief presentation of their architectures in the next paragraphs, for the sake of completeness. Classifier $g_{\text{I+A}}$ was fed with two parallel inputs: a two-seconds- long (i.e., $100$ timesteps-long) time-window with the raw signals from the inertial sensors, and the mean values of the ambient sensors in the correspondent timestamps. The inertial data was processed by a one-dimensional Convolutional Neural Network (CNN) [53], composed of two convolutional layers interspersed with pooling layers, followed by a Long Short-Term Memory (LSTM) recurrent layer [16], generating the feature vector $v_{1}$. The ambient data was processed by a single fully-connected layer, generating the feature vector $v_{2}$. Both $v_{1}$ and $v_{2}$ were concatenated and sent to a softmax output layer. Classifier $g_{\text{video}}$ has taken, as input, a sequence of $25$ optical flow pairs, correspondent to two seconds of video, computed with the TVL1 algorithm [52]. The InceptionV3 CNN architecture [48] was trained to classify each optical flow pair individually. The CNN-LSTM architecture, adopted by the authors, consisted of feeding each optical flow pair within a sequence to this pre-trained InceptionV3 module, and feeding the resulting features as inputs to each timestep of a LSTM layer, whose outputs were connected to a softmax output layer. Both above-mentioned classifiers were endowed with softmax activation in their outputs, which ensured that the prediction vector respects a valid probability distribution. To provide the prediction vectors, we split each recording session in $N_{T}=140$ timesteps, regardless to its original length, and used the referred framework to provide the predictions on each of those timesteps. The effect is to assume that all activities have similar length, a simplification that allowed the design of more uniform and comparable experiments related to the bioinspired computational models (Subsection 4.1), and the robot simulation (Subsection 5.4). The output of the activity recognition module is, for a whole recording session $x$ processed by a classifier $g$, a total of $N_{X}=144$ sets of prediction vectors $y_{x}=\\{y_{x}^{1},\dots,y_{x}^{N_{T}}\\}$, with $N_{T}=140$. Outputs from both classifiers $g_{\text{I+A}}$ and $g_{\text{video}}$ were applied to all simulations, as described in the following subsections. ### 5.2 Heuristics Model Implementation Two policies $H$ were considered for the heuristics model, named window or exponential, that is, $H=\\{h_{\text{window}},h_{\text{exponential}}\\}$. This experimental setup resulted in a total of four conditions for evaluation in the neurorobotics approach, given by the space $G\times H$. The window policy consisted of deriving a wider prediction vector $y_{w}^{t}$, correspondent to $N_{r_{w}}$ timesteps. This was done by averaging the $N_{r_{w}}$ most recent prediction vectors in $y_{x}$, from the activity recognition module, as in Equation 11. We have set $N_{r_{w}}=8$, which corresponds to windows of four seconds from the recording sessions, because this was the length of the segments considered for the neurorobotics approach (see Subsection 4.2). On the other hand, the exponential policy consisted of deriving a prediction vector $y_{e}^{t}$ that considered the whole sequence of previous prediction vectors in $y_{x}$, with an exponential decay across iterations, as in Equation 12. If $R=\\{r_{w},r_{e}\\}$ is the set of the functions to compute $y_{w}^{t}$ and $y_{e}^{t}$, then the decision $d_{r}$ of the heuristics approach, for either the window or exponential policies, is given by Equation 13. It is important to note that, for the window policy of the heuristics approach, as in the neurorobotics approach, the robot can only begin to move after the first four seconds of each simulation, in which it is gathering the number of prediction vectors necessary to compute the first decision. $\begin{split}r_{w}:Y\times T\rightarrow Y\Longleftrightarrow y_{w}^{t}=r_{w}(y_{x},t)=\frac{\sum_{i=0}^{N_{r_{w}}-1}y_{x}^{t-i}}{N_{r_{w}}}\\\ y_{x}\in Y,\quad t\in T_{X}|t>N_{r_{w}},\end{split}$ (11) $\begin{split}r_{e}:Y\times T\rightarrow Y\Longleftrightarrow y_{e}^{t}=\begin{cases}r_{e}(y_{x},t=0)=y_{x}^{t}\\\ r_{e}(y_{x},t>0)=0.9\cdot r_{e}(y_{x},t-1)+y_{x}^{t}\end{cases}\\\ \quad y_{x}\in Y,\quad t\in T_{X}\end{split}$ (12) $\begin{split}d_{R}:Y\times T\times R\rightarrow B\Longleftrightarrow d_{R}(y_{x},t,r)=f_{B}(argmax[r(y_{x},t)])\\\ y_{x}\in Y,\quad t\in T_{X},\quad r\in R\end{split}$ (13) As a reference, we introduced an additional approach, a control condition in which the ground truth labels are directly fed to the robot simulation, providing a unique decision $d_{GT}$ every timestep, as shown by Equation 14. $\begin{split}d_{GT}:X\rightarrow B\Longleftrightarrow d_{GT}(x)=f_{B}(f_{A}(x)),\\\ x\in X\end{split}$ (14) ### 5.3 Neurorobotics Model Implementation Let $M$ be the bioinspired computational model, which can be rat-based or marmoset-based, that is, $M=\\{m_{\text{rat}},m_{\text{marmoset}}\\}$. This experimental setup resulted in a total of four conditions for evaluation in the neurorobotics approach, given by the space $G\times M$. Each independent simulation of the computational model (not to be confused with the robot simulation) was ran for each of the $N_{X}=144$ recording sessions under each condition being evaluated, that is, the simulations of the computational models were required to contemplate all instances in the space $X\times G\times M$. Hence, a total of $576$ simulations of the computational model was performed. Each of those simulations ran for $70$ seconds with sampling rate of $1,000$ Hz. The stimuli set $S$ was updated every $0.5$ second (i.e., update frequency of 2 Hz). This led to an adaptive dynamic that would respond to successive prediction vectors $y_{x}^{t}$, $t_{\text{sim}}\in\\{1,\dots,N_{T_{\text{sim}}\\}}$, with $N_{T_{\text{sim}}}=140$, according to the confidence of each response behaviour. The resulting spike trains in each neuron population were converted to neural firing frequencies (for details, see [23]), with bins of size $20$, which resulted in sequences of length $N_{U}=3,500$. As stated in Subsection 5.1, for the experiments reported in this work, $N_{B}=2$, hence $N_{C}=2$. Considering that $N_{R}=8$, the multivariate time-series $u_{x}^{g,m}\in U$ had $N_{R}\cdot N_{C}=16$ variables and $L_{U}=3,500$ timesteps, composing a data structure with dimensions $3,500\times 16$, The segments for the decoder we set to $N_{V}=200$ timesteps (i.e., four- seconds-long) with $75\%$ superposition (i.e., a one-second-long step between the beginning of each segment), resulting in $66$ segments. Considering the each condition was composed of $N_{x}=144$ recording sessions, these simulations of the computational models led to a total of $144\cdot 66=9,504$ instances $v\in V$, for each $(g,m)\in G\times M$. The CNN architecture for decoding these time-series into response behaviours is depicted in Table 1. It was composed of two convolutional layers, with $128$ and $256$ filters, respectively, interspersed with max-pooling layers. A global average pooling operation preceded the softmax output layer, which produced the decision vector $q_{x}^{t}$. Table 1: Layers in the CNN-based decoder. The inputs to the neural network are windows of $200$ timesteps from the four cortex channels of the output signals (i.e., neural firing frequencies) of the simulations under a given condition. The output is a decision vector $q_{x}^{t}$ with the confidences for each response behaviour. Layer | Type | Output shape | Free parameters ---|---|---|--- 1 | Input | $200\times 4$ | - 2 | Conv1D | $200\times 128$ | $3,712$ 3 | MaxPool1D | $100\times 128$ | - 4 | Conv1D | $100\times 256$ | $229,632$ 5 | MaxPool1D | $50\times 256$ | - 6 | Global Average Pooling | $256$ | - 7 | Softmax | $3$ | - For each set of conditions, the CNN was trained in a cross-subject 8-fold cross-validation scheme, similar to the one adopted for the activity recognition module [41]. The input data was linearly normalised to the range $[0,1]$, and the classification models were trained for $40$ epochs with batch size $32$. The ADAM algorithm was employed, with learning rate $10^{-3}$, to optimise the categorical cross-entropy loss function. The outputs of the evaluations were stored and organised, in order to serve as inputs to the next steps. The resulting sequences $u_{x}^{g,m}$ were then introduced to the decision-making mechanism. ### 5.4 Robot Behaviours The behaviours $b\in B$ consisted of transporting an object $o\in O$, from a starting position $z\in Z$ to a fixed destination $z_{\text{dest}}$. This task was adopted because it comprises a basic and generic functionality for a mobile robot in a home environment. The associations between the behaviours and the objects are given by Equation 15, while the associations between the objects and their starting positions in the map are given by Equation 16. $\displaystyle f_{O}:B\rightarrow O\Longleftrightarrow f_{O}(b)=o,\quad b\in B,\quad o\in O$ (15) $\displaystyle f_{Z}:O\rightarrow Z\Longleftrightarrow f_{Z}(o)=z,\quad o\in O,\quad z\in Z$ (16) At each timestep $t_{\text{robot}}$, a decision $d\in B\cup\\{b_{\emptyset}\\}$ (i.e., a response for each recording session $x\in X$ of the activity recognition module) was sent to the robot simulation, composed of a mobile social robot in a home environment (for details on the platforms and implementations employed, see Subsection 5.5). For the neurorobotics approach, this decision is given by Equation 10, already presented in Subsection 4.2. For the heuristics approach, the two policies mentioned (i.e., window and exponential) were evaluated. The decisions were turned into commands to the robot following a table of rules, depicted in Table 2. A decision $d$ is sent to the robot at each timestep. This decision can be one of the behaviours in $b\in B$ or the ”no action” behaviour $b_{\emptyset}$. Let $o_{c}$ be the object being carried by the robot at a certain timestep. Two types of situations might be considered: $d\in B$ or $d=b_{\emptyset}$. Table 2: Table of rules associating a response behaviour $f(d)=b$ to an output command at each timestep $t_{\text{robot}}$ of the robot simulation, considering the object being carried and the current robot position. Decision | Object carried | Robot position | Output command ---|---|---|--- $b\in B$ | $o_{c}=\emptyset$ | $z\neq f_{Z}[f_{O}(b)]$ | Move towards $f_{Z}[f_{O}(b)]$ $b\in B$ | $o_{c}=\emptyset$ | $z=f_{Z}[f_{O}(b)]$ | Set $o_{c}=f_{O}(b)$ $b\in B$ | $o_{c}=f_{O}(b)$ | $z\neq z_{\text{dest}}$ | Move towards $z_{\text{dest}}$ $b\in B$ | $o_{c}=f_{O}(b)$ | $z=z_{\text{dest}}$ | Finish behaviour $b\in B$ | $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$ | $z\neq f_{Z}[o_{k}]$ | Move towards $f_{Z}[o_{k}]$ $b\in B$ | $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$ | $z=f_{Z}[o_{k}]$ | Set $o_{c}=\emptyset$ $b_{\emptyset}$ | $o_{c}=o_{k}\in O$ | $z\neq f_{Z}[o_{k}]$ | Move towards $f_{Z}[o_{k}]$ $b_{\emptyset}$ | $o_{c}=o_{k}\in O$ | $z=f_{Z}[o_{k}]$ | Set $o_{c}=\emptyset$ $b_{\emptyset}$ | $o_{c}=\emptyset$ | $\forall z\in Z$ | Wait The first type of situation is characterised by $d=b_{\emptyset}$, in which the robot must return any object that it may be carrying to the corresponding position, and then stand still, waiting for any further commands. Otherwise, $d=b\in B$, the second type of situation, in which the robot is supposed to grab an object $o_{c}=f_{O}(b)\in O$ from position $f_{Z}[f_{O}(b)]$ to a destination $z_{\text{dest}}$. If the robot is not carrying any object, that is, $o_{c}=\emptyset$, then it must move to $f_{Z}[f_{O}(b)]$ and take the object. If it is already carrying the correct object, then it must move towards the destination $z_{\text{dest}}$. If it is carrying the wrong object, it is, $o_{c}=o_{k}\in O\quad|\quad o_{k}\neq f_{O}(b)$, then it must return it to $f_{Z}[o_{k}]$. ### 5.5 Robot Simulator The simulator adopted for the robotics experiments was previously made available as part of the LARa framework [39], consisted of a robot and a software library. The LARa robot was a mobile social robot built on the top of a Pioneer P3-DX platform, endowed with a Hokuyo laser, a mini computer, a Microsoft Kinect sensor, a microphone, a screen, and a speaker. The LARa library was a set of functionalities implemented to control the robot based on high-level software interfaces, integrated within the Robot Operating System (ROS) [37]. Besides navigation skills and a framework for human-robot interaction, this included a platform for simulation, under conditions that resembled those of the actual robot, deployed to allow offline experiments. The Gazebo simulator [20] was employed, and a map of a typical home environment was designed, as reproduced in Figure 5(a). The simulated robot - a simplified version of the LARa robot - is shown in Figure 5(b), while the pieces of furniture employed in the experiments are shown in Figure 5(c). (a) Map of the whole home environment employed for the experiments. (b) Simulated mobile robot. (c) In a different camera angle, the section of the map in which the robot behaviours were performed, with the indications of the robot and the pieces of furniture involved in the tasks (i.e., shelf 1, shelf 2 and table). Figure 5: Virtual environment for the robot simulation, using the Gazebo platform. This setting comprised a realistic environment, which provided several challenging aspects resembling those of a real-world scenario, such as sensors’ noise, communication delays and mechanical issues. The ROS platform was employed to connect this simulated environment to a navigation stack, which provided a 2D occupancy grid in which each position (i.e., cell) might be considered empty, navigable or obstacle. This representation was generated previously to the robot simulations reported here, via the GMapping algorithm [13] for Simultaneous Localisation and Mapping (SLAM). The mapping algorithm ran while the robot was teleoperated through the whole environment, with the laser readings and the wheels’ encoders combined to gradually compose the occupancy grid. Once the grid was created, the Augmented Monte Carlo Localisation (AMCL) and A* algorithms could be employed as a global planner to perform autonomous navigation. The navigation package was also endowed with a local planner, responsible for creating adaptable short-term paths for obstacle avoidance and environmental changes. For this work, a set of two response behaviours was defined as $B=\\{b_{1},b_{2}\\}$. In Table 3, are shown the set of daily activities from the dataset (i.e., $a_{p}\in A$, $p\in\\{1,\dots,N_{A}\\}$), and the expected response behaviours associated to each of those activities (i.e., $f_{B}(a_{p})$). These were chosen respecting semantic relationships between the activities (i.e., $b_{1}$ is the desired response when the user is preparing meals, and $b_{2}$, when he is quietly consuming or exchanging information). Table 3: List of activities provided by the HWU-USP activities dataset, and expected response behaviours in the application scenario. Activity $a$ | Description | Response behaviour $b$ ---|---|--- $a_{1}$ | making a cup of tea | $b_{1}$ $a_{2}$ | making a sandwich | $b_{1}$ $a_{3}$ | making a bowl of cereals | $b_{1}$ $a_{4}$ | using a laptop | $b_{2}$ $a_{5}$ | using a phone | $b_{2}$ $a_{6}$ | reading a newspaper | $b_{2}$ $a_{7}$ | setting the table | $b_{\emptyset}$ $a_{8}$ | cleaning the dishes | $b_{\emptyset}$ $a_{9}$ | tidying the kitchen | $b_{\emptyset}$ These behaviours were based on the assumption that the user is located in the kitchen, and that the human activities are being monitored by sensors that are not affected by the robot actions. The starting position for only the first robot simulation in a battery of experiments is given in Figure 5. However, it had negligible effect in the overall results, since this position was not reset for each simulation, as we discuss later in this subsection. As shown in Figure 5(c), three pieces of furniture are considered. These are shelf 1, associated to the robot position $z_{\text{s1}}=f_{Z}(o_{1})$, $o_{1}\in O$; shelf 2, associated to the robot position $z_{\text{s2}}=f_{Z}(o_{2})$, $o_{2}\in O$; and table, the destination, associated to the robot position $z_{\text{dest}}$. The two specific behaviours considered for the experiments performed, $b_{1}$ and $b_{2}$, consist, respectively, of transporting object $o_{1}$ from $z_{1}$ (i.e., shelf 1) to $z_{\text{dest}}$ (i.e., the table), and transporting object $o_{2}$ from $z_{2}$ (i.e., shelf 2) to $z_{\text{dest}}$ (i.e., the table). Considering that shelf 2 is closer to the table than shelf 1, then the distances required for $b_{1}$ are larger than those for $b_{2}$. As a consequence, it was expected that, on average, $b_{1}$ required more time to be completed than $b_{2}$. The maximum robot simulation time was set to $N_{T_{\text{robot}}}=140$ seconds, with each timestep $t_{\text{robot}}\in\\{1,\dots,N_{T_{\text{robot}}}\\}$ corresponding to one second in the simulation. Consequently, an expected response behaviour had to be finished within $N_{T_{\text{robot}}}$ seconds to be considered successfully completed. We configured $N_{T_{\text{robot}}}=140$, which in exploratory experiments has shown to give a reasonable margin for the robot simulations. A total of $N_{X}=144$ robot simulations was performed for each condition analysed. The first simulation for each approach began with the robot positioned as in Figure 5(c). All the next simulations began without resetting the robot position after the ending of the previous one, with only the object flag, corresponding to the object $o_{c}$ being carried by the robot, being cleared. In this scenario, each simulation could be started with the robot in any of the positions in $Z$, or in locations belonging to the path between them. ## 6 Results Concerning the activity recognition module, its classification results are presented in [41]. The overall accuracy registered for the classifiers were computed by taking a set of $25$ prediction vectors obtained for a recording session and averaging it. A categorical classification was provided by returning the $argmax$ element in the averaged vector. A cross-validation approach, following the same cross-subject partitioning adopted for evaluating the CNN-based decoder in this work, have been performed. The accuracy reported for the modalities considered for the experiments reported here was $74.30\%$ for $g_{I+A}$, and $93.75\%$ for $g_{\text{video}}$. The other modules in this work relied on important adaptations to frameworks previously implemented in related work, as happened to the computational models and the robot simulation, or to components developed from scratch, case of the CNN-based decoder. The corresponding results are shown in the following subsections. The classification metrics from the neural firing frequencies synthesised with the bioinspired computational models are presented in Subsection 6.1. The outcomes of the robot simulations, in all conditions analysed, are presented in Subsection 6.2. ### 6.1 Simulated Neural Firing Frequencies A sample of the segments $v\in V$, provided in the simulations of the computational models, is shown in Figure 6. This was generated from a rat model, being stimulated according to an IMU + ambient classifier as the activity recognition module. A larger stimulus introduced to the striatum is expected to increase neural firing rates in the BG-T-C circuit, which might be propagated to the cortex. Figure 6: Sample output from the bioinspired computational model of the BG-C-T circuit. For the motor cortex of each channel, RS and FSI, we considered the overall mean firing rates computed with time bins of size $20$ milliseconds, and evaluated on two-seconds-long time windows. This data was used as input for the CNN-based decoder, in the next step of the bioinspired pipeline. The overall accuracy and F1-score of the decoder, trained and evaluated according to the 8-fold cross-subject approach described, are shown in the bars plot of Figure 7. The classifier used in the activity recognition module and the computational model employed are shown side-by-side. Figure 7: Accuracy and F1-score for the CNN-based decoder in classifying a MFR signal into a set of three possible decisions: B1, B2 or "no action". On choosing the models for evaluation, two factors were analysed: the modalities and models employed for activity recognition (IMU + ambient sensors or video- based) [41], and the computational model considered (rat-based or marmoset- based) [22, 40]. The decoder was applied as a part of the decision-making mechanism, responsible for providing decision vectors for the robot simulation. Hence, its results might be correlated to the correct outcomes of the decisions made during the robot simulation. In other words, a good accuracy of the decoder might result in more correct decisions of the robot, which may more often complete the tasks with the correct outcome. The next subsection will present the experiments performed to validate this statement. These are the outcomes of the robot simulation not only for each of those conditions, but also for each policy employed for the heuristics approach. ### 6.2 Outcomes of the Robot Simulations As it was mentioned before, three possible outcomes were considered for the robot simulations, with $f_{A}(x)=a$ being the activity associated to a recording session $x\in X$: * • Correct, if $f_{B}(a)\in B$ and the activity was completed before the end of the simulation, or if $f_{B}(a)=b_{\emptyset}$ and no behaviour was completed; * • Incorrect, if the robot completed a behaviour $b_{\text{robot}}\in B$ different from $f_{B}(a)$, i.e., $b_{\text{robot}}\neq f_{B}(a)$; * • Unfinished, if a response behaviour $b\in B$ was expected from the robot, but no behaviour was completed before the end of the simulation. In Subsection 5.5, a control condition was introduced, with ground truth decisions being sent for the robot. For this approach, as it was expected, all robot simulations let to the correct outcome. In Figure 8(a), the outcomes for the heuristics approach are presented, with each of the policies analysed (i.e., window and exponential) being represented in different plots, each illustrating the outcomes for each classifier considered for the activity recognition module. The outcomes for the neurorobotics approach are shown in Figure 8(a), with the classifiers for activity recognition (IMU + ambient or video) and the computational models (rat or marmoset) being represented. (a) Outcomes for the robot simulations performed with the heuristics approach. Four batteries of simulations were performed, considering two factors: the classifiers employed for activity recognition (IMU + ambient sensors and video-based) and the policy for the decision-making mechanism (window or exponential) (see Figure 4a). (b) Outcomes for the robot simulations performed with the neurorobotics approach. Four batteries of simulations were performed, related to two factors analysed: the modalities and models employed for activity recognition (IMU + ambient sensors or video-based) [41], the computational model considered (rat- based or marmoset-based) [40] (see Figure 4b). Figure 8: Outcomes for the robot simulations. Three possible outcomes were considered: the robot completed the expected (correct) behaviour; the robot concluded the incorrect behaviour; no behaviour was completed (unfinished), although an action was required from the robot. The times elapsed for providing the correct outcome, when a response behaviour was expected from the robot, were also recorded. The mean and standard deviations, within all simulations performed for each condition, are represented in Figure 9. Two separate plots were provided, separating the classifiers employed for the activity recognition module. The ground truth approach was reproduced in both of them, since it does not depend on prediction vectors, but in the ground truth activities. This metric considers only the outcomes completed successfully. An approach that provides a fast response with poor accuracy would provide a low time response, though it would not necessarily provide the correct response behaviours very often. Hence, the fact that the heuristics approach with the window policy led to a faster average response than the ground-truth condition is consistent. Since incorrect and unfinished outcomes were not considered for the computation of this mean value, this result only shows that, for this model, the correct outcomes were mostly associated to activities that could be completed in less time (e.g., the behaviour $b_{2}$). Figure 9: Average times elapsed across the 144 sequences on each simulation in which the correct behaviour was performed. Incorrect and unfinished outcomes, as well as correct outcomes when no action was required from the robot, were not considered in this evaluation. All simulated models, basend on either heuristics or neurorobotics, are shown. ## 7 Discussion The results from the CNN-based decoder, shown in Figure 7, confirmed some expectations regarding the output signals produced by the simulations of the computational models according to the stimuli provided: it performed better for the the video-based classifier than for the IMU + ambient, and for the marmoset-based model, compared to the rat-based. The accuracy and F1-score metrics were very close, which considering a strictly balanced dataset, points that the results were not affected by any serious issues regarding the trade- off between precision and recall. All evaluations led to an accuracy measure of over $70\%$ for three classes (i.e., response behaviours $b_{1}$, $b_{2}$ or $b_{\emptyset}$). It is important to consider that the stimuli came from noisy prediction vectors from activity recognition algorithms, whose accuracy is variable across successive segments [41], with overall accuracy values of $74.30\%$, for $g_{I+A}$, and $93.75\%$, for $g_{\text{video}}$. These results show that the neural activity provided by the computational models could be reliably interpreted by the proposed decoder, even considering segments of limited length (i.e., four- seconds-long segments within a 70-seconds-long sequence). Hence, this particular technique for brain signals, analysed in previous studies for processing related neuronal data of the BG-T-C circuit [34, 42], has shown to be suitable for the decision-making approach proposed. Since the accuracy measure of the classifier for activity recognition was significantly higher for the video-based classifier than for the IMU + ambient, it was expected that it could be more easily decoded by the neural network, which was confirmed by the decoder results (see Figure 7). Also, the marmoset-based model led to better decoding performances than the rat-based model, which also meets the expectations, considering a more sophisticated morphology and dynamics in the underlying brain structures in primates than in rodents [27]. Regarding the robot simulations, heuristics approaches were evaluated in parallel to the neurorobotics approaches. In most experiments performed in this work, better performances were found for the models fed by the video- based classifier than those fed by the IMU + ambient classifier, which was expected, since the video classifier is expressively more accurate [41]. As shown in Figure 8(a), the window policy led to a lower number of successfully completed response behaviours, especially when fed with prediction vectors coming from the IMU + ambient classifier (less accurate). This condition may be the fairest comparison to the neurorobotics approach since it limits its decisions to data from the four-seconds-long segment that precedes a given decision, the same constraint applied to the CNN-based decoder. In this context, the neurorobotics approach has shown to provide more accurate outcomes in most conditions, especially for the marmoset model. For the IMU+ambient modality of the activity recogniser, the window policy of the heuristics approach led to $79.9\%$ of correct outcomes, which was surpassed by the $84.7\%$ result for either the rat or marmoset models. For the video modality, the window policy of the heuristics approach led to $86.0\%$ of correct outcomes, which was only slightly above the rat model, which hit $85.3\%$, and expressively below the marmoset model, which hit $93.7\%$. These results point that the proposed neurorobotics approach, in the conditions analysed in this study, may lead to better outcomes than a simple heuristics for a real-time task of an autonomous robot. For the exponential policy of the heuristics approach, a particularity was found: it led to similar results for either the video and IMU + ambient conditions (i.e., $88.2\%$ and $88.8\%$ of correct outcomes, respectively), both with more correct outcomes than those of the window policy. This result is relevant, since it reveals that, by performing a long-term aggregation of prediction vectors obtained subsequently from a single recording session, it may be possible to compensate lower accuracy values provided by certain classifiers that work with different sets of sensors. This possibility might be considered in practical applications, in which more informative modalities that usually lead to high accuracy, such as videos, may be either difficult to be obtained, due to privacy concerns [9], or unfeasible to provide real-time outputs, due to the high computational cost inherent to the operations required for processing them [45]. Regarding the different conditions considered for the neurorobotics approach (i.e., the activity recogniser and the computational model), the expectation was that, when applied to the robot simulation, the number of correct outcomes would be comparatively proportional to the accuracy measures of the decoder (see Figure 7). As shown in Figure 8(b), this expectation was met for most conditions, although some exceptions were found. Better results for the marmoset model were expected, since the number of neurons and the connectivity are larger [36, 21]. The results of the decoder, previously discussed, corroborate to this hypothesis. For the robot simulations, considering the video modality, the marmoset model led to the best results found among all of the simulations, with $93.7\%$ of correct outcomes, against $85.3\%$ achieved by the rat model. However, for the IMU + ambient modality, the results were similar for both models. A possible explanation for this result is that such an increased capacity could compensate the mistakes for a more accurate activity recognise. In other words, the prediction vectors across successive segments could assign higher confidence values (i.e., probabilities) to the expected label (i.e., the ground-truth activity) for the video-based classifier than for the IMU + ambient, and the marmoset-based model, more sophisticated, was able to take more advantage on it than the rat-based. By measuring the time elapsed in the robot simulations with correct outcomes, we can see only modest variations across conditions. An important observation regarding this metric is that a fast response is not necessarily an indication of a good performance, since this result is affected not only for the assertiveness of the correct outcomes (i.e., few changes of decision within a simulation), but also to the accuracy of the simulations in a given set of conditions. For instance, a given condition may lead to fast response when it provides the correct outcome, but most simulations may lead to an incorrect or unfinished outcome. For the neurorobotics approach, the times were approximately similar between both classifiers, except for the marmoset model, which took significantly longer to finish, on average, when fed with the video-based classifier. Considering the heuristics approach, the video-based classifier led to clearly longer times for completing the behaviours, which was probably because some of the changes in decisions (i.e., the robot is performing behaviour $b_{1}$, but the decision-making mechanism changes it to $b_{2}$ after receiving new, updated prediction vectors) within the simulations allowed for completing more simulations with the correct outcome. The same reason explains why the correct outcomes of the window policy for the IMU + ambient classifier led to a faster response, on average, than the ground-truth value. ## 8 Conclusions and Future Work In this paper, we employed a neurorobotics approach based on the embodiment of validated computational models of brain structures for creating a decision- making mechanism to provide effective response behaviours to a mobile robot in a simulated environment. The chosen application scenario was a simulated smart home where data from the sensed environment was processed with a previously designed activity recognition framework. The neurorobotics approach was compared to some heuristics. For this, two simple heuristics were proposed and evaluated to provide real-time decisions based on the outputs from an activity recognition classifier. The neurorobotics model used computational models (CM) of the basal ganglia- thalamus-cortex (BG-T-C) circuit, originally designed to study the underlying mechanisms of Parkinson’s Disease. The CM were adapted, so that the outputs from the activity recognition module were applied as stimuli to the striatum of the circuit, and spike activity at the cortex was decoded with a convolutional neural network (CNN) to provide decisions to the robot simulation. Different conditions were analysed, including whether the computational models were based on rodent or primate models. Results were reported with respect to the accuracy obtained for the CNN-based decoder in each condition for the computational model, and to the outcomes of the robot simulations, considering the neurorobotics and the heuristics approaches. The expectations were met for most of the different conditions regarding the neurorobotics approaches. The primate-based computational model led to the best outcomes between the simulations analysed. Hence, one can conclude that the proposed neurorobotics approach is promising not only as an embedded tool for understanding the neurophysiological aspects of animal behaviour, but also as a practical component to integrate decision- making mechanisms for action selection in mobile robots engaged in human- robot-interaction scenarios. Future work may consist of providing a real-time simulation of the proposed application scenario, with a robot placed in a physical environment in which human participants may be performing activities. This would require the integration among the different modules shown in the pipelines presented, thus ensuring that all of them can work in real-time. Such an experiment may validate our approach in even more challenging conditions and scenarios, which may foster a wide range of applications. ## Acknowledgement This work was funded by the Sao Paulo Research Foundation (FAPESP), grants 2017/02377-5, 2017/01687-0 and 2018/25902-0, and the Neuro4PD project - Royal Society and Newton Fund (NAF\R2\180773). Moioli acknowledge the support from the Brazilian institutions: INCT INCEMAQ of the CNPq/MCTI, FAPERN, CAPES, FINEP, and MEC. This research was carried out using the computational resources from the CeMEAI funded by FAPESP, grant 2013/07375-0. Additional resources were provided by the Robotics Lab within the ECR, and by the Nvidia Grants program. ## References * [1] Sara Ashry, Tetsuji Ogawa, and Walid Gomaa. CHARM-Deep: Continuous Human Activity Recognition Model Based on Deep Neural Network Using IMU Sensors of Smartwatch. IEEE Sensors Journal, 20(15):8757–8770, 8 2020. * [2] Davide Bacciu, Maurizio Di Rocco, Mauro Dragone, Claudio Gallicchio, Alessio Micheli, and Alessandro Saffiotti. An ambient intelligence approach for learning in smart robotic environments. Computational Intelligence, pages 1–28, 7 2019. * [3] Jyotika Bahuguna, Philipp Weidel, and Abigail Morrison. Exploring the role of striatal D1 and D2 medium spiny neurons in action selection using a virtual robotic framework. Wiley Online Library, 49(6):737–753, 3 2018. * [4] S. Bariselli, W. C. Fobbs, M. C. Creed, and A. V. Kravitz. A competitive model for striatal action selection, 6 2019. * [5] Davide Calvaresi, Daniel Cesarini, Paolo Sernani, Mauro Marinoni, Aldo Franco Dragoni, and Arnon Sturm. Exploring the ambient assisted living domain: a systematic review. Journal of Ambient Intelligence and Humanized Computing, 8(2):239–257, 2017. * [6] Caitlyn Clabaugh and Maja Matarić. Escaping Oz: Autonomy in Socially Assistive Robotics. Annual Review of Control, Robotics, and Autonomous Systems, 2(1):33–61, 5 2019. * [7] Ted M. Dawson, Todd E. Golde, and Clotilde Lagier-Tourenne. Animal models of neurodegenerative diseases. Nature Neuroscience, 21(10):1370–1379, 2018. * [8] Salvador Dura-Bernal, Benjamin A Suter, Padraig Gleeson, Matteo Cantarelli, Adrian Quintana, Facundo Rodriguez, David J Kedziora, George L Chadderdon, Cliff C Kerr, Samuel A Neymotin, Robert A McDougal, Michael Hines, Gordon MG Shepherd, and William W Lytton. Netpyne, a tool for data-driven multiscale modeling of brain circuits. eLife, 8:e44494, apr 2019. * [9] Francisco Erivaldo Fernandes Junior, Guanci Yang, Ha Manh Do, and Weihua Sheng. Detection of Privacy-sensitive Situations for Social Robots in Smart Homes. In Automation Science and Engineering (CASE), 2016 IEEE International Conference on, pages 727–732. IEEE, 2016. * [10] Felipe Aparecido Garcia, Caetano Mazzoni Ranieri, and Roseli Aparecida Francelin Romero. Temporal approaches for human activity recognition using inertial sensors. In Proceedings - 2019 Latin American Robotics Symposium, 2019 Brazilian Symposium on Robotics and 2019 Workshop on Robotics in Education, LARS/SBR/WRE 2019, pages 121–125. Institute of Electrical and Electronics Engineers Inc., 10 2019. * [11] Ilche Georgievski, Tuan Anh Nguyen, Faris Nizamic, Brian Setz, Alexander Lazovik, and Marco Aiello. Planning meets activity recognition: Service coordination for intelligent buildings. Pervasive and Mobile Computing, 38:110–139, 7 2017. * [12] B. Girard, N. Tabareau, Q. C. Pham, A. Berthoz, and J. J. Slotine. Where neuroscience and dynamic system theory meet autonomous robotics: A contracting basal ganglia model for action selection. Neural Networks, 21(4):628–641, 5 2008. * [13] Giorgio Grisetti, Cyrill Stachniss, and Wolfram Burgard. Improved techniques for grid mapping with rao-blackwellized particle filters. IEEE transactions on Robotics, 23(1):34–46, 2007. * [14] P. Halje, Ivani Brys, Juan J. Mariman, Claudio Da Cunha, Romulo Fuentes, and Per Petersson. Oscillations in cortico-basal ganglia circuits: Implications for parkinson’s disease and other neurologic and psychiatric conditions. Journal of Neurophysiology, 122(1):203–231, 2019. * [15] Samitha Herath, Mehrtash Harandi, and Fatih Porikli. Going deeper into action recognition: A survey. Image and Vision Computing, 60:4–21, 4 2017. * [16] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 11 1997. * [17] Javed Imran and Balasubramanian Raman. Evaluating fusion of RGB-D and inertial sensors for multimodal human action recognition. Journal of Ambient Intelligence and Humanized Computing, 11(1):189–208, 1 2020. * [18] Hitoshi Kita and Takako Kita. Cortical stimulation evokes abnormal responses in the dopamine-depleted rat basal ganglia. Journal of Neuroscience, 31(28):10311–10322, 2011. * [19] Woo Ri Ko and Jong Hwan Kim. Behavior Selection of Social Robots Using Developmental Episodic Memory-Based Mechanism of Thought. In 2018 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2018. Institute of Electrical and Electronics Engineers Inc., 11 2018. * [20] Nathan Koenig and Andrew Howard. Design and use paradigms for gazebo, an open-source multi-robot simulator. In 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)(IEEE Cat. No. 04CH37566), volume 3, pages 2149–2154. IEEE, 2004. * [21] James B. Koprich, Lorraine V. Kalia, and Jonathan M. Brotchie. Animal models of alpha-synucleinopathy for Parkinson disease drug development. Nature Reviews Neuroscience, 18(9):515–529, 8 2017. * [22] Karthik Kumaravelu, David T. Brocker, and Warren M. Grill. A biophysical model of the cortex-basal ganglia-thalamus network in the 6-OHDA lesioned rat model of Parkinson’s disease. Journal of Computational Neuroscience, 40(2):207–229, 4 2016. * [23] Petr Lánský, Roger Rodriguez, and Laura Sacerdote. Mean Instantaneous Firing Frequency is Always Higher Than the Firing Rate. Neural Computation, 16(3):477–489, 3 2004. * [24] Junjun Li, Zhijun Li, Fei Chen, Antonio Bicchi, Yu Sun, and Toshio Fukuda. Combined Sensing, Cognition, Learning, and Control for Developing Future Neuro-Robotics Systems: A Survey. IEEE Transactions on Cognitive and Developmental Systems, 11(2):148–161, 6 2019. * [25] Kang Li, Jinting Wu, Xiaoguang Zhao, and Min Tan. Real-Time Human-Robot Interaction for a Service Robot Based on 3D Human Activity Recognition and Human-Mimicking Decision Mechanism. In 8th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems, CYBER 2018, pages 498–503. Institute of Electrical and Electronics Engineers Inc., 4 2019. * [26] Yabin Liang, Zikai Yan, Qi Zhang, Hongyu Liang, Xiyu Ji, Yin Liu, and Rong Liu. A decision-making model based on basal ganglia account of action prediction. In IEEE International Conference on Robotics and Biomimetics, ROBIO 2019, pages 1705–1710. Institute of Electrical and Electronics Engineers Inc., 12 2019. * [27] Jean Liénard and Benoît Girard. A biologically constrained model of the whole basal ganglia addressing the paradoxes of connections and selection. Journal of Computational Neuroscience, 36(3):445–468, 2014. * [28] Yantao Lu and Senem Velipasalar. Autonomous Human Activity Classification from Wearable Multi-Modal Sensors. IEEE Sensors Journal, 19(23):11403–11412, 12 2019. * [29] Chih Yao Ma, Min Hung Chen, Zsolt Kira, and Ghassan AlRegib. TS-LSTM and temporal-inception: Exploiting spatiotemporal dynamics for activity recognition. Signal Processing: Image Communication, 71:76–87, 2 2019. * [30] Jeffrey E. Markowitz, Winthrop F. Gillis, Celia C. Beron, Shay Q. Neufeld, Keiramarie Robertson, Neha D. Bhagat, Ralph E. Peterson, Emalee Peterson, Minsuk Hyun, Scott W. Linderman, Bernardo L. Sabatini, and Sandeep Robert Datta. The Striatum Organizes 3D Behavior via Moment-to-Moment Action Selection. Cell, 174(1):44–58, 6 2018. * [31] Matthew M. McGregor and Alexandra B. Nelson. Circuit Mechanisms of Parkinson’s Disease, 3 2019. * [32] Roghayeh Mojarad, Ferhat Attal, Abdelghani Chibani, Sandro Rama Fiorini, and Yacine Amirat. Hybrid Approach for Human Activity Recognition by Ubiquitous Robots. In IEEE International Conference on Intelligent Robots and Systems, pages 5660–5665. Institute of Electrical and Electronics Engineers Inc., 12 2018. * [33] Garrett Mulcahy, Brady Atwood, and Alexey Kuznetsov. Basal ganglia role in learning rewarded actions and executing previously learned choices: Healthy and diseased states. PLoS ONE, 15(2):1–26, 2020. * [34] Shu Lih Oh, Yuki Hagiwara, U. Raghavendra, Rajamanickam Yuvaraj, N. Arunkumar, M. Murugappan, and U. Rajendra Acharya. A deep learning approach for Parkinson’s disease diagnosis from EEG signals. Neural Computing and Applications, pages 1–7, 2018. * [35] Francisco Ordóñez and Daniel Roggen. Deep convolutional and LSTM recurrent neural networks for multimodal wearable activity recognition. Sensors, 16(1):115, 1 2016. * [36] Tony J. Prescott, Fernando M. Montes González, Kevin Gurney, Mark D. Humphries, and Peter Redgrave. A robot model of the basal ganglia: Behavior and intrinsic processing. Neural Networks, 19(1):31–61, 1 2006. * [37] Morgan Quigley, Ken Conley, Brian Gerkey, Josh Faust, Tully Foote, Jeremy Leibs, Rob Wheeler, and Andrew Y Ng. Ros: an open-source robot operating system. In ICRA workshop on open source software, volume 3, page 5. Kobe, Japan, 2009. * [38] Caetano M. Ranieri, Scott MacLeod, Mauro Dragone, Patricia A. Vargas, and Roseli A. F. Romero. Human activities with videos, inertial units and ambient sensors. Dryad Digital Repository, 2021. * [39] Caetano M. Ranieri, Guilherme Nardari, Adam H.M. Pinto, Daniel C. Tozadore, and Roseli A.F. Romero. LARa: A robotic framework for human-robot interaction on indoor environments. In Proceedings - 15th Latin American Robotics Symposium, 6th Brazilian Robotics Symposium and 9th Workshop on Robotics in Education, LARS/SBR/WRE 2018, pages 383–389. Institute of Electrical and Electronics Engineers Inc., 12 2018. * [40] Caetano M. Ranieri, Jhielson M. Pimentel, Marcelo R. Romano, Leonardo A. Elias, Roseli A. F. Romero, Michael Lones, Mariana F. P. Araujo, Patricia A. Vargas, and Renan C. Moioli. A data-driven biophysical computational model of parkinson’s disease based on marmoset monkeys. Manuscript submitted for publication., 2021. * [41] Caetano Mazzoni Ranieri, Scott MacLeod, Mauro Dragone, Patricia Amancio Vargas, and Roseli Aparecida Francelin Romero. Activity Recognition for Ambient Assisted Living with Videos, Inertial Units and Ambient Sensors. Sensors, 21(3):768–, 1 2021. * [42] C.M. Ranieri, R.C. Moioli, R.A.F. Romero, M.F.P. De Araujo, M.B. De Santana, J.M. Pimentel, and P.A. Vargas. Unveiling Parkinson’s Disease Features from a Primate Model with Deep Neural Networks. In Proceedings of the International Joint Conference on Neural Networks, 2020. * [43] C.M. Ranieri, P.A. Vargas, and R.A.F. Romero. Uncovering Human Multimodal Activity Recognition with a Deep Learning Approach. In Proceedings of the International Joint Conference on Neural Networks, 2020. * [44] Francisco J. Rodriguez Lera, Francisco Martín Rico, Angel Manuel Guerrero Higueras, and Vicente Matellán Olivera. A context-awareness model for activity recognition in robot-assisted scenarios. Expert Systems, 37(2):e12481, 4 2020. * [45] Itsaso Rodríguez-Moreno, José María Martínez-Otzeta, Basilio Sierra, Igor Rodriguez, and Ekaitz Jauregi. Video Activity Recognition: State-of-the-Art. Sensors, 19(14):3160, 7 2019. * [46] Marcelo R. Romano, Renan C. Moioli, and Leonardo A. Elias. Evaluation of Frequency-Dependent Effects of Deep Brain Stimulation in a Cortex-Basal Ganglia-Thalamus Network Model of Parkinson’s Disease. In Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, volume 2020-July, pages 3638–3641. Institute of Electrical and Electronics Engineers Inc., 7 2020\. * [47] Odongo Steven Eyobu and Dong Han. Feature Representation and Data Augmentation for Human Activity Classification Based on Wearable IMU Sensor Data Using a Deep LSTM Neural Network. Sensors, 18(9):2892, 8 2018. * [48] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2818–2826, Las Vegas, NV, USA, 2016. IEEE. * [49] Gerd Tinkhauser, Alek Pogosyan, Huiling Tan, Damian M. Herz, Andrea A. Kühn, and Peter Brown. Beta burst dynamics in Parkinson’s disease off and on dopaminergic medication. Brain, 140(11):2968–2981, 11 2017. * [50] S. J. van Albada and P. A. Robinson. Mean-field modeling of the basal ganglia-thalamocortical system. I. Firing rates in healthy and parkinsonian states. Journal of Theoretical Biology, 257(4):642–663, 2009. * [51] Patrick Van Der Smagt, Michael A. Arbib, and Giorgio Metta. Neurorobotics: From vision to action. In Springer Handbook of Robotics, pages 2069–2094. Springer International Publishing, 1 2016. * [52] C. Zach, T. Pock, and H. Bischof. A duality based approach for real-time TV-L 1 optical flow. In Joint Pattern Recognition Symposium, pages 214–223. Springer, 2007. * [53] Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8689 LNCS:818–833, 2014.
arxiv-papers
2021-07-27T01:25:58
2024-09-04T03:07:20.267603
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Caetano M. Ranieri, Renan C. Moioli, Patricia A. Vargas, Roseli A. F.\n Romero", "submitter": "Caetano Mazzoni Ranieri", "url": "https://arxiv.org/abs/2107.12540" }
2107.12542
# Energy-based Unknown Intent Detection with Data Manipulation Yawen Ouyang, Jiasheng Ye, Yu Chen, Xinyu Dai, Shujian Huang ∗ Corresponding author. Jiajun Chen National Key Laboratory for Novel Software Technology, Nanjing University, China {ouyangyw,yejiasheng,cheny98}@smail.nju.edu.cn {daixinyu,huangsj,chenjj}@nju.edu.cn ###### Abstract Unknown intent detection aims to identify the out-of-distribution (OOD) utterance whose intent has never appeared in the training set. In this paper, we propose using energy scores for this task as the energy score is theoretically aligned with the density of the input and can be derived from any classifier. However, high-quality OOD utterances are required during the training stage in order to shape the energy gap between OOD and in- distribution (IND), and these utterances are difficult to collect in practice. To tackle this problem, we propose a data manipulation framework to Generate high-quality OOD utterances with importance weighTs (GOT). Experimental results show that the energy-based detector fine-tuned by GOT can achieve state-of-the-art results on two benchmark datasets. ## 1 Introduction Unknown intent detection is a realistic and challenging task for dialogue systems. Detecting out-of-distribution (OOD) utterances is critical when employing dialogue systems in an open environment. It can help dialogue systems gain a better understanding of what they do not know, which prevents them from yielding unrelated responses and improves user experience. A simple approach for this task relies on the softmax confidence score and achieves promising results Hendrycks and Gimpel (2017). The softmax-based detector will classify the input as OOD if its softmax confidence score is smaller than the threshold. Nevertheless, further works demonstrate that using the softmax confidence score might be problematic as the score for OOD inputs can be arbitrarily high Louizos and Welling (2017); Lee et al. (2018). Another appealing approach is to use generative models to approximate the distribution of in-distribution (IND) training data and use the likelihood score to detect OOD inputs. However, Ren et al. (2019) and Gangal et al. (2019) find that likelihood scores derived from such models are problematic for this task as they can be confounded by background components in the inputs. Figure 1: An overview of our framework GOT. For the utterance “How much did I spend this week” from CLINC150 dataset Larson et al. (2019). Our locating module locates the intent-related word “spend”. And then our generating module generates words “drink”, “lose” to replace it and obtains OOD utterances. Finally, our weighting module assigns a weight for each of OOD utterances. In this paper, we propose using energy scores Liu et al. (2020) for unknown intent detection. The benefit is that energy scores are theoretically well aligned with the density of the inputs, hence more suitable for OOD detection. Inputs with higher energy scores mean lower densities, which can be classified as OOD by the energy-based detector. Moreover, energy scores can be derived from any pre-trained classifier without re-training. Nevertheless, the energy gap between IND and OOD utterances might not always be optimal for differentiation. Thus we need auxiliary OOD utterances to explicitly shape the energy gap between IND and OOD utterances during the training stage Liu et al. (2020). This poses a new challenge in that the variety of possible OOD utterances is almost infinite. It is impossible to sample all of them to create the gap. Zheng et al. (2019) demonstrate that OOD utterances akin to IND utterances, such as sharing the same phrases or patterns, are more effective, whereas these high-quality OOD utterances are difficult and expensive to collect in practice. To tackle this problem, we propose a data manipulation framework GOT to generate high-quality OOD utterances as well as importance weights. GOT generates OOD utterances by perturbing IND utterances locally, which allows the generated utterances to be closer to IND. Specifically, GOT contains three modules: (1) a locating module to locate intent-related words in IND utterances; (2) a generating module to generate OOD utterances by replacing intent-related words with desirable candidate words, evaluated in two aspects: whether the candidate word is suitable given the context, and whether the candidate word is irrelevant to IND; (3) a weighting module to reduce the weights of potential harmful generated utterances. Figure 1 illustrates the overall process of GOT. Experiments show that the generated weighted OOD utterances can further improve the performance of the energy-based detector in unknown intent detection. Our code and data will be available at: https://github.com/yawenouyang/GOT. To summarize, the key contributions of the paper are as follows: * • We propose using energy scores for unknown intent detection. We conduct experiments on real-world datasets including CLINC150 and SNIPS to show that the energy score can achieve comparable performance as strong baselines. * • We put forward a new framework GOT to generate high-quality OOD utterances and reweight them. We demonstrate that GOT can further improve the performance of the energy score by explicitly shaping the energy gap and achieves state-of- the-art results. * • We show the generality of GOT by applying generated weighted OOD utterances to fine-tune the softmax-based detector, and the fine-tuned softmax-based detector can also yield significant improvements. ## 2 Related Work Lane et al., 2006, Manevitz and Yousef, 2007 and Dai et al., 2007 address OOD detection for the text-mining task. Recently, this problem has attracted growing attention from researchers Tur et al. (2014); Fei and Liu (2016); Fei et al. (2016); Ryu et al. (2017); Shu et al. (2017). Hendrycks and Gimpel (2017) present a simple baseline that utilizes the softmax confidence score to detect OOD inputs. Shu et al. (2017) create a binary classifier and calculate the confidence threshold for each class. Some distance-based methods Oh et al. (2018); Lin and Xu (2019); Yan et al. (2020) are also used to detect unknown intents as OOD utterances highly deviate from IND utterances in their local neighborhood. Simultaneously, with the advancement of deep generative models, learning such a model to approximate the distribution of training data is possible. However, Ren et al. (2019) find that likelihood scores derived from these models can be confounded by background components, and propose a likelihood ratio method to alleviate this issue. Gangal et al. (2019) reformulate and apply this method to unknown intent detection. Different from these methods, we introduce the energy score for this task. Liu et al. (2020) prove that the energy score is theoretically aligned with the density of the input, and can be derived from any classifier without re- training, hence desirable for our task. We further propose a data manipulation framework to generate high-quality OOD utterances to shape the energy gap between IND and OOD utterances. Note that there are some related works that also generate OOD samples to improve OOD detection performance. Lee et al. (2017) generate OOD samples with Generative Adversarial Network (GAN) Goodfellow et al. (2014), and Zheng et al. (2019) explore this method for unknown intent detection. However, there are two major distinctions between our study and these works. First, they generate OOD utterances according to continuous latent variables, which cannot be easily interpreted. In contrast, our framework generates utterances by performing local replacements to IND utterances, which is more interpretable to human. Second, our framework additionally contains a weighting module to reform the generated utterances. Our work is also inspired by Cai et al. (2020), which proposes a framework to augment the IND data, while our framework aims to generate OOD data. ## 3 Preliminary In this section, we formalize unknown intent detection task. Then we introduce the energy score, and its superiority and limitations for this task. ### 3.1 Problem Formulation Given a training dataset $\mathcal{D}^{\rm{train}}_{\rm{in}}=\\{(\mathbf{u}^{(i)},y^{(i)})\\}^{N}_{i=1}$ where $\mathbf{u}^{(i)}$ is an utterance and $y^{(i)}\in Y_{\rm{in}}=\\{y_{1},y_{2},...,y_{K}\\}$ is its intent label. In testing, given an utterance, unknown intent detection aims to detect whether its intent belongs to existing intents $Y_{\rm{in}}$. In general, unknown intent detection is an OOD detection task. The essence of all methods is to learn a score function that maps each utterance $\mathbf{u}$ to a single scalar that is distinguishable between IND and OOD utterances. ### 3.2 Energy-based OOD Detection An energy-based model LeCun et al. (2006) builds an energy function $E(\mathbf{u})$ that maps an input $\mathbf{u}$ to a scalar called energy score (i.e., $E:\mathbb{R}^{D}\rightarrow\mathbb{R}$). Using the energy function, probability density $p(\mathbf{u})$ can be expressed as: $\displaystyle p(\mathbf{u})=\frac{\exp(-E(\mathbf{u})/T)}{Z},$ (1) where $Z=\int_{\mathbf{u}}\exp(-E(\mathbf{u})/T)$ is the normalizing constant also known as the partition function and $T$ is the temperature parameter. Take the logarithm of both side of (1), we can get the equation: $\displaystyle\log p(\mathbf{u})=-E(\mathbf{u})/T-\log Z.$ (2) Since $Z$ is constant for all input $\mathbf{u}$, we can ignore the last term $\log Z$ and find that the negative energy function $-E(\mathbf{u})$ is in fact linearly aligned with the log likelihood function, which is desirable for OOD detection Liu et al. (2020). The energy-based model has a connection with a softmax-based classifier. For a classification problem with $K$ classes, a parametric function $f$ maps each input $\mathbf{u}$ to $K$ real-valued numbers (i.e., $f:\mathbb{R}^{D}\rightarrow\mathbb{R}^{K}$), known as logits. Logits are used to parameterize a categorical distribution using a softmax function: $\displaystyle p(y|\mathbf{u})=\frac{\exp(f_{y}(\mathbf{u})/T)}{\sum_{y^{\prime}}\exp(f_{y^{\prime}}(\mathbf{u})/T)},$ (3) where $f_{y}(\mathbf{u})$ indicates the $y^{\mathrm{th}}$ index of $f(\mathbf{u})$, i.e., the logit corresponding the $y^{\mathrm{th}}$ class label. And these logits can be reused to define an energy function without changing function $f$ Liu et al. (2020); Grathwohl et al. (2020): $\displaystyle E(\mathbf{u})=-T\cdot\log\sum_{y^{\prime}}\exp{(f_{y^{\prime}}(\mathbf{u})/T)}.$ (4) According to the above, a classifier can be reinterpreted as an energy-based model. It also means the energy score can be derived from any classifier. Due to its consistency with density and accessibility, we introduce the energy score for unknown intent detection, and utterances with higher energy scores can be viewed as OOD. Mathematically, the energy-based detector $G$ can be described as: $\displaystyle G(\mathbf{u};\delta,E)=\begin{cases}\mbox{IND}&E(\mathbf{u})\leq\delta,\\\ \mbox{OOD}&E(\mathbf{u})>\delta,\end{cases}$ (5) where $\delta$ is the threshold. Although the energy score can be easily computed from the classifier, the energy gap between IND and OOD samples might not always be optimal for differentiation. To solve this problem, Liu et al. (2020) propose an energy- bounded learning objective to further widen the energy gap. Specifically, the training objective of the classifier combines the standard cross-entropy loss with a regularization loss: $\displaystyle\mathcal{L}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}[-\log F_{y}(\mathbf{u})]+\lambda\cdot\mathcal{L}_{\rm{energy}},$ (6) where $F(\mathbf{u})$ is the softmax output, $\lambda$ is the auxiliary loss weight. The regularization loss is defined in terms of energy: $\displaystyle\mathcal{L}_{\rm{energy}}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}(\max(0,E(\mathbf{u})-m_{\rm{in}}))^{2}$ $\displaystyle+\mathbb{E}_{\hat{\mathbf{u}}\sim\mathcal{D}^{\rm{train}}_{\rm{out}}}(\max(0,m_{\rm{out}}-E(\hat{\mathbf{u}})))^{2},$ (7) which utilizes both labeled IND data $\mathcal{D}^{\rm{train}}_{\rm{in}}$ and auxiliary unlabeled OOD data $\mathcal{D}^{\rm{train}}_{\rm{out}}$. This term differentiates the energy scores between IND and OOD samples by using two squared hinge loss with the margin hyper-parameters $m_{\rm{in}}$ and $m_{\rm{out}}$. Ideally, one has to sample all types of OOD utterances to create the gap, which is impossible in practice. Zheng et al. (2019) demonstrate that OOD utterances akin to IND utterances could be more effective, but more difficult to collect. To address this problem, we propose a data manipulation framework, which can generate these high-quality OOD utterances and assign each generated utterance an importance weight to reduce the impact of potential bad generation. ## 4 Approach In this section, we will introduce our data manipulation framework GOT in detail. GOT aims to generate high-quality OOD utterances by replacing intent- related words in IND utterances, and then assign a weight to each generated OOD utterance. Eventually, the weighted OOD utterances can be used to shape the energy gap. ### 4.1 Locating Module Since not all words in utterances are meaningful, such as stop words, when generating OOD utterances, replacing these words may not change the intent. It is more efficient and effective to replace those intent-related words. Hence, we design an intent-related score function $S$ to measure how a word $w$ related to an intent $y$: $\displaystyle S(w,y)=\sum_{\mathbf{u}\in\mathcal{D}^{\rm{train}}_{y}}\sum_{w_{j}\in\mathbf{u}}$ $\displaystyle\mathbb{I}(w_{j}=w)[\log p(w_{j}|\boldsymbol{w}_{<j},y)$ $\displaystyle-\log p(w_{j}|\boldsymbol{w}_{<j})],$ (8) where $\mathcal{D}^{\rm{train}}_{y}$ is the subset of $\mathcal{D}^{\rm{train}}_{\rm{in}}$, which contains utterances with intent $y$, $\mathbb{I}$ is the indicator function, $w_{j}$ is the $j^{\rm{th}}$ word in $\mathbf{u}$, and $\boldsymbol{w}_{<j}=w_{1},...,w_{j-1}$. Given $w$ and $y$, the intent-related score function is the sum of the log- likelihood ratios for all $w$ in $\mathcal{D}^{\rm{train}}_{y}$. If $w$ is related to $y$, $w$ tends to occur more frequently in $\mathcal{D}^{\rm{train}}_{y}$ than other words. For each occurrence of $w$, i.e., $w_{j}$ equals $w$, $p(w|\boldsymbol{w}_{<j},y)$ should be higher than $p(w|\boldsymbol{w}_{<j})$ as the former is additionally conditioned on the related $y$, while the latter is not, hence resulting in a higher $S(w,y)$. In contrast, if $w$ is not related to $y$, $p(w|\boldsymbol{w}_{<j},y)$ is much less likely to be higher than $p(w|\boldsymbol{w}_{<j})$, or $w$ tends to have a lower frequency in $\mathcal{D}^{\rm{train}}_{y}$, hence $S(w,y)$ is likely to be small. Therefore, $S(w,y)$ can serve as a valid score function to measure how a word $w$ is related to an intent $y$. With the help of $S$, given an utterance to be replaced and its intent label, the locating module calculates the intent-related score for each word in this utterance, and a word with a higher score (i.e., larger than a given threshold) can be viewed as an intent-related word. #### Implementation: We use two generative models to estimate $p(w_{j}|\boldsymbol{w}_{<j},y)$ and $p(w_{j}|\boldsymbol{w}_{<j})$ separately. Specifically, we train a class- conditional language model Yogatama et al. (2017) with $\mathcal{D}^{\rm{train}}_{\rm{in}}$ to estimate $p(w_{j}|\boldsymbol{w}_{<j},y)$, shown in Figure 2. To predict the word $w_{j}$, we can combine the hidden state $h_{j}$ with the intent embedding from a learnable label embedding matrix $\mathbf{E}_{y}$, then pass it through a fully connected (FC) layer and a softmax layer to estimate the word distribution. In the training process, the input is the utterance with its intent from $\mathcal{D}^{\rm{train}}_{\rm{in}}$, and the training objective is to maximize the conditional likelihood of utterances. To estimate $p(w_{j}|\boldsymbol{w}_{<j})$, we directly use pre-trained GPT-2 Radford et al. (2019) without tuning. Note that the whole training process only needs $\mathcal{D}^{\rm{train}}_{\rm{in}}$, and does not need auxiliary supervised data. Figure 2: A class-conditional language model to estimate $p(w_{j}|\boldsymbol{w}_{<j},y)$. ### 4.2 Generating Module After detecting intent-related words in the utterance $\mathbf{u}$, for each of the intent-related words $w_{t}$, the generating module aims to generate the replacement words from the vocabulary set to replace $w_{t}$ and obtain OOD utterances. We design a candidate score function $Q$ to measure the desirability of the candidate word $c$: $\begin{split}Q(c;\mathbf{u},w_{t})&=\log p(c|\boldsymbol{w}_{<t},\boldsymbol{w}_{>t})\\\ &-\log\sum_{y\in Y_{\rm{in}}}p(c|\boldsymbol{w}_{<t},y)p(y).\end{split}$ (9) The first term of the right hand side is the log-likelihood of $c$ conditioned on the context of $w_{t}$; the higher it is, the more suitable $c$ is given the context. The second term of the right hand side is the negative log of the average likelihoods of $c$ conditioned on the IND label and previous context; the higher it is, the less relevant $c$ is to IND utterances. Therefore, if $c$ has a higher candidate score, that means it fits the context well and has a low density under the IND utterance distribution, thus can be selected as the replacement word to replace $w_{t}$. The resulting generated OOD utterance is: $\hat{\mathbf{u}}=\\{\boldsymbol{w}_{<t},c,\boldsymbol{w}_{>t}\\}.$ (10) #### Implementation: Similar with the locating module, we also do not need auxiliary supervised data to train the generating module. We use the same class-conditional language model mentioned in Section 4.1 to estimate $p(c|\boldsymbol{w}_{<t},y)$. $p(y)$ is the training set label ratios. To estimate $p(c|\boldsymbol{w}_{<t},\boldsymbol{w}_{>t})$, we use pre-trained BERT Devlin et al. (2018) without tuning. ### 4.3 Weighting Module Since we cannot ensure the generation process is perfect, given a generated OOD utterance set $\mathcal{D}^{\rm{gen}}_{\rm{out}}=\\{\hat{\mathbf{u}}^{(i)}\\}^{M}_{i=1}$, there might be some unfavorable utterances that are useless or even harmful for tuning the classifier. To fit these utterances, the generalization ability of the classifier will decrease. The weighting module aims to assign these utterances small weights. We first use Equation 6 as the loss function to train a classifier by taking $\mathcal{D}^{\rm{gen}}_{\rm{out}}$ as $\mathcal{D}^{\rm{train}}_{\rm{out}}$. Then we calculate the influence value $\phi\in\mathbb{R}$ Wang et al. (2020) for each generated utterance $\hat{\mathbf{u}}$. The influence value approximates the influence of removing this utterance on the loss at validation samples. An utterance with positive $\phi$ implies that its removal will reduce the validation loss and strengthen the classifier’s generalization ability, thus we should assign it a small weight. ***Details about how to calculate the influence can be found in Koh and Liang (2017); Wang et al. (2020). In particular, given $\phi$, we calculate weight $\alpha$ as follows: $\alpha=\frac{1}{1+e^{\frac{\gamma\phi}{\max_{\phi}-\min_{\phi}}}},$ (11) where $\gamma\in\mathbb{R}^{+}$ is used to make the weight distribution flat or steep, $\max_{\phi}$ and $\min_{\phi}$ are the maximum and minimum influence value of utterances in $\mathcal{D}^{\rm{gen}}_{\rm{out}}$. #### Implementation: We still do not need auxiliary supervised data for this module. The validation loss is the cross-entropy loss on the validation set. Algorithm 1 Data Manipulation Process 1:Training set $\mathcal{D}^{\rm{train}}_{\rm{in}}$, intent-related score function $S$, candidate score function $Q$, intent-related word threshold $\epsilon$, candidate number K, weight term $\gamma$ 2:Generated weighted OOD utterances set $\mathcal{D}^{\rm{gw}}_{\rm{out}}$ 3:$\mathcal{D}^{\rm{gen}}_{\rm{out}}=\\{\\}$ # generated OOD utterances without weights 4:for $(\mathbf{u},y)\in\mathcal{D}^{\rm{train}}_{\rm{in}}$ do 5: for $w_{j}\in\mathbf{u}$ do 6: if $S(w_{j},y)>\epsilon$ then 7: $\mathcal{C}=\rm{top-}K_{c}\,Q(c;\mathbf{u},w_{j})$ 8: for $c\in\mathcal{C}$ do 9: $\hat{\mathbf{u}}=\\{\boldsymbol{w}_{<j},c,\boldsymbol{w}_{>j}\\}$ 10: Add $\hat{\mathbf{u}}$ into $\mathcal{D}^{\rm{gen}}_{\rm{out}}$ 11: end for 12: end if 13: end for 14:end for 15:$\mathcal{D}^{\rm{gw}}_{\rm{out}}=\\{\\}$ Comment# generated weighted OOD utterances 16:for $\hat{\mathbf{u}}\in\mathcal{D}^{\rm{gen}}_{\rm{out}}$ do 17: Calculate the weight $\alpha$ by Equation 11 18: Add $(\hat{\mathbf{u}},\alpha)$ into $\mathcal{D}^{\rm{gw}}_{\rm{out}}$ 19:end for 20:return $\mathcal{D}^{\rm{gw}}_{\rm{out}}$ ### 4.4 Overall Data Manipulation Process We summarize the process of GOT in Algorithm 1. Line 4 shows that $w_{j}$ can be viewed as an intent-related word for $y$ if $S(w_{j},y)$ is greater than the intent-related word threshold $\epsilon$. Line 5 shows that we generate $K$ replacement words with the top-$K$ $Q(c;\mathbf{u},w_{t})$. ### 4.5 Shape the energy gap with GOT After obtaining weighted OOD utterances set $\mathcal{D}^{\rm{gw}}_{\rm{out}}$, we can explicitly shape the energy gap with them, resulting in IND utterances with smaller energy scores and OOD utterances with higher energy scores. Specifically, we redefine the regularization loss in Equation 6 as follows and use it to re-train the classifier: $\displaystyle\mathcal{L}_{\rm{energy}}=\mathbb{E}_{(\mathbf{u},y)\sim\mathcal{D}^{\rm{train}}_{\rm{in}}}(\max(0,E(\mathbf{u})-m_{\rm{in}}))^{2}$ $\displaystyle+\mathbb{E}_{(\hat{\mathbf{u}},\alpha)\sim\mathcal{D}^{\rm{gw}}_{\rm{out}}}\alpha(\max(0,m_{\rm{out}}-E(\hat{\mathbf{u}})))^{2}.$ (12) In the testing process, we can calculate the energy score for the utterance by Equation 4, and identify whether it is OOD by Equation 5. ## 5 Experimental Setup ### 5.1 Datasets To evaluate the effectiveness of the energy score and our proposed framework, we conducted experiments on two public datasets: * • CLINC150†††https://github.com/clinc/oos-eval (Larson et al., 2019): this dataset covers 150 intent classes over ten domains. It supports some OOD utterances that do not fall into any of the system’s supported intents to avoid splitting unknown intents manually. * • SNIPS‡‡‡https://github.com/snipsco/nlu-benchmark (Coucke et al., 2018): this dataset is a personal voice assistant dataset that contains seven intent classes. SNIPS does not explicitly include OOD utterances. We kept two classes SearchCreativeWork and SearchScreeningEvent as unknown intents. Table 1 provides summary statistics about these two datasets. Note that the training set and validation set do not include OOD utterances. Statistic | CLINC150 | SNIPS ---|---|--- Train | 15000 | 9385 Validation | 3000 | 500 Test-IND | 4500 | 486 Test-OOD | 1000 | 214 Test-IND: Test-OOD | 4.5: 1 | 2.3: 1 Number of IND classes | 150 | 5 Table 1: Statistics of CLINC150 and SNIPS datasets. Method | CLINC150 | SNIPS ---|---|--- AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$ | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$ MSP | 0.955 | 0.164 | 0.990 | 0.814 | 0.951 | 0.370 | 0.970 | 0.922 DOC | 0.943 | 0.221 | 0.985 | 0.790 | 0.938 | 0.493 | 0.956 | 0.910 Mahalanobis | 0.969 | 0.118 | 0.993 | 0.871 | 0.979 | 0.088 | 0.989 | 0.964 LMCL | 0.962 | 0.124 | 0.992 | 0.810 | 0.976 | 0.087 | 0.987 | 0.960 SEG | 0.959 | 0.152 | 0.991 | 0.823 | 0.974 | 0.074 | 0.986 | 0.948 Energy | 0.967 | 0.143 | 0.991 | 0.897 | 0.944 | 0.497 | 0.964 | 0.924 Energy + GOT | 0.973 | 0.114 | 0.993 | 0.914 | 0.989 | 0.039 | 0.995 | 0.972 Energy + GOT w/o weighting | 0.972 | 0.123 | 0.992 | 0.909 | 0.979 | 0.083 | 0.989 | 0.969 Table 2: AUROC, FPR95, AUPR In, AUPR Out on CLINC150, SNIPS datasets. Best results are in bold. All results are averaged across five seeds. ### 5.2 Metrics We used four common metrics for OOD detection to measure the performance. AUROC (Davis and Goadrich, 2006), AUPR In and AUPR Out (Manning et al., 1999) are threshold-independent performance evaluations and higher values are better. FPR95 is the false positive rate (FPR) when the true positive rate (TPR) is 95%, and lower values are better. Considering the smaller proportion of OOD utterances in the test set on two datasets, AUPR Out is more informative here. ### 5.3 Baselines We introduce the following classifier-based methods as baselines: * • MSP (Hendrycks and Gimpel, 2017) trains a classifier with IND utterances and uses the softmax confidence score to detect OOD utterances. * • DOC (Shu et al., 2017) trains a binary classifier for each IND intent and uses maximum binary classifier output to detect OOD utterances. * • Mahalanobis (Lee et al., 2018) trains a classifier with softmax loss and uses Mahalanobis distance of the input to the nearest class-conditional Gaussian distribution to detect OOD utterances. * • LMCL (Lin and Xu, 2019) uses LOF (Breunig et al., 2000) in the utterance representation learned by a classifier. In training, they replace the softmax loss with LMCL (Wang et al., 2018). * • SEG (Yan et al., 2020) also uses LOF in the utterance representation. In training, they use semantic-enhanced large margin Gaussian mixture loss. ### 5.4 Implementation Details For a fair comparison, all classifiers used in the above methods and ours are pre-trained BERT (Devlin et al., 2018) with a multi-layer perceptron (MLP). We select parameter values based on validation accuracy. For energy score, we follow Liu et al. (2020) to set $T$ as 1, $\lambda$ as 0.1, $m_{\rm{in}}$ as -8 and $m_{\rm{out}}$ as -5. For influence value, we focus on changes on MLP parameters and use stochastic estimation Koh and Liang (2017) with the scaling term 1000 and the damping term 0.003. For LMCL implementation, we set nearest neighbor number as 20, scaling factor s as 30 and cosine margin m as 0.35, which is recommended by Lin and Xu (2019). For SEG, we follow Yan et al. (2020) to set margin as 1 and trade-off parameter as 0.5. For our framework, we set candidate number $K$ as 2, weight term $\gamma$ as 20. In particular, for CLINC150, we set threshold $\epsilon$ as 150 and generate 100 weighted utterances for each intent. For SNIPS, we set threshold $\epsilon$ as 1500 and generate 1800 weighted utterances for each intent. The difference in settings between two datasets is due to the different sizes of per intent in the training set. ## 6 Results and Analysis In this part, we will show the results of different methods on two datasets and offer some further analysis. ### 6.1 Overall Results As shown in Table 2, we can observe that: * • The energy score can achieve comparable results on two datasets. Note that on SNIPS dataset, the advantages of the energy score are not as obvious. The reason is that SNIPS dataset is not as challenging as CLINC150 dataset, most methods can achieve good results, such as AUPR out is greater than 0.9. * • Energy + GOT achieves better results on two datasets as compared to the raw energy score. It indicates that our generated weighted OOD utterances can effectively shape the energy gap, resulting in more distinguishable between IND and OOD utterances. * • We also report ablation study results. “w/o weighting” is the energy score tuned by OOD utterances without reweighting. We can see that there is a decrease in performance on both datasets, which shows the advantage of the weighting module (p-value < 0.005). Figure 3: Effect of the auxiliary loss weight (left) and the number of generated weighted OOD utterances per intent (right). ### 6.2 Effect of Hyper-parameters During the training process, we find that the method performance is sensitive to two hyper-parameters: auxiliary loss weight $\lambda$ and the number of generated weighted OOD utterances per intent. We conduct two experiments to demonstrate their effects separately. We choose CLINC150 dataset as it is more challenging as mentioned before. #### Auxiliary Loss Weight: We set the auxiliary loss weight $\lambda$ from $0$ to $0.5$ with an interval of $0.1$ to observe its impact. Results are shown in Figure 3 (left). With the increase of auxiliary loss weight, the performance increases first and then decreases. $\lambda=0.1$ achieves the highest AUPR Out $0.914$ and outperforms $\lambda=0$ with an improvement of 1.7% (AUPR Out). The results suggest that although shaping the energy gap can improve the performance, there exists a trade-off between optimizing the regularization loss and optimizing cross-entropy loss. #### Number of OOD Utterances: we compare the performance of generated weighted utterance numbers for each intent by adjusting the number from $0$ to $100$ with an interval of $20$. Results are shown in Figure 3 (right). As a whole, AUPR Out increases as more OOD utterances are incorporated into training. We can see that the performance is also improved even with a small generated number, which indicates the necessity of explicitly shaping the energy gap. Method | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$ ---|---|---|---|--- Energy | 0.967 | 0.143 | 0.991 | 0.897 Energy + Wiki | 0.961 | 0.170 | 0.988 | 0.889 Table 3: Effect of using Wikipedia sentences to shape the energy gap. Method | AUROC $\uparrow$ | FPR95$\downarrow$ | AUPR In$\uparrow$ | AUPR Out$\uparrow$ ---|---|---|---|--- MSP | 0.955 | 0.164 | 0.990 | 0.814 MSP + GOT | 0.972 | 0.118 | 0.993 | 0.903 Table 4: Effect of using GOT to fine-tune the softmax-based detector. Intent | IND utterance and intent-related word [w] | Replacement word | Weight ---|---|---|--- Insurance | i need to know more about my health [plan] | problems | 0.50 what [benefits] are provided by my insurance | services | 0.19 Credit Limit Change | can i get a higher limit on my american express [card] | ticket | 0.46 can you [increase] how much i can spend on my visa | guess | 0.54 Reminder | can you list each item on my [reminder] list | contacts | 0.50 what’s on the [reminder] list | agenda | 0.78 Redeem Rewards | walk me through the process of cashing in on [credit] card points | those | 0.22 i have credit card [points] but don’t know how to use them | privileges | 0.50 Table 5: Weighted OOD utterances generated by GOT on CLINC150 dataset. ### 6.3 Compare with Wikipedia Sentences An easy way to obtain OOD utterances is from the Wikipedia corpus. We investigate the effect of regarding Wikipedia sentences as OOD utterances to shape the energy gap on CLINC150 dataset. The Wikipedia sentences are from Larson et al. (2019) and the number is 14750. As shown in Table 3, we can observe that these sentences cannot improve the performance and even have a negative effect (We experimented with several hyper-parameters, this is the best result we could get). After observing these Wikipedia sentences, we find that they have little relevance to IND utterances. Therefore, simply using Wikipedia sentences is unrepresentative and ineffective for shaping the energy gap. ### 6.4 GOT for Softmax-based Detector As mentioned in Section 1, when using the softmax-based detector, OOD inputs may also receive a high softmax confidence score. To tackle this problem, Lee et al. (2017) replace the cross entropy loss with the confidence loss. The confidence loss adds the Kullback-Leibler loss (KL loss) on the original cross entropy loss, which forces OOD inputs less confident by making their predictive distribution to be closer to uniform. To verify the generality of GOT, we directly use the generated weighted OOD utterances to fine-tune the softmax-based detector with the confidence loss. The results are shown in Table 4. Our MSP + GOT has a significant improvement and outperforms MSP by 8.9% (AUPR Out). Figure 4 provides an intuitive presentation. The softmax confidence scores of OOD from MSP form smooth distributions (see Figure 4 (left)). In contrast, the softmax confidence scores of OOD from MSP + GOT concentrate on small values (see Figure 4 (right)). Overall the softmax confidence score is more distinguishable between IND and OOD after tuning by GOT. Figure 4: Histogram of the softmax confidence score from MSP (left) and MSP + GOT (right). ### 6.5 Case Study for GOT We sample some intents and showcase generated weighted OOD utterances in Table 5. We can observe that intent-related words that located by our locating module are diverse, containing not only words appeared in the intent label. The replacement word fits the context well, and the intent of the generated utterance is exactly changed in most conditions. Admittedly, GOT may have a bad generation, like replace “benefits” with “services” in the second utterance, which leads the generated utterance is still in-domain. Fortunately, the weighting module assigns these utterances a lower weight to reduce their potential harm. ## 7 Conclusion and Future Work In this paper, we propose using energy scores for unknown intent detection and provide empirical evidence that the energy-based detector is comparable to strong baselines. To shape the energy gap, we propose a data manipulation framework GOT to generate high-quality OOD utterances and assign their importance weights. We show that the energy-based detector tuned by GOT can achieve state-of-the-art results. We further employ generated weighted utterances to fine-tune the softmax-based detector and also achieve improvements. In the future, we will explore more operations, such as insertion, drop, etc., to enhance the diversity of generated utterances. ## Acknowledgments We would like to thank the anonymous reviewers for their constructive comments. This work was supported by NSFC Projects (Nos. 61936012 and 61976114), the National Key R&D Program of China (No. 2018YFB1005102). ## References * Breunig et al. (2000) Markus M Breunig, Hans-Peter Kriegel, Raymond T Ng, and Jörg Sander. 2000. Lof: identifying density-based local outliers. In _Proceedings of the 2000 ACM SIGMOD international conference on Management of data_ , pages 93–104. * Cai et al. (2020) Hengyi Cai, Hongshen Chen, Yonghao Song, Cheng Zhang, Xiaofang Zhao, and Dawei Yin. 2020. Data manipulation: Towards effective instance learning for neural dialogue generation via learning to augment and reweight. In _Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL)_. * Coucke et al. (2018) Alice Coucke, Alaa Saade, Adrien Ball, Théodore Bluche, Alexandre Caulier, David Leroy, Clément Doumouro, Thibault Gisselbrecht, Francesco Caltagirone, Thibaut Lavril, et al. 2018. Snips voice platform: an embedded spoken language understanding system for private-by-design voice interfaces. _arXiv preprint arXiv:1805.10190_. * Dai et al. (2007) Wenyuan Dai, Gui-Rong Xue, Qiang Yang, and Yong Yu. 2007. Co-clustering based classification for out-of-domain documents. In _Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining_ , pages 210–219. * Davis and Goadrich (2006) Jesse Davis and Mark Goadrich. 2006. The relationship between precision-recall and roc curves. In _Proceedings of the 23rd international conference on Machine learning_ , pages 233–240. * Devlin et al. (2018) Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. _arXiv preprint arXiv:1810.04805_. * Fei and Liu (2016) Geli Fei and Bing Liu. 2016. Breaking the closed world assumption in text classification. In _Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies_ , pages 506–514, San Diego, California. Association for Computational Linguistics. * Fei et al. (2016) Geli Fei, Shuai Wang, and Bing Liu. 2016. Learning cumulatively to become more knowledgeable. In _Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining_ , pages 1565–1574. * Gangal et al. (2019) Varun Gangal, Abhinav Arora, Arash Einolghozati, and Sonal Gupta. 2019. Likelihood ratios and generative classifiers for unsupervised out-of-domain detection in task oriented dialog. _arXiv preprint arXiv:1912.12800_. * Goodfellow et al. (2014) Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, editors, _Advances in Neural Information Processing Systems 27_ , pages 2672–2680. Curran Associates, Inc. * Grathwohl et al. (2020) Will Grathwohl, Kuan-Chieh Wang, Jörn-Henrik Jacobsen, David Duvenaud, Mohammad Norouzi, and Kevin Swersky. 2020. Your classifier is secretly an energy based model and you should treat it like one. _International Conference on Learning Representatinos_. * Hendrycks and Gimpel (2017) Dan Hendrycks and Kevin Gimpel. 2017. A baseline for detecting misclassified and out-of-distribution examples in neural networks. _Proceedings of International Conference on Learning Representations_. * Koh and Liang (2017) Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In _International Conference on Machine Learning_ , pages 1885–1894. PMLR. * Lane et al. (2006) Ian Lane, Tatsuya Kawahara, Tomoko Matsui, and Satoshi Nakamura. 2006. Out-of-domain utterance detection using classification confidences of multiple topics. _IEEE Transactions on Audio, Speech, and Language Processing_ , 15(1):150–161. * Larson et al. (2019) Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, and Jason Mars. 2019. An evaluation dataset for intent classification and out-of-scope prediction. In _Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)_ , pages 1311–1316, Hong Kong, China. Association for Computational Linguistics. * LeCun et al. (2006) Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and F Huang. 2006. A tutorial on energy-based learning. _Predicting structured data_ , 1(0). * Lee et al. (2017) Kimin Lee, Honglak Lee, Kibok Lee, and Jinwoo Shin. 2017. Training confidence-calibrated classifiers for detecting out-of-distribution samples. _arXiv preprint arXiv:1711.09325_. * Lee et al. (2018) Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. 2018. A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors, _Advances in Neural Information Processing Systems 31_ , pages 7167–7177. Curran Associates, Inc. * Lin and Xu (2019) Ting-En Lin and Hua Xu. 2019. Deep unknown intent detection with margin loss. In _Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics_ , pages 5491–5496, Florence, Italy. Association for Computational Linguistics. * Liu et al. (2020) Weitang Liu, Xiaoyun Wang, John Owens, and Yixuan Li. 2020. Energy-based out-of-distribution detection. _Advances in Neural Information Processing Systems_ , 33. * Louizos and Welling (2017) Christos Louizos and Max Welling. 2017. Multiplicative normalizing flows for variational bayesian neural networks. In _Proceedings of the 34th International Conference on Machine Learning-Volume 70_ , pages 2218–2227. JMLR. org. * Manevitz and Yousef (2007) Larry Manevitz and Malik Yousef. 2007. One-class document classification via neural networks. _Neurocomputing_ , 70(7-9):1466–1481. * Manning et al. (1999) Christopher D Manning, Christopher D Manning, and Hinrich Schütze. 1999. _Foundations of statistical natural language processing_. MIT press. * Oh et al. (2018) Kyo-Joong Oh, DongKun Lee, Chanyong Park, Young-Seob Jeong, Sawook Hong, Sungtae Kwon, and Ho-Jin Choi. 2018. Out-of-domain detection method based on sentence distance for dialogue systems. In _2018 IEEE International Conference on Big Data and Smart Computing (BigComp)_ , pages 673–676. IEEE. * Radford et al. (2019) Alec Radford, Jeff Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language models are unsupervised multitask learners. * Ren et al. (2019) Jie Ren, Peter J Liu, Emily Fertig, Jasper Snoek, Ryan Poplin, Mark Depristo, Joshua Dillon, and Balaji Lakshminarayanan. 2019. Likelihood ratios for out-of-distribution detection. In _Advances in Neural Information Processing Systems_ , pages 14680–14691. * Ryu et al. (2017) Seonghan Ryu, Seokhwan Kim, Junhwi Choi, Hwanjo Yu, and Gary Geunbae Lee. 2017. Neural sentence embedding using only in-domain sentences for out-of-domain sentence detection in dialog systems. _Pattern Recognition Letters_ , 88:26–32. * Shu et al. (2017) Lei Shu, Hu Xu, and Bing Liu. 2017. DOC: Deep open classification of text documents. In _Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing_ , pages 2911–2916, Copenhagen, Denmark. Association for Computational Linguistics. * Tur et al. (2014) Gokhan Tur, Anoop Deoras, and Dilek Hakkani-Tür. 2014. Detecting out-of-domain utterances addressed to a virtual personal assistant. In _Fifteenth Annual Conference of the International Speech Communication Association_. * Wang et al. (2018) Feng Wang, Jian Cheng, Weiyang Liu, and Haijun Liu. 2018. Additive margin softmax for face verification. _IEEE Signal Processing Letters_ , 25(7):926–930. * Wang et al. (2020) Zifeng Wang, Hong Zhu, Zhenhua Dong, Xiuqiang He, and Shao-Lun Huang. 2020. Less is better: Unweighted data subsampling via influence function. In _Proceedings of the AAAI Conference on Artificial Intelligence_ , volume 34, pages 6340–6347. * Yan et al. (2020) Guangfeng Yan, Lu Fan, Qimai Li, Han Liu, Xiaotong Zhang, Xiao-Ming Wu, and Albert Y.S. Lam. 2020. Unknown intent detection using Gaussian mixture model with an application to zero-shot intent classification. In _Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics_ , pages 1050–1060, Online. Association for Computational Linguistics. * Yogatama et al. (2017) Dani Yogatama, Chris Dyer, Wang Ling, and Phil Blunsom. 2017. Generative and discriminative text classification with recurrent neural networks. _arXiv preprint arXiv:1703.01898_. * Zheng et al. (2019) Yinhe Zheng, Guanyi Chen, and Minlie Huang. 2019. Out-of-domain detection for natural language understanding in dialog systems. _arXiv preprint arXiv:1909.03862_.
arxiv-papers
2021-07-27T01:32:23
2024-09-04T03:07:20.283703
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yawen Ouyang, Jiasheng Ye, Yu Chen, Xinyu Dai, Shujian Huang, Jiajun\n Chen", "submitter": "Yawen Ouyang", "url": "https://arxiv.org/abs/2107.12542" }
2107.12547
# Probing neural networks with t-SNE, class-specific projections and a guided tour Christopher R. Hoyt Stanford University Art B. Owen Stanford University (July 2021) ###### Abstract We use graphical methods to probe neural nets that classify images. Plots of t-SNE outputs at successive layers in a network reveal increasingly organized arrangement of the data points. They can also reveal how a network can diminish or even forget about within-class structure as the data proceeds through layers. We use class-specific analogues of principal components to visualize how succeeding layers separate the classes. These allow us to sort images from a given class from most typical to least typical (in the data) and they also serve as very useful projection coordinates for data visualization. We find them especially useful when defining versions guided tours for animated data visualization. ## 1 Introduction Probing is a term used to describe certain exploratory analyses of neural networks. It allows the user to see what happens as the number of layers used [1] or amount of training time taken [14] increases. Nguyen et al. [13] consider changes to both depth and breadth of networks. One could also study changes to a network as the volume of training data increases. Alain and Bengio [1] investigate networks of $L$ layers by passing the output of the first $\ell<L$ layers through a specially retrained softmax layer as the $\ell+1$’st and final layer. They can then study the progress that the network makes as layers are added. They have the interesting observation that the information content in layer $\ell+1$ can be less than what is in layer $\ell$ but not more, and yet accuracy may improve because the information has a better representation at later layers. In this work, we present some tools for graphically probing neural nets. The nets we study as examples are designed to classify an image into one of $K$ classes. Instead of passing the output of an intermediate layer through a special softmax layer we explore each layer’s output visually. First, we run t-SNE [17] on the outputs of intermediate layers. Sometimes we see interesting phenomena in the intermediate layers that have disappeared by the final layers. For instance, within-class clustering could be evident in the early layers but forgotten by the final layer without harming the final classification accuracy that the network was trained to optimize. Next, we look at principal components (PC) projections of intermediate layer results. By watching how those change from layer to layer we can see how the group separations evolve. The PC projections have the advantage that we can project additional points, such as held out data points, onto their coordinates. This is different from t-SNE where including additional points would change the mapping of all the points. Also, PC mappings are deterministic given the data, and hence more reproducible, while the t-SNE images are randomly generated. We do not always see the neural collapse phenomenon from [14]. That analysis predicts that the neuron outputs for different categories will end up as roughly spherical clusters at the corners of a simplex. Instead of clusters we often see ellipsoids extending from such a corner towards the origin. Neural collapse predicts an angle of about $90$ degrees between clusters. We see that this emerges as layers progress, but in early layers than angle can be much less. In intermediate layers we often see angles much greater than $90$ degrees as if hard to separate classes are being treated as opposites. When there are many classes, principal components trained on all of them can make it harder to spot patterns among a few commonly confused classes. We could get better resolution by defining principal components tuned to one subset of classes. That, however, requires a separate PCA analysis for every subset of variables. We have found it beneficial to define one class-specific vector per output class in a way that is analagous to the PC eigenvectors. Then each subset of categories comes with a prescribed set of vectors for projection. Similar class-specfic vectors were previously studied by Krzanowski [11] but that work was not about visualization. We can also use these vectors to rank input images from most typical to least typical members of their respective classes. Note that typical is defined with respect to the set of images gathered for training and those images might not remain typical when an algorithm is deployed. We also consider some animated tours [2, 3] of data at each level where we probe. Li et al. [12] previously used grand tours on the output of a neural network. In the terminology of [3] our tours are guided tours: we select pairs of interesting projections and interpolate between them. We develop guided tours based on class-specific projections of data including looks at intermediate layers. We use two well studied neural networks as running examples. One is the CIFAR-10 dataset [9] of sixty thousand 32 by 32 color images selected from 10 classes consisting of four mechanical groups (e.g., airplanes and automobiles) and six animal groups (e.g., cats and dogs). For this we use the network and trained weights from https://github.com/geifmany/cifar-vgg which utilizes the VGG model with 15 layers. VGG stands for the ‘visual geometry group’ at Oxford who developed the architecture. The other example is the fashion-MNIST data with sixty thousand 28 by 28 grayscale images selected from 10 classes of clothing items (like trousers and pullovers), which was then subsequently padded out with zeros along the edges to become 32 by 32 images with three channels. For this we consider the ResNet50 network architecture [8] with weights initialized from ImageNet pretraining [6]. The outline of this paper is as follows. Section 2 gives background about the neural networks we explore. Section 3 shows a use of t-SNE for probing. We can see how class separation progresses as the layers increase. Section 4 defines our class-specific vectors and compares plots in those coordinates to principal components plots. Section 5 describes our class-specific tours. It include still shots of the tours and a link to animated versions. Section 6 describes how our class-specific vectors can potentially identify separations of groups within a single classification. ## 2 Image data sets, architectures, and The network we use for CIFAR-10 from https://github.com/geifmany/cifar-vgg has thirteen convolution layers and two fully connected layers that we study. Those are layers $\ell=2,6,9,14,18,22,26,30,34,38,42,46,50,56,60$ of that network. Figure 1 shows their positions in the overall architecture. We probed the network outputs at these layers by passing the output from layer $\ell$ through a specially trained final softmax layer. Figure 2 plots the accuracy attained this way versus the layer indices. What we see is that the accuracy on test data increased up to layer 30, and subsequent layers did not improve it by much. The accuracy on the training data saturated at $100$% by layer 18. In a Shapley value analysis (to be reported elsewhere) we found that of these layers, layer $2$ was most important for ultimate accuracy. At layer 2, the network is not anywhere near it’s final accuracy. Dropout Block Block Input Conv2D(3x3) ReLU BatchNorm Dropout Output Pooling Block Block Input Conv2D(3x3) ReLU BatchNorm MaxPool(2x2) Output VGG15 ModelModel Input Dropout Block Pooling Block Dropout Block Pooling Block Dropout Block Dropout Block Pooling Block Dropout Block Dropout Block Pooling Block Dropout Block Dropout Block Pooling Block Dropout(0.5) Flatten Dense(512) ReLU BatchNorm Dropout(0.5) Dense(10) Softmax Output $0.3$ Dropout Rate $0.4$ Dropout Rate $0.5$ Dropout Rate Figure 1: The model architecture for the VGG15 model. The model consists of thirteen convolution layers and two dense layers, creating fifteen natural checkpoints for the model overall. Refer to https://github.com/geifmany/cifar-vgg for more specific details on the model architecture. For fashion-MNIST we used the ResNet50 architecture from [8] which has 177 layers. See Figure 3. We probed the network at the outputs of the sixteen convolution / identity blocks, corresponding to layers $\ell=17,27,37,49,59,69,79,91,101,111,121,131,141,153,163,173.$ The accuracy attained by adjoining a softmax layer after layer $\ell$ is plotted versus $\ell$ in Figure 2. There we do not see the rapid initial gain in accuracy versus $\ell$. We attribute this difference to that network having been initialized with values from training on ImageNet [6]. Figure 2: Intermediate accuracies of the models used for the CIFAR10 and FashionMNIST datasets using a logistic regression trained on a random subset of $n=10,000$ samples from the training dataset. We plot the accuracy of the model versus layer with one curve for the training inputs and another for the test inputs. Convolution Block Block Input Conv2D(1x1) BatchNorm ReLU Conv2D(3x3) BatchNorm ReLU Conv2D(1x1) BatchNorm Conv2D(1x1) BatchNorm Add ReLU Block Output Identity Block Block Input Conv2D(1x1) BatchNorm ReLU Conv2D(3x3) BatchNorm ReLU Conv2D(1x1) BatchNorm Conv2D(1x1) BatchNorm Add ReLU Block Output ResNet50 ModelModel Input Conv2D(7x7) BatchNorm ReLU MaxPool(3x3) Conv. Block Identity Block Identity Block Conv. Block Identity Block Identity Block Identity Block Conv. Block Identity Block Identity Block Identity Block Identity Block Identity Block Conv. Block Identity Block Identity Block AvgPool Dense(10) Softmax Model Output Figure 3: ]The model architecture for the ResNet50 model. The model starts off with an initial processing section, and then proceeds with a series of 16 residual units (the identity and convolution blocks). As we progress through the blocks, we decrease the width and height of the inputs and increase the number of channels. Refer to [8] for more specific details on the model architecture. | Predicted class ---|--- True class | plane | car | bird | cat | deer | dog | frog | horse | ship | truck plane | 924 | 2 | 20 | 4 | 3 | 0 | 1 | 3 | 36 | 7 car | 3 | 972 | 0 | 0 | 0 | 1 | 0 | 0 | 5 | 19 bird | 13 | 0 | 929 | 11 | 16 | 10 | 11 | 5 | 5 | 0 cat | 5 | 0 | 24 | 848 | 12 | 88 | 14 | 3 | 4 | 2 deer | 3 | 0 | 12 | 16 | 946 | 10 | 5 | 8 | 0 | 0 dog | 2 | 2 | 11 | 68 | 11 | 895 | 2 | 6 | 1 | 2 frog | 4 | 1 | 14 | 12 | 2 | 5 | 961 | 0 | 1 | 0 horse | 5 | 1 | 9 | 6 | 8 | 12 | 0 | 958 | 0 | 1 ship | 7 | 0 | 2 | 4 | 1 | 1 | 1 | 0 | 979 | 5 truck | 9 | 26 | 0 | 2 | 1 | 2 | 0 | 1 | 12 | 947 Table 1: This is the confusion matrix for the CIFAR10 test data. | Predicted class ---|--- True class | t-shirt/top | trouser | pullover | dress | coat | sandal | shirt | sneaker | bag | ankle t-shirt/top | 873 | 1 | 12 | 12 | 4 | 1 | 94 | 0 | 3 | 0 trouser | 1 | 987 | 1 | 6 | 1 | 0 | 2 | 0 | 2 | 0 pullover | 15 | 1 | 879 | 10 | 43 | 0 | 51 | 0 | 1 | 0 dress | 14 | 6 | 7 | 919 | 26 | 0 | 26 | 1 | 0 | 1 coat | 0 | 0 | 55 | 24 | 878 | 0 | 43 | 0 | 0 | 0 sandal | 0 | 0 | 0 | 0 | 0 | 983 | 0 | 15 | 0 | 2 shirt | 86 | 3 | 47 | 19 | 69 | 0 | 768 | 0 | 8 | 0 sneaker | 0 | 0 | 0 | 0 | 0 | 8 | 0 | 973 | 0 | 19 bag | 3 | 2 | 1 | 1 | 3 | 1 | 2 | 3 | 983 | 1 ankle boot | 0 | 0 | 0 | 0 | 0 | 5 | 1 | 32 | 0 | 962 Table 2: This is the confusion matrix for the FashionMNIST test data. The confusion matrix for the CIFAR10 data is in Table 1. Separating cat images from dog images appears to be the hardest task. Trucks and cars are also frequently confused with each other. Many planes are labeled as ships but the reverse is less common. Table 2 shows the confusion matrix for the FashionMNIST data. Coats and pullovers are commonly confused with each other as are ankle boots and sneakers, while shirts are confused with four other classes. ## 3 Probing with t-SNE An alternative to training an $\ell+1$’st layer is to use t-SNE on the $N\times M_{\ell}$ matrix of output at layer $\ell$. The t-SNE algorithm produces a lower dimensional representation of the points, that like multidimensional scaling [16, 10, 5] seeks to have low dimensional interpoint distances be representative of the original higher dimensional interpoint distances. It also emphasizes smaller interpoint distances as in local multidimensional scaling [4]. The algorithm proceeds without knowing the classifications of the data or even the number $K$ of levels of the categorical response. Following [7] we projected the $M_{\ell}$ dimensional points onto their first $50$ principal components before running t-SNE. The t-SNE algorithm involves some randomness. Its criterion is also invariant to rotations or reflections of the point clouds. In order to make the images more nearly comparable we used the same random seed at each layer. Furthermore, the practice of projecting the intermediate outputs down to the same dimension, 50, using PCA in each case makes the starting points for the layers more closely aligned with each other than they would otherwise be. The lone exception to the above description is for the output of layer 60 of the VGG15 model for the CIFAR10 dataset. This output is 10-dimensional as it is the output of the entire network with one value per class. In this case, we use all 10 dimensions in the t-SNE algorithm. Because t-SNE’s criterion is dominated by small interpoint distances, the precise location and orientation of a cluster well separated from the rest of the data could be strongly influenced by the random seed. The relative position of clusters that overlap or nearly do is likely to be a more stable feature. Figures 4, 5, and 6 show t-SNE outputs for the fashion-MNIST data. These images depict the held out, testing data, not the training data. Up to and including layer 49, the images for ‘bag’ clearly plot as two disjoint and even widely separated clusters. Inspection in Section 6 reveals that there are two kinds of bag image, one that we could call purses and another that mixes clutchs and satchels. By purse images we mean those with handles/straps that are well separated from and above the rest of the bag. The clutchs don’t have straps, while the satchels have straps that are nearly adjacent to the rest of the bag. Interestingly, by about layer 91 the two ‘bag’ groups have connected and by around layer 163 or 173 they appear to have merged into one. The loss function used in training does not reward the network for noticing that there are two kinds of bag and, as it happens, that distinction weakens or even disappears from the t-SNE plot. In Section 6 we use a method of ranking images from most like their own class to least like their own class. We find that there are also two very different kinds of sandal images and possibly two very different kinds of trouser images. Figures 14, 15 and 16 there depict examples of extreme bags, sandals and trousers. We also see in Figures 4, 5, and 6 that the trouser and to a lesser extent bag images are already well separated from the other classes by layer 17. The footwear groups (sandals, sneakers, and ankle boots) start very connected with one another until sandals separate by layer 69, and the sneakers and ankle boots separate from one another by layer 101. Similarly, the upper body wear classes (t-shirt/tops, pullovers, dresses, coats, shirts) start out well merged, and only really separate out from one another towards the very end at layer 173. Figure 4: t-SNE output for FashionMNIST data after layers 17, 27, 37, 49, 59, and 69. The types of these blocks are listed above in the titles. Figure 5: t-SNE output for FashionMNIST data after layers 79, 91, 101, 111, 121, and 131. The types of these blocks are listed above in the titles. Figure 6: t-SNE output for FashionMNIST data after layers 141, 153, 163, and 173. The types of these blocks are listed above in the titles. Figures 7 and 8 show the corresponding t-SNE plots for the CIFAR-10 data at 12 different output layers ranging from layer 14 to layer 60. A striking difference in these figures is that in the early layers (14 and 18) the points are not at all separated into disjoint clouds. Recall that the fashion-MNIST network was initialized to weights from training in ImageNet. The network for CIFAR-10 by contrast was trained from a random start. By layer 30 we start to see groups forming though there is still a lot of overlap. Cats and dogs remain closely connected up to and including layer 56, the second last one shown. Recall that from the confusion matrices, separating cats from dogs is especially hard. By the final layer 60, the $10$ classes are very well separated in a two dimensional view, forming narrow and bent clusters. There are still errors in the classification. Many of those points plot within clusters for another category, very often near one of the tips and very often nearer the center of the image. That latter pattern was more pronounced for FashionMNIST. In the t-SNE for layer 60, cat and dog clusters are well separated but some of the cat images are at one end of the dog image cluster. On inspection we find that these points were misclassified but with high confidence. Figure 7: t-SNE output for CIFAR10 data after layers 14, 18, 22, 26, 30, and 34. The types of these layers are listed above in the titles. Figure 8: t-SNE output for CIFAR10 data after layers 38, 42, 46, 50, 56, and 60. The types of these layers are listed above in the titles. ## 4 Class specific vectors While t-SNE is powerful and evocative, the spatial placement of individual points is hard to interpret. A principal components analysis offers some alternative functionality. Given the data, the PC mapping is not random, so the position of points is more reproducible and in particular, the closeness of clusters is not subject to algorithmic noise. Second, having constructed principal components for one set of data, we can project additional data onto them. For instance we could define principal components using the training data and, retaining those eigenvectors, project test data into the same space. The data we use are $X\in^{N\times M}$ and $Y\in\\{0,1,\dots,K-1\\}^{N}$. The matrix $X$ changes from layer to layer as does $M$, while $Y$ remains constant. Each column of $X$ represents the output from one neuron in the layer under study. We center these outputs by subtracting the mean from each column of $X$. That way we ensure that $\sum_{i=1}^{N}\boldsymbol{x}_{i}=\boldsymbol{0}\in^{M}$ where $\boldsymbol{x}_{i}\in^{M}$ is the $i$’th row of $X$ expressed as a column vector. We are interested to see the arrangements among commonly confused classes. For instance, it is of interest to see the relative arrangements among the mechanical images because there are frequent errors within those classes. Figure 9 shows the global principal components plots for the outputs of only the groups of ships, planes, cars, and trucks in CIFAR10. What we see there is that projecting all ten classes at once yields a lot of overlap. We get a better view from PC plots based on just those classes as in Figure 10. There we see that in the later layers the four classes plot as lengthy ellipsoids from a common origin. We see that the last pre-softmax layers are mostly consistent with neural collapse [14] in that the vectors for most pairs of groups are nearly orthogonal to each other by the later layers. The clouds do extend towards the origin where we see some overlap. We also see that in layers 30 to 42, the data for images of planes projects to nearly the origin in the first two principal components. Only later do the planes clearly stand out from the other mechanical classes. Layer 60 reflects data after the softmax transformation and it shows clearly that most points have at most one or two non-negligible possibilities because the points are mostly projected from a tetrahedral wireframe pattern. Figure 9: Projections from the top two principal components in a global PCA for all activation layers, visualizing the planes, cars, ships, and trucks in CIFAR10. Figure 10: Projections from the top two principal components in a PCA involving only the mechanical groups (planes, cars, ships, and trucks) for the outputs of all activation layers, visualizing the planes, cars, ships, and trucks in CIFAR10. It is a nuisance to redefine the principal components for every subset of variables that we might wish to explore. We prefer to define class-specific projections of the data. For each $k\in\\{0,1,\dots,K-1\\}$ we choose a one- dimensional projection especially representative of class $k$, as described below, and then view the data in projections given by two of those vectors. Class-specific vectors were studied by [11]. That work did not look at them for visualization. Let $N_{k}$ be the number of indices $i$ with $Y_{i}=k$. The matrix $X_{k}\in^{N_{k}\times M}$ has all the $\boldsymbol{x}_{i}$ for which $Y_{i}=1$. Now we choose a special vector $\theta_{k}\in^{M}$ for cluster $k$. There are several choices. We could take $\theta_{k}$ to be the unit vector proportional to $(1/N_{k})\sum_{i:Y_{i}=k}\boldsymbol{x}_{i}$ the mean vector for cluster $k$. A second choice is the unit vector $\theta_{k}=\arg\max_{\|\theta\|=1}\theta^{\mathsf{T}}X_{k}^{\mathsf{T}}X_{k}\theta$. The third choice is the first principal component vector of $X_{k}$. This differs from the second choice in that we must recenter $X_{k}$ to make its rows have mean zero, yielding $\tilde{X}_{k}$. Then $\theta_{k}$ maximizes $\theta^{\mathsf{T}}\tilde{X}_{k}^{\mathsf{T}}\tilde{X}_{k}\theta$ over unit vectors $\theta\in^{M}$. Below we work with the third choice. The vectors we get characterize the principal direction of points within each point cloud, not differences in the per class means. When we take the within-class principal component vector we have also to choose its sign. If $\theta$ is the first principal component vector then $-\theta$ has an equal claim to that label. We choose the sign so that the mean of the data for class $k$ has a larger inner-product with $\theta$ than the global mean has. Using class-specific projections, we make scatterplots of $X\theta_{k}\in^{N}$ versus $X\theta_{k^{\prime}}$ for pairs of classes $k\neq k^{\prime}$. These plots show one point per sample. Figure 11 shows the mechanical images plotted in the space defined by the car versus plane vectors. This is a projection but not an orthogonal projection into 2 because $\theta_{k}$ and $\theta_{k^{\prime}}$ need not be orthogonal. In the early layers, the class- specific projections produce highly correlated scatter plots. This is largely because the vectors $\theta_{k}$ and $\theta_{k^{\prime}}$ start out correlated. In later layers, points vary greatly in the projections from their own class and much less in the other projections. The class-specific asxes for cars and trucks start off approximately parallel start to become nearly orthogonal by layer 18 (though the point clouds still overlap a lot). By layer 30 we see meaningful separations among the points. In layers 46 and 50 it appears that the angle between those clouds is more than 90 degrees. This is confirmed by a tour image (in Section 5) that makes an orthogonal projection of the data into the plane spanned by those two vectors. We also observe that in layers 46, 50, and 56, while the car and truck axes are nearly perpendicular, the clusters of points for these two groups “bend” into one another where they meet. Figure 11: In each plot, the vertical axis has data projected on the class- specific vector for ‘car’ images and the horizontal axis uses the class- specific vector for ‘truck’ images. The points are for the plane, car, ship, and truck images in CIFAR10. Car and truck images are fairly similar. At layer 30, we see that trucks tend to plot at positive values along the car axis. By layer 46, trucks are now plotting at negative values along the car axis. The intervening layers have been configured to push those classes farther apart. Planes and ships do not proceed through such a process. Instead they have near zero projections along both car and truck directions through training. ## 5 Class specific guided tour A tour of $X\in^{N\times M}$ is an animated sequence of projections (also commonly referred to as frames) of $X$ into N×d, where $d$ is typically a small value such as 2 or 3. The best known of these is the grand tour [2] which generates a sequence of such projections designed to explore the space of all projections by eventually getting close to every point in the manifold of projections from M to d. That manifold is quite large, so it can take a long time to get close to every view. Therefore specific tours have been developed to make a more focussed exploration of views. Simple tours generally consist of moving along a sequence of projections using interpolated paths between sequential pairs of projections of interest. The resulting animation rotates smoothly between these pairs. The technical procedure is outlined in Section 4.1 of Buja et al. [3]. Planned tours refer to tours where the (usually finite) sequence of frames are predetermined. To visualize the data, we choose to explore the space created by the span of the ten class-specific vectors. For ease of computation, we fit a PCA with a single component to the class specific data $X_{k}\in\mathbb{R}^{N_{k}\times M}$ to acquire the principle axes $\theta_{k}\in\mathbb{R}^{M}$ and the decomposition of the data onto the class-specific axis $(X-\boldsymbol{1}\bar{x}_{k}^{\mathsf{T}})\theta_{k}$, where $\boldsymbol{1}\in^{N}$ is the all ones vector.. At this point, we flip the value of $\theta_{k}$ via products with negative one so that the class mean has a larger dot product with $\theta_{k}$ than the global mean, or equivalently that $(\bar{x}-\bar{x}_{k})^{\mathsf{T}}\theta_{k}<0$ where $\bar{x}\in\mathbb{R}^{M}$ is the global mean. Aggregating this information, we then have collected $X^{\prime}=[(X-\boldsymbol{1}\bar{x}_{1}^{\mathsf{T}})\theta_{1},\ldots,(X-\boldsymbol{1}\bar{x}_{K}^{\mathsf{T}})\theta_{K}]\in\mathbb{R}^{N\times K}$ as well as $\Theta=[\theta_{1},\ldots,\theta_{K}]$. We then center $X^{\prime}$ so that the columns have means zero, producing $\tilde{X}^{\prime}=(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$, which is used as the data to produce the class-specific pair plots. To produce the tours that leverage the class specific vectors $\theta_{k}$, we apply the technique used in [3] and project the data $X$ into the space spanned by the $K$ class-specific vectors since $K$ is usually much smaller than $M$. Note that we cannot use tours on $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$ directly since this is not an orthogonal projection of the original centered data $X-\boldsymbol{1}\bar{x}^{\mathsf{T}}$. To get around this, we perform the QR- decomposition $\Theta=Q_{\theta}R_{\theta}$ with $Q_{\theta}\in\mathbb{R}^{M\times K}$ and $R_{\theta}\in\mathbb{R}^{K\times K}$. We then visualize the projection of the data $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$. If $K$ is much smaller than $M$ and that the class-specific vectors are linearly independent, we can compute this efficiently as $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta\cdot R_{\theta}^{-1}$ since we already have $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})\Theta$ from the computation for the class specific pair plots. In the case that the $K$ class-specific vectors are not linearly independent, special considerations need to be made. While most layers do not have this issue, the output layers, such as layer 60 in the VGG15 model, ordinarily do. This is because the output is 10-dimensional with the constraint that the ten components need to add up to one, and thus the space spanned by the ten class specific axes is at most 9-dimensional. In this case, we again compute the QR- decomposition $\Theta=Q_{\theta}R_{\theta}$, but we now force $Q_{\theta}\in\mathbb{R}^{M\times r}$ and $R_{\theta}\in\mathbb{R}^{r\times K}$ where $r$ is the rank of $\Theta$ and calculate $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ directly. In either case, we note that $R_{\theta}=Q_{\theta}^{\mathsf{T}}\Theta$ implies that the columns of $R_{\theta}=[r_{1},\ldots,r_{K}]$ are the projections of each of the class-specific vectors to the space spanned by all of the class-specific vectors. Doing so, we can condense all information about tours in the space spanned by the class specific vectors down to the projections $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ and $R_{\theta}=Q_{\theta}^{\mathsf{T}}\Theta$ of the data and the class specific vectors respectively. For an animated view of the see https://purl.stanford.edu/zp755hs7798. Figure 12 shows still images of frames that can be seen on an example toy Swiss Roll dataset. Figure 13 shows frames that can be seen when exploring the VGG15 and ResNet50 models for both training and testing intermediate outputs. Figure 12: The plots show a possible path that could be seen on a tour on the Swiss Roll Manifold [15]. We start from a top-down perspective at $t=0$ to a side-on perspective by $t=1$. At each $t\in[0,1]$ we move between these two perspectives with constant speed. Figure 13: The plots show frames shown within the mechanical tour of the intermediate outputs of the VGG15 model (top row) and the ResNet50 model (bottom row). We can see several differences both between the two models as well as with the intermediate outputs of the training (left column) and testing data (right column). For the CIFAR10 dataset, we visualize planned two-dimensional tours inspired by the class specific vectors. One option is to consider a grand tour-like approach, where we generate a collection of two-dimensional frames by picking them uniformly at random from the set of such frames embedded in the space spanned by the ten class specific vectors. A second option is to restrict our attention to two-dimensional frames that are generated from pairs of the class-specific vectors by using frames of the form $[\theta_{j},\theta_{k}^{\prime}]$ where $\theta_{k}^{\prime}$ is the component of $\theta_{k}$ that is orthogonal to $\theta_{j}$ in order to explore the centered data $X-\bar{x}$. Note that we can equivalently use frames of the form $[r_{j},r_{k}^{\prime}]$ where $r_{k}^{\prime}$ is the component of $r_{k}$ orthogonal to $r_{j}$ to explore $(X-\boldsymbol{1}\bar{x}^{\mathsf{T}})Q_{\theta}$ for better computational efficiency. For example, we consider a mechanical tour, where we use the frames generated by the pairs plane versus truck, car versus truck, car versus ship, and plane versus ship. In general, we see that the planned tour strategy works much better compared to the grand tour-like strategy in the sense that the planned tours creates animations that are more interpretable and show more interesting features. For example, for layer 56 in the grand tour-like approach, we can see some key features of the network. We see that the ten groups form comet like formations that point away from a shared common core. However beyond this, it is difficult to tell any relational information between the clusters. In contrast, for layer 56 in the mechanical tour approach, we see that the comets are much more clearly defined and we can extract additional information from the plots. For example, we notice that for each frame, all classes have comets that generally point upwards and to the right. We also note that there is quite a bit of curvature within particular pairs, like how the truck points appear to bend into the cars three seconds in. We also note that at this point, the other eight groups overlap quite a bit. In contrast, for the frame of trucks vs planes at the very start, we notice that the trucks and planes points form orthogonal comets, and the rest of the eight groups spread out much more from one another. This can also be seen in layer 30 within the VGG15 model, where the grand tour-like approach has comet like formations moving away from a common core, but the planned tour showcases how these spokes are typically orthogonal. For the car versus truck frame, we note that all of the eight other groups mainly cluster around the origin, meaning that they have negligible components in the class specific axes associated with cars and trucks. In comparison, for the plane versus ship axis, we see that most of the groups tend to stick to the origin. The lone exception is cars, which has a distinctly negative ship component. These are distinct features that are much harder to visualize within the grand tour-like approach. We perform a similar visualization for FashionMNIST intermediate outputs within the ResNet50 model. Again we consider a grand tour-like approach, selecting randomly generated frames from the span of the ten principal axes. We also consider two planned tours where we look at frames generated by pairs of class specific vectors. The first tour is composed of pairs of classes that are rarely confused for one another: t-shirt/tops versus ankle boots, trousers versus ankle boots, trousers versus bags, and t-shirt/tops vs bags. The second tour is composed of classes that are associated with upper-body clothing: t-shirt/tops versus shirts, pullovers versus shirts, pullovers versus coats, and t-shirt/tops versus coats. When we visualize these tours, we see that the same trends as the CIFAR10 data persist. For example, in layer 141 of the grand tour-like approach, we again notice that the different groups form comet like shapes. However, beyond this, it’s hard to observe any trends about how the comets are oriented about one another in space. When we move towards the rarely confused and upper-body planned tours, we can see other interesting features within the data. For layer 141 of the upper-body tour, we observe that bags and sandals have no component along the class specific vectors associated with t-shirt/tops, pullovers, shirts, or coats. However, we see that trousers, ankle boots, and sneakers all have fairly positive components along these vectors. Visualizing the rarely confused planed tour of layer 141, we notice that for the frame generated by the ankle boot and trouser class specific vectors, coats have a very large component in both of these vectors, while most other groups have components much closer to zero. We also notice that when we shift to the frame generated by bags and trousers that unlike other groups, bags will form two comet like clusters pointed in opposite directions. These features seen in the planned tours are generally harder to discover within the grand tour-like approach. There are major differences between the VGG15 and ResNet50 models. One major difference is in how the intermediate points for the testing data compare to the training data. In the VGG15 model, we notice that in later layers that the class specific clusters from training data will form comets pointing away from a shared core, but their tails will overlap with one another. In contrast, the training data will have a similar shape and position, but their tails will not reach as far down and thus do not overlap. This can be seen prominently in layer 50 of the mechanical tour amongst the testing data and training data. This same effect can be seen to a much more limited extent in the ResNet50 model for layer 153 for the training data and the testing data for the pullovers class, but the effect is not as common among the other groups and layers. This is likely an indicator that the VGG15 model is more overtrained compared to the ResNet50 model. A second difference is in the shape of the arms. We notice that in general, the comet-shapes for the class specific clusters for the ResNet50 model are fairly sharp and extend out fairly far. Specifically, we see fairly sharp arms for the rarely confused tour on the intermediate training output for layer 151 and for layer 163. We note that the arms frequently extend out as more than 100 away from the origin, and become extremely sharp, especially on layer 163. In contrast, with layer 42 and layer 56 of the mechanical tour on the intermediate training data, we notice that the arms only extend out to at most 40, and the arms are much thicker. This is especially pronounced in layer 56 where the comets are much shorter and wider. The final difference is in how fast the arms form. We notice that in the ResNet50 model, the arms have formed as early as layer 49 for the training data in the rarely confused tour, which is only about a fourth of the way through the model. Although some classes haven’t well differentiated well from others, some groups like bags and trousers have already spread away and formed arms away from the center. In contrast, the arms develop much later in the VGG15 model. We only see the arms clearly develop by about layer 30 for the training data in the mechanical tour, which is about halfway through the model. ## 6 In-group Clustering In our t-SNE plots we saw strong evidence of two kind of bag images. That evidence was present in intermediate layers but had disappeared by the final layers. In this section we use class-specific projections to make a systematic search for such subclusters and also identify examples of extreme images so a human can interpret them. At each intermediate layer we project the observations from class $k$ on the vector $\theta_{k}$ to rank images from most typical of their class to least typical. We normalize $N_{k}$ values to have mean zero variance one when taken over all ten classes, not just class $k$. so that they have mean square one. Figure 14 shows those histograms for the images of bags. A bimodal pattern becomes clear by layer 27 if not earlier, and then becomes quite pronounced. By final layer the modes are not very separated, nearly touching. Recall that in the t-SNE plot those points had merged into a single cluster. The top panel in Figure 17 shows images of the bags at the extreme ends of the histogram for the final layer. These represent two quite different kinds of image. Although the final histogram is less bimodal than the earlier ones we still see two very different image types. It is intuitively reasonable that these bag images look different in early network layers that are forming image features. It is also plausible that a network trained to distinguish bags from other image types without regard to what type of bag they are would in its later layers treat them similarly. It would take further research to understand why the gap closes so late in the pipeline instead of earlier. The class-specific projection gives us a tool to look for subclasses. Figure 16 shows histograms for trouser images. There we see no bimodal structure and Figure 17 shows no especially striking difference between the most and least typical trouser images. Figure 15 shows layer by layer histograms for images of sandals. The sandal images are bimodal at intermediate layers despite the t-SNE images not placing the images into two clear groups. As with bags, these histograms become much less bimodal at later layers. The bimodality disappears much earlier for sandals than for bags. The histograms for sandals become more skewed. From Figure 17 we see a sharp distinction between the types of sandals. The histogram is distinguishing flat ones from high healed ones. In this section we have looked for two kinds of image by checking the extreme entries in a linear ordering. We expect that more elaborate clustering methods could work when an image class has three or more types. Our main point is that looking at intermediate layers gives additional insights. Figure 14: Histograms of the intermediate outputs for test images labeled as bags for the outputs of the 16 residual units in the FashionMNIST network. Figure 15: Histograms of the intermediate outputs for test images labeled as sandals for the outputs of the 16 residual units in the FashionMNIST network. Figure 16: Histograms of the intermediate outputs for test images labeled as trousers for the outputs of the 16 residual units in the FashionMNIST network. Figure 17: The most extreme examples of three groups along their group specific axis as intermediate outputs of the last residual unit (layer 173) for FashionMNIST. ## 7 Conclusions We have presented some graphical methods for probing neural networks layer by layer. In doing so we saw that some clustering within a class can become muted or even disappear as data progress through layers. We devised class-specific projections and found that they can help identify differences among image types within a class. We had to make several choices in defining class-specific projections. We believe that our choices are reasonable but we also believe that other choices could reveal interesting phenomena. The class-specific projections also provide very focussed looks at point clouds when incorporated into dynamic projections (tours). We saw a big difference between the organization of early layer outputs when comparing a network that was trained using transfer learning from ImageNet and one that was trained from a random start. We saw a variant of neural collapse wherein the outputs form ellipsoidal clusters instead of spherical ones. ## Acknowledgments This work was supported by a grant from Hitachi Limited and by the US National Science Foundation under grant IIS-1837931. We thank Masayoshi Mase of Hitachi for comments and discussions about explainable AI. ## References * [1] G. Alain and Y. Bengio. Understanding intermediate layers using linear classifier probes. Technical report, arXiv:1610.01644, 2016. * [2] D. Asimov. The grand tour: a tool for viewing multidimensional data. SIAM journal on scientific and statistical computing, 6(1):128–143, 1985. * [3] A. Buja, D. Cook, D. Asimov, and C. Hurley. Computational methods for high-dimensional rotations in data visualization. Handbook of statistics, 24:391–413, 2005. * [4] L. Chen and A. Buja. Local multidimensional scaling for nonlinear dimension reduction, graph drawing, and proximity analysis. Journal of the American Statistical Association, 104(485):209–219, 2009. * [5] M. A. A. Cox and T. F. Cox. Multidimensional scaling. In Handbook of data visualization, pages 315–347. Springer, 2008\. * [6] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248–255. Ieee, 2009. * [7] L. Derksen. Visualising high-dimensional datasets using PCA and t-SNE in Python. https://towardsdatascience.com/visualising-high-dimensional-datasets-using-pca-and-t-sne-in-python-8ef87e7915b, 2016\. Updated April 29, 2019. * [8] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015. * [9] Alex Krizhevsky. Learning multiple layers of features from tiny images, 4 2009. * [10] J. B. Kruskal. Multidimensional scaling. Number 11. Sage, 1978. * [11] W. J. Krzanowski. Between-groups comparison of principal components. Journal of the American Statistical Association, 74(367):703–707, 1979. * [12] M. Li, Z. Zhao, and C. Scheidegger. Visualizing neural networks with the grand tour. Distill, 5(3):e25, 2020. * [13] T. Nguyen, M. Raghu, and S. Kornblith. Do wide and deep networks learn the same things? uncovering how neural network representations vary with width and depth. Technical report, arXiv2010.15327, 2020. * [14] V. Papyan, X. Y. Han, and D. L. Donoho. Prevalence of neural collapse during the terminal phase of deep learning training. Proceedings of the National Academy of Sciences, 117(40):24652–24663, 2020. * [15] J. Tenenbaum, V. Silva, and J. Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000. * [16] W. S. Torgerson. Multidimensional scaling: I. Theory and method. Psychometrika, 17(4):401–419, 1952. * [17] Laurens Van der Maaten and Geoffrey Hinton. Visualizing data using t-SNE. Journal of machine learning research, 9(11), 2008.
arxiv-papers
2021-07-27T01:42:07
2024-09-04T03:07:20.297000
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Christopher R. Hoyt and Art B. Owen", "submitter": "Art Owen", "url": "https://arxiv.org/abs/2107.12547" }
2107.12551
∎ 11institutetext: Yuki Iwamoto 22institutetext: Department of Chemistry, Graduate School of Science, Kyoto University, Kyoto 606-8502, Japan 22email: [email protected] 33institutetext: Yoshitaka Tanimura 44institutetext: Department of Chemistry, Graduate School of Science, Kyoto University, Kyoto 606-8502, Japan 44email: [email protected] # Open quantum dynamics theory on the basis of periodical system-bath model for discrete Wigner function††thanks: Y. T. is supported by JSPS KAKENHI Grant Number B 21H01884 Yuki Iwamoto Yoshitaka Tanimura (Received: date / Accepted: date) ###### Abstract Discretizing a distribution function in a phase space for an efficient quantum dynamics simulation is a non-trivial challenge, in particular for a case that a system is further coupled to environmental degrees of freedom. Such open quantum dynamics is described by a reduced equation of motion (REOM) most notably by a quantum Fokker-Planck equation (QFPE) for a Wigner distribution function (WDF). To develop a discretization scheme that is stable for numerical simulations from the REOM approach, we employ a two-dimensional (2D) periodically invariant system-bath (PISB) model with two heat baths. This model is an ideal platform not only for a periodic system but also for a non- periodic system confined by a potential. We then derive the numerically ”exact” hierarchical equations of motion (HEOM) for a discrete WDF in terms of periodically invariant operators in both coordinate and momentum spaces. The obtained equations can treat non-Markovian heat-bath in a non-perturbative manner at finite temperatures regardless of the mesh size. As demonstrations, we numerically integrate the discrete QFPE for a 2D free rotor and harmonic potential systems in a high-temperature Markovian case using a coarse mesh with initial conditions that involve singularity. ###### Keywords: Discrete Wigner distribution function Open quantum dynamics theory quantum Fokker-Planck Equation Hierarchical equations of motion ## 1 Introduction A central issue in the development of a computational simulation for a quantum system described in a phase space distribution is the instability of the numerical integration of a kinetic equation in time, which depends upon a discretization scheme of the coordinate and momentumFrensley ; Jacoboni2004 ; Grossman ; Kim2007 ; Weinbub . In this paper, we introduce a new approach in order to construct a Wigner distribution function (WDF) for an open quantum dynamics system on the basis of a finite-dimensional quantum mechanics developed by Schwinger Schwinger . Here, open quantum dynamics refers to the dynamics of a system coupled to baths consisting of surrounding atoms or molecules that is typically modeled by an infinite number of harmonic oscillators Caldeira-AP-1983 ; Weiss08 ; Breuer ; CaldeiraPhysica83 ; WaxmanLeggett1985 ; Tanimura89A ; TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 . After reducing the bath-degrees of freedom, the derived reduced equation of motion can describe the time irreversibility of the dynamics toward the thermal equilibrium state. The energy supplied by fluctuations and the energy lost through dissipation are balanced in the thermal equilibrium state, while the bath temperature does not change, because its heat capacity is infinite. In previous studies, the Boltzmann collision operator JensenPRL1991 ; JensenIEEE1991 and the Ornstein–Uhlenbeck operator CaldeiraPhysica83 ; WaxmanLeggett1985 have been used for a description of dissipative effects in the quantum Boltzmann equation and quantum Fokker-Planck equation (QFPE), respectively. The former one, however, is phenomenological Zhan2016 , whereas the latter one is valid only at high temperature TanimuraPRA91 that leads to a breakdown of the positivity of population distributions at low temperature Tanimura-2006 ; YTperspective ; YTJCP2014 . This is because a Markovian assumption cannot take into account the effects of quantum noise, which is non-Markovian at low temperature. Thus, numerically “exact” approach, for example quantum hierarchical Fokker-Planck equations (QHFPE) YTJCP2015 for a reduced WDF must be used as the rigorous quantum mechanical treatments. These equations are derived on the basis of the hierarchical equation of motion (HEOM) formalism Tanimura89A ; Tanimura-2006 ; YTperspective . By using the QHFPE, for example, self-excited currentoscillations of the resonant tunneling diode (RTD) in the negative differential resistance region described by a Caldeira-Leggett model was discovered in a numerically rigorous manner SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ . For a case of isolated time-reversible processes, a finite-difference approximation of momentum operators allows us to solve a kinetic equation using a uniformly spaced mesh in the coordinate space. Then the wave function is expressed in this discretized space. While the quantum dynamics of an isolated $N$-discretized coordinate system are described using the wave function as a $N$-dimensional vector, an open quantum system must be described using a $N\times N$ reduced density matrix, most notably for the quantum master equation (QME) approach or a $N\times M$ WDF for the $N$-discretized coordinate and the $M$-discretized momentum, most notably for the QFPE approach Frensley . Whether a system is isolated or is coupled to a heat bath, the WDF is numerically convenient and physically intuitive to describe the system dynamics. This is because the WDF is a real function in a classical phase like space and the described wavepacket in the momentum space is localized in a Gaussian like form following the Boltzmann statics, while the distribution in the coordinate space is spread. Various numerical schemes for the WDF, including the implementation of boundary conditions, for example inflow, outflow, or absorbing boundary conditions Ringhofer1989 ; Jiang2014 ; Mahmood2016 , and a Fourier based treatment of potential operators Frensley ; Grossman , have been developed. Varieties of application for quantum electronic devices Tsuchiya2009 ; Morandi2011 ; Barraud2011 ; Jonasson2015 ; Tilma2016 ; Ivanov2017 ; Kim2016 ; Kim2017 , most notably the RTD Frensley1986 ; Frensley1987 ; FerryPRB1989 ; Ferry2003 ; Buot1991 ; BuotPRL1991 ; Buot2000 ; Biegel1996 ; Yoder2010 ; Jiang2011 ; Dorda2015 that includes the results from the QHFPE approach SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ , quantum ratchet Zueco ; Coffey2009 ; KatoJPCB13 , chemical reaction TanimuraPRA91 ; TanimuraJCP92 , multi-state nonadiabatic electron transfer dynamics MS-QFP94 ; MS-QFPChernyak96 ; TanimuraMaruyama97 ; MaruyamaTanimura98 ; Ikeda2019Ohmic ; Ikeda2017JCP , photo-isomerization through a conical intersection Ikeda2018CI , molecular motor Ikeda2019JCP , linear and nonlinear spectroscopies SakuraiJPC11 ; Ikeda2015 ; Ito2016 , in which the quantum entanglement between the system and bath plays an essential role, have been investigated. The above mentioned approaches have utilized a discrete WDF. Because original equations defined in continuum phase space are known to be stable under a relevant physical condition, any instability arises from a result of the discretization scheme. In principle, discussions for a stability of the scheme involve a numerical accuracy of the discretization scheme with respect to the coordinate and momentum. Generally, the stability becomes better for finer mesh. However, computational costs become expensive and numerical accuracy becomes worse if the mesh size is too small. In addition, when the mesh size is too large, the computed results diverge as a simulation time goes on. Thus, we have been choosing the mesh size to weigh the relative merits of numerical accuracy and costs. In this paper, we introduce a completely different scheme for creating a discrete WDF. Our approach is an extension of a discrete WDF formalism introduced by Wootters Wootters that is constructed on the basis of a finite- dimensional quantum mechanics introduced by Schwinger Schwinger . To apply this formalism to an open quantum dynamics system, we found that a rotationally invariant system-bath (RISB) Hamiltonian developed for the investigation of a quantum dissipative rotor system is ideal Iwamoto-2018 . Although the bath degrees of freedom are traced out in the framework of the reduced equation of motion approach, it is important to construct a total Hamiltonian to maintain a desired symmetry of the system, including the system-bath interactions. If the symmetry of the total system is different from the main system, the quantum nature of the system dynamics is altered by the bath Iwamoto-2018 ; Iwamoto2019 ; Suzuki-2003 . Here, we employ a 2D periodically invariant system-bath (PISB) model to derive a discrete reduced equation of motion that is numerically stable regard less of the mesh size. For this purpose, we introduce two sets of the $N$-dimensional periodic operators for a momentum and coordinate spaces: The discretized reduced equation of motion is expressed in terms of these two operators, which is stable for numerical integration even if $N$ is extremely small. The obtained equations of motion can be applied not only for a periodic system but also a system confined by a potential. The remainder of the paper is organized as follows. In Sec. 2, we introduce the periodically invariant system-bath model. In Sec. 3, we derive the HEOM for a discrete WDF. In Sec. 4, we demonstrate a stability of numerical calculations for a periodic system and a harmonic potential system using the discrete QFPE. Sec. 5 is devoted to concluding remarks. ## 2 Periodically invariant system-bath (PISB) model ### 2.1 Hamiltonian We consider a periodically invariant system expressed by the Hamiltonian as $\displaystyle\hat{H}_{S}$ $\displaystyle=T(\hat{p})+U(\hat{x}),$ (1) where $T(\hat{p})$ and $U(\hat{x})$ are the kinetic and potential part of the system Hamiltonian expressed as a function of the momentum and coordinate operators $\hat{p}$ and $\hat{x}$, respectively. In this discretization scheme, it is important that $T(\hat{p})$ and $U(\hat{x})$ must be periodic with respect to the momentum and the coordinate, because all system operators must be written by the displacement operators in a finite-dimensional Hilbert space described subsequently. This system is independently coupled to two heat baths through $\hat{V}_{x}\equiv\hbar\cos({\hat{x}dp}/{\hbar})/dp$ and $\hat{V}_{y}\equiv\hbar\sin({\hat{x}dp}/{\hbar})/dp$, where $dp$ is the mesh size of momentum Iwamoto-2018 . Then, the PISB Hamiltonian is expressed as $\displaystyle\hat{H}_{tot}$ $\displaystyle=\hat{H_{S}}+\hat{V}_{x}\sum_{k}c_{k}\hat{q}_{x,k}+\hat{V}_{y}\sum_{k}c_{k}\hat{q}_{y,k}+\hat{H_{B}},$ (2) where $\displaystyle\hat{H_{B}}$ $\displaystyle=\sum_{k}\left(\frac{\hat{p}_{x,k}^{2}}{2m_{k}}+\frac{1}{2}m_{k}\omega_{k}\hat{q}_{x,k}^{2}\right)+\sum_{k}\left(\frac{\hat{p}_{y,k}^{2}}{2m_{k}}+\frac{1}{2}m_{k}\omega_{k}\hat{q}_{y,k}^{2}\right),$ (3) and $m_{k}^{\alpha}$, $\hat{p}_{k}^{\alpha}$, $\hat{q}_{k}^{\alpha}$ and $\omega_{k}^{\alpha}$ are the mass, momentum, position and frequency variables of the $k$th bath oscillator mode in the $\alpha=x$ or $y$ direction. The corrective coordinate of the bath $\hat{\Omega}_{\alpha}(t)\equiv\sum_{k}c_{k}\hat{q}_{\alpha,k}(t)$ is regarded as a random driving force (noise) for the system through the interactions ${\hat{V}}_{\alpha}$. The random noise is then characterized by the canonical and symmetrized correlation functions, expressed as $\eta_{\alpha}(t)\equiv\beta\langle\hat{\Omega}_{\alpha};\hat{\Omega}_{\alpha}(t)\rangle_{\mathrm{B}}$ and $C_{\alpha}(t)\equiv\frac{1}{2}\langle\\{\hat{\Omega}_{\alpha}(t),\hat{\Omega}_{\alpha}(0)\\}\rangle_{\mathrm{B}}$, where $\beta\equiv 1/k_{\mathrm{B}}T$ is the inverse temperature divided by the Boltzmann constant $k_{\mathrm{B}}$, $\hat{{\Omega}_{\alpha}}(t)$ is $\hat{{\Omega}_{\alpha}}$ in the Heisenberg representation and $\langle\cdots\rangle_{\mathrm{B}}$ represents the thermal average over the bath modes Tanimura89A ; Tanimura-2006 . In the classical case, $\eta^{\alpha}(t)$ corresponds to the friction, whereas $C_{\alpha}(t)$ corresponds to the correlation function of the noise, most notably utilized in the generalized Langevin formalism. The functions $\eta^{\alpha}(t)$ and $C_{\alpha}(t)$ satisfy the quantum version of the fluctuation-dissipation theorem, which is essential to obtain a right thermal equilibrium state Tanimura89A ; Tanimura-2006 ; KatoJPCB13 . The harmonic baths are characterized by the spectral distribution functions (SDF). In this paper, we assume the SDF of two heat baths are identical and are expressed as $\displaystyle J(\omega)=\frac{\pi}{2}\sum_{k}\frac{(c_{k})^{2}}{m_{k}\omega_{k}}\delta(\omega-\omega_{k}).$ (4) Using the spectral density $J(\omega)$, we can rewrite the friction and noise correlation function, respectively, as $\displaystyle\eta(t)=\frac{2}{\pi}\int^{\infty}_{0}d\omega\frac{J(\omega)}{\omega}\cos(\omega t),$ (5) and $\displaystyle C(t)=\frac{2}{\pi}\int^{\infty}_{0}d\omega J(\omega)\coth\left(\frac{\beta\hbar\omega}{2}\right)\sin(\omega t).$ (6) In order for the heat bath to be an unlimited heat source possessing an infinite heat capacity, the number of heat-bath oscillators $k$ is effectively made infinitely large by replacing $J(\omega)$ with a continuous distribution: Thus the harmonic heat baths are defined in the infinite-dimensional Hilbert space. ### 2.2 System operators in a finite Hilbert space We consider a $(2N+1)$–dimensional Hilbert space for the system, where $N$ is an integer value. We then introduce a discretized coordinate $X$ and momentum $P$, expressed in terms of the eigenvectors $|X,n\rangle$ and $|P,m\rangle$, where $n$ and $m$ are the integer modulo $2N+1$ Vourdas . The eigenvectors of the coordinate state satisfy the orthogonal relations $\displaystyle\langle X,m|X,n\rangle=\delta^{\prime}_{m,n},$ (7) where $\delta^{\prime}_{m,n}$ is the Kronecker delta, which is equal to 1 if $n\equiv m(mod\ 2N+1)$ (i. e. in the case that satisfies $(n-m)=(2N+1)\times$ integer), and $\displaystyle\sum_{m=-N}^{N}|X,m\rangle\langle X,m|=I,$ (8) where $I$ is the unit matrix. The momentum state is defined as the Fourier transformation of the position states as $\displaystyle|P,m\rangle=\frac{1}{2N+1}\sum_{n=-N}^{N}\omega^{mn}|X,n\rangle,$ (9) where $\omega=\exp\left[i2\pi/(2N+1)\right]$. The position and momentum operators are then defined as $\displaystyle\hat{x}=\sum_{m=-N}^{N}x_{m}|X,m\rangle\langle X,m|,$ (10) and $\displaystyle\hat{p}=\sum_{m=-N}^{N}p_{m}|P,m\rangle\langle P,m|,$ (11) where $x_{m}=mdx$, $p_{m}=mdp$, and $dx$ and $dp$ are the mesh sizes of the position and momentum, respectively. They satisfy the relation $\displaystyle dxdp=\frac{2\pi\hbar}{2N+1}.$ (12) To adapt the present discretization scheme, we express all system operators, including the position and momentum operators, in terms of the displacement operators (Schwinger’s unitary operators Schwinger ) defined as $\displaystyle\hat{U}_{x}$ $\displaystyle\equiv\exp\left(\frac{i\hat{x}dp}{\hbar}\right),$ (13) $\displaystyle\hat{U}_{p}$ $\displaystyle\equiv\exp\left(\frac{-i\hat{p}dx}{\hbar}\right).$ (14) These operators satisfy the relations, $\displaystyle\hat{U}_{x}|P,m\rangle$ $\displaystyle=|P,m+1\rangle,$ (15) $\displaystyle\hat{U}_{x}|X,m\rangle$ $\displaystyle=\omega|X,m-1\rangle,$ (16) $\displaystyle\hat{U}_{p}|X,m\rangle$ $\displaystyle=|X,m+1\rangle,$ (17) $\displaystyle\hat{U}_{p}|X,m\rangle$ $\displaystyle=\frac{1}{\omega}|X,m-1\rangle,$ (18) and $\hat{U}_{x}^{2N+1}=\hat{U}_{p}^{2N+1}=I$ and $\hat{U}_{x}\hat{U}_{p}=\hat{U}_{p}\hat{U}_{x}\omega^{-1}$. It should be noted that except in the case of $N\to\infty$, $\hat{x}$ and $\hat{p}$ do not satisfy the canonical commutation relation as in the case of the Pegg-Barnett phase operators Pegg . (See Appendix A.) To have a numerically stable discretization scheme, all system operators must be defined in terms of the periodic operators. Because the cosine operator in the momentum space is expanded as $\cos({\hat{p}dx}/{\hbar})=1-({\hat{p}dx}/{\hbar})^{2}/2+({\hat{p}dx}/{\hbar})^{4}/24+O(dx^{6})$, we defined the kinetic energy as $\displaystyle T({\hat{p}})\equiv\frac{\hbar^{2}}{dx^{2}}\left[1-\cos\left(\frac{\hat{p}dx}{\hbar}\right)\right],$ (19) which is equivalent to $T({\hat{p}})\approx\hat{p}^{2}/2$ with the second- order accuracy $O(dx^{2})$. As the conventional QFPE approaches use a higher- order finite difference scheme, for example a third-order SakuraiNJP14 and tenth-order central difference Ikeda2019Ohmic , the present approach can enhance the numerical accuracy by incorporating the higher-order cosine operators, for example, as $T({\hat{p}})=\hbar^{2}[15-16\cos\left({\hat{p}dx}/{\hbar}\right)+\cos\left({2\hat{p}dx}/{\hbar}\right)]/12dx^{2}+O(dx^{4})$. Any potential $U(\hat{x})$ is also expressed in terms of the periodic operators in the coordinate space as $\displaystyle U({\hat{x}})\equiv\sum_{k=-N}^{N}\left[a_{k}\cos\left(k\frac{\hat{x}dp}{\hbar}\right)+b_{k}\sin\left(k\frac{\hat{x}dp}{\hbar}\right)\right],$ (20) where $a_{k}$ and $b_{k}$ are the Fourier series of the potential function $U(\hat{x})$. The distinct feature of this scheme is that the WDF is periodic not only in the $\hat{x}$ space but also in the $\hat{p}$ space. The periodicity in the momentum space is indeed a key feature to maintain the stability of the equation of motion. Because the present description is developed on the basis of the discretized quantum states, the classical counter part of the discrete WDF does not exist. ## 3 Reduced equations of motion ### 3.1 Reduced hierarchical equations of motion For the above Hamiltonian with the Drude SDF $\displaystyle J(\omega)=\frac{\eta\gamma^{2}\omega}{\gamma^{2}+\omega^{2}},$ (21) we have the dissipation (friction) as $\displaystyle\eta(t)=\eta\exp[-\gamma t]$ (22) and the noise correlation functions (fluctuation) as $\displaystyle C(t)=c_{0}^{\alpha}\exp[-\gamma t]+\sum_{k=1}^{\infty}c_{k}^{\alpha}\exp[-k\nu t],$ (23) where $c_{k}^{\alpha}$ are the temperature dependent coefficients and $\nu=2\pi/\beta\hbar$ is the Matsubara frequency Tanimura-2006 ; YTperspective . This SDF approaches the Ohmic distribution, $J(\omega)=\eta\omega$, for large $\gamma$. In the classical limit, both the friction and noise correlation functions become Markovian as $\eta(t)\propto\delta(t)$ and $C(t)\propto\delta(t)$. On the other hand, in the quantum case, $C(t)$ cannot be Markovian and the value of $C(t)$ becomes negative at low temperature, owing to the contribution of the Matsubara frequency terms in the region of small $t$. This behavior is characteristic of quantum noise. The infamous positivity problem of the Markovian QME for a probability distribution of the system arises due to the unphysical Markovian assumption under the fully quantum condition Tanimura-2006 ; YTperspective ; YTJCP2014 . The fact that the noise correlation takes negative values introduces problems when the conventional QFPE is applied to quantum tunneling at low temperatures YTJCP2015 . Because the HEOM formalism treats the contribution from the Matsubara terms accurately utilizing hierarchical reduced density operators in a non- perturbative manner, there is no limitation to compute the dynamics described by the system-bath Hamiltonian TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 ; SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ ; KatoJPCB13 ; MS-QFP94 ; MS-QFPChernyak96 ; TanimuraMaruyama97 ; MaruyamaTanimura98 ; Ikeda2019Ohmic ; Ikeda2017JCP . The HEOM for the 2D PISB model is easily obtained from those for the three- dimensional RISB model as Iwamoto2019 $\displaystyle\frac{\partial}{{\partial t}}\hat{\rho}_{\\{n_{\alpha}\\}}(t)=$ $\displaystyle-\left({\frac{\rm i}{\hbar}\hat{H}_{S}^{\times}+\sum_{\alpha=x,y}n_{\alpha}\gamma}\right)\hat{\rho}_{\\{n_{\alpha}\\}}(\,t)$ $\displaystyle-\sum_{\alpha=x,y}\frac{\rm i}{\hbar}\hat{V}_{\alpha}^{\times}\hat{\rho}_{\\{n_{\alpha}+1\\}}(t)-\sum_{\alpha=x,y}\frac{{{\rm i}n_{\alpha}}}{\hbar}\hat{\Theta}_{\alpha}\hat{\rho}_{\\{n_{\alpha}-1\\}}(t),$ (24) where $\\{n_{\alpha}\\}\equiv(n_{x},n_{y})$ is a set of integers to describe the hierarchy elements and $\\{n_{\alpha}\pm 1\\}$ represents, for example, $(n_{x},n_{y}\pm 1)$ for $\alpha=y$, and $\displaystyle\hat{\Theta}_{\alpha}\equiv\eta\gamma\left(\frac{1}{\beta}{\hat{V}_{\alpha}^{\times}-\frac{\hbar}{2}\hat{H}_{S}^{\times}\hat{V}_{\alpha}^{\circ}}\right),$ (25) with $\hat{A}^{\times}\hat{\rho}\equiv\hat{A}\hat{\rho}-\hat{\rho}\hat{A}$ and $\hat{A}^{\circ}\hat{\rho}\equiv\hat{A}\hat{\rho}+\hat{\rho}\hat{A}$ for any operator $\hat{A}$. We set $\hat{\rho}_{\\{n_{\alpha}-1\\}}(t)=0$ for $n_{\alpha}=0$. For $(n_{\alpha}+1)\gamma\gg\eta/\beta$ and $(n_{\alpha}+1)\gamma\gg\omega_{0}$ (the high temperature Markovian limit), where $\omega_{0}$ is the characteristic frequency of the system, we can set ${\rm i}\hat{V}_{\alpha}^{\times}\hat{\rho}_{\\{n_{\alpha}+1\\}}(t)/\hbar=\hat{\Gamma}_{\alpha}\hat{\rho}_{\\{n_{\alpha}\\}}(t)$ to truncate the hierarchy, where $\displaystyle\hat{\Gamma}_{\alpha}\equiv\frac{{1}}{{\gamma\hbar^{2}}}\hat{V}_{\alpha}^{\times}\hat{\Theta}_{\alpha}$ (26) is the damping operator Tanimura89A ; TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 . In a high temperature Markovian case with $J(\omega)=\eta\omega/\pi$, the HEOM reduces to the Markovian QME without the rotating wave approximation (RWA) expressed as Iwamoto-2018 $\displaystyle\frac{\partial}{\partial t}\hat{\rho}(t)$ $\displaystyle=\frac{\rm i}{\hbar}{\hat{H}}_{S}^{\times}\hat{\rho}(t)-\frac{1}{\beta\hbar^{2}}\sum_{\alpha=x,y}\hat{\Gamma}_{\alpha}\hat{\rho}(t).$ (27) To demonstrate a role of the counter term in the present 2D PISB model, we derive the above equation from the perturbative approach in Appendix B. ### 3.2 Discrete quantum hierarchical Fokker-Planck equation The HEOM for the conventional WDF have been used for the investigation of various problems TanimuraPRA91 ; TanimuraJCP92 ; Tanimura-2006 ; YTperspective ; YTJCP2014 ; YTJCP2015 ; KatoJPCB13 ; TanimuraMaruyama97 ; MaruyamaTanimura98 ; Ikeda2019Ohmic ; Ikeda2017JCP , including the RTD problem SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ . Here we introduce a different expression on the basis of a discrete WDF. While there are several definitions of a discrete WDF Galetti ; luis ; klimov , in this paper, we use a simple expression introduced by Vourdas Vourdas . For any operator $\hat{A}$ is then expressed in the matrix form as $\displaystyle\bm{A}(p_{j},q_{k})$ $\displaystyle=\sum_{l=-N}^{N}\exp\left(i\frac{2p_{j}(q_{k}-q_{l})}{\hbar}\right)\langle X,l|\hat{A}|X,2k-l\rangle$ (28) $\displaystyle=\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\langle P,l|\hat{A}|P,2j-l\rangle,$ (29) where we introduced $q_{k}=kdx$ and $p_{j}=jdp$. For $\hat{A}=\hat{\rho}$, we have the discrete WDF expressed as $W$$(p_{j},q_{k})$. This discrete WDF is analogous to the conventional WDF, although the discretized regions in the $p$ and $q$ spaces are both from -$N$ to $N$ and are periodic in this case. Thus, for example, for $k<-N$, we have $k\to k+2N+1$ and $q_{k}=(k+2N+1)dx$, and for $j>N$, we have $j\to j-2N-1$ and $p_{j}=(j-2N-1)dp$. The Wigner representation of the reduced equations of motion, for example Eq. (24) and Eq.(27) can be obtained by replacing the product of any operators $\hat{A}_{1}$ and $\hat{A}_{2}$ by the star product defined as $\displaystyle[\bm{A_{1}}\star\bm{A_{2}}](p_{j},q_{k})$ $\displaystyle\equiv\frac{1}{(2N+1)^{2}}\sum_{j_{1},j_{2},k_{1},k_{2}=-N}^{N}\exp\left(i\frac{2p_{j_{2}}q_{k_{1}}-2p_{j_{1}}q_{k_{2}}}{\hbar}\right)$ $\displaystyle\times\bm{A_{1}}(p_{j}+p_{j_{1}},q_{k}+q_{k_{1}})\bm{A_{2}}(p_{j}+p_{j_{2}},q_{k}+q_{k_{2}}).$ (30) Accordingly, the quantum commutator $[\ ,\ ]$ is replaced as the discrete Moyal bracket defined as $\\{\bm{A_{1}},\bm{A_{2}}\\}_{M}\equiv\bm{A_{1}}\star\bm{A_{2}}-\bm{A_{2}}\star\bm{A_{1}}$. The HEOM in the desecrate WDF (the discrete QHFPE) are then expressed as $\displaystyle\frac{\partial}{\partial t}\bm{W}_{\\{n_{\alpha}\\}}$ $\displaystyle=-\frac{i}{\hbar}\\{\bm{H_{S}},\bm{W}_{\\{n_{\alpha}\\}}\\}_{M}$ $\displaystyle+\sum_{\alpha=x,y}n_{\alpha}\gamma\bm{W}_{\\{n_{\alpha}\\}}-\sum_{\alpha=x,y}\frac{\rm i}{\hbar}\\{\bm{V_{\alpha}},\bm{W}_{\\{n_{\alpha}+1\\}}(t)\\}_{M}$ $\displaystyle-\sum_{\alpha=x,y}\frac{{{\rm i}n_{\alpha}\eta\gamma}}{\beta\hbar}\left(\\{\bm{V_{\alpha}},\bm{W}_{\\{n_{\alpha}-1\\}}(t)\\}_{M}\right.$ $\displaystyle\left.-\frac{\hbar}{2}\\{\bm{H_{S}},\bm{\hat{V}_{\alpha}}\star\bm{W}_{\\{n_{\alpha}-1\\}}(t)+\bm{W}_{\\{n_{\alpha}-1\\}}(t)\star\bm{\hat{V}_{\alpha}}\\}_{M}\right).$ (31) As illustrated by Schwinger Schwinger , although we employed the periodic WDF, we can investigate the dynamics of a system confined by a potential by taking the limit $N\to\infty$ for $dx=x_{0}\sqrt{2\pi/(2N+1)}$ and $dp=p_{0}\sqrt{2\pi/(2N+1)}$ with $x_{0}p_{0}=\hbar$, while we set $dx=L/(2N+1)$ and $dp=2\pi\hbar/L$ in the periodic case, where $L$ is the periodic length. ### 3.3 Discrete quantum Fokker-Planck equation In the high temperature Markovian limit, as the regular HEOM (Eq. (24)) reduces to the QME (Eq.(27)), the discrete QHFPE reduces to the discrete QFPE expressed as $\displaystyle\frac{\partial}{\partial t}\bm{W}$ $\displaystyle=-\frac{i}{\hbar}\\{\bm{H_{S}},\bm{W}\\}_{M}$ $\displaystyle+\sum_{\alpha=x,y}\left[-\frac{\eta}{\beta\hbar^{2}}\left(\\{\bm{\hat{V}_{\alpha}},\bm{\hat{V}_{\alpha}}\star\bm{W}\\}_{M}-\\{\bm{\hat{V}_{\alpha}},\bm{W}\star\bm{\hat{V}_{\alpha}}\\}_{M}\right)\right.$ $\displaystyle+\frac{\eta}{2\hbar^{2}}\left(\\{\bm{\hat{V}_{\alpha}},\bm{H_{S}}\star\bm{\hat{V}_{\alpha}}\star\bm{W}\\}_{M}+\\{\bm{\hat{V}_{\alpha}},\bm{H_{S}}\star\bm{W}\star\bm{\hat{V}_{\alpha}}\\}_{M}\right.$ $\displaystyle\left.\left.-\\{\bm{\hat{V}_{\alpha}},\bm{\hat{V}_{\alpha}}\star\bm{W}\star\bm{H_{S}}\\}_{M}-\\{\bm{\hat{V}_{\alpha}},\bm{W}\star\bm{\hat{V}_{\alpha}}\star\bm{H_{S}}\\}_{M}\right)\right].$ (32) Here, the terms proportional to $\eta/\beta\hbar^{2}$ and $\eta/2\hbar^{2}$ represent the effects of thermal fluctuation and dissipation arise from the heat bath, respectively. More explicitly, the above equation is expressed as (Appendix C) $\displaystyle\frac{\partial}{\partial t}W(p_{j},q_{k})$ $\displaystyle=-\hbar\sin\left(\frac{p_{j}dx}{\hbar}\right)\frac{W(p_{j},q_{k+N+1})-W(p_{j},q_{k-N-1})}{dx^{2}}$ $\displaystyle-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}$ $\displaystyle+\frac{\eta}{\beta}\frac{W(p_{j+1},q_{k})-2W(p_{j},q_{k})+W(p_{j-1},q_{k})}{dp^{2}}$ $\displaystyle-\frac{\hbar^{2}\eta(\omega-2+\omega^{-1})V_{p_{j}}}{4dx^{2}dp^{2}}\left(W(p_{j},q_{k+N+1})+W(p_{j},q_{k-N-1})\right)$ $\displaystyle+\frac{\hbar^{2}\eta(V_{p_{j}}-V_{p_{j+1}})}{4dx^{2}dp^{2}}(W(p_{j+1},q_{k+N+1})+W(p_{j+1},q_{k-N-1}))$ $\displaystyle+\frac{\hbar^{2}\eta(V_{p_{j}}-V_{p_{j-1}})}{4dx^{2}dp^{2}}(W(p_{j-1},q_{k+N+1})+W(p_{j-1},q_{k-N-1})),$ (33) where $V_{p_{j}}\equiv\cos({p_{j}dx}/{\hbar})$. The numerical stability of the above equation arises from the finite difference scheme in the periodic phase space. For example, the finite difference of the kinetic term (the first term in the RHS of Eq.(33)) is constructed from the elements not the vicinity of $q_{k}$ (i.e. $q_{k+1}$ and $q_{k-1}$), but the boundary of the periodic $q$ state (i.e. $q_{k+N+1}$ and $q_{k-N-1}$). The dissipation terms (the last three terms in the RHS of Eq.(33)) are also described by the boundary elements. As we will show the harmonic case below, the potential term (the second term in the RHS of Eq.(33)) is constructed from the boundary of the periodic $p$ state. Because Eq. (33) satisfies $\sum_{k=-N}^{N}\sum_{j=-N}^{N}W(p_{k},q_{j})=1$ and because the operators in the discrete QFPE are non-local, the calculated results are numerically stable regardless of a mesh size. For large $N$, we have $\sin({p_{j}dx}/{\hbar})\approx p_{j}dx/{\hbar}$ and $\cos({p_{j}dx}/{\hbar})\approx 1-(p_{j}dx/{\hbar})^{2}$. Then the above equation is expressed in a similar form as the QFPE obtained by Caldeira and Leggett CaldeiraPhysica83 ; TanimuraPRA91 , although the finite difference expressions for discrete WDF are quite different from those for the conventional WDF. (See Appendix D). ## 4 Numerical results In principle, with the discrete WDF, we are able to compute various physical quantities by adjusting the mesh size determined from $N$ for any periodic system and a system confined by a potential. A significant aspect of this approach is that even small $N$, the equation of motion is numerically stable, although accuracy may not be sufficient. In the following, we demonstrate this aspect by numerically integrating Eq. (33) for the a free rotor case and a harmonic potential case, for which we have investigated from the regular QME approach Iwamoto-2018 and QFPE approach TanimuraPRA91 . In both cases, we considered a weak damping condition ($\eta=0.05$) at high temperature ($\beta=0.1$). For time integrations, we used the fourth-order Runge-Kutta method with the step $\delta t=0.001$. In the free rotor case, we chose $N$ to minimize the momentum space distribution near the boundary, whereas, in the harmonic case, we chose $N$ to minimize the population of the discrete WDF near the boundary in both the $q$ and $p$ directions. Figure 1: Snapshots of the momentum space distribution function, $P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$, in the free rotor case calculated from Eq. (33) for mesh size (a) $N=5$ and (b) $N=20$ with the waiting times $t=0,2,5$, and $100$ (equilibrium state). Figure 2: The equilibrium distribution ($t=100$) of the discrete WDF in the free rotor case for (a) $N=5$ and (b) $N=20$. ### 4.1 Free rotor case We first examine the numerical stability of Eq. (33) for a simple free rotor case, $U(\hat{x})=0$ with $L=2\pi$. For demonstration, we considered localized initial conditions expressed as $W(p_{0},q_{j})=1$ for $-N\leq j\leq N$ with $p_{0}=0$, and zero otherwise. While such initial conditions that involve a singularity in the $p$ direction is not easy to conduct numerical simulation from a conventional finite difference approach, there is no difficulty from this approach. Moreover, the total population is alway conserved within the precision limit of the numerical integration, because we have $\sum_{k=-N}^{N}\sum_{j=-N}^{N}W(p_{k},q_{j})=1$. We first depict the time evolution of the momentum distribution function $P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$ for (a) $N=5$ and (b) $20$, respectively. Here, we do not plot $P(q_{j})=\sum_{k=-N}^{N}W(p_{k},q_{j})$, because this is always constant as a function of $q$, as expected for the free rotor system. As illustrated in Fig. 1, even the distribution was localized at $p_{0}=0$ at $t=0$, calculated $P(p_{k})$ was alway stable. As the waiting time increased, the distribution became a Gaussian-like profile in the $p$ direction owing to the thermal fluctuation and dissipation both of which arose from the heat bath. In this calculation, the larger $N$ we used, the more accurate results we had. We found that the results converged approximately $N=20$, and coincided with the results obtained from the conventional QME approach with use of the finite difference scheme Iwamoto-2018 . The equilibrium distributions of the discrete WDF for different $N$ are depicted in Fig. 2. As $N$ increases, the distribution in the $p$ direction approached the Gaussian profile. Figure 3: Snapshots of the coordinate space distribution function, $P(q_{j})=\sum_{k=-N}^{N}W(p_{k},q_{j})$, in the harmonic potential case calculated from Eq. (33) with $N=150$ with the waiting times $t=0,2,20$, and $200$ (equilibrium state). Figure 4: Snapshots of the momentum space distribution function, $P(p_{k})=\sum_{j=-N}^{N}W(p_{k},q_{j})$, in the harmonic potential case calculated from Eq. (33) with $N=150$ with the waiting times $t=0,2,20$, and $200$ (equilibrium state). Figure 5: Snapshots of the discrete WDFs in the harmonic case for various values of the waiting time. Contours in red and blue represent positive and negative values, respectively. The mesh size is $N=150$. ### 4.2 Harmonic case We next consider a harmonic potential case, $U(\hat{x})=\hat{x}^{2}/2$. Here, we describe the potential using the periodic operator as $U(\hat{x})\approx\hbar^{2}(1-\cos({\hat{x}dp}/{\hbar}))/dp^{2}+O(dp^{2})$. Then the potential term is expressed as $\displaystyle-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}=\hbar\sin\left(\frac{x_{k}dp}{\hbar}\right)\frac{W(p_{j+N+1},q_{k})-W(p_{j-N-1},q_{k})}{dp^{2}}.$ (34) With this expression, we simulated the time-evolution of the discrete WDF by numerically integrating Eq.(33) with $N=150$. We chose the same system-bath coupling strength and inverse temperature as in the free rotor case (i.e. $\eta=0.05$ and $\beta=0.1$). In Figs. 3 and 4, we depict the time-evolution of the position and momentum distribution functions $P(q_{j})$ and $P(p_{k})$ in the harmonic case from the same localized initial conditions as in the free rotor case. As illustrated in Figs. 3 and 4, both $P(q_{j})$ and $P(p_{k})$ approached the Gaussian-like profiles as analytic derived solution of the Brownian model predicted. Note that, although the discrete WDF is a periodic function, we can describe such distribution that is confined in a potential by combining the periodicity in the coordinate and momentum spaces. To illustrate a role of periodicity, we depict the time-evolution of the discrete WDF for various values of the waiting time in Fig. 5. At time (a) $t=0$, the distribution was localized at $p_{0}=0$, while the distribution in the $q$ direction was constantly spread. At time (b) $t=0.5$, the distribution symmetrically splits into the positive and negative $p$ directions because the total momentum of the system is zero. Due to the kinetic operator (the first term in the RHS in Eq.(33)), the vicinity of the distributions at $(p,q)=(p_{0},q_{-(N+1)})$, and $(p_{0},q_{N+1})$ appeared and the profiles of the distribution are similar to the distribution near $(p_{0},q_{0})$. We also observed the distribution along the vicinity of the $p=p_{N+1}$ and $p=p_{-(N+1)}$ axises, respectively. These distributions arose owing to the finite difference operator of the potential term in Eq. (34), which created the positive and negative populations $W(p_{N+1},q_{k})$ and $-W(p_{-(N+1)},q_{k})$ from $W(p_{0},q_{k})$. The sign of these distributions changed at $q=q_{0}$, because of the presence of the prefactor $\sin\left({x_{k}dp}/{\hbar}\right)$. In Fig. 5(d), we observed the tilted $x$ letter-like distributions centered at $(p,q)=(12,0)$ and $(-12,0)$, respectively. These distributions appeared as twin peaks in the momentum distribution depicted in Fig. 4. From time (e) $t=1.0$ to (i) $t=10$, the distributions rotated clockwise to the centered at $(q_{0},p_{0})$ as in the conventional WDF case. Owing to the periodic nature of the kinetic and potential operators, we also observe the mirror images of the central distribution at $(q_{0},p_{N+1})$, $(q_{0},p_{-(N+1)})$, $(q_{-(N+1)},p_{0})$, and $(q_{N+1},p_{0})$, respectively. At time (j) $t=20$, the spiral structures of the distributions disappeared owing to the dissipation, then the profiles of distributions became circular. The peaks of the circular distributions became gradually higher due to the thermal fluctuation (excitation), as depicted in Fig. 5 (k) $t=40$. The distributions were then reached to the equilibrium profiles, in which the energy supplied by fluctuations and the energy lost through dissipation were balanced, as presented in Fig. 5 (i) $t=100$. It should be noted that, although $P(q_{j})$ and $P(p_{k})$ in Figs. 3 and 4 exhibited the Gaussian profiles, each circular distribution observed in Fig. 5 (l) need not be the Gaussian, because the discrete WDF itself is not a physical observable. The negative distributions in the four edges of the phase space arose due to the prefactors of the kinetic and potential terms $\sin\left({x_{k}dp}/{\hbar}\right)$ and $\sin\left({p_{j}dx}/{\hbar}\right)$. Although the appearance of the discrete WDF is very different from the conventional WDF, this is not surprising, because the discrete WDF does not have classical counter part. This unique profile of the discrete WDF is a key feature to maintain the numerical stability of the discrete QFPE. ## 5 Conclusion In this paper, we developed an open quantum dynamics theory for the discrete WDF. Our approach is based on the PISB model with a discretized operator defined in the $2N+1$ periodic eigenstates in both the $q$ and $p$ spaces. The kinetic, potential, and system-bath interaction operators in the equations of motion are then expressed in terms of the periodic operators; it provide numerically stable discretization scheme regardless of a mesh size. The obtained equations are applicable not only for a periodic system but also a system confined by a potential. We demonstrated the stability of this approach in a Markovian case by integrating the discrete QFPE for a free rotor and harmonic cases started from singular initial conditions. It should be noted that the Markovian condition can be realized only under high-temperature conditions even if we consider the Ohmic SDF due to the quantum nature of the noise. To investigate a system in a low temperature environment, where quantum effects play an essential role, we must include low-temperature correction terms in the framework of the HEOM formalism Tanimura-2006 ; YTperspective , for example the QHFPE YTJCP2014 or the low-temperature corrected QFPE Ikeda2019Ohmic . As we numerically demonstrated, we can reduce the computational cost of dynamics simulation by suppressing the mesh size, while we have to examine the accuracy of the results carefully. If necessary, we can employ a present model with small $N$ as a phenomenological model for an investigation of a system described by a multi-electronic and multi-dimensional potential energy surfaces, for example, an open quantum system that involves a conical intersection Ikeda2018CI . Finally, we briefly discuss some extensions of the present study. In the current frameworks, it is not easy to introduce open boundary conditions, most notably the in flow and out flow boundary conditions Ringhofer1989 ; Jiang2014 ; Mahmood2016 , because our approach is constructed on the basis of the periodical phase space. Moreover, when the system is periodic, it is not clear whether we can include a non-periodical external field, for example a bias field SakuraiJPSJ13 ; SakuraiNJP14 ; GrossmanSakuraiJPSJ or ratchet refrigerant forces KatoJPCB13 . Moreover, numerical demonstration of the discrete QHFPE (Eq. (31)) has to be conducted for a strong system-bath coupling case at low temperature. Such extensions are left for future investigation. ## Acknowledgements Y. T. is supported by JSPS KAKENHI Grant Number B 21H01884. ## Conflict of interest The authors declare that they have no conflict of interest. ## Data availability The data that support the findings of this study are available from the corresponding author upon a reasonable request. ## Appendix A Canonical commutation relation in the large $N$ limit In this Appendix, we show that our coordinate and momentum operators satisfy the canonical commutation relation in the large $N$ limit. First we consider a non-periodic case, $dx=x_{0}\sqrt{2\pi/(2N+1)}$ and $dp=p_{0}\sqrt{2\pi/(2N+1)}$ with $x_{0}p_{0}=\hbar$. We employ the relationship between the displaced operator, $\hat{U}_{x}\hat{U}_{p}-\hat{U}_{p}\hat{U}_{x}\omega^{-1}=0$. Assuming large $N$, we express $\hat{U}_{x}$ and $\hat{U}_{p}$ in Taylor expansion forms as $\displaystyle\left[1+\frac{idp\hat{x}}{\hbar}+\frac{(idp)^{2}}{2\hbar^{2}}\hat{x}^{2}\right]\left[1+\frac{i\hat{p}dx}{\hbar}+\frac{(idx)^{2}}{2\hbar^{2}}\hat{p}^{2}\right]$ $\displaystyle-\left[1+\frac{i\hat{p}dx}{\hbar}+\frac{(idx)^{2}}{2\hbar^{2}}\hat{p}^{2}\right]\left[1+\frac{idp\hat{x}}{\hbar}+\frac{(idp)^{2}}{2\hbar^{2}}\hat{x}^{2}\right]\left[1-\frac{idxdp}{\hbar})+O((N^{\frac{-3}{2}})\right]$ $\displaystyle=\frac{dxdp}{\hbar^{2}}(\hat{x}\hat{p}-\hat{p}\hat{x})-\frac{idxdp}{\hbar}+O(N^{\frac{-3}{2}}).$ (35) This indicates that the canonical commutation relation $[\hat{x},\hat{p}]=i\hbar$ satisfies to an accuracy of $O(N^{\frac{-3}{2}})$. In the $2\pi$-periodic case, we set $dx={2\pi}/{(2N+1)}$ and $dp=\hbar$. Then we obtain $\displaystyle(\cos\hat{x}+i\sin\hat{x})\left(1-\frac{idx}{\hbar}\hat{p}\right)-\left(1-\frac{idx}{\hbar}\hat{p}\right)(\cos\hat{x}+i\sin\hat{x})(1-idx)+O(N^{-2})$ $\displaystyle=\frac{dx}{\hbar}(\sin\hat{x}\hat{p}-\hat{p}\sin\hat{x}-i\hbar\cos\hat{x})+\frac{idx}{\hbar}(\cos\hat{x}\hat{p}-\hat{p}\cos\hat{x}+i\hbar\sin\hat{x})+O(N^{-2}).$ (36) The first and second terms of the RHS in Eq. (36) are the anti-Hermite and Hermite operators. Therefore, the contributions from these terms are zero. Thus, for large $N$, we obtain the canonical commutation relations for a periodic case as Curruthers $\displaystyle[\sin\hat{x},\hat{p}]$ $\displaystyle=i\hbar\cos\hat{x},$ (37) and $\displaystyle[\cos\hat{x},\hat{p}]$ $\displaystyle=-i\hbar\sin\hat{x},$ (38) to an accuracy of $O(N^{-2})$. ## Appendix B QME for 2D PISB model and counter term To demonstrate a role of the counter term, here we employ the QME for the 2D PISB model. As shown in Iwamoto-2018 , the QME for the reduced density matrix of the system, $\hat{\rho}(t)$, is derived from the second-order perturbation approach as $\displaystyle\frac{\partial}{\partial t}\hat{\rho}(t)$ $\displaystyle=-\frac{i}{\hbar}[\hat{H}_{S},\hat{\rho}(t)]-\frac{1}{\hbar^{2}}\int^{t}_{0}d\tau\left(\hat{\Gamma}_{x}(\tau)\hat{\rho}(t-\tau)+\hat{\Gamma}_{y}(\tau)\hat{\rho}(t-\tau)\right),$ (39) where $\displaystyle\hat{\Gamma}_{\alpha}(\tau)\hat{\rho}(t-\tau)$ $\displaystyle\equiv C(\tau)[\hat{V}_{\alpha},\hat{G}_{S}(\tau)\hat{V}_{\alpha}\hat{\rho}(t-\tau)\hat{G}_{S}^{\dagger}(\tau)]$ $\displaystyle-C(-\tau)[\hat{V}_{\alpha},\hat{G}_{S}(\tau)\hat{\rho}(t-\tau)\hat{V}_{\alpha}\hat{G}_{S}^{\dagger}(\tau)]$ (40) is the damping operator for $\alpha=x$ or $y$, in which $\displaystyle C(\tau)$ $\displaystyle=\hbar\int^{\infty}_{0}\frac{d\omega}{\pi}J(\omega)\left[\coth\left(\frac{\beta\hbar\omega}{2}\right)\cos(\omega\tau)-i\sin(\omega\tau)\right]$ (41) is the bath correlation function and $\hat{G}_{S}(\tau)$ is the time evolution operator of the system. For the Ohmic SDF $J(\omega)=\eta\omega$, $C(\tau)$ reduces to the Markovian form as $\displaystyle C(\tau)=\eta\left(\frac{2}{\beta}+i\hbar\frac{d}{d\tau}\right)\delta(\tau).$ (42) Using the relation $\int^{t}_{0}d\tau\hat{\Gamma}_{\alpha}(\tau)\hat{\rho}(t-\tau)=\hat{\bar{\Gamma}}_{\alpha}\hat{\rho}(t)+{i\hbar\eta}\delta(0)[(\hat{V}_{\alpha})^{2},\hat{\rho}(t)]$, we can rewrite the damping operator, Eq. (40), as $\displaystyle\hat{\bar{\Gamma}}_{\alpha}\hat{\rho}(t)$ $\displaystyle=\frac{\eta}{\beta}\left([\hat{V}_{\alpha},\hat{V}_{\alpha}\hat{\rho}(t)]-[\hat{V}_{\alpha},\hat{\rho}(t)\hat{V}_{\alpha}]\right)+\frac{i\hbar\eta}{2}\left[(\hat{V}_{\alpha})^{2},\frac{d\hat{\rho}(t-\tau)}{d\tau}|_{\tau=0}\right]$ $\displaystyle-\frac{\eta}{2}\left([\hat{V}_{\alpha},\hat{H}_{S}\hat{V}_{\alpha}\hat{\rho}(t)]+[\hat{V}_{\alpha},\hat{H}_{S}\hat{\rho}(t)\hat{V}_{\alpha}]-[\hat{V}_{\alpha},\hat{V}_{\alpha}\hat{\rho}(t)\hat{H}_{S}]-[\hat{V}_{\alpha},\hat{\rho}(t)\hat{V}_{\alpha}\hat{H}_{S}]\right).$ (43) In the case if there is only $\hat{V}_{y}=\hbar\sin({\hat{x}dp}/{\hbar})/dp$ interaction in the PISB model, (i.e. $\hat{V}_{x}=0$), we encounter the divergent term ${i\hbar\eta}\delta(0)[(\hat{V}_{y})^{2},\hat{\rho}(t)]$ that arises from the second term in the RHS of Eq. (43). Because $\hat{V}_{y}$ reduces to the linear operator of the coordinate $\hat{V}_{y}\approx\hat{x}$ in the large $N$ limit, the PISB model under this condition corresponds to the Caldeira-Leggett model without the counter term: Divergent term arises because we exclude the counter term in the bath Hamiltonian, Eq. (3). (See also Suzuki-2003 .) If we include $\hat{V}_{x}=\hbar\cos({\hat{x}dp}/{\hbar})/dp$, this divergent term vanishes, because, by using the relation $\sin^{2}({\hat{x}dp}/{\hbar})+\cos^{2}({\hat{x}dp}/{\hbar})=1$, we have $\displaystyle{i\hbar\eta}\delta(0)[(\hat{V}_{x})^{2},\hat{\rho}(t)]+{i\hbar\eta}\delta(0)[(\hat{V}_{y})^{2},\hat{\rho}(t)]$ $\displaystyle={i\hbar\eta}\delta(0)[\hat{I},\hat{\rho}(t)]$ $\displaystyle=0.$ (44) This implies that the interaction $\hat{V}_{y}$ plays the same role as the counter term. This fact indicates the significance of constructing a system- bath model with keeping the same symmetry as the system itself. If we ignore this point, the system dynamics are seriously altered by the bath even if the system-bath interaction is feeble Suzuki-2003 . ## Appendix C Discrete Moyal bracket Using the kinetic term (the first term in the RHS of Eq. (32)) as an example, here we demonstrate the evaluation of the discrete Moyal bracket defined as Eq. (30). The kinetic energy in a finite Hilbert space representation is expressed as $\displaystyle\bm{T}(p_{j},q_{k})$ $\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\langle P,l|\cos\left(\frac{\hat{p}dx}{\hbar}\right)|P,2j-l\rangle\right)$ $\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\sum_{l=-N}^{N}\exp\left(i\frac{-2q_{k}(p_{j}-p_{l})}{\hbar}\right)\cos\left(\frac{p_{l}dx}{\hbar}\right)\delta_{l,2j-l}\right)$ $\displaystyle=\frac{\hbar^{2}}{dx^{2}}\left(1-\cos\left(\frac{p_{j}dx}{\hbar}\right)\right).$ (45) Because the Moyal bracket with $\bm{A_{1}}=\hbar^{2}/dx^{2}$ and $\bm{A_{2}}=\bm{W}$ is zero, we focus on the $\cos\left({p_{j}dx}/{\hbar}\right)$ term. Let $\bm{A_{1}}=\exp\left(\pm i{p_{j}dx}/{\hbar}\right)$ and $\bm{A_{2}}=\bm{W}$ in Eq. (30). Then we have $\displaystyle\left[\exp\left(\pm i\frac{p_{j}dx}{\hbar}\right)\star\bm{W}\right](p_{j},q_{k})=\frac{1}{(2N+1)^{2}}\sum_{j_{1},j_{2},k_{1},k_{2}=-N}^{N}\exp\left(i\frac{2p_{j_{2}}q_{k_{1}}-2p_{j_{1}}q_{k_{2}}}{\hbar}\right)$ $\displaystyle\times\exp\left(\pm i\frac{(p_{j}+p_{j_{1}})dx}{\hbar}\right)\bm{W}(p_{j}+p_{j_{2}},q_{k}+q_{k_{2}})$ $\displaystyle=\frac{1}{(2N+1)}\sum_{j_{1},k_{2}=-N}^{N}\exp\left(i\frac{(\pm 1-2k_{2})p_{j_{1}}dx}{\hbar}\right)\exp\left(\pm i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k}+q_{k_{2}})$ $\displaystyle=\sum_{k_{2}=-N}^{N}\delta^{\prime}_{\pm 1-2k_{2},0}\exp\left(\pm i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k}+q_{k_{2}})$ $\displaystyle=\exp\left(\pm i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k\pm(N+1)})$ (46) Similarly, for $\bm{A_{1}}=\bm{W}$ and $\bm{A_{2}}=\exp\left(\pm i{p_{j}dx}/{\hbar}\right)$, we have $\displaystyle\left[\bm{W}\star\exp\left(\pm i\frac{p_{j}dx}{\hbar}\right)\right](p_{j},q_{k})=\exp\left(\mp i\frac{p_{j}dx}{\hbar}\right)\bm{W}(p_{j},q_{k\pm(N+1)}).$ (47) Thus the discrete Moyal product of the kinetic energy is expressed as $\displaystyle-\frac{i}{\hbar}[\bm{T}\star\bm{W}](p_{j},q_{k})=-\hbar\sin\left(\frac{p_{j}dx}{\hbar}\right)\frac{\bm{W}(p_{j},q_{k+N+1})-\bm{W}(p_{j},q_{k-N-1})}{dx^{2}}.$ (48) For example, for $q_{0}$, the above expression involves the contributions from $q_{N+1\equiv-N(mod\ 2N+1)}$ and $q_{-N-1\equiv N(mod\ 2N+1)}$, which are the elements near the boundary of the periodic state. Note that $N+1$ arises from $\delta^{\prime}_{1-2k_{2},0}$ that is the inverse element of 2 modulo $2N+1$. For large $N$, the above expression reduces to the kinetic term of the conventional QFPE by regarding the finite difference near the boundary as the derivative of the coordinate. ## Appendix D Discrete quantum Fokker-Planck equation for large $N$ For a large $N$, Eq. (33) reduces to $\displaystyle\frac{\partial}{\partial t}W(p,q)$ $\displaystyle=-p\frac{\partial}{\partial q}W(p,q)-\frac{i}{\hbar}\\{\bm{U},\bm{W}\\}_{M}+\frac{\eta}{\beta}\frac{\partial^{2}}{\partial p^{2}}W(p,q)$ $\displaystyle+\frac{\eta}{2}\left(\hat{M}^{2}_{p}\hat{M}_{x}W(p,q)+p\hat{M}_{x}\frac{\partial}{\partial p}W(p,q)\right),$ (49) where $\displaystyle\frac{\partial W(p,q)}{\partial q}\equiv\frac{W(p_{j},q_{k+N+1)}-W(p_{j},q_{k-N-1})}{dx},$ (50) $\displaystyle\frac{\partial W(p,q)}{\partial p}\equiv\frac{W(p_{j+N+1},q_{k})-W(p_{j-N-1},q_{k})}{dp},$ (51) $\displaystyle\hat{M}_{x}W(p,q)\equiv\frac{W(p_{j},q_{k+N+1)}+W(p_{j},q_{k-N-1})}{2},$ (52) and $\displaystyle\hat{M}_{p}W(p,q)\equiv\frac{W(p_{j+N+1},q_{k})+W(p_{j-N-1},q_{k})}{2}.$ (53) Although the above expression has a similar form to the QFPE, the finite difference operators for the discrete WDF are defined by the elements near the periodic boundary, i.e., for $W(p_{0},q_{0})$, $\partial/\partial q$ is evaluated from $W(p_{0},q_{-(N+1)})$, and $W(p_{0},q_{N+1})$. Thus the appearance of the discrete WDF can be different from the regular WDF, as depicted in Fig. 5 even for large $N$. ## References * (1) Frensley, W. R.: Boundary conditions for open quantum systems driven far from equilibrium. Rev. Mod. Phys. 62, 745 (1990).https://doi.org/10.1103/RevModPhys.62.745 * (2) Jacoboni, C. and Bordone, P. : The Wigner-function approach non-equilibrium electron transport, Reports on Progress in Physics 67, 1033 (2004). https://doi=10.1088/0034-4885/67/7/R01 * (3) Grossmann, F., Koch, W.: A finite-difference implementation of the Caldeira–Leggett master equation. J. Chem. Phys., 130, 034105 (2009). https://doi.org/10.1063/1.3059006 * (4) Kim, K. Y.: A discrete formulation of the Wigner transport equation. J. Appl. Phys. 102, 113705 (2007). https://doi.org/10.1063/1.2818363 * (5) Weinbub, J., Ferry, D. K.: Recent advances in Wigner function approaches. Apply. Phys. Rev. 5, 041104 (2018). https://doi.org/10.1063/1.5046663 * (6) Schwinger, J : Quantum Mechanics: Symbolism of atomic measurements, P84, Englert, B.-G. (ed.) Berlin: Springer (2001). ISBN 13:9783662045893 * (7) Caldeira, A. O., Leggett, A. J.: Quantum tunneling in a dissipative system. Ann. Phys. (N.Y.), 149, 374 (1983). https://doi.org/10.1016/0003-4916(83)90202-6 * (8) U. Weiss, Quantum Dissipative Systems (World Scientific, Singapore, 2012) 4th ed. * (9) Breuer, H. P., Petruccione, F.: The Theory of Open Quantum Systems (Oxford University Press, New York, 2002). * (10) Caldeira, A. O., Leggett, A. J.: Path integral approach to quantum Brownian motion. Physica 121A, 587 (1983). https://doi.org/10.1016/0378-4371(83)90013 * (11) Waxman, D., Leggett, A. J.: Dissipative quantum tunneling at finite temperatures. Phys. Rev. B 32, 4450 (1985).https://doi.org/10.1103/PhysRevB.32.4450 * (12) Tanimura, Y., Kubo, R.: Time evolution of a quantum system in contact with a nearly Gaussian-Markoffian noise bath. J. Phys. Soc. Jpn. 58, 101 (1989).https://doi.org/10.1143/JPSJ.58.101 * (13) Tanimura, Y., Wolynes, P. G.: Quantum and classical Fokker-Planck equations for a Gaussian-Markovian noise bath. Phys. Rev. A 43, 4131 (1991).https://doi.org/10.1103/PhysRevA.43.4131 * (14) Tanimura, Y., Wolynes, P. G.: The interplay of tunneling, resonance, and dissipation in quantum barrier crossing: A numerical study. J. Chem. Phys. 96, 8485 (1992).https://doi.org/10.1063/1.462301 * (15) Tanimura, Y. : Stochastic Liouville, Langevin, Fokker-Planck, and master equation approaches to quantum dissipative systems. J. Phys. Soc. Jpn., 75, 082001 (2006).https://doi.org/10.1143/JPSJ.75.082001 * (16) Tanimura, Y. : Numerically “exact” approach to open quantum dynamics: The hierarchical equations of motion (HEOM).,J. Chem. Phys. 153, 020901 (2020).https://doi.org/10.1063/5.0011599 * (17) Tanimura, Y. : Reduced hierarchical equations of motion in real and imaginary time: Correlated initial states and thermodynamic quantities. J. Chem. Phys. 141, 044114 (2014).https://doi.org/10.1063/1.4890441 * (18) Tanimura, Y. : Real-time and imaginary-time quantum hierarchal Fokker-Planck equations. J. Chem. Phys. 142, 144110 (2015).https://doi.org/10.1063/1.4916647 * (19) Jensen, K. L. and Buot, F. A., Numerical simulation of intrinsic bistability and high-frequency current oscillations in resonant tunneling structures, Phys. Rev. Lett., 66, 1078 (1991). * (20) Jensen, K.L. and Buot, F.A., The methodology of simulating particle trajectories through tunneling structures using a Wigner distribution approach, IEEE Transactions on Electron, 38, 2337 (1991). https://doi=10.1109/16.88522 * (21) Zhan, Z., Colomes, E., Oriols, X. : Unphysical features in the application of the Boltzmann collision operator in the time-dependent modeling of quantum transport. J. Comput. Electron. 15, 1206 (2016). * (22) Sakurai, A.,Tanimura, Y.: An approach to quantum transport based on reduced hierarchy equations of motion: Application to a resonant tunneling diode. J. Phys. Soc. Jpn, 82, 033707 (2013).https://doi.org/10.7566/JPSJ.82.033707 * (23) Sakurai, A.,Tanimura, Y.: Self-excited current oscillations in a resonant tunneling diode described by a model based on the Caldeira–Leggett Hamiltonian. New J. Phys. 16, 015002 (2014). https://doi.org/10.1088/1367-2630/16/1/015002 * (24) Grossmann, F., Sakurai, A.,Tanimura, Y.: Electron pumping under non-Markovian dissipation: The role of the self-consistent field. J. Phys. Soc. Jpn, 85, 034803 (2016). https://doi.org/10.7566/JPSJ.85.034803 * (25) Ringhofer, C., Ferry, D. K., Kluksdahl, N.:Absorbing boundary conditions for the simulation of quantum transport phenomena. Transp. Theory Stat. Phys. 18, 331 (1989). * (26) Jiang, H., Lu, T.,Cai, W.: A device adaptive inflow boundary condition for Wigner equations of quantum transport. J. Comput. Phys. 258, 773 (2014). * (27) Schulz D. and A. Mahmood A., Approximation of a Phase Space Operator for the Numerical Solution of the Wigner Equation, in IEEE J. of Quantum Electronics, 52, 1 (2016). https://doi:10.1109/JQE.2015.2504086. * (28) Yamada Y., Tsuchiya H., and Ogawa M., Quantum Transport Simulation of Silicon-Nanowire Transistors Based on Direct Solution Approach of the Wigner Transport Equation, in IEEE Transactions on Electron Devices, 56, 1396 (2009). https://doi:10.1109/TED.2009.2021355. * (29) Morandi, O., Schurrer, F.: Wigner model for quantum transport in graphene. J. Phys. A, Math. Theor. 44, 265301 (2011). * (30) Barraud, S.: Dissipative quantum transport in silicon nanowires based on Wigner transport equation. J. Appl. Phys. 110, 093710 (2011). https://doi.org/10.1063/1.3654143 * (31) Jonasson, O., Knezevic, I.: Dissipative transport in superlattices within the Wigner function formalism. J. Comput. Electron. 14, 879 (2015). * (32) Tilma, T., Everitt, M. J., Samson, J. H., Munro, W. J., Nemoto, K.: Wigner functions for arbitrary quantum systems. Phys. Rev. Lett. 117, 180401 (2016). https://doi.org/10.1103/PhysRevLett.117.180401 * (33) Ivanov, A., Breuer, H. P.: Quantum corrections of the truncated Wigner approximation applied to an exciton transport model. Phys. Rev. E 95, 042115 (2017). https://doi.org/10.1103/PhysRevE.95.042115 * (34) Kim, K. Y., Kim, J., Kim, S.: An efficient numerical scheme for the discrete Wigner transport equation via the momentum domain narrowing. AIP Adv. 6, 065314 (2016). https://doi.org/10.1063/1.4954237 * (35) Kim, K. Y., Kim, S., Tang, T.: Accuracy balancing for the finite-difference-based solution of the discrete Wigner transport equation. J. Comput. Electron. 16, 148 (2017). https://doi.org/10.1007/s10825-016-0944-9 * (36) Frensley, W.R. Transient Response of a Tunneling Device Obtainefrom the Wigner Function, Phys. Rev. Lett., 57, 2853 (1986). https://doi:10.1103/PhysRevLett.57.2853, * (37) Frensley, W.R. Wigner-function model of a resonant-tunneling semiconductor device, Physical Review B, 36 1570 (1987). https://doi:10.1103/PhysRevB.36.1570, * (38) Kluksdahl N C, Kriman A M and Ferry D K.: Self-consistent study of the resonant-tunneling diode, Phys. Rev. B 39 7720 (1989). * (39) Shifren, L. and Ringhofer, C. and Ferry, D.K., A Wigner function-based quantum ensemble Monte Carlo study of a resonant tunneling diode, 50, 769 (2003). https://doi:10.1109/TED.2003.809434, * (40) Jensen, K.L. and Buot, F.A., The methodology of simulating particle trajectories through tunneling structures using a Wigner distribution approach, IEEE Transactions on Electron Devices 38, 2337 (1991). https://doi:10.1109/16.88522 * (41) Jensen, K. L. and Buot, F. A., Numerical simulation of intrinsic bistability and high-frequency current oscillations in resonant tunneling structures, Phys. Rev. Lett., 66, 1078 (1991).https://doi:10.1103/PhysRevLett.66.1078 * (42) Zhao, P. Cui, H. L. Woolard,D. Jensen,K. L. and Buot,F. A., Simulation of resonant tunneling structures: Origin of the I–V hysteresis and plateau-like structure, J. App. Phys. 87, 1337 (2010).https://doi:10.1063/1.372019 * (43) Biegel, B. A. and Plummer, J. D., Comparison of self-consistency iteration options for the Wigner function method of quantum device simulation, Phys. Rev. B, 54, 8070 (1996).https://doi:10.1103/PhysRevB.54.8070, * (44) Yoder P. D., Grupen M. and Smith R. K. , Demonstration of Intrinsic Tristability in Double-Barrier Resonant Tunneling Diodes With the Wigner Transport Equation, IEEE Transactions on Electron Devices, 57 3265 (2010). https://doi:10.1109/TED.2010.2081672. * (45) L. Schulz and D. Schulz, ”Application of a Slowly Varying Envelope Function Onto the Analysis of the Wigner Transport Equation,” in IEEE Transactions on Nanotechnology, vol. 15, no. 5, pp. 801-809, Sept. 2016, doi: 10.1109/TNANO.2016.2581880. * (46) Dorda, A., Schurrer, F.: A WENO-solver combined with adaptive momentum discretization for the Wigner transport equation and its application to resonant tunneling diodes. J. Comput. Phys. 284, 95 (2015). * (47) Zueco, D. , Garcıa-Palacios, J. L. :Quantum ratchets at high temperatures. Phys. E 29, 435 (2005). https://doi.org/10.1016/j.physe.2005.05.043 * (48) Cleary, L. and Coffey, W. T. and Kalmykov, Y. P. and Titov, S. V, Semiclassical treatment of a Brownian ratchet using the quantum Smoluchowski equation Phys. Rev. E. 80, 051106 (2009). https://doi.org/10.1103/PhysRevE.80.051106 * (49) Kato, A., Tanimura, Y.: Quantum suppression of ratchet rectification in a Brownian system driven by a biharmonic force. J. Phys. Chem. B 117,13132 (2013).https://doi.org/10.1021/jp403056h * (50) Tanimura, Y., Mukamel, S.: Multistate quantum Fokker–Planck approach to nonadiabatic wave packet dynamics in pump–probe spectroscopy. J. Chem. Phys. 101, 3049 (1994).https://doi.org/10.1063/1.467618 * (51) Chernyak, V., Mukamel, S.: Collective coordinates for nuclear spectral densities in energy transfer and femtosecond spectroscopy of molecular aggregates. J. Chem. Phys. 105, 4565 (1996).https://doi.org/10.1063/1.472302 * (52) Tanimura, Y., Maruyama, Y.: Gaussian–Markovian quantum Fokker–Planck approach to nonlinear spectroscopy of a displaced Morse potentials system: Dissociation, predissociation, and optical Stark effects. J. Chem. Phys. 107, 1779 (1997).https://doi.org/10.1063/1.474531 * (53) Maruyama, Y., Tanimura, Y.: Pump-probe spectra and nuclear dynamics for a dissipative molecular system in a strong laser field: predissociation dynamics. Chem. Phys. Lett. 292, 28 (1998).https://doi.org/10.1016/S0009-2614(98)00634-4 * (54) Ikeda, T., Tanimura, Y. : Low-temperature quantum Fokker–Planck and Smoluchowski equations and their extension to multistate systems. J. Chem. Theory Comput. 15, 2517 (2019).https://doi.org/10.1021/acs.jctc.8b01195 * (55) Ikeda, T., Tanimura, Y. : Probing photoisomerization processes by means of multi-dimensional electronic spectroscopy: The multi-state quantum hierarchical Fokker-Planck equation approach. J. Chem. Phys. 147, 014102 (2017).https://doi.org/10.1063/1.4989537 * (56) Ikeda, T., Tanimura, Y. : Phase-space wavepacket dynamics of internal conversion via conical intersection: Multi-state quantum Fokker-Planck equation approach. Chem. Phys. 515, 203 (2018).https://doi.org/10.1016/j.chemphys.2018.07.013 * (57) Ikeda, T., Tanimura, Y., Dijkstra, A. : Modeling and analyzing a photo-driven molecular motor system: Ratchet dynamics and non-linear optical spectra. J. Chem. Phys. 150, 114103 (2019).https://doi.org/10.1063/1.5086948 * (58) Sakurai, A., Tanimura, Y.: Does $\hbar$ play a role in multidimensional spectroscopy? Reduced hierarchy equations of motion approach to molecular vibrations. J. Phys. Chem. A 115, 4009 (2011).https://doi.org/10.1021/jp1095618 * (59) Ikeda, T., Ito, H., Tanimura, Y.: Analysis of 2D THz-Raman spectroscopy using a non-Markovian Brownian oscillator model with nonlinear system-bath interactions. J. Chem. Phys. 142, 212421 (2015).https://doi.org/10.1063/1.4917033 * (60) Ito, H., Tanimura, Y.: Simulating two-dimensional infrared-Raman and Raman spectroscopies for intermolecular and intramolecular modes of liquid water. J. Chem. Phys. 144, 074201 (2016).https://doi.org/10.1063/1.4941842 * (61) Wootters, W.K.: A Wigner-function formulation of finite-state quantum mechanics. Ann. Phys. (N.Y.) 176, 1 (1987). * (62) Iwamoto, Y., Tanimura, Y.: Linear absorption spectrum of a quantum two-dimensional rotator calculated using a rotationally invariant system-bath Hamiltonian. J. Chem. Phys, 149, 084110 (2018).https://doi.org/10.1063/1.5044585 * (63) Iwamoto, Y., Tanimura, Y.: Open quantum dynamics of a three-dimensional rotor calculated using a rotationally invariant system-bath Hamiltonian: Linear and two-dimensional rotational spectra. J. Chem. Phys. 151, 044105 (2019).https://doi.org/10.1063/1.5108609 * (64) Suzuki, Y., Tanimura, Y.: Two-dimensional spectroscopy for a two-dimensional rotator coupled to a Gaussian–Markovian noise bath. J. Chem. Phys. 119, 1650 (2003).https://doi.org/10.1063/1.1578630 * (65) Vourdas, A.: Quantum systems with finite Hilbert space. Rep. Prog. Phys. 67, 267 (2004). https://doi.org/10.1088/0034-4885/67/3/r03 * (66) Pegg, D.T., Barnett, S.M.: Phase properties of the quantized single-mode electromagnetic field. Phys. Rev. A. 39, 1665 (1989). https://doi.org/10.1103/PhysRevA.39.1665 * (67) Galetti, D., de Toledo Piza, A.: An extended Weyl-Wigner transformation for special finite spaces. Physica. A. 149, 267 (1988). https://doi.org/10.1016/0378-4371(88)90219-1 * (68) Luis A. and Perina J.: Discrete Wigner function for finite-dimensional systems. J. Phys. A: Math. Gen. 31 1423 (1998). * (69) Klimov, A.B., Munoz, C.: Discrete Wigner function dynamics. J. Opt. B. 7, S588 (2005). * (70) Carruthers, P., Nieto,M. M.: Phase and angle variables in quantum mechanics. Rev. Mod. Phys. 40, 411 (1968).
arxiv-papers
2021-07-27T01:58:49
2024-09-04T03:07:20.311208
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yuki Iwamoto and Yoshitaka Tanimura", "submitter": "Yoshitaka Tanimura", "url": "https://arxiv.org/abs/2107.12551" }
2107.12552
landscapetable Estimating high-dimensional Markov-switching VARs111I am grateful to Bin Chen and Nese Yildiz for their invaluable advice and encouragement. I thank Neil Ericsson, David Hendry, and seminar participants at the 23rd Dynamic Econometrics conference and the 2021 China Meeting of the Econometric Society for their useful comments and discussion. Any remaining errors are solely mine. $\begin{array}[]{c}\text{{\large Kenwin Maung}}\\\ \text{University of Rochester}\\\ \end{array}$ Abstract: Maximum likelihood estimation of large Markov-switching vector autoregressions (MS-VARs) can be challenging or infeasible due to parameter proliferation. To accommodate situations where dimensionality may be of comparable order to or exceeds the sample size, we adopt a sparse framework and propose two penalized maximum likelihood estimators with either the Lasso or the smoothly clipped absolute deviation (SCAD) penalty. We show that both estimators are estimation consistent, while the SCAD estimator also selects relevant parameters with probability approaching one. A modified EM-algorithm is developed for the case of Gaussian errors and simulations show that the algorithm exhibits desirable finite sample performance. In an application to short-horizon return predictability in the US, we estimate a 15 variable 2-state MS-VAR(1) and obtain the often reported counter-cyclicality in predictability. The variable selection property of our estimators helps to identify predictors that contribute strongly to predictability during economic contractions but are otherwise irrelevant in expansions. Furthermore, out-of- sample analyses indicate that large MS-VARs can significantly outperform ”hard-to-beat” predictors like the historical average. JEL Classifications: C13, C32, C55, G12 Key words: high-dimensional time series, Markov regime-switching, oracle property, SCAD, stock return predictability. ## Model We consider the asymptotic properties of the maximum likelihood estimator (MLE) for high-dimensional Markov-switching (MS) vector autoregressive (VAR) models in a double asymptotic framework where both the sample size and number of parameters are allowed to diverge. Specifically, we study the following: $y_{t}=\sum_{j=1}^{p_{T}}A_{j,T}(S_{t})y_{t-j}+\sum_{j=1}^{q_{T}}B_{j,T}(S_{t})x_{t-j}+\varepsilon_{t},$ (1) where $y_{t}\in\mathbb{R}^{d_{T}}$ is a vector of endogenous time series, $x_{t}\in\mathbb{R}^{d^{*}_{T}}$ allows for the inclusion of exogenous variables, and $\varepsilon_{t}$ is independently and identically distributed with mean zero and positive definite variance-covariance matrix $\Sigma_{T}(S_{t})$. The parameters $A_{j,T}(S_{t})$, $B_{j,T}(S_{t})$, and $\Sigma_{T}(S_{t})$ are respectively $d_{T}\times d_{T}$, $d_{T}\times d_{T}^{*}$, and $d_{T}\times d_{T}$ matrices that depend on an underlying state $\\{S_{t}\\}$, which is modeled as a latent first-order Markov chain on a finite and discrete state space taking values from $\\{1,\ldots,M\\}$ with $M$ known and fixed. The transition probabilities of the chain are given by $P(S_{t}=j|S_{t-1}=i)=p_{i\shortrightarrow j}$, and initial distributions are given by $P(S_{1}=j)=p_{j}$. We define the precision matrix to be the inverse of the variance-covariance matrix, $Q_{T}(S_{t})\equiv\Sigma_{T}(S_{t})^{-1}$. By including the transition matrix and initial probability distributions as estimable parameters, we have a total of $K_{T}\equiv M(p_{T}d_{T}^{2}+q_{T}d_{T}d_{T}^{*}+d_{T}(d_{T}+1)/2)+M^{2}$ parameters. Furthermore, the dimensions of the model, namely $d_{T}$, $d_{T}^{*}$, $p_{T}$, and $q_{T}$, are allowed to increase with the sample size subject to regularity conditions. Nonetheless, it is easy to see that, especially with many regimes, such a set-up could easily lead to a high-dimensional problem where the number of parameters exceed the sample size. To address this, we assume that the model in (1) is sparse. This means that only a small subset of parameters, relative to the sample size, are truly non- zero, while the rest are regarded as irrelevant. Effectively, this means that the ’true’ model with only the relevant parameters is a low-dimension system. A key question is thus whether we are able to asymptotically recover the ’true’ model given the full data without a priori knowledge of the sparsity pattern and the latent states. Low-dimensional MS models, where the number of parameters are small and fixed, are ubiquitous in macroeconometrics and empirical finance. Univariate and multivariate MS models have been used in investigations of the business cycle (e.g. Hamilton, 1989), monetary policy (e.g. Sims and Zha, 2006), exchange rates and currency crisis (e.g. Cerra and Saxena, 2005; Ichiue and Koyama, 2011), forecast combinations (Elliott and Timmermann, 2005), equity returns (e.g. Henkel et al., 2011), and asset allocation (e.g. Ang and Bekaert, 2002; Guidolin and Timmermann, 2007, 2008) among other applications111See the surveys by Hamilton (2016) and Ang and Timmermann (2012) for a more extensive list of theoretical and empirical applications in macroeconomics and finance respectively. Many empirical investigations in macroeconomics and finance are fundamentally questions about high-dimensional endogenous systems. For example, Bianchi et al. (2019) study the stock returns of 83 S&P100 firms, within the framework of Markov-switching Seemingly Unrelated Regressions, to address questions on network centrality and systemic risk. If we consider larger models or when the number of variables are allowed to diverge, the modeling of such systems may lead to parameter proliferation which causes estimation to be computationally infeasible or unstable. On the other hand, forecasting or policy analysis that restricts the system to only a few variables may suffer from significant omitted variable bias (See for e.g. Chan et al., 2020; Koop and Korobilis, 2013; Bańbura et al., 2010). There are at least four traditional responses to this problem: (i) using aggregated data to conserve on degrees of freedom (e.g. stock indices instead of individual prices); (ii) limiting the number of endogenous variables either in an ad-hoc fashion or by invoking economic theory; (iii) factor-augmented approaches introduced by Bernanke et al. (2005) and related work on factor analysis by Stock and Watson (2002) and Bai and Ng (2008), and (iv) Bayesian estimation when the number of parameters is relatively large but still smaller than the sample size to obtain more stable parameter estimates. Note that (i) and (ii) are compromises and might entail a change in research question, while (iii) does indeed work with high-dimensional data and can be extended to the regime-switching setting as in Liu and Chen (2016). More recently, Callot and Kock (2015) introduced an alternative to factor models in estimating stationary high-dimensional VAR(p) models by means of shrinkage. The authors showed that penalization via the (adaptive) least absolute shrinkage and selection operator (Lasso) allows one to asymptotically recover the sparsity patterns in the coefficient matrices (here, $A_{j,T}$). Han et al. (2015) show similar theoretical results under milder conditions but with the number of lags fixed at 1, while Zhu (2020) provide similar results for the smoothly clipped absolute deviation (SCAD) penalty. The model in (1) can be viewed as a generalization of Callot and Kock (2015) by introducing dependency of the multivariate process and its sparsity pattern on a latent state, while allowing for exogenous covariates. We propose two shrinkage type estimators for high-dimensional MS-VARs using either the Lasso or the SCAD penalty, which is a folded concave penalty222See Fan et al. (2014) for a characterization.. We include SCAD penalization in our investigation because it requires only mild conditions for model selection consistency as opposed to the Lasso333The Lasso requires a strong irrepresentability condition (Zhao and Yu, 2006), which may not hold in some empirical settings.. More practically, folded concave penalties have been documented to yield better finite sample performance in empirical applications. The extension for MS is notably non-trivial as it classically requires some form of MLE, which is not only computationally more intensive compared to the equation-by-equation Lasso framework in Callot and Kock (2015), but also theoretically more challenging. Furthermore, the inclusion of folded concave penalties to a optimization problem generally introduces multiple local optima. Existing asymptotic results on high-dimensional penalized MLE, for example Kwon and Kim (2012) for the SCAD penalty, establish oracle properties for a theoretic local optimum444The oracle property is satisfied when the penalized MLE is asymptotically equivalent to the estimator obtained from maximizing the likelihood with irrelevant parameters and penalty terms excluded.. However, there is no guarantee that a computed solution to our penalized likelihood function is indeed the desired local optimum. For that to be true unequivocally, we require at least an assumption of strict concavity which is only possible when the number of parameters is smaller than the sample size (see theorem 3 of Kim et al. (2008) or theorem 2 of Kwon and Kim (2012)), and hence is not directly applicable here. To deal with this without deviating from our high-dimensional setting, we adopt a similar estimation strategy as in Fan et al. (2014), which relies on the local linear approximation (LLA) algorithm for the folded concave penalties introduced by Zou and Li (2008). This approach does not attempt to find the desired local optimum, but instead seeks a lower probability bound to the claim that the computed solution is indeed the desired optimum. As the SCAD penalty requires an initial estimator, theorem 1 of Fan et al. (2014) claims that if we can find an initial estimate that is asymptotically close to the true parameter vector, in a sense to be made clear in fsconst, then the LLA algorithm delivers the oracle estimator in a single step with probability approaching one. Borrowing from their terminology, we will call such an initial estimator ”localizable”. However, given that the likelihood function of MS models tend to be general and potentially multimodal, we discipline our investigation by requiring the likelihood surface at the true parameter to be locally concave and the oracle solution to be unique. Such a restriction is nonetheless considerably weaker than the strict concavity condition required in Kim et al. (2008) or Kwon and Kim (2012). Taken together, this suggests a two-stage approach for the SCAD estimator, similar to that in Li et al. (2015) and Chen and Maung (2020), with the search of a localizable initial estimator in the first stage, and the SCAD-penalized MLE subsequently. Our results open up the possibility of studying Markov regime-switching dynamics in high-dimensional macroeconomic and financial systems. To illustrate, we extend the investigation on short-horizon stock return predictability considered in Henkel et al. (2011) to incorporate 14 aggregate return predictors from Goyal and Welch (2008), up from the original 4, which mitigates potential omitted variable bias. This results in a relatively high- dimensional system with 711 estimable parameters. Penalized maximum likelihood estimation with the SCAD penalty yields the often reported counter-cyclicality in return predictability. Furthermore, the variable selection property of our estimators helps to identify predictors that contribute strongly to predictability during economic contractions but are otherwise irrelevant in expansions. The rest of this paper is organized as follows. Section 2 describes the penalized maximum likelihood problems while Section 3 provides an EM algorithm for the special case of Gaussian errors. Section 4 contains the key asymptotic results. Section 5 consider Monte Carlo experiments to assess the finite sample properties of the proposed estimators, while section 6 applies it to the problem of short-horizon return predictability. Finally, section 7 concludes. All proofs are collected in the appendix. ## Problem formulation In this section, we describe the maximum likelihood problem in a manner amenable to the derivation of theoretical results. This construction is however, not convenient for computation, which will be accomplished in section 3. There, we will rely on the Expectation-Maximization (EM) algorithm. ### Notation and sparsity Before proceeding, we define some notation. For this section and the next, we suppress the dependence of the parameters on the sample size for notational convenience. To begin, set $\phi\equiv(\theta_{A}^{\top},\theta_{B}^{\top},Q^{ND\top},Q^{D\top},\pi^{\top})^{\top}$ to include all parameters across all states. Let $A(s)=[A_{1}(s),\ldots,A_{p_{T}}(s)]$, and $A=[A(1),\ldots,A(M)]$, then $\theta_{A}=vech(A)$, which is a $Mp_{T}d_{T}^{2}\times 1$ vector. $\theta_{B}$ is a $Mq_{T}d_{T}d_{T}^{*}\times 1$ vector that is defined analogously. Recall that the precision matrix is given as $Q(s)=\Sigma(s)^{-1}$. Let $Q^{ND}$ be the vector containing unique off- diagonal elements of the precision matrix across all states i.e. $Q^{ND}=(q_{21}(1),q_{31}(1),\ldots,q_{d_{T}1}(1),q_{23}(1),\ldots,q_{d_{T}(d_{T}-1)}(1),q_{21}(2),\ldots,q_{d_{T}(d_{T}-1)}(M))^{\top}$, and $Q^{D}$ includes the diagonal elements: $Q^{D}=(q_{11}(1),\ldots,q_{d_{T}d_{T}}(1),\ldots,q_{d_{T}d_{T}}(M))^{\top}$. $Q=(Q^{ND\top},Q^{D\top})^{\top}$ is $Md_{T}(d_{T}+1)/2\times 1$. Finally, $\pi=(p_{1\shortrightarrow 1},p_{1\shortrightarrow 2},\ldots,p_{1\shortrightarrow M},\ldots,p_{M\shortrightarrow M},p_{1},\ldots,p_{M})^{\top}$ is a vector of transition probabilities and initial distributions. Written this way, it is clear that our characterization of sparsity is equivalent to saying that the vectors $\theta_{A}$ , $\theta_{B}$, and $Q^{ND}$ are sparse. Formally, we assume that only $h^{A}$, $h^{B}$, and $h^{Qnd}$ elements of $\theta_{A}$, $\theta_{B}$, and $Q^{ND}$ respectively, are non-zero and that $h^{A}+h^{B}+h^{Qnd}\ll T$. Sparsity cannot be imposed on $Q^{D}$ to maintain positive definiteness. ### Two estimators of a high-dimensional MS-VAR To begin, let $\mathcal{I}^{t-1}_{t-v}=(y_{t-v},\ldots,y_{t-1},x_{t-v},\ldots,x_{t-1})$ be the information set from time $t-v$ to $t-1$ for some integer $v$, $\Phi_{s}=(A(s),B(s),Q(s))$ be the state-specific VAR parameters, and define $\mathcal{Y}_{T}=(y_{1},\ldots,y_{T})$ and analogously for $\mathcal{X}_{T}$. Without loss of generality, assume that $p_{T}=\max\\{p_{T},q_{T}\\}$ is the largest lag, and thus we can denote the conditional density of $y_{t}$ from (1) as $g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}})$. Then, it can be shown that the (non-penalized) conditional likelihood is given as $\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)=\sum_{S_{p_{T}+1}=1}^{M}\ldots\sum_{S_{T}=1}^{M}p_{S_{p_{T}+1}}(\phi)\prod_{t=p_{T}+2}^{T}p_{(S_{t-1})\shortrightarrow(S_{t})}(\phi)\prod_{t=p_{T}+1}^{T}g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}}).$ (2) Here we emphasize that $p_{i\shortrightarrow j}$ and the initial distributions $p_{j}$ are functions of the parameter vector $\phi$. As prefaced earlier, direct optimization of (2) is challenging because the transition probabilities $p_{i\shortrightarrow j}$ are highly non-linear functions of the parameters. To deal with this issue, we will rely on a modified EM algorithm in section 3. #### Lasso & gLasso We propose solving the following optimization problem with Lasso penalty for VAR coefficients and graphical Lasso (gLasso) penalty for the precision matrix (Friedman et al., 2008) to induce sparsity, $\max_{\phi}\ T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)-\sum_{s=1}^{M}\bigg{\\{}\lambda^{Lasso}\bigg{(}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}|b_{mn}(s)|\bigg{)}+\lambda^{gLasso}\sum_{m\neq n}|q_{mn}(s)|\bigg{\\}}$ (3) where $a_{mn}(s)$ refers to the element in the $m^{th}$ row and $n^{th}$ column of $A(s)$, and analogously for $b_{mn}(s)$ and $q_{mn}(s)$ for $B(s)$ and $Q(s)$ respectively. $\lambda^{Lasso}$ and $\lambda^{gLasso}$ are penalty terms. Note that only the non-diagonal elements are penalized in the sparse precision matrix estimation. It is possible to set $\lambda^{Lasso}$ to be different for parameters in $A(s)$, and $B(s)$ as long as the penalties are proportional to one another, however, doing so may introduce significant computational costs when tuning the penalty terms. Nonetheless, we call the solution to (3) the Lasso estimator. #### SCAD To use the LLA (Zou and Li, 2008) for the SCAD problem, we require a localizable initial estimate, $\tilde{\phi}$. As we show later in section 4, the Lasso estimate above satisfies this property. Hence, we re-optimize the log-likelihood with the Lasso estimate as $\tilde{\phi}$ with the LLA for the SCAD penalty. This utilizes the first derivative of the penalty which is defined as $p_{\lambda}^{{}^{\prime}}(x)=\lambda\bigg{[}1(x\leq\lambda)+\frac{(a\lambda-x)_{+}}{(a-1)\lambda}1(x>\lambda)\bigg{]},$ (4) where $(m)_{+}=m$ if $m>0$ and $0$ otherwise, $\lambda$ is a penalty parameter, and $a>2$ is a constant. Here, we set $a=3.7$ as suggested in Fan and Li (2001). The optimization problem is given by $\displaystyle\max_{\phi}\ T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)-\sum_{s=1}^{M}\bigg{\\{}\sum_{m=1}^{d_{T}}$ $\displaystyle\sum_{n=1}^{d_{T}p_{T}}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{mn}(s)|)|a_{mn}(s)|+$ $\displaystyle\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{mn}(s)|)|b_{mn}(s)|+\sum_{m\neq n}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{mn}(s)|)|q_{mn}(s)|\bigg{\\}}$ (5) where $\lambda$ and $\lambda^{*}$ are penalty terms, and parameters with tilde are from the initial estimate $\tilde{\phi}$. A key theoretical advantage of using the SCAD penalty instead of simply stopping once we have obtained the Lasso estimate, is that we can, under relatively mild conditions, attain selection consistency, or in other words, asymptotically recover the true sparse support of the parameters. On the other hand, penalization with Lasso requires strong irrepresentability conditions (Zhao and Yu, 2006). However, if prediction is the main goal of estimation, then both Lasso and SCAD are applicable. ## EM algorithm for Gaussian errors In this section, we propose an EM algorithm to solve (3) and (2.2.2) similar to that of Ailliot and Monbet (2017). For concreteness and parsimony, we focus only on the scenario where $\varepsilon_{t}\sim^{i.i.d}N(0,\Sigma(S_{t}))$ in this section, which implies that the conditional density $g(y|\cdot)$ is Gaussian. Not only is this assumption standard in the VAR literature, it also induces a closed form problem which simplifies the estimation of the VAR parameters. The EM algorithm was proposed to estimate models with incomplete or hidden data. Baum et al. (1970) applied the algorithm to estimate hidden Markov models, which is a general class that encompasses many MS models in econometrics. Intuitively, the algorithm works not by directly optimizing the likelihood function in (2), which as mentioned earlier is a highly non-linear function of the parameters, but instead optimizes a constructed auxiliary function (label it $\Omega(\cdot)$) to derive a monotonically increasing lower bound on the value of the original likelihood. Formally, the algorithm works iteratively with two steps per iteration: expectation (E) and maximization (M). With each iteration applied to $\Omega(\cdot)$, we obtain updates on the parameters. The corresponding likelihood $\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)$ is guaranteed to be non-decreasing with each update and eventually finds a stationary point555This can mean a local or global maximum, or a saddle point. in the likelihood surface (Dempster et al., 1977). Although the statistical guarantees on the EM algorithm have been developed for the low-dimensional context, it is not difficult to show that Theorem 1 of Dempster et al. (1977) (monotonicity of the algorithm) will still hold with penalization. Since both estimators in section 2 entail a maximization problem, we can apply the EM algorithm to optimize either (3) or (2.2.2). The E-step for both problems will be similar, while the M-step is different because of differences in penalization. To begin, we define the auxiliary function in the E-step. E-step. We consider the complete-data log-likelihood given as $\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)$ where $\mathcal{S}_{T}=(S_{1},\ldots,S_{T})$. Note that the incomplete-data likelihood in (2) can be written as $\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi)=\int\exp(\ell(\mathcal{S}_{T},\mathcal{Y}_{T}|\mathcal{X}_{T};\phi))d\mathcal{S}_{T},$ and thus $\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)=\log\bigg{[}p_{S_{p_{T}+1}}(\phi)\prod_{t=p_{T}+2}^{T}p_{(S_{t-1})\shortrightarrow(S_{t})}(\phi)\prod_{t=p_{T}+1}^{T}g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{S_{t}})\bigg{]}.$ The log-likelihood is called ’complete’ because it treats the latent state as observable data. However, since we do not actually observe it, we consider its conditional expectation, $E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)\\\ |\mathcal{I}_{T},\phi^{(j-1)}]$, where $\phi^{(j-1)}$ is the estimate from the previous $(j-1)^{th}$ EM iteration and is treated as pre-determined during the current iteration. Since we have additive penalties, we can construct the auxiliary function as $\Omega^{\mathrm{N}}(\phi,\phi^{(j-1)})\equiv E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)|\mathcal{I}_{T},\phi^{(j-1)}]-\text{pen}(\mathrm{N})$ (6) where pen(N) for N $\in\\{\text{Lasso, SCAD}\\}$ refers to either group of penalties. Ignoring penalties for now, we have $\displaystyle E[\ell(\mathcal{S}_{T},\mathcal{Y}_{T};\mathcal{X}_{T},\phi)$ $\displaystyle|\mathcal{I}_{T},\phi^{(j-1)}]=\sum_{s=1}^{M}\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})\log g(y_{t}|\mathcal{I}^{t-1}_{t-p_{T}};\Phi_{s})$ $\displaystyle+\sum_{s,s^{{}^{\prime}}=1}^{M}\sum_{t=p_{T}+2}^{T}P(S_{t}=s^{{}^{\prime}},S_{t-1}=s|\mathcal{I}_{T},\phi^{(j-1)})\log P(S_{t}=s^{{}^{\prime}}|S_{t-1}=s,\mathcal{I}^{t-1}_{t-p_{T}};\pi)$ $\displaystyle+\sum_{s=1}^{M}P(S_{P_{T}+1}=s|\mathcal{I}_{t-p_{T}}^{t-1};\pi)$ $\displaystyle\equiv\sum_{s=1}^{M}Z_{1}(s;\Phi_{s})+\sum_{s,s^{{}^{\prime}}=1}^{M}Z_{2}(s,s^{{}^{\prime}};\pi)+\sum_{s=1}^{M}Z_{3}(s;\pi).$ By construction, pen(N) would be relevant to the optimization of VAR parameters in $Z_{1}(s)$. On the other hand, $Z_{2}(s,s^{{}^{\prime}})$ and $Z_{3}(s)$ are only a function of $\pi$ and thus can be maximized by standard optimization procedures as this is a low-dimensional problem. Since we have Gaussianity of $g(y_{t}|\cdot)$, we can show that $\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}Z_{1}(s;\Phi_{s})=\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}\log|Q(s)|-\operatorname{Tr}{(\hat{S}(s)Q(s))},$ (7) where $\hat{S}(s)=\frac{\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})\times\omega_{t}\omega_{t}^{\top}}{\sum_{t=p_{T}+1}^{T}P(S_{t}=s|\mathcal{I}_{T};\phi^{(j-1)})},$ and $\omega_{t}=y_{t}-\sum_{j=1}^{p_{T}}A_{j}(S_{t})y_{t-j}-\sum_{j=1}^{q_{T}}B_{j}(S_{t})x_{t-j}.$ Note that $Z_{2}(s,s^{{}^{\prime}};\pi)$ contains the smoothed probabilities $P(S_{t}=s^{{}^{\prime}}|S_{t-1}=s,\mathcal{I}_{T},\phi^{(j-1)})$, which can be computed via an iterative backward-forward recursion (see for e.g. Hamilton (1990)). M-step. Here, we maximize the auxiliary function in (6) with respect to $\phi$. Suppose we are executing the EM algorithm for the N estimator (i.e. either (3) or (2.2.2)). Then, for all states $s$, we solve $\operatorname*{arg\,max}_{(A(s),B(s),Q(s))}\log|Q(s)|-\operatorname{Tr}{(\hat{S}(s)Q(s))}-\text{pen(N},s\text{)},$ (8) $\operatorname*{arg\,max}_{\pi}Z_{2}(s,s^{{}^{\prime}};\pi)\text{ and }\operatorname*{arg\,max}_{\pi}Z_{3}(s;\pi),$ (9) where pen(N,$s$) refers to the $s^{th}$ state penalties for the N estimator. For computational efficiency, it might be convenient to further separate (8) into two parts. To illustrate, consider a M-step for the Lasso. Firstly, fix the coefficient values $A(s)$ and $B(s)$, and estimate $\operatorname*{arg\,max}_{Q(s)}\log|Q(s)|-\operatorname{Tr}(\hat{S}(s)Q(s))-\lambda^{gLasso}\sum_{m\neq n}|q_{mn}(s)|.$ Next, given an estimate of $Q(s)$, we optimize $\operatorname*{arg\,max}_{A(s),B(s)}-\operatorname{Tr}(\hat{S}(s)Q(s))-\lambda^{Lasso}\bigg{(}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}|b_{mn}(s)|\bigg{)}.$ This sequential partitioning helps with computation because we can now individually apply fast (block) coordinate descent algorithms (Friedman et al., 2007, 2008) to each part of the problem. Note that these algorithms will also work with the SCAD penalty as defined in (2.2.2). The M-step provides an update of the parameters $\phi^{(j)}$. It can be shown that repeated updating of $\phi^{(j)}$ will lead the respective original likelihoods in (3) or (2.2.2) to either increase or remain constant in value, but not decrease. Hence, the maximizer can be found subject to some termination condition on the implied increments of the original penalized likelihood. To implement the algorithm, we require an initial vector of parameters $\phi^{(0)}$. We recommend using reasonable randomly generated values for the Lasso problem, and subsequently the computed Lasso optimum as $\phi^{(0)}$ for the SCAD problem. ### Selecting tuning parameters Similar to Callot and Kock (2015), we propose selecting $\lambda^{Lasso}$ and $\lambda^{gLasso}$ for the Lasso estimator, and $\lambda$ and $\lambda^{*}$ for the SCAD estimator, using a modified version of the Bayes Information Criterion (BIC). Specifically, for either Lasso or SCAD, choose $\lambda_{1}$ and $\lambda_{2}$ to minimize $BIC(\lambda_{1},\lambda_{2})=\log(\text{pooled}_{SSR})+C_{T}(l\log(T)/T)$ where $\text{pooled}_{SSR}=\left|\sum_{t={p_{T}+1}}^{T}\sum_{m=1}^{M}\hat{P}(S_{t}=m|\mathcal{I}_{T};\hat{\phi})\left(y_{t}-\sum_{j=1}^{p_{T}}\hat{A}_{j,T}(m)y_{t-j}+\sum_{j=1}^{q_{T}}\hat{B}_{j,T}(m)x_{t-j}\right)\right|,$ and parameters with ’hats’ indicate estimates. Following Wang et al. (2009), $C_{T}$ is set at $\log K_{T}$, where we recall that $K_{T}$ is the total number of parameters in the system, to help obtain consistency of the BIC in high-dimensional regressions, while $l$ is the number of estimates that are identified as non-zero in the system. Simulation results in section 5 indicate that tuning parameter selection with BIC can yield consistent estimates. ## Asymptotic theory We establish theoretical properties for each estimator in a double asymptotic framework, where we allow the sample size $T\rightarrow\infty$ and the dimensions of the candidate models $p_{T},q_{T},d_{T},$ and $d_{T}^{*}$ to diverge at appropriate rates. By extension, it is natural to allow the dimensions of the true non-zero parameters $h^{A}_{T}$, $h^{B}_{T}$, and $h^{Qnd}_{T}$ to grow albeit subject to stricter restrictions. Consequently, the dimension of the true parameter vector, $\phi_{T}$, may extend to infinity. Traditionally, theoretical results on consistency in MS models with finite state spaces rely on limit theorems from random matrix theory to attain some generalized form of the Kullback-Leibler divergence (for e.g. Leroux, 1992; Francq and Roussignol, 1998), whereby consistency follows from an identification condition. This strategy is challenging in the high-dimensional context because of the dependence of $\phi_{T}$ on the sample size. Instead, we adopt a modified approach to Fan and Peng (2004) to establish consistency and oracle properties under a diverging parameter framework. Recall that $K_{T}$ is the total number of VAR and transition matrix parameters from (1). Let $\phi^{*}_{T}\in\Theta_{T}$ be a vector of true (sparse) parameters where $\Theta_{T}\subset\mathbb{R}^{K_{T}}$ is an open subset. In addition, let $K^{Sp}_{T}=h_{T}^{A}+h_{T}^{B}+h_{T}^{Qnd}$ be the number of non-zero parameters out of those that are subject to penalization (i.e. the VAR parameters), and let $K_{T}^{*}=K^{Sp}_{T}+Md_{T}+M^{2}$ be the total number of non-zero parameters in the true parameter vector where $M^{2}$ and $Md_{T}$ are from the transition matrix and the diagonals of variance- covariance matrices respectively. Without loss of generality, we assume that $\phi^{*}_{T}$ can be re-arranged in the following form $\phi_{T}^{*}=(\underbrace{\phi_{1}^{*},\ldots,\phi_{K_{T}^{Sp}}^{*}}_{\begin{subarray}{c}K_{T}^{Sp}\text{ non-zero}\\\ \text{VAR parameters}\end{subarray}},\underbrace{0,\ldots,0}_{\begin{subarray}{c}\text{irrelevant}\\\ \text{VAR parameters}\end{subarray}},\underbrace{q_{11}^{*}(1),\ldots,q_{d_{T}d_{T}}^{*}(M)}_{\begin{subarray}{c}Md_{T}\text{ parameters from}\\\ \text{diagonals of precision matrices}\end{subarray}},\underbrace{p_{1\shortrightarrow 1}^{*},\ldots,p_{M\shortrightarrow M}^{*}}_{\text{transition probabilities}})^{\top}.$ (10) ### Regularity conditions We impose the following regularity conditions for deriving our asymptotic results. Let $\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi_{T})=\mathcal{L}_{T}(\phi_{T})$. In addition, $\nabla^{k}$ represents the $k^{th}$ derivative with respect to $\phi_{T}$, and $\nabla^{k}_{j_{1},\ldots,j_{k}}$ represent the $k^{th}$ derivative with respect to the $j_{1},\ldots,j_{k}^{th}$ element in $\phi_{T}$. * (A1) For all $\phi_{T}\in\Theta_{T}$, $\\{(y_{t},x_{t})\\}_{t=0}^{\infty}$ is a stationary and ergodic process. The Markov chain $\\{S_{t}\\}$ is irreducible and aperiodic. * (A2) For all $i,j$, the functions $p_{j}(\cdot)$ and $p_{i\shortrightarrow j}(\cdot)$ are twice continuously differentiable over $\Theta_{T}$. Furthermore, given $I_{t-1}$ and $S_{t}$, $g(y_{t}|\mathcal{I}^{t-1}_{t-v};\Phi_{S_{t},T})$ is a probability density function with two continuous derivatives over $\Theta_{T}$ for any integer $v\leq t$. * (A3) For all $S_{t}$, $j,k,l$, we have: (i) $E[\sup_{\phi_{T}\in\Theta_{T}}|\nabla^{1}_{j}\log g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$ and $E[\sup_{\phi_{T}\in\Theta_{T}}|\nabla^{2}_{j,k}\log g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$; (ii) $E[\sup_{\phi_{T}\in\tilde{\Theta}_{T}}|\nabla^{3}_{j,k,l}\log g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{S_{t}})|^{2}]<\infty$, where $\tilde{\Theta}_{T}$ is defined in (A5) and (A6)(i). * (A4) Let $\rho(y_{t})=\sup_{\phi_{T}\in\Theta_{T}}\max_{s,s^{{}^{\prime}}\in\\{1,\ldots,M\\}}\frac{g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{s})}{g(y_{t}|\mathcal{I}_{t-v}^{t-1};\Phi_{s^{{}^{\prime}}})}$, and assume that $P(\rho(y_{t})=\infty|\mathcal{I}_{t-v}^{t-1},S_{t}=s)<1$ for all $s\in\\{1\ldots,M\\}$. * (A5) (i) Assume that there exists an open subset $\tilde{\Theta}_{T}\subset\Theta_{T}$ such that $\tilde{\phi}_{T},\phi_{T}^{*}\in\tilde{\Theta}_{T}$, and $\log\mathcal{L}_{T}(\phi_{T})$ is locally concave over $\tilde{\Theta}_{T}$. (ii) Let $\boldsymbol{u}_{1},\boldsymbol{u}_{2},\boldsymbol{u}_{3},\boldsymbol{v}_{1}$, and $\boldsymbol{v}_{2}$ be vectors that share the same dimensions as $\theta_{A},\theta_{B},Q^{ND},Q^{D}$ and $\pi$ respectively. Fix a scalar constant $W$ that can be sufficiently large, and define the set $\Omega(W)=\\{\boldsymbol{u}=(\boldsymbol{u}_{1}^{\top},\boldsymbol{u}_{2}^{\top},\boldsymbol{u}_{3}^{\top},\boldsymbol{v}_{1}^{\top},\boldsymbol{v}_{2}^{\top})^{\top}|\ \|\boldsymbol{u}\|=W;\ \|u_{1}\|_{1}+\|u_{2}\|_{1}+\|u_{3}\|_{1}\leq C[\sum_{i\in S(h_{T}^{A})}|u_{1i}|+\sum_{i\in S(h_{T}^{B})}|u_{2i}|+\sum_{i\in S(h_{T}^{Qnd})}|u_{3i}|]\\}$, where $\|\cdot\|_{1}$ refers to the sum of absolute values of vector elements, and $C>1$ is some constant. Let $\gamma_{T}$ be some scalar function that depends on $T$, then define the ball $\tilde{\Theta}_{T,\gamma,W}=\\{(\phi_{T}^{*}+\gamma_{T}\boldsymbol{u})|\boldsymbol{u}\in\Omega(W)\\}$. Assume that $\tilde{\Theta}_{T,\gamma,W}\subseteq\tilde{\Theta}_{T}$. * (A6) (i) $\log\mathcal{L}_{T}(\phi_{T})$ admits a third derivative over $\tilde{\Theta}_{T}$ which includes $\phi^{*}_{T}$; (ii) There exists an open set $\tilde{\Theta}^{*}_{T}\subseteq\tilde{\Theta}_{T}$ and $\phi^{*}_{T}\in\tilde{\Theta}^{*}_{T}$ for which $\nabla^{2}\log\mathcal{L}_{T}(\phi_{T})$ is concave. * (A7) (i) Let the information matrix be $I_{T}(\phi_{T}^{*})=E[(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))^{\top}]$, and let $I_{T}^{(\neg 0)}(\phi_{T}^{*})$ refer to the non-zero submatrix constructed from $I_{T}(\phi_{T}^{*})$. Assume that $I_{T}^{(\neg 0)}(\phi_{T}^{*})$ is positive definite. (ii) In addition, assume that $0<\rho_{1}\leq\inf_{\omega\in\Omega(W)}\omega^{\top}(-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))\omega\leq\sup_{\omega\in\Omega(W)}\omega^{\top}(-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))\omega\leq\rho_{2}<\infty,$ with probability approaching one. * (A8) (i) $K_{T}^{*}=o(T^{1/4})$; (ii) The Lasso penalty terms satisfy $\lambda^{Lasso}\propto\lambda^{gLasso}$, where $\lambda^{Lasso}\rightarrow 0$ satisfies $(\sqrt{T}\lambda^{Lasso})^{-1}\rightarrow 0$. (iii) The SCAD penalty terms satisfy $\lambda\propto\lambda^{*}$, where $\lambda\rightarrow 0$, and $[\sqrt{K_{T}^{*}}\lambda^{Lasso}]\lambda^{-1}\rightarrow 0$. Furthermore, $\frac{K_{T}}{T\lambda^{2}}\rightarrow 0$, where recall that $K_{T}$ is the number of candidate parameters. * (A9) Assume $\min_{1\leq j\leq K_{T}^{Sp}}|\phi_{i}^{*}|>\lambda$ such that $\min_{1\leq j\leq K_{T}^{Sp}}|\phi_{i}^{*}|/\lambda\rightarrow\infty$, where $\phi_{i}^{*}$ are true non-zero parameters as described in (10). Remarks. (A1)-(A4) are standard assumptions in the MS literature on asymptotic normality (see Bickel et al., 1998). The assumption of local concavity in (A5) is much weaker than that of strict concavity commonly assumed in high- dimensional regularized MLE problems. We need the likelihood to be (locally) concave between the localizable initial estimator and the true parameter to apply theorem 1 of Fan et al. (2014) so that the SCAD estimation initialized with Lasso estimates delivers the oracle result. The assumption of a locally concave neighborhood is not uncommon in the theoretical literature on high- dimensional problems. For example, in the context of a two-step estimation procedure for high-dimensional sparse principal components analysis, Janková and van de Geer (2018) assumes that a rough initial estimate can be found in a locally convex neighborhood of the population parameter. (A6)(i) is commonly assumed in the SCAD literature and helps us to establish selection consistency, while (A6)(ii) is essentially identical to assumption 2(ii) in Li et al. (2015). (A7)(ii) is a modification of the restricted eigenvalue condition in Bickel et al. (2009), and this particular formulation follows assumption 2(iii) in Li et al. (2015). (A8) restricts the number of true parameters $K_{T}^{*}$ to only increase at a rate slower than $T^{1/4}$. Furthermore, $\lambda^{lasso}\rightarrow 0$ but converges slower than $1/\sqrt{T}$, and $\lambda\rightarrow 0$ but slower than $\sqrt{K_{T}^{*}}\lambda^{lasso}$. (A9) is a standard assumption on the minimum signal strength of relevant parameters. This condition is required for proving the oracle property of the SCAD estimator and mirrors the characterization in Zhu (2020). ### Asymptotic results Our first result states that the Lasso estimator is consistent. Let $\|\cdot\|$ denote the $\ell_{2}$ norm. ###### Proposition 1. fsconst Under the conditions of (A1)-(A8), the Lasso estimate $\tilde{\phi}_{T}$ satisfies $\|\tilde{\phi}_{T}-\phi_{T}^{*}\|=O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=o_{p}(1).$ (11) We obtain the final equality because of (A8). This means that the Lasso estimator exhibits estimation consistency, although we do not guarantee that it is able to asymptotically identify the relevant parameters. Next, define $\hat{S}=\\{j:|\hat{\phi}_{T,j}|>0\\}$ where $\hat{\phi}_{T,j}$ is the $j^{th}$ element in $\hat{\phi}_{T}$. Hence, $\hat{S}$ is the index set of estimated non-zero parameters from the SCAD procedure. Define $S_{0}$ for $\phi_{T}^{*}$ in an analogous manner (i.e. the index set of truly relevant population parameters). The following result shows that the SCAD estimator, initialized by the Lasso estimates, achieves not just estimation consistency, but also selection consistency. ###### Theorem 1. consistency Let $\hat{\phi}_{T}$ be the MLE to the SCAD problem in (2.2.2) initialized with Lasso estimates. Under the conditions of (A1)-(A9), we have that * (1) $\|\hat{\phi}_{T}-\phi_{T}^{*}\|=O_{p}(\sqrt{K_{T}^{*}/T})=o_{p}(1)$, * (2) $P(\hat{S}=S_{0})\rightarrow 1$. Part (1) of consistency states that the SCAD estimator is consistent since $\sqrt{K_{T}^{*}/T}\rightarrow 0$ by (A8). The second part claims that the sparsity property holds. In other words, we are able to exactly distinguish the parameters that are truly non-zero from those that are irrelevant in the theoretical limit. Note that these results hold even if the dimensions of the parameter vectors diverge. Next, we discuss the asymptotic normality of the SCAD estimator. To do so, define $\hat{\phi_{T}}^{(\neg 0)}$ to be the estimate $\hat{\phi}_{T}$ with the zeroes removed, and similarly for $\phi_{T}^{*(\neg 0)}$. ###### Theorem 2. norm Assume that conditions (A1)-(A9) are satisfied. Then, $\sqrt{T}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{1/2}(\hat{\phi_{T}}^{(\neg 0)}-\phi_{T}^{*(\neg 0)})\rightarrow^{d}\mathcal{N}(0,G),$ (12) where $G_{T}$ is a conformable matrix such that $G_{T}G_{T}^{\top}\rightarrow G$ for positive definite $G$, and $I_{T}^{(\neg 0)}$ is defined in (A7). We remark that the pre-multiplication of $G_{T}$ helps with the exposition since $\phi_{T}^{*}$ can be diverging in dimension. norm implies that it is asymptotically justifiable to apply the same statistical inference for the estimate obtained from maximizing the problem with a priori knowledge on the sparsity pattern, to the SCAD-penalized solution $\hat{\phi}_{T}$. Here, we note that this convergence in distribution is a pointwise result, and is not guaranteed to hold uniformly with respect to the parameter vector (Leeb and Pötscher, 2005). Uniform inference for model selection in multivariate time series is however still a nascent area of research (Masini et al., 2020) and is beyond the scope of this paper. ## Monte Carlo Simulation This section studies the finite sample properties of the proposed EM algorithm in estimating large MS-VARs using both Lasso and SCAD penalization schemes666For SCAD, we initialize the algorithm with Lasso estimates as described earlier.. The number of endogenous variables considered are $d=10$ and $16$. We consider three experiments777The numerical experiments here are similar to those considered in Callot and Kock (2015). with 2 states ($M=2$) throughout: * • Experiment 1: The data generating process (DGP) is a MS-VAR(1) with the following coefficient matrices. In state 1, $A_{1}(1)=diag(0.8,\ldots,0.8)$, and $A_{1}(2)=-A_{1}(1)$ for state 2. Effectively, within each state, we have a stationary AR(1) process, as the lagged terms of other variables do not appear in the DGP for a given variable. * • Experiment 2: $A_{1}(1)$ is a block diagonal matrix with upper-left and lower- right non-zero blocks. Each block has dimension $d/2\times d/2$, and is a tridiagonal matrix with $0.5$ on the diagonal, while the sub- and superdiagonal are set at $-0.45$. All other elements in $A_{1}(1)$ are 0, while $A_{1}(2)=-A_{1}(1)$. The variance-covariance matrices are also non- sparse: $\Sigma(1)_{ij}=0.7^{|i-j|}$ and $\Sigma(2)_{ij}=0.4^{|i-j|}$. * • Experiment 3: The DGP is a MS-VAR(2). $A_{1}(1)$ and $A_{1}(2)$ are the same from the second experiment, while $A_{2}(1)_{ij}=(A_{1}(1)_{ij})^{2}$ and $A_{2}(2)=-A_{2}(1)$. We set $\Sigma(1)=diag(0.8,\ldots,0.8)$ and $\Sigma(2)=diag(0.4,\ldots,0.4)$. Such a process might be of interest in macroeconomics where the influence of variables in the past is usually weaker than that of recent lags. In all experiments, we exclude an intercept and set the transition probabilities to be $p_{1\rightarrow 1}=p_{2\rightarrow 2}=0.8$. 500 iterations are generated for sample sizes $T=100,200,$ and $300$. To evaluate our procedures, we consider the following metrics. The first three metrics are concerned with selection consistency. True model included looks at the share of iterations in which the estimate includes the true model for both states (i.e. truly non-zero coefficients are estimated as non-zero). Selected variables is the number of non-zero parameters estimated by the system. As it may be the case that the estimation sets a truly non-zero coefficient to zero, it is informative to study the share of truly non-zero parameters that are identified correctly as non-zero by the algorithm. Subsequently, we consider estimation consistency as measured by the root mean squared error (RMSE) of the parameters. This is given by $\sqrt{\frac{1}{200}\sum_{i=1}^{200}\|\hat{\phi}_{T}(i)-\phi_{T}^{*}\|}$ where $\hat{\phi}_{T}(i)$ is the estimated parameter vector for iteration $i$ containing all parameters in the system. $RMSE_{VAR},RMSE_{COV},$ and $RMSE_{p}$ are similarly defined RMSE measures for estimated VAR coefficients, variance-covariance parameters, and transition probabilities respectively. Table 1: Results of 500 simulations for experiments 1, 2 and 3 as described in the text. | Lasso | | SCAD ---|---|---|--- d | T = 100 | T = 200 | T = 300 | | T = 100 | T = 200 | T = 300 Experiment 1 | | | | | | | True model included | | | | | | | 10 | 0.956 | 1.000 | 1.000 | | 0.954 | 1.000 | 1.000 16 | 0.886 | 1.000 | 1.000 | | 0.878 | 1.000 | 1.000 Selected parameters | | | | | | | 10 | 70.50 | 65.72 | 56.87 | | 71.70 | 59.17 | 55.29 16 | 167.62 | 123.53 | 101.54 | | 146.25 | 107.03 | 90.55 Share of non-zero | | | | | | | 10 | 0.998 | 1.000 | 1.000 | | 0.997 | 1.000 | 1.000 16 | 0.996 | 1.000 | 1.000 | | 0.996 | 1.000 | 1.000 RMSE | | | | | | | 10 | 1.452 | 1.390 | 0.938 | | 1.608 | 1.231 | 0.947 16 | 2.945 | 2.055 | 1.697 | | 2.809 | 1.889 | 1.267 $RMSE_{VAR}$ | | | | | | | 10 | 1.227 | 0.813 | 0.683 | | 0.949 | 0.488 | 0.313 16 | 1.728 | 1.069 | 0.914 | | 1.346 | 0.648 | 0.482 $RMSE_{COV}$ | | | | | | | 10 | 0.776 | 1.128 | 0.643 | | 1.298 | 1.130 | 0.894 16 | 2.384 | 1.755 | 1.430 | | 2.465 | 1.774 | 1.172 $RMSE_{p}$ | | | | | | | 10 | 0.128 | 0.086 | 0.070 | | 0.128 | 0.086 | 0.070 16 | 0.120 | 0.081 | 0.069 | | 0.120 | 0.081 | 0.069 Experiment 2 | | | | | | | True model included | | | | | | | 10 | 0.268 | 0.854 | 0.998 | | 0.264 | 0.972 | 1.000 16 | 0.066 | 0.810 | 0.990 | | 0.060 | 0.924 | 1.000 Selected parameters | | | | | | | 10 | 98.89 | 89.55 | 90.87 | | 95.58 | 91.53 | 102.63 16 | 188.84 | 157.81 | 138.47 | | 181.29 | 167.15 | 165.00 Share of non-zero | | | | | | | 10 | 0.947 | 0.998 | 1.000 | | 0.945 | 0.999 | 1.000 16 | 0.930 | 0.996 | 1.000 | | 0.928 | 0.999 | 1.000 RMSE | | | | | | | 10 | 2.527 | 2.323 | 1.367 | | 2.526 | 1.593 | 1.201 16 | 3.739 | 2.496 | 2.078 | | 3.757 | 2.101 | 1.647 $RMSE_{VAR}$ | | | | | | | 10 | 1.517 | 0.942 | 0.666 | | 1.533 | 0.808 | 0.465 16 | 2.110 | 1.350 | 1.057 | | 2.116 | 1.148 | 0.733 $RMSE_{COV}$ | | | | | | | 10 | 2.021 | 2.124 | 1.194 | | 2.007 | 1.374 | 1.107 16 | 3.087 | 2.100 | 1.789 | | 3.104 | 1.760 | 1.475 $RMSE_{p}$ | | | | | | | 10 | 0.128 | 0.084 | 0.067 | | 0.128 | 0.084 | 0.067 16 | 0.126 | 0.081 | 0.068 | | 0.126 | 0.081 | 0.068 Experiment 3 | | | | | | | True model included | | | | | | | 10 | 0.008 | 0.302 | 0.624 | | 0.002 | 0.300 | 0.666 16 | 0.000 | 0.068 | 0.458 | | 0.000 | 0.056 | 0.470 Selected parameters | | | | | | | 10 | 273.39 | 256.94 | 238.20 | | 264.71 | 252.06 | 233.77 16 | 604.87 | 587.33 | 546.63 | | 565.69 | 569.72 | 534.27 Share of non-zero | | | | | | | 10 | 0.937 | 0.984 | 0.994 | | 0.918 | 0.984 | 0.995 16 | 0.906 | 0.978 | 0.994 | | 0.848 | 0.975 | 0.994 RMSE | | | | | | | 10 | 2.193 | 1.280 | 0.993 | | 2.908 | 1.362 | 0.946 16 | 3.542 | 1.994 | 1.461 | | 5.501 | 2.274 | 1.459 $RMSE_{VAR}$ | | | | | | | 10 | 1.901 | 1.149 | 0.908 | | 2.646 | 1.220 | 0.845 16 | 2.982 | 1.740 | 1.315 | | 5.037 | 2.012 | 1.289 $RMSE_{COV}$ | | | | | | | 10 | 1.092 | 0.563 | 0.400 | | 1.207 | 0.604 | 0.426 16 | 1.912 | 0.973 | 0.636 | | 2.210 | 1.060 | 0.683 $RMSE_{p}$ | | | | | | | 10 | 0.125 | 0.082 | 0.067 | | 0.125 | 0.082 | 0.067 16 | 0.124 | 0.082 | 0.068 | | 0.124 | 0.082 | 0.068 * • Notes: True model included is the average share of estimates that includes all truly non-zero coefficients. Selected parameters is the number of non-zero estimates. Share of non-zero is the average share of truly non-zero coefficients that was estimated by the algorithm as non-zero. $RMSE=\sqrt{\frac{1}{200}\sum_{i=1}^{200}\|\hat{\phi}_{T}(i)-\phi_{T}^{*}\|}$ where $\hat{\phi}_{T}(i)$ is the estimated parameter vector for iteration $i$ containing all parameters in the system. $RMSE_{VAR},RMSE_{COV},$ and $RMSE_{p}$ are similarly defined RMSE measures for estimated VAR coefficients, variance-covariance parameters, and transition probabilities respectively. The results of the experiments are presented in Table 1. Looking at the metrics for estimation consistency, we see that all $RMSE$ measures are declining as the sample size increases for both Lasso and SCAD. It is interesting to note that SCAD appears to perform better for larger sample sizes in terms of estimation accuracy as measured by $RMSE$. Furthermore, we see that, in most cases, both estimators get better at including the true model while the number of selected parameters fall, which provides evidence of model selection consistency. We also note that SCAD has a slight advantage over the Lasso in selection accuracy for larger sample sizes as seen in experiments 2 and 3. ## Short-horizon stock return predictability It is well established that short-horizon stock return predictability (both in- and out-of-sample) exhibits significant time-variation (e.g. Chen and Hong, 2012; Rapach and Zhou, 2013). Specifically, Henkel et al. (2011) (henceforth HMN) and Dangl and Halling (2012) show that return predictability is correlated with business cycles in a distinctively counter-cyclical fashion. In particular, HMN estimate a MS-VAR(1) with 2 states, one state corresponding to an ’expansion’ regime and the other to a ’recession’, for the period of 1953 to 2008 with excess returns, dividend yield, short rate, term spread, and default spread as endogenous variables for the US. With the estimated system, they calculate the adjusted $R^{2}$ ($\overline{R}^{2}$) from a predictive regression of lagged predictors on one-month ahead excess returns (the first equation from the VAR888Excess returns are ordered first in the system.) for both model-implied periods of recession and expansion. The authors find that $\overline{R}^{2}$ is close to 0 during expansions while it averages around 0.175 for recessions. This led them to argue that return predictability is negligible during expansions and is present exclusively during recessions. A major drawback of this strategy is that the predictors were selected in a relatively ad-hoc manner, which may yield significant omitted variable bias. The framework precludes the possibility that changes in return predictability are due to predictors beyond that of the chosen variables. This is a significant problem because if, as the authors argued, aggregate predictor variables are jointly determined by the ”micro-level objectives of firms and central banks” which are in turn driven by business cycles, we should expect this counter-cyclical relationship between predictor and excess returns to potentially manifest in any predictor that relate to the ”micromotives” of economic agents, which the literature on return predictability is not short of. We approach this problem by incorporating 14 predictors as considered by Goyal and Welch (2008) in their study on return predictability: dividend price ratio (d/p), dividend yield (d/y), earnings price ratio (e/p), dividend payout ratio (d/e), stock variance (svar), book-to-market ratio (b/m), net equity expansion (ntis), treasury bill rate (tbl), long term rate of returns (ltr), long term yield (lty), term spread (tms), default yield spread (dfy), default return spread (dfr), and inflation (infl). Note that d/p, tbl, tms, and dfy overlap with the predictors in HMN. This results in a 2 state MS-VAR(1) system with 15 endogenous variables including excess returns (r) ordered first, with 711 estimable parameters including an intercept999To maintain the assumption of stationarity, we detrend all time series by subtracting a moving average of the past 12 months following Ang and Bekaert (2007). Furthermore, as is customary in the literature on Lasso, we rescale all variables to have zero mean and a standard deviation of 1.. Additionally, we update the investigation period to cover April 1953 to December 2018 (sample size of 787). Given the large number of parameters involved, the system is estimated with the SCAD penalty initialized with Lasso estimates. As a diagnostic check on the EM algorithm, we first verify that the estimated system yields regimes consistent with the interpretation of expansions and recessions. Figure 1 compares the smoothed probabilities for state 1 with that of an NBER-based recession indicator from the St. Louis FRED database (USREC). We see that when the probability of state 1 is close to unity, the NBER-based index often indicates a recession (value of 1), which provides evidence that state 1 corresponds to that of a recession. More formally, if we classify recessions as having a state 1 probability of greater than 0.5 and subsequently compare the resultant series with the NBER-based indicator, we get an agreement rate of 70%, which is comparable to the 77% obtained in HMN. Figure 1: Probability estimates of recession compared with an NBER-based recession indicator. * • Notes: (left axis, navy ’+’ labels) Smoothed probabilites from the MS-VAR for state 1 labelled by navy ’+’; (right axis, turquoise line) Monthly NBER-based recession indicator from St. Louis FRED (USREC). A value of 1 indicates a recession, and 0 for expansion. Several other features of our system are similar. The estimated transition probability matrix yields $p_{1\rightarrow 1}=0.79$ (recession to recession) and $p_{2\rightarrow 2}=0.88$ (expansion to expansion), which are close to the respective estimates of $0.80$ and $0.91$ in HMN. We also replicate the finding of increased volatility for all predictors during recession relative to periods of expansion as reported in table 2. Table 2: Differences in the volatility of predictors between periods of recessions and expansions. Difference in volatility: --- (estimated variance in state 1 - estimated variance in state 2) r | 0.844 | ltr | 0.952 d/p | 0.191 | tms | 0.410 d/y | 0.003 | dfy | 0.230 e/p | 0.125 | dfr | 1.101 svar | 1.687 | infl | 0.267 b/m | 0.286 | d/e | 0.088 ntis | 0.169 | lty | 0.388 tbl | 0.315 | | * • Notes: As discussed in the main text, state 1 corresponds to recession while state 2 corresponds to expansions. r: excess return; d/p: dividend price ratio; d/y: dividend yield; e/p: earnings price ratio; svar: stock variance; b/m: book-to-market ratio; ntis: net equity expansion; tbl: treasury bill rate; ltr: long term rate of return; tms: term spread; dfy: default yield spread; dfr: default return spread; infl: inflation; d/e: dividend payout ratio; lty: long term yield. See Goyal and Welch (2008) for a detailed description of the variables. Panel A of Table 3 reports the $\overline{R}^{2}$ derived from using the first equation of the MS-VAR (since $r$ is ordered first) in predicting one-month ahead excess returns conditional on state. These results present strong evidence in favor of the counter-cyclicality of return predictability given the larger magnitude of $\overline{R}^{2}$ during recessions (0.126) compared to expansion (0.112), which is in line with HMN. However, our estimate of $\overline{R}^{2}$ during expansions is at least 4 times larger than theirs, which is consistent with the findings of Dangl and Halling (2012) that return predictability might still be present during booms, but are indeed stronger during busts. Table 3: Estimated $\overline{R}^{2}$, coefficients from predictive regressions of one-month ahead excess returns on lagged predictor variables for periods of expansion and recession, and out-of-sample forecasting results. Panel A: | Adjusted R2 from predictive regressions ---|--- | Expansion | | Recession | | | 0.112 | | 0.126 | | Panel B: | Coefficients of selected variables | Expansion | | Recession | | d/p | 0.247 | | 0.399 | | svar | -0.040 | | -0.258 | | tbl | -0.344 | | | | e/p | | | 0.019 | | ltr | | | 0.142 | | tms | | | 0.201 | | dfr | | | 0.062 | | infl | | | -0.019 | | lty | | | -0.245 | | Panel C: | OOS Forecast Accuracy | | Forecast comparison tests 01.2010 - 12.2018 | MSFE | | | DM test | RC test MS-VAR (SCAD) | 0.527 | | MS-VAR | | MS-VAR (HMN) | 0.560 | | vs MS-VAR (HMN) | 0.143 | 0.206 Hist. Avg. | 0.640 | | vs Hist. Avg. | 0.044 | 0.074 ARMA(1,1) | 0.665 | | vs ARMA | 0.033 | 0.057 Panel D: | OOS Forecast Accuracy | | Forecast comparison tests 01.2007 - 12.2018 | MSFE | | | DM test | RC test MS-VAR (SCAD) | 0.913 | | MS-VAR | | MS-VAR (HMN) | 0.964 | | vs MS-VAR (HMN) | 0.299 | 0.253 Hist. Avg. | 0.928 | | vs Hist. Avg. | 0.468 | 0.480 ARMA(1,1) | 0.920 | | vs ARMA | 0.482 | 0.465 * • Notes: Panel A: adjusted $R^{2}$ from the estimated predictive regression (first equation in MS-VAR) of one-month ahead excess returns on relevant lagged predictors as identified by the algorithm. Dates of expansion and recession are determined by estimated smooth probabilities of states.Panel B: Estimated coefficients from the first equation in the MS-VAR across the 2 states. Predictors that are not included here are regarded as not relevant and dropped by the algorithm. d/p: dividend price ratio; e/p: earnings price ratio; svar: stock variance; tbl: treasury bill rate; ltr: long term rate of return; dfy: default yield spread; dfr: default return spread; infl: inflation; lty: long term yield. See Goyal and Welch (2008) for a detailed description of the variables. Panel C and D: MSFE results for OOS period of Jan 2010 to Dec 2018 and Jan 2007 to Dec 2018 respectively. p-values of forecast comparison tests for Diebold and Mariano test (DM) (Diebold and Mariano, 1995) and ’Reality Check’ test (RC) (White, 2000) are included. ”$x<y$” refers to a test of null hypothesis of equal predictive ability between $x$ and $y$, with the one-sided alternative of superior predictive ability of $x$ over $y$. A key merit of our regularized MS-VAR in this context is the ability to identify predictors that contribute the most to this counter-cyclical behavior of return predictability. Looking at Panel B of Table 3, we see that 2 predictors are relevant to both states: d/p, and svar. More importantly, we see that tbl drops out during times of crisis, which is reasonable given that the policy rate has recently been set constantly close to zero during protracted periods of economic slowdown. The inclusion of 6 new relevant predictors during recessions (e/p, ltr, tms, dfr, infl and lty) indicate that they contribute to return predictability during bad times only, which is a finding that is challenging to replicate in small MS-VARs with few endogenous variables. Interestingly, of all the selected variables, only d/p, tbl and tms were included in the MS-VAR of HMN, which suggests a potential omitted variable bias problem. Capturing these dynamics matter because they may help to consolidate the narrative on return predictability. For example, the non- relevance of e/p during expansions and its relevance during recessions is consistent with the idea of ”accounting conservatism”, as argued by HMN, which meant that balance sheets may be quicker in reporting bad news while reacting slower during good times. Slower disclosure and propagation of reported earnings information during expansions may hinder the predictive power of earnings ratios during such a period, while a faster response with bad news during crisis may lead to more accurate reporting of earnings, and contribute to predictive power. Next, we study the out-of-sample (OOS) forecasting properties of the proposed large MS-VAR with an OOS period of January 2010 to December 2018. The model is estimated with an expanding window and one-step ahead forecasts are constructed as the weighted average of predictions from both states. To compare our results, we consider also the original 5 variable MS-VAR estimated in HMN. In addition, we form forecasts of $r$ using an expanding window historical average and include predictions from an ARMA(1,1) model. Specifically, the historical average is often hailed as notoriously difficult to beat (Goyal and Welch, 2008). To formally compare the results, we employ two forecast comparison tests: Diebold and Mariano test Diebold and Mariano (1995) and the ’Reality check’ test (White, 2000). Panel C of Table 3 reports the results. Notably, the proposed MS-VAR achieves the lowest mean squared forecast errors (MSFE) followed by the MS-VAR of HMN. Although the difference between the proposed MS-VAR and that of HMN is not statistically significant, we note that the large MS-VAR performs significantly better than both the historical average and ARMA(1,1), as indicated by both tests. Additionally, we consider an out-of-sample period encompassing the 2008 financial crisis in Panel D. Here, we expect regime-switching methods to perform better given that the possibility of having a recession state is explicitly accounted for. Indeed, we see that, relative to the historical average benchmark, this is the case for the SCAD-penalized MS-VAR but not for the original MS-VAR in HMN. One conjecture for the difference is that, as suggested in Panel B, many of the predictors that are relevant for predictability during recessions are included in the large MS-VAR but not the HMN model. This provides some evidence that prediction performance can be improved by considering more predictors. This is particularly the case because the large MS-VAR continues to perform the best in terms of achieving the lowest MSFE although this difference in predictive accuracy does not appear to be statistically significant. ## Concluding remarks In this paper, we have proposed two new shrinkage type estimators to handle parameter proliferation in sparse high-dimensional MS-VARs. Theoretically, we have shown that both the Lasso and SCAD estimators are estimation consistent, while the latter has the added benefit of selecting relevant variables with high probability. Consequently, the SCAD estimator exhibits the oracle property in that it is asymptotically equivalent to an estimator that assumes a priori knowledge of the sparsity pattern in the system. Results from numerical experiments show that the proposed EM algorithm is able to handle large MS-VARs well and the finite sample performance of the estimators provides support for our theoretical results. The empirical investigation on the counter-cyclicality of return predictability highlights the flexibility of the proposed estimation in incorporating many endogenous predictors and the merit of allowing for variable selection in regime-switching applications. Furthermore, the significantly better OOS performance of our model suggests that sizeable improvements to stock return prediction can be attained with a larger pool of predictors. Notably, this suggests that our framework can be generalized to other applications where regime-switching is of interest but where high-dimensionality may be a limiting factor, such as those frequently encountered in monetary policy, asset allocation, and other macroeconomic or financial systems. ## References * Ailliot and Monbet (2017) Ailliot, P., Monbet, V., 2017\. Sparse vector markov switching autoregressive models. application to multivariate time series of temperature. Computational Statistics & Data Analysis 108, 40–51. * Ang and Bekaert (2002) Ang, A., Bekaert, G., 2002. International asset allocation with regime shifts. The review of financial studies 15, 1137–1187. * Ang and Bekaert (2007) Ang, A., Bekaert, G., 2007. Stock return predictability: Is it there? The Review of Financial Studies 20, 651–707. * Ang and Timmermann (2012) Ang, A., Timmermann, A., 2012\. Regime changes and financial markets. Annu. Rev. Financ. Econ. 4, 313–337. * Bai and Ng (2008) Bai, J., Ng, S., 2008. Large dimensional factor analysis. Now Publishers Inc. * Bańbura et al. (2010) Bańbura, M., Giannone, D., Reichlin, L., 2010. Large bayesian vector auto regressions. Journal of applied Econometrics 25, 71–92. * Baum et al. (1970) Baum, L.E., Petrie, T., Soules, G., Weiss, N., 1970\. A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics 41, 164–171. * Bernanke et al. (2005) Bernanke, B.S., Boivin, J., Eliasz, P., 2005. Measuring the effects of monetary policy: a factor-augmented vector autoregressive (favar) approach. The Quarterly journal of economics 120, 387–422. * Bianchi et al. (2019) Bianchi, D., Billio, M., Casarin, R., Guidolin, M., 2019\. Modeling systemic risk with markov switching graphical sur models. Journal of econometrics 210, 58–74. * Bickel et al. (1998) Bickel, P.J., Ritov, Y., Ryden, T., 1998. Asymptotic normality of the maximum-likelihood estimator for general hidden markov models. The Annals of Statistics 26, 1614–1635. * Bickel et al. (2009) Bickel, P.J., Ritov, Y., Tsybakov, A.B., 2009. Simultaneous analysis of lasso and dantzig selector. The Annals of statistics 37, 1705–1732. * Callot and Kock (2015) Callot, L., Kock, A.B., 2015\. Oracle inequalities for high dimensional vector autoregressions. Journal of Econometrics 186, 325–344. * Cerra and Saxena (2005) Cerra, V., Saxena, S.C., 2005\. Did output recover from the asian crisis? IMF Staff Papers 52, 1–23. * Chan et al. (2020) Chan, J.C., Eisenstat, E., Strachan, R.W., 2020. Reducing the state space dimension in a large TVP-VAR. Journal of Econometrics . * Chen and Hong (2012) Chen, B., Hong, Y., 2012. Testing for smooth structural changes in time series models via nonparametric regression. Econometrica 80, 1157–1183. * Chen and Maung (2020) Chen, B., Maung, K., 2020. Time-varying forecast combination for high-dimensional data. arXiv preprint arXiv:2010.10435 . * Dangl and Halling (2012) Dangl, T., Halling, M., 2012\. Predictive regressions with time-varying coefficients. Journal of Financial Economics 106, 157–181. * Dempster et al. (1977) Dempster, A.P., Laird, N.M., Rubin, D.B., 1977. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society: Series B (Methodological) 39, 1–22. * Diebold and Mariano (1995) Diebold, F.X., Mariano, R.S., 1995\. Comparing predictive accu racy. Journal of Business and Economic Statistics 13, 253–263. * Elliott and Timmermann (2005) Elliott, G., Timmermann, A., 2005\. Optimal forecast combination under regime switching. International Economic Review 46, 1081–1102. * Fan and Li (2001) Fan, J., Li, R., 2001. Variable selection via nonconcave penalized likelihood and its oracle properties. Journal of the American statistical Association 96, 1348–1360. * Fan and Peng (2004) Fan, J., Peng, H., 2004. Nonconcave penalized likelihood with a diverging number of parameters. The Annals of Statistics 32, 928–961. * Fan et al. (2014) Fan, J., Xue, L., Zou, H., 2014. Strong oracle optimality of folded concave penalized estimation. Annals of statistics 42, 819\. * Francq and Roussignol (1998) Francq, C., Roussignol, M., 1998\. Ergodicity of autoregressive processes with markov-switching and consistency of the maximum-likelihood estimator. Statistics: A Journal of Theoretical and Applied Statistics 32, 151–173. * Friedman et al. (2007) Friedman, J., Hastie, T., Höfling, H., Tibshirani, R., 2007\. Pathwise coordinate optimization. The annals of applied statistics 1, 302–332. * Friedman et al. (2008) Friedman, J., Hastie, T., Tibshirani, R., 2008. Sparse inverse covariance estimation with the graphical lasso. Biostatistics 9, 432–441. * Goyal and Welch (2008) Goyal, A., Welch, I., 2008. A comprehensive look at the empirical performance of equity premium prediction. The Review of Financial Studies 21, 1455–1508. * Guidolin and Timmermann (2007) Guidolin, M., Timmermann, A., 2007\. Asset allocation under multivariate regime switching. Journal of Economic Dynamics and Control 31, 3503–3544. * Guidolin and Timmermann (2008) Guidolin, M., Timmermann, A., 2008\. International asset allocation under regime switching, skew, and kurtosis preferences. The Review of Financial Studies 21, 889–935. * Hamilton (1989) Hamilton, J.D., 1989. A new approach to the economic analysis of nonstationary time series and the business cycle. Econometrica: Journal of the Econometric Society , 357–384. * Hamilton (1990) Hamilton, J.D., 1990. Analysis of time series subject to changes in regime. Journal of econometrics 45, 39–70. * Hamilton (2016) Hamilton, J.D., 2016. Macroeconomic regimes and regime shifts, in: Handbook of macroeconomics. Elsevier. volume 2, pp. 163–201. * Han et al. (2015) Han, F., Lu, H., Liu, H., 2015\. A direct estimation of high dimensional stationary vector autoregressions. The Journal of Machine Learning Research 16, 3115–3150. * Henkel et al. (2011) Henkel, S.J., Martin, J.S., Nardari, F., 2011. Time-varying short-horizon predictability. Journal of financial economics 99, 560–580. * Ichiue and Koyama (2011) Ichiue, H., Koyama, K., 2011\. Regime switches in exchange rate volatility and uncovered interest parity. Journal of International Money and Finance 30, 1436–1450. * Janková and van de Geer (2018) Janková, J., van de Geer, S., 2018\. De-biased sparse pca: Inference and testing for eigenstructure of large covariance matrices. arXiv preprint arXiv:1801.10567 . * Kim et al. (2008) Kim, Y., Choi, H., Oh, H.S., 2008. Smoothly clipped absolute deviation on high dimensions. Journal of the American Statistical Association 103, 1665–1673. * Koop and Korobilis (2013) Koop, G., Korobilis, D., 2013\. Large time-varying parameter vars. Journal of Econometrics 177, 185–198. * Kwon and Kim (2012) Kwon, S., Kim, Y., 2012. Large sample properties of the scad-penalized maximum likelihood estimation on high dimensions. Statistica Sinica , 629–653. * Leeb and Pötscher (2005) Leeb, H., Pötscher, B.M., 2005\. Model selection and inference: Facts and fiction. Econometric Theory , 21–59. * Leroux (1992) Leroux, B.G., 1992. Maximum-likelihood estimation for hidden markov models. Stochastic processes and their applications 40, 127–143. * Li et al. (2015) Li, D., Ke, Y., Zhang, W., 2015. Model selection and structure specification in ultra-high dimensional generalised semi-varying coefficient models. The Annals of Statistics 43, 2676–2705. * Liu and Chen (2016) Liu, X., Chen, R., 2016. Regime-switching factor models for high-dimensional time series. Statistica Sinica , 1427–1451. * Masini et al. (2020) Masini, R.P., Medeiros, M.C., Mendes, E.F., 2020. Machine learning advances for time series forecasting. arXiv preprint arXiv:2012.12802 . * Maung (2021) Maung, K., 2021. Online appendix for ’estimating high-dimensional markov-switching vars’. Online appendix. * Rapach and Zhou (2013) Rapach, D., Zhou, G., 2013. Forecasting stock returns, in: Handbook of economic forecasting. Elsevier. volume 2, pp. 328–383. * Sims and Zha (2006) Sims, C.A., Zha, T., 2006. Were there regime switches in us monetary policy? American Economic Review 96, 54–81. * Stock and Watson (2002) Stock, J.H., Watson, M.W., 2002\. Forecasting using principal components from a large number of predictors. Journal of the American statistical association 97, 1167–1179. * Wang et al. (2009) Wang, H., Li, B., Leng, C., 2009. Shrinkage tuning parameter selection with a diverging number of parameters. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 71, 671–683. * White (2000) White, H., 2000. A reality check for data snooping. Econometrica 68, 1097–1126. * Zhao and Yu (2006) Zhao, P., Yu, B., 2006. On model selection consistency of lasso. Journal of Machine learning research 7, 2541–2563. * Zhu (2020) Zhu, X., 2020. Nonconcave penalized estimation in sparse vector autoregression model. Electronic Journal of Statistics 14, 1413–1448. * Zou and Li (2008) Zou, H., Li, R., 2008. One-step sparse estimates in nonconcave penalized likelihood models. Annals of statistics 36, 1509\. ## Appendix A Proofs for section 4 Before proving consistency, we require some intermediate results. We assume the following results hold under the conditions of consistency. The proofs for these technical results can be found in an online appendix (Maung, 2021). ###### Lemma 1. momentresult The log-likelihood function evaluated at the true parameter, $\log\mathcal{L}_{T}(\phi_{T}^{*})$, satisfies $\displaystyle E[\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})]=\boldsymbol{0}$ (13) $\displaystyle E[(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))(\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*}))^{\top}]=-E[\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))].$ (14) Lemma 1 states that the Fisher score vector has zero mean when evaluated at the true parameter, and that the information matrix equality holds. ###### Lemma 2. boundedmoments Let $\|\cdot\|_{2}$ represent the $L_{2}$ norm. We have $\|\nabla^{1}_{j}\mathcal{L}_{T}(\phi_{T}^{*})\|_{2}\leq C_{1}$, $\|\nabla^{2}_{j,k}\mathcal{L}_{T}(\phi_{T}^{*})\|_{2}\\\ \leq C_{2}$, and $\|\nabla^{3}_{j,k,l}\mathcal{L}_{T}(\phi_{T})\|_{2}\leq C_{3}$ for $\phi_{T}\in\tilde{\Theta}_{T}$, where $C_{i}<\infty$ ($i=1,2,3$). ###### Corollary 1. Oprate Define $\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})=\partial\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})/\partial\phi_{T}^{(\neg 0)}$, where $\phi_{T}^{(\neg 0)}$ refers to the parameters that are non-zero, and recall that $\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ is the $j^{th}$ element in $\nabla^{1}\log\mathcal{L}_{T}(\phi_{T})$. Note that $\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ is a $K_{T}^{*}\times 1$ vector. In addition, define $\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})=\partial^{2}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})/\partial\phi_{T}^{{(\neg 0)}2}$ which is a $K_{T}^{*}\times K_{T}^{*}$ matrix. Then, we have the following probability bounds 1. (1) $\|\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})\|=O_{p}(\sqrt{TK_{T}^{*}}),$ 2. (2) $\|\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})-E[\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})]\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*}),$ 3. (3) $\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T}^{*})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T}^{*})]\|=O_{p}(\sqrt{TK_{T}^{*}})$, 4. (4) $\|\nabla^{3}\log\mathcal{L}_{T}(\phi_{T}^{*})\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*3/2}),$ 5. (5) $\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}=O_{p}(\sqrt{T}K_{T}^{*})$ for $\phi_{T}\in\tilde{\Theta}_{T}$, where $\|A\|_{\textbf{1}}$ refers to the sum of all absolute values of elements. ### Proof of fsconst First, following Bickel et al. (2009), we bind the Lasso error with a cone constraint. For notation, equate the expression in (3) with $\mathcal{L}_{T}(\phi_{T})^{FS}$. Then, by construction $\mathcal{L}_{T}(\tilde{\phi}_{T})^{FS}\geq\mathcal{L}_{T}(\phi_{T}^{*})^{FS}$. Hence, $\displaystyle T^{-1}[\log\mathcal{L}_{T}(\tilde{\phi}_{T})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$ $\displaystyle\geq\sum_{s=1}^{M}\lambda^{Lasso}\bigg{\\{}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}(|\tilde{a}_{mn}(s)|-|a^{*}_{mn}(s)|)+\sum_{m=1}^{d_{T}^{*}}\sum_{n=1}^{d_{T}^{*}q_{T}}(|\tilde{b}_{mn}(s)|-|b^{*}_{mn}(s)|)\bigg{\\}}$ (15) $\displaystyle+\sum_{s=1}^{M}\lambda^{gLasso}\bigg{\\{}\sum_{m\neq n}(|\tilde{q}_{mn}(s)|-|q^{*}_{mn}(s)|)\bigg{\\}}$ (16) Let $S(h_{T}^{A})$ and $S(h_{T}^{B})$ be the set of indices where the VAR coefficients are non-zero across all states (see proof of consistency below). So, we can rewrite (15) as $\displaystyle\lambda^{Lasso}\bigg{\\{}\bigg{[}\sum_{i\in S(h_{T}^{A})}(|\tilde{a}_{i}|-|a^{*}_{i}|)+\sum_{i\notin S(h_{T}^{A})}|\tilde{a}_{i}|\bigg{]}+\bigg{[}\sum_{i\in S(h_{T}^{B})}(|\tilde{b}_{i}|-|b^{*}_{i}|)+\sum_{i\notin S(h_{T}^{B})}|\tilde{b}_{i}|\bigg{]}\bigg{\\}}$ $\displaystyle\geq\lambda^{Lasso}\bigg{\\{}\bigg{[}-\sum_{i\in S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\notin S(h_{T}^{A})}|\tilde{a}_{i}|\bigg{]}+\bigg{[}-\sum_{i\in S(h_{T}^{B})}|\Delta b_{i}|+\sum_{i\notin S(h_{T}^{B})}|\tilde{b}_{i}|\bigg{]}\bigg{\\}}$ (17) where we have defined $\Delta x_{i}\equiv\tilde{x}_{i}-x_{i}$. We can do the same for $S(h_{T}^{Qnd})$ and (16), to get $\eqref{variance}\geq\lambda^{gLasso}\bigg{\\{}-\sum_{i\in S(h_{T}^{Qnd})}|\Delta q_{i}|+\sum_{i\notin S(h_{T}^{Qnd})}|\tilde{q}_{i}|\bigg{\\}}.$ (18) On the other hand, by the local concavity assumption in (A5), we get $T^{-1}[\log\mathcal{L}_{T}(\tilde{\phi}_{T})-\log\mathcal{L}_{T}(\phi_{T}^{*})]\leq\boldsymbol{\delta}^{\top}[T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})],$ where $\boldsymbol{\delta}$ is a vector of differences of parameter values at $\tilde{\phi}_{T}$ and $\phi^{*}_{T}$, which includes $((\Delta a_{i})_{i})$, $(\Delta b_{i})_{i}$, and $(\Delta q_{i})_{i}$. Note that from Oprate, $T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=O_{p}(\sqrt{K_{T}^{*}/T})=o_{p}(1)$, where the last equality comes from (A8). Furthermore, observing that $\lambda^{Lasso}\propto\lambda^{gLasso}$, $\sum_{i\notin S(h_{T}^{X})}|\tilde{x}_{i}|=\sum_{i\notin S(h_{T}^{X})}|\Delta x_{i}|$, we conclude that with probability approaching one, $\sum_{i\notin S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\notin S(h_{T}^{B})}|\Delta b_{i}|+\sum_{i\notin S(h_{T}^{Qnd})}|\Delta q_{i}|\leq C\bigg{\\{}\sum_{i\in S(h_{T}^{A})}|\Delta a_{i}|+\sum_{i\in S(h_{T}^{B})}|\Delta b_{i}|+\sum_{i\in S(h_{T}^{Qnd})}|\Delta q_{i}|\bigg{\\}},$ (19) where $C>1$ is some constant. Bickel et al. (2009) show that this cone constraint on the Lasso error in (19) is necessary for proving convergence of the Lasso estimator. Now, we show (11). Define $\gamma_{T}^{FS}=\sqrt{K_{T}^{*}}\lambda^{Lasso}$ and recall the definition of $\Omega(W)$ from (A5). We want to show that there exists a local maximizer in the set $\tilde{\Theta}_{T,\gamma^{FS},W}$. To begin, note that we can write $\sum_{s=1}^{M}\sum_{m=1}^{d_{T}}\sum_{n=1}^{d_{T}p_{T}}|a_{mn}(s)|=\sum_{i}a_{i}$, where $a_{i}$ are elements of $\theta_{A}$. We can do the same for $b_{mn}(s)$ and $q_{mn}(s)$. For simplicity, let $\\#A$ denote the dimensions of $A$. Then, pick any $\boldsymbol{u}\in\Omega(W)$ and observe that $\displaystyle\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})^{FS}-\mathcal{L}_{T}(\phi_{T}^{*})^{FS}$ $\displaystyle=T^{-1}[\log\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$ $\displaystyle-\lambda^{Lasso}\bigg{\\{}\sum_{i=1}^{\\#\theta_{A}}(|a_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{1i}|-|a_{i}^{*}|)+\sum_{i=1}^{\\#\theta_{B}}(|b_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{2i}|-|b_{i}^{*}|)\bigg{\\}}$ $\displaystyle-\lambda^{gLasso}\bigg{\\{}\sum_{i=1}^{\\#Q^{ND}}(|q_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{3i}|-|q_{i}^{*}|)\bigg{\\}}$ $\displaystyle\equiv I_{1}+I_{2}+I_{3}.$ For $I_{1}$, by the mean value theorem, for a $\check{\phi}_{T}$ between $\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u}$ and $\phi_{T}^{*}$, $I_{1}=\gamma_{T}^{FS}\boldsymbol{u}^{\top}[T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})]+\frac{1}{2}\gamma_{T}^{FS^{2}}\boldsymbol{u}^{\top}[T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})]\boldsymbol{u}\equiv I_{1,1}+I_{1,2}$ Then, $I_{1,1}\leq\gamma_{T}^{FS}\|\boldsymbol{u}\|O_{p}(\sqrt{K_{T}^{*}/T})=\gamma_{T}^{FS}\|\boldsymbol{u}\|o_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=\|\boldsymbol{u}\|o_{p}(\gamma_{T}^{FS^{2}})$ where we have used Oprate and (A8). Next, $I_{1,2}=\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[T^{-1}\\{\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\\}]\boldsymbol{u}+\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\boldsymbol{u}.$ Using the concavity assumption in (A6), we have $\displaystyle T^{-1}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[\\{\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\\}]\boldsymbol{u}$ $\displaystyle\leq\gamma_{T}^{{FS}^{2}}\nabla^{1}(\boldsymbol{u}^{\top}[T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi^{*}_{T})]\boldsymbol{u})\|\check{\phi}_{T}-\phi_{T}^{*}\|$ $\displaystyle\leq O_{p}(K_{T}^{*3/2}/\sqrt{T})\|\boldsymbol{u}\|^{3}\gamma_{T}^{{FS}^{3}}$ $\displaystyle=o_{p}(\gamma_{T}^{{FS}^{2}})\|\boldsymbol{u}\|^{2},$ where we have used (4) in boundedmoments for the penultimate inequality. Next, observe that by the restricted eigenvalue condition in (A7), we get $\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})\boldsymbol{u}=-\frac{1}{2}\gamma_{T}^{{FS}^{2}}\boldsymbol{u}^{\top}[-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})]\boldsymbol{u}\leq-\frac{1}{2}\gamma_{T}^{{FS}^{2}}\rho_{1}\|\boldsymbol{u}\|^{2}<0.$ So we conclude that the leading term in $I_{1,2}$ is negative. Next, recalling that $\lambda^{gLasso}\propto\lambda^{Lasso}$, we have $\displaystyle I_{3}$ $\displaystyle\leq\lambda^{gLasso}\sum_{i=1}^{h_{T}^{Qnd}}(|q_{i}^{*}+\gamma_{T}^{FS}\boldsymbol{u}_{3i}|-|q_{i}^{*}|)-\lambda^{gLasso}\sum_{i=h_{T}^{Qnd}+1}^{\\#Q^{ND}}|\gamma_{T}^{FS}\boldsymbol{u}_{3i}|$ $\displaystyle=O_{p}(\gamma_{T}^{{FS}^{2}})\|\boldsymbol{u}_{3}\|-\lambda^{gLasso}\sum_{i=h_{T}^{Qnd}+1}^{\\#Q^{ND}}|\gamma_{T}^{FS}\boldsymbol{u}_{3i}|,$ where the final leading term is negative. Furthermore, the same procedure can be applied to $I_{2}$ to yield similar results. Hence the leading terms in $I_{1,2}$, $I_{2}$, and $I_{3}$ imply that for any $\varepsilon>0$, we can find a large $W>0$, such that $P\big{(}\sup_{\boldsymbol{u}\in\Omega(W)}\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{FS}\boldsymbol{u})^{FS}<\mathcal{L}_{T}(\phi_{T}^{*})^{FS}\big{)}\geq 1-\varepsilon.$ Therefore, we can find a local maximizer in $\tilde{\Theta}_{T,\gamma^{FS},W}$. Given the assumption of local concavity over $\tilde{\Theta}_{T}\supseteq\tilde{\Theta}_{T,\gamma^{FS},W}$, and that $\tilde{\phi}_{T},\phi_{T}^{*}\in\tilde{\Theta}_{T}$, we obtain the result in (11). ∎ ### Proof of consistency Before approaching the proof proper, we define the following oracle problem, that is the maximum likelihood estimation of the model assuming a priori knowledge of the sparsity pattern. Since this is unknowable in practice, this discussion is theoretical and functions as a device to judge the accuracy of our variable selection procedure. Let $\phi_{T}^{o}$ represent the vector where the irrelevant VAR parameters have been fixed at 0 prior to estimation. We define $S(h)$, for $h=h_{T}^{A},h_{T}^{B}$ and $h_{T}^{Qnd}$, to be the set of indices whose corresponding parameter is non-zero, and $a_{i}$ is the $i^{th}$ element of $\theta_{A}$, likewise for $b_{i}$ ($\theta_{B}$) and $q_{i}$ ($Q^{ND}$). The (penalized) oracle problem is $\max_{\phi^{o}_{T}}T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi^{o})-\bigg{\\{}\sum_{i\in S(h_{T}^{A})}p^{{}^{\prime}}_{\lambda}(|\tilde{a}_{i}|)|a_{i}|+\sum_{i\in S(h_{T}^{B})}p^{{}^{\prime}}_{\lambda}(|\tilde{b}_{i}|)|b_{i}|+\sum_{i\in S(h_{T}^{Qnd})}p^{{}^{\prime}}_{\lambda}(|\tilde{q}_{i}|)|q_{i}|\bigg{\\}}.$ (20) Notice that this is essentially the same problem as (2.2.2) but with irrelevant parameters set to 0 before estimation. Suppose $\hat{\phi}_{T}^{o}$ is the unique solution to (20). To ensure that the dimensions of $\hat{\phi}_{T}^{o}$ and $\phi_{T}^{*}$ match, we define $\bar{\phi}_{T}^{o}=(\hat{\phi}_{1},\ldots,\hat{\phi}_{K_{T}^{Sp}},0,\ldots,0,\hat{q}_{11}(1),\ldots,\hat{q}_{d_{T}d_{T}}(M),\hat{p}_{1\shortrightarrow 1},\ldots,\hat{p}_{M\shortrightarrow M})^{\top},$ (21) where parameters with hats are from $\hat{\phi}_{T}^{o}$. Proof of (1) Define $\gamma_{T}^{SS}=\sqrt{K_{T}^{*}/T}$ and construct the set $\tilde{\Theta}_{T,\gamma^{SS},W}$ for a sufficiently large constant $W$. Since $1/\sqrt{T}=o(\lambda^{Lasso})$, observe that $\tilde{\Theta}_{T,\gamma^{SS},W}\subseteq\tilde{\Theta}_{T,\gamma^{FS},W}$. Pick $\boldsymbol{u}^{*}\in\Omega(W)$, such that the elements $\boldsymbol{u}^{*}_{ji}=0$ for $j=1,2,3$ and $i\notin S(h_{T}^{X})$ where $X$ is either $\theta_{A},\theta_{b},$ or $Q^{ND}$. Define $\mathcal{L}_{T}(\phi_{T})^{SS}$ to represent the expression (2.2.2) in the SCAD problem. Consider $\displaystyle\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*})^{SS}$ $\displaystyle-\mathcal{L}_{T}(\phi_{T}^{*})^{SS}=T^{-1}[\log\mathcal{L}_{T}(\phi_{T}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*})-\log\mathcal{L}_{T}(\phi_{T}^{*})]$ $\displaystyle+\bigg{[}\sum_{i=1}^{\\#\theta_{A}}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)\bigg{(}|a_{i}^{*}|-|a_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{1i}|\bigg{)}+\sum_{i=1}^{\\#\theta_{B}}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)\bigg{(}|b_{i}^{*}|-|b_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{2i}|\bigg{)}\bigg{]}$ $\displaystyle+\sum_{i=1}^{\\#Q^{ND}}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\bigg{(}|q_{i}^{*}|-|q_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{3i}|\bigg{)}$ $\displaystyle\equiv I_{1}^{S}+I_{2}^{S}+I_{3}^{S}.$ Again, notice that since $1/\sqrt{T}=o(\lambda^{Lasso})$, the proof from fsconst of $I_{1}$ is directly applicable to $I_{1}^{S}$ here and this shows that the leading terms are both, of an order larger than $\gamma_{T}^{{SS}^{2}}$, and are negative. Next, consider $I_{3}^{S}$. By construction of $\boldsymbol{u}^{*}$, we have $I_{3}^{S}=\sum_{i=1}^{h_{T}^{Qnd}}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\bigg{(}|q_{i}^{*}|-|q_{i}^{*}+\gamma_{T}^{SS}\boldsymbol{u}^{*}_{3i}|\bigg{)},$ since $q_{i}^{*}=0$ and $\boldsymbol{u}_{3i}^{*}=0$ for $i>h_{T}^{Qnd}$. Next, note that $|\tilde{q}_{i}|\geq\min_{1\leq i\leq h_{T}^{Qnd}}|\tilde{q}_{i}|-\max_{1\leq i\leq h_{T}^{Qnd}}|\tilde{q}_{i}-q_{i}^{*}|\geq\lambda+o_{p}(\lambda),$ (22) where we have used (A9) for the first term, and fsconst for the second term to show that it is $O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})=o_{p}(\lambda)$, where the last equivalence follow from assumption (A8). By the structure of the SCAD penalty in (4), $p_{\lambda}^{{}^{\prime}}=\theta$ if $0<\theta\leq\lambda$ and $0$ if $\theta>\lambda$. Since $\lambda^{*}\propto\lambda$, we can say that $I_{3}^{S}=o_{p}(\gamma_{T}^{{SS}^{2}})\|\boldsymbol{u}_{3}^{*}\|$. Likewise, we have that $I_{2}^{S}=o_{p}(\gamma_{T}^{{SS}^{2}})(\|\boldsymbol{u}_{1}^{*}\|+\|\boldsymbol{u}_{2}^{*}\|)$. Taken together, we arrive at the existence of a local maximizer in the ball $\tilde{\Theta}_{T,\gamma^{SS},W}\subseteq\tilde{\Theta}_{T}$, where the log likelihood is locally concave on $\tilde{\Theta}_{T}$. Proof of (2) Recall that $\bar{\phi}_{T}^{o}$ is defined in (21), which is the solution to a problem where we know the true sparsity pattern. Hence, we can complete the proof by showing $P(\hat{\phi}_{T}=\bar{\phi}_{T}^{o})\rightarrow 1$. For ease of exposition, we emphasize that the sub-vector $(\hat{\phi}_{1},\ldots,\hat{\phi}_{K_{T}^{Sp}})$ is made up of the following vectors: $(\hat{a}_{i})_{i}$, $(\hat{b}_{i})_{i}$, and $(\hat{q}_{i})_{i}$ for $i\in S(h_{T}^{A}),S(h_{T}^{B})$, and $S(h_{T}^{Qnd})$ respectively, where $\hat{x}_{i}$ for $x=a,b,q$ refers to estimated parameters in $\theta_{A}$, $\theta_{B}$ and $Q^{ND}$. On the other hand, the subvector of zeros in $\bar{\phi}_{T}^{o}$ corresponds to $\hat{x}_{i}=0$ for $i\notin S(h_{T}^{A}),S(h_{T}^{B})$, and $S(h_{T}^{Qnd})$. To show that $\bar{\phi}_{T}^{o}$ is the solution to (2.2.2) with probability approaching one, we need to verify that it satisfies the following Karush- Kuhn-Tucker conditions: 1. (I) $T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial a_{i}}\big{|}_{\hat{a}_{i}}-p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)\frac{\hat{a}_{i}}{|\hat{a}_{i}|}=0$, $T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial b_{i}}\big{|}_{\hat{b}_{i}}-p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)\frac{\hat{b}_{i}}{|\hat{b}_{i}|}=0$, 2. (II) $T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial q_{i}}\big{|}_{\hat{q}_{i}}-p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)\frac{\hat{q}_{i}}{|\hat{q}_{i}|}=0$, $T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial q^{D}_{i}}\big{|}_{\hat{q}_{i}^{D}}=0$, 3. (III) $T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial\pi_{i}}\big{|}_{\hat{\pi}_{i}}=0$, where $q_{i}^{D}$ and $\pi_{i}$ are parameters from $Q^{D}$ and $\pi$. Note that by construction of $\bar{\phi}_{T}^{o}$, (IV) and (V) automatically holds for all $i$, and (I)-(III) holds for $i\in S(h_{T}^{A}),S(h_{T}^{B})$, and $S(h_{T}^{Qnd})$ respectively. For indices $i$ that do not fall in those sets (i.e. the zeroes), we have to verify that the sub-differentials satisfy: 1. (i) $\max_{i\notin S(h_{T}^{A})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial a_{i}}\big{|}_{\hat{a}_{i}}\leq\min_{i\notin S(h_{T}^{A})}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{i}|)$, 2. (ii) $\max_{i\notin S(h_{T}^{B})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial b_{i}}\big{|}_{\hat{b}_{i}}\leq\min_{i\notin S(h_{T}^{B})}p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{i}|)$, 3. (iii) $\max_{i\notin S(h_{T}^{Qnd})}\big{|}T^{-1}\frac{\partial\log\mathcal{L}_{T}(\phi_{T})}{\partial q_{i}}\big{|}_{\hat{q}_{i}}\leq\min_{i\notin S(h_{T}^{Qnd})}p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{i}|)$. We prove (i)-(iii) more generally by looking at $\max_{j\leq K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|$ where $K_{T}$ is the total number of candidate parameters. Recall the definition of $\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ and $\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})$ from Oprate. We want to show that $\max_{j\leq K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|=o_{p}(\lambda)$, and we do so by adopting a similar approach to Kwon and Kim (2012). Observe that $\displaystyle P(\max_{j\leq K_{T}}|\nabla^{1}_{j}\log$ $\displaystyle\mathcal{L}_{T}(\hat{\phi}_{T})|>T\lambda)\leq P(\max_{j\leq K_{T}}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\phi_{T}^{*})|>T\lambda/4)$ $\displaystyle+P(\max_{j\leq K_{T}}\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4)$ $\displaystyle+P(\max_{j\leq K_{T}}\|E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4)$ $\displaystyle+P(\max_{j\leq K_{T}}\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}\|\hat{\phi}_{T}-\phi_{T}^{*}\|^{2}>T\lambda/2)$ $\displaystyle\equiv J_{1}+J_{2}+J_{3}+J_{4}.$ To begin, $J_{1}\leq\sum_{i=K_{T}^{*}+1}^{K_{T}}P\bigg{(}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\phi_{T}^{*})|>T\lambda/4\bigg{)}=O\bigg{(}\frac{K_{T}}{T\lambda^{2}}\bigg{)}=o(1).$ Next, $\displaystyle J_{2}$ $\displaystyle\leq P\bigg{(}\max_{j\leq K_{T}}\|\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})-E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]\|>T\sqrt{T}\lambda/4\sqrt{K_{T}^{*}}\bigg{)}$ $\displaystyle+P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|>\sqrt{K_{T}^{*}/T}\bigg{)}$ $\displaystyle=O\bigg{(}\frac{K_{T}}{T^{2}\lambda^{2}/K_{T}^{*2}}\bigg{)}+o(1)=o(1),$ where we have use (3) from Oprate for the first term, and the first part of consistency for the second term. For $J_{3}$, since $E[\partial^{1}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})]$ is bounded as per boundedmoments, we have $J_{3}\leq P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|>T\lambda/4\sqrt{K_{T}^{*}}C\bigg{)}=o(1)$ where the last equality is again by part (1) of consistency. Finally, using (5) in Oprate, $\displaystyle J_{4}$ $\displaystyle\leq P\bigg{(}\max_{j\leq K_{T}}\|\partial^{2}_{o}\nabla^{1}_{j}\log\mathcal{L}(\phi_{T})\|_{\textbf{1}}>T^{*2}\lambda/2K_{T}^{*}\bigg{)}+P\bigg{(}\|\hat{\phi}_{T}-\phi_{T}^{*}\|^{2}>K_{T}^{*}/T\bigg{)}$ $\displaystyle=O\bigg{(}\frac{K_{T}}{T^{2}\lambda^{2}/K_{T}^{*4}}\bigg{)}+o(1)=o(1).$ Therefore, we have $\max_{j\leq K_{T}}T^{-1}|\nabla^{1}_{j}\log\mathcal{L}_{T}(\hat{\phi}_{T})|=o_{p}(\lambda)$. Next, recall that $|\tilde{\phi}_{i}|$ is $O_{p}(\sqrt{K_{T}^{*}}\lambda^{Lasso})$ by fsconst. Furthermore, (A8) imply that $\sqrt{K_{T}^{*}}\lambda^{Lasso}=o(\lambda)$. Then, by the structure of the SCAD penalty where $p^{{}^{\prime}}_{\lambda}(\theta)=\theta$ for $0<\theta\leq\lambda$ or 0 otherwise, we have $\min_{j\leq K_{T}}p^{{}^{\prime}}_{\lambda}(|\tilde{\phi}_{j}|)=\lambda$. Taken together, this implies that the inequalities (i)-(iii) hold, which establishes part (2) of consistency. ∎ ### Proof of norm First we consider the unpenalized oracle sub-problem given as $\max_{\phi^{o}_{T}}T^{-1}\log\mathcal{L}(\mathcal{Y}_{T}|\mathcal{X}_{T};\phi^{o}).$ (23) Note that this problem is identical to the oracle problem in (20) but with the penalties removed. Let $\bar{\bar{\phi}}^{o}_{T}$ be the solution to (23). The proof can be accomplished by showing the following results: 1. (1) $\|\hat{\phi_{T}}^{(\neg 0)}-\bar{\bar{\phi}}_{T}^{o}\|=o_{p}(T^{-1/2}).$ 2. (2) $\sqrt{T}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{1/2}(\bar{\bar{\phi}}^{o}_{T}-\phi_{T}^{*(\neg 0)})\rightarrow^{d}\mathcal{N}(0,G).$ Intuitively, part (1) implies that $\hat{\phi}_{T}$ is asymptotically close to $\bar{\bar{\phi}}^{o}_{T}$ while part (2) shows that $\bar{\bar{\phi}}^{o}_{T}$ is asymptotically normal. Together, these results suggests that the same statistical inference for $\bar{\bar{\phi}}^{o}_{T}$ can be applied to $\hat{\phi}_{T}$, and that it shares the same efficiency as the oracle estimator. Proof for (1) With a slight abuse of notation, for this proof, we let $\phi^{*}_{T}=\phi_{T}^{*(\neg 0)}$. In light of part (2) in consistency, the penalized oracle estimator, $\bar{\phi}_{T}^{o}$ is indeed the solution to the SCAD problem initialized with Lasso estimates with probability approaching one. Hence, it suffices to check $\|\hat{\phi}_{T}^{o}-\bar{\bar{\phi}}_{T}^{o}\|=o_{p}(T^{-1/2})$, where recall that $\hat{\phi}_{T}^{o}$ is the solution to the penalized oracle problem in (20) (i.e. $\bar{\phi}_{T}^{o}$ with the zeroes removed). Define $\dot{\lambda}=\big{(}p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{1}|)\frac{\hat{a}_{1}}{|\hat{a}_{1}|},\ldots,p_{\lambda}^{{}^{\prime}}(|\tilde{a}_{h_{T}^{A}}|)\frac{\hat{a}_{h_{T}^{A}}}{|\hat{a}_{h_{T}^{A}}|},p_{\lambda}^{{}^{\prime}}(|\tilde{b}_{1}|)\frac{\hat{b}_{1}}{|\hat{b}_{1}|},\ldots,p_{\lambda^{*}}^{{}^{\prime}}(|\tilde{q}_{h_{T}^{Qnd}}|)\frac{\hat{q}_{h_{T}^{Qnd}}}{|\hat{q}_{h_{T}^{Qnd}}|}\big{)}^{\top}$. Then, note that for a $\check{\phi}_{T}^{b}$ between $\hat{\phi}_{T}^{o}$ and $\phi^{*}_{T}$, $\hat{\phi}_{T}^{o}$ satisfies $T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})(\phi_{T}^{*}-\hat{\phi}_{T}^{o})-\dot{\lambda}.$ (24) Next, for $\check{\phi}_{T}$ between $\bar{\bar{\phi}}_{T}^{o}$ and $\phi^{*}_{T}$, $\bar{\bar{\phi}}_{T}^{o}$ satisfies $T^{-1}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})=T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})(\phi_{T}^{*}-\bar{\bar{\phi}}_{T}^{o}).$ (25) Taking the difference of (24) and (25), we get $\dot{\lambda}=[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))]\phi_{T}^{*}+T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})\bar{\bar{\phi}}_{T}^{o}-T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})\hat{\phi}_{T}^{o}.$ (26) Note that by (A6) and (4) from Oprate, $\displaystyle T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))\phi^{*}_{T}$ $\displaystyle=[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}^{b})-\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*}))]\phi_{T}^{*}$ $\displaystyle+[T^{-1}(\nabla^{2}\log\mathcal{L}_{T}(\phi_{T}^{*})-\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T}))]\phi_{T}^{*}$ $\displaystyle=O_{p}(K_{T}^{*2}/T).$ (27) Furthermore, By the same logic in (22), the term $\dot{\lambda}$ goes to zero. Under the assumptions of (A1)-(A4), we can use Lemma 2 of Bickel et al. (1998) to get $T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi)\rightarrow^{p}-I_{T}^{\neg 0}(\phi_{T}^{*})$ where $\phi$ refers to either $\check{\phi}_{T}^{b}$ or $\check{\phi}_{T}$ since both converge to $\phi^{*}_{T}$ in probability. Hence, $T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\phi)=O_{p}(1)$. Therefore, we get $\|\bar{\bar{\phi}}_{T}^{o}-\hat{\phi}_{T}^{o}\|=o_{p}(T^{-1/2})$ by noting that $\sqrt{T}O_{p}(K_{T}^{*2}/T)\\\ =o_{p}(1)$ in (27), and using (26). Proof for (2) Here, we cannot directly apply the result or proof of asymptotic normality from low-dimensional papers such as Bickel et al. (1998) because of the diverging number of parameters. Instead, we approach it with the Lindeberg- Feller CLT as in Fan and Peng (2004). We start with (25). Pre-multiply the left hand side with $\sqrt{T}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}$ and define the triangular array $Z_{Ti}\equiv\frac{1}{\sqrt{T}}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})$. Now, we verify Lindeberg’s condition. Let $\varepsilon>0$ be an arbitrary constant, and note that by Cauchy-Schwarz $\sum_{i=1}^{T}E\\{\|Z_{Ti}\|^{2}\textbf{1}_{(\|Z_{Ti}\|>\varepsilon)}\\}\leq TE\\{\|Z_{Ti}\|^{4}\\}^{1/2}P\\{\|Z_{Ti}\|>\varepsilon\\}^{1/2}.$ Then, by Chebyshev, $P\\{\|Z_{Ti}\|>\varepsilon\\}\leq\frac{E\|G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})\|^{2}}{T\varepsilon^{2}}=O(1/T),$ where we have used the definition of the information matrix, and that $G_{T}G_{T}^{\top}\rightarrow G$. Again by Cauchy-Schwarz, and the fact that the induced matrix norm of a symmetric matrix is equivalent to its spectral radius, we have $\displaystyle E\\{\|Z_{Ti}\|^{4}\\}$ $\displaystyle\leq T^{-2}\lambda_{max}(G_{T}G_{T}^{\top})\lambda_{max}(I_{T}^{(\neg 0)}(\phi_{T}^{*}))E\|\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})[\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})]^{\top}\|^{2}$ $\displaystyle=O(K_{T}^{*2}/T^{2}),$ where $E\|\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})[\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*})]^{\top}\|^{2}$ has $K_{T}^{*2}$ bounded elements as implied by the proof of boundedmoments. So we conclude that Lindeberg’s condition is satisfied since $\sum_{i=1}^{T}E\\{\|Z_{Ti}\|^{2}\\\ \textbf{1}_{(\|Z_{Ti}\|>\varepsilon)}\\}=O(K_{T}^{*}/\sqrt{T})=o(1)$. Furthermore, for the asymptotic variance, we have $var(\sum_{i}^{T}Z_{Ti})=Tcov(Z_{Ti})=cov(G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{Ti}(\phi_{T}^{*}))\rightarrow G$. Therefore, by the Lindeberg-Feller CLT, $\frac{1}{\sqrt{T}}G_{T}[I_{T}^{(\neg 0)}(\phi_{T}^{*})]^{-1/2}\nabla^{1}\log\mathcal{L}_{T}(\phi_{T}^{*})\rightarrow^{d}\mathcal{N}(0,G)$. Again, under the assumptions (A1)-(A4) we can use Lemma 2 of Bickel et al. (1998) to obtain $T^{-1}\nabla^{2}\log\mathcal{L}_{T}(\check{\phi}_{T})\rightarrow^{p}-I_{T}^{\neg 0}(\phi_{T}^{*})$ in (25). Hence, putting all these results together in (25) completes the proof. ∎
arxiv-papers
2021-07-27T02:02:40
2024-09-04T03:07:20.325745
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Kenwin Maung", "submitter": "Kenwin Maung", "url": "https://arxiv.org/abs/2107.12552" }
2107.12553
SUS-20-003 SUS-20-003 # Search for chargino-neutralino production in events with Higgs and bosons using 137of proton-proton collisions at $\sqrt{s}=13\TeV$ ###### Abstract A search for electroweak production of supersymmetric (SUSY) particles in final states with one lepton, a Higgs boson decaying to a pair of bottom quarks, and large missing transverse momentum is presented. The search uses data from proton-proton collisions at a center-of-mass energy of 13collected using the CMS detector at the LHC, corresponding to an integrated luminosity of 137. The observed yields are consistent with backgrounds expected from the standard model. The results are interpreted in the context of a simplified SUSY model of chargino-neutralino production, with the chargino decaying to a boson and the lightest SUSY particle (LSP) and the neutralino decaying to a Higgs boson and the LSP. Charginos and neutralinos with masses up to 820are excluded at $95\%$ confidence level when the LSP mass is small, and LSPs with mass up to 350are excluded when the masses of the chargino and neutralino are approximately 700. ## 0.1 Introduction Supersymmetry (SUSY) [1, 2, 3] is an appealing extension of the standard model (SM) that predicts the existence of a superpartner for every SM particle, with the same gauge quantum numbers but differing by one half unit of spin. SUSY allows addressing several shortcomings of the SM. For example, the superpartners can play an important role in stabilizing the mass of the Higgs boson () [4, 5]. In R-parity conserving SUSY models, the lightest supersymmetric particle (LSP) is stable and therefore is a viable dark matter candidate [6]. The SUSY partners of the SM gauge bosons and the Higgs boson are known as winos (partners of the SU(2)L gauge fields), the bino (partner of the U(1) gauge field), and higgsinos. Neutralinos () and charginos () are the corresponding mass eigenstates of the winos, bino and higgsinos. They do not carry color charge and are therefore produced only via electroweak interactions or in the decay of colored superpartners. Because of the smaller cross sections for electroweak processes, the masses of these particles are experimentally less constrained than the masses of colored SUSY particles. Depending on the mass spectrum, the neutralinos and charginos can have significant decay branching fractions to vector or scalar bosons. In particular, the decays via the and the Higgs boson are expected to be significant if the and particles are wino-like, the is bino-like, and the difference between their masses is larger than the Higgs boson mass, where the subscript $1(2)$ denotes the lightest (second lightest) neutralino or chargino, respectively. These considerations strongly motivate a search for the electroweak production of SUSY partners presented in this paper. This paper reports the results of a search for chargino-neutralino production with subsequent $\PSGcpmDo\to\PW^{\pm}\PSGczDo$ and $\PSGczDt\to\PH\PSGczDo$ decays, as shown in Fig. 1. The data analysis focuses on the final state with a charged lepton produced in the boson decay, two jets reconstructed from the $\PH\to\PQb\PAQb$ decay, and significant missing transverse momentum () resulting from the LSPs and the neutrino. This final state benefits from the large branching fraction for $\PH\to\PQb\PAQb$, 58%. The chargino and neutralino are assumed to be wino-like, and the produced in their decays is assumed to be the stable LSP. As wino-like charginos $\PSGcpmDo$ and neutralinos $\PSGczDt$ would be nearly degenerate, this analysis considers a simplified model [7, 8, 9] with a single mass parameter for both the chargino and neutralino ($m_{\PSGczDt/\PSGcpmDo}$), as well as an additional mass parameter for the LSP ($m_{\PSGczDo}$). Results of searches in this final state were previously presented by ATLAS [10, 11] and CMS [12, 13, 14] using data sets at center of mass energy 8 and 13. Figure 1: Diagram for a simplified SUSY model with electroweak production of the lightest chargino and next-to-lightest neutralino . The decays to a boson and the lightest neutralino . The decays to a Higgs boson and a . This analysis uses 13proton-proton ($\Pp{}\Pp{}$) collision data collected with the CMS detector during the 2016–2018 data-taking periods, corresponding to an integrated luminosity of $137\fbinv$. Relative to the most recent result from the CMS Collaboration targeting this signature [12], the results significantly extend the sensitivity to the mass of the chargino and neutralino. The improved sensitivity is achieved through a nearly four-fold increase in the integrated luminosity, as well as from numerous improvements in the analysis, including the addition of a discriminant that identifies Higgs boson decays collimated into large-radius jets, regions that include additional jets from the initial-state radiation, and an expanded categorization in . ## 0.2 The CMS detector The central feature of the CMS apparatus is a superconducting solenoid of 6m internal diameter, providing a magnetic field of 3.8T. Within the solenoid volume are a silicon pixel and strip tracker, a lead tungstate crystal electromagnetic calorimeter, and a brass and scintillator hadron calorimeter, each composed of a barrel and two endcap sections. Forward calorimeters extend the pseudorapidity ($\eta$) coverage provided by the barrel and endcap detectors. Muons are detected in gas-ionization chambers embedded in the steel flux-return yoke outside the solenoid. A more detailed description of the CMS detector, together with a definition of the coordinate system used and the relevant kinematic variables, can be found in Ref. [15]. Events of interest are selected using a two-tiered trigger system. The first level, composed of custom hardware processors, uses information from the calorimeters and muon detectors to select events at a rate of approximately 100kHz within a fixed time interval of about 4 [16]. The second level, known as the high-level trigger, consists of a farm of processors running a version of the full event reconstruction software optimized for fast processing, and reduces the event rate to approximately 1kHz before data storage [17]. ## 0.3 Simulated samples Monte Carlo (MC) simulation is used to design the search strategy, study and estimate SM backgrounds, and evaluate the sensitivity of the analysis to the SUSY signal. Separate MC simulations are used to reflect the detector configuration and running conditions of different periods (2016, 2017, and 2018). The 2 (versions 2.2.2 for 2016 and 2.4.2 for 2017–2018) generator [18] at leading order (LO) in quantum chromodynamics (QCD) is used to generate samples of events of SM $\ttbar$, $\PW{}\text{+jets}$, and $\PW\PH$ processes, as well as chargino-neutralino production, as described by a simplified model of SUSY. Samples of $\PW{}\text{+jets}$, , and SUSY events are generated with up to four, three, and two additional partons included in the matrix-element calculations, respectively. The generator at next-to-leading-order (NLO) in QCD is used to generate samples of $\ttbar\PZ$ and $\PW\PZ$ events, while single top quark events are generated at NLO in QCD using the 2.0 [19, 20, 21, 22] program. The NNPDF3.0 (3.1) parton distribution functions, PDFs, are used to generate all 2016 (2017–2018) MC samples [23, 24, 25]. The parton shower and hadronization are modeled with 8.226 (8.230) [26] in 2016 (2017–2018) samples. The MLM [27] and FxFx [28] prescriptions are employed to match partons from the matrix-element calculation to those from the parton showers for the LO and NLO samples, respectively. The 2016 MC samples are generated with the CUETP8M1 tune [29]. For later data- taking periods, the CP5 and CP2 tunes [30] are used for SM and SUSY signal samples, respectively. The [31] package is used to simulate the response of the CMS detector for all SM processes, while the CMS fast simulation program [32, 33] is used for signal samples. Cross section calculations performed at next-to-next-to-leading-order (NNLO) in QCD are used to normalize the MC samples of $\PW{}\text{+jets}$ [34], and at NLO in QCD to normalize single top quark samples [35, 36]. The $\ttbar$ samples are normalized to a cross section determined at NNLO in QCD that includes the resummation of the next-to-next-to-leading-logarithmic soft-gluon terms [37, 38, 39, 40, 41, 42, 43]. MC samples of other SM background processes are normalized to cross sections obtained from the MC event generators at either LO or NLO in QCD. Cross sections for wino-like chargino- neutralino production are computed at approximate NLO plus next-to-leading logarithmic (NLL) precision. Other SUSY particles except for the LSP are assumed to be heavy and decoupled [44, 45, 46, 47]. A SM-like $\PH\to\PQb\PAQb$ branching fraction of 58.24% [48] is assumed. Nominal distributions of additional $\Pp{}\Pp{}$ collisions in the same or adjacent bunch crossings (pileup) are used in the generation of simulated samples. These samples are reweighted such that the number of interactions per bunch crossing matches the observation. ## 0.4 Event selection and search strategy In order to search for the chargino-neutralino production mechanism shown in Fig. 1, the analysis targets decay modes of the boson to leptons and the to a bottom quark-antiquark pair. The analysis considers events with a single isolated electron or muon, two jets identified as originating from two bottom quarks, and large from the LSPs and the neutrino. The major backgrounds in this final state arise from SM processes containing top quarks and bosons. These backgrounds are suppressed with the analysis strategy described below that uses physics objects summarized in Table 0.4, which are similar to those presented in Ref. [49]. Events are reconstructed using the particle-flow (PF) algorithm [50], which combines information from the CMS subdetectors to identify charged and neutral hadrons, photons, electrons, and muons, collectively referred to as PF candidates. These candidates are associated with reconstructed vertices, and the vertex with the largest sum of squared physics-object transverse momenta is taken to be the primary $\Pp{}\Pp{}$ interaction vertex. The physics objects used for the primary vertex determination include a special collection of jets reconstructed by clustering only tracks associated to the vertex, and the magnitude of the associated missing transverse momentum. The missing transverse momentum in this case is defined as the negative vector sum of the transverse momentum () of the jets in this collection. In all other cases, the missing transverse momentum () is taken as the negative vector sum of the of all PF candidates, excluding charged hadron candidates that do not originate from the primary vertex [51]. Electron candidates are reconstructed by combining clusters of energy deposits in the electromagnetic calorimeter with charged tracks [52]. The electron identification is performed using shower shape variables, track-cluster matching variables, and track quality variables. The selection on these variables is optimized to identify electrons from the decay of and bosons while rejecting electron candidates originating from jets. To reject electrons originating from photon conversions inside the detector, electrons are required to have at most one missing measurement in the innermost tracker layers and to be incompatible with any conversion-like secondary vertices. Muon candidates are reconstructed by geometrically matching tracks from measurements in the muon system and tracker, and fitting them to form a global muon track. Muons are selected using the quality of the geometrical matching and the quality of the tracks [53]. Selected muons (electrons) are required to have $\pt>25\>(30)\GeV$, $\abs{\eta}<2.1\>(1.44)$, and be isolated. Events containing electrons with $\abs{\eta}>1.44$ have been found to exhibit an anomalous tail in the transverse mass distribution and are not included in the search. Lepton isolation is determined from the scalar sum ($\pt^{\text{sum}}$) of PF candidates not associated with the lepton within a cone of -dependent radius starting at $\Delta R=\sqrt{\smash[b]{\left(\Delta\phi\right)^{2}+\left(\Delta\eta\right)^{2}}}=0.2$, where $\phi$ is the azimuthal angle in radians. This radius is reduced to $\Delta R=\max(0.05,10\GeV/\pt$) for a lepton with $\pt>50\GeV$. Leptons are considered isolated if the scalar sum within this radius is less than 10% of the lepton . Additionally, leptons are required to have a scalar sum within a fixed radius of $\Delta R=0.3$ less than $5\GeV$. Typical lepton selection efficiencies are approximately 85% for electrons and 95% for muons, depending on the and $\eta$ of the lepton. Events containing a second lepton passing a looser “veto lepton” selection, a passing a “veto tau” selection, or an isolated charged PF candidate are rejected. Hadronic decays are identified by a multi-variate analysis (MVA) isolation algorithm that selects both one– and three–pronged topologies and allows for the presence of additional neutral pions [54, 55]. These vetoes are designed to provide additional rejection against events containing two leptons, or a lepton and a hadronic decay. Hadronic jets are reconstructed from neutral and charged PF candidates associated with the primary vertex, using the anti-clustering algorithm [56, 57]. Two collections of jets are produced, with different values of the distance parameter $R$. Both collections of jets are corrected for contributions from event pileup and the effects of nonuniform detector response [58]. “Small-$R$” jets are reconstructed with a distance parameter $R=0.4$, and aim to reconstruct jets arising from a single parton. Selected small-$R$ jets have $\pt>30\GeV$, $\abs{\eta}<2.4$, and are separated from isolated leptons by $\Delta R>0.4$. Small-$R$ jets that contain the decay of a -flavored hadron are identified as bottom quark jets (-tagged jets) using a deep neural network algorithm, DeepCSV. The discriminator working point is chosen so that the misidentification rate to tag light-flavor or gluon jets is approximately 1–2%. This choice results in an efficiency to identify a bottom quark jet in the range 65–80% for jets with between 30 and 400, and an efficiency of 10–15% for jets originating from a charm quark. The tagging efficiency in simulation is corrected using scale factors derived from comparisons of data with simulation in control samples [59]. Summary of the requirements for the physics objects used in this analysis. Lepton $\ell=\PGm(\Pe)$ with $\pt^{\ell}>25(30)\GeV$, $\abs{\eta^{\ell}}<2.1~{}(1.44)$ $\pt^{\text{sum}}<0.1\>\pt^{\ell}$, $\pt^{\text{sum}}<5\GeV$ Veto lepton $\PGm$ or $\Pe$ with $\pt^{\ell}>5\GeV$, $\abs{\eta^{\ell}}<2.4$ $\pt^{\text{sum}}<0.2\>\pt^{\ell}$ Veto track charged PF candidate, $\pt>10\GeV$, $\abs{\eta}<2.4$ $\pt^{\text{sum}}<0.1\>\pt$, $\pt^{\text{sum}}<6\GeV$ Veto hadronic with $\pt>10\GeV$, $\abs{\eta}<2.4$ MVA isolation Jets anti-jets, $R=0.4$, $\pt>30\GeV$, $\abs{\eta}<2.4$ anti- jets, $R=0.8$, $\pt>250\GeV$, $\abs{\eta}<2.4$ tagging DeepCSV algorithm (1% misidentification rate) tagging mass-decorrelated tagging discriminator $\pt^{\text{sum}}$ cone size $\ell$ relative isolation: $\Delta R=\min[\max(0.05,10\GeV/\pt^{\ell}),0.2]$ veto track, and $\ell$ absolute isolation: $\Delta R=0.3$ When the of the Higgs boson is not too large compared to its mass, the jets resulting from its decay to bottom quarks are spatially separated. As the Higgs boson increases, the separation between the jets decreases. For the SUSY signal, this becomes important when the mass splitting between the neutralino and the LSP is large. To improve the sensitivity to large masses, a second collection of “large-$R$” jets is formed with distance parameter $R=0.8$. Selected large-$R$ jets have $\pt>250\GeV$, $\abs{\eta}<2.4$, and are separated from isolated leptons by $\Delta R>0.8$. Large-$R$ jets containing a candidate $\PH\to\PQb\PAQb$ decay are identified as -tagged jets using a dedicated deep neural network algorithm [60]. We use the mass-decorrelated version of the DeepAK8 algorithm, which considers the properties of jet constituent particles and secondary vertices. The imposed requirement on the neural network score corresponds to a misidentification rate of approximately 2.5% for large-$R$ jets with a of 500–700without an $\PH\to\PQb\PAQb$ decay in multijet events. The efficiency to identify an decay to bottom quarks is 60–80% depending on the of the large-$R$ jet. The is modified to account for corrections to the energy scale of the reconstructed jets in the event. Events with possible contributions from beam halo interactions or anomalous noise in the calorimeter are rejected using dedicated filters [61]. Additionally, during part of the 2018 data-taking period, two sectors of the endcap hadronic calorimeter experienced a power loss, affecting approximately 39of data. As the identification of both electrons and jets depends on correct energy fraction measurements, events from the affected data-taking periods containing an electron or a jet in the region $-2.4<\eta<-1.4$ and $-1.6<\phi<-0.8$ are rejected. The total loss in signal efficiency considering all event filters is less than 1%. Data events are selected using a logical “or” of triggers that require either the presence of an isolated electron or muon; or large and , where is the magnitude of the negative vector sum of all jets and leptons. The combined trigger efficiency, measured with an independent data sample of events with a large scalar sum of small-$R$ jets, is greater than 99% for events with $\ptmiss>225\GeV$ and lepton $\pt>20\GeV$. The trigger requirements are summarized in Table 0.4. Summary of the triggers used to select the analysis data set. Events are selected using a logical “or” of the following triggers. $\ptmiss>120\GeV$ and $\mht>120\GeV$ (2016–2018) $\ptmiss>170\GeV$ (2016) Isolated $\PGm(\Pe)$ with $\pt^{\ell}>24\>(25)\GeV$ (2016) Isolated $\PGm(\Pe)$ with $\pt^{\ell}>24\>(35)\GeV$ (2017–2018) Table 0.4 defines the event preselection common to all signal regions, which requires exactly one isolated lepton, $\ptmiss>125\GeV$, two or three small-$R$ jets, and no isolated tracks or veto tau candidates. Exactly two of the small-$R$ jets must be -tagged. The primary SM processes that contribute to the preselection region are , single top quark (mostly in the $\PQt\PW$ channel), and $\PW{}\text{+jets}$ production. The SM processes with one boson that decays to leptons, originating primarily from semileptonic and $\PW{}\text{+jets}$, are suppressed by requiring the transverse mass, , to be greater than $150\GeV$. is defined as $\mT=\sqrt{2\pt^{\ell}\ptmiss(1-\cos\Delta\phi)},$ (1) where $\pt^{\ell}$ denotes the lepton $\pt$ and $\Delta\phi$ is the azimuthal separation between $\ptvec^{\ell}$ and . After requiring a large , the dominant remaining background comes from processes with two bosons that decay to leptons (including leptons), primarily $\ttbar$ and . To suppress these backgrounds, events with an additional veto lepton or a hadronic decay are rejected, as described above. Additional background rejection is obtained using the cotransverse mass variable, $m_{\mathrm{CT}}$, which is defined as $m_{\mathrm{CT}}=\sqrt{2\pt^{\PQb_{1}}\pt^{\PQb_{2}}(1+\cos(\Delta\phi_{\PQb\PAQb}))},$ (2) where $\pt^{b_{1}}$ and $\pt^{b_{2}}$ are the magnitudes of the transverse momenta of the two -tagged jets and $\Delta\phi_{\PQb\PAQb}$ is the azimuthal angle between the two -tagged jets [62]. This variable has a kinematic endpoint close to $150\GeV$ for events when both jets are correctly identified, while signal events tend to have higher values of $m_{\mathrm{CT}}$. Requiring $m_{\mathrm{CT}}>200\GeV$ is effective at reducing the dilepton and backgrounds. Summary of the preselection requirements common to all signal regions. The $N_{\PQb}$ is the multiplicity of -tagged jets and $\pt^{\mathrm{non\mbox{-}\PQb}}$ is the of the non--tagged jet. Lepton Single $\Pe$ or $\PGm$ and no additional veto lepton, track or tau Small-$R$ jets $2\leq N_{\text{jets}}\leq 3$, $N_{\PQb}=2$, $\pt^{\mathrm{non\mbox{-}\PQb}}<300\GeV$ $>$125 $m_{\bbbar}$ 90–150 $>$150 $m_{\mathrm{CT}}$ $>$200 Events entering the signal regions must pass the preselection and satisfy the and $m_{\mathrm{CT}}$ requirements above. We also require that the invariant mass of the pair of -tagged jets, $m_{\bbbar}$, be between 90 and 150, consistent with the mass of an SM Higgs boson. In events with 3 small-$R$ jets, the non--tagged jet must have $\pt<300\GeV$. This requirement rejects some events that survive the $m_{\mathrm{CT}}$ and selections. These requirements define the baseline signal selection. Figure 2 shows the distributions of , $m_{\mathrm{CT}}$, $m_{\bbbar}$, , the number of small-$R$ jets ($N_{\text{jets}}$), and the discriminator output of the tagging algorithm in simulated signal and background samples. All preselection requirements specified in Table 0.4 are applied except the one on the plotted variable, illustrating the discrimination power of each variable. Figure 2: Distributions of , $m_{\mathrm{CT}}$, $m_{\bbbar}$, , $N_{\text{jets}}$, and the $\PH\to\PQb\PAQb$ large-$R$ jet discriminator in simulated background and signal samples. Three benchmark signal points corresponding to masses in GeV ($m_{\PSGczDt/\PSGcpmDo}$, $m_{\PSGczDo}$) of (800, 100), (425, 150) and (225, 75) are shown as solid, dashed, and short- dashed lines, respectively. Events are taken from the 2-jet signal regions with $\ptmiss>125\GeV$, with all of the requirements specified in Table 0.4 except for the one on the plotted variable. The shaded areas correspond to the statistical uncertainty of the simulated backgrounds. The dashed vertical lines indicate the thresholds used to define the signal regions. These indicators are not shown on the tagging discriminator score distribution because the required values vary between 0.83 and 0.90, depending on the data- taking year. Events passing the baseline signal selection are further categorized into signal regions according to $N_{\text{jets}}$, the number of -tagged large-$R$ jets $N_{\PH}$, and the value of . The twelve non-overlapping signal regions are defined in Table 0.4. Definition of the 12 non-overlapping signal regions categorized in $N_{\PH}$, $N_{\text{jets}}$, and , where $N_{\PH}$ is the number of large-$R$ jets tagged as $\PH\to\PQb\PAQb$. $N_{\PH}$ | $N_{\text{jets}}$ | [GeV] ---|---|--- 0 | 2, 3 | [125, 200), [200, 300), [300, 400), [400, $\infty$) 1 | 2, 3 | [125, 300), [300, $\infty$) ## 0.5 Background estimation There are two dominant background categories relevant for this search: top quark production and boson production. The contributions of these backgrounds to the yields in the signal regions are estimated using observed yields in control regions (CRs) and transfer factors obtained from simulated samples. The transfer factors are validated in non-overlapping regions adjacent to the signal regions. The top quark backgrounds include pair production, single top quark production (), and a small contribution from $\ttbar\PW$ and $\ttbar\PZ$ production. These backgrounds dominate in the lower-search regions and are estimated from CRs in data using the method described in Section 0.5.1. In the high-regions, boson production becomes the dominant background. The method described in Section 0.5.2 estimates the background arising from $\PW{}\text{+jets}$, , and production using CRs in data. The remaining background arises from standard model production. This process contributes less than 5% of the total background in any of the search regions, and its yield is estimated from simulation. A 25% uncertainty in the cross section of this process is assigned, based on the uncertainty in the cross section measurement [63]. ### 0.5.1 Top quark background Events containing top quarks constitute the dominant background, particularly in bins with $N_{\text{jets}}=3$ or low . These events contain jets and isolated leptons from bosons, so they lead to similar final states as the signal. Owing to the high requirement, the majority of the top quark background stems from events with two leptonically decaying bosons. In this case, one of the leptons either is not reconstructed, fails the identification requirements, is not isolated, or is outside of kinematic acceptance. The background is further suppressed by the $m_{\mathrm{CT}}$ requirement, which has an endpoint at approximately $150\GeV$ for events in the case when both daughter jets are reconstructed and identified. The $m_{\mathrm{CT}}$ value for events can exceed the cutoff for three reasons: (i) if there are mistagged light-flavor jets or extra jets, (ii) if a jet is reconstructed with excess because it overlaps with other objects, or (iii) because of excess jet arising due to the finite jet energy resolution. A control sample enriched in top quark events is obtained by inverting the $m_{\mathrm{CT}}$ requirement. For each signal region (SR), we form a corresponding control region spanning a range of $m_{\mathrm{CT}}$ from $100$ to $200\GeV$. These CRs are used to normalize the top quark background to data in a single-lepton, high-region in each bin of , $N_{\PH}$, and $N_{\text{jets}}$. In each CR, a transfer factor from MC simulation ($R_{\text{top}}$) is used to extrapolate the yield for the corresponding high-$m_{\mathrm{CT}}$ signal regions. The top quark background estimate is then given by $N_{\mathrm{SR}}^{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})=R_{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})N_{\mathrm{CR}}^{\text{obs.}}(\ptmiss,N_{\text{jets}},N_{\PH}),$ (3) where the $N_{\mathrm{SR}}^{\text{top}}$ is the number of expected events in the SR, $N_{\mathrm{CR}}^{\text{obs.}}$ is the number of observed events in the CR, and $R_{\text{top}}$ are defined as $R_{\text{top}}(\ptmiss,N_{\text{jets}},N_{\PH})=\frac{N_{\mathrm{SR}}^{\text{top}~{}\mathrm{MC}}(\ptmiss,N_{\text{jets}},N_{\PH})}{N_{\mathrm{CR}}^{\mathrm{SM}~{}\mathrm{MC}}(\ptmiss,N_{\text{jets}},N_{\PH})}.$ (4) The $N_{\mathrm{SR}}^{\text{top}~{}\mathrm{MC}}$ and $N_{\mathrm{CR}}^{\mathrm{SM}~{}\mathrm{MC}}$ are the expected top quark and total SM yields in the signal and control regions, respectively, according to simulation. The contamination from other processes (primarily boson production) in the low-$m_{\mathrm{CT}}$ CRs is as low as 2% in the lower-regions, growing to 25% in the highest control region. This contamination is included in the denominator of $R_{\text{top}}$ as shown in Eq. (4). Additionally, to increase the expected yields in the CRs, two modifications to the CR definitions are made. First, for the CRs with an -tagged large-$R$ jet, the $m_{\mathrm{CT}}$ lower bound is removed (for a total range of $0$–$200\GeV$). Second, for CRs with $\ptmiss>300\GeV$, the $m_{\bbbar}$ window is expanded to 90–300. The data yields, transfer factors, and the resulting top quark background predictions are summarized in Table 0.5.1. These predictions, combined with the other background estimates, are compared with the observed yields in Section 0.6. The values of the $R_{\text{top}}$ transfer factors, the observed yields in the low-$m_{\mathrm{CT}}$ CRs, and the resulting top quark background prediction in each bin of , $N_{\text{jets}}$, and $N_{\PH}$. The uncertainty shown for $R_{\text{top}}$ is only of statistical origin. For the top quark prediction both the statistical and systematic uncertainties are shown (discussed in the text.) $N_{\text{jets}}$ | $N_{\PH}$ | [] | $R_{\text{top}}$ | $N_{\mathrm{CR}}^{\text{obs.}}$ | $N_{\mathrm{SR}}^{\text{top}}$ ---|---|---|---|---|--- 2 | 0 | 125–200 | $0.006\pm 0.001$ | $978$ | $6.3\pm 0.9\pm 0.9$ 200–300 | $0.015\pm 0.003$ | $161$ | $2.4\pm 0.5\pm 0.4$ 300–400 | $0.05\pm 0.02$ | $6$ | $0.3\pm 0.1\pm 0.1$ $>$400 | $0.02\pm 0.02$ | $1$ | $0.02\pm 0.02\pm 0.01$ 1 | 125–300 | $0.26\pm 0.06$ | $6$ | $1.6\pm 0.8\pm 0.4$ $>$300 | $0.03\pm 0.01$ | $11$ | $0.4\pm 0.2\pm 0.3$ 3 | 0 | 125–200 | $0.020\pm 0.002$ | $851$ | $17.5\pm 1.6\pm 2.6$ 200–300 | $0.05\pm 0.01$ | $151$ | $7.1\pm 1.1\pm 1.3$ 300–400 | $0.04\pm 0.01$ | $19$ | $0.8\pm 0.3\pm 0.3$ $>$400 | $0.2\pm 0.2$ | $1$ | $0.2\pm 0.2\pm 0.1$ 1 | 125–300 | $0.28\pm 0.05$ | $18$ | $5.0\pm 1.4\pm 1.4$ $>$300 | $0.12\pm 0.03$ | $14$ | $1.7\pm 0.7\pm 1.4$ To assess the modeling of the top quark background, we conduct a validation test in a sideband requiring $m_{\bbbar}>150\GeV$ and the same $m_{\mathrm{CT}}$ and requirements as the SR. The relative contributions from SM processes are similar in the sideband and the signal regions. The modeling of the top quark background in this region is also affected by the same sources of uncertainty, including the imperfect knowledge of the object efficiencies, jet energy scale and resolution, and the distribution of additional pileup interactions. An analogous background prediction is performed in this region, and the level of agreement observed is used to derive a systematic uncertainty in the $R_{\text{top}}$ factors. The yields in the $m_{\bbbar}>150\GeV$ validation regions (VRs) are estimated using CRs defined with the same and $m_{\mathrm{CT}}$ requirements as the CRs for the SR predictions: $\mT>150\GeV$, and $m_{\mathrm{CT}}>100$ $(0)\GeV$ for $N_{\PH}=0$ $(1)$. Two modifications are introduced to improve the statistical precision of the test: first, the $N_{\text{jets}}=2$ and $N_{\text{jets}}=3$ bins are combined; and second, all regions with $\ptmiss>300$and $\ptmiss>400$are combined. Additionally, to avoid overlap with the low-$m_{\mathrm{CT}}$ control regions used to estimate the top quark background in the SR, the low-$m_{\mathrm{CT}}$ regions used for the VR predictions in bins with $\ptmiss>300\GeV$ are restricted to $m_{\bbbar}>300\GeV$. A comparison of the $R_{\text{top}}$ factors obtained from data and simulation in the VRs is shown in Fig. 3. Good agreement is observed, and we assign the statistical uncertainties in the differences of the observed and simulated values as the systematic uncertainties in the corresponding $R_{\text{top}}$ factors. These uncertainties reflect the degree to which we can evaluate the modeling of $R_{\text{top}}$ factors in data. This validation approach has the advantage of probing both the known sources of uncertainty as well as any unknown sources that could affect the $m_{\mathrm{CT}}$ extrapolation. The uncertainties derived from this test, together with those associated with the finite yields in the low-$m_{\mathrm{CT}}$ CRs and the MC statistical precision form the complete set of uncertainties assigned to the top quark background prediction. Additional cross-checks of the top quark background estimate are performed in a dilepton validation region and in a region with exactly one jet. These studies are performed in all 12 bins of , $N_{\text{jets}}$, and $N_{\PH}$, and the results agree with those obtained from the studies performed in the $m_{\bbbar}$ sideband. A second, independent estimate of the top quark background is performed following the “lost-lepton” method described in Ref. [49]. In this method, the contribution from top quark processes in each signal region is normalized using a corresponding control region requiring two leptons and all other signal region selections. The estimates obtained from the two methods are consistent. These additional cross-checks are not used quantitatively to determine uncertainties, but they build confidence in the modeling of the $R_{\text{top}}$ factors. Figure 3: Observed and simulated $R_{\text{top}}$ values in the $m_{\bbbar}>150\GeV$ validation regions. The differences between observed and simulated $R_{\text{top}}$ values, divided by the total statistical uncertainties, are also listed in the figure as $\Delta R_{\text{top}}$. The statistical precision of each difference, $\sigma_{\mathrm{stat}}$, is taken as the systematic uncertainty on $R_{\text{top}}$ for the corresponding bin in the signal region. ### 0.5.2 boson background Events arising from boson production, mainly $\PW{}\text{+jets}$, , and , are the second largest background in this search and are the dominant SM contribution in bins with high . Events from $\PW{}\text{+jets}$ production satisfy the baseline selection when they contain true jets originating from $\Pg\to\bbbar$ (associated production with heavy-flavor jets, $\PW{}\mathrm{+HF}$) or when light-flavor jets are misidentified as jets (associated production with light flavor jets, $\PW{}\text{+LF}$). Because of the low misidentification rate of light-flavor jets, more than 75% of the selected $\PW{}\text{+jets}$ events contain at least one genuine jet. The $\PW{}\text{+jets}$ background is reduced by the $\mT>150\GeV$ requirement. In absence of large mismeasurements of the , the boson must be produced off-shell in order to satisfy this threshold. The boson background is normalized in a data control sample obtained by requiring the number of -tagged jets ($N_{\PQb}$) to be less or equal to 1 and the same , $m_{\mathrm{CT}}$, and $m_{\bbbar}$ requirements as the signal regions. The $N_{\PQb}=0$ region of this sample is used to normalize the boson background while the $N_{\PQb}=1$ region is used to constrain the contamination from top quark events. The two jets with the highest tagging discriminator values are used to calculate $m_{\bbbar}$ and $m_{\mathrm{CT}}$. The control sample is binned in $N_{\text{jets}}$ and following the definition of the signal regions and has a high purity of boson events for $N_{\PQb}=0$. The contribution from processes involving top quarks, mostly single or pair production of top quarks, is up to 20% in some $N_{\PQb}=0$ CRs. The contamination is estimated by fitting the $N_{\PQb}$ distribution in each CR using templates of $\PW{}\text{+jets}$ and top quark events obtained from simulation. The templates are extracted from simulated boson and top quark samples, respectively. The number of boson events in each CR, $N^{\PW}_{\mathrm{CR}}$, is obtained by subtracting from the observed yield, $N_{\mathrm{CR}}^{\text{obs.}}$, the contribution of top quark events $N^{\text{top}}_{\mathrm{CR}}$. For the yield $N^{\text{top}}_{\mathrm{CR}}$, a correction factor obtained from the fit, which is typically close to 1.1, is taken into account. We define a transfer factor $R_{\PW}$ to extrapolate from each $N_{\PQb}=0$ CR to the corresponding $N_{\PQb}=2$ signal region. Simulated samples of boson processes are used to calculate $R_{\PW}$. Since there are very few events with an -tagged large-$R$ jet in the control samples, it is not feasible to form dedicated CRs with $N_{\PH}=1$. Instead, the control samples are inclusive in $N_{\PH}$, and the extrapolation into $N_{\PH}=0$ and $N_{\PH}=1$ is handled by the $R_{\PW}$ factors. The predicted yield of the boson background in each of the signal regions, $N^{\PW}_{\mathrm{SR}}$, is therefore given by $N^{\PW}_{\mathrm{SR}}(\ptmiss,N_{\text{jets}},N_{\PH})=N^{\PW}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})R_{\PW}(\ptmiss,N_{\text{jets}},N_{\PH})$ (5) with $N^{\PW}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})=N_{\mathrm{CR}}^{\text{obs.}}(\ptmiss,N_{\text{jets}})-N^{\text{top}}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}}),$ (6) and $R_{\PW}$ is defined as $R_{\PW}(\ptmiss,N_{\text{jets}},N_{\PH})=\frac{N^{\PW~{}\textrm{MC}}_{\mathrm{SR}}(\ptmiss,N_{\text{jets}},N_{\PH})}{N^{\PW~{}\textrm{MC}}_{\mathrm{CR}}(\ptmiss,N_{\text{jets}})}.$ (7) The resulting predictions are shown in Table 0.5.2. Section 0.6 shows a comparison with the observed yields after combining with the other background estimates. The observed ($N_{\mathrm{CR}}^{\text{obs.}}$) and top quark background yield ($N_{\mathrm{CR}}^{\PW}$) in the $\mathrm{CR}$, together with the values of $R_{\PW}$ for the extrapolation of the boson background from the $\mathrm{CR}$ to the $\mathrm{SR}$, and the final boson prediction, $N^{\PW}_{\mathrm{SR}}$. The uncertainties in $R_{\PW}$ include the statistical uncertainty only. The boson prediction shows both the statistical and systematic uncertainties. $N_{\text{jets}}$ [GeV] $N_{\mathrm{CR}}^{\text{obs.}}$ $N^{\text{top}}_{\mathrm{CR}}$ $N_{\mathrm{CR}}^{\PW}$ $N_{\PH}$ $R_{\PW}\times 10^{3}$ $N^{\PW}_{\mathrm{SR}}$ 2 125–200 449 $65\pm 7$ $384\pm 23$ 0 $1.3\pm 0.6$ $0.5\pm 0.2\pm 0.1$ 200–300 314 $34\pm 45$ $280\pm 19$ $3.6\pm 0.7$ $1.0\pm 0.2\pm 0.2$ 300–400 191 $10\pm 1$ $181\pm 14$ $3.7\pm 0.7$ $0.7\pm 0.1\pm 0.1$ $>$400 110 $2.5\pm 0.7$ $108\pm 11$ $2.8\pm 0.8$ $0.3\pm 0.1\pm 0.1$ 125–300 1 $1.1\pm 0.2$ $0.7\pm 0.2\pm 0.1$ $>$300 $1.7\pm 0.7$ $0.5\pm 0.2\pm 0.2$ 3 125–200 329 $67\pm 5$ $262\pm 19$ 0 $0.9\pm 0.6$ $0.2\pm 0.2\pm 0.1$ 200–300 152 $32\pm 5$ $120\pm 14$ $5.9\pm 1.5$ $0.7\pm 0.2\pm 0.1$ 300–400 81 $7\pm 1$ $74\pm 10$ $9.4\pm 2.6$ $0.7\pm 0.2\pm 0.2$ $>$400 44 $3.7\pm 1.7$ $40\pm 7$ $6.5\pm 1.9$ $0.3\pm 0.1\pm 0.1$ 125–300 1 $2.0\pm 0.5$ $0.8\pm 0.2\pm 0.2$ $>$300 $2.9\pm 1.7$ $0.3\pm 0.2\pm 0.1$ To assess the modeling of heavy-flavor jets in the simulated $\PW{}\mathrm{+HF}$ samples, we perform a similar extrapolation in $N_{\PQb}$ in a Drell–Yan (DY) validation sample assuming $\PZ\to\ell\ell$. The large contribution from in the $N_{\PQb}=2$ region is suppressed by requiring two opposite-charge, same-flavor leptons with an invariant mass compatible with a boson, $\abs{m(\ell\ell)-m_{\PZ}}<5\GeV$. In the validation sample, the predicted and observed $\mathrm{DY}\mathrm{+HF}$ yields agree within 20%. Based on this test, we vary the fraction of $\PW{}\text{+jets}$ events with at least one generated jet by 20% and assign the resulting variation of $R_{\PW}$ as a systematic uncertainty. We also study the distribution of $N_{\PQb}$ in a low-control sample, obtained by selecting events with $\ptmiss>125\GeV$, $50<\mT<150\GeV$, $N_{\text{jets}}=2$, and without a requirement on $m_{\bbbar}$. The top quark contribution in this region is largely suppressed by the $m_{\mathrm{CT}}>200\GeV$ requirement, yielding a sample with a $\PW{}\mathrm{+HF}$ purity of approximately 40% for $N_{\PQb}=2$. Good agreement between data and simulation is observed in this region, as shown in Fig. 4. Figure 4: Distribution of $N_{\PQb}$ in the low-control sample. The $\ttbar{}\text{+jets}$ contribution is suppressed by requiring $m_{\mathrm{CT}}>200\GeV$. The shaded area reflects the statistical uncertainty in the simulation. Additional contributions to the uncertainty in the factor $R_{\PW}$ are evaluated. The difference of the $\PW{}\mathrm{+HF}$ fraction with respect to the one derived from the $\mathrm{DY}\mathrm{+HF}$ validation test results in a systematic uncertainty of up to 16% in $R_{\PW}$. Based on the latest measurements [64, 65, 66] and considering the delicate phase space requiring significant and $N_{\PQb}=2$, the diboson production cross section is varied by 25%, yielding a maximum systematic uncertainty of 12%. The uncertainties from the measurement of the tagging efficiency scale factors are propagated to the simulated $\PW{}\text{+jets}$ and diboson events resulting in an uncertainty of up to 10% in $R_{\PW}$. The simulated samples are reweighted according to the distribution of the true number of interactions per bunch crossing. The uncertainty in the total inelastic $\Pp{}\Pp{}$ cross section results in uncertainties of 2–6% in $R_{\PW}$. The uncertainty arising from the jet energy calibration [67] is assessed by shifting jet momenta in simulated samples up and down, and propagating the resulting changes to $R_{\PW}$. Typical values for the systematic uncertainty from the jet energy scale range from 2–10%, reaching up to 20% for events with a boosted Higgs boson candidate. The mistag rate of the tagging algorithm for large-$R$ jets that do not contain a true is measured in a control sample obtained by requiring low-, $N_{\PQb}=2$, and at least one large-$R$ jet. Scale factors are measured and applied to simulation to correct for differences in the observed mistag rates. The uncertainty in the scale factors is dominated by the limited statistical precision of the control sample and results in a systematic uncertainty up to 14% in $R_{\PW}$. The renormalization ($\mu_{\mathrm{R}}$) and factorization ($\mu_{\mathrm{F}}$) scales are varied up and down by a factor of 2, omitting the combination of variations in opposite directions. The envelope of the variations reaches values up to 15% and is assigned as systematic uncertainty. The uncertainties resulting from variations of the PDF and the strong coupling are less than 2%. The systematic uncertainties in $R_{\PW}$ are summarized in Table 0.5.2. Systematic uncertainties on $R_{\PW}$. Source Typical values $\PW{}\mathrm{+HF}$ fraction 7–16% Diboson cross section 1–12% tagging efficiency 3–10% mistag rate 3–14% Jet energy scale 2–20% Pileup 1–6% PDF $<$2% $<$2% $\mu_{\mathrm{R}}$ and $\mu_{\mathrm{F}}$ 3–15% ## 0.6 Results and interpretation The observed data yields and the expected yields from SM processes in the signal regions are summarized in Table 0.6. No significant disagreement is observed. A binned maximum likelihood fit for the SUSY signal strength, the yields of background events, and various nuisance parameters is performed. The likelihood function is built using Poisson probability functions for all signal regions, and log-normal or gamma function PDFs for all nuisance parameters. Figure 5 shows the post-fit expectation of the SM background. Combining all signal bins, $51\pm 5$ background events are expected and 49 events are observed. Summary of the predicted SM background and the observed yield in the signal regions, together with the expected yields for three signal benchmark models. The total prediction, $N_{\mathrm{SR}}^{\mathrm{BG}}$, is the sum of the top quark and boson predictions, $N_{\mathrm{SR}}^{\text{top}}$ and $N_{\mathrm{SR}}^{\mathrm{\PW}}$, as well as small contributions from standard model production. The values shown are taken before the signal extraction fit to the observed yields in the signal regions is performed. The uncertainties include the statistical and systematic components. For each benchmark model column, the ordered pairs indicate the masses (in GeV) of the /and , respectively. $N_{\text{jets}}$ $N_{\PH}$ [GeV] $N_{\mathrm{SR}}^{\text{top}}$ $N_{\mathrm{SR}}^{\mathrm{\PW}}$ $N_{\mathrm{SR}}^{\mathrm{BG}}$ Observed $\PSGczDt\to\PH\PSGczDo,~{}\PSGcpmDo\to\PW^{\pm}\PSGczDo$ 800, 100 425, 150 225, 75 2 0 125–200 6.3 0.5 $6.9\pm 1.3$ 8 $0.08\pm 0.02$ $2.0\pm 0.4$ $2.6\pm 0.8$ 200–300 2.4 1.0 $3.4\pm 0.6$ 2 $0.3\pm 0.1$ $4.5\pm 0.7$ $2.9\pm 0.6$ 300–400 0.3 0.7 $1.0\pm 0.3$ 1 $0.3\pm 0.1$ $2.1\pm 0.4$ $0.3\pm 0.2$ $>$400 0.02 0.3 $0.3\pm 0.1$ 1 $0.5\pm 0.2$ $0.4\pm 0.3$ $\leq 0.01$ 1 125–300 1.6 0.7 $2.5\pm 0.9$ 3 $0.5\pm 0.1$ $3.9\pm 0.7$ $2.8\pm 1.0$ $>$300 0.4 0.5 $0.9\pm 0.5$ 1 $2.6\pm 0.4$ $4.3\pm 0.8$ $1.4\pm 0.4$ 3 0 125–200 17.5 0.2 $17.8\pm 3.0$ 17 $0.05\pm 0.02$ $1.0\pm 0.2$ $2.9\pm 0.6$ 200–300 7.1 0.7 $7.8\pm 1.7$ 6 $0.14\pm 0.03$ $2.6\pm 0.3$ $2.1\pm 0.5$ 300–400 0.8 0.7 $1.5\pm 0.5$ 0 $0.18\pm 0.04$ $1.2\pm 0.4$ $0.4\pm 0.4$ $>$400 0.2 0.3 $0.5\pm 0.3$ 0 $0.3\pm 0.1$ $0.3\pm 0.2$ $0.06\pm 0.06$ 1 125–300 5.0 0.8 $5.9\pm 2.1$ 10 $0.4\pm 0.1$ $2.6\pm 0.5$ $2.0\pm 0.6$ $>$300 1.7 0.3 $2.1\pm 1.6$ 0 $1.5\pm 0.2$ $2.4\pm 0.5$ $0.6\pm 0.2$ Figure 5: Predictions of the SM background after performing the signal extraction fit (filled histograms) and observed yields in the signal regions. Three signal models with different values of $m_{\PSGczDt/\PSGcpmDo}$ and $m_{\PSGczDo}$ are shown as solid, short dashed, and long dashed lines. The lower panel provides the ratio between the observation and the predicted SM backgrounds. The shaded band shows the post-fit combination of the systematic and statistical uncertainties in the background prediction. We next evaluate the experimental and theoretical uncertainties in the expected signal yield. Varying the lepton, tagging, and tagging efficiency scale factors by their respective uncertainties varies the signal yield by less than 1, 4, and 20%. For the tagger, this scale factor is measured as a function of the candidate using a sample of jets in data and simulation that mimic the rare $\PH\to\PQb\PAQb$ case [60]. The efficiencies obtained using the fast or full detector simulation are found to be compatible, with no significant dependence on the mass splitting $\Delta m=m_{\PSGczDt/\PSGcpmDo}-m_{\PSGczDo}$. The systematic uncertainty in the signal yields, due to the uncertainty in the trigger efficiency measurement, is generally less than 5%. The uncertainties in the simulated yields obtained by varying the jet energy scale and the jet energy resolution are each between 1 and 7%. A 3% difference in the jet energy scale between the fast and full detector simulations is observed, resulting in a 1–10% change in the expected signal yield. The effect of missing higher-order corrections on the signal acceptance is estimated by varying $\mu_{\mathrm{R}}$ and $\mu_{\mathrm{F}}$ [68, 69, 70] up and down by a factor of 2, omitting the combination of variations in opposite directions. The envelope of the variations reaches values up to 15% and is assigned as a systematic uncertainty. The resulting variation of the expected signal yield is less than 1%. To account for uncertainty in the modeling of the multiplicity of additional jets from initial state radiation, a 1% uncertainty is applied to the $N_{\text{jets}}=3$ signal regions. The integrated luminosities of the 2016, 2017, and 2018 data-taking periods are individually known with uncertainties in the 2.3–2.5% range [71, 72, 73], while the total Run 2 (2016–2018) integrated luminosity has an uncertainty of 1.8%, the improvement in precision reflecting the (uncorrelated) time evolution of some systematic effects. The signal samples are reweighted according to the distribution of the true number of interactions per bunch crossing. The uncertainty in the total inelastic $\Pp{}\Pp{}$ cross section leads to changes in the expected signal yield of less than 2%. A summary of the systematic uncertainties in the signal yields is given in Table 0.6. Sources and ranges of systematic uncertainties on the expected signal yields. The ranges reported reflect the magnitudes of the median 68% of all impacts, considering the distribution of variations in all 12 signal regions and the full range of signal mass hypotheses used. When the lower bound is very close to 0, an upper bound is shown instead. Source Typical values Simulation statistical uncertainty 1–10% Lepton efficiency $<$1% tagging efficiency $<$4% tagging efficiency 7–20% Trigger efficiency $<$5% Jet energy scale 1–7% Jet energy resolution 1–7% jet energy scale 1–10% $\mu_{\mathrm{R}}$ and $\mu_{\mathrm{F}}$ $<$1% Initial-state radiation 1% Integrated luminosity 1.8% Pileup $<$2% The results are interpreted in the context of the simplified SUSY model shown in Fig. 1. The chargino and second-lightest neutralino are assumed to have the same mass, and the branching fractions for the decays shown are taken to be 100%. Wino-like cross sections are assumed. Cross section limits as a function of the masses of the produced particles are set using a modified frequentist approach at 95% confidence level (), with the criterion and an asymptotic formulation [74, 75, 76]. All signal regions are considered simultaneously and correlations among uncertainties are included. Figure 6 shows the 95% upper limits on the cross section, together with the expected and observed exclusion limits in the $m_{\PSGczDo}$-$m_{\PSGczDt}$ plane for chargino-neutralino production. This analysis excludes charginos with mass below 820for a low-mass LSP, and values of the LSP mass up to approximately 350for a chargino mass near 700. The excluded cross section for models with large mass splitting reaches approximately 5fb. Figure 6: Cross section upper limits calculated with the background estimates and all of the background systematic uncertainties described in Sections 0.5.1 and 0.5.2. The color on the $z$ axis represents the 95% CL upper limit on the cross section calculated at each point in the $m_{\PSGczDo}$-$m_{\PSGczDt}$ plane. The area below the thick black curve (dashed red line) represents the observed (expected) exclusion region at this . The region containing 68% of the distribution of limits expected under the background-only hypothesis is bounded by thin dashed red lines. The thin black lines show the effect of the theoretical uncertainties in the signal cross section. ## 0.7 Summary This paper presents the results of a search for chargino-neutralino production in a final state containing a boson decaying to leptons, a Higgs boson decaying to a bottom quark-antiquark pair, and missing transverse momentum. Expected yields from standard model processes are estimated by extrapolating the yields observed in control regions using transfer factors obtained from simulation. The observed yields agree with those expected from the standard model. The results are interpreted as an exclusion of a simplified model of chargino-neutralino production. In the simplified model, the chargino decays to a boson and a lightest supersymmetric particle (LSP), and the next-to- lightest neutralino decays to a Higgs boson and an LSP. Charginos with mass below 820are excluded at 95% confidence level for an LSP with mass below 200, and values of LSP mass up to approximately 350are excluded for a chargino mass near 700. Relative to the previous result from the CMS Collaboration targeting this signature [12], the sensitivity of the search has been significantly extended. The constraints on the masses of the chargino and LSP exceed those from the previous analysis by nearly 350 and 250, respectively. This represents a factor of 14 reduction in the excluded cross section for models with large mass splittings. Roughly half of this improvement is the result of the four- fold increase in integrated luminosity, with the remainder coming from analysis optimizations such as the inclusion of the tagger and events with $N_{\text{jets}}=3$, as well as finer categorization of events based on made possible by the increased size of the data set. ###### Acknowledgements. We congratulate our colleagues in the CERN accelerator departments for the excellent performance of the LHC and thank the technical and administrative staffs at CERN and at other CMS institutes for their contributions to the success of the CMS effort. In addition, we gratefully acknowledge the computing centers and personnel of the Worldwide LHC Computing Grid and other centers for delivering so effectively the computing infrastructure essential to our analyses. Finally, we acknowledge the enduring support for the construction and operation of the LHC, the CMS detector, and the supporting computing infrastructure provided by the following funding agencies: BMBWF and FWF (Austria); FNRS and FWO (Belgium); CNPq, CAPES, FAPERJ, FAPERGS, and FAPESP (Brazil); MES (Bulgaria); CERN; CAS, MoST, and NSFC (China); MINCIENCIAS (Colombia); MSES and CSF (Croatia); RIF (Cyprus); SENESCYT (Ecuador); MoER, ERC PUT and ERDF (Estonia); Academy of Finland, MEC, and HIP (Finland); CEA and CNRS/IN2P3 (France); BMBF, DFG, and HGF (Germany); GSRT (Greece); NKFIA (Hungary); DAE and DST (India); IPM (Iran); SFI (Ireland); INFN (Italy); MSIP and NRF (Republic of Korea); MES (Latvia); LAS (Lithuania); MOE and UM (Malaysia); BUAP, CINVESTAV, CONACYT, LNS, SEP, and UASLP-FAI (Mexico); MOS (Montenegro); MBIE (New Zealand); PAEC (Pakistan); MSHE and NSC (Poland); FCT (Portugal); JINR (Dubna); MON, RosAtom, RAS, RFBR, and NRC KI (Russia); MESTD (Serbia); SEIDI, CPAN, PCTI, and FEDER (Spain); MOSTR (Sri Lanka); Swiss Funding Agencies (Switzerland); MST (Taipei); ThEPCenter, IPST, STAR, and NSTDA (Thailand); TUBITAK and TAEK (Turkey); NASU (Ukraine); STFC (United Kingdom); DOE and NSF (USA). Individuals have received support from the Marie-Curie program and the European Research Council and Horizon 2020 Grant, contract Nos. 675440, 724704, 752730, 758316, 765710, 824093, and COST Action CA16108 (European Union); the Leventis Foundation; the Alfred P. Sloan Foundation; the Alexander von Humboldt Foundation; the Belgian Federal Science Policy Office; the Fonds pour la Formation à la Recherche dans l’Industrie et dans l’Agriculture (FRIA-Belgium); the Agentschap voor Innovatie door Wetenschap en Technologie (IWT-Belgium); the F.R.S.-FNRS and FWO (Belgium) under the “Excellence of Science – EOS” – be.h project n. 30820817; the Beijing Municipal Science & Technology Commission, No. Z191100007219010; the Ministry of Education, Youth and Sports (MEYS) of the Czech Republic; the Deutsche Forschungsgemeinschaft (DFG), under Germany’s Excellence Strategy – EXC 2121 “Quantum Universe” – 390833306, and under project number 400140256 - GRK2497; the Lendület (“Momentum”) Program and the János Bolyai Research Scholarship of the Hungarian Academy of Sciences, the New National Excellence Program ÚNKP, the NKFIA research grants 123842, 123959, 124845, 124850, 125105, 128713, 128786, and 129058 (Hungary); the Council of Science and Industrial Research, India; the Latvian Council of Science; the Ministry of Science and Higher Education and the National Science Center, contracts Opus 2014/15/B/ST2/03998 and 2015/19/B/ST2/02861 (Poland); the National Priorities Research Program by Qatar National Research Fund; the Ministry of Science and Higher Education, project no. 0723-2020-0041 (Russia); the Programa Estatal de Fomento de la Investigación Científica y Técnica de Excelencia María de Maeztu, grant MDM-2015-0509 and the Programa Severo Ochoa del Principado de Asturias; the Stavros Niarchos Foundation (Greece); the Rachadapisek Sompot Fund for Postdoctoral Fellowship, Chulalongkorn University and the Chulalongkorn Academic into Its 2nd Century Project Advancement Project (Thailand); the Kavli Foundation; the Nvidia Corporation; the SuperMicro Corporation; the Welch Foundation, contract C-1845; and the Weston Havens Foundation (USA). ## References * [1] P. Ramond, “Dual theory for free fermions”, Phys. Rev. D 3 (1971) 2415, 10.1103/PhysRevD.3.2415. * [2] J. Wess and B. Zumino, “Supergauge transformations in four dimensions”, Nucl. Phys. B 70 (1974) 39, 10.1016/0550-3213(74)90355-1. * [3] H. P. Nilles, “Supersymmetry, supergravity and particle physics”, Phys. Rept. 110 (1984) 1, 10.1016/0370-1573(84)90008-5. * [4] B. de Carlos and J. A. Casas, “One-loop analysis of the electroweak breaking in supersymmetric models and the fine tuning problem”, Phys. Lett. B 309 (1993) 320, 10.1016/0370-2693(93)90940-J, arXiv:hep-ph/9303291. * [5] S. Dimopoulos and G. F. Giudice, “Naturalness constraints in supersymmetric theories with nonuniversal soft terms”, Phys. Lett. B 357 (1995) 573, 10.1016/0370-2693(95)00961-J, arXiv:hep-ph/9507282. * [6] G. R. Farrar and P. Fayet, “Phenomenology of the production, decay, and detection of new hadronic states associated with supersymmetry”, Phys. Lett. B 76 (1978) 575, 10.1016/0370-2693(78)90858-4. * [7] J. Alwall, P. Schuster, and N. Toro, “Simplified models for a first characterization of new physics at the LHC”, Phys. Rev. D 79 (2009) 075020, 10.1103/PhysRevD.79.075020, arXiv:0810.3921. * [8] LHC New Physics Working Group, “Simplified models for LHC new physics searches”, J. Phys. G 39 (2012) 105005, 10.1088/0954-3899/39/10/105005, arXiv:1105.2838. * [9] CMS Collaboration, “Interpretation of searches for supersymmetry with simplified models”, Phys. Rev. D 88 (2013) 052017, 10.1103/PhysRevD.88.052017, arXiv:1301.2175. * [10] ATLAS Collaboration, “Search for direct production of electroweakinos in final states with one lepton, missing transverse momentum and a Higgs boson decaying into two b-jets in pp collisions $\sqrt{s}=$ 13 TeV with the ATLAS detector”, Eur. Phys. J. C 80 (2020) 691, 10.1140/epjc/s10052-020-8050-3, arXiv:1909.09226. * [11] ATLAS Collaboration, “Search for the electroweak production of supersymmetric particles in $\sqrt{s}$ = 8 TeV $pp$ collisions with the ATLAS detector”, Phys. Rev. D 93 (2016) 052002, 10.1103/PhysRevD.93.052002, arXiv:1509.07152. * [12] CMS Collaboration, “Search for electroweak production of charginos and neutralinos in WH events in proton-proton collisions at $\sqrt{s}=13$ TeV”, JHEP 11 (2017) 029, 10.1007/JHEP11(2017)029, arXiv:1706.09933. * [13] CMS Collaboration, “Searches for electroweak neutralino and chargino production in channels with Higgs, Z, and W bosons in pp collisions at 8 TeV”, Phys. Rev. D 90 (2014) 092007, 10.1103/PhysRevD.90.092007, arXiv:1409.3168. * [14] CMS Collaboration, “Searches for electroweak production of charginos, neutralinos, and sleptons decaying to leptons and W, Z, and Higgs bosons in pp collisions at 8 TeV”, Eur. Phys. J. C 74 (2014) 3036, 10.1140/epjc/s10052-014-3036-7, arXiv:1405.7570. * [15] CMS Collaboration, “The CMS experiment at the CERN LHC”, JINST 3 (2008) S08004, 10.1088/1748-0221/3/08/S08004. * [16] CMS Collaboration, “Performance of the CMS Level-1 trigger in proton-proton collisions at $\sqrt{s}=13$ TeV”, JINST 15 (2020) P10017, 10.1088/1748-0221/15/10/P10017, arXiv:2006.10165. * [17] CMS Collaboration, “The CMS trigger system”, JINST 12 (2017) P01020, 10.1088/1748-0221/12/01/P01020, arXiv:1609.02366. * [18] J. Alwall et al., “The automated computation of tree-level and next-to-leading order differential cross sections, and their matching to parton shower simulations”, JHEP 07 (2014) 079, 10.1007/JHEP07(2014)079, arXiv:1405.0301. * [19] P. Nason, “A new method for combining NLO QCD with shower Monte Carlo algorithms”, JHEP 11 (2004) 040, 10.1088/1126-6708/2004/11/040, arXiv:hep-ph/0409146. * [20] S. Frixione, P. Nason, and C. Oleari, “Matching NLO QCD computations with parton shower simulations: the method”, JHEP 11 (2007) 070, 10.1088/1126-6708/2007/11/070, arXiv:0709.2092. * [21] S. Alioli, P. Nason, C. Oleari, and E. Re, “A general framework for implementing NLO calculations in shower Monte Carlo programs: the BOX”, JHEP 06 (2010) 043, 10.1007/JHEP06(2010)043, arXiv:1002.2581. * [22] E. Re, “Single-top $\PW\PQt$-channel production matched with parton showers using the POWHEG method”, Eur. Phys. J. C 71 (2011) 1547, 10.1140/epjc/s10052-011-1547-z, arXiv:1009.2450. * [23] NNPDF Collaboration, “Unbiased global determination of parton distributions and their uncertainties at NNLO and at LO”, Nucl. Phys. B 855 (2012) 153, 10.1016/j.nuclphysb.2011.09.024, arXiv:1107.2652. * [24] NNPDF Collaboration, “Parton distributions for the LHC Run II”, JHEP 04 (2015) 040, 10.1007/JHEP04(2015)040, arXiv:1410.8849. * [25] NNPDF Collaboration, “Parton distributions from high-precision collider data”, Eur. Phys. J. C 77 (2017) 663, 10.1140/epjc/s10052-017-5199-5, arXiv:1706.00428. * [26] T. Sjöstrand et al., “An introduction to PYTHIA 8.2”, Comput. Phys. Commun. 191 (2015) 159, 10.1016/j.cpc.2015.01.024, arXiv:1410.3012. * [27] J. Alwall et al., “Comparative study of various algorithms for the merging of parton showers and matrix elements in hadronic collisions”, Eur. Phys. J. C 53 (2008) 473, 10.1140/epjc/s10052-007-0490-5, arXiv:0706.2569. * [28] R. Frederix and S. Frixione, “Merging meets matching in MC@NLO”, JHEP 12 (2012) 061, 10.1007/JHEP12(2012)061, arXiv:1209.6215. * [29] CMS Collaboration, “Event generator tunes obtained from underlying event and multiparton scattering measurements”, Eur. Phys. J. C 76 (2016) 155, 10.1140/epjc/s10052-016-3988-x, arXiv:1512.00815. * [30] CMS Collaboration, “Extraction and validation of a new set of CMS PYTHIA8 tunes from underlying-event measurements”, Eur. Phys. J. C 80 (2020) 4, 10.1140/epjc/s10052-019-7499-4, arXiv:1903.12179. * [31] Collaboration, “ — a simulation toolkit”, Nucl. Instrum. Meth. A 506 (2003) 250, 10.1016/S0168-9002(03)01368-8. * [32] S. Abdullin et al., “The fast simulation of the CMS detector at LHC”, J. Phys. Conf. Ser. 331 (2011) 032049, 10.1088/1742-6596/331/3/032049. * [33] A. Giammanco, “The fast simulation of the CMS experiment”, J. Phys. Conf. Ser. 513 (2014) 022012, 10.1088/1742-6596/513/2/022012. * [34] Y. Li and F. Petriello, “Combining QCD and electroweak corrections to dilepton production in FEWZ”, Phys. Rev. D 86 (2012) 094034, 10.1103/PhysRevD.86.094034, arXiv:1208.5967. * [35] M. Aliev et al., “HATHOR: HAdronic Top and Heavy quarks crOss section calculatoR”, Comput. Phys. Commun. 182 (2011) 1034, 10.1016/j.cpc.2010.12.040, arXiv:1007.1327. * [36] P. Kant et al., “HatHor for single top-quark production: Updated predictions and uncertainty estimates for single top-quark production in hadronic collisions”, Comput. Phys. Commun. 191 (2015) 74, 10.1016/j.cpc.2015.02.001, arXiv:1406.4403. * [37] M. Beneke, P. Falgari, S. Klein, and C. Schwinn, “Hadronic top-quark pair production with NNLL threshold resummation”, Nucl. Phys. B 855 (2012) 695, 10.1016/j.nuclphysb.2011.10.021, arXiv:1109.1536. * [38] M. Cacciari et al., “Top-pair production at hadron colliders with next-to-next-to-leading logarithmic soft-gluon resummation”, Phys. Lett. B 710 (2012) 612, 10.1016/j.physletb.2012.03.013, arXiv:1111.5869. * [39] M. Czakon and A. Mitov, “Top++: A program for the calculation of the top-pair cross-section at hadron colliders”, Comput. Phys. Commun. 185 (2014) 2930, 10.1016/j.cpc.2014.06.021, arXiv:1112.5675. * [40] P. Bärnreuther, M. Czakon, and A. Mitov, “Percent level precision physics at the Tevatron: First genuine NNLO QCD corrections to $q\bar{q}\to t\bar{t}+X$”, Phys. Rev. Lett. 109 (2012) 132001, 10.1103/PhysRevLett.109.132001, arXiv:1204.5201. * [41] M. Czakon and A. Mitov, “NNLO corrections to top-pair production at hadron colliders: the all-fermionic scattering channels”, JHEP 12 (2012) 054, 10.1007/JHEP12(2012)054, arXiv:1207.0236. * [42] M. Czakon and A. Mitov, “NNLO corrections to top pair production at hadron colliders: the quark-gluon reaction”, JHEP 01 (2013) 080, 10.1007/JHEP01(2013)080, arXiv:1210.6832. * [43] M. Czakon, P. Fiedler, and A. Mitov, “Total top-quark pair-production cross section at hadron colliders through $O(\alpS^{4})$”, Phys. Rev. Lett. 110 (2013) 252004, 10.1103/PhysRevLett.110.252004, arXiv:1303.6254. * [44] W. Beenakker, M. Klasen, and Kr “Production of charginos, neutralinos, and sleptons at hadron colliders”,. * [45] J. Debove, B. Fuks, and M. Klasen, “Threshold resummation for gaugino pair production at hadron colliders”, Nuc. Phys. B 842 (2011) 10.1016/j.nuclphysb.2010.08.016, arXiv:1005.2909. * [46] B. Fuks, M. Klasen, D. R. Lamprea, and M. Rothering, “Precision predictions for electroweak superpartner production at hadron colliders with resummino”, Eur. Phys. J. C 73 (2013) 2480, 10.1140/epjc/s10052-013-2480-0, arXiv:1304.0790. * [47] J. Fiaschi and M. Klasen, “Neutralino-chargino pair production at $\mathrm{NLO}\text{+NLL}$ with resummation-improved parton density functions for LHC Run II”, Phys. Rev. D 98 (2018) 055014, 10.1103/PhysRevD.98.055014, arXiv:1805.11322. * [48] LHC Higgs Cross Section Working Group, “Handbook of LHC Higgs cross sections: 4. Deciphering the nature of the Higgs sector”, CERN Report CERN-2017-002-M, 2016. 10.23731/CYRM-2017-002, arXiv:1610.07922. * [49] CMS Collaboration, “Search for direct top squark pair production in events with one lepton, jets, and missing transverse momentum at 13 TeV with the CMS experiment”, JHEP 05 (2020) 032, 10.1007/jhep05(2020)032, arXiv:1912.08887. * [50] CMS Collaboration, “Particle-flow reconstruction and global event description with the CMS detector”, JINST 12 (2017) P10003, 10.1088/1748-0221/12/10/P10003, arXiv:1706.04965. * [51] CMS Collaboration, “Performance of missing transverse momentum reconstruction in proton-proton collisions at $\sqrt{s}=$ 13 TeV using the CMS detector”, JINST 14 (2019) P07004, 10.1088/1748-0221/14/07/P07004, arXiv:1903.06078. * [52] CMS Collaboration, “Electron and photon reconstruction and identification with the CMS experiment at the CERN LHC”, JINST 16 (2021) P05014, 10.1088/1748-0221/16/05/p05014, arXiv:2012.06888. * [53] CMS Collaboration, “Performance of the CMS muon detector and muon reconstruction with proton-proton collisions at $\sqrt{s}=13\TeV$”, JINST 13 (2018) P06015, 10.1088/1748-0221/13/06/P06015, arXiv:1804.04528. * [54] CMS Collaboration, “Reconstruction and identification of $\tau$ lepton decays to hadrons and $\nu$τ at CMS”, JINST 11 (2016) P01019, 10.1088/1748-0221/11/01/P01019, arXiv:1510.07488. * [55] CMS Collaboration, “Performance of reconstruction and identification of $\uptau$ leptons decaying to hadrons and $\nu$τ in pp collisions at $\sqrt{s}=13$ TeV”, JINST 13 (2018) P10005, 10.1088/1748-0221/13/10/p10005, arXiv:1809.02816. * [56] M. Cacciari, G. P. Salam, and G. Soyez, “The anti-$\kt$ jet clustering algorithm”, JHEP 04 (2008) 063, 10.1088/1126-6708/2008/04/063, arXiv:0802.1189. * [57] M. Cacciari, G. P. Salam, and G. Soyez, “FastJet user manual”, Eur. Phys. J. C 72 (2012) 1896, 10.1140/epjc/s10052-012-1896-2, arXiv:1111.6097. * [58] CMS Collaboration, “Determination of jet energy calibration and transverse momentum resolution in CMS”, JINST 6 (2011) P11002, 10.1088/1748-0221/6/11/P11002, arXiv:1107.4277. * [59] CMS Collaboration, “Identification of heavy-flavour jets with the CMS detector in $\Pp\Pp$ collisions at 13 TeV”, JINST 13 (2018) P05011, 10.1088/1748-0221/13/05/P05011, arXiv:1712.07158. * [60] CMS Collaboration, “Identification of heavy, energetic, hadronically decaying particles using machine-learning techniques”, JINST 15 (2020) P06005, 10.1088/1748-0221/15/06/P06005, arXiv:2004.08262. * [61] CMS Collaboration, “Missing transverse energy performance of the CMS detector”, JINST 6 (2011) P09001, 10.1088/1748-0221/6/09/P09001, arXiv:1106.5048. * [62] D. R. Tovey, “On measuring the masses of pair-produced semi-invisibly decaying particles at hadron colliders”, JHEP 04 (2008) 034, 10.1088/1126-6708/2008/04/034, arXiv:0802.2879. * [63] CMS Collaboration, “Observation of Higgs boson decay to bottom quarks”, Phys. Rev. Lett. 121 (2018) 121801, 10.1103/PhysRevLett.121.121801, arXiv:1808.08242. * [64] CMS Collaboration, “Measurements of the pp $\to$ WZ inclusive and differential production cross section and constraints on charged anomalous triple gauge couplings at $\sqrt{s}=$ 13 TeV”, JHEP 04 (2019) 122, 10.1007/JHEP04(2019)122, arXiv:1901.03428. * [65] CMS Collaboration, “W+W- boson pair production in proton-proton collisions at $\sqrt{s}=$ 13 TeV”, Phys. Rev. D 102 (2020) 092001, 10.1103/PhysRevD.102.092001, arXiv:2009.00119. * [66] CMS Collaboration, “Measurements of ${\mathrm{p}}{\mathrm{p}}\rightarrow{\mathrm{Z}}{\mathrm{Z}}$ production cross sections and constraints on anomalous triple gauge couplings at $\sqrt{s}=13\,\text{TeV}$”, Eur. Phys. J. C 81 (2021) 200, 10.1140/epjc/s10052-020-08817-8, arXiv:2009.01186. * [67] CMS Collaboration, “Jet energy scale and resolution performance with 13 TeV data collected by CMS in 2016-2018”, CMS Detector Performance Summary, CMS-DP-2020-019, 2020. * [68] S. Catani, D. de Florian, M. Grazzini, and P. Nason, “Soft gluon resummation for Higgs boson production at hadron colliders”, JHEP 07 (2003) 028, 10.1088/1126-6708/2003/07/028, arXiv:hep-ph/0306211. * [69] M. Cacciari et al., “The cross-section at 1.8 TeV and 1.96 TeV: A study of the systematics due to parton densities and scale dependence”, JHEP 04 (2004) 068, 10.1088/1126-6708/2004/04/068, arXiv:hep-ph/0303085. * [70] A. Kalogeropoulos and J. Alwall, “The SysCalc code: A tool to derive theoretical systematic uncertainties”, 2018. arXiv:1801.08401. * [71] CMS Collaboration, “CMS luminosity measurements for the 2016 data-taking period”, CMS Physics Analysis Summary, CMS-PAS-LUM-17-001, 2017. * [72] CMS Collaboration, “CMS luminosity measurement for the 2017 data-taking period at $\sqrt{s}=13~{}\mathrm{TeV}$”, CMS Physics Analysis Summary, CMS-PAS-LUM-17-004, 2018\. * [73] CMS Collaboration, “CMS luminosity measurement for the 2018 data-taking period at $\sqrt{s}=13~{}\mathrm{TeV}$”, CMS Physics Analysis Summary, CMS-PAS-LUM-18-002, 2019\. * [74] T. Junk, “Confidence level computation for combining searches with small statistics”, Nucl. Instrum. Meth. A 434 (1999) 435, 10.1016/s0168-9002(99)00498-2. * [75] A. L. Read, “Presentation of search results: the $\CL_{s}$ technique”, J. Phys. G 28 (2002) 2693, 10.1088/0954-3899/28/10/313. * [76] G. Cowan, K. Cranmer, E. Gross, and O. Vitells, “Asymptotic formulae for likelihood-based tests of new physics”, Eur. Phys. J. C 71 (2011) 1554, 10.1140/epjc/s10052-011-1554-0, arXiv:1007.1727. [Erratum: 10.1140/epjc/s10052-013-2501-z]. ## .8 The CMS Collaboration Yerevan Physics Institute, Yerevan, Armenia A. Tumasyan Institut für Hochenergiephysik, Wien, Austria W. Adam, J.W. Andrejkovic, T. Bergauer, S. Chatterjee, M. Dragicevic, A. Escalante Del Valle, R. Frühwirth1, M. Jeitler1, N. Krammer, L. Lechner, D. Liko, I. Mikulec, P. Paulitsch, F.M. Pitters, J. Schieck1, R. Schöfbeck, M. Spanring, S. Templ, W. Waltenberger, C.-E. Wulz1 Institute for Nuclear Problems, Minsk, Belarus V. Chekhovsky, A. Litomin, V. Makarenko Universiteit Antwerpen, Antwerpen, Belgium M.R. Darwish2, E.A. De Wolf, X. Janssen, T. Kello3, A. Lelek, H. Rejeb Sfar, P. Van Mechelen, S. Van Putte, N. Van Remortel Vrije Universiteit Brussel, Brussel, Belgium F. Blekman, E.S. Bols, J. D’Hondt, J. De Clercq, M. Delcourt, H. El Faham, S. Lowette, S. Moortgat, A. Morton, D. Müller, A.R. Sahasransu, S. Tavernier, W. Van Doninck, P. Van Mulders Université Libre de Bruxelles, Bruxelles, Belgium D. Beghin, B. Bilin, B. Clerbaux, G. De Lentdecker, L. Favart, A. Grebenyuk, A.K. Kalsi, K. Lee, M. Mahdavikhorrami, I. Makarenko, L. Moureaux, L. Pétré, A. Popov, N. Postiau, E. Starling, L. Thomas, M. Vanden Bemden, C. Vander Velde, P. Vanlaer, D. Vannerom, L. Wezenbeek Ghent University, Ghent, Belgium T. Cornelis, D. Dobur, J. Knolle, L. Lambrecht, G. Mestdach, M. Niedziela, C. Roskas, A. Samalan, K. Skovpen, M. Tytgat, W. Verbeke, B. Vermassen, M. Vit Université Catholique de Louvain, Louvain-la-Neuve, Belgium A. Bethani, G. Bruno, F. Bury, C. Caputo, P. David, C. Delaere, I.S. Donertas, A. Giammanco, K. Jaffel, Sa. Jain, V. Lemaitre, K. Mondal, J. Prisciandaro, A. Taliercio, M. Teklishyn, T.T. Tran, P. Vischia, S. Wertz Centro Brasileiro de Pesquisas Fisicas, Rio de Janeiro, Brazil G.A. Alves, C. Hensel, A. Moraes Universidade do Estado do Rio de Janeiro, Rio de Janeiro, Brazil W.L. Aldá Júnior, M. Alves Gallo Pereira, M. Barroso Ferreira Filho, H. BRANDAO MALBOUISSON, W. Carvalho, J. Chinellato4, E.M. Da Costa, G.G. Da Silveira5, D. De Jesus Damiao, S. Fonseca De Souza, D. Matos Figueiredo, C. Mora Herrera, K. Mota Amarilo, L. Mundim, H. Nogima, P. Rebello Teles, A. Santoro, S.M. Silva Do Amaral, A. Sznajder, M. Thiel, F. Torres Da Silva De Araujo, A. Vilela Pereira Universidade Estadual Paulista a, Universidade Federal do ABC b, São Paulo, Brazil C.A. Bernardesa,a,5, L. Calligarisa, T.R. Fernandez Perez Tomeia, E.M. Gregoresa,b, D.S. Lemosa, P.G. Mercadantea,b, S.F. Novaesa, Sandra S. Padulaa Institute for Nuclear Research and Nuclear Energy, Bulgarian Academy of Sciences, Sofia, Bulgaria A. Aleksandrov, G. Antchev, R. Hadjiiska, P. Iaydjiev, M. Misheva, M. Rodozov, M. Shopova, G. Sultanov University of Sofia, Sofia, Bulgaria A. Dimitrov, T. Ivanov, L. Litov, B. Pavlov, P. Petkov, A. Petrov Beihang University, Beijing, China T. Cheng, Q. Guo, T. Javaid6, M. Mittal, H. Wang, L. Yuan Department of Physics, Tsinghua University, Beijing, China M. Ahmad, G. Bauer, C. Dozen7, Z. Hu, J. Martins8, Y. Wang, K. Yi9,10 Institute of High Energy Physics, Beijing, China E. Chapon, G.M. Chen6, H.S. Chen6, M. Chen, F. Iemmi, A. Kapoor, D. Leggat, H. Liao, Z.-A. LIU6, V. Milosevic, F. Monti, R. Sharma, J. Tao, J. Thomas- wilsker, J. Wang, H. Zhang, S. Zhang6, J. Zhao State Key Laboratory of Nuclear Physics and Technology, Peking University, Beijing, China A. Agapitos, Y. Ban, C. Chen, Q. Huang, A. Levin, Q. Li, X. Lyu, Y. Mao, S.J. Qian, D. Wang, Q. Wang, J. Xiao Sun Yat-Sen University, Guangzhou, China M. Lu, Z. You Institute of Modern Physics and Key Laboratory of Nuclear Physics and Ion-beam Application (MOE) - Fudan University, Shanghai, China X. Gao3, H. Okawa Zhejiang University, Hangzhou, China Z. Lin, M. Xiao Universidad de Los Andes, Bogota, Colombia C. Avila, A. Cabrera, C. Florez, J. Fraga, A. Sarkar, M.A. Segura Delgado Universidad de Antioquia, Medellin, Colombia J. Mejia Guisao, F. Ramirez, J.D. Ruiz Alvarez, C.A. Salazar González University of Split, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Split, Croatia D. Giljanovic, N. Godinovic, D. Lelas, I. Puljak University of Split, Faculty of Science, Split, Croatia Z. Antunovic, M. Kovac, T. Sculac Institute Rudjer Boskovic, Zagreb, Croatia V. Brigljevic, D. Ferencek, D. Majumder, M. Roguljic, A. Starodumov11, T. Susa University of Cyprus, Nicosia, Cyprus A. Attikis, K. Christoforou, E. Erodotou, A. Ioannou, G. Kole, M. Kolosova, S. Konstantinou, J. Mousa, C. Nicolaou, F. Ptochos, P.A. Razis, H. Rykaczewski, H. Saka Charles University, Prague, Czech Republic M. Finger12, M. Finger Jr.12, A. Kveton Escuela Politecnica Nacional, Quito, Ecuador E. Ayala Universidad San Francisco de Quito, Quito, Ecuador E. Carrera Jarrin Academy of Scientific Research and Technology of the Arab Republic of Egypt, Egyptian Network of High Energy Physics, Cairo, Egypt A.A. Abdelalim13,14, E. Salama15,16 Center for High Energy Physics (CHEP-FU), Fayoum University, El-Fayoum, Egypt M.A. Mahmoud, Y. Mohammed National Institute of Chemical Physics and Biophysics, Tallinn, Estonia S. Bhowmik, A. Carvalho Antunes De Oliveira, R.K. Dewanjee, K. Ehataht, M. Kadastik, S. Nandan, C. Nielsen, J. Pata, M. Raidal, L. Tani, C. Veelken Department of Physics, University of Helsinki, Helsinki, Finland P. Eerola, L. Forthomme, H. Kirschenmann, K. Osterberg, M. Voutilainen Helsinki Institute of Physics, Helsinki, Finland S. Bharthuar, E. Brücken, F. Garcia, J. Havukainen, M.S. Kim, R. Kinnunen, T. Lampén, K. Lassila-Perini, S. Lehti, T. Lindén, M. Lotti, L. Martikainen, M. Myllymäki, J. Ott, H. Siikonen, E. Tuominen, J. Tuominiemi Lappeenranta University of Technology, Lappeenranta, Finland P. Luukka, H. Petrow, T. Tuuva IRFU, CEA, Université Paris-Saclay, Gif-sur- Yvette, France C. Amendola, M. Besancon, F. Couderc, M. Dejardin, D. Denegri, J.L. Faure, F. Ferri, S. Ganjour, A. Givernaud, P. Gras, G. Hamel de Monchenault, P. Jarry, B. Lenzi, E. Locci, J. Malcles, J. Rander, A. Rosowsky, M.Ö. Sahin, A. Savoy- Navarro17, M. Titov, G.B. Yu Laboratoire Leprince-Ringuet, CNRS/IN2P3, Ecole Polytechnique, Institut Polytechnique de Paris, Palaiseau, France S. Ahuja, F. Beaudette, M. Bonanomi, A. Buchot Perraguin, P. Busson, A. Cappati, C. Charlot, O. Davignon, B. Diab, G. Falmagne, S. Ghosh, R. Granier de Cassagnac, A. Hakimi, I. Kucher, M. Nguyen, C. Ochando, P. Paganini, J. Rembser, R. Salerno, J.B. Sauvan, Y. Sirois, A. Zabi, A. Zghiche Université de Strasbourg, CNRS, IPHC UMR 7178, Strasbourg, France J.-L. Agram18, J. Andrea, D. Apparu, D. Bloch, G. Bourgatte, J.-M. Brom, E.C. Chabert, C. Collard, D. Darej, J.-C. Fontaine18, U. Goerlach, C. Grimault, A.-C. Le Bihan, E. Nibigira, P. Van Hove Institut de Physique des 2 Infinis de Lyon (IP2I ), Villeurbanne, France E. Asilar, S. Beauceron, C. Bernet, G. Boudoul, C. Camen, A. Carle, N. Chanon, D. Contardo, P. Depasse, H. El Mamouni, J. Fay, S. Gascon, M. Gouzevitch, B. Ille, I.B. Laktineh, H. Lattaud, A. Lesauvage, M. Lethuillier, L. Mirabito, S. Perries, K. Shchablo, V. Sordini, L. Torterotot, G. Touquet, M. Vander Donckt, S. Viret Georgian Technical University, Tbilisi, Georgia A. Khvedelidze12, I. Lomidze, Z. Tsamalaidze12 RWTH Aachen University, I. Physikalisches Institut, Aachen, Germany L. Feld, K. Klein, M. Lipinski, D. Meuser, A. Pauls, M.P. Rauch, N. Röwert, J. Schulz, M. Teroerde RWTH Aachen University, III. Physikalisches Institut A, Aachen, Germany A. Dodonova, D. Eliseev, M. Erdmann, P. Fackeldey, B. Fischer, S. Ghosh, T. Hebbeker, K. Hoepfner, F. Ivone, H. Keller, L. Mastrolorenzo, M. Merschmeyer, A. Meyer, G. Mocellin, S. Mondal, S. Mukherjee, D. Noll, A. Novak, T. Pook, A. Pozdnyakov, Y. Rath, H. Reithler, J. Roemer, A. Schmidt, S.C. Schuler, A. Sharma, L. Vigilante, S. Wiedenbeck, S. Zaleski RWTH Aachen University, III. Physikalisches Institut B, Aachen, Germany C. Dziwok, G. Flügge, W. Haj Ahmad19, O. Hlushchenko, T. Kress, A. Nowack, C. Pistone, O. Pooth, D. Roy, H. Sert, A. Stahl20, T. Ziemons Deutsches Elektronen-Synchrotron, Hamburg, Germany H. Aarup Petersen, M. Aldaya Martin, P. Asmuss, I. Babounikau, S. Baxter, O. Behnke, A. Bermúdez Martínez, S. Bhattacharya, A.A. Bin Anuar, K. Borras21, V. Botta, D. Brunner, A. Campbell, A. Cardini, C. Cheng, F. Colombina, S. Consuegra Rodríguez, G. Correia Silva, V. Danilov, L. Didukh, G. Eckerlin, D. Eckstein, L.I. Estevez Banos, O. Filatov, E. Gallo22, A. Geiser, A. Giraldi, A. Grohsjean, M. Guthoff, A. Jafari23, N.Z. Jomhari, H. Jung, A. Kasem21, M. Kasemann, H. Kaveh, C. Kleinwort, D. Krücker, W. Lange, J. Lidrych, K. Lipka, W. Lohmann24, R. Mankel, I.-A. Melzer-Pellmann, J. Metwally, A.B. Meyer, M. Meyer, J. Mnich, A. Mussgiller, Y. Otarid, D. Pérez Adán, D. Pitzl, A. Raspereza, B. Ribeiro Lopes, J. Rübenach, A. Saggio, A. Saibel, M. Savitskyi, M. Scham, V. Scheurer, C. Schwanenberger22, A. Singh, R.E. Sosa Ricardo, D. Stafford, N. Tonon, O. Turkot, M. Van De Klundert, R. Walsh, D. Walter, Y. Wen, K. Wichmann, L. Wiens, C. Wissing, S. Wuchterl University of Hamburg, Hamburg, Germany R. Aggleton, S. Albrecht, S. Bein, L. Benato, A. Benecke, P. Connor, K. De Leo, M. Eich, F. Feindt, A. Fröhlich, C. Garbers, E. Garutti, P. Gunnellini, J. Haller, A. Hinzmann, G. Kasieczka, R. Klanner, R. Kogler, T. Kramer, V. Kutzner, J. Lange, T. Lange, A. Lobanov, A. Malara, A. Nigamova, K.J. Pena Rodriguez, O. Rieger, P. Schleper, M. Schröder, J. Schwandt, D. Schwarz, J. Sonneveld, H. Stadie, G. Steinbrück, A. Tews, B. Vormwald, I. Zoi Karlsruher Institut fuer Technologie, Karlsruhe, Germany J. Bechtel, T. Berger, E. Butz, R. Caspart, T. Chwalek, W. De Boer${}^{\textrm{\textdagger}}$, A. Dierlamm, A. Droll, K. El Morabit, N. Faltermann, M. Giffels, J.o. Gosewisch, A. Gottmann, F. Hartmann20, C. Heidecker, U. Husemann, I. Katkov25, P. Keicher, R. Koppenhöfer, S. Maier, M. Metzler, S. Mitra, Th. Müller, M. Neukum, A. Nürnberg, G. Quast, K. Rabbertz, J. Rauser, D. Savoiu, M. Schnepf, D. Seith, I. Shvetsov, H.J. Simonis, R. Ulrich, J. Van Der Linden, R.F. Von Cube, M. Wassmer, M. Weber, S. Wieland, R. Wolf, S. Wozniewski, S. Wunsch Institute of Nuclear and Particle Physics (INPP), NCSR Demokritos, Aghia Paraskevi, Greece G. Anagnostou, G. Daskalakis, T. Geralis, A. Kyriakis, D. Loukas, A. Stakia National and Kapodistrian University of Athens, Athens, Greece M. Diamantopoulou, D. Karasavvas, G. Karathanasis, P. Kontaxakis, C.K. Koraka, A. Manousakis-katsikakis, A. Panagiotou, I. Papavergou, N. Saoulidou, K. Theofilatos, E. Tziaferi, K. Vellidis, E. Vourliotis National Technical University of Athens, Athens, Greece G. Bakas, K. Kousouris, I. Papakrivopoulos, G. Tsipolitis, A. Zacharopoulou University of Ioánnina, Ioánnina, Greece I. Evangelou, C. Foudas, P. Gianneios, P. Katsoulis, P. Kokkas, N. Manthos, I. Papadopoulos, J. Strologas MTA-ELTE Lendület CMS Particle and Nuclear Physics Group, Eötvös Loránd University, Budapest, Hungary M. Csanad, K. Farkas, M.M.A. Gadallah26, S. Lökös27, P. Major, K. Mandal, A. Mehta, G. Pasztor, A.J. Rádl, O. Surányi, G.I. Veres Wigner Research Centre for Physics, Budapest, Hungary M. Bartók28, G. Bencze, C. Hajdu, D. Horvath29, F. Sikler, V. Veszpremi, G. Vesztergombi${}^{\textrm{\textdagger}}$ Institute of Nuclear Research ATOMKI, Debrecen, Hungary S. Czellar, J. Karancsi28, J. Molnar, Z. Szillasi, D. Teyssier Institute of Physics, University of Debrecen, Debrecen, Hungary P. Raics, Z.L. Trocsanyi30, B. Ujvari Karoly Robert Campus, MATE Institute of Technology T. Csorgo31, F. Nemes31, T. Novak Indian Institute of Science (IISc), Bangalore, India J.R. Komaragiri, D. Kumar, L. Panwar, P.C. Tiwari National Institute of Science Education and Research, HBNI, Bhubaneswar, India S. Bahinipati32, C. Kar, P. Mal, T. Mishra, V.K. Muraleedharan Nair Bindhu33, A. Nayak33, P. Saha, N. Sur, S.K. Swain, D. Vats33 Panjab University, Chandigarh, India S. Bansal, S.B. Beri, V. Bhatnagar, G. Chaudhary, S. Chauhan, N. Dhingra34, R. Gupta, A. Kaur, M. Kaur, S. Kaur, P. Kumari, M. Meena, K. Sandeep, J.B. Singh, A.K. Virdi University of Delhi, Delhi, India A. Ahmed, A. Bhardwaj, B.C. Choudhary, M. Gola, S. Keshri, A. Kumar, M. Naimuddin, P. Priyanka, K. Ranjan, A. Shah Saha Institute of Nuclear Physics, HBNI, Kolkata, India M. Bharti35, R. Bhattacharya, S. Bhattacharya, D. Bhowmik, S. Dutta, S. Dutta, B. Gomber36, M. Maity37, P. Palit, P.K. Rout, G. Saha, B. Sahu, S. Sarkar, M. Sharan, B. Singh35, S. Thakur35 Indian Institute of Technology Madras, Madras, India P.K. Behera, S.C. Behera, P. Kalbhor, A. Muhammad, R. Pradhan, P.R. Pujahari, A. Sharma, A.K. Sikdar Bhabha Atomic Research Centre, Mumbai, India D. Dutta, V. Jha, V. Kumar, D.K. Mishra, K. Naskar38, P.K. Netrakanti, L.M. Pant, P. Shukla Tata Institute of Fundamental Research-A, Mumbai, India T. Aziz, S. Dugad, M. Kumar, U. Sarkar Tata Institute of Fundamental Research-B, Mumbai, India S. Banerjee, R. Chudasama, M. Guchait, S. Karmakar, S. Kumar, G. Majumder, K. Mazumdar, S. Mukherjee Indian Institute of Science Education and Research (IISER), Pune, India K. Alpana, S. Dube, B. Kansal, A. Laha, S. Pandey, A. Rane, A. Rastogi, S. Sharma Department of Physics, Isfahan University of Technology, Isfahan, Iran H. Bakhshiansohi39, M. Zeinali40 Institute for Research in Fundamental Sciences (IPM), Tehran, Iran S. Chenarani41, S.M. Etesami, M. Khakzad, M. Mohammadi Najafabadi University College Dublin, Dublin, Ireland M. Grunewald INFN Sezione di Bari a, Università di Bari b, Politecnico di Bari c, Bari, Italy M. Abbresciaa,b, R. Alya,b,42, C. Arutaa,b, A. Colaleoa, D. Creanzaa,c, N. De Filippisa,c, M. De Palmaa,b, A. Di Florioa,b, A. Di Pilatoa,b, W. Elmetenaweea,b, L. Fiorea, A. Gelmia,b, M. Gula, G. Iasellia,c, M. Incea,b, S. Lezkia,b, G. Maggia,c, M. Maggia, I. Margjekaa,b, V. Mastrapasquaa,b, J.A. Merlina, S. Mya,b, S. Nuzzoa,b, A. Pellecchiaa,b, A. Pompilia,b, G. Pugliesea,c, A. Ranieria, G. Selvaggia,b, L. Silvestrisa, F.M. Simonea,b, R. Vendittia, P. Verwilligena INFN Sezione di Bologna a, Università di Bologna b, Bologna, Italy G. Abbiendia, C. Battilanaa,b, D. Bonacorsia,b, L. Borgonovia, L. Brigliadoria, R. Campaninia,b, P. Capiluppia,b, A. Castroa,b, F.R. Cavalloa, M. Cuffiania,b, G.M. Dallavallea, T. Diotalevia,b, F. Fabbria, A. Fanfania,b, P. Giacomellia, L. Giommia,b, C. Grandia, L. Guiduccia,b, S. Lo Meoa,43, L. Lunertia,b, S. Marcellinia, G. Masettia, F.L. Navarriaa,b, A. Perrottaa, F. Primaveraa,b, A.M. Rossia,b, T. Rovellia,b, G.P. Sirolia,b INFN Sezione di Catania a, Università di Catania b, Catania, Italy S. Albergoa,b,44, S. Costaa,b,44, A. Di Mattiaa, R. Potenzaa,b, A. Tricomia,b,44, C. Tuvea,b INFN Sezione di Firenze a, Università di Firenze b, Firenze, Italy G. Barbaglia, A. Cassesea, R. Ceccarellia,b, V. Ciullia,b, C. Civininia, R. D’Alessandroa,b, E. Focardia,b, G. Latinoa,b, P. Lenzia,b, M. Lizzoa,b, M. Meschinia, S. Paolettia, R. Seiditaa,b, G. Sguazzonia, L. Viliania INFN Laboratori Nazionali di Frascati, Frascati, Italy L. Benussi, S. Bianco, D. Piccolo INFN Sezione di Genova a, Università di Genova b, Genova, Italy M. Bozzoa,b, F. Ferroa, R. Mulargiaa,b, E. Robuttia, S. Tosia,b INFN Sezione di Milano-Bicocca a, Università di Milano-Bicocca b, Milano, Italy A. Benagliaa, F. Brivioa,b, F. Cetorellia,b, V. Cirioloa,b,20, F. De Guioa,b, M.E. Dinardoa,b, P. Dinia, S. Gennaia, A. Ghezzia,b, P. Govonia,b, L. Guzzia,b, M. Malbertia, S. Malvezzia, A. Massironia, D. Menascea, L. Moronia, M. Paganonia,b, D. Pedrinia, S. Ragazzia,b, N. Redaellia, T. Tabarelli de Fatisa,b, D. Valsecchia,b,20, D. Zuoloa,b INFN Sezione di Napoli a, Università di Napoli ’Federico II’ b, Napoli, Italy, Università della Basilicata c, Potenza, Italy, Università G. Marconi d, Roma, Italy S. Buontempoa, F. Carnevalia,b, N. Cavalloa,c, A. De Iorioa,b, F. Fabozzia,c, A.O.M. Iorioa,b, L. Listaa,b, S. Meolaa,d,20, P. Paoluccia,20, B. Rossia, C. Sciaccaa,b INFN Sezione di Padova a, Università di Padova b, Padova, Italy, Università di Trento c, Trento, Italy P. Azzia, N. Bacchettaa, D. Biselloa,b, P. Bortignona, A. Bragagnoloa,b, R. Carlina,b, P. Checchiaa, T. Dorigoa, U. Dossellia, F. Gasparinia,b, U. Gasparinia,b, S.Y. Hoha,b, L. Layera,45, M. Margonia,b, A.T. Meneguzzoa,b, J. Pazzinia,b, M. Presillaa,b, P. Ronchesea,b, R. Rossina,b, F. Simonettoa,b, G. Stronga, M. Tosia,b, H. YARARa,b, M. Zanettia,b, P. Zottoa,b, A. Zucchettaa,b, G. Zumerlea,b INFN Sezione di Pavia a, Università di Pavia b, Pavia, Italy C. Aime‘a,b, A. Braghieria, S. Calzaferria,b, D. Fiorinaa,b, P. Montagnaa,b, S.P. Rattia,b, V. Rea, C. Riccardia,b, P. Salvinia, I. Vaia, P. Vituloa,b INFN Sezione di Perugia a, Università di Perugia b, Perugia, Italy P. Asenova,46, G.M. Bileia, D. Ciangottinia,b, L. Fanòa,b, P. Laricciaa,b, M. Magherinib, G. Mantovania,b, V. Mariania,b, M. Menichellia, F. Moscatellia,46, A. Piccinellia,b, A. Rossia,b, A. Santocchiaa,b, D. Spigaa, T. Tedeschia,b INFN Sezione di Pisa a, Università di Pisa b, Scuola Normale Superiore di Pisa c, Pisa Italy, Università di Siena d, Siena, Italy P. Azzurria, G. Bagliesia, V. Bertacchia,c, L. Bianchinia, T. Boccalia, E. Bossinia,b, R. Castaldia, M.A. Cioccia,b, V. D’Amantea,d, R. Dell’Orsoa, M.R. Di Domenicoa,d, S. Donatoa, A. Giassia, F. Ligabuea,c, E. Mancaa,c, G. Mandorlia,c, A. Messineoa,b, F. Pallaa, S. Paroliaa,b, G. Ramirez-Sancheza,c, A. Rizzia,b, G. Rolandia,c, S. Roy Chowdhurya,c, A. Scribanoa, N. Shafieia,b, P. Spagnoloa, R. Tenchinia, G. Tonellia,b, N. Turinia,d, A. Venturia, P.G. Verdinia INFN Sezione di Roma a, Sapienza Università di Roma b, Rome, Italy M. Campanaa,b, F. Cavallaria, M. Cipriania,b, D. Del Rea,b, E. Di Marcoa, M. Diemoza, E. Longoa,b, P. Meridiania, G. Organtinia,b, F. Pandolfia, R. Paramattia,b, C. Quarantaa,b, S. Rahatloua,b, C. Rovellia, F. Santanastasioa,b, L. Soffia, R. Tramontanoa,b INFN Sezione di Torino a, Università di Torino b, Torino, Italy, Università del Piemonte Orientale c, Novara, Italy N. Amapanea,b, R. Arcidiaconoa,c, S. Argiroa,b, M. Arneodoa,c, N. Bartosika, R. Bellana,b, A. Belloraa,b, J. Berenguer Antequeraa,b, C. Biinoa, N. Cartigliaa, S. Comettia, M. Costaa,b, R. Covarellia,b, N. Demariaa, B. Kiania,b, F. Leggera, C. Mariottia, S. Masellia, E. Migliorea,b, E. Monteila,b, M. Montenoa, M.M. Obertinoa,b, G. Ortonaa, L. Pachera,b, N. Pastronea, M. Pelliccionia, G.L. Pinna Angionia,b, M. Ruspaa,c, K. Shchelinaa,b, F. Sivieroa,b, V. Solaa, A. Solanoa,b, D. Soldia,b, A. Staianoa, M. Tornagoa,b, D. Trocinoa,b, A. Vagnerini INFN Sezione di Trieste a, Università di Trieste b, Trieste, Italy S. Belfortea, V. Candelisea,b, M. Casarsaa, F. Cossuttia, A. Da Rolda,b, G. Della Riccaa,b, G. Sorrentinoa,b, F. Vazzolera,b Kyungpook National University, Daegu, Korea S. Dogra, C. Huh, B. Kim, D.H. Kim, G.N. Kim, J. Kim, J. Lee, S.W. Lee, C.S. Moon, Y.D. Oh, S.I. Pak, B.C. Radburn-Smith, S. Sekmen, Y.C. Yang Chonnam National University, Institute for Universe and Elementary Particles, Kwangju, Korea H. Kim, D.H. Moon Hanyang University, Seoul, Korea B. Francois, T.J. Kim, J. Park Korea University, Seoul, Korea S. Cho, S. Choi, Y. Go, B. Hong, K. Lee, K.S. Lee, J. Lim, J. Park, S.K. Park, J. Yoo Kyung Hee University, Department of Physics, Seoul, Republic of Korea J. Goh, A. Gurtu Sejong University, Seoul, Korea H.S. Kim, Y. Kim Seoul National University, Seoul, Korea J. Almond, J.H. Bhyun, J. Choi, S. Jeon, J. Kim, J.S. Kim, S. Ko, H. Kwon, H. Lee, S. Lee, B.H. Oh, M. Oh, S.B. Oh, H. Seo, U.K. Yang, I. Yoon University of Seoul, Seoul, Korea W. Jang, D. Jeon, D.Y. Kang, Y. Kang, J.H. Kim, S. Kim, B. Ko, J.S.H. Lee, Y. Lee, I.C. Park, Y. Roh, M.S. Ryu, D. Song, I.J. Watson, S. Yang Yonsei University, Department of Physics, Seoul, Korea S. Ha, H.D. Yoo Sungkyunkwan University, Suwon, Korea M. Choi, Y. Jeong, H. Lee, Y. Lee, I. Yu College of Engineering and Technology, American University of the Middle East (AUM), Egaila, Kuwait T. Beyrouthy, Y. Maghrbi Riga Technical University, Riga, Latvia T. Torims, V. Veckalns47 Vilnius University, Vilnius, Lithuania M. Ambrozas, A. Juodagalvis, A. Rinkevicius, G. Tamulaitis National Centre for Particle Physics, Universiti Malaya, Kuala Lumpur, Malaysia N. Bin Norjoharuddeen, W.A.T. Wan Abdullah, M.N. Yusli, Z. Zolkapli Universidad de Sonora (UNISON), Hermosillo, Mexico J.F. Benitez, A. Castaneda Hernandez, M. León Coello, J.A. Murillo Quijada, A. Sehrawat, L. Valencia Palomo Centro de Investigacion y de Estudios Avanzados del IPN, Mexico City, Mexico G. Ayala, H. Castilla-Valdez, E. De La Cruz-Burelo, I. Heredia-De La Cruz48, R. Lopez-Fernandez, C.A. Mondragon Herrera, D.A. Perez Navarro, A. Sanchez- Hernandez Universidad Iberoamericana, Mexico City, Mexico S. Carrillo Moreno, C. Oropeza Barrera, M. Ramirez-Garcia, F. Vazquez Valencia Benemerita Universidad Autonoma de Puebla, Puebla, Mexico I. Pedraza, H.A. Salazar Ibarguen, C. Uribe Estrada University of Montenegro, Podgorica, Montenegro J. Mijuskovic49, N. Raicevic University of Auckland, Auckland, New Zealand D. Krofcheck University of Canterbury, Christchurch, New Zealand S. Bheesette, P.H. Butler National Centre for Physics, Quaid-I-Azam University, Islamabad, Pakistan A. Ahmad, M.I. Asghar, A. Awais, M.I.M. Awan, H.R. Hoorani, W.A. Khan, M.A. Shah, M. Shoaib, M. Waqas AGH University of Science and Technology Faculty of Computer Science, Electronics and Telecommunications, Krakow, Poland V. Avati, L. Grzanka, M. Malawski National Centre for Nuclear Research, Swierk, Poland H. Bialkowska, M. Bluj, B. Boimska, M. Górski, M. Kazana, M. Szleper, P. Zalewski Institute of Experimental Physics, Faculty of Physics, University of Warsaw, Warsaw, Poland K. Bunkowski, K. Doroba, A. Kalinowski, M. Konecki, J. Krolikowski, M. Walczak Laboratório de Instrumentação e Física Experimental de Partículas, Lisboa, Portugal M. Araujo, P. Bargassa, D. Bastos, A. Boletti, P. Faccioli, M. Gallinaro, J. Hollar, N. Leonardo, T. Niknejad, M. Pisano, J. Seixas, O. Toldaiev, J. Varela Joint Institute for Nuclear Research, Dubna, Russia S. Afanasiev, D. Budkouski, I. Golutvin, I. Gorbunov, V. Karjavine, V. Korenkov, A. Lanev, A. Malakhov, V. Matveev50,51, V. Palichik, V. Perelygin, M. Savina, D. Seitova, V. Shalaev, S. Shmatov, S. Shulha, V. Smirnov, O. Teryaev, N. Voytishin, B.S. Yuldashev52, A. Zarubin, I. Zhizhin Petersburg Nuclear Physics Institute, Gatchina (St. Petersburg), Russia G. Gavrilov, V. Golovtcov, Y. Ivanov, V. Kim53, E. Kuznetsova54, V. Murzin, V. Oreshkin, I. Smirnov, D. Sosnov, V. Sulimov, L. Uvarov, S. Volkov, A. Vorobyev Institute for Nuclear Research, Moscow, Russia Yu. Andreev, A. Dermenev, S. Gninenko, N. Golubev, A. Karneyeu, D. Kirpichnikov, M. Kirsanov, N. Krasnikov, A. Pashenkov, G. Pivovarov, D. Tlisov${}^{\textrm{\textdagger}}$, A. Toropin Institute for Theoretical and Experimental Physics named by A.I. Alikhanov of NRC ‘Kurchatov Institute’, Moscow, Russia V. Epshteyn, V. Gavrilov, N. Lychkovskaya, A. Nikitenko55, V. Popov, A. Spiridonov, A. Stepennov, M. Toms, E. Vlasov, A. Zhokin Moscow Institute of Physics and Technology, Moscow, Russia T. Aushev National Research Nuclear University ’Moscow Engineering Physics Institute’ (MEPhI), Moscow, Russia M. Chadeeva56, A. Oskin, P. Parygin, E. Popova, V. Rusinov P.N. Lebedev Physical Institute, Moscow, Russia V. Andreev, M. Azarkin, I. Dremin, M. Kirakosyan, A. Terkulov Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow, Russia A. Belyaev, E. Boos, M. Dubinin57, L. Dudko, A. Ershov, A. Gribushin, V. Klyukhin, O. Kodolova, I. Lokhtin, S. Obraztsov, S. Petrushanko, V. Savrin, A. Snigirev Novosibirsk State University (NSU), Novosibirsk, Russia V. Blinov58, T. Dimova58, L. Kardapoltsev58, A. Kozyrev58, I. Ovtin58, Y. Skovpen58 Institute for High Energy Physics of National Research Centre ‘Kurchatov Institute’, Protvino, Russia I. Azhgirey, I. Bayshev, D. Elumakhov, V. Kachanov, D. Konstantinov, P. Mandrik, V. Petrov, R. Ryutin, S. Slabospitskii, A. Sobol, S. Troshin, N. Tyurin, A. Uzunian, A. Volkov National Research Tomsk Polytechnic University, Tomsk, Russia A. Babaev, V. Okhotnikov Tomsk State University, Tomsk, Russia V. Borshch, V. Ivanchenko, E. Tcherniaev University of Belgrade: Faculty of Physics and VINCA Institute of Nuclear Sciences, Belgrade, Serbia P. Adzic59, M. Dordevic, P. Milenovic, J. Milosevic Centro de Investigaciones Energéticas Medioambientales y Tecnológicas (CIEMAT), Madrid, Spain M. Aguilar-Benitez, J. Alcaraz Maestre, A. Álvarez Fernández, I. Bachiller, M. Barrio Luna, Cristina F. Bedoya, C.A. Carrillo Montoya, M. Cepeda, M. Cerrada, N. Colino, B. De La Cruz, A. Delgado Peris, J.P. Fernández Ramos, J. Flix, M.C. Fouz, O. Gonzalez Lopez, S. Goy Lopez, J.M. Hernandez, M.I. Josa, J. León Holgado, D. Moran, Á. Navarro Tobar, A. Pérez-Calero Yzquierdo, J. Puerta Pelayo, I. Redondo, L. Romero, S. Sánchez Navas, L. Urda Gómez, C. Willmott Universidad Autónoma de Madrid, Madrid, Spain J.F. de Trocóniz, R. Reyes-Almanza Universidad de Oviedo, Instituto Universitario de Ciencias y Tecnologías Espaciales de Asturias (ICTEA), Oviedo, Spain B. Alvarez Gonzalez, J. Cuevas, C. Erice, J. Fernandez Menendez, S. Folgueras, I. Gonzalez Caballero, J.R. González Fernández, E. Palencia Cortezon, C. Ramón Álvarez, J. Ripoll Sau, V. Rodríguez Bouza, A. Trapote, N. Trevisani Instituto de Física de Cantabria (IFCA), CSIC-Universidad de Cantabria, Santander, Spain J.A. Brochero Cifuentes, I.J. Cabrillo, A. Calderon, J. Duarte Campderros, M. Fernandez, C. Fernandez Madrazo, P.J. Fernández Manteca, A. García Alonso, G. Gomez, C. Martinez Rivero, P. Martinez Ruiz del Arbol, F. Matorras, P. Matorras Cuevas, J. Piedra Gomez, C. Prieels, T. Rodrigo, A. Ruiz-Jimeno, L. Scodellaro, I. Vila, J.M. Vizan Garcia University of Colombo, Colombo, Sri Lanka MK Jayananda, B. Kailasapathy60, D.U.J. Sonnadara, DDC Wickramarathna University of Ruhuna, Department of Physics, Matara, Sri Lanka W.G.D. Dharmaratna, K. Liyanage, N. Perera, N. Wickramage CERN, European Organization for Nuclear Research, Geneva, Switzerland T.K. Aarrestad, D. Abbaneo, J. Alimena, E. Auffray, G. Auzinger, J. Baechler, P. Baillon${}^{\textrm{\textdagger}}$, D. Barney, J. Bendavid, M. Bianco, A. Bocci, T. Camporesi, M. Capeans Garrido, G. Cerminara, S.S. Chhibra, L. Cristella, D. d’Enterria, A. Dabrowski, N. Daci, A. David, A. De Roeck, M.M. Defranchis, M. Deile, M. Dobson, M. Dünser, N. Dupont, A. Elliott-Peisert, N. Emriskova, F. Fallavollita61, D. Fasanella, S. Fiorendi, A. Florent, G. Franzoni, W. Funk, S. Giani, D. Gigi, K. Gill, F. Glege, L. Gouskos, M. Haranko, J. Hegeman, Y. Iiyama, V. Innocente, T. James, P. Janot, J. Kaspar, J. Kieseler, M. Komm, N. Kratochwil, C. Lange, S. Laurila, P. Lecoq, K. Long, C. Lourenço, L. Malgeri, S. Mallios, M. Mannelli, A.C. Marini, F. Meijers, S. Mersi, E. Meschi, F. Moortgat, M. Mulders, S. Orfanelli, L. Orsini, F. Pantaleo, L. Pape, E. Perez, M. Peruzzi, A. Petrilli, G. Petrucciani, A. Pfeiffer, M. Pierini, D. Piparo, M. Pitt, H. Qu, T. Quast, D. Rabady, A. Racz, G. Reales Gutiérrez, M. Rieger, M. Rovere, H. Sakulin, J. Salfeld-Nebgen, S. Scarfi, C. Schäfer, C. Schwick, M. Selvaggi, A. Sharma, P. Silva, W. Snoeys, P. Sphicas62, S. Summers, V.R. Tavolaro, D. Treille, A. Tsirou, G.P. Van Onsem, M. Verzetti, J. Wanczyk63, K.A. Wozniak, W.D. Zeuner Paul Scherrer Institut, Villigen, Switzerland L. Caminada64, A. Ebrahimi, W. Erdmann, R. Horisberger, Q. Ingram, H.C. Kaestli, D. Kotlinski, U. Langenegger, M. Missiroli, T. Rohe ETH Zurich - Institute for Particle Physics and Astrophysics (IPA), Zurich, Switzerland K. Androsov63, M. Backhaus, P. Berger, A. Calandri, N. Chernyavskaya, A. De Cosa, G. Dissertori, M. Dittmar, M. Donegà, C. Dorfer, F. Eble, K. Gedia, F. Glessgen, T.A. Gómez Espinosa, C. Grab, D. Hits, W. Lustermann, A.-M. Lyon, R.A. Manzoni, C. Martin Perez, M.T. Meinhard, F. Nessi-Tedaldi, J. Niedziela, F. Pauss, V. Perovic, S. Pigazzini, M.G. Ratti, M. Reichmann, C. Reissel, T. Reitenspiess, B. Ristic, D. Ruini, D.A. Sanz Becerra, M. Schönenberger, V. Stampf, J. Steggemann63, R. Wallny, D.H. Zhu Universität Zürich, Zurich, Switzerland C. Amsler65, P. Bärtschi, C. Botta, D. Brzhechko, M.F. Canelli, K. Cormier, A. De Wit, R. Del Burgo, J.K. Heikkilä, M. Huwiler, A. Jofrehei, B. Kilminster, S. Leontsinis, A. Macchiolo, P. Meiring, V.M. Mikuni, U. Molinatti, I. Neutelings, A. Reimers, P. Robmann, S. Sanchez Cruz, K. Schweiger, Y. Takahashi National Central University, Chung-Li, Taiwan C. Adloff66, C.M. Kuo, W. Lin, A. Roy, T. Sarkar37, S.S. Yu National Taiwan University (NTU), Taipei, Taiwan L. Ceard, Y. Chao, K.F. Chen, P.H. Chen, W.-S. Hou, Y.y. Li, R.-S. Lu, E. Paganis, A. Psallidas, A. Steen, H.y. Wu, E. Yazgan, P.r. Yu Chulalongkorn University, Faculty of Science, Department of Physics, Bangkok, Thailand B. Asavapibhop, C. Asawatangtrakuldee, N. Srimanobhas Çukurova University, Physics Department, Science and Art Faculty, Adana, Turkey F. Boran, S. Damarseckin67, Z.S. Demiroglu, F. Dolek, I. Dumanoglu68, E. Eskut, Y. Guler, E. Gurpinar Guler69, I. Hos70, C. Isik, O. Kara, A. Kayis Topaksu, U. Kiminsu, G. Onengut, K. Ozdemir71, A. Polatoz, A.E. Simsek, B. Tali72, U.G. Tok, S. Turkcapar, I.S. Zorbakir, C. Zorbilmez Middle East Technical University, Physics Department, Ankara, Turkey B. Isildak73, G. Karapinar74, K. Ocalan75, M. Yalvac76 Bogazici University, Istanbul, Turkey B. Akgun, I.O. Atakisi, E. Gülmez, M. Kaya77, O. Kaya78, Ö. Özçelik, S. Tekten79, E.A. Yetkin80 Istanbul Technical University, Istanbul, Turkey A. Cakir, K. Cankocak68, Y. Komurcu, S. Sen81 Istanbul University, Istanbul, Turkey S. Cerci72, B. Kaynak, S. Ozkorucuklu, D. Sunar Cerci72 Institute for Scintillation Materials of National Academy of Science of Ukraine, Kharkov, Ukraine B. Grynyov National Scientific Center, Kharkov Institute of Physics and Technology, Kharkov, Ukraine L. Levchuk University of Bristol, Bristol, United Kingdom D. Anthony, E. Bhal, S. Bologna, J.J. Brooke, A. Bundock, E. Clement, D. Cussans, H. Flacher, J. Goldstein, G.P. Heath, H.F. Heath, M.l. Holmberg82, L. Kreczko, B. Krikler, S. Paramesvaran, S. Seif El Nasr-Storey, V.J. Smith, N. Stylianou83, K. Walkingshaw Pass, R. White Rutherford Appleton Laboratory, Didcot, United Kingdom K.W. Bell, A. Belyaev84, C. Brew, R.M. Brown, D.J.A. Cockerill, C. Cooke, K.V. Ellis, K. Harder, S. Harper, J. Linacre, K. Manolopoulos, D.M. Newbold, E. Olaiya, D. Petyt, T. Reis, T. Schuh, C.H. Shepherd-Themistocleous, I.R. Tomalin, T. Williams Imperial College, London, United Kingdom R. Bainbridge, P. Bloch, S. Bonomally, J. Borg, S. Breeze, O. Buchmuller, V. Cepaitis, G.S. Chahal85, D. Colling, P. Dauncey, G. Davies, M. Della Negra, S. Fayer, G. Fedi, G. Hall, M.H. Hassanshahi, G. Iles, J. Langford, L. Lyons, A.-M. Magnan, S. Malik, A. Martelli, D.G. Monk, J. Nash86, M. Pesaresi, D.M. Raymond, A. Richards, A. Rose, E. Scott, C. Seez, A. Shtipliyski, A. Tapper, K. Uchida, T. Virdee20, M. Vojinovic, N. Wardle, S.N. Webb, D. Winterbottom, A.G. Zecchinelli Brunel University, Uxbridge, United Kingdom K. Coldham, J.E. Cole, A. Khan, P. Kyberd, I.D. Reid, L. Teodorescu, S. Zahid Baylor University, Waco, USA S. Abdullin, A. Brinkerhoff, B. Caraway, J. Dittmann, K. Hatakeyama, A.R. Kanuganti, B. McMaster, N. Pastika, M. Saunders, S. Sawant, C. Sutantawibul, J. Wilson Catholic University of America, Washington, DC, USA R. Bartek, A. Dominguez, R. Uniyal, A.M. Vargas Hernandez The University of Alabama, Tuscaloosa, USA A. Buccilli, S.I. Cooper, D. Di Croce, S.V. Gleyzer, C. Henderson, C.U. Perez, P. Rumerio87, C. West Boston University, Boston, USA A. Akpinar, A. Albert, D. Arcaro, C. Cosby, Z. Demiragli, E. Fontanesi, D. Gastler, J. Rohlf, K. Salyer, D. Sperka, D. Spitzbart, I. Suarez, A. Tsatsos, S. Yuan, D. Zou Brown University, Providence, USA G. Benelli, B. Burkle, X. Coubez21, D. Cutts, M. Hadley, U. Heintz, J.M. Hogan88, G. Landsberg, K.T. Lau, M. Lukasik, J. Luo, M. Narain, S. Sagir89, E. Usai, W.Y. Wong, X. Yan, D. Yu, W. Zhang University of California, Davis, Davis, USA J. Bonilla, C. Brainerd, R. Breedon, M. Calderon De La Barca Sanchez, M. Chertok, J. Conway, P.T. Cox, R. Erbacher, G. Haza, F. Jensen, O. Kukral, R. Lander, M. Mulhearn, D. Pellett, B. Regnery, D. Taylor, Y. Yao, F. Zhang University of California, Los Angeles, USA M. Bachtis, R. Cousins, A. Datta, D. Hamilton, J. Hauser, M. Ignatenko, M.A. Iqbal, T. Lam, W.A. Nash, S. Regnard, D. Saltzberg, B. Stone, V. Valuev University of California, Riverside, Riverside, USA K. Burt, Y. Chen, R. Clare, J.W. Gary, M. Gordon, G. Hanson, G. Karapostoli, O.R. Long, N. Manganelli, M. Olmedo Negrete, W. Si, S. Wimpenny, Y. Zhang University of California, San Diego, La Jolla, USA J.G. Branson, P. Chang, S. Cittolin, S. Cooperstein, N. Deelen, D. Diaz, J. Duarte, R. Gerosa, L. Giannini, D. Gilbert, J. Guiang, R. Kansal, V. Krutelyov, R. Lee, J. Letts, M. Masciovecchio, S. May, M. Pieri, B.V. Sathia Narayanan, V. Sharma, M. Tadel, A. Vartak, F. Würthwein, Y. Xiang, A. Yagil University of California, Santa Barbara - Department of Physics, Santa Barbara, USA N. Amin, C. Campagnari, M. Citron, A. Dorsett, V. Dutta, J. Incandela, M. Kilpatrick, J. Kim, B. Marsh, H. Mei, M. Oshiro, M. Quinnan, J. Richman, U. Sarica, J. Sheplock, D. Stuart, S. Wang California Institute of Technology, Pasadena, USA A. Bornheim, O. Cerri, I. Dutta, J.M. Lawhorn, N. Lu, J. Mao, H.B. Newman, J. Ngadiuba, T.Q. Nguyen, M. Spiropulu, J.R. Vlimant, C. Wang, S. Xie, Z. Zhang, R.Y. Zhu Carnegie Mellon University, Pittsburgh, USA J. Alison, S. An, M.B. Andrews, P. Bryant, T. Ferguson, A. Harilal, C. Liu, T. Mudholkar, M. Paulini, A. Sanchez University of Colorado Boulder, Boulder, USA J.P. Cumalat, W.T. Ford, A. Hassani, E. MacDonald, R. Patel, A. Perloff, C. Savard, K. Stenson, K.A. Ulmer, S.R. Wagner Cornell University, Ithaca, USA J. Alexander, S. Bright-thonney, Y. Cheng, D.J. Cranshaw, S. Hogan, J. Monroy, J.R. Patterson, D. Quach, J. Reichert, M. Reid, A. Ryd, W. Sun, J. Thom, P. Wittich, R. Zou Fermi National Accelerator Laboratory, Batavia, USA M. Albrow, M. Alyari, G. Apollinari, A. Apresyan, A. Apyan, S. Banerjee, L.A.T. Bauerdick, D. Berry, J. Berryhill, P.C. Bhat, K. Burkett, J.N. Butler, A. Canepa, G.B. Cerati, H.W.K. Cheung, F. Chlebana, M. Cremonesi, K.F. Di Petrillo, V.D. Elvira, Y. Feng, J. Freeman, Z. Gecse, L. Gray, D. Green, S. Grünendahl, O. Gutsche, R.M. Harris, R. Heller, T.C. Herwig, J. Hirschauer, B. Jayatilaka, S. Jindariani, M. Johnson, U. Joshi, T. Klijnsma, B. Klima, K.H.M. Kwok, S. Lammel, D. Lincoln, R. Lipton, T. Liu, C. Madrid, K. Maeshima, C. Mantilla, D. Mason, P. McBride, P. Merkel, S. Mrenna, S. Nahn, V. O’Dell, V. Papadimitriou, K. Pedro, C. Pena57, O. Prokofyev, F. Ravera, A. Reinsvold Hall, L. Ristori, B. Schneider, E. Sexton-Kennedy, N. Smith, A. Soha, W.J. Spalding, L. Spiegel, S. Stoynev, J. Strait, L. Taylor, S. Tkaczyk, N.V. Tran, L. Uplegger, E.W. Vaandering, H.A. Weber University of Florida, Gainesville, USA D. Acosta, P. Avery, D. Bourilkov, L. Cadamuro, V. Cherepanov, F. Errico, R.D. Field, D. Guerrero, B.M. Joshi, M. Kim, E. Koenig, J. Konigsberg, A. Korytov, K.H. Lo, K. Matchev, N. Menendez, G. Mitselmakher, A. Muthirakalayil Madhu, N. Rawal, D. Rosenzweig, S. Rosenzweig, K. Shi, J. Sturdy, J. Wang, E. Yigitbasi, X. Zuo Florida State University, Tallahassee, USA T. Adams, A. Askew, R. Habibullah, V. Hagopian, K.F. Johnson, R. Khurana, T. Kolberg, G. Martinez, H. Prosper, C. Schiber, O. Viazlo, R. Yohay, J. Zhang Florida Institute of Technology, Melbourne, USA M.M. Baarmand, S. Butalla, T. Elkafrawy16, M. Hohlmann, R. Kumar Verma, D. Noonan, M. Rahmani, F. Yumiceva University of Illinois at Chicago (UIC), Chicago, USA M.R. Adams, H. Becerril Gonzalez, R. Cavanaugh, X. Chen, S. Dittmer, O. Evdokimov, C.E. Gerber, D.A. Hangal, D.J. Hofman, A.H. Merrit, C. Mills, G. Oh, T. Roy, S. Rudrabhatla, M.B. Tonjes, N. Varelas, J. Viinikainen, X. Wang, Z. Wu, Z. Ye The University of Iowa, Iowa City, USA M. Alhusseini, K. Dilsiz90, R.P. Gandrajula, O.K. Köseyan, J.-P. Merlo, A. Mestvirishvili91, J. Nachtman, H. Ogul92, Y. Onel, A. Penzo, C. Snyder, E. Tiras93 Johns Hopkins University, Baltimore, USA O. Amram, B. Blumenfeld, L. Corcodilos, J. Davis, M. Eminizer, A.V. Gritsan, S. Kyriacou, P. Maksimovic, J. Roskes, M. Swartz, T.Á. Vámi The University of Kansas, Lawrence, USA A. Abreu, J. Anguiano, C. Baldenegro Barrera, P. Baringer, A. Bean, A. Bylinkin, Z. Flowers, T. Isidori, S. Khalil, J. King, G. Krintiras, A. Kropivnitskaya, M. Lazarovits, C. Lindsey, J. Marquez, N. Minafra, M. Murray, M. Nickel, C. Rogan, C. Royon, R. Salvatico, S. Sanders, E. Schmitz, C. Smith, J.D. Tapia Takaki, Q. Wang, Z. Warner, J. Williams, G. Wilson Kansas State University, Manhattan, USA S. Duric, A. Ivanov, K. Kaadze, D. Kim, Y. Maravin, T. Mitchell, A. Modak, K. Nam Lawrence Livermore National Laboratory, Livermore, USA F. Rebassoo, D. Wright University of Maryland, College Park, USA E. Adams, A. Baden, O. Baron, A. Belloni, S.C. Eno, N.J. Hadley, S. Jabeen, R.G. Kellogg, T. Koeth, A.C. Mignerey, S. Nabili, M. Seidel, A. Skuja, L. Wang, K. Wong Massachusetts Institute of Technology, Cambridge, USA D. Abercrombie, G. Andreassi, R. Bi, S. Brandt, W. Busza, I.A. Cali, Y. Chen, M. D’Alfonso, J. Eysermans, C. Freer, G. Gomez Ceballos, M. Goncharov, P. Harris, M. Hu, M. Klute, D. Kovalskyi, J. Krupa, Y.-J. Lee, B. Maier, C. Mironov, C. Paus, D. Rankin, C. Roland, G. Roland, Z. Shi, G.S.F. Stephans, K. Tatar, J. Wang, Z. Wang, B. Wyslouch University of Minnesota, Minneapolis, USA R.M. Chatterjee, A. Evans, P. Hansen, J. Hiltbrand, Sh. Jain, M. Krohn, Y. Kubota, J. Mans, M. Revering, R. Rusack, R. Saradhy, N. Schroeder, N. Strobbe, M.A. Wadud University of Nebraska-Lincoln, Lincoln, USA K. Bloom, M. Bryson, S. Chauhan, D.R. Claes, C. Fangmeier, L. Finco, F. Golf, C. Joo, I. Kravchenko, M. Musich, I. Reed, J.E. Siado, G.R. Snow${}^{\textrm{\textdagger}}$, W. Tabb, F. Yan State University of New York at Buffalo, Buffalo, USA G. Agarwal, H. Bandyopadhyay, L. Hay, I. Iashvili, A. Kharchilava, C. McLean, D. Nguyen, J. Pekkanen, S. Rappoccio, A. Williams Northeastern University, Boston, USA G. Alverson, E. Barberis, Y. Haddad, A. Hortiangtham, J. Li, G. Madigan, B. Marzocchi, D.M. Morse, V. Nguyen, T. Orimoto, A. Parker, L. Skinnari, A. Tishelman-Charny, T. Wamorkar, B. Wang, A. Wisecarver, D. Wood Northwestern University, Evanston, USA S. Bhattacharya, J. Bueghly, Z. Chen, A. Gilbert, T. Gunter, K.A. Hahn, Y. Liu, N. Odell, M.H. Schmitt, M. Velasco University of Notre Dame, Notre Dame, USA R. Band, R. Bucci, A. Das, N. Dev, R. Goldouzian, M. Hildreth, K. Hurtado Anampa, C. Jessop, K. Lannon, J. Lawrence, N. Loukas, D. Lutton, N. Marinelli, I. Mcalister, T. McCauley, F. Meng, K. Mohrman, Y. Musienko50, R. Ruchti, P. Siddireddy, A. Townsend, M. Wayne, A. Wightman, M. Wolf, M. Zarucki, L. Zygala The Ohio State University, Columbus, USA B. Bylsma, B. Cardwell, L.S. Durkin, B. Francis, C. Hill, M. Nunez Ornelas, K. Wei, B.L. Winer, B.R. Yates Princeton University, Princeton, USA F.M. Addesa, B. Bonham, P. Das, G. Dezoort, P. Elmer, A. Frankenthal, B. Greenberg, N. Haubrich, S. Higginbotham, A. Kalogeropoulos, G. Kopp, S. Kwan, D. Lange, M.T. Lucchini, D. Marlow, K. Mei, I. Ojalvo, J. Olsen, C. Palmer, D. Stickland, C. Tully University of Puerto Rico, Mayaguez, USA S. Malik, S. Norberg Purdue University, West Lafayette, USA A.S. Bakshi, V.E. Barnes, R. Chawla, S. Das, L. Gutay, M. Jones, A.W. Jung, S. Karmarkar, M. Liu, G. Negro, N. Neumeister, G. Paspalaki, C.C. Peng, S. Piperov, A. Purohit, J.F. Schulte, M. Stojanovic17, J. Thieman, F. Wang, R. Xiao, W. Xie Purdue University Northwest, Hammond, USA J. Dolen, N. Parashar Rice University, Houston, USA A. Baty, M. Decaro, S. Dildick, K.M. Ecklund, S. Freed, P. Gardner, F.J.M. Geurts, A. Kumar, W. Li, B.P. Padley, R. Redjimi, W. Shi, A.G. Stahl Leiton, S. Yang, L. Zhang, Y. Zhang University of Rochester, Rochester, USA A. Bodek, P. de Barbaro, R. Demina, J.L. Dulemba, C. Fallon, T. Ferbel, M. Galanti, A. Garcia-Bellido, O. Hindrichs, A. Khukhunaishvili, E. Ranken, R. Taus Rutgers, The State University of New Jersey, Piscataway, USA B. Chiarito, J.P. Chou, A. Gandrakota, Y. Gershtein, E. Halkiadakis, A. Hart, M. Heindl, O. Karacheban24, I. Laflotte, A. Lath, R. Montalvo, K. Nash, M. Osherson, S. Salur, S. Schnetzer, S. Somalwar, R. Stone, S.A. Thayil, S. Thomas, H. Wang University of Tennessee, Knoxville, USA H. Acharya, A.G. Delannoy, S. Spanier Texas A&M University, College Station, USA O. Bouhali94, M. Dalchenko, A. Delgado, R. Eusebi, J. Gilmore, T. Huang, T. Kamon95, H. Kim, S. Luo, S. Malhotra, R. Mueller, D. Overton, D. Rathjens, A. Safonov Texas Tech University, Lubbock, USA N. Akchurin, J. Damgov, V. Hegde, S. Kunori, K. Lamichhane, S.W. Lee, T. Mengke, S. Muthumuni, T. Peltola, I. Volobouev, Z. Wang, A. Whitbeck Vanderbilt University, Nashville, USA E. Appelt, S. Greene, A. Gurrola, W. Johns, A. Melo, H. Ni, K. Padeken, F. Romeo, P. Sheldon, S. Tuo, J. Velkovska University of Virginia, Charlottesville, USA M.W. Arenton, B. Cox, G. Cummings, J. Hakala, R. Hirosky, M. Joyce, A. Ledovskoy, A. Li, C. Neu, B. Tannenwald, S. White, E. Wolfe Wayne State University, Detroit, USA N. Poudyal University of Wisconsin - Madison, Madison, WI, USA K. Black, T. Bose, J. Buchanan, C. Caillol, S. Dasu, I. De Bruyn, P. Everaerts, F. Fienga, C. Galloni, H. He, M. Herndon, A. Hervé, U. Hussain, A. Lanaro, A. Loeliger, R. Loveless, J. Madhusudanan Sreekala, A. Mallampalli, A. Mohammadi, D. Pinna, A. Savin, V. Shang, V. Sharma, W.H. Smith, D. Teague, S. Trembath-reichert, W. Vetens †: Deceased 1: Also at TU Wien, Wien, Austria 2: Also at Institute of Basic and Applied Sciences, Faculty of Engineering, Arab Academy for Science, Technology and Maritime Transport, Alexandria, Egypt, Alexandria, Egypt 3: Also at Université Libre de Bruxelles, Bruxelles, Belgium 4: Also at Universidade Estadual de Campinas, Campinas, Brazil 5: Also at Federal University of Rio Grande do Sul, Porto Alegre, Brazil 6: Also at University of Chinese Academy of Sciences, Beijing, China 7: Also at Department of Physics, Tsinghua University, Beijing, China, Beijing, China 8: Also at UFMS, Nova Andradina, Brazil 9: Also at Nanjing Normal University Department of Physics, Nanjing, China 10: Now at The University of Iowa, Iowa City, USA 11: Also at Institute for Theoretical and Experimental Physics named by A.I. Alikhanov of NRC ‘Kurchatov Institute’, Moscow, Russia 12: Also at Joint Institute for Nuclear Research, Dubna, Russia 13: Also at Helwan University, Cairo, Egypt 14: Now at Zewail City of Science and Technology, Zewail, Egypt 15: Also at British University in Egypt, Cairo, Egypt 16: Now at Ain Shams University, Cairo, Egypt 17: Also at Purdue University, West Lafayette, USA 18: Also at Université de Haute Alsace, Mulhouse, France 19: Also at Erzincan Binali Yildirim University, Erzincan, Turkey 20: Also at CERN, European Organization for Nuclear Research, Geneva, Switzerland 21: Also at RWTH Aachen University, III. Physikalisches Institut A, Aachen, Germany 22: Also at University of Hamburg, Hamburg, Germany 23: Also at Department of Physics, Isfahan University of Technology, Isfahan, Iran, Isfahan, Iran 24: Also at Brandenburg University of Technology, Cottbus, Germany 25: Also at Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow, Russia 26: Also at Physics Department, Faculty of Science, Assiut University, Assiut, Egypt 27: Also at Karoly Robert Campus, MATE Institute of Technology, Gyongyos, Hungary 28: Also at Institute of Physics, University of Debrecen, Debrecen, Hungary, Debrecen, Hungary 29: Also at Institute of Nuclear Research ATOMKI, Debrecen, Hungary 30: Also at MTA-ELTE Lendület CMS Particle and Nuclear Physics Group, Eötvös Loránd University, Budapest, Hungary, Budapest, Hungary 31: Also at Wigner Research Centre for Physics, Budapest, Hungary 32: Also at IIT Bhubaneswar, Bhubaneswar, India, Bhubaneswar, India 33: Also at Institute of Physics, Bhubaneswar, India 34: Also at G.H.G. Khalsa College, Punjab, India 35: Also at Shoolini University, Solan, India 36: Also at University of Hyderabad, Hyderabad, India 37: Also at University of Visva-Bharati, Santiniketan, India 38: Also at Indian Institute of Technology (IIT), Mumbai, India 39: Also at Deutsches Elektronen-Synchrotron, Hamburg, Germany 40: Also at Sharif University of Technology, Tehran, Iran 41: Also at Department of Physics, University of Science and Technology of Mazandaran, Behshahr, Iran 42: Now at INFN Sezione di Bari a, Università di Bari b, Politecnico di Bari c, Bari, Italy 43: Also at Italian National Agency for New Technologies, Energy and Sustainable Economic Development, Bologna, Italy 44: Also at Centro Siciliano di Fisica Nucleare e di Struttura Della Materia, Catania, Italy 45: Also at Università di Napoli ’Federico II’, NAPOLI, Italy 46: Also at Consiglio Nazionale delle Ricerche - Istituto Officina dei Materiali, PERUGIA, Italy 47: Also at Riga Technical University, Riga, Latvia, Riga, Latvia 48: Also at Consejo Nacional de Ciencia y Tecnología, Mexico City, Mexico 49: Also at IRFU, CEA, Université Paris-Saclay, Gif-sur-Yvette, France 50: Also at Institute for Nuclear Research, Moscow, Russia 51: Now at National Research Nuclear University ’Moscow Engineering Physics Institute’ (MEPhI), Moscow, Russia 52: Also at Institute of Nuclear Physics of the Uzbekistan Academy of Sciences, Tashkent, Uzbekistan 53: Also at St. Petersburg State Polytechnical University, St. Petersburg, Russia 54: Also at University of Florida, Gainesville, USA 55: Also at Imperial College, London, United Kingdom 56: Also at Moscow Institute of Physics and Technology, Moscow, Russia, Moscow, Russia 57: Also at California Institute of Technology, Pasadena, USA 58: Also at Budker Institute of Nuclear Physics, Novosibirsk, Russia 59: Also at Faculty of Physics, University of Belgrade, Belgrade, Serbia 60: Also at Trincomalee Campus, Eastern University, Sri Lanka, Nilaveli, Sri Lanka 61: Also at INFN Sezione di Pavia a, Università di Pavia b, Pavia, Italy, Pavia, Italy 62: Also at National and Kapodistrian University of Athens, Athens, Greece 63: Also at Ecole Polytechnique Fédérale Lausanne, Lausanne, Switzerland 64: Also at Universität Zürich, Zurich, Switzerland 65: Also at Stefan Meyer Institute for Subatomic Physics, Vienna, Austria, Vienna, Austria 66: Also at Laboratoire d’Annecy-le-Vieux de Physique des Particules, IN2P3-CNRS, Annecy-le-Vieux, France 67: Also at Şırnak University, Sirnak, Turkey 68: Also at Near East University, Research Center of Experimental Health Science, Nicosia, Turkey 69: Also at Konya Technical University, Konya, Turkey 70: Also at Istanbul University - Cerrahpasa, Faculty of Engineering, Istanbul, Turkey 71: Also at Piri Reis University, Istanbul, Turkey 72: Also at Adiyaman University, Adiyaman, Turkey 73: Also at Ozyegin University, Istanbul, Turkey 74: Also at Izmir Institute of Technology, Izmir, Turkey 75: Also at Necmettin Erbakan University, Konya, Turkey 76: Also at Bozok Universitetesi Rektörlügü, Yozgat, Turkey, Yozgat, Turkey 77: Also at Marmara University, Istanbul, Turkey 78: Also at Milli Savunma University, Istanbul, Turkey 79: Also at Kafkas University, Kars, Turkey 80: Also at Istanbul Bilgi University, Istanbul, Turkey 81: Also at Hacettepe University, Ankara, Turkey 82: Also at Rutherford Appleton Laboratory, Didcot, United Kingdom 83: Also at Vrije Universiteit Brussel, Brussel, Belgium 84: Also at School of Physics and Astronomy, University of Southampton, Southampton, United Kingdom 85: Also at IPPP Durham University, Durham, United Kingdom 86: Also at Monash University, Faculty of Science, Clayton, Australia 87: Also at Università di Torino, TORINO, Italy 88: Also at Bethel University, St. Paul, Minneapolis, USA, St. Paul, USA 89: Also at Karamanoğlu Mehmetbey University, Karaman, Turkey 90: Also at Bingol University, Bingol, Turkey 91: Also at Georgian Technical University, Tbilisi, Georgia 92: Also at Sinop University, Sinop, Turkey 93: Also at Erciyes University, KAYSERI, Turkey 94: Also at Texas A&M University at Qatar, Doha, Qatar 95: Also at Kyungpook National University, Daegu, Korea, Daegu, Korea
arxiv-papers
2021-07-27T02:09:15
2024-09-04T03:07:20.345368
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "CMS Collaboration", "submitter": "The CMS Collaboration", "url": "https://arxiv.org/abs/2107.12553" }
2107.12554
# Bi-Directional Grid Constrained Stochastic Processes’ Link to Multi-Skew Brownian Motion Aldo Taranto, Ron Addie, Shahjahan Khan Aldo.Taranto@, Ron.Addie@, Shahjahan.Khan@, @usq.edu.au School of Sciences University of Southern Queensland Toowoomba, QLD 4350, Australia ###### Abstract. Bi-Directional Grid Constrained (BGC) stochastic processes (BGCSPs) constrain the random movement toward the origin steadily more and more, the further they deviate from the origin, rather than all at once imposing reflective barriers, as does the well-established theory of Itô diffusions with such reflective barriers. We identify that BGCSPs are a variant rather than a special case of the multi-skew Brownian motion (M-SBM). This is because they have their own complexities, such as the barriers being hidden (not known in advance) and not necessarily constant over time. We provide a M-SBM theoretical framework and also a simulation framework to elaborate deeper properties of BGCSPs. The simulation framework is then applied by generating numerous simulations of the constrained paths and the results are analysed. BGCSPs have applications in finance and indeed many other fields requiring graduated constraining, from both above and below the initial position. ###### Key words and phrases: Wiener Processes, Itô Processes, Reflecting Barriers, Stochastic Differential Equation (SDE), Stopping Times, First Passage Time (FPT), Multi-Skew Brownian Motion (M-SBM) 2021 Mathematics Subject Classification: Primary 60G40, Secondary 60J60, 65R20, 60J65. The first author was supported by an Australian Government Research Training Program (RTP) Scholarship. We would like to thank the Editors of this journal for their positive feedback and invaluable advice on refining this paper. ###### Contents 1. 1 Introduction 2. 2 Literature Review 1. 2.1 Constraining Stochastic Processes by Reflective Barriers 2. 2.2 Multi-Skew Brownian Motion 3. 3 Methodology 1. 3.1 Itô Diffusions Constrained by Two Reflective Barriers 2. 3.2 Multi-Skew Brownian Motion 3. 3.3 Constructing BGC Stochastic Processes 4. 4 Results and Discussion 5. 5 Conclusions ## Notation Term | Description ---|--- BGC | Bi-Directional grid constrained BGCSP | BGC stochastic process M-SBM | Multi-skew Brownian motion $X_{t}$ | Stochastic process over time $t$ $B_{t}$ | Brownian motion over time $t$ $W_{t}$ | Wiener process over time $t$ $T$ | Time $f(X_{t},t)$, $\mu$ | Drift coefficient of $X$ over $t$ $g(X_{t},t)$, $\sigma$ | Diffusion coefficient of $X$ over $t$ $\Psi(X_{t},t)$ | BGC coefficient of $X$ over $t$ $\operatorname{sgn}[X_{t}]$ | Sign function of $X_{t}$ $\mathfrak{B}_{L}$ | Lower barrier $\mathfrak{B}_{U}$ | Upper barrier $\tau_{\mathfrak{B}}$ | Stopping time when $\mathfrak{B}$ is hit $|x|$ | Absolute value of $x$ ## 1\. Introduction In Taranto et al., [33], the concept of Bi-Directional Grid Constrained (BGC) stochastic processes (BGCSPs) was introduced, and the impact of BGC on the iterated logarithm bounds of the corresponding stochastic differential equation (SDE) was derived. In the subsequent paper (Taranto and Khan, 2021b [32]), the hidden geometry of the BGC process was examined, in particular how the hidden reflective barriers are formed, the various possible formulations that can be formed, and an algorithm to simulate BGCSPs was provided. BGCSPs were also compared to the Langevin equation, the Ornstein-Uhlenbeck process (OUP), and it was shown how BGCSPs are more complex due to a more general framework that does not always admit an exact solution. In this paper, we examine in what respects a BGCSP resembles and in what respect it differs from a type of multi-skew Brownian motion (M-SBM). Before we do this, we recall that the BGC term $\operatorname{sgn}[X_{t}]\Psi(X_{t},t)$, from now onwards simply $\Psi(X_{t},t)$, unless required to be fully expressed, has been defined as impacting the $dt$ term as in [33] or the $dW_{t}$ term to a lesser extent as in [32]. Here, we notice that even if this term is placed as a factor outside the sum of the $dt$ and $dW_{t}$ terms, it will still constrain the Itô diffusion in a slightly different, yet fundamentally the same way. Since $\Psi(x)$ is continuous and differentiable, we require $\Psi(x)$ to include the infinitessimal $d$, giving $d\Psi(x)$. We thus provide the following third alternative definition of the BGCSP. ###### Definition 1.1. (Definition III of BGC Stochastic Processes). For a complete filtered probability space $(\Omega,\mathcal{F},\\{\mathcal{F}\\}_{t\geqslant 0},\mathbb{P})$ and a (continuous) BGC function $\Psi(x):\mathbb{R}\rightarrow\mathbb{R}$, $\forall x\in\mathbb{R}$, $f(X_{t},t)$ is the drift coefficient, $g(X_{t},t)$ is the diffusion coefficient, $\Psi(X_{t},t)$ is the BGC function. $f(X_{t},t)$, $g(X_{t},t)$ and $\Psi(X_{t},t)$ are convex functions and $\operatorname{sgn}[x]$ is the sign function defined in the usual sense, $\displaystyle\operatorname{sgn}[x]$ $\displaystyle=$ $\displaystyle{\begin{cases}\displaystyle\phantom{-}1&,\quad x>0\\\ \displaystyle\phantom{-}0&,\quad x=0\\\ \displaystyle-1&,\quad x<0\end{cases}}.$ Then, the corresponding BGC Itô diffusion is defined as follows, $dX_{t}=f(X_{t},t)\,dt+g(X_{t},t)\,dW_{t}-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi(X_{t},t)}_{\textbf{BGC}}.$ (1.1) $\blacksquare$ By choosing $\Psi(X_{t},t)$ to be a ‘suitable’ parabolic cylinder function in relation to the underlying Itô diffusion, as shown in [32], namely $\Psi(X_{t},t)=\left(\frac{X_{t}}{10}\right)^{2}$, the hidden barriers become visible when enough simulations hit them. Figure 1 shows that (1.1) is simulated 1,000 times for both with and without BGC, together with the hidden lower reflective barrier $a=\mathfrak{B}_{L}$ and the hidden reflective upper barrier $b=\mathfrak{B}_{U}$ also being displayed. Figure 1. Hidden Reflective Barriers due to Ideal $\Psi(X_{t},t)$ An even more specialized case that is of great interest, due to its simplicity, is where drift function $f(x):\mathbb{R}\rightarrow\mathbb{R}$ is set to $f(x)=\mu$, $\forall x\in\mathbb{R}$ and similarly, the diffusion function $g(x):\mathbb{R}\rightarrow\mathbb{R}$ is set to $g(x)=\sigma$, $\forall x\in\mathbb{R}$. One can even define $f(x)$ and $g(x)$ in a more gradual manner such that in the limit they approach the typical constant expressions for the drift and diffusion coefficients, $\lim_{x\rightarrow\infty}f(x)=\mu\quad,\quad\lim_{x\rightarrow\infty}g(x)=\sigma.$ (1.2) Depending on whether the generalized $f(x)$ and $g(x)$ are used, or whether the simplified $\mu$ and $\sigma$ are used, then the resulting reflective boundary theorems will either have more complexity, or less complexity, respectively. Before proceeding to the Methodology section, (1.1) is discussed within a multi-Dimensional context with some examples, which will help explain the multidimensionality of M-SBMs. ###### Remark 1.2. By multi-Dimensional diffusion, we are not referring to the usage in papers such as Sacerdote et al., [27] in which each dimension is reserved for each possible path or simulation, as shown in Figure 2(a). (a). (b). Figure 2. Clarifying Subtle Differences for BGC Stochastic Processes Notice that in Figure 2(b), the BGCSP exhibits a ‘skew’ and can be considered as a 2-SBM -which will be elaborated in the Methodology section. Instead of the usage in Figure 2(a), we use the standard interpretation and generally accepted usage of the term ‘multi-Dimensional diffusion’ in which each dimension is reserved for each co-ordinate of the multivariate Itô process, as shown in Figure 3. (a). 2-D Itô Diffusion as seen from $\bm{X}$ (b). 2-D Itô Diffusion as seen from $\bm{Y}$ Figure 3. 2-Dimensional Itô Diffusion as seen from 2 Different Dimensions We also note that the Methodology, Results and Discussion sections are either directly multi-Dimensional or can be extended to multi-Dimensional expressions. We now have a more geometric understanding of how BGCSPs can be constrained along multiple dimensions, to be in a better position to express (1.1) in a more generalized $n$-Dimensional framework in (1.3). ###### Definition 1.3. (Definition IV - Multi-Dimensional BGC Stochastic Processes). Let $\textstyle X:[0,\infty)\times\Omega\rightarrow\mathbb{R}^{n}$ defined on a probability space $(\Omega,\mathcal{F},\mathcal{\\{F\\}}_{t\geqslant 0},\mathbb{P})$ be an Itô diffusion satisfying the conditions given in the definition of the 1-Dimensional Itô process for each $\\{1\leqslant i\leqslant n\\}$, $\\{1\leqslant j\leqslant m\\}$, then we can form $n$ 1-Dimensional Itô processes in an SDE of the form, $\begin{array}[]{ccc}dX_{1}&=&f_{1}(X_{t},t)\,dt+\underbrace{g_{1,1}(X_{t},t)\,dW_{1}(t)+\cdots+g_{1,m}(X_{t},t)\,dW_{m}(t)}_{\textbf{m}}\\\ &&-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi_{1}(X_{t},t)-...-\operatorname{sgn}[X_{t}]\,d\Psi_{m}(X_{t},t)}_{\textbf{m BGC}}\\\ \vdots&\vdots&\vdots\\\ dX_{n}&=&f_{n}(X_{t},t)\,dt+\underbrace{g_{n,1}(X_{t},t)\,dW_{1}(t)+\cdots+g_{n,m}(X_{t},t)\,dW_{m}(t)}_{\textbf{m}}\\\ &&-\underbrace{\operatorname{sgn}[X_{t}]\,d\Psi_{1}(X_{t},t)-...-\operatorname{sgn}[X_{t}]\,d\Psi_{m}(X_{t},t)}_{\textbf{m BGC}}\end{array}$ (1.3) where $W_{t}=(W_{1}(X_{t},t),...,W_{m}(X_{t},t))$ is an $m$-Dimensional Wiener process and $f:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n}$ and $g:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n\times m}$ are the drift and diffusion fields respectively. For a point $\displaystyle x\in\mathbb{R}^{n}$, let $\displaystyle\mathbb{P}^{x}$ denote the law of $X$ given initial datum $\displaystyle X_{0}=x$, and let $\displaystyle\mathbb{E}^{x}$ denote expectation with respect to $\displaystyle\mathbb{P}^{x}$. Now, (1.3) can also be expressed in matrix notation as, $d\mathbf{X}_{t}=\bm{f}_{t}\,dt+\bm{g}_{t}\,d\mathbf{W}_{t}-\bm{h}_{t},$ (1.4) where, $\mathbf{X}_{t}=\left(\begin{array}[]{c}dX_{1}(t)\\\ \vdots\\\ dX_{n}(t)\end{array}\right),\text{ }\bm{f}_{t}=\left(\begin{array}[]{c}f_{1}(X_{t},t)\\\ \vdots\\\ f_{n}(X_{t},t)\end{array}\right),\text{ }\bm{g}_{t}=\left(\begin{array}[]{ccc}g_{1,1}(X_{1}(t),t)&\cdots&g_{1,m}(X_{1}(t),t)\\\ \vdots&\ddots&\vdots\\\ g_{n,1}(X_{n}(t),t)&\cdots&g_{n,m}(X_{n}(t),t)\end{array}\right),$ $d\mathbf{W}_{t}=\left(\begin{array}[]{c}dW_{1}(t)\\\ \vdots\\\ dW_{n}(t)\end{array}\right),\text{ }\bm{h}_{t}=\left(\begin{array}[]{c}\operatorname{sgn}[X_{1}(t)]\,d\Psi_{1}(X_{1}(t),t)\\\ \vdots\\\ \operatorname{sgn}[X_{n}(t)]\,d\Psi_{n}(X_{n}(t),t)\end{array}\right),$ for vectors $\bm{f}_{t}$, $\bm{h}_{t}$, $\bm{W}_{t}$ and matrix $\bm{g}_{t}$. $\blacksquare$ Having reviewed the multi-Dimensional nature of unconstrained and BGC Itô diffusions, the paper is structured as follows; Section 2 provides the Literature Review, Section 3 the Methodology, Section 4 the Results and Discussion, and finally, Section 5 the Conclusion. ## 2\. Literature Review ### 2.1. Constraining Stochastic Processes by Reflective Barriers The constraining of stochastic processes in the form of discrete random walks and continuous Wiener processes has been researched for many decades. By reviewing Weesakul, [34] and the references therein, we see an established and rigorous analysis of random walks between a reflecting and an absorbing barrier. Lehner, [16] extended this to 1-Dimensional random walks with a partially reflecting (semipermeable) barrier. Gupta, [9] generalised this concept further to random walks in the presence of a multiple function barrier (MFB) where the barrier can either be partially reflective, absorptive, transmissive or hold for a moment, but not terminating or killing the random variable. Dua et al., [7] extended the work of [16] to random walks in the presence of partially reflecting barriers in which the probability of a random variable or datum reaching certain states was determined. Lions and Sznitman, [20] extended the research on reflecting boundary conditions through the refinement to SDEs. Percus, [24] considered an asymmetric random walk, with one or two boundaries, on a 1-Dimensional lattice. At the boundaries, the walker is either absorbed or reflected back to the system. Budhiraja and Dupuis, [5] considered the large deviation properties of the empirical measure for 1-Dimensional constrained processes, such as reflecting Wiener processes, the M/M/1 queue, and discrete-time analogs. L’epingle, [18] examined stochastic variational inequalities to provide a unified treatment for SDEs existing in a closed domain with normal reflection and (or) singular repellent drift. When the domain is a polyhedron, he proved that the reflected-repelled Wiener process does not hit the non-smooth part of the boundary. Bramson et al., [4] examined the positive recurrence (to the origin) of reflecting Wiener processes in 3-Dimensional space. Ball and Roma, [3] examined the detection of mean reversion within reflecting barriers with an application to the European exchange rate mechanism (EERM). ### 2.2. Multi-Skew Brownian Motion The concept of skew Brownian motion (SBM) was first introduced in the book by Itô and McKean, [13] as a diffusion with a drift represented by a generalized function, which solves an SDE involving its symmetric local time. Specifically, an SBM $X=\\{X_{t}\\}_{t\in[0,T]}$ is the solution of, $X_{t}=B_{t}+(2\alpha-1)L^{0}_{t}(X),\quad\alpha\in(0,1),$ where $B=\\{B_{t}\\}_{t\in[0,T]}$ is a standard Brownian motion (BM). However, standard Brownian motion is oftentimes abbreviated as SBM, so to reduce any possible confusion and to eliminate any reference to the original botanical context of Robert Brown -to which the term ‘Brownian motion’ is attributed -we will express $B_{t}$ in the rest of this paper in the more mathematically precise context as a Wiener process $W=\\{W_{t}\\}_{t\in[0,T]}$. $L^{0}_{t}(X)=\lim_{\epsilon\downarrow 0}\frac{1}{2\epsilon}\int^{t}_{0}\mathds{1}_{\\{|B_{X_{s}}|\leqslant\epsilon\\}}\,ds$ is the symmetric local time at $X_{0}$. Note that for $\alpha=\frac{1}{2}$, the above equation is reduced to a Wiener process. Harrison and Shepp, [10] then considered diffusions with a discontinuous local time. The literature on SBMs was consolidated by Harrison and Shepp, [10] and later by Lejay, [17]. Applications of SMBs were extended by Ramirez, [26] by applying multi-SBM (M-SBM) and diffusions in layered media that involve advection flows. Appuhamillage and Sheldon, [1] linked SBMs to existing research by deriving the first passage time (FPT) of SBM. In 2015, the multiple barrier research of [26] was extended by Atar and Budhiraja, [2], Ouknine et al., [23] who collapsed barriers to an accumulation point, and by Dereudre et al., [6] who derived an explicit representation of the transition densities of SBM with drift and two semipermeable barriers. Mazzonetto, [21] extended her prior research [6] on SBMs by deriving exact simulations of SBMs and M-SBMs with discontinuous drift in her Doctoral dissertation. Gairat and Shcherbakov, [8] applied SBMs and their functionals to finance. Krykun, [14] also extended the convergence of SBM with local times at several points that are contracted into a single one. Mazzonetto, [22] has also recently examined the rates of convergence to the local time of oscillating and SBMs. For applications of BGC stochastic processes, the reader is referred to [30], [28], [29], [31]. ## 3\. Methodology Before proceeding to the main result of this paper, it is instructive to establish a theoretical foundation by considering the key research for Itô diffusions constrained by two reflective barriers and then examining the necessary extensions that need to be derived for M-SBM constrained Itô diffusions. ### 3.1. Itô Diffusions Constrained by Two Reflective Barriers Given a filtered probability space $\Lambda:=(\Omega,\mathcal{F},\\{\mathcal{F}_{t}\\}_{t\geqslant 0},\mathbb{P})$ with the filtration $\\{\mathcal{F}_{t}\\}_{t\geqslant 0}$, then the reflected diffusion $\\{X_{t}:t\geqslant 0\\}$ with two-sided barriers $\mathfrak{B}_{L}$, $\mathfrak{B}_{U}$ at $a$, $b$ respectively can be defined as, $dX_{t}=f(X_{t})\,dt+g(X_{t})\,dW_{t}+\underbrace{\overbrace{d\mathcal{A}_{t}}^{a}-\overbrace{d\mathcal{B}_{t}}^{b}}_{\text{regulators}},\quad X_{0}\in(a,b),\quad x\in[a,b].$ (3.1) ###### Remark 3.1. The process $\mathcal{A}$ and $\mathcal{B}$ are known in the literature as ‘regulators’ for the points $a$ and $b$, however, we believe that a better term is ‘detectors’ because they mainly detect or count how many times $X_{t}$ reaches $a$ and $b$. Here, the drift $f(x)$ is Lipschitz continuous, the diffusion $g(x)$ is strictly positive and Lipschitz continuous. $a$, $b$ with $-\infty<a<b<+\infty$ are given real numbers, and $(W_{t},0\leqslant t<\infty)$ is the 1-Dimensional standard Wiener process on $\Lambda$. The processes $\mathcal{A}=\\{\mathcal{A}_{t}\\}_{t\geqslant 0}$ and $\mathcal{B}=\\{\mathcal{B}_{t}\\}_{t\geqslant 0}$ are the minimal non- decreasing and non-negative processes, which restrict the process $X_{t}\in[a,b],\forall t\geqslant 0$. More precisely, the processes $\\{\mathcal{A}_{t},t\geqslant 0\\}$ and $\\{\mathcal{B}_{t},t\geqslant 0\\}$ increase only when $X_{t}$ hits the boundary $a$ and $b$, respectively, so that $\mathcal{A}_{0}=\mathcal{B}_{0}=0$, $\mathds{1}$ is the characteristic function of the set and, $\int^{\infty}_{0}\mathds{1}_{\\{X_{t}>a\\}}\,d\mathcal{A}_{t}=0,\quad\int^{\infty}_{0}\mathds{1}_{\\{X_{t}<b\\}}\,d\mathcal{B}_{t}=0.$ (3.2) Furthermore, the processes $\mathcal{A}$ and $\mathcal{B}$ are uniquely determined by the following properties (Harrison, [11]), 1. (1) both $t\rightarrow\mathcal{A}_{t}$ and $t\rightarrow\mathcal{B}_{t}$ are nondecreasing processes, 2. (2) $\mathcal{A}$ and $\mathcal{B}$ increase only when $X=a$ and $X=b$, respectively, that is $\int^{t}_{0}\mathds{1}_{\\{X_{s}=a\\}}\,d\mathcal{A}_{s}=\mathcal{A}_{t}$ and $\int^{t}_{0}\mathds{1}_{\\{X_{s}=b\\}}\,d\mathcal{B}_{s}=\mathcal{B}_{t}$, for $t\geqslant 0$. We can consider the two reflective barriers as forming a 2-SBM. Furthermore, it is instructive for BGCSP to see the two barriers $a$ and $b$ in $\mathbb{R}^{2}$, shown in Figure 4(a) as embedded in $\mathbb{R}^{3}$ by a governing BGC surface $\Psi(X_{t},t)$, as shown in Figure 4(b). (a). Barriers in $\bm{\mathbb{R}^{2}}$ \- Contour plot (b). Barriers in $\bm{\mathbb{R}^{3}}$\- Contour & surface plot Figure 4. Diffusion Between Two Constant Reflective Barriers ###### Remark 3.2. Many papers such as [12] and Linetsky, [19] define the two barriers at the boundaries of $[0,r]$ for some $r\in\mathbb{R}_{+}$. By applying a series of transformations, one can map their findings to the context of BGCSP, as shown in Figure 5. Figure 5. Mapping Traditional Barriers to BGC Barriers $\blacksquare$ ### 3.2. Multi-Skew Brownian Motion Having examined Itô diffusions constrained by two reflective barriers, we now consider the so-called multi-skew Brownian motion, constrained by multiple barriers of varying degrees of reflectiveness. ###### Definition 3.3. (M-SBM). A multi-skew Brownian motion (M-SBM) represented (adapted from Mazzonetto, [21]) by $(\beta_{1},...,\beta_{n})$-SBM, or more simply by $\beta$-SBM with $n$ semipermeable barriers of varying permeability coefficients, respectively $\beta=(\beta_{1},...,\beta_{n})$, $x_{0}$ is the starting position, the coefficients $\beta_{j}\in[-1,1]$, barriers $x_{1}<...<x_{n}$, local times $L^{x_{j}}_{t}$, and $\mathcal{E}$ is the set of all parameters of the M-SBM, then the M-SBM is expressed as, $\displaystyle{\begin{cases}\begin{array}[]{ccl}\displaystyle dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\beta_{1}\,dL^{x_{1}}_{t}+...+\beta_{n}\,dL^{x_{n}}_{t}\\\ \displaystyle X_{0}&=&x_{0}\\\ \displaystyle\mathcal{E}&=&\big{\\{}\mu,\sigma,\left(\beta_{1},...,\beta_{n}\right)\big{\\}}\in\mathbb{R}\\\ \displaystyle L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=x_{j}\\}}\,dL^{x_{j}}_{s},\text{ }\forall j\in\\{1,...,n\\}\end{array}.\end{cases}}$ $\blacksquare$ ###### Remark 3.4. The term $\sigma$ has been added to the [21] definition so that the process can fit a wider range of models. We require that $\beta_{i}\in[-1,1]$. The cases when $\beta_{i}=\\{-1,1\\}$ are said to exhibit zero permeability (i.e. impermeability or full reflectiveness), and when $\beta_{i}\in(-1,1)$ the process is said to exhibit partial reflectiveness (i.e. semi permeability). Note that a 0-SBM is simply a Wiener process and a $\pm$ $1$-SBM is a positively/negatively reflected Wiener process. The definition of M-SBM is illustrated in Figure 6, representing a typical example of M-SBM. The standard definition of a skew Brownian motion has a drift term $\mu\in\mathbb{R}$ making it no longer, strictly speaking, Brownian motion. Figure 6. Example Standard M-SBM Framework The M-SBM of Definition 3.3 allows any barrier combination to be either fully reflective or semipermeable. ###### Remark 3.5. If the permeability is $\beta_{j}=1$ at the barrier $x_{j}$ for some $j\in\\{1,...,j_{1},j,j+1,...,n\\}$ and the initial position is $x_{0}\in(x_{j},+\infty)$, then the lower barriers $x_{1},...,x_{j-1}$ will almost surely be never reached [21]. For this to happen, it must be that $\beta_{j}=-1$, so that as the Itô diffusion descends (down) to $x_{j}$, it is fully reflected back (up). This of course assumes that the diffusion coefficient $\sigma$ is ‘relatively small’ and so allows the Itô diffusion to be ‘well behaved’ and never ‘jump over’ and go below the $x_{j}$ barrier, as also illustrated in Figure 6. ###### Theorem 3.6. (Multiple Barriers of M-SBM Merging to One, adapted from Mazzonetto, [21]). Before expressing the skewness parameter $\beta$ for a general number of barriers $n$, we derive $\beta$ for the first two simplest scenarios. If $n=2$, $\beta_{1},\beta_{2}\in[-1,1]$, $\mu\in\mathbb{R}$ and $x^{(n)}_{2}=x_{1}+\frac{1}{n}$, $\forall n\in\mathbb{N}$. Let, $\beta:=\frac{\beta_{1}+\beta_{2}}{1+\beta_{1}\beta_{2}}.$ Let us denote by $(X^{(n)}_{t})_{t}$ the $(\beta_{1},\beta_{2})$-SBM with drift $\mu$, barriers $x_{1},...,x_{n}$, and denote by $(Y_{t})_{t}$ the 1-SBM with drift $\mu$, and barrier $x_{1}$. Let us assume $X^{(n)}_{0}=Y_{0}$, then $X^{(n)}$ converges to $Y$ in the following sense, $\mathbb{E}\left[\sup_{s\in[0,t]}|X^{(m)}_{s}-Y_{s}|\right]\xrightarrow{m\to\infty}0,\text{ }\forall t\geqslant 0.$ The same holds in the case of $n>2$ barriers merging. In this case $(X^{(n)}_{t})_{t}$ is the $(\beta_{1},...,\beta_{n})$-SBM with drift $\mu\in\mathbb{R}$, skewness parameters $\beta_{1},...,\beta_{n}\in[-1,1]$ and barriers $x_{1}\in\mathbb{R}$, $x_{j+1}:=\frac{j}{n}+x_{1},\text{ }\forall j\in\\{1,...,n-1\\}$. The skewness parameter $\beta$ of the limit $1$-SBM is given by, $\beta:=\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})}.$ (3.3) If $n$ is even, $\beta=\frac{\displaystyle\sum^{n}_{j=1}\beta_{j}+\sum_{j_{1}<j_{2}<j_{3}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}+...+\sum_{j_{1}<...<j_{n-1}}\beta_{j_{1}}...\beta_{j_{n-1}}}{\displaystyle 1+\sum_{j_{1}<j_{2}}\beta_{j_{1}}\beta_{j_{2}}+\sum_{j_{1}<...<j_{4}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}\beta_{j_{4}}+...+\beta_{1}\beta_{2}...\beta_{j_{n}}}.$ (3.4) If $n$ is odd, $\beta=\frac{\displaystyle\sum^{n}_{j=1}\beta_{j}+\sum_{j_{1}<j_{2}<j_{3}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}+...+\beta_{j_{1}}...\beta_{j_{n}}}{\displaystyle 1+\sum_{j_{1}<j_{2}}\beta_{j_{1}}\beta_{j_{2}}+\sum_{j_{1}<...<j_{4}}\beta_{j_{1}}\beta_{j_{2}}\beta_{j_{3}}\beta_{j_{4}}+...+\sum_{j_{1}<...<j_{n-1}}\beta_{1}\beta_{2}...\beta_{j_{n-1}}}.$ (3.5) ###### Proof. Refer to [21] and [15]. ∎ The M-SBM framework also only considers one half-plane at a time, so that the transition density (or distribution) of the upper plane is assumed to be the same for the lower half plane, which is not always the case (except for BGCSP). We show below that whilst BGCSPs are a special case of M-SBMs, they have some unique properties that make them of particular interest among the larger class. ### 3.3. Constructing BGC Stochastic Processes We can compliment Mazzonetto by condensing all possible local barrier combinations to the following four possible global barrier combinations that comprise a lower barrier $\alpha_{j}$ and an upper barrier $\alpha_{k}$, as shown in Figure 7. (a). (b). (c). (d). Figure 7. Generalised Barrier Combination Arguments The diagrammatic summary of possible cases represented in Figure 7 is formally stated as Lemma 3.7 which is then used in Theorem 3.8. This Theorem formally expresses that the barriers of an M-SBM merge to a 1-SBM, to which the process converges. ###### Lemma 3.7. If any $|\alpha_{j}|<1$ for some $|\alpha_{k}|=1$, or similarly for any $|\alpha_{k}|<1$, then the barrier $\pm 1$ will dominate the barrier $\neq\pm 1$, almost surely, as shown in Figure 7. Furthermore, if there are more than two fully reflective barriers, they will merge and effectively operate as one of the four possible combinations of Figure 7. ###### Proof. We first assume that there exists only one reflective barrier $|\alpha_{j}|=1$ and $n$ semipermeable barriers $|\alpha_{j}|<1$. We then consider the two SDEs; $\begin{array}[]{rcl}X_{t}&=&\mu_{1}\,dt+\sigma_{1}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{|\alpha_{i}|<1}\\\ Y_{t}&=&\mu_{2}\,dt+\sigma_{2}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}\end{array},$ (3.6) where $Y_{t}$ is an unconstrained Itô diffusion and $X_{t}$ is a constrained Itô diffusion according to the above barrier constraints. Let $\delta=\sum^{n}_{i=1}\alpha_{i}$, so $\delta<1$ or $\delta\geqslant 1$. If $\delta<1$, then $\alpha_{i}$ will dominate $\delta$ as it will vanish (i.e. $\delta\rightarrow 0$) such that, $\displaystyle\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=0.$ If $\delta\geqslant 1$, then $\delta$ will dominate $\alpha_{1}$ and merge (i.e. $\alpha_{1}\rightarrow\delta$) such that, $\displaystyle\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=X_{t}.$ Next, assume that there exist two fully reflective barriers $|\alpha_{j}|=1$, $|\alpha_{k}|=1$ and $n$ semipermeable barriers $|\alpha_{i}|<1$. (3.6) now equates to, $\begin{array}[]{rcl}X_{t}&=&\mu_{1}\,dt+\sigma_{1}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{|\alpha_{j}|=1,\text{ }|\alpha_{k}|=1}\\\ &&+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{|\alpha_{i}|=1}+\underbrace{\alpha_{2}\,dL^{\alpha_{2}}_{t}+...+\alpha_{n}\,dL^{\alpha_{n}}_{t}}_{\delta=|\alpha_{i}|<1}\\\ Y_{t}&=&\mu_{2}\,dt+\sigma_{2}\,dW_{t}+\underbrace{\alpha_{1}\,dL^{\alpha_{1}}_{t}}_{\delta=|\alpha_{i}|<1}\end{array}.$ (3.7) If $\delta<1$, then $\alpha_{j}$ and (or) $\alpha_{k}$ will dominate $\delta$ and as it will vanish (i.e. $\delta\rightarrow 0$) and if $\delta\geqslant 1$, then $\delta$ will dominate $\alpha_{j}$ and (or) $\alpha_{k}$ hence merge to $\alpha_{j}$ and $\alpha_{k}$, such that $\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=0$ and $\sup_{t\rightarrow\infty}\Big{\\{}|X_{t}|-|Y_{t}|\Big{\\}}=X_{t}$, respectively. Finally, if there are more than $N\geqslant 3$ fully reflective barriers $|\alpha_{i}|=1$ and $n$ semipermeable barriers, then the new barriers will effectively be a linear combination of any two possible combinations in Figure 7, depending on how the fully reflective barriers of $N$ are defined, completing the proof for all scenarios. ∎ To contrast Figure 4 for two reflective constant barriers, for BGCSP we have two hidden reflective barriers which also constrain the interior between the boundaries, as shown in Figure 8, where (a) shows the multiple barriers in $\mathbb{R}^{2}$, and (b) shows how the multiple barriers are projected from $\mathbb{R}^{3}$. (a). Barrier in $\bm{\mathbb{R}^{2}}$ \- Contour plot (b). Barrier in $\bm{\mathbb{R}^{3}}$\- Contour & surface plot Figure 8. Diffusion Between Two BGC Reflective Barriers Leveraging the work of Ramirez, [26], we partition $X$ into countably infinite intervals $I_{k}=(x_{k},x_{k+1})$, $\forall k\in\mathbb{R}$ forming the sequence $\\{I_{-\infty},...,I_{-1},I_{1},...,I_{\infty}\\}$ such that the standard conditions are met; $I_{k}\bigcap I_{k+1}=\varnothing\text{ }\text{ }\forall k\in\mathbb{R}$, $\varnothing\notin X$ and $\bigcup^{\infty}_{k=-\infty}I_{k}=X$. We wish to shrink the size of each interval $|I_{k}|=|x_{k+1}-x_{k}|$ to zero as we apply more and more intervals, where $\lim_{k\rightarrow\infty}|x_{k+1}-x_{k}|\rightarrow 0$ and $\int^{\infty}_{-\infty}I_{k}\,dk<\infty$. This is because we wish to constrain the Itô diffusion by the BGC function $\Psi(X_{t},t)\in\mathbb{R}$. In terms of BGC stochastic processes, we effectively have a $(\beta_{-n},...,\beta_{-1},\beta_{1},...,\beta_{n})$-SBM and will express it as, $\displaystyle{\begin{cases}\begin{array}[]{ccl}\displaystyle dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\underbrace{\underbrace{\sum^{-1}_{j=-n}\beta_{j}\,dL^{x_{j}}_{t}}_{<0}+\underbrace{\sum^{n}_{j=1}\beta_{j}\,dL^{x_{j}}_{t}}_{>0}}_{\displaystyle\Psi(X_{t},t)}\\\ \displaystyle X_{0}&=&0\\\ \displaystyle\mathcal{E}&=&\big{\\{}\mu,\sigma,(\beta_{-n},...,\beta_{-1},\beta_{1},...,\beta_{n})\big{\\}}\in\mathbb{R}\\\ \displaystyle L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=z_{j}\\}}\,dL^{x_{j}}_{s},\text{ }j\in\\{-n,...,-1,1,...,n\\}\end{array},\end{cases}}$ (3.8) as illustrated in Figure 9. Figure 9. Constructing BGC Stochastic Processes from M-SBM Framework ###### Theorem 3.8. (Skewness Parameter of BGC Stochastic Processes). Let us denote by $(X^{(n)}_{t})_{t}$ the $(\beta_{-n},...,\beta_{n})$-SBM with drift $\mu$ and barriers $x_{-n},...,x_{n}$, and denote by $(Y_{t})_{t}$ the 2-SBM (i.e. $\beta_{1},\beta_{2}$-SMB) with drift $\mu$, diffusion $\sigma$ and barrier $x_{1}$. Let us assume $X^{(n)}_{0}=Y_{0}$, then $X^{(n)}$ converges to $Y$ in the following sense, $\lim_{n\to\infty}\left\\{\mathbb{E}\Big{[}\sup_{s\in[0,t]}|X^{(n)}_{s}-Y_{s}|\Big{]}\right\\}=0,\text{ }\forall t\in[0,T].$ The same holds in the case of $n>2$ barriers merging. In this case $(X^{(n)}_{t})_{t}$ is the $(\beta_{-n},...,\beta_{n})$-SBM with drift $\mu\in\mathbb{R}$, diffusion $\sigma\in\mathbb{R}$, skewness parameters $\beta_{-n},...,\beta_{n}\in[-1,1]$ and barrier $x_{1}\in\mathbb{R}$, $x_{j+1}:=\frac{j}{n}+x_{1},\text{ }\forall j\in\\{1,...,n-1\\}$. Then $\beta=0$. ###### Proof. In contrast to the skewness parameter of the limit $1$-SBM in (3.3), the corresponding skewness parameter of the limit $2$-SBM for BGCSP is given by (3.9), $\begin{array}[]{rcl}\beta&:=&\underbrace{\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})}}_{\bm{>0}}+\underbrace{\frac{\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})}{\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})}}_{\bm{<0}}\\\ &=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})\right]+\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\right]\left[\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})\right]}$}\\\ &=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}$}\\\ &&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}{\left[\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1+\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1-\beta_{j})\right]}.$}\end{array}$ (3.9) Noting that due to the symmetry of BGCSP about the origin, $\displaystyle\prod^{-n}_{j=-1}(1-\beta_{j})=\prod^{n}_{j=1}(1+\beta_{j}),\quad\displaystyle\prod^{-n}_{j=-1}(1+\beta_{j})=\prod^{n}_{j=1}(1-\beta_{j}),$ which allows the $\prod^{n}_{j=1}(1+\beta_{j})$ terms to factor out in (3.9) giving, $\begin{array}[]{rcl}\beta&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})-\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\\\ &&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})-\prod^{-n}_{j=-1}(1-\beta_{j})-\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\prod^{n}_{j=1}(1+\beta_{j})\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\prod^{n}_{j=1}(1-\beta_{j})\prod^{-n}_{j=-1}(1+\beta_{j})\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\end{array}$ which expands to, $\begin{array}[]{rcl}\beta&=&\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\left[\prod^{-n}_{j=-1}(1-\beta_{j})-\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}$}\\\ &&+\leavevmode\resizebox{422.77661pt}{}{$\frac{\displaystyle\left[-\prod^{-n}_{j=-1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}{\displaystyle\left[\prod^{-n}_{j=-1}(1+\beta_{j})+\prod^{-n}_{j=-1}(1-\beta_{j})+\prod^{n}_{j=1}(1-\beta_{j})+\left.\left(\prod^{n}_{j=1}(1-\beta_{j})\right)^{2}\middle/\prod^{n}_{j=1}(1+\beta_{j})\right.\right]}.$}\end{array}$ (3.10) It is clear that the numerator equates to 0 and so $\beta=0$, completing the proof. ∎ ###### Remark 3.9. Due to the bi-directionality of BGC stochastic processes, then $n$ in (3.4) is always even, so $\beta=0$. From Portenko, [25], if $|x_{i}|\leqslant 1$, then $|\sum^{n}_{i=1}\alpha_{i}|\geqslant 1$ is of special interest. With BGCSP, $\alpha_{-n}+\alpha_{n}=0$, $\alpha_{-n+1}+\alpha_{n-1}=0$,…,$\alpha_{-1}+\alpha_{1}=0$ due to their symmetry about the origin, hence $|\sum^{n}_{i=1}\alpha_{i}|=0$ as well. ###### Theorem 3.10. (Cylindrical BGCSPs are 2-SBMs). For a complete filtered probability space $(\Omega,\mathcal{F},\\{\mathcal{F}\\}_{t\geqslant 0},\mathbb{P})$ and a BGC function $\Psi(y):\mathbb{R}\rightarrow\mathbb{R}$, $\forall y\in\mathbb{R}$, then the corresponding BGC Itô diffusion is defined as follows, $dY_{t}=f(Y_{t},t)\,dt+g(Y_{t},t)\,dW_{t}-\underbrace{\operatorname{sgn}[Y_{t}]\Psi(Y_{t},t)}_{\textbf{BGC}},$ (3.11) where $f(Y_{t},t)$ is the drift coefficient, $g(Y_{t},t)$ is the diffusion coefficient, $\operatorname{sgn}[x]$ is the usual sign function, $f(Y_{t},t)$, $g(Y_{t},t)$, $\Psi(Y_{t},t)$ are convex functions and the 2-SBM is defined by, $\displaystyle{\begin{cases}\begin{array}[]{rcl}\displaystyle dX_{t}&=&\mu\,dt+\sigma\,dW_{t}+\underbrace{\beta_{-1}\,dL^{x_{-1}}_{t}}_{<0}+\underbrace{\beta_{1}\,dL^{x_{1}}_{t}}_{>0}\\\ \displaystyle X_{0}&=&0,\text{ }\mathcal{E}\Big{(}\mu,\sigma,(\beta_{-1},\beta_{1})\Big{)}\\\ \displaystyle L^{x_{j}}_{t}&=&\int^{t}_{0}\mathds{1}_{\\{X_{s}=z_{j}\\}}\,dL^{x_{j}}_{s},\text{ }j\in\\{-1,1\\}\end{array},\end{cases}}$ (3.12) then, $Y_{t}\rightarrow X_{t}$ almost surely. ###### Proof. It is conceivable that under general non-constant $f(X_{t},t)$ and $g(X_{t},t)$ and some generalized BGC function $\Psi^{\prime}(f(X_{t},t),g(X_{t},t),X_{t},t)$ that $\Psi^{\prime}(x)$ could modulate $X_{t}$ such that it is bounded above and below by a constant barrier at $a$ and $b$, respectively, where $b=-a$. For this theorem, we are required to prove that constant over time (i.e. cylindrical) BGC functions $\Psi(X_{t},t)$ will converge almost surely to a 2-SBM. We know from at least Krykun, [14] that if $|\alpha_{i}|\leqslant 1$, $i\in\\{1,...,n\\}$, there exists a strong solution to (3.12). Since the BGC functions $\Psi(X_{t},t)\in\mathbb{R}$ are convex, there exists some value $\kappa$ for both a hidden lower barrier $\mathfrak{B}_{L}$ and a hidden upper barrier $\mathfrak{B}_{L}$ that are induced by $\Psi(X_{t},t)$. For BGCSP, there is no fully reflective barrier defined in advance as there is with M-SBM. However, there are still two fully reflective barriers in BGCSP because the BGC term $\Psi(X_{t},t)$ will enable the constrained Itô process $Y_{t}$ to eventually be overtaken by the underlying unconstrained Itô process $X_{t}$ such that $|X^{(n)}_{s}|\geqslant|Y_{s}|$ giving, $\mathfrak{B}_{U}=\kappa\text{ for }\lim_{n\uparrow\kappa}\left\\{\mathbb{E}\Big{(}\sup_{s\in[0,t]}\Big{|}|X^{(n)}_{s}|-|Y_{s}|\Big{|}\Big{)}\right\\}=0,$ (3.13) $\mathfrak{B}_{L}=-\kappa\text{ for }\lim_{n\downarrow-\kappa}\left\\{\mathbb{E}\Big{(}\sup_{s\in[0,t]}\Big{|}|X^{(n)}_{s}|-|Y_{s}|\Big{|}\Big{)}\right\\}=0.$ (3.14) For this to be true, it must be shown that $\kappa>0$ exists. We create a small neighborhood $\mathcal{N}$ about the initial point $x_{0}$ of radius $\epsilon\in\mathbb{R}_{+}$ such that $\mathcal{N}(x_{0})=(x_{0}-\epsilon,x_{0}+\epsilon)$. As $\epsilon\rightarrow+\infty$, $\mathfrak{B}_{L}$ and $\mathfrak{B}_{U}$ will eventually lie in $\mathcal{N}(x_{0})$. If $x_{0}>0$, then $\sup\\{\mathcal{N}(x_{0})\\}=x_{0}+\min(\epsilon)$ such that $\mathfrak{B}_{U}=\sup\\{\mathcal{N}(x_{0})\\}=\kappa$. If $x_{0}=0$, then $\sup\\{\mathcal{N}(x_{0})\\}=\inf\\{\mathcal{N}(x_{0})\\}$ such that $\mathfrak{B}_{L}=-\mathfrak{B}_{U}=|\mathfrak{B}_{U}|=\kappa$. If $x_{0}<0$, then $\inf\\{\mathcal{N}(x_{0})\\}=x_{0}-\min(\epsilon)$ such that $\mathfrak{B}_{L}=\inf\\{\mathcal{N}(x_{0})\\}=-\kappa$. Hence $\kappa$ exists and its value is $\kappa=f(\Psi(X_{t},t),X_{t},t,\mu,\sigma)$ for some function $f:\mathbb{R}\rightarrow\mathbb{R}$. Having found $\kappa$, we know that the reflectiveness at $\pm\kappa$, i.e. $|\beta_{\kappa}|=1$, $|\beta_{-\kappa}|=1$ and before $\pm\kappa$, i.e. $|\beta_{i}|<1$, $|\beta_{-i}|<1$. Hence, $\beta_{-\kappa},...,\beta_{-1},\beta_{1},...,\beta_{\kappa}$ for $X_{t}$ must be scaled for $Y_{t}$ by $\Psi(X_{t},t)$ and since $\Psi(X_{t},t)$ is strictly convex and symmetrical about the origin, then the ordering is preserved, $\frac{\beta_{-\kappa}}{\Psi(\kappa,t)}<...<\frac{\beta_{-1}}{\Psi(\kappa,t)}<\frac{\beta_{1}}{\Psi(\kappa,t)}<...<\frac{\beta_{\kappa}}{\Psi(\kappa,t)}.$ (3.15) (3.15) ensures that a strong solution to BGCSP exists within a 2-SBM framework, completing the proof. ∎ So far, our formulations of BGC functions have been expressed in the general form $\Psi(X_{t},t)$, but we have considered BGC barriers induced by time- independent convex surfaces which can be specified by just $\Psi(X_{t})$, hence M-SBM is related to BGCSPs with $\Psi(X_{t})$. However, since the barriers have been specified to be able to change not only under space (distance) but over time as well, we demonstrate this additional complexity of BGCSPs in Figure 10. Figure 10. Example BGC Function $\Psi(X_{t},t)$ Constraining BGCSPs over Space and Time, more so than in M-SBM Having developed the M-SBM and 2-SBM frameworks for BGCSP, we can now support this by numerical simulations in the Results and Discussion section. ## 4\. Results and Discussion In the following simulations, the underlying unconstrained Itô diffusions have drift $\mu=0$ and diffusion $\sigma=1$, resulting in just the Wiener process. This is so that the subsequent impact of BGC can be easily compared. Despite this, we still refer to these as the more general Itô diffusions because these parameters can be modified for one’s specific requirements. To validate the existing M-SBM research and to support our comparison of BGCSP with M-SBM, we develop Algorithm 1 which is used to progressively introduce additional reflective barriers. In the subsequent series of simulations, we introduce 2, 4, 8, 16 and finally 32 semipermeable barriers, with increasing reflectiveness (i.e. decreasing permeability) the further the Itô diffusion is from the origin, which are simulated via Algorithm 1. 1 # Pseudocode based on R 2 INPUT: 3 $\mu=drift,\text{ }\sigma=diffusion,\text{ }i=simulation\text{ }index,\text{ }$s$=\\#\text{ }simulations=10,000,\text{ }t=time\text{ }steps=1001,\text{ }j=time\text{ }index,\text{ }Print\\_Simulations=TRUE$ 4 OUTPUT: 5 $ID\\_value\leftarrow matrix(0:0,nrow=TimeSteps,ncol=Simulations)$ 6 $T\\_1000\leftarrow matrix(0:0,nrow=Simulations,ncol=1)$ 7 for _(i=1:s)_ do 8 for _(j=1:t)_ do 9 if _(t $==$1)_ then 10 $ID\\_value[t,i]\leftarrow 0$ 11 else 12 $dt=(t/TimeSteps)$ 13 $ID\\_value[t,i]\leftarrow(\mu*dt+\sigma*rnorm(1))$ 14 $Sum\\_ID\\_value\leftarrow sum(ID\\_value[,i])$ 15 16 $\\#$ UPPER BARRIERS$================================$ 17 if _$((Sum\\_ID\\_value >0)\text{ }\&\&\text{ }(Sum\\_ID\\_value<=UpperBarrier\\_01))$_ then 18 Do nothing; 19 else if _$((Sum\\_ID\\_value >UpperBarrier\\_01)\text{ }\&\&\text{ }(Sum\\_ID\\_value<=UpperBarrier\\_02))$_ then 20 $ID\\_value[t,i]\leftarrow(ID\\_value[t,i]-abs(ID\\_value[t,i]*ID\\_value[t,i])/100)$ 21 else if _$(Sum\\_ID\\_value >UpperBarrier\\_16)$_ then 22 $ID\\_value[t,i]\leftarrow(-abs(ID\\_value[t,i]))$ 23 else 24 $ID\\_value[t,i]\leftarrow ID\\_value[t,i]$ 25 end if 26 27 $\\#$ LOWER BARRIERS$================================$ 28 if _$((Sum\\_ID\\_value <0)\text{ }\&\&\text{ }(Sum\\_ID\\_value>=LowerBarrier\\_01))$_ then 29 Do nothing; 30 31 else if _$(Sum\\_ID\\_value <LowerBarrier\\_16)$_ then 32 $ID\\_value[t,i]\leftarrow(abs(ID\\_value[t,i]))$ 33 else 34 $ID\\_value[t,i]\leftarrow ID\\_value[t,i]$ 35 end if 36 37 end if 38 if _(Print_Simulations $==$TRUE)_ then 39 if _(i $==$1)_ then 40 $plot(T,cumsum(ID_{v}alue[,i]),type="l",ylim=c(yMax,yMin))$ 41 else 42 $lines(T,cumsum(ID_{v}alue[,i]),type="l",ylim=c(yMax,yMin))$ 43 end if 44 45 end if 46 47 end for 48 $T\\_1000[i]<-sum(ID\\_value[,i])$ 49 end for Algorithm 1 Approximating BGC Stochastic Processes via Successive Reflective Barriers The simplest application of Algorithm 1 is shown for two fully reflective barriers in Figure 11. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 11. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 2 Reflective Barriers Figure 11 has 2 fully reflective barriers at $\pm 10$ generated using Algorithm 1. This was then increased to 4 barriers (2 fully reflective and 2 semipermeable) as shown in Figure 12. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 12. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 4 Reflective Barriers In Figure 12, we make the barriers at $\pm 20$ fully reflective and the barriers at $\pm 10$ now to be semipermeable. Although it may not yet be apparent due to the thickness of the drawn barriers, we have and will continue to increase the thickness of the barriers to highlight the increasing reflectiveness (and decreasing semipermeability) the further the Itô diffusions are from the origin. The total number of barriers was doubled again to result in 8 barriers (2 fully reflective and 6 semipermeable), as shown in Figure 13. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 13. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 8 Reflective Barriers In Figure 13(b), we start to notice a corrugation or ‘crinkling’ of the density due to 2 fully reflective barriers and 6 semipermeable barriers. This was doubled again to 16 barriers (2 fully reflective and 14 semipermeable), as shown in Figure 14. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 14. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 16 Reflective Barriers In Figure 14(b), we notice that the corrugation effect has become more pronounced due to another doubling of the number of barriers. This was doubled again to 32 barriers (2 fully reflective and 30 semipermeable), as shown in Figure 15. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 15. 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 32 Reflective Barriers Finally, in Figure 15(b), we notice the most amount of the corrugation effect due to yet another doubling of the number of semipermeable barriers. Due to the importance of this density as a sufficient approximation of BGC densities, we plot the density again in Figure 16 without the barriers depicted and slightly larger. Figure 16. Typical Density of BGC Itô Diffusions Approximated by 10,000 Simulations of 1,000 Step 1-Dimensional Itô Diffusions With 32 Reflective Barriers Figure 16 shows that after 32 barriers, we effectively arrive at the typical density of BGC Itô diffusions, which have an infinite number of increasingly reflective barriers, with just 2 fully reflective hidden barriers. If we take the limit of this numerical approximation process, the number of such barriers $n$ would approach infinitely many barriers, of smaller and smaller size and hence smaller constraining contribution. These approximation barriers are thus replaced by the main BGC function itself, $\Psi(X_{t},t)=(\frac{X_{t}}{10})^{2}$, as shown in Figure 17, where the algorithm for BGCSP was stated in [32]. (a). 1,000 Simulations, (b). 10,000 Simulation Density Figure 17. 10,000 Simulations of 1,000 Step BGC 1-Dimensional Itô Diffusions From Figure 17, we see the typical characteristics of BGCSPs; 1). a certain amount of discretization or banding at various local times, 2). the emergence of two hidden reflective barriers that are not known exactly in advance and can only be estimated, 3). the density is ‘corrugated’ or ‘rough’. The random component of the Itô diffusions, i.e. the $dW_{t}$ term is sampled from a standard normal distribution that is then constrained by BGCSP. The density of Figure 17(b) has no discontinuities. However, if we sample the path increments from a discrete binary (i.e. binomial) random distribution, we obtain a random walk that is then constrained by BGCSP. When a histogram is derived for the corresponding simulated data rather than fitting a density through the distribution, we obtain Figure 18, which shows the discontinuities, also evident in [33]. (a). $\bm{t\in[0,1000]}$, (b). $\bm{t=1000}$. Figure 18. Histogram of 10,000 Simulations of 1,000 Step BGC 1-Dimensional Itô Diffusions Showing Discretization or Banding, for Sampling $dW_{t}$ from a Binomial Distribution Figure 18 shows that 1). reflection occurs at the barriers as seen by the peaks on either side of the distribution (more prominent in (a)), and 2). discretization or banding occurs at prominent local times that are contracted together due to the BGC function $\Psi(X_{t},t)$. Figure 18(a) shows similar ‘corrugation’ as in the continuous case in Figure 16. Figure 18(b) shows that at $t=T$, the BGC Itô diffusion is less likely to be at the origin and more likely to be near the barrier(s). To further demonstrate the characteristics of BGCSP, a detailed plot of 10,000 simulations are shown in Figures 19 and 20. Figure 19. 200 BGC Itô Diffusions Sampled from the Standard Normal Distribution Figure 20. 1,000 BGC Itô Diffusions Sampled from the Standard Normal Distribution ## 5\. Conclusions This paper has extended the previous theoretical research on BGCSP by comparing them to a type of multi-skew Brownian motion (M-SBM). This was achieved both theoretically by leveraging existing research, and heuristically by generating new simulations. Working within the M-SBM framework, we proved one Lemma and two Theorems for BGCSPs. This research provides a richer framework in which the semipermeable barriers are modulated in a non-constant manner over distance $X$, allowing for a new constraining regime that is more complex than the Ornstein-Uhlenbeck process (OUP) and yet still related to it. BGCSPs have applications in many fields requiring the constraining of the underlying stochastic process in a gradual manner where the two ultimate reflective barriers are not known in advance. ## References * Appuhamillage and Sheldon, [2012] Appuhamillage, T. and Sheldon, D. (2012). First passage time of skew brownian motion. J. Appl. Probab., 49(3):685–696. * Atar and Budhiraja, [2015] Atar, R. and Budhiraja, A. (2015). On the multi-dimensional skew brownian motion. Stochastic Process. Appl., 125(5):1911–1925. * Ball and Roma, [1998] Ball, C. A. and Roma, A. (1998). Detecting mean reversion within reflecting barriers: application to the european exchange rate mechanism. Applied Mathematical Finance, 5(1):1–15. * Bramson et al., [2010] Bramson, M., Dai, J., and Harrison, J. (2010). Positive recurrence of reflecting brownian motion in three dimensions. The Annals of Applied Probability, 20(2):753–83. * Budhiraja and Dupuis, [2003] Budhiraja, A. and Dupuis, P. (2003). Large deviations for the emprirical measures of reflecting brownian motion and related constrained processes in r+. Electronic Journal of Prob., 8. * Dereudre et al., [2015] Dereudre, D., Mazzonetto, S., and Roelly, S. (2015). An explicit representation of the transition densities of the skew brownian motion with drift and two semipermeable barriers. arXiv preprint arXiv:1509.02846. * Dua et al., [1976] Dua, S., Khadilkar, S., and Sen, K. (1976). A modified random walk in the presence of partially reflecting barriers. J. Appl. Prob., 13:169–175. * Gairat and Shcherbakov, [2017] Gairat, A. and Shcherbakov, V. (2017). Density of skew brownian motion and its functionals with application in finance. Mathematical Finance, 27(4):1069–1088. * Gupta, [1966] Gupta, H. (1966). Random walk in the presence of a multiple function barrier. Journ. Math. Sci., 1:18–29. * Harrison and Shepp, [1981] Harrison, J. and Shepp, L. (1981). On skew brownian motion. Ann. Probab., 9(2):309–313. * Harrison, [1986] Harrison, M. (1986). Brownian Motion and Stochastic Flow Systems. John Wiley & Sons. * Hu et al., [2012] Hu, Q., Wang, Y., and Yang, X. (2012). The hitting time density for a reflected brownian motion. Computational Economics, 40(1):1–18. * Itô and McKean, [1965] Itô, K. and McKean, H. (1965). Diffusion Processes and Their Sample Paths. Springer, New York. * Krykun, [2017] Krykun, I. (2017). Convergence of skew brownian motions with local times at several points that are contracted into a single one. Journal of Mathematical Sciences, 221(5):671–678. * LeGall, [1984] LeGall, J. (1984). One-dimensional stochastic differential equations involving the local times of the unknown process. Springer, Berlin, Heidelberg. * Lehner, [1963] Lehner, G. (1963). One-dimensional random walk with a partially reflecting barrier. Ann. Math. Stat., 34:405–412. * Lejay, [2006] Lejay, A. (2006). On the constructions of the skew brownian motion. Probab. Surv., 3:413–466. * L’epingle, [2009] L’epingle, D. (2009). Boundary behavior of a constrained brownian motion between reflecting-repellent walls. * Linetsky, [2005] Linetsky, V. (2005). On the transition densities for reflected diffusions. Advances in Applied Probability, 37(2):435–460. * Lions and Sznitman, [1984] Lions, P. and Sznitman, A. (1984). Stochastic differential equations with reflecting boundary conditions. Communications on Pure and App. Maths, 37(4):511–537. * Mazzonetto, [2016] Mazzonetto, S. (2016). On the exact simulation of (skew) Brownian diffusions with discontinuous drift (Doctoral dissertation, Universität Potsdam). * Mazzonetto, [2019] Mazzonetto, S. (2019). Rates of convergence to the local time of oscillating and skew brownian motions. arXiv preprint arXiv:1912.04858. * Ouknine et al., [2015] Ouknine, Y., Russo, F., and Trutnau, G. (2015). On countably skewed brownian motion with accumulation point. Electron. J. Probab., 20(82):1–27. * Percus, [1985] Percus, O. (1985). Phase transition in one-dimensional random walk with partially reflecting boundaries. Adv. Appl. Prob., 17:594–606. * Portenko, [1976] Portenko, N. (1976). Generalized diffusion processes. Springer, Berlin. * Ramirez, [2011] Ramirez, J. (2011). Multi-skewed brownian motion and diffusion in layered media. Proceedings of the American Mathematical Society, 139(10):3739–3752. * Sacerdote et al., [2016] Sacerdote, L., Tamborrino, M., and Zucca, C. (2016). First passage times of two-dimensional correlated processes: Analytical results for the wiener process and a numerical method for diffusion processes. Journal of Computational and Applied Mathematics, 296:275–292. * [28] Taranto, A. and Khan, S. (2020a). Bi-directional grid absorption barrier constrained stochastic processes with applications in finance and investment. Risk Governance & Control: Financial Markets & Institutions, 10(3):20–33. * [29] Taranto, A. and Khan, S. (2020b). Drawdown and drawup of bi-directional grid constrained stochastic processes. Journal of Mathematics and Statistics, 16(1):182–197. * [30] Taranto, A. and Khan, S. (2020c). Gambler’s ruin problem and bi-directional grid constrained trading and investment strategies. Investment Management and Financial Innovations, 17(3):54–66. * [31] Taranto, A. and Khan, S. (2021a). Application of bi-directional grid constrained stochastic processes to algorithmic trading. Journal of Mathematics and Statistics, 17(1):22–29. * [32] Taranto, A. and Khan, S. (2021b). Hidden geometry of bi-directional grid constrained stochastic processes. arXiv preprint. * Taranto et al., [2020] Taranto, A., Khan, S., and Addie, R. (2020). Iterated logarithm bounds of bi-directional grid constrained stochastic processes. arXiv Preprint: Modern StochAstic Models & ProbleMs Of Actuarial MaTHematics (MAMMOTH) Conference, pages 1–21. * Weesakul, [1961] Weesakul, B. (1961). The random walk between a reflecting and an absorbing barrier. Ann. Math. Statist., 32:765–769.
arxiv-papers
2021-07-27T02:12:51
2024-09-04T03:07:20.367284
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Aldo Taranto, Ron Addie, Shahjahan Khan", "submitter": "Aldo Taranto", "url": "https://arxiv.org/abs/2107.12554" }
2107.12556
figure table # The Keck Planet Imager and Characterizer: A dedicated single-mode fiber injection unit for high resolution exoplanet spectroscopy Jacques-Robert Delorme Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Nemanja Jovanovic Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Daniel Echeverri Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Dimitri Mawet Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA J. Kent Wallace Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA Randall D. Bartos Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA Sylvain Cetre W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Peter Wizinowich W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Sam Ragland W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Scott Lilley W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Edward Wetherell W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Greg Doppmann W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Jason J. Wang Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Evan C. Morris U.C. Santa Cruz, 1156 High Street, Santa Cruz, Ca 95064, USA. Jean-Baptiste Ruffio Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Emily C. Martin U.C. Santa Cruz, 1156 High Street, Santa Cruz, Ca 95064, USA. Michael P. Fitzgerald Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Garreth Ruane Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA Tobias Schofield Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Nick Suominen Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA Benjamin Calvin Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Eric Wang Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Kenneth Magnone Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Christopher Johnson Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Ji Man Sohn Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Ronald A. López Department of Physics & Astronomy, University of California, Los Angeles, CA 90095, USA Charlotte Z. Bond W. M. Keck Observatory, 65-1120 Mamalahoa Highway., Kamuela, HI 96743, USA. Jacklyn Pezzato Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Jorge Llop Sayson Department of Astronomy, California Institute of Technology, Pasadena, CA 91106, USA Mark Chun Institute for Astronomy, University of Hawaii, 640 N. Aohoku Place, Hilo, HI 96720, USA. Andrew J. Skemer U.C. Santa Cruz, 1156 High Street, Santa Cruz, Ca 95064, USA. ###### Abstract The Keck Planet Imager and Characterizer (KPIC) is a purpose-built instrument to demonstrate new technological and instrumental concepts initially developed for the exoplanet direct imaging field. Located downstream of the current Keck II adaptive optic system, KPIC contains a fiber injection unit (FIU) capable of combining the high-contrast imaging capability of the adaptive optics system with the high dispersion spectroscopy capability of the current Keck high resolution infrared spectrograph (NIRSPEC). Deployed at Keck in September 2018, this instrument has already been used to acquire high resolution spectra ($R>30,000$) of multiple targets of interest. In the near term, it will be used to spectrally characterize known directly imaged exoplanets and low-mass brown dwarf companions visible in the northern hemisphere with a spectral resolution high enough to enable spin and planetary radial velocity measurements as well as Doppler imaging of atmospheric weather phenomena. Here we present the design of the FIU, the unique calibration procedures needed to operate a single-mode fiber instrument and the system performance. ###### keywords: Instrumentation, W. M. Keck Observatory, Exoplanets, High contrast imaging, High dispersion coronagraphy, High resolution spectroscopy * Corresponding author: Jacques-Robert Delorme, [email protected] ## 1 Introduction Since the first exoplanet detections almost three decades ago [1, 2], thousands have been detected and confirmed using various indirect and direct observing strategies. Each technique provides access to specific planet populations and allows the observer to retrieve specific parameters of the systems observed. Characterization of these planetary systems is critical to understanding their properties, formation and evolution. Photometric and spectroscopic data are particularly valuable as they give access to multiple parameters (orbital parameters, spin, temperature, atmospheric composition, cloud coverage…). High dispersion spectroscopy (HDS) has quickly been recognized as a powerful way to characterize exoplanet atmospheres and some strategies has been developed to spectrally characterize exoplanets detected using indirect methods [3, 4]. However, these measurements were challenging until more advanced observing strategies became available and used with stable infrared spectrographs such as Keck/NIRSPEC [5] or VLT/CRIRES [6]. The first molecular detections in exoplanet atmospheres allowed observers to constraint orbital parameters and retrieve new information such as wind flow and molecule mixing ratios [7]. In parallel, the adaptive optic (AO) system and the infrared detectors of VLT/NACO [8, 9] have been used to image the first exoplanet in 2004 [10] followed in 2008 by the detection of the first three companions to HR 8799 [11], using the high contrast imaging (HCI) capabilities of both Keck and Gemini telescopes. These high HCI techniques have since been improved and many new observing strategies developed. Today most of the large telescopes have HCI capabilities, which enabled the detection of a few dozen companions. Photometric and spectroscopic data have slowly been collected on all the companions imaged using low to medium resolving power instruments (R$\sim$10–5,000) such as Keck/OSIRIS [12], Keck/Nirc2, LBT/LMIRcam [13], Palomar/P1640 [14], VLT/Sphere [15], Gemini/GPI [16] or Subaru/CHARIS [17]. The next step in the field is to push to higher resolving power (R$>$30,000) in order to collect spectral data where absorption and emission lines begin to be resolved by using the high dispersion coronagraphy (HDC) technique [18, 19, 20, 21, 22]. This technique optimally combines HCI and HDS and provides the ability to do species-by-species molecular characterization (e.g. water, carbon monoxide, methane,…), thermal (vertical) atmospheric structure, planetary spin measurements (length of day), and potentially Doppler imaging of atmospheric (clouds) and/or surface features (continents versus oceans) [20]. As none of the current facility instruments at large telescopes offers both HCI and HDS capabilities together, several projects recently commenced to combine the HCI capabilities with the HDS capabilities of various instruments at those observatories. Among them the Fiber Injection Unit (FIU) part of the Keck Planet Imager and Characterizer (KPIC) project presented in this paper, the Rigorous Exoplanetary Atmosphere Characterization with High dispersion coronography instrument (REACH) [23, 24] and High-Resolution Imaging and Spectroscopy of Exoplanets (HiRISE) [25]. The first two projects are both transitioning from commissioning to early science at the time of writing of this article and offer complimentary wavelength coverage across the near-IR (NIR) on Mauna Kea (REACH operates from Y-H and the KPIC-FIU operates in K and L bands), while HiRISE is still in the development stage. In this paper, we present a detailed overview of the design and performance of the dedicated FIU for the Keck II telescope. In Sect. 2 we briefly introduce the KPIC demonstrator in which the FIU is contained and presents its goals and the requirement who must be satisfied to reach them. In Sect. 3, we present details of the design of the FIU, a quick description of the key components of NIRSPEC and our studies into the two key properties of the FIU: background and throughput. In Sect. 4, we describe the main calibration procedures performed to prepare the FIU for science observations. Section 5 presents the acquisition sequence used during the night to acquire science data and we present some example data acquired on one of our first test targets (HR 7672 B [26]). In Sect. 6 we demonstrate the sorts of information that can be extract from HDC data. Finally, Sect. 7 rounds out the paper with some concluding thoughts. ## 2 Keck Planet Imager and Characterizer The Keck Planet Imager and Characterizer is a demonstrator deployed at the W. M. Keck Observatory. Located downstream of the Keck II adaptive optic system [27], the goal of this platform is to demonstrate multiple new concepts to image and characterize exoplanets on-sky. In order to reduce the complexity of such a project, the project is broken into phases. Phase I, deployed at the summit of Maunakea in fall 2018, contains an infrared pyramid wavefront sensor (PyWFS) [28] and the modules and components critical for the demonstration of the FIU. Figure 1 presents several pictures of the KPIC optomechanics before their deployment. The vertical aluminum plate (unanodized) is the FIU plate. It supports optics commons to both the FIU and PyWFS as well as the components for the FIU. The black anodized plate is the PyWFS plate. It supports all the optics of the PyWFS. The horizontal plate located under the two previous plates is a kinematic platform to simplify co-alignment between the two vertical plates. The orange module supported by 3 struts is a SAPHIRA detector used by the PyWFS. --- Figure 1: Pictures of KPIC before its deployment. The second phase, planned to deploy in late 2021 will contain extra modules: an atmospheric dispersion compensator, phase induced amplitude apodization optics, a high order deformable mirror and coronagraphs, whose goal will be to improve the overall throughput for the planet light, while reducing star light leakage to reduce overall integration times[29, 30, 31]. In this paper, we present a detailed overview of the first phase FIU and its performance. ### 2.1 FIU phase I goals and requirements The first version of the FIU presented in this paper has been designed as a prototype. The design has been driven by the space available in the Keck II AO bench, the existing science instruments available at Keck (i.e. NIRC2 and NIRSPEC) and the science goals. Its main goal was to demonstrate the concept by acquiring high resolution spectral data on a variety of targets. We wanted the instrument to be able to observe of all known substellar companions accessible to Keck, which sets most of the requirements as shown in Table 1. To achieve this goal, the target or its host star must be observable by the Keck II AO system. Although the FIU can be used in combination with the visible Shack Hartmann wavefront sensor, we mainly use it with the IR PyWFS. Since its deployment, this wavefront sensor, which operates in H band, has been consistently used to observe targets up to $12^{th}$ magnitude. The Strehl ratio measured in K band is 65% in 0.5 arcsec seeing and 45% in 1 arcsec seeing when the H magnitude of the star observed is $\leq 6$. Above this magnitude performance progressively decreases. The performance of this wavefront sensor has been described in detail in Ref. 28. It is currently not possible to close the AO loop on a system with two or more components if they have a similar H magnitude and a separation between 0.5 and 2 arc-seconds. This issue will be addressed when the second phase will be deployed. Because the PyWFS is using most of the H band light and the targets of interest are brighter in the K and L bands, the first version of the FIU was designed to collect spectral data in those photometric bands. Once the AO loop is closed, the main challenge is to precisely align the object of interest with a single mode fiber (SMF) with a precision of less than one fifth of a $\lambda/D$ ($\leq$ 10 mas in K band) to achieve and maintain high coupling. To align the object of interest with a SMF, we image the system on a detector. Usually not visible on this detector, the object of interest is aligned with a SMF by tracking the position of its host star at a relatively low frequency ($<1$Hz). This camera is sensitive to both J and H bands. However, we permanently installed a H band filter in front of it. In the second phase of this project we will installed it in a filter wheel with multiple filter options.In order to observe all known substellar companions accessible to Keck, we must be able to track the position of object with a H-mag up to 12 and have a capture range of $\pm 2.5$ arcsec. The use of SMFs makes the observation with such a system more challenging than observations with conventional AO-fed slit spectrographs such as Keck/NIRSPEC or VLT/CRIRES. However, they provide multiple benefits. Specifically, the SMF has a small solid angle on sky minimizing thermal background leaking into the spectrograph, which is critical in K and L band. They can also help filter out unwanted speckle (star light) [32] and they make future wavefront control relatively simple in that only a few spatial frequencies need to be addressed [33], which allows the bandwidth to be increased with these algorithms [34]. Finally, they allow the use of compact fiber-fed spectrographs that can be located of the telescope in a more stable environment. If fed by an SMF, the position and shape of the beam inside a fiber-fed spectrograph is agnostic of input conditions and greatly simplifies the spectral calibration by making the line spread function, a Gaussian profile in this case, which is extremely stable. In order to reduce the cost and the time needed for this project, we designed the FIU as an interface to connect the AO bench to NIRSPEC. Because NIRSPEC was not designed as a fiber-fed spectrograph, it constrained the design in multiple ways (shape of the cold stop, injection outside of the cryostat, size and shape of the slits available, etc) described later in this paper.NIRSPEC sets the resolving power to 35,000 if we maintain a sampling of at least 2 pixels at all wavelengths across the bands observed (K or L band). The data collected are compared to models by computing the cross correlation function (CCF). To be usable, we must be able to detect the spectral signature of the object of interest with a signal-to-noise ratio (S/N) greater than 3 after two hours of integration. The table 1 summarizes all the baseline requirements for the KPIC FIU. Tracking and acquisition --- Specifications | Value | Notes Scale of optical fibers | $\sim\lambda/D$ | SMF optimally matched to PSF Capture range | $\pm 2.5$ arcseconds | Covers most high contrast targets Alignment accuracy | $<0.2\lambda/D$ | — Tracking speed | $<1$ Hz | Tracking, not tip/tilt correction Tracking stability | $<0.2\lambda/D$ RMS | — Tracking bands | J or H band | — Limiting magnitude | $>12$ in H-mag | PyWFS limitation Spectroscopy Specifications | Value | Notes Spectral Range | K & L band | Not simultaneously Resolving Power | $\geq 30,000$ | NIRSPEC limitation Sampling | $\geq 2$ pixels | At all wavelengths Overall performance Specifications | Value | Notes Total Peak Efficiency | $\geq 2\%$ | From top of atmosphere Pt sources sensitivity | $\geq 16$ K-mag | S/N $\geq$ 3 in CCF in $\approx$ 2h. Table 1: FIU Phase I requirements. ## 3 Fiber injection unit design The FIU deployed at Keck is based on three modules: an injection module, a bundle of fibers and an extraction module. This section describes these modules, the NIRSPEC instrument used to acquire the data and the expected performances of the overall instrument. The interaction between these components and the way we are using them to achieve our goals is described in the following sections of this paper. ### 3.1 Injection module Located downstream of the Keck II AO system the goal of the injection module is to inject the light of faint companions (exoplanets, brown dwarf, etc) into one of the single-mode fibers (SMFs) of a bundle described in Sect. 3.2. Figure 2 shows a schematic of the KPIC optical layout. This diagram is not to scale and the orientation of the optics is not correct. In this paper, we only describe the optical layout of the FIU. --- Figure 2: Diagram of the KPIC optical layout. The scale and the orientation of the optics are not correct. The FIU and PyWFS plates as well as the Saphira detector are visible in the first figure of this paper. To direct the light to the FIU, the converging beam coming from the AO bench is reflected by the three optics constituting a field steering mirror module (FSM - See Fig. 2). The first optic of this FSM (A) is the KPIC pick off. It consists of an actuated dichroic and a static flat mirror installed on a translation stage. When neither optic is in the beam, all the light goes to the facility infrared imager NIRC2. If the dichroic is in the beam, 90% of the J and H band light goes to KPIC while the rest goes to NIRC2 . If the flat mirror is in the beam, all the light goes to KPIC. After the FSM, the converging beam is directed to the FIU plate. This plate is visible in the images presented in Fig. 1 (unanodized), and supports all the components of the injection module. After going through two optical relays (D-J in Fig. 2), comprised of simple reflective optics in phase I, the light is collimated by a 168.31 mm focal length off axis parabola (OAP, K) made of Zerodur and coated with protected gold (Nu-Tek). The two optical relays are based on four identical OAPs to the one used for collimation (Nu-Tek \- D, G, K, J) and two flat mirrors (Newport \- E and I). All these optics are made of Zerodur and coated with protected gold. The F# of the input and output focal plane are the same as the F# of the telescope (13.66). The diameter of the collimated beams in these relays is 12.32 mm. In the first optical relay, the static pick off dichroic of the PWS (Asahi Spectra \- F) reflects 90% of the J and H band light in the direction of the sensor while the rest of the light is transmitted (K and L band). These two optical relays mostly empty during the first phase of the project will be populated in the phase two [30, 31]. After the two relays, a tip-tilt mirror (TTM) is situated in the pupil plane of the instrument for aligning the target with the fiber as well as fine tuning the pointing onto the fibers (L). The TTM (Physik Instrumente, S-330.8SL) is a piezo mechanism, which offers a field steering of $\pm$ 2.4 arc-second in two axes. An off-the-shelf protected gold flat mirror (Thorlabs, 19 mm diameter) is attached to the platform using a custom made, flexure-based mirror holder. Made of Invar and titanium, this mirror holder has been designed to minimize the forces applied to the flat mirror in order to minimize distortions and to be as light as possible in order to optimize the response of the overall TTM module. A custom dichroic (Asahi Spectra, M) is used to split light and direct it to the camera for tracking purposes while allowing science light to pass through to the injection unit. It reflect 90% of the J and H band light while longer wavelength light ($\geq$K and L) is transmitted. The reflected path towards the camera contains a H band filter (Asahi Spectra, P), an air-spaced achromatic doublet (Thorlabs, Q), a plano-concave lens (Edmund Optics, R) and a low noise InGaAs detector (First Light Imaging, Cred-2 [35]), which offers a 4.125 $\times$ 5.125 arc-second field-of-view (FOV, 512 x 620 pixels, with an $\approx$ 8.06 mas/pixel sampling). When KPIC is used as a FIU, this detector is used to track the position of the science targets. For this reason, we refer to it as the “tracking camera”. A stage can be used to translate the plano-concave lens in/out of the beam. When out of the beam, a pupil image of the Keck primary is formed. When in the beam, a focal plane image is formed. The FOV of this detector has been carefully selected to be able to observe the targets of interest selected for this project. It limits the maximum separation between the objects of the systems observed. However, this FOV allows us to observe most of the exoplanets already imaged and visible from Maunakea. The K and L band light is next incident on the injection optic (N): a 35 mm focal length OAP (Nu-Tek). Made of Zerodur and coated with protected gold, this optic is the last of the FIU module before the fiber bundle (O) described in the following section. The bundle is carefully positioned at the focus (F# = 2.8) and on the optical axis of the OAP. The effective focal length of the OAP is the one which maximizes the injection into the fiber for both K and L bands. To aid in aligning the incoming beam with the bundle, a corner cube (T) is located beneath the dichroic. Its role will be explained in the calibration procedures of the system (see Sect. 4.1.1 ). ### 3.2 Fiber bundle The fiber bundle has several key roles: 1) it is used to route the science light to the spectrograph and 2) it has peripheral fibers that light can be reverse injected into to aid with alignment optimization. The layout of the bundle used in KPIC is shown in Fig. 3. On the input end, the fiber bundle is connected to the injection module (see Sect. 3.1) located inside the Keck AO bench. On the output side, the fiber bundle is connected to the extraction module (see Sect. 3.3) located in the calibration unit of NIRSPEC [36] a facility class high spectral resolution spectrograph of the W. M. Keck Observatory. --- Figure 3: Diagram the first KPIC-FIU fiber bundle. Manufactured by Fiber Guide Industries this critical component of the FIU is based on ZBLAN 6.5/125 fluoride fibers (Le Verre Fluoré) and SMF-28-ULTRA silica fibers (Corning). The bundle contains five ZBLAN 6.5/125 science fibers going from the input to the output connectors (note, this indicates the fibers have a $6.5~{}\mu$m diameter core and $125~{}\mu$m cladding). These are indicated in red on the diagram. This part of the bundle is 5 m long, a length necessary to connect the injection and extraction modules. The science fibers are surrounded by six SMF-28-ULTRA calibration fibers at the input connector end and two ZBLAN 6.5/125 calibration fibers on the output connector end, represented in blue and orange in the figure respectively. These alignment fibers are contained within the furcation tubing of the main bundle for about $50$ cm before they are broken out into individual fibers with FC/PC connectors. The input and output connectors also contain dummy fibers which act as scaffolding to locate the science and calibration fibers during manufacturing. Represented in black in the diagram, these fibers are segments of SMF-28-ULTRA terminated within the package. The custom input and output connectors were manufactured using two different approaches compatible with the specific needs of each connector. The input connector contains three layers of fibers where the position of each fiber is not critical. In this connector, the fibers are butted cladding-to-cladding and their position is maintained by an outer metallic structure. The cladding- to-cladding construction maintains the core separation of two adjacent fibers to $\approx 125\>\mu$m which corresponds to $\approx 800$ mas in K band. The output connector contains only one layer of fibers but these fibers must be aligned with a high precision to make sure they pass through the mechanical slit of NIRSPEC downstream. For this reason, the fibers are supported using a V-groove on this side. The pitch of the V-groove used set the core-to-core separation between two adjacent fibers to $127\>\mu$m. On the input side, four of the input calibration fibers, labeled $C_{1}$, $C_{2}$, $C_{4}$ and $C_{6}$ in the diagram, are connected to a 1550 nm laser source. The two other input calibration fibers ($C_{3}$ and $C_{5}$) were connected to two high speed InGaAs photo-detectors. On the output side, the two calibration fibers ($C_{A}$ and $C_{B}$) were connected to two broadband infrared light sources (tungsten lamps, Thorlabs, SLS202L). In section 4 we describe how and when these elements are used. Figure 4 shows a picture of the fiber bundle currently used by KPIC (left) and a picture of the input connector (right). For reference, the diameter of the connector is 7 mm. The gold coating visible on the input connector is an anti- reflection (AR) coating to optimize the throughput of the bundle in K and L bands, and is used at the output as well. The overall throughput of the bundle in K band was measured in the laboratory to be $95.3\%$ in K band. According to the manufacturer, the attenuation of the ZBLAN fiber varied between 2.6 and 5.3 dB/km across the K-band which corresponds to a throughput $\geq 99.4\%$ for 5 meters of fiber. The rest of the throughput loss is due to the Fresnel reflections which occur at both ends of the bundle due to imperfect AR coatings. The L-band throughput has not been measured because of a lack of equipment in those bands. However, some preliminary observations in L-band indicate that the throughput of the bundle in this band is close to expectation. --- Figure 4: Left: Picture of the bundle. Right: Picture of the input connector of the bundle. The minimum number of fibers needed to acquire HDC data is three: one for the target of interest, one for its host star and one for the sky background. The final number of science fibers was chosen as a trade off between the price of the bundle and various technical constraints. For instance, the shape and size of the NIRSPEC slit limits the number of fibers on the output connector and imposes a linear arrangement of fibers. We decided to use a design with five science fibers to cover most science cases and to have redundancy in case one of the science fibers was damaged. Regarding the calibration fibers, the bundle has been designed to be functional even if one of the calibration fibers of each set is damaged (one fiber connected to the laser, one to the photo-detector and one to the broadband light source). The position of the fibers on the input connector was not critical. We required the arrangement of fiber relatively to be compact in order to image most or all of them on the tracking camera if needed. To keep the system simple and efficient, we chose to maintain a coarse separation between the fibers. The minimum separation between two fibers is $\approx 800$ mas and the maximum is $\approx 4000$ mas. Because the star is usually brighter than the companion by several magnitudes, we can collect stellar light even if the star is not aligned with a fiber (light from the speckle field). We can adjust the amount of stellar light injected into a science fiber using the rotator of the telescope by bringing the star closer to a science fiber or moving it away. If the host star cannot be brought close enough to a science fiber when data are collected on the companion, we can collect spectral data on the host star before or/and after by aligning it with one of the science fibers. Finally, because the separation between the first and last science fiber is $\approx 4$ arcsec, one of the fibers will always be far enough from the star to acquire background data. ### 3.3 Extraction module The extraction module, known as the fiber extraction unit (FEU) is the interface between the fiber bundle and NIRSPEC. Its goal is to reshape the light coming from the different fibers of the bundle and optimally inject this light into the high-resolution spectrograph, which was originally designed to work in the seeing limit. The left panel of Figure 5 shows a picture of the FEU installed in the calibration unit of NIRSPEC, and the right panel is the computer-aided design (CAD) model. --- Figure 5: Left: picture of the FEU installed in NIRSPEC’s calibration unit. Right: a CAD model view of the FEU. A custom made brass part visible in the right panel of Fig. 5 (labeled 2) guides the output connector of the bundle (labeled 1) and aids in aligning it with an air-spaced doublet collimating lens mounted in the same part. This part has been made of brass mainly because this material is relatively soft and easy to machine. On the doublet side, we built a custom barrel to match the diameter of the lenses and to adjust the distance between the lenses if needed. For the bundle, we chose the material of the barrel to be softer than the material of the bundle (aluminum) to minimize the risk of galling when the bundle slides in the barrel. The doublet is composed of a germanium and silicon lens (Rocky Mountain Instrument). The effective focal length of this doublet is 10.84 mm and the throughput in K and L bands was measured to be $>92\%$. The numerical aperture of the science fiber has been measured in laboratory to be 0.175 at 2 $\mu$m. After the air-spaced doublet, the $1/e^{2}$ diameter of the collimated Gaussian beam is 3.8 mm. Close to its output connector, the stainless steel mono-coil jacket of the bundle is attached to a motorized translation stage (labeled 4) using a custom made kinematic interface (labeled 3). The translation stage is used to move the bundle along the optical axis guided by the brass part, which corresponds to the focus axis of the bundle/lens system. The brass piece prevents the bundle from moving in the axes perpendicular to the optical axis and constrains the pitch and yaw of the output connector while the bundle is being focused. The rotation of the bundle about the optical axis is constrained by a clamp and kinematic interface. This simple kinematic interface combined with the brass holder have proved reliable when it comes to returning the fiber bundle to the same position and orientation each time it has been connected. This assembly is mounted on two motorized translation stages, labeled 5, used as a pupil steering mechanism to move the fiber bundle and the air spaced doublet in the plane perpendicular to the optical axis. This mechanism is used each time the bundle is connected to align the beam coming from the bundle to the NIRSPEC field stop located into the cryostat. The next and last optical element of the fiber extraction unit is a TTM (labeled 6) held by a custom made bracket (labeled 7). Based on a Newport CONEX-AG-M100D, this element reflects the light in the direction of NIRSPEC calibration unit. This TTM is located in a pupil plane and is used to align the images of fibers with the slit of the spectrograph. ### 3.4 NIRSPEC Figure 6 presents a diagram of the optical layout of NIRSPEC (not to scale). For more information regarding the NIRSPEC optical layout please consult: Ref. 36, 37 and 38. NIRSPEC’s calibration unit located to the left side of this diagram contains the FEU described in the previous section. --- Figure 6: Diagram of the NIRSPEC optical layout with the FEU installed in its calibration unit. This diagram is not to scale and does not show the optics in the correct orientation. A fold mirror (labeled D) installed in the calibration unit of NIRSPEC was motorized using a flip mechanism (OWIS,KSHM 65-LI-MDS). It is used to select the input of the calibration unit. When in the beam, the mirror directs light coming from the calibration sources of NIRSPEC’s integrating sphere (and an air-spaced collimating triplet) to the slit in order to calibrate the spectrograph. When out of the beam, the light from the FEU is directed to NIRSPEC. After this optical element, the light is focused by an air-spaced triplet (E - EFL = 152.4 mm) and reflected by a motorized fold mirror (F) before it enters into the NIRSPEC cryostat. When KPIC is in use, this fold mirror is in the beam. After this mirror, the beam goes through the uncoated CaF2 window of the NIRSPEC cryostat before being reflected by the three mirrors of the rotator. The second optic of this rotator (I) is an OAP (EFL = 400 mm). After the rotator the collimated Gaussian beam ($1/e^{2}$ diameter of 10.0 mm) passes through two filter wheels (K) before being focused by an OAP (M) onto the selected slit located in a slit wheel (O). All NIRSPEC slits are reflective. The light passing through the slit is dispersed and imaged on the science detector named ‘Spec’ (Teledyne, science grade Hawaii-2RG detector). The light reflected by the slit is imaged by a slit-viewing camera named ‘Scam’ (Teledyne, engineering grade Hawaii-2RG detector). Figure 7 presents a combination of images acquired with the slit-viewing camera. This image has been obtained by combining images acquired with light injected into each fiber of the output connector of the bundle (see Sect. 3.2). This image presents the case where the PSFs associated with the fibers has been offset from the slit. This mode is mainly used during the calibration of the instrument. Indeed, unlike the science detector, the light coming from the fiber is not dispersed in the focal plane of the slit-viewing camera, which allows quick flux measurements. To align the PSFs and the slit, we use the FEU TTM (C). If the fibers contained in the bundle are not properly oriented with respect to the slit, we use the internal NIRSPEC rotator to make small adjustments. --- Figure 7: A composite image with all fibers illuminated acquired with the slit-viewing camera. In this case, the seven PSFs are offset from the slit. The seven PSFs visible on this image are respectively associated to (from left to right): CA, S1, S2, S3, S4, S5 and CB. The slit (dark blue) used in this case was the 0.0407”x1.13”. Figure 8 presents two of the nine orders visible on the science detector when configured for K band observations. This image is also a combination of images obtained by combining images acquired with light injected into each fiber of the output connector of the bundle. Each order contains seven spectra. The five central spectra are associated with the five science fibers of the bundle while the two lateral spectra are associated with the two calibration fibers. Depending on the slit selected (short or long), the light from the calibration fibers is reflected in the direction of Scam or transmitted to Spec. The separation between the spectra is fixed ($\approx 19$ pixels) and set by the separation between the fibers in the output connector of the bundle. The width of the trace can be adjusted by moving the bundle along the optical axis using the focus actuator (labeled 4 in Fig. 5). We adjust the position of this actuator during a calibration procedure of the FEU (see Sect. 4.2) to properly sampled the data. --- Figure 8: Two of the nine orders visible on the science detector when configured for K band observations. Each order of this patchwork of images contained seven spectra. The upper and lower spectra of each order are associated with the two calibration fibers contained in the output connector of the bundle while the five other spectra are associated with the science fibers. This image is a composite image with all fibers illuminated . ### 3.5 Expected performance Because the FIU module of KPIC aims to spectrally characterize faint objects with a high resolution ($R>$30,000), the background seen by the science instrument and the overall throughput are the key properties that need to be understood. In this section we present our estimations and measurements of these parameters in K band. Although, the phase I version of the instrument has been designed to allow science observations in K and L bands, we have mainly focused our work on the K band to date. We will start to work in L bands once most of the other challenges of this project will be overcome. #### 3.5.1 Background For a fiber-fed spectrograph, the background seen by the science instrument can be decomposed into four components: the background injected into the science fibers of the bundle (sky background and upstream optical elements), the emissivity of the fiber itself, the background emitted between the fiber bundle and the cold stop of NIRSPEC and the background emitted in the cryostat. The first component of the background is relatively small. SMFs are extremely efficient at rejecting upstream background from sky, telescope and FIU because of their relatively small solid angle projected on sky (45 mas2 in K band). For reference, the average sky brightness in K band at zenith during dark times and during a clear night at the summit of Maunakea is equal to 12.6 mag/arcsec2 (http://www.cfht.hawaii.edu/). The second component of the background is the emissivity of the fiber itself. We have not quantified this component yet. However, KPIC uses a relatively short (5 m) SMF with very high transmission and with a very small core diameter ($6.5~{}\mu$m). We can compute the background emitted based on the energy absorbed by the material of the fiber ($\leq 0.6\%$ in K band). However, it is difficult to estimate the fraction of this background transmitted to the FEU side of the bundle. The third component of the background is the sum of the emissivities of all the warm optics used to project the light from the fiber onto the NIRSPEC slit (labeled A-G in the Fig. 6). To reduce this component of the background, we use a cold stop, named ”FEU stop”, located in both filter wheels of NIRSPEC (labeled K on the Fig. 6). These stops have been installed in both wheels in order to be able to use them with all the NIRSPEC filters available. The stops consist of a hole in a metallic plate, which has been black painted. The hole diameter has been optimized to maximize the signal-to-noise ratio (SNR) seen by the science detector. The radius of the cold stop which maximizes the SNR ‘$R_{\text{max}}$’ is: $R_{\text{max}}\approx 1.5852\sigma\approx 0.6731\text{FWHM}$ where $\sigma$ and FWHM (Full Width Half Maximum) characterize the Gaussian profile’s width111https://wise2.ipac.caltech.edu/staff/fmasci/GaussApRadius.pdf. By using the ratio between the $1/e^{2}$ diameter and the FWHM ($2\sqrt{2ln(2)}\approx 1.7$), we can compute the optimal diameter for the cold stop. Because the mode field diameter of the science fibers as well as the effective focal length of the air-spaced doublet and triplet (labeled B and E on Fig. 6) are wavelength dependent, the optimal diameter is also wavelength dependent. Moreover, the diameter of the beam at the location of the stop can be affected by the defocus applied to the bundle to optimize the size of the PSF on the slit (see Sect. 4.3). At 2 $\mu$m, we computed the optimal diameter of the stop to be $\approx$7.9 mm. We decided to use a slightly larger cold stops (8.1 mm diameter) because the optical elements of the NIRSPEC calibration unit were never calibrated (as it wasn’t needed) and because the K and L bands go beyond 2 $\mu$m. Moreover, the impact of increasing the thermal background sightly is not as severe as restricting the light from the companion. These stops are used in addition to a blocking filter, which suppresses the science and background light outside of K band to prevent order overlap. Several filters are available in each filter wheel. Thus far, we have mainly observed in K band (1.9 to 2.5 $\mu$m). In this case, we are using the filter named “Thin” located in the first filter wheel. It consists of a substrate of PK-50. This material is a thermal-IR flux blocker opaque for wavelengths $>2.8\mu$m. At wavelengths $<1.9~{}\mu$m the background is negligible and the light coming from the target is absorbed by the germanium lens of the air spaced doublet located in the FEU (labeled B in Fig. 6). The few observations made in L band have been made using the broad ’KL’ filter. The last component of the background is the internal background of the spectrograph itself. In the case of NIRSPEC, a recently discovered light leak currently adds to the instrument thermal background [39]. Figure 9 shows the central section of one of the orders visible on a Spec frame (left panel) acquired by pointing at a dark region of the sky (no visible target). The left half of the image is not reduced while the right side is reduced by removing a background acquired during the day (no light injected into the fibers) and correcting for hot pixels. The graphic on the right side of the figure presents a vertical line profile of the same order. This profile is the median of the profiles associated to all the wavelengths of the order. The profile computed from the raw data is represented in blue while the profile computed from the reduced data is represented in red. --- Figure 9: Left: Central section of order 33 of a Spec frame acquired with no object in the tracking camera FOV (exposure time = 599 sec, Nirspec setup for K band observation, clear sky, elevation = 54.2∘ and no moon). The left side of this image has not been reduced while the right side has been reduced by subtracting a background acquired during the previous night with the same settings and by removing the bad pixels. The horizontal lines of each side indicate the position of the fibers. From top to bottom: CA, S1, S2, S3, S4, S5, CB (see Fig. 3). The slit induced background is visible in the raw data (bright band around the 5 science fibers). Right: Line profiles across order 33. This profile is the median of the profiles associated to all the wavelengths of the order. The profile computed from the raw data is represented in blue while is computed from the reduced data is represented in red. The two first components of the background (sky and fiber emissivity) are not visible in the Fig. 9. If they were visible, we would see small peaks at the locations of the fibers in the red trace. Because we do not use exposure times longer than those used to acquire this data during science observations (599 seconds), we can consider these two components as negligible in standard observing conditions. More tests need to be done to determine if the conclusion will be the same in L band, with the telescope pointed at lower elevation or during a night with the moon visible. The third component, emitted by warm optomechanical components located in the calibration unit of NIRSPEC (see Fig. 6), is visible in the raw data (bright band around the 5 science fibers) but can be removed efficiently by reducing the data. This contribution to the background is not dependent of the observing conditions but can probably be affected by variation of temperature in the AO room. In this case for an AO room temperature of 6.1∘C, we measured an average of 0.5 counts per second for the reddest order (order 39 – $\lambda\in[2440:2484]$ nm) and less than 0.05 counts per second for the bluest order (order 31 – $\lambda\in[1943:1977]$ nm). Regarding the last background component, the thermal background of the instrument, it is combined with all the noise and offsets of the science detectors. This component affects the entire image. Visible as an offset below and above the bright green band on the left side of the image presented by the Fig. 9, the sum of these effects contributes 180 counts on the reddest side of the detector and 90 counts on the bluest side. As the temperature inside the cryostat is controlled, we can consider this to be constant. As shown by the Fig. 9, this component can be removed efficiently. The optical leak discussed previously is not visible is the sub-image presented in this paragraph. #### 3.5.2 Throughput Figure 10 presents the throughput of the overall system (sky to detector included) as a function of the wavelength measured on July the 3rd 2020 on the star Kappa Andromedae. The throughput is the ratio between the number of photon expected and the number of photons detect by the science detector. Nine orders are visible on this plot. The left one is the 31st order of NIRSPEC while the right one is the 39th order. For this measurement, the light was injected into the second science fiber (labeled $S_{2}$ in Fig. 3). This set of data has been acquired during a clear night. according to the Canada France Hawaii Telescope, the MASS seeing was $\leq 0.2$ arc second and a DIMM seeing of $\approx 0.6$ arc second (both measured for a wavelength of 0.5 $\mu$m). During this measurement the target was at a 64.5∘ elevation. --- Figure 10: Throughput as a function of the wavelength from sky-to-detector measured on July the 3rd 2020 on the star Kappa Andromedae. For this measurement, the light was injected into science fiber $ScF_{2}$ of the bundle. It can be seen that the peak throughput in K band reaches 3% (well above our 2% requirement). The data in the figure represents one of the best results achieved to date. Multiple parameters can affect the throughput: seeing, weather, AO performance, calibration quality. Despite this, over the last few observing runs, we have consistently measured a throughput between 1.5 and 2.5 % over the K band. Neither the Keck II AO system nor the KPIC instrument contains an atmospheric dispersion compensator (ADC). As such, the light of the target is slightly dispersed in the focal plane of the input connector of the bundle for non-zero Zenith angles. For this reason the injection is not uniform across the K band. In the case presented in Fig. 10, the injection was optimized for a selected wavelength (center of the K band). This effect is a function of the elevation of the telescope. To optimize the overall throughput of the system for all the wavelengths, an ADC will be deployed in the phase II of the KPIC project. We also measured the throughput in L band using Kappa Andromeda at the end of the same night. We measured a preliminary throughput of up to $6\%$ between 3.7 and 3.8 $\mu$m. The peak throughput measured on-sky of $3.2\%$ in K band is consistent with the expected value of $3.4\%$, computed assuming 200 nm RMS of residual aberration and taking into account the performance of each of the optics. We have identified several ways to improve the overall performance of the system, which should result in an increase in the quality of the science data in the near future. The following table presents the throughput budget computed for the FIU in both K and L bands. Throughput budget --- Components | K-band | L-band | Description Sky | 98% | 85% | — Telescope | 90% | 90% | 3 reflective optics Keck II AO optics | 63% | 63% | 7 reflective & 1 transmissive optics Fiber Injection Unit | 77% | 77% | 12 reflective & 2 transmissive optics Strehl | 72% | 90% | Assuming 200 nm RMS wavefront error Dispersion & Pointing loss | 95% | 95% | At 30 degrees zenith angle Fiber injection efficiency | 60% | 60% | Keck pupil geometry and NA mismatch Bundle | 95% | 97% | Material absorption & Fresnel reflections FEU + Calibration unit | 89% | 89% | 2 reflective & 5 transmissive optics NIRSPEC throughput | 30% | 30% | Diffraction efficiency & optic throughput Filter and background stop | 80% | 80% | — H2RG Quantum efficiency | 95% | 95% | — Total | 3.4% | 3.7% | From top of atmosphere Table 2: Throughput budget computed for the FIU in both K and L bands. ## 4 Calibrations Injecting light into a SMF, which subtends a very small solid angle on-sky, requires precise calibration of the instrument. In this section, we describe the various calibrations performed before and during the observations. ### 4.1 Fiber injection unit calibrations #### 4.1.1 Science fibers position The science fibers are not visible on any sensors, so their positions are unknown at first. The tracking camera is integral to finding the position of the science fibers and optimizing the coupling of a target. By virtue of the dichroic beamsplitter before the tracking camera (M in Fig 2), J and H band light can be used to determine the location of a target. To determine the position of the science fibers on the tracking camera, we follow a two step calibration process. The first one is quick but not highly accurate while the second one is time consuming but very accurate. The first calibration procedure relies on light to be retro-fed through the peripheral calibration fibers in the bundle. An infrared laser is used and injected into four of the six fibers and emitted from the input connector of the bundle (see Sect. 3.2). The light coming from those fibers is collimated by the focusing OAP of the injection module (H in Fig. 2). A fraction of this light is reflected by the dichroic (M) in the direction of the corner cube (T), which reflects the light in the direction of the dichroic. The light transmitted forms an image on the tracking camera composed of four PSFs (one per retro-fed calibration fiber). By retro-feeding an asymmetric pattern of calibration fibers and by knowing the geometry of the bundle, we can determine the position of the other fibers (science fibers) in the input connector of the bundle. The image presented in Fig. 11 is the output automatically generated by the algorithm used to perform this calibration procedure. It takes only a few seconds to get a result but the estimated positions are not highly accurate (usually a couple of pixels) for multiple reasons: the shape of the PSFs for the four calibration fibers are altered by the OAP and the corner cube, which makes the position measurement of these fibers inaccurate, even if the geometry of the bundle is precisely known, we do not take into account field distortions at the detector, and the corner cube is not perfect so the incident and reflected beams are not parallel, to name a few. --- Figure 11: Output figure automatically generated by the algorithm used to roughly determine the position of each fiber of the bundle. The ”X” shape of the PSFs is due to the corner cube In order to maximize the throughput of the instrument, we use a second calibration procedure based on a direct measurement of the light injected into the fibers. For this step, we turn on the calibration source of the Keck II AO bench to create a PSF on the tracking camera and then use the TTM of the fiber injection unit (labeled L on Fig. 2) to align this PSF with one of the science fibers. Then we scan the TTM across the expected location of the fiber and record the flux on the slit viewing camera of NIRSPEC, Scam (see Fig. 6) as well as the tracking camera. The SCAM images are used to measure the flux injected into the science fiber while the tracking camera images are used to measure the flux variation of the light source and track the PSF position associated with each flux measurement. In this way, we can build and injection map through the fiber and by fitting the peak, we can determine the TTM position of optimum coupling very accurately and the corresponding PSF position that yields this optimum alignment on the tracking camera at the same time. The left image presented in Fig. 12, is the injection map obtained by performing such a scan. The position of each pixel of this injection map correspond to a position of the PSF on the tracking camera and the value associated with each pixel is the flux measured by using Scam normalized by the flux of the calibration source measured by the tracking camera. This calibration method is time consuming. We are currently limited by the minimum exposure time of the Scam detector ($\approx 600$ ms) and its read-out ($\approx 1200$ ms). We tried multiple scan patterns to reduce the time needed to perform this calibration but for the moment, the grid scans are the most accurate and reliable. As shown by the injection map radial profile presented on the right side of Fig. 12, knowledge of the position of each fiber is critical if we want to maximize throughput. An offset of one pixel on the tracking camera (8.06 mas) corresponds to a loss of 10% of throughput, two pixels (16.12 mas) corresponds to a loss of 30% and three pixels (24.18 mas) to a loss of 55%. An offset of 50 mas which correspond to the angular resolution of the Keck telescopes at 2$\mu$m correspond to a loss of 97% of the throughput. This is why we take the time to perform these calibrations properly and why we perform these calibration before each science night even if the bundle has not be disconnected between two observations. --- Figure 12: Left: injection map obtained by performing a 25 by 25 grid scan. The pitch of the grid is 5 mas in both direction. Right: Radial profile computed from the injection map. During the calibrations, the PSFs in H, K and L bands are superimposed. As neither the Keck II AO system nor the first phase of the KPIC project contains an atmospheric dispersion corrector, when on-sky the PSFs of the target in H, K and L bands are superimposed only when observing at Zenith. Therefore, when observing away from Zenith, the location of the PSF on the tracking camera, which operates in H band, will not correspond to the location of the K and L band PSFs in the focal plane of the injection OAP. As such, an additional step is taken during the acquisition sequence, whereby the PSF is offset with the TTM along the elevation axis by the calculated offset expected from the differential atmospheric refraction between the H and science bands (K or L). This offset is a function of the elevation of the target and the refractive index of the air versus wavelength. To compute the latter, we use an analytical approximation of the refractive index which depends on the temperature, pressure and relative humidity of the air above the primary mirror [40]. The tracking loop used to align the target with the fiber computes this value and applies the offset at each iteration of the loop (see Sect. 5). #### 4.1.2 Tracking camera The calibration of the tracking camera is critical because we use it as a reference to inject the light of the target of interest into one of the science fibers. Key to calibrating the camera is understanding the plate scale, the orientation and the field distortion map. We use two different methods to calibrate the tracking camera. The first one can be performed during the day by using NIRC2 as a reference. The plate scale, the orientation and the distortion map of this detector is regularly calibrated and can be considered as reliable. By using a dichroic like the KPIC-pick off (labeled A on Fig. 2) we can image the PSF of the calibration unit of the Keck II AO bench on both NIRC2 and the tracking camera at the same time. We translate the calibration source in both the X and Y axis and acquire images for each position with both detectors. We compute the position of the PSF in each image. A set of two positions can be used to determine the plate scale of the tracking camera and a set of three positions forming an asymmetric pattern can be use to determine the orientation of the tracking camera with respect to NIRC2. The more sets of data available the more accurate the plate scale and the orientation. The variation as a function of x/y on the detector of plate scale and orientation between those sets of data is used to compute the distortion map of the tracking camera. To model the distortion in X and Y on the detector, we use the methodology of Service et al. 2016 [41] and use a 5th order bivariate Legendre polynomial. A second calibration method performed during the night is routinely used to refine this. This method consists of observing an object with multiple components (a binary star for example). Because the astrometry of such an object (position angle and separation) is stable during the calibration, we can use images of this object acquired on different parts of the detector to calibrate the distortion map of the tracking camera. To move the object around the detector we steer the TTM in the FIU. Indeed, in the presence of local field distortions, the position angle and separation vary across the detector. The average separation of this target can be used to determine the plate scale and the orientation of the detector. In order to mitigate orbital motion uncertainties of the system observed to perform this calibration, we image the system with NIRC2 and the Cred2 in parallel. We also tried to observe known fields of stars, like M92. However, the FOV of the tracking camera (4.5 x 5.5 arc-second) is too narrow to image many bright stars at the same time (H-mag $\leq$ 10). The offsets computed from the calibrations outlined above, are applied to the tracking loop (see Sect. 5) to align the science target with the selected science fiber. We verify at the beginning of each run that we can align the PSF with a sub-pixel resolution to confirm the validity of the tracking camera calibrations. #### 4.1.3 Coupling Optimization To optimize the coupling, we must reduce the wavefront error in the system in order to maximize the image quality in the focal plane of the input connector of the fiber bundle. However, this plane is not easily accessible and cannot be imaged with a detector so we cannot use any standard focal plane wavefront sensing strategy in this case. The solution found to overcome this problem is to use two calibration procedures. The first one is used to optimize the image quality on the tracking camera while the second one is used to calibrate the non-common path aberrations (NCPA) between the two paths of the FIU (tracking camera and injection module). To optimize the image quality on the tracking camera we use a phase diversity algorithm called “image sharpening”. This is used in the calibration procedure for some of the Keck facility instruments. This procedure can be run before each science night as it takes only a few minutes to complete. Indeed, even if the version used is not fully automated yet, we never start from a very deformed PSF. We usually start with less than 100 nm RMS of wavefront aberration in the system and consistently reach wavefront errors $<20$ nm RMS by using this procedure. Once the wavefront error is reduced to maximize the image quality on the tracking camera, we use a Zernike optimization strategy which measures the flux transmitted through the fiber bundle to indirectly reduce the NCPA between the two paths of the FIU. We first select a Zernike mode (we usually start with the defocus). Then we scan this mode in amplitude by using the Keck AO DM. For each amplitude we perform a tip-tilt scan in order to build an injection map (see Sect. 4.1.1). This is done incase the PSF move laterally while being defocus (i.e. in case there is cross-coupling between modes). By fitting a 2D Gaussian to each injection map we obtain the optimal injection for each Zernike amplitue. The optimal amplitude for the selected Zernike mode is determined by fitting a second order polynomial on the optimal injection values measured for each amplitude of the selected Zernike mode. We then apply this value to the DM and continue the calibration procedure by scanning the next Zernike mode. This calibration procedure is completed once all the Zernike modes selected have been scanned. Because we currently only scan one mode at a time, we assume the modes in the system are orthogonal, which is a reasonable assumption. In addition, most of the NCPA is in the lowest order modes so we typically dont need to scan beyond 15 Zernike modes. Figure 13 presents some of the injection maps obtained while optimizing the defocus for the first three science fibers. Each row is associated to a fiber (top row to S1, central row to S2, and bottom row to S3) and each column to a defocus amplitude (from left to right: -180, -90, 0, +90 and +180 nm RMS). In this figure, we can see that the NCPA are not the same for each fiber of the bundle. Indeed, the elongation in the injection maps hints at the presence of astigmatism in the PSF at the location of some of the fibers. Because this calibration is time consuming and because we mainly use the second science fiber of the bundle on sky, we only run the calibration for this fiber routinely. --- Figure 13: Measured injection maps from data collected on three fibers: S1 (top row), S2 (central row), S3 (bottom row) and five defocus amplitudes centered on the initial defocus. From left to right: -180, 90, 0, +90 and +180 nm RMS. The flux of the injection map has been normalized by the maximum of all the injection maps measured for those three fibers (63 total). By using this calibration procedure, we have been able to improve the injection by $\sim 13\%$. This result has been obtained by scanning eight Zernike modes (Noll index $\in[4:11]$). The results presented in this paragraph have been obtained by connecting the bundle to a photo-detector using a simple optomechanical assembly. The use of the photo-detector allows us to run the calibration faster but prevents us from running the calibration when the bundle is connected to NIRSPEC. In the future we aim to be able to run this calibration, by using Scam and/or Spec. In addition, we need to improve the algorithm to converge faster. We also want to characterize the NCPA and determined how it has evolved over time in order to determine how often this calibration has to be performed. ### 4.2 Fiber extraction unit calibrations NIRSPEC can be used on both Nasmyth platforms of the Keck II telescope. As such, the bundle has to be reconnected to the FEU each time the instrument is transported. Even if the re-positioning of the bundle (focus and orientation) is repeatable and the FEU stable over time, we perform basic calibrations of this module before each science night in order to optimize the performance of the instrument. The first calibration is used to co-align the fibers contained in the output connector of the bundle with the slit selected for the observation. To move the fibers with respect to the slit, we use the FEU-TTM (labeled C on the Fig. 6). To rotate the fibers with respect to the slit we use the rotator mirror contained inside the NIRSPEC cryostat. Usually the rotator does not need to be rotated by more than a degree, because the bundle were clocked to approximately the right orientation by hand initially. The second calibration is used to co-align the beam coming from the fiber bundle with the stop used to reduce the background (see Sect. 3.4). This stop is in the pupil plane of the fore-optics. To move the beam with respect to the stop, we translate the bundle in the planes perpendicular to the optical axis using two of the motorized translation stages contained in the FEU (see Sect. 3.3). The third calibration is used to focus the bundle and adjust the size of the PSFs coming from each fiber of the bundle on the slit. Because NIRSPEC has not been designed to be diffraction-limited, the PSF is smaller than the slit when the bundle is perfectly in focus. In this case, the spectrum acquired by the science detector of NIRSPEC is undersampled. To overcome this problem, we have the capability to defocus the bundle in order to optimize the sampling of the science data. We adjust the focus of the bundle using one of the motorized translation stages contained in the FEU (see Sect. 3.3). At the shortest observed wavelength in a given band, we adjust the focus of the bundle to get 2.4 pixels/FWHM and this produces an R$\sim$35k. These three calibration procedures are relatively rapid to perform due to the stability of the FEU (usually less than one hour). The adjustments between two consecutive nights are typically minor. ### 4.3 NIRSPEC calibrations KPIC uses NIRSPEC in non-standard ways, so additional calibration steps on top of the standard ones, are necessary. The days before the observation we take the standard backgrounds and darks with multiple instrument set ups we are likely to use during the science nights. We have the possibility to take extra calibration data after the night if needed but calibration data acquired before the science night can be used to quickly reduce the data during the night to verify if everything is working as expected. During the days before the observation, a wavelength solution calibration of the science detector is performed by using NIRSPEC’s calibration sources (see Fig. 6). The different arc lamp sources available in this unit have known emission spectra, that enable wavelength calibration of the instrument. The calibration unit also contains an extended white light source. We use this source to acquire flats for every configuration we plan to use during the night. The next step of the NIRSPEC calibrations consist on determining where the traces associated with each fiber in the bundle is located on the science detector. The position of these spectra must be known to extract the spectral information of each target observed. In the case of a bright object, the location of the spectra is obvious but this is not the case for faint objects, and so determining where to look for the traces with a calibration source off- sky can be beneficial. To perform this calibration, we set up NIRSPEC, align the fibers of the output connector with the slit using the position determined previously (see Sect. 4.2) and inject the light of the calibration source of the Keck II AO bench in each science fiber, one at a time. For each science fiber, we acquire an image with the science detector. Because the calibration source of the Keck II AO bench is bright and its emission spectra continuous, we can extract the position of the traces associated with each science fiber, across all the orders visible on the detector. Because the position of the spectrum on the science detector and the wavelength solution are dependent on the position of all the opto-mechanical elements located downstream of the bundle, we need to perform this calibration for each instrument configuration we plan to use during the science nights. When we observe a target with at least one bright component (K or L magnitude $<$ 10), we repeat this calibration on-sky. By acquiring such a data set on- sky, we can insure that our calibrations were not affected by long term thermal variations as the calibration is taken close to when the science data is acquired. In addition, we can observe the target of interest and perform the calibration by keeping all the opto-mechanical elements located downstream of the bundle fixed, which yields a superior wavelength solution. Finally, the data collected on the main star of the system can be used in the reduction of the science data. ## 5 Science data acquisition The FIU can be used to observe different kinds of targets. In this section we only described the data acquisition procedure followed to acquire high- resolution spectra of exoplanets and brown dwarfs. In most cases, we cannot image the exoplanet using the tracking camera during an observation. So, in order to blindly align the PSF of an exoplanet with one of the science fibers of the bundle, we need to have an accurate knowledge of the astrometry of the system being observed (position angle and separation). For companions with well-characterized orbits such as the HR 8799 planets for example [42], we can use the predicted relative astrometry or use data collected during the most recent observation to measure the position. To predict the position of a planet we use the algorithm used by the website ”http://whereistheplanet.com/”. If the information is not available or not reliable, we can observe the target with NIRC2 at the beginning of our observing run to measure the astrometric parameters of the companion. During the observation, the first step of the acquisition sequence consists of aligning the star with the selected science fiber. To achieve this, we use a tracking loop. Its goal is to align the science target or its host star with a science fiber by controlling the TTM in the FIU (labeled L , on Fig. 2). It uses as inputs the image from the tracking camera as well as multiple parameters provided by the telescope, the calibration procedures as well as the user. The algorithm uses tracking camera images to determine the position of the host star on the detector. Using the position of the science fibers determined during the calibration (see Sect. 4.1), the algorithm determines the FIU-TTM offset needed and applies the command. As described in Sect. 4.1, we need to take into account the atmospheric dispersion. This effect is automatically compensated by the tracking loop at each iteration. For a given Zenith angle, temperature, pressure and relative humidity, the offset in the differential atmospheric refraction between H, where the camera tracks and K, where science is conducted, is calculated and applied along the elevation axis (axis of refraction). At this point we usually acquire data using the science detector of NIRSPEC on the host. These data are used to measure the throughput of the instrument and to reduce the science data acquired later in this sequence. Figure 14 presents data acquired with the star of the HR7672 system aligned with the second science fiber (labeled S2 on Fig. 3) on July 3rd, 2020. The left panel presents the central section of the order 33 ($\lambda\in$ [2047:2083] nm) before and after reduction. The graph presented on the right side of the figure presents the median line profile of this order. The blue curve is the line profile computed from the raw data while the red one is computed from the reduced data. The spectra of the star, aligned with the second science fiber of the bundle, is clearly visible on both the Spec frame and the graph presented by this figure. --- Figure 14: Left: Central section of order 33 of a Spec frame acquired with the star of the HR 7672 system align with the second science fiber (exposure time = 29.5 sec). The left side of this image has not been reduced while the right side has been reduced by subtracting the background and removing the bad pixels. The horizontal lines of each side indicate the position of the fibers. From top to bottom: CA, S1, S2, S3, S4, S5, CB (see Fig. 3). Right: Profiles of order 33. This profile is the median of the profiles associated across all the wavelengths of the order. The profile computed from the raw data is represented in blue while the line profile computed from the reduced data is represented in red. After aligning the star with the selected science fiber and the spectral data collected, we use the relative astrometry of the companion to offset the star in order to align the science target with the fiber. This offset is applied by providing the astrometric parameters of the target (position angle and separation) to the tracking loop. After correcting the astrometric parameters to take into account the field distortion of the tracking camera, the tracking loop computes the offset needed and sends a command to the FIU-TTM to apply the offset. We verify at the beginning of each run that we can apply such offsets with a sub-pixel accuracy by observing several binary stars with both components visible on the tracking camera. At this point, integration on the science target (the companion) begins. In the case of faint targets (K or L magnitude $\geq$ 13), we acquire multiple 10 min exposure frames with the science detector of NIRSPEC. Figure 15 presents, on its left side, a section of order 33 extracted from one of the science frames acquired the HR7672b system aligned with the second science fiber. The graph presented on the right side of the figure presents the median profiles of this order. The blue curve is the profile computed from the raw data while the red one is computed from the reduced data. Three peaks are visible in the line profile, which indicate the position of the fiber traces. The one associated with the second science fiber contains a combination of the light coming from the science target, the speckle field of the star and the multiple backgrounds described in Sect. 3.5.1. The line associated with the third and fourth science fiber contains the light of the the speckle field of the star and the multiple backgrounds (see Sect. 3.5.1). We cannot adjust the intensity of the light coming from the speckle field of the star in the science fiber aligned with the companion as the separation between the companion and its host start is constant. However, it can be adjusted for the other fiber by moving the star around the science target using the rotator of the telescope. The offset applied to the rotator is automatically taken into account by the tracking loop. --- Figure 15: Left: Central section of the order 33 of a Spec frame acquired with the companion of the HR 7672 system align with the second science fiber (exposure time = 599 sec). The left side of this image has not been reduced while the right side has been reduced by subtracting the background and removing the bad pixel. The horizontal lines of each side indicate the position of the fibers. From top to bottom: CA, S1, S2, S3, S4, S5, CB (see Fig. 3). Right: Profiles of the order 33 computed by averaging the profile associated to each wavelength of the order. The profile computed from the raw data is represented in blue while the profile computed from the reduced data is represented in red. During the observation of a faint target, we regularly acquire data with the star of the system aligned with the selected fiber (every hour or 6 science frames) in order to get enough calibration data and to make sure the injection into the fiber is high and stable by measuring the throughput of the system. ## 6 On sky performance and first results To demonstrate the science capabilities of the system, we observed HR 7672 B on September 28 2020, a bright ($K=13$ mag) early L-type brown dwarf that is expected to have a similar spectral signature as many of our more challenging targets [26]. Residing 0.64 arcsec from the star at the epoch of observation [43], the companion also resides at comparable separations from the star as our exoplanet targets. We obtained ten 600 seconds exposures of the brown dwarf placed on science fiber S2, resulting in a total integration time of 100 minutes. The data were reduced using a preliminary version of the KPIC data reduction pipeline. The thermal background of the instrument was subtracted using 8 hours of backgrounds taken during the day with the same instrument setup. The A0 standard star ups Her was observed at the start of the night to calibrate the position and width of all of the fiber traces. We used this trace information to extract spectra from all of the science fibers of the HR 7672 exposures, resulting in on-axis observations of both HR 7672 A and B on S2. The extracted spectra were then averaged in time, removing bad pixels due to cosmic ray contamination. The M-giant HIP 81497 was observed in each fiber to compute the wavelength solution of each fiber. The A0 star zet Aql was observed immediately before the HR 7672 observations to measure the total end- to-end spectral response, including the telluric absorption profile. The spectral response, wavelength solution, on-axis observations of S2, and planetary atmosphere models were used to construct forward models of the on- axis spectra of the brown dwarf companion. We used a BT-SETTL atmosphere model with an effective temperature of 1800 K and a $\log(g)=5.0$ for the planet spectrum [44]. We varied the radial velocity of the planet, rotational broadening, and overall flux of the planet in fitting the forward model to the data. A more detailed description of the data extraction and fitting technique will be discussed in a subsequent paper. Figure 16 presents the best-fit model and data from order 37 of the spectrum of HR 7672 B. The best-fit forward model matches the data very well, as can be seen in visual inspection. To better visualize the detection, we show the cross correlation function detection of HR 7672 B in the top row of Fig. 17. There is a clear detection of the brown dwarf and is consistent with previous $R\sim 1400$ spectra at the same wavelength [26]. The posterior distributions for the radial velocity of the planet and its rotational broadening are shown in the bottom row of Fig. 17. The vsin(i) measured is (42.6$\pm$0.8) km/s, and is the first detection of rotational broadening for this companion. The detection and spin measurement of a companion just 0.64 arcsec from its host star demonstrates the HDC capabilities of KPIC. --- Figure 16: Spectrum of HR 7672 B (37th NIRSPEC order). The middle panel includes the extracted spectrum of the science fiber including its 1-$\sigma$ uncertainties (orange contours). The spectra were high-pass filtered but plotted with an offset corresponding to the continuum median value. The best- fit forward model of the data is shown as a black line. Because the spectrum of the companion is contaminated by the glare of the star, we jointly fit an on-axis starlight spectrum with a model of the planet. Both components of the model, which include telluric lines, are shown separately as dashed lines. The companion is modeled with a BT-SETTL template assuming a $1800\,\mathrm{K}$ temperature and a $\log(g)=5.0$ surface gravity. The top panel features spectral templates that can be used to identify spectral lines in the data. The system transmission includes: the transmission of the atmosphere and the instrument. The BT-Settl model includes spin broadening of the companion, while the molecular template is only broadened to the resolution of the instrument. The lower panel shows the residuals of the fit. --- Figure 17: Detection of HR 7672 B using the four reddest NIRSPEC orders (Order 36-39). The top left panel is a type a cross correlation analysis. It is calculated using the forward model framework illustrated in Figure 16 as the estimated flux and associated uncertainty of the brown-dwarf companion as a function of the radial velocity (RV) shift of the model assuming a null spin for the companion. Fictitious fibers that only include background and dark flux are also analyzed with the same model as a way to sample the noise. The top right panel is the signal to noise (S/N) of the detection as a function of RV assuming the best fit spin ($v\sin(i)=42.6\,\mathrm{km/s}$) for the model. The S/N is calculated as the estimated amplitude of the companion divided by its estimated uncertainty featured in the top right panel. The bottom two panels are the marginalized posteriors for the radial velocity and the spin of the companion respectively. The estimated radial velocity of the companion is consistent with the prediction from relative astrometry measurements of the companion and the radial velocity of the host star. ## 7 Conclusion The fiber injection unit, part of the KPIC demonstrator, is a powerful tool to acquire high spectral resolution data on faint objects surrounding stars, faint isolated objects and close binaries. Deployed at the summit of Maunakea in the fall 2018, the FIU has completed commissioning and has begun regular science operations earlier this year. Numerous known stellar systems have been imaged already and science data acquired. These data, currently being reduced and analyzed, will be published in subsequent papers. After multiple months of science exploitation, the second phase of the project will be deployed in order to improve the overall performance of the instrument. The hardware, software and observing strategies developed, tested and used by both phases of this project will help to prepare future instruments on both ground and space based telescopes. ###### Acknowledgements. This work was supported by the Heising-Simons Foundation through grant #2019-1312. It has been previously submitted as an SPIE proceeding [45]. W. M. Keck Observatory is operated as a scientific partnership among the California Institute of Technology, the University of California, and the National Aeronautics and Space Administration (NASA). The Observatory was made possible by the generous financial support of the W. M. Keck Foundation. The authors wish to recognize and acknowledge the very significant cultural role and reverence that the summit of Mauna Kea has always had within the indigenous Hawaiian community. We are most fortunate to have the opportunity to conduct observations from this mountain. ## References * [1] A. Wolszczan and D. A. Frail, “A planetary system around the millisecond pulsar PSR1257 + 12,” Nature 355, 145–147 (1992). * [2] M. Mayor and D. Queloz, “A Jupiter-mass companion to a solar-type star,” Nature 378, 355–359 (1995). * [3] D. Charbonneau, R. W. Noyes, S. G. Korzennik, et al., “An Upper Limit on the Reflected Light from the Planet Orbiting the Star $\tau$ Bootis,” Astrophysical Journal Letters 522, L145–L148 (1999). * [4] C. Moutou, A. Coustenis, J. Schneider, et al., “Search for spectroscopical signatures of transiting HD 209458b’s exosphere,” Astronomy and Astrophysics 371, 260–266 (2001). * [5] I. S. McLean, E. E. Becklin, D. F. Figer, et al., “NIRSPEC: a near-infrared cross-dispersed echelle spectrograph for the Keck II telescope,” in Infrared Detectors and Instrumentation for Astronomy, A. M. Fowler, Ed., 2475, 350 – 358, International Society for Optics and Photonics, SPIE (1995). * [6] H.-U. Kaeufl, P. Ballester, P. Biereichel, et al., “CRIRES: a high-resolution infrared spectrograph for ESO’s VLT,” in Ground-based Instrumentation for Astronomy, A. F. M. Moorwood and M. Iye, Eds., 5492, 1218 – 1227, International Society for Optics and Photonics, SPIE (2004). * [7] I. A. G. Snellen, R. J. de Kok, E. J. W. de Mooij, et al., “The orbital motion, absolute mass and high-altitude winds of exoplanet hd 209458b,” Nature 465(7301), 1049–1051 (2010). * [8] G. Rousset, F. Lacombe, P. Puget, et al., “Status of the VLT Nasmyth adaptive optics system (NAOS),” in Adaptive Optical Systems Technology, P. L. Wizinowich, Ed., 4007, 72 – 81, International Society for Optics and Photonics, SPIE (2000). * [9] R. Lenzen, R. Hofmann, P. Bizenberger, et al., “CONICA: the high-resolution near-infrared camera for the ESO VLT,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 606 – 614, International Society for Optics and Photonics, SPIE (1998). * [10] G. Chauvin, A.-M. Lagrange, C. Dumas, et al., “A giant planet candidate near a young brown dwarf,” Astronomy and Astrophysics 425, L29–L32 (2004). * [11] C. Marois, B. Macintosh, T. Barman, et al., “Direct imaging of multiple planets orbiting the star hr 8799,” Science 322(5906), 1348–1352 (2008). * [12] J. Larkin, M. Barczys, A. Krabbe, et al., “OSIRIS: A diffraction limited integral field spectrograph for Keck,” New Astronomy Reviews 50, 362–364 (2006). * [13] M. F. Skrutskie, T. Jones, P. Hinz, et al., “The Large Binocular Telescope mid-infrared camera (LMIRcam): final design and status,” in Ground-based and Airborne Instrumentation for Astronomy III, I. S. McLean, S. K. Ramsay, and H. Takami, Eds., 7735, 1368 – 1378, International Society for Optics and Photonics, SPIE (2010). * [14] B. R. Oppenheimer, C. Beichman, D. Brenner, et al., “Project 1640: the world’s first ExAO coronagraphic hyperspectral imager for comparative planetary science,” in Adaptive Optics Systems III, B. L. Ellerbroek, E. Marchetti, and J.-P. Véran, Eds., 8447, 736 – 748, International Society for Optics and Photonics, SPIE (2012). * [15] J. L. Beuzit, A. Vigan, D. Mouillet, et al., “SPHERE: the exoplanet imager for the Very Large Telescope,” Astronomy and Astrophysics 631, A155 (2019). * [16] B. Macintosh, J. R. Graham, P. Ingraham, et al., “First light of the Gemini Planet Imager,” Proceedings of the National Academy of Science 111, 12661–12666 (2014). * [17] T. D. Groff, J. Chilcote, N. J. Kasdin, et al., “Laboratory testing and performance verification of the CHARIS integral field spectrograph,” in Ground-based and Airborne Instrumentation for Astronomy VI, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 9908, 99080O (2016). * [18] I. A. G. Snellen, B. R. Brandl, R. J. de Kok, et al., “Fast spin of the young extrasolar planet $\beta$ Pictoris b,” Nature 509, 63–65 (2014). * [19] I. Snellen, R. de Kok, J. L. Birkby, et al., “Combining high-dispersion spectroscopy with high contrast imaging: Probing rocky planets around our nearest neighbors,” Astronomy and Astrophysics 576, A59 (2015). * [20] J. Wang, D. Mawet, G. Ruane, et al., “Observing Exoplanets with High Dispersion Coronagraphy. I. The Scientific Potential of Current and Next-generation Large Ground and Space Telescopes,” The Astronomical Journal 153, 183 (2017). * [21] D. Mawet, G. Ruane, W. Xuan, et al., “Observing Exoplanets with High-dispersion Coronagraphy. II. Demonstration of an Active Single-mode Fiber Injection Unit,” The Astrophysical Journal 838, 92 (2017). * [22] H. Kawahara, N. Murakami, T. Matsuo, et al., “Spectroscopic Coronagraphy for Planetary Radial Velocimetry of Exoplanets,” The Astrophysical Journal, Supplement 212, 27 (2014). * [23] N. Jovanovic, O. Guyon, T. Kotani, et al., “Developing post-coronagraphic, high-resolution spectroscopy for terrestrial planet characterization on ELTs,” arXiv e-prints 1, arXiv:1712.07762 (2017). * [24] T. Kotani, H. Kawahara, M. Ishizuka, et al., “Extremely high-contrast, high spectral resolution spectrometer REACH for the Subaru Telescope,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11448, 1144878 (2020). * [25] A. Vigan, G. P. P. L. Otten, E. Muslimov, et al., “Bringing high-spectral resolution to VLT/SPHERE with a fiber coupling to VLT/CRIRES+,” in Ground-based and Airborne Instrumentation for Astronomy VII, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 10702, 1070236 (2018). * [26] M. C. Liu, D. A. Fischer, J. R. Graham, et al., “Crossing the Brown Dwarf Desert Using Adaptive Optics: A Very Close L Dwarf Companion to the Nearby Solar Analog HR 7672,” The Astrophysical Journal 571, 519–527 (2002). * [27] P. Wizinowich, D. S. Acton, C. Shelton, et al., “First light adaptive optics images from the keck II telescope: A new era of high angular resolution imagery,” Publications of the Astronomical Society of the Pacific 112, 315–319 (2000). * [28] C. Z. Bond, S. Cetre, S. Lilley, et al., “Adaptive optics with an infrared pyramid wavefront sensor at Keck,” Journal of Astronomical Telescopes, Instruments, and Systems 6, 039003 (2020). * [29] N. Jovanovic, J.-R. Delorme, C. Z. Bond, et al., “The Keck Planet Imager and Characterizer: demonstrating advanced exoplanet characterization techniques for future extremely large telescopes (Conference Presentation),” in Techniques and Instrumentation for Detection of Exoplanets IX, S. B. Shaklan, Ed., 11117, International Society for Optics and Photonics, SPIE (2019). * [30] J. Pezzato, N. Jovanovic, D. Mawet, et al., “Status of the Keck Planet Imager and Characterizer phase II development,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11117, 111170U (2019). * [31] N. Jovanovic, B. Calvin, M. Porter, et al., “Enhanced high-dispersion coronagraphy with KPIC phase II: design, assembly and status of sub-modules,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, 970 – 981, International Society for Optics and Photonics, SPIE (2020). * [32] D. Mawet, J. R. Delorme, N. Jovanovic, et al., “A fiber injection unit for the Keck Planet Imager and Characterizer,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 10400, 1040029 (2017). * [33] J. Llop-Sayson, N. Jovanovic, G. Morrissey, et al., “Wavefront control experiments with a single mode fiber at the High-Contrast Spectroscopy Testbed for Segmented Telescopes (HCST),” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11443, 114432Q (2020). * [34] C. T. Coker, J. Llop Sayson, S. Shaklan, et al., “A multi-object spectrograph using single-mode fibers with a coronagraph: progress towards laboratory results on the high-contrast testbed for segmented telescopes,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series 11117, 111171A (2019). * [35] R. K. Gibson, R. Oppenheimer, C. T. Matthews, et al., “Characterization of the C-RED 2: a high-frame rate near-infrared camera,” Journal of Astronomical Telescopes, Instruments, and Systems 6(1), 1 – 9 (2019). * [36] I. S. McLean, E. E. Becklin, O. Bendiksen, et al., “Design and development of NIRSPEC: a near-infrared echelle spectrograph for the Keck II telescope,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 566 – 578, International Society for Optics and Photonics, SPIE (1998). * [37] J. L. Robichaud, B. Zellers, R. Philippon, et al., “Cryogenic performance of the NIRSPEC three-mirror anastigmat,” in Infrared Astronomical Instrumentation, A. M. Fowler, Ed., 3354, 1068 – 1076, International Society for Optics and Photonics, SPIE (1998). * [38] E. C. Martin, M. P. Fitzgerald, I. S. McLean, et al., “An overview of the NIRSPEC upgrade for the Keck II telescope,” in Ground-based and Airborne Instrumentation for Astronomy VII, C. J. Evans, L. Simard, and H. Takami, Eds., 10702, 63 – 74, International Society for Optics and Photonics, SPIE (2018). * [39] R. A. Lopez, E. Hoffman, G. Doppmann, et al., “Characterization and Performance of the Upgraded NIRSPEC on the W. M. Keck Telescope,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, International Society for Optics and Photonics, SPIE (2020). * [40] R. J. Mathar, “Refractive index of humid air in the infrared: model fits,” Journal of Optics A: Pure and Applied Optics 9, 470–476 (2007). * [41] M. Service, J. R. Lu, R. Campbell, et al., “A new distortion solution for NIRC2 on the keck II telescope,” Publications of the Astronomical Society of the Pacific 128, 095004 (2016). * [42] J. J. Wang, J. R. Graham, R. Dawson, et al., “Dynamical constraints on the hr 8799 planets with gpi,” The Astronomical Journal 156, 192 (2018). * [43] J. R. Crepp, J. A. Johnson, D. A. Fischer, et al., “The Dynamical Mass and Three-dimensional Orbit of HR7672B: A Benchmark Brown Dwarf with High Eccentricity,” The Astrophysical Journal 751, 97 (2012). * [44] F. Allard, D. Homeier, and B. Freytag, “Models of very-low-mass stars, brown dwarfs and exoplanets,” Philosophical Transactions of the Royal Society of London Series A 370, 2765–2777 (2012). * [45] J.-R. Delorme, N. Jovanovic, D. Echeverri, et al., “The Keck Planet Imager and Characterizer: A dedicated single-mode fiber injection unit for high resolution exoplanet spectroscopy,” in Ground-based and Airborne Instrumentation for Astronomy VIII, C. J. Evans, J. J. Bryant, and K. Motohara, Eds., 11447, 351 – 377, International Society for Optics and Photonics, SPIE (2020).
arxiv-papers
2021-07-27T02:20:36
2024-09-04T03:07:20.381553
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jacques-Robert Delorme, Nemanja Jovanovic, Daniel Echeverri, Dimitri\n Mawet, J. Kent Wallace, Randall D. Bartos, Sylvain Cetre, Peter Wizinowich,\n Sam Ragland, Scott Lilley, Edward Wetherell, Greg Doppmann, Jason J. Wang,\n Evan C. Morris, Jean-Baptiste Ruffio, Emily C. Martin, Michael P. Fitzgerald,\n Garreth Ruane, Tobias Schofield, Nick Suominen, Benjamin Calvin, Eric Wang,\n Kenneth Magnone, Christopher Johnson, Ji Man Sohn, Ronald A. Lopez, Charlotte\n Z. Bond, Jacklyn Pezzato, Jorge Llop Sayson, Mark Chun and Andrew J. Skemer", "submitter": "Jacques-Robert Delorme", "url": "https://arxiv.org/abs/2107.12556" }
2107.12557
# Frobenius manifolds on orbit spaces of non-reflection representations ###### Abstract We prove the orbit spaces of some non-reflection representations of finite groups posses Frobenius manifold structures. Zainab Al-Maamari 111Sultan Qaboos University, Muscat, Oman, [email protected], Yassir Dinar 222Sultan Qaboos University, Muscat, Oman, [email protected]. Mathematics Subject Classification (2020) Primary 53D45; Secondary 16W22, 57R18, 14B05. Keywords: Invariant rings, Frobenius manifold, Representations of finite groups, Flat pencil of metrics, Quotient singularities, Orbifolds. ###### Contents 1. 1 Introduction 2. 2 Flat pencil of metrics and Frobenius manifolds 1. 2.1 Frobenius manifolds 2. 2.2 Flat pencil of metrics 3. 2.3 A duality and inversion symmetry 3. 3 Coxeter groups 1. 3.1 Duality on orbits of reflection groups 2. 3.2 Sign times reflection representation 4. 4 Dihedral and dicyclic groups 1. 4.1 Dihedral groups 2. 4.2 Dicyclic groups 3. 4.3 Finite subgroups of $SL_{2}(\mathbb{C})$ 5. 5 Finite subgroups of $SL_{3}(\mathbb{C})$ 6. 6 Conclusions ## 1 Introduction Frobenius manifold is a geometric realization introduced by B. Dubrovin for a potential satisfying a system of partial differential equations known as Witten-Dijkgraaf-Verlinde-Verlinde (WDVV) equations which describes the module space of two dimensional topological field theory. Remarkably, Frobenius manifolds are also recognized in many other fields in mathematics like invariant theory, quantum cohomology, integrable systems and singularity theory [5]. Briefly, a Frobenius algebra is a commutative associative algebra with unity $e$ and a nondegenerate bilinear form $\Pi$ invariant under product, i.e., $\Pi(a\cdot b,c)=\Pi(a,b\cdot c)$. A Frobenius manifold is a manifold with a smooth structure of a Frobenius algebra on the tangent space at any point with certain compatibility conditions. Globally, we require the metric $\Pi$ to be flat and the unity vector field $e$ is constant with respect to it. In this article, we will show that orbit spaces of some non- reflection representations of finite groups acquire Frobenius structures. We use the following notations and facts for a finite group $G$ and a complex linear representation $\psi:G\to GL(V)$. We denote by $\mathbb{C}[V]$ the ring of polynomial functions on $V$, $\mathbb{C}[\psi]$ the subring of invariant polynomials in $\mathbb{C}[V]$, and $\mathcal{O}(\psi)$ the orbit space of the action of $G$ on $V$. Then $\mathbb{C}[\psi]$ is finitely generated by homogeneous polynomials and $\mathcal{O}(\psi)$ is a variety with coordinate ring $\mathbb{C}[\psi]$ ([17], [3]). By Chevalley–Shephard–Todd theorem, $\mathbb{C}[\psi]$ is a polynomial ring if and only if $\psi$ is generated by pseudo-reflections. Let $(x_{1},\ldots,x_{n})$ be linear coordinates on $V$ and $f\in\mathbb{C}[\psi]$. Then the Hessian $\mathrm{H}(f):={\partial^{2}f\over\partial x_{i}\partial x_{j}}$ defines a bilinear from on the tangent space of $\mathcal{O}(\psi)$ and if $\det(\mathrm{H}(f))\neq 0$ then $f$ is a minimal degree invariant polynomial ([18], page 6). In this article, we will drop the word pseudo as all representations will be considered as complex representations. Let ${\mathcal{W}}$ be a finite irreducible Coxeter group or Shephard group of rank $r$ and $\rho_{ref}$ is the standard reflection representation of ${\mathcal{W}}$. Boris Dubrovin proved that the orbit space $\mathcal{O}(\rho_{ref})$ acquire a polynomial Frobenius structure ([4],[8]). This result led to the classification of irreducible semisimple polynomial Frobenius manifolds with positive degrees (see section 3.1 for more details). His method was used in [25] when ${\mathcal{W}}$ is a Coxeter group of type $B_{r}$ or $D_{r}$ to construct $r$ Frobenius manifolds on $\mathcal{O}(\rho_{ref})$. However, all above-mentioned constructions seem like they depend on the fact that the invariant rings are polynomial rings. In this article, we report applying successfully Dubrovin’s method on some non- reflection representations, i.e., their invariant rings are not polynomial rings. We mention that Dubrovin and his collaborators constructed Frobenius manifolds using invariant rings of infinite discrete groups being extensions of affine Weyl groups ([7], [10], [26]). However, also in these cases, the cardinality of a minimal set of generators equals the rank of the representation. Let us fix a finite group $G$ and a linear representation $\psi:G\to GL(V)$ of rank $r$. Then we summarize Dubrovin’s method to prove existence of a Frobenius structure on $\mathcal{O}(\psi)$ as follows: 1. 1. Fix a homogenous invariant polynomial $f_{1}$ having the minimal positive degree. 2. 2. Verify that $\text{the inverse of the Hessian }\mathrm{H}(f_{1})\text{ defines a contravariant flat metric }<\cdot,\cdot>_{2}$ (1.1) on some open subset $U$ of $\mathcal{O}(\psi)$. For example, this happens if $\psi$ is a real representation (in this case degree $f_{1}$ equals 2) [11] or $\psi$ is the standard reflection representation of a Shephard group [18]. 3. 3. Construct another contravariant metric $<\cdot,\cdot>_{1}$ which forms with $<\cdot,\cdot>_{2}$ a regular quasihomogenius flat pencil of metrics (abbr. regular QFPM) on $U$ ( see section 2.2 for details). 4. 4. Using theorem 2.5 due to Dubrovin, we get a Frobenius structure on $U$ which depends on the representation $\psi$ of $G$ or $\mathbb{C}[\psi]$. By abuse of language, we say $\mathcal{O}(\psi)$ acquires a natural Frobenius structure. We will prove the orbit spaces of the following representations posses Frobenius structures using Dubrovin’s method: 1. 1. The standard reflection representation of a finite irreducible Coxeter group: We prove there is a natural rational Frobenius structure different from the ones constructed in [4] and [25]. We give details in section 3.1. Note that here the invariant ring is a polynomial ring. 2. 2. The non-reflection irreducible representation of dimension $r$ of Coxeter group of type $A_{r}$: We show the orbit space carries the same Frobenius structures that can be obtained on orbit space of the standard reflection representation. We give details in section 3.2. 3. 3. Irreducible representations of dihedral groups and dicyclic groups: These groups have only rank 1 and 2 irreducible representations. We will prove that any rank 2 representation has two Frobenius structures. Some of them acquire Frobenius structures with rational degrees. See section 4 for details. 4. 4. All finite subgroups of the special linear group $SL_{2}(\mathbb{C})$: We get polynomial and rational Frobenius structures related to dihedral groups. See section 4.3. 5. 5. All finite subgroups of the special linear group $SL_{3}(\mathbb{C})$ where the invariant rings are complete intersection: Dubrovin’s method fails on some of them. However we find a total of 8 types of Frobenius structures including a trivial one. Details are given in section 5. We mention that except for the second item in the list above, there are enough information in the literature about the invariant rings in order to apply Dubrovin’s method. For the non-reflection irreducible representation of dimension $r$ of Coxeter group of type $A_{r}$, we have to construct $r$ algebraically independent invariant polynomials. We emphasis that constructing a flat pencil of metric for a given contravariant metric is not a simple task (see for example [9] and [21] for details). In this article, we will find regular QFPMs using a simple criterion (see lemma 2.4 below). However, in some cases we will use a set of invariant polynomials different from the generators of the invariant ring. To make the article as self-contained as possible, we recall in section 2.1 and 2.2 the definition of Frobenius manifold and its relation with flat pencils of metrics. In section 2.3 we review a duality theorem for certain class of flat pencil of metrics obtained in [1]. In section 3.1, we give some details about the work of Dubrovin and Zuo on standard reflection representations of finite irreducible Coxeter groups and the classification of polynomial Frobenius manifolds. ## 2 Flat pencil of metrics and Frobenius manifolds ### 2.1 Frobenius manifolds Let $M$ be a Frobenius manifold with flat metric $\Pi$ and identity vector field $e$. In flat coordinates $(t^{1},...,t^{r})$ for $\Pi$ where $e=\partial_{t^{r}}$ the compatibility conditions imply that there exists a function $\mathbb{F}(t^{1},...,t^{r})$ which encodes the Frobenius structure, i.e., the flat metric is given by $\Pi_{ij}(t)=\Pi(\partial_{t^{i}},\partial_{t^{j}})=\partial_{t^{r}}\partial_{t^{i}}\partial_{t^{j}}\mathbb{F}(t)$ (2.1) and, setting $\Omega_{1}(t)$ to be the inverse of the matrix $\Pi(t)$, the structure constants of the Frobenius algebra are given by $C_{ij}^{k}(t)=\Omega_{1}^{kp}(t)\partial_{t^{p}}\partial_{t^{i}}\partial_{t^{j}}\mathbb{F}(t).$ Here, and in what follows, summation with respect to repeated upper and lower indices is assumed. In this article, we assume the quasihomogeneity condition for $\mathbb{F}(t)$ takes the form $E\mathbb{F}(t)=d_{i}t^{i}\partial_{t^{i}}\mathbb{F}(t)=\left(3-d\right)\mathbb{F}(t);~{}~{}d_{r}=1.$ (2.2) The vector field $E=d_{i}t^{i}\partial_{t_{i}}$ is known as Euler vector field and it defines the degrees $d_{i}$ and the charge $d$ of $M$. The associativity of the Frobenius algebra implies that the potential $\mathbb{F}(t)$ satisfies WDVV equations, i.e., $\partial_{t^{i}}\partial_{t^{j}}\partial_{t^{k}}\mathbb{F}(t)~{}\Omega_{1}^{kp}~{}\partial_{t^{p}}\partial_{t^{q}}\partial_{t^{n}}\mathbb{F}(t)=\partial_{t^{n}}\partial_{t^{j}}\partial_{t^{k}}\mathbb{F}(t)~{}\Omega_{1}^{kp}~{}\partial_{t^{p}}\partial_{t^{q}}\partial_{t^{i}}\mathbb{F}(t),~{}~{}\forall i,j,q,n.$ (2.3) We say $M$ is polynomial (rational) if $\mathbb{F}(t)$ is polynomial (rational) function. ###### Definition 2.1. Let $M$ and $\widetilde{M}$ be two Frobenius manifolds with flat metrics $\Pi$ and $\widetilde{\Pi}$ and potentials $\mathbb{F}$ and $\widetilde{\mathbb{F}}$, respectively. We say $M$ and $\widetilde{M}$ are (locally) equivalent if there are open sets $U\subseteq M$ and $\widetilde{U}\subseteq\widetilde{M}$ with a local diffeomorphism $\phi:U\to\widetilde{U}$ such that $\phi^{*}\widetilde{\Pi}=c^{2}\Pi,$ (2.4) for some nonzero constant $c$, and $\phi_{*}:T_{t}U\to T_{\phi(t)}\widetilde{U}$ is an isomorphism of Frobenius algebras. Note that, if $M$ and $\widetilde{M}$, are equivalent Frobenius structures then it is not necessary that $\phi^{*}\widetilde{\mathbb{F}}=\mathbb{F}$ [4]. ### 2.2 Flat pencil of metrics We review the relation between flat pencils of metrics and Frobenius manifolds outlined in [6]. Let $M$ be a smooth manifold of dimension $r$ and fix local coordinates $(u^{1},...,u^{r})$ on $M$. ###### Definition 2.2. A symmetric bilinear form $(.,.)$ on $T^{*}M$ is called a contravariant metric if it is invertible on an open dense subset $M_{0}\subseteq M$. We define the contravariant Levi-Civita connection or Christoffel symbols $\Gamma^{ij}_{k}$ for a contravariant metric $(.,.)$ by $\Gamma^{ij}_{k}:=-g^{im}\Gamma_{mk}^{j}$ (2.5) where $\Gamma_{mk}^{j}$ are the Christoffel symbols of the metric $<.,.>$ defined on $TM_{0}$ by the inverse of the matrix $\Omega^{ij}(u)=(du^{i},du^{j})$. We say the metric $(.,.)$ is flat if $<.,.>$ is flat. Let $(.,.)$ be a contraviariant metric on $M$ and set $\Omega^{ij}(u)=(du^{i},du^{j})$. Then we will use $\Omega$ to refer to the metric and $\Omega(u)$ to its matrix in the coordinates. In particular, Lie derivative of $(.,.)$ along a vector field $X$ will be written $\mathfrak{L}_{X}\Omega$ while $X\Omega^{ij}$ means the vector field $X$ acting on the entry $\Omega^{ij}$. ###### Definition 2.3. [6] Let $\Omega_{2}$ and $\Omega_{1}$ be two flat contravariant metrics on $M$ with Christoffel symbols $\Gamma_{2k}^{ij}$ and $\Gamma_{1k}^{ij}$, respectively. Then they form a flat pencil of metrics (abbr. FPM) if $\Omega_{\lambda}:=\Omega_{2}+\lambda\Omega_{1}$ defines a flat metric on $T^{*}M$ for generic constant $\lambda$ and the Christoffel symbols of $\Omega_{\lambda}$ are given by $\Gamma_{\lambda k}^{ij}=\Gamma_{2k}^{ij}+\lambda\Gamma_{1k}^{ij}$. Such flat pencil of metrics is called quasihomogenous of degree $d$ if there exists a function $\tau$ on $M$ such that the vector fields $\displaystyle E$ $\displaystyle:=$ $\displaystyle\nabla_{2}\tau,~{}~{}E^{i}=\Omega_{2}^{ij}(u)\partial_{u^{j}}\tau$ (2.6) $\displaystyle e$ $\displaystyle:=$ $\displaystyle\nabla_{1}\tau,~{}~{}e^{i}=\Omega_{1}^{ij}(u)\partial_{u^{j}}\tau$ satisfy the following properties $[e,E]=e,~{}~{}\mathfrak{L}_{E}\Omega_{2}=(d-1)\Omega_{2},~{}~{}\mathfrak{L}_{e}\Omega_{2}=\Omega_{1}~{}~{}\mathrm{and}~{}~{}\mathfrak{L}_{e}\Omega_{1}=0.$ (2.7) In addition, the quasihomogenous flat pencil of metrics (abbr. QFPM) is called regular if the (1,1)-tensor $R_{i}^{j}=\frac{d-1}{2}\delta_{i}^{j}+{\nabla_{1}}_{i}E^{j}$ (2.8) is nondegenerate on $M$. We will use the following source for FPM. ###### Lemma 2.4. [4] Let $\Omega_{2}$ be a contravariant flat metric on $M$. Assume that in the coordinates $(u^{1},...,u^{r})$, $\Omega^{ij}_{2}(u)$ and $\Gamma^{ij}_{2k}(u)$ depend almost linearly on $u^{r}$. Suppose that $\Omega_{1}:=\mathfrak{L}_{\partial_{u^{r}}}\Omega_{2}=\partial_{u^{r}}\Omega_{2}(u)$ is nondegenerate. Then $\Omega_{2}$ and $\Omega_{1}$ form a FPM. The Christofell symbols of $\Omega_{1}$ has the form $\Gamma^{ij}_{1k}(u)=\partial_{u^{r}}\Gamma^{ij}_{2k}(u).$ If $M$ is a Frobenius manifold then $M$ has a QFPM but it does not necessarily satisfy the regularity condition. In the notations of section 2.1, the QFPM consists of the intersection form ${\Omega}_{2}(t)$ and the flat metric ${\Omega}_{1}(t)$ with degree $d$ where ${\Omega}_{2}^{ij}(t):=(d-1+d_{i}+d_{j})\Omega^{i\alpha}_{1}\Omega^{j\beta}_{1}\partial_{t^{\alpha}}\partial_{t^{\beta}}\mathbb{F}.$ (2.9) Furthermore, $\tau=t^{1}$ and $E$ with $e$ are defined by (2.6) and satisfy equations (2.7) [6]. The converse is given by the following theorem ###### Theorem 2.5. [6] Let $M$ be a manifold carrying a regular quasihomogenous flat pencil of metrics formed by $\Omega_{2}$ and $\Omega_{1}$. Denote by $M_{0}\subseteq M$ the subset of $M$ where the metric $\Omega_{1}$ is invertible. Define the multiplication of 1-forms on $M_{0}$ putting $u.v:=\Delta(u,R^{-1}v)\ where~{}\Delta^{ijk}=\Omega^{im}_{1}\Gamma^{ik}_{1m}-\Omega_{2}^{im}\Gamma^{jk}_{1m}.$ (2.10) Then there exists a unique Frobenius structure on $M$ such that 1. 1. The flat metric is given by the inverse of $\Omega_{1}$. 2. 2. The product on the tangent space is dual to the product (2.10) under the metric $\Omega_{1}$. 3. 3. The intersection form is $\Omega_{2}$. 4. 4. The unity vector field $e$ and the Euler vector field $E$ are defined by (2.6). ### 2.3 A duality and inversion symmetry Let $M$ be a Frobenius manifold, we adapt the notations of section 2.1. ###### Theorem 2.6. [5] Suppose $\Pi_{rr}(t)=0$ and all the degrees $d_{i}$’s are distinct. Then there is a linear change of the coordinates $(t^{1},...,t^{r})$ such that $\Pi_{ij}=\delta_{i+j,r+1}$. In these flat coordinates, the potential $\mathbb{F}$ takes the form $\mathbb{F}(t)=\frac{1}{2}(t^{r})^{2}t^{1}+\frac{1}{2}t^{r}\sum_{i=2}^{r-1}t^{i}t^{r-i+1}+G(t^{1},...,t^{r-1})$ (2.11) and the degrees satisfy the duality $d_{i}+d_{r-i+1}=2-d.$ (2.12) It is straightforward to prove under the hypothesis of theorem 2.6 that the associated flat pencil of metrics is regular if and only if $\frac{d_{1}}{2}\neq d_{i}$ for every $i$. ###### Theorem 2.7. [1] Let $M$ be a Frobenius manifold with a flat coordinates $(t^{1},\ldots,t^{r})$ where the potential has the form (2.11). Assume the associated quasihomogenous flat pencil of metrics defined by the intersection form $\Omega_{2}$ and the flat metric $\Omega_{1}$ is regular of degree $d\neq 1$. Then there is another Frobenius structure on $M\backslash\\{t^{1}=0\\}$ having the flat coordinates $s^{1}=-t^{1},\ \ s^{i}=t^{i}(t^{1})^{\frac{d_{1}-2d_{i}}{d_{1}}}\ \ for\ \ 1<i<r,\ \ s^{r}=\frac{1}{2}\sum_{i=1}^{r}t^{i}t^{r-i+1}(t^{1})^{\frac{-2}{d_{1}}-1}$ (2.13) and its flat pencil of metrics is also regular and consists of the intersection form $\Omega_{2}$ and the flat metric $\widetilde{\Omega}_{1}$ where $\widetilde{\Omega}_{1}$ is Lie derivative of $\Omega_{2}$ along the vector field ${\partial_{s^{r}}}$. We prove in [1] that the potential $\widetilde{\mathbb{F}}(s)$ of new Frobenius structure constructed in theorem 2.7 is nothing but the inversion symmetry of the solution $\mathbb{F}(t)$ (see [4], appendix B for details about inversion symmetry). Furthermore, the potential $\widetilde{\mathbb{F}}(s)$ has the form $\widetilde{\mathbb{F}}(s)=(t^{1})^{\frac{-4}{d_{1}}}\left(\mathbb{F}(t^{1},\ldots,t^{r})-\frac{1}{2}t^{r}\sum_{1}^{r}t^{i}t^{r-i+1}\right)$ (2.14) which will be rational in $s^{1}$. The degrees of the new Frobenius structure are $\widetilde{d}_{1}=-d_{1},\ \ \widetilde{d}_{r}=1,\ \ \widetilde{d}_{i}=d_{i}-d_{1}\ \ for\ \ 1<i<r.$ (2.15) and the charge is $\widetilde{d}=2-d$. Form the point of view of this article, theorem 2.7 explains the appearance of some rational Frobenius structures in next sections. Here is an example where theorem 2.7 can not apply. For convenience, we write in examples, indices of coordinates using subscripts instead of superscripts. ###### Example 2.8. A Frobenius manifold is called trivial if the structure constants does not depend on the point. In this case, all monomials in the potential are cubic, all degrees equal 1 and the charge is 0. Then the method given in this section will not give a dual Frobenius structure. An example in dimension 3 will encounter later is the trivial Frobenius manifold $T_{3}$ given by the potential $\mathbb{F}=\frac{1}{2}t_{2}^{2}t_{1}+\frac{2}{3}t_{1}^{3}-t_{2}t_{1}^{2}+2t_{3}^{2}t_{1}-t_{2}t_{3}^{2},$ where $e=\partial_{t_{1}}$. This has no dual since $\mathbb{F}$ can not have the form (2.11). ## 3 Coxeter groups ### 3.1 Duality on orbits of reflection groups In this section, we recall the standard reflection representations of irreducible finite Coxeter groups and review the construction of Frobenius manifolds on their orbit spaces. Then we apply theorem 2.7 and give some examples. We fix an irreducible finite Coxeter system $({\mathcal{W}},S)$ of rank $r$, i.e., ${\mathcal{W}}=<S|\,(ss^{\prime})^{m(s,s^{\prime})}=1;\,\forall s,s^{\prime}\in S>,~{}~{}r=|S|.$ (3.1) Let $V$ be the formal vector space over $\mathbb{C}$ with basis $\\{\alpha_{s}\ |\ s\in S\\}$. Then the standard reflection representation of ${\mathcal{W}}$ is defined by $\displaystyle{\rho_{ref}}$ $\displaystyle:{\mathcal{W}}\rightarrow GL(V),~{}~{}s\mapsto R_{s},~{}s\in S.$ $\displaystyle R_{s}(v)$ $\displaystyle:=v-2B(\alpha_{s},v)\alpha_{s},~{}~{}v\in V,~{}~{}B(\alpha_{s},\alpha_{s^{\prime}}):=-\cos\frac{\pi}{m(s,s^{\prime})}.$ Here $B$ is the standard positive-definite Hermitian form on $V$ which is invariant under $\rho_{ref}$. By Chevalley–Shephard–Todd theorem, the invariant ring $\mathbb{C}[\rho_{ref}]$ is a polynomial ring generated by $r$ homogeneous polynomial. We fix generators $u^{1},...,u^{r}$ for $\mathbb{C}[\rho_{ref}]$. We assume $\deg u^{i}=\eta_{i}$ and $2=\eta_{1}<\eta_{2}\leq\eta_{3}\leq\ldots\leq\eta_{r+1}<\eta_{r}.$ (3.2) These degrees are an intrinsic property of the group ${\mathcal{W}}$ [14] and we list them in Table 1. Type of ${\mathcal{W}}$ | $\eta_{1},\ldots,\eta_{r}$ ---|--- $A_{r}$ | $2,3,\ldots,r+1$ $B_{r}$ | $2,4,6,\ldots,2r$ $D_{r}$ | $2,4,6,\ldots,2r-2,r$ $E_{6}$ | $2,5,6,8,9,12$ $E_{7}$ | $2,6,8,10,12,14,18$ $E_{8}$ | $2,8,12,14,18,20,24,30$ $F_{4}$ | $2,6,8,12$ $H_{3}$ | $2,6,10$ $H_{4}$ | $2,12,20,30$ $I_{2}(m)$ | $2,m$ Table 1: Degrees of invariant polynomials of $\rho_{ref}$ We set $u^{1}$ equals the quadratic from of $B$. Hence, the inverse of the Hessian of $u^{1}$ defines a flat contravariant metric $\Omega_{2}$ on $\mathcal{O}(\rho_{ref})$. It is easy to prove that $\Omega_{2}(u)$ is almost linear in $u^{r}$ by analysing the degrees of $\Omega^{ij}_{2}(u)$. We fix the vector field $e=\partial_{u^{r}}$. Note that changing the generators of $\mathbb{C}[\rho_{ref}]$, $e$ is uniquely defined up to a constant factor. Dubrovin proved that $\Omega_{2}$ and $\Omega_{1}:=\mathfrak{L}_{e}\Omega_{2}$ form a regular QFPM of charge $\eta_{r}-2\over\eta_{r}$ [6]. In this case, $\tau={1\over\eta_{r}}u_{1}$ and the vector field $E$ is given by $E={1\over\eta_{r}}\sum_{i}\eta_{i}u^{i}\partial_{u^{i}}$. This result initiated what we call Dubrovin’s method in the introduction. Below, we restate Dubrovin theorem. We observe that $E$ is uniquely defined and does not depend on the choice of invariants $u^{i}$. Also, we mention that the flat metric $\Omega_{1}$ was studied by K. Saito [20], [19] and his results was very important to the work [4]. ###### Theorem 3.1. ([4], [6]) The FPM formed by $\Omega_{2}$ and $\Omega_{1}$ defines a unique (up to equivalence) polynomial Frobenius manifold on $\mathcal{O}(\rho_{ref})$ with degrees $\eta_{i}\over\eta_{r}$ and charge $\eta_{r}-2\over\eta_{r}$. The following theorem was conjectured by Dubrovin and proved by C. Hertling. ###### Theorem 3.2. [13] Any irreducible massive polynomial Frobenius manifold with positive degrees is isomorphic to a polynomial Frobenius manifold constructed by theorem 3.1 on the orbit space of the standard reflection representation of an irreducible finite Coxeter group. Then theorem 2.7 gives another Frobenius structure on $\mathcal{O}(\rho_{ref})$. ###### Theorem 3.3. There is exist a unique (up to equivalence) rational Frobenius manifold structure on $\mathcal{O}(\rho_{ref})$ with the intersection form $\Omega_{2}$ and flat metric $\mathfrak{L}_{\tilde{e}}\Omega_{2}$ where $\tilde{e}=(u^{1})^{\eta_{r}}e$. The charge of this Frobenius manifold is $\eta_{r}+2\over\eta_{r}$ and the degrees are $d_{1}=-{2\over\eta_{r}},\ \ d_{i}={\eta_{i}-2\over\eta_{r}};\ \ i=2,\ldots r-1,\ \ \text{and}\ \ d_{r}=1.$ (3.3) The potential in the flat coordinates $(t^{1},\ldots,t^{r})$ is polynomial in $\frac{1}{t^{1}},t^{1},t^{2},\ldots,t^{r}$. ###### Proof. From the work of K. Saito (see also [4]), there exist invariant polynomials $t^{1},\ldots,t^{r}$ which form a flat coordinates and the potential of the polynomial Frobenius structure on $\mathcal{O}(\rho_{ref})$ has the form (2.11). Looking at the degrees, theorem 2.7 is applicable. The result is a rational Frobenius manifold in $s^{1}$ with the claimed data. Uniqness follow from the uniqness of polynomial Frobenius structures. ∎ Let us assume ${\mathcal{W}}$ is of type $B_{r}$. Then Dafeng Zuo obtained $r$ Frobenius structures on $\mathcal{O}(\rho_{ref})$ by fixing a certain generators $z^{1},\ldots,z^{r}$ of $\mathbb{C}[\rho_{ref}]$ [25]. Under these generators, $\Omega_{2}(z)$ and its Christoffel symbols $\Gamma^{ij}_{2,k}(z)$ are almost linear in each $z^{k}$, $k=1,2,\ldots,r$. Then he proved lemma 2.4 can be applied and he constructed $r$ rational Frobenius structure using the FPM formed by $\Omega_{2}$ and $\Omega_{k}:=\mathfrak{L}_{\partial_{z^{k}}}\Omega_{2}$. He also proved that the same Frobenius manifolds can be constructed when we replace type $B_{r}$ with $D_{r}$. We confirm that Zuo’s work falls into Dubrovin’s method as we can read from his work that the FPM is regular quasihomogenous of charge $1-{1\over k}$ with $\tau={1\over 4k}z^{1}$. Thus, we can obtain these Frobenius manifolds equivalently using theorem 2.5. We state below Zuo’s theorem. ###### Theorem 3.4. [25] There exists a unique Frobenius structure for each $1\leq k\leq r$ of charge $d=1-\frac{1}{k}$ on the orbit space $\mathcal{O}(\rho_{ref})$ when ${\mathcal{W}}$ is of type $B_{r}$ and $D_{r}$ polynomial in $t^{1},t^{2},\ldots,t^{r},\frac{1}{t^{r}}$ such that: 1. 1. $e=\frac{\partial}{\partial z^{k}}=\frac{\partial}{\partial t^{k}}$. 2. 2. $E=\sum_{i=1}^{r}d_{i}t^{i}\partial_{t^{i}}$, where $d_{1}=\frac{1}{k},\ \ d_{i}=\frac{i}{k}\ \ for\ \ 2\leq i\leq k,\ \ d_{i}=\frac{2k(r-i)+r}{2k(r-k)}\ \ for\ \ k+1\leq i\leq r.$ 3. 3. The invariant flat metric and the intersection form of Frobenius structure coincide with the metric $\Omega_{k}$ and $\Omega_{2}$ resp.. ###### Theorem 3.5. There is exist a unique rational Frobenius manifold structure for each $2\leq k\leq r$ of charge ${d}=1+\frac{1}{k}$ on the orbit space when ${\mathcal{W}}$ is of type $B_{r}$ and $D_{r}$ with intersection form $\Omega_{2}$ and flat metric $\mathfrak{L}_{\widetilde{e}}\Omega_{2}$ where $\widetilde{e}=(z^{1})^{\eta_{k}}\partial_{z^{k}}$. It has the degrees ${d}_{1}=\frac{-1}{k},\ \ {d}_{i}=\frac{i-1}{k}\ \ for\ \ 2\leq i\leq k-1,\ \ {d}_{k}=1,\ \ {d}_{i}=\frac{2k(r-i+1)-r}{2k(r-k)}\ \ for\ \ k+1\leq i\leq r.$ (3.4) The potential in the flat coordinates $(t^{1},\ldots,t^{r})$ is polynomial in $\frac{1}{t^{1}},\frac{1}{t^{r}},t^{1},t^{2},\ldots,t^{r}$. ###### Proof. Similar to the proof of theorem 3.3, we use thoerem 2.7 under the hypothesis of theorem 3.4. ∎ We emphasis that Frobenius structures obtained by theorems 3.3 and 3.5 fall into Dubrovin’s method since they are obtained using the same intersection form $\O_{2}$. Let $K$ be the type of ${\mathcal{W}}$, then we say a Frobenius structure is of type $K$ (rep. of type $\widetilde{K}$) if it isomorphic to a Frobenius manifold constructed on $\mathcal{O}(\rho_{ref})$ by theorem 3.1 (resp. theorem 3.3). ###### Example 3.6. We list in table 2 all Frobenius structures constructed on $\mathcal{O}(\rho_{ref})$ when ${\mathcal{W}}$ is of rank 3 using the above theorems. We borrow the potentials of Frobenius structures of type $A_{3}$, $B_{3}$ and $H_{3}$ from [6]. From these potentials, we find Frobenius structures of type $\widetilde{A}_{3}$, $\widetilde{B}_{3}$ and $\widetilde{H}_{3}$ using the formula (2.14). Then applying theorem 3.4 with Coxeter group of type $B_{3}$, we get a Frobenius manifold of type $B_{3}$ (resp. $A_{3}$) when $k=3$ (resp. $k=2$). For $k=1$, we get a rational Frobenius manifold $B_{3}^{1}$ which has no dual, i.e., the potential can not have the form (2.11). Notations | $\mathbb{F}(t_{1},t_{2},t_{3})$ | $d_{1},d_{2},d_{3}$ | d ---|---|---|--- $A_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{4}t_{1}^{2}t_{2}^{2}+\frac{1}{60}t_{1}^{5}$ | $\frac{1}{2},\frac{3}{4},1$ | $\frac{1}{2}$ $\widetilde{A}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}+\frac{t_{2}^{2}}{4t_{1}^{2}}-\frac{1}{60t_{1}^{3}}$ | $\frac{-1}{2},\frac{1}{4},1$ | $\frac{3}{2}$ $B_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{6}t_{2}^{2}t_{1}^{3}+\frac{1}{6}t_{2}^{3}t_{1}+\frac{1}{210}t_{1}^{7}$ | $\frac{1}{3},\frac{2}{3},1$ | $\frac{2}{3}$ $\widetilde{B}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}+\frac{t_{2}^{3}}{6t_{1}^{2}}-\frac{t_{2}^{2}}{6t_{1}^{3}}-\frac{1}{210t_{1}^{5}}$ | $\frac{-1}{3},\frac{1}{3},1$ | $\frac{4}{3}$ $H_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{1}{20}t_{2}^{2}t_{1}^{5}+\frac{1}{6}t_{2}^{3}t_{1}^{2}+\frac{1}{3960}t_{1}^{11}$ | $\frac{1}{5},\frac{3}{5},1$ | $\frac{4}{5}$ $\widetilde{H}_{3}$ | $\frac{1}{2}t_{3}^{2}t_{1}+\frac{1}{2}t_{2}^{2}t_{3}+\frac{t_{2}^{4}}{8t_{1}}-\frac{t_{2}^{3}}{6t_{1}^{3}}-\frac{t_{2}^{2}}{20t_{1}^{5}}-\frac{1}{3960t_{1}^{9}}$ | $\frac{-1}{5},\frac{2}{5},1$ | $\frac{6}{5}$ $B_{3}^{1}$ | $\frac{1}{2}t_{3}^{4}+\frac{3}{2}t_{1}t_{2}t_{3}+\frac{1}{8}t_{1}^{3}+{1\over 16}\frac{t_{2}^{3}}{t_{3}}$ | $1,\frac{3}{4},\frac{5}{4}$ | $0$ Table 2: Frobenius manifolds on orbits of reflection groups of rank 3 ### 3.2 Sign times reflection representation We keep the notations of the last section and we assume ${\mathcal{W}}$ is of type $A_{r}$. We study an irreducible representation $\rho_{new}$ of ${\mathcal{W}}$ which can be defined using the sign representation and the representation $\rho_{ref}$. The definition will enable us to construct $r$ invariant polynomials of $\rho_{new}$. We will prove the invariant ring $\mathbb{C}[\rho_{new}]$ is not a polynomial ring when $r>2$. We consider the sign representation of ${\mathcal{W}}$, $\rho_{sign}:{\mathcal{W}}\rightarrow\mathbb{C}^{*}$ defined by sending each element $s\in S$ to $-1$. Then we define the representation $\rho_{new}$ of ${\mathcal{W}}$ by $\rho_{new}:{\mathcal{W}}\rightarrow GL(\mathbb{C}\otimes V),~{}~{}\rho_{new}(w)=\rho_{sign}(w)\otimes\rho_{ref}(w),~{}~{}\forall w\in{\mathcal{W}}.$ (3.5) The following proposition proves $\rho_{new}$ is an irreducible representation. Note that $\rho_{new}$ is a real representation of rank $r$. ###### Proposition 3.7. The new representation $\rho_{new}$ is an irreducible representation of ${\mathcal{W}}$. Moreover, $\rho_{new}$ and $\rho_{ref}$ are isomorphic when $r=2$ and different otherwise. ###### Proof. Recall that if $\chi_{\psi}$ denotes the character of a representation $\psi$ of a finite group $G$, then $\psi$ is irreducible if and only if [22] $\frac{1}{|G|}\sum_{g\in G}\chi_{\psi}(g)\overline{\chi_{\psi}(g)}=1.$ (3.6) Note that $\rho_{ref}$ and $\rho_{sign}$ are irreducible representations and $\chi_{\rho_{new}}(w)=\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w)$. Then $\displaystyle\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}\chi_{{\rho_{new}}}(w)\overline{\chi_{{\rho_{new}}}(w)}$ $\displaystyle=\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}(\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w))\overline{(\chi_{\rho_{sign}}(w)\chi_{\rho_{ref}}(w))}$ (3.7) $\displaystyle=\frac{1}{|{\mathcal{W}}|}\sum_{w\in{\mathcal{W}}}(\chi_{\rho_{ref}}(w)\overline{\chi_{\rho_{ref}}(w)})=1.$ For the second part, note that for any generator $s\in S$, $\chi_{{\rho_{new}}}(s)=-\chi_{{\rho_{ref}}}(s)=-(r-2)$. Hence, the two representations are different when $r\neq 2$. When $r=2$, ${\mathcal{W}}$ is of type $I_{2}(m)$ for some integer $m$. Let $s$ and $s^{\prime}$ be the two generators of the group. Setting $\sigma=ss^{\prime}$, then elements of ${\mathcal{W}}$ are in the form $\sigma^{i}$ and $s\sigma^{i}$ for some integer $i$. But then $\chi_{\rho_{ref}}(s\sigma^{i})=\chi_{\rho_{new}}(s\sigma^{i})=0$, since $\rho_{ref}(s\sigma^{i})$ is a reflection, and $\chi_{\rho_{ref}}(\sigma^{i})=\chi_{\rho_{new}}(\sigma^{i})$ since $\rho_{sign}(\sigma^{i})=1$. Thus, the two representation $\chi_{\rho_{new}}$ and $\chi_{\rho_{ref}}$ are isomorphic. ∎ The Coxeter group of type $A_{r}$ is isomorphic to the symmetric group $S_{r+1}$. Thus, irreducible representations of $A_{r}$ are in one to one correspondence with the partition of $r+1$. For a given partition $\lambda$ of $r+1$, the corresponding irreducible representation can be constructed using Young tableaux associated to $\lambda$ [11]. Under this construction, the reflection representation $\rho_{ref}$ is associated with the partition $[r,1]$, $\rho_{sign}$ is associated with the partition $[r+1]$ while $\rho_{new}$ is associated with $[2,1,1,\ldots,1]$. The character of each representation is given by Frobenius formula [11]. We use this formula to prove the following proposition. For the remainder of this section we assume the rank $r>2$. ###### Proposition 3.8. The irreducible representation $\rho_{new}$ is not a reflection representation. In particular the ring $\mathbb{C}[\rho_{new}]$ is not a polynomial ring. ###### Proof. Assume that $\rho_{new}$ is a reflection representation. Then, it is generated by a set involutions $w_{1},\ldots,w_{r}$. Since $\rho_{new}$ is a real representation, we must have $\chi_{\rho_{new}}(w_{i})=r-2$. From $\rho_{new}(w_{i})=\rho_{sign}(w_{i})\rho_{ref}(w_{i})$, $\rho_{sign}(w_{i})=-1$, since if $\rho_{sign}(w_{i})=1$, then $\rho_{ref}(w_{i})$ is a reflection and we get a contradiction. Thus, $\chi_{\rho_{ref}}(w_{i})=2-r$. In the one-to-one correspondence between conjugacy classes of $S_{r+1}$ and partitions of $r+1$, $w_{i}$ corresponds to a partition of the from $[2,2,\ldots,2,1,1\ldots,1]=[2^{p},1^{q}]$ with $2p+q=r+1$, $p>0$. Using Frobenius formula, $\chi_{\rho_{ref}}(w_{i})$ equals the coefficient of $x^{r+1}y$ in the expansion $(x-y)(x^{2}+y^{2})^{p}(x+y)^{r+1-2p}$. Hence, $\chi_{\rho_{ref}}(w_{i})=r-2p$. Using the fact that $2p\leq r+1$ and $\chi_{\rho_{ref}}(w_{i})=2-r$ we get $r\leq 3$. However, the case $r=3$ is excluded by direct computations. ∎ We study the ring $\mathbb{C}[\rho_{new}]$ in order to use Dubrovin’s method. We fix a basis $e_{1},e_{2},\ldots,e_{r}$ for $V$ and let $x^{1},\ldots,x^{r}$ be the dual basis satisfying $x^{i}(e_{j})=\delta^{i}_{j}$. Then $\tilde{e_{i}}:=\textbf{1}\otimes e_{i}$, $i=1,...,r$ form a basis of $\mathbb{C}\otimes V$ and we get a natural isomorphism $\theta:\mathbb{C}\otimes V\rightarrow V,\,\tilde{e_{i}}\mapsto e_{i}.$ (3.8) Then the pullback $\tilde{x}^{i}=\theta^{*}(x^{i})$ defines the dual basis of $\tilde{e}_{i}$. Let $w\in{\mathcal{W}}$ and $a_{i}^{j}$ be the matrix of $\rho_{ref}(w)$ under the basis $e_{i}$. Then $\rho_{new}(w)(\tilde{e_{i}})=\rho_{sign}(w)\textbf{1}\otimes\rho_{ref}(w)e_{i}=\rho_{sign}(w)a_{i}^{j}\ \tilde{e_{j}}$. Therefore, $\rho_{new}(w)=\rho_{sign}(w)\rho_{ref}(w)$. ###### Lemma 3.9. Let $w\in{\mathcal{W}}$ with $\rho_{sign}(w)\rho_{new}(w)\notin\rho_{ref}({\mathcal{W}})$ and $f\in\mathbb{C}[\rho_{ref}]$ be homogeneous polynomial. Then $w\cdot\theta^{*}(f)=(\rho_{sign}(w))^{deg(f)}\theta^{*}(f).$ (3.9) In particular, if degree $f$ is even then $\theta^{*}(f)\in\mathbb{C}[\rho_{new}]$. ###### Proof. We obtain $\theta^{*}(f)$ simply by replacing the coordinate $x^{i}$ with $\tilde{x}^{i}$. Therefore, $\displaystyle w.\theta^{*}(f)(\tilde{x}^{1},\tilde{x}^{2},\ldots,\tilde{x}^{n})$ $\displaystyle=\theta^{*}(f)(\rho_{new}(w)\tilde{x^{1}},\rho_{new}(w)\tilde{x^{2}},\ldots,\rho_{new}(w)\tilde{x^{n}})$ $\displaystyle=\theta^{*}(f)(\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{1}},\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{2}},\ldots,\rho_{sign}(w)\rho_{ref}(w)\tilde{x^{n}})$ $\displaystyle=(\rho_{sign}(w))^{deg(f)}\theta^{*}(f)(\tilde{x}^{1},\tilde{x}^{2},\ldots,\tilde{x}^{n}).$ ∎ Let $z^{1},...,z^{r}$ be algebraically independent invariant polynomials of $\rho_{new}$ and $u^{1},...,u^{r}$ be the generators of $\mathbb{C}[\rho_{ref}]$ (in the notation of section 3.1). We assume $z^{1}=\theta^{*}(u^{1})$. Hence, the Hessian of $z^{1}$ defines a contravariant flat metric $\Omega_{2}$ on $\mathcal{O}(\rho_{new})$. Examples show that the entries of $\Omega_{2}(z)$ are rational in general and it is hard to construct flat pencil of metrics. We overcome this problem by defining certain invariants for $\rho_{new}$ which also leads to the construction of Frobenius structures. ###### Proposition 3.10. There exist $r$ algebraically independent invariant polynomials $z^{1},z^{2},\ldots,z^{r}$ of $\rho_{new}$ with the degrees $\tilde{\eta_{1}},\ldots,\tilde{\eta_{r}}$ listed in table 3. ###### Proof. We will use the invariants $u^{1},...,u^{r}$ of $\rho_{ref}$ to construct invariants of $\rho_{new}$. We set $I=\\{i:\eta_{i}\mathrm{~{}is~{}even}\\}$ and $J=\\{j:\eta_{j}\mathrm{~{}is~{}odd}\\}$. Using lemma 3.9, $\theta^{*}(u^{i})$ is an invariant of $\rho_{new}$ for any $i\in I$. Let $\kappa$ be the minimal index in $J$. Then $\theta^{*}(u^{\kappa}u^{j})$ is an invariant of $\rho_{new}$ for any $j\in J$. By this way we construct $r$ invariants polynomial, $z^{1},\ldots,z^{r}$ for $\rho_{new}$ with the degrees given in table 3. Note that any polynomial in $z^{1},\ldots,z^{r}$ can be written as a polynomial in $u^{1},\ldots,u^{r}$. Hence, $z^{1},\ldots,z^{r}$ are algebraically independent. ∎ ###### Remark 3.11. We observe that the invariant polynomials constructed by proposition 3.10 do not necessarily form a set of primary invariant polynomials of $\rho_{new}$. According to the invariant theory [3], the product of the degrees of primary invariants is divisible by the order of the group. For example, when ${\mathcal{W}}$ is type $A_{4}$, the degrees of $z^{i}$ are $2,4,6,8$. The product of these degrees is not divisible by the order 120 of the group. Type of ${\mathcal{W}}$ | $\tilde{\eta_{1}},\ldots,\tilde{\eta_{r}}$ ---|--- $A_{r}$ | $2,4,6,\ldots,2\lfloor\frac{r+1}{2}\rfloor;6,8,\ldots,2\lceil\frac{r+3}{2}\rceil$ Table 3: Degrees of invariant polynomials of $\rho_{new}$ We keep the notations $z^{1},...,z^{r}$ for the invariant polynomials of $\rho_{new}$ constructed in proposition 3.10. ###### Theorem 3.12. The orbits space $\mathcal{O}(\rho_{new})$ has the structure of Frobenius manifolds isomorphic to Frobenius manifolds defined on $\mathcal{O}(\rho_{ref})$ by theorem 3.1 and theorem 3.2. ###### Proof. We consider the map $(u^{1},...,u^{r})\to(z^{1},z^{2},\ldots,z^{r})$ given in proposition 3.10 as diffeomorphism on some open subset of $u^{\kappa}\neq 0$ where $\kappa$ is defined in proposition 3.10. Note that, under this diffeomorphism, the metric defined by the Hessian of $u^{1}$ is identified with the metric defined by the Hessian of $z^{1}$. Thus, we can transfer to $\mathcal{O}(\rho_{new})$, any regular QFPM formed by $\Omega_{2}$ and $\Omega_{1}$ given by the theorems 3.1 and 3.1. In this way we obtain s Frobenius structures on $\mathcal{O}(\rho_{new})$. ∎ ###### Example 3.13. The irreducible reflection representation $\rho_{ref}$ of Coxeter group of type $A_{4}$ is generated by the matrices $\sigma=\begin{pmatrix}1&0&0&-1\\\ 0&1&0&-1\\\ 0&0&1&-1\\\ 0&0&0&-1\end{pmatrix}\ \ and\ \ \tau=\begin{pmatrix}-1&1&0&0\\\ -1&0&1&0\\\ -1&0&0&1\\\ -1&0&0&0\end{pmatrix}$ (3.10) The polynomial ring $\mathbb{C}[\rho_{ref}]=\mathbb{C}[u_{1},u_{2},u_{3},u_{4}]$ where $\displaystyle u_{1}$ $\displaystyle=$ $\displaystyle x_{1}^{2}-\frac{1}{2}x_{1}x_{2}-\frac{1}{2}x_{1}x_{3}-\frac{1}{2}x_{1}x_{4}+x_{2}^{2}-\frac{1}{2}x_{2}x_{3}-\frac{1}{2}x_{2}x_{4}+x_{3}^{2}-\frac{1}{2}x_{3}x_{4}+x_{4}^{2},$ $\displaystyle u_{2}$ $\displaystyle=$ $\displaystyle x_{1}^{3}-\frac{3}{4}x_{1}^{2}x_{2}-\frac{3}{4}x_{1}^{2}x_{3}-\frac{3}{4}x_{1}^{2}x_{4}-\frac{3}{4}x_{1}x_{2}^{2}+x_{1}x_{2}x_{3}+x_{1}x_{2}x_{4}-\frac{3}{4}x_{1}x_{3}^{2}+x_{1}x_{3}x_{4}-\frac{3}{4}x_{1}x_{4}^{2}+x_{2}^{3}-\frac{3}{4}x_{2}^{2}x_{3}$ $\displaystyle-\frac{3}{4}x_{2}^{2}x_{4}-\frac{3}{4}x_{2}x_{3}^{2}+x_{2}x_{3}x_{4}-\frac{3}{4}x_{2}x_{4}^{2}+x_{3}^{3}-\frac{3}{4}x_{3}^{2}x_{4}-\frac{3}{4}x_{3}x_{4}^{2}+x_{4}^{3},$ $\displaystyle u_{3}$ $\displaystyle=$ $\displaystyle x_{1}^{4}-x_{1}^{3}x_{2}-x_{1}^{3}x_{3}-x_{1}^{3}x_{4}+x_{1}^{2}x_{2}x_{3}+x_{1}^{2}x_{2}x_{4}+x_{1}^{2}x_{3}x_{4}-x_{1}x_{2}^{3}+x_{1}x_{2}^{2}x_{3}+x_{1}x_{2}^{2}x_{4}+x_{1}x_{2}x_{3}^{2}-3x_{1}x_{2}x_{3}x_{4}$ $\displaystyle+x_{1}x_{2}x_{4}^{2}-x_{1}x_{3}^{3}+x_{1}x_{3}^{2}x_{4}+x_{1}x_{3}x_{4}^{2}-x_{1}x_{4}^{3}+x_{2}^{4}-x_{2}^{3}x_{3}-x_{2}^{3}x_{4}+x_{2}^{2}x_{3}x_{4}-x_{2}x_{3}^{3}+x_{2}x_{3}^{2}x_{4}+x_{2}x_{3}x_{4}^{2}$ $\displaystyle- x_{2}x_{4}^{3}+x_{3}^{4}-x_{3}^{3}x_{4}-x_{3}x_{4}^{3}+x_{4}^{4},$ $\displaystyle u_{4}$ $\displaystyle=$ $\displaystyle x_{1}^{5}-\frac{5}{4}x_{1}^{4}x_{2}-\frac{5}{4}x_{1}^{4}x_{3}-\frac{5}{4}x_{1}^{4}x_{4}+\frac{5}{3}x_{1}^{3}x_{2}x_{3}+\frac{5}{3}x_{1}^{3}x_{2}x_{4}+\frac{5}{3}x_{1}^{3}x_{3}x_{4}-\frac{5}{2}x_{1}^{2}x_{2}x_{3}x_{4}-\frac{5}{4}x_{1}x_{2}^{4}+\frac{5}{3}x_{1}x_{2}^{3}x_{3}$ $\displaystyle+\frac{5}{3}x_{1}x_{2}^{3}x_{4}-\frac{5}{2}x_{1}x_{2}^{2}x_{3}x_{4}+\frac{5}{3}x_{1}x_{2}x_{3}^{3}-\frac{5}{2}x_{1}x_{2}x_{3}^{2}x_{4}-\frac{5}{2}x_{1}x_{2}x_{3}x_{4}^{2}+\frac{5}{3}x_{1}x_{2}x_{4}^{3}-\frac{5}{4}x_{1}x_{3}^{4}+\frac{5}{3}x_{1}x_{3}^{3}x_{4}$ $\displaystyle+\frac{5}{3}x_{1}x_{3}x_{4}^{3}-\frac{5}{4}x_{1}x_{4}^{4}+x_{2}^{5}-\frac{5}{4}x_{2}^{4}x_{3}-\frac{5}{4}x_{2}^{4}x_{4}+\frac{5}{3}x_{2}^{3}x_{3}x_{4}-\frac{5}{4}x_{2}x_{3}^{4}+\frac{5}{3}x_{2}x_{3}^{3}x_{4}+\frac{5}{3}x_{2}x_{3}x_{4}^{3}-\frac{5}{4}x_{2}x_{4}^{4}+x_{3}^{5}$ $\displaystyle-\frac{5}{4}x_{3}^{4}x_{4}-\frac{5}{4}x_{3}x_{4}^{4}+x_{4}^{5}.$ The Frobenius manifold of type $A_{4}$ is a result of the regular QFPM consists of $\Omega_{2}(u)$ and $\Omega_{1}=\mathfrak{L}_{\partial_{u_{r}}}\Omega_{2}(u)$ where $\Omega_{2}(u)$ is defined by the Hessian of $u_{1}$. The representation $\rho_{new}$ is generated by $\tau$ and $-\sigma$. Then the primary invariants of $\rho_{new}$ have degrees $2,4,6,10$ while the secondary invariants have degrees $8,13,15$. The Hessian of the degree 2 invariant $z_{1}$ leads to the flat contravariant metric $\Omega_{2}$ but it is hard to find a FPM. We fix the following $4$ invariants polynomials for $\mathcal{O}(\rho_{new})$ of degrees $2,4,6$ and $8$: ${z_{1}}=u_{1},\ \ {z_{2}}=u_{3},\ \ {z_{3}}=u_{2}^{2},\ \ z_{4}=u_{2}u_{4}$. Then the matrix of $\Omega_{2}(z)$ consists of the columns ${\Omega_{2}^{i1}(z)}=\begin{pmatrix}z_{1}\\\ 2z_{2}\\\ 3z_{3}\\\ 4z_{4}\end{pmatrix},\ \ {\Omega_{2}^{i2}(z)}=\begin{pmatrix}2z_{2}\\\ -\frac{64}{625}z_{1}^{3}+\frac{68}{25}z_{1}z_{2}+\frac{864}{625}z_{3}\\\ \frac{12}{5}z_{1}z_{3}+\frac{18}{5}z_{4}\\\ \frac{64}{75}z_{1}^{2}z_{3}+\frac{43}{15}z_{2}z_{3}+\frac{62}{25}z_{1}z_{4}+\frac{9}{5}\frac{z_{4}^{2}}{z_{3}}\end{pmatrix},\ \ $ ${\Omega_{2}^{i3}(z)}=\begin{pmatrix}3z_{3}\\\ \frac{12}{5}z_{1}z_{3}+\frac{18}{5}z_{4}\\\ \frac{2}{3}z_{1}^{2}z_{3}+\frac{25}{3}z_{2}z_{3}\\\ -\frac{26}{45}z_{1}^{3}z_{3}+\frac{95}{18}z_{1}z_{2}z_{3}+\frac{14}{5}z_{3}^{2}+\frac{1}{3}z_{1}^{2}z_{4}+\frac{25}{6}z_{2}z_{4}\end{pmatrix}$ and ${\Omega_{2}^{i4}(z)}=\begin{pmatrix}4z_{4}\\\ \frac{64}{75}z_{1}^{2}z_{3}+\frac{43}{15}z_{2}z_{3}+\frac{62}{25}z_{1}z_{4}+\frac{9}{5}\frac{z_{4}^{2}}{z_{3}}\\\ -\frac{26}{45}z_{1}^{3}z_{3}+\frac{95}{18}z_{1}z_{2}z_{3}+\frac{14}{5}z_{3}^{2}+\frac{1}{3}z_{1}^{2}z_{4}+\frac{25}{6}z_{2}z_{4}\\\ \frac{214}{2025}z_{1}^{4}z_{3}+\frac{52}{81}z_{1}^{2}z_{2}z_{3}+\frac{625}{324}z_{2}^{2}z_{3}+\frac{56}{25}z_{1}z_{3}^{2}-\frac{26}{45}z_{1}^{3}z_{4}+\frac{95}{18}z_{1}z_{2}z_{4}+\frac{62}{15}z_{3}z_{4}+\frac{1}{z_{3}}\frac{z_{1}^{2}z_{4}^{2}}{z_{3}}+\frac{25}{12}\frac{z_{2}z_{4}^{2}}{z_{3}}\end{pmatrix}$ Therefore, on $\mathcal{O}(\rho_{new})$, we get the regular QFPM formed by $\Omega_{2}(z)$ and ${\Omega}_{1}(z)=\mathfrak{L}_{e}{\Omega_{2}}$ where $e=\sqrt{z_{3}}\partial_{z_{4}}$. Of course, the resulted Frobenius manifold is of type $A_{4}$. ###### Remark 3.14. It is straightforward to generalized the results of this section to other types of Coxeter groups and we obtain Frobenius manifolds on $\mathcal{O}(\rho_{new})$. But we lack sorting when $\rho_{new}$ is not a reflections group (i.e. see proposition 3.8). Robert Howett informed us that when ${\mathcal{W}}$ is of type $E_{8}$, the representation $\rho_{new}$ is generated by reflections. ## 4 Dihedral and dicyclic groups ### 4.1 Dihedral groups In this section we apply Dubrovin’s method to irreducible representations of the dihedral groups (Coxeter groups of type) $I_{2}(m)$, $m>2$. Irreducible representations of $I_{2}(m)$ are of rank 1 or 2. Let $\xi_{m}$ be a primitive $m$-th root of unity. The rank 2 representations are $\rho_{k}$, $k=1,2,\ldots,\frac{m-2}{2}$ for even $m$, and $k=1,2,\ldots,\frac{m-1}{2}$ for odd $m$. Here, $\rho_{k}$ is generated by the matrices $\ \begin{pmatrix}\xi_{m}^{k}&0\\\ 0&\xi_{m}^{-k}\end{pmatrix},~{}\begin{pmatrix}0&1\\\ 1&0\end{pmatrix}.$ (4.1) When $k=1$, we get the standard reflection representation of $I_{2}(m)$. It is straightforward to show that $\mathbb{C}[\rho_{k}]$ is the same as the invariant ring of the standard reflection representation of $I_{2}(h)$, $h=\frac{m}{\gcd(m,k)}$. Hence, applying Dubrovin’s method, we get the polynomial Frobenius manifold of type $I_{2}(h)$ and its dual $\widetilde{I}_{2}(h)$. More precisely, fix the generators of $\mathbb{C}[\rho_{k}]$ to be $t_{1}=\frac{1}{h}x_{1}x_{2},\ t_{2}=x_{1}^{h}+x_{2}^{h};$ we get Frobenius structures with the following data Notations | $\mathbb{F}(t_{1},t_{2})$ | $d_{1},d_{2}$ | d ---|---|---|--- $I_{2}(h)$ | $\frac{1}{2}t_{1}t_{2}^{2}+\frac{h^{1+h}}{h^{2}-1}t_{1}^{1+h}$ | $\frac{2}{h},1$ | $\frac{h-2}{h}$ $\widetilde{I}_{2}(h)$ | $\frac{1}{2}t_{1}t_{2}^{2}+\frac{(-1)^{-h}h^{1+h}}{h^{2}-1}t_{1}^{1-h}$ | $-\frac{2}{h},1$ | $\frac{h+2}{2}$ Table 4: Frobenius manifolds on orbit space of $\rho_{k}$. ### 4.2 Dicyclic groups In this section we give results of applying Dubrovin’s method to all irreducible representation of dicyclic groups. We get a Frobenius structure with rational degrees. We fix a natural number $m$. The dicyclic group $\mathrm{Dic}_{m}$ is a group of order $4m$ defined by $\mathrm{Dic}_{m}=\langle\sigma,\alpha|\sigma^{2m}=1,\alpha^{2}=\sigma^{m},\alpha^{-1}\sigma\alpha=\sigma^{-1}\rangle.$ (4.2) The irreducible representation of $\mathrm{Dic}_{m}$ are of rank 1 or 2. The 2-dimensional irreducible representations are $\psi_{k}(\sigma)=\left(\begin{array}[]{cc}\xi_{2m}^{k}&0\\\ 0&\xi_{2m}^{-k}\end{array}\right),~{}\psi_{k}(\alpha)=\left(\begin{array}[]{cc}0&1\\\ -1&0\end{array}\right),$ (4.3) and $\varrho_{l}(\sigma)=\left(\begin{array}[]{cc}\xi_{m}^{k}&0\\\ 0&\xi_{m}^{-k}\end{array}\right),~{}\varrho_{l}(\alpha)=\left(\begin{array}[]{cc}0&1\\\ 1&0\end{array}\right).$ (4.4) Where $1\leq k\leq\frac{m-2}{2}$ and $1\leq l\leq m-1$ when $m$ is even while $1\leq k\leq\frac{m-1}{2}$ and $1\leq l\leq m-2$ when $m$ is odd. Then $\psi_{1}$ is the standard representation of $\mathrm{Dic}_{m}$. The invariant ring $\mathbb{C}[\varrho_{l}]$ is the same as $\mathbb{C}[\rho_{l}]$ where $\rho_{l}$ is the representation of $I_{2}(m)$ in section 4.1. Thus, the result of applying Dubrovin’s method to $\varrho_{l}$ is given in that section. We consider here the representations $\psi_{k}$. Let us fix the integer $k$ and set $h={m\over\gcd(m,k)}$. We define $u_{1}=x_{1}^{2}x_{2}^{2},~{}u_{2}=x_{1}^{2h}+x_{2}^{2h},~{}u_{3}=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h}).$ (4.5) It is straightforward to verify that $u_{1}$, $u_{2}$ and $u_{3}$ are invariants under the action of $\psi_{k}$. ###### Proposition 4.1. The invariant ring $\mathbb{C}[\psi_{k}]$ is generated by $u_{1},u_{2}$ and $u_{3}$. ###### Proof. A general homogeneous polynomial of degree $q$ have the form $f(x_{1},x_{2})=a_{q}x_{1}^{q}+a_{q-1}x_{1}^{q-1}x_{2}+\cdots+a_{1}x_{1}x_{2}^{q-1}+a_{0}x_{2}^{q}$ (4.6) where $a_{0},\cdots,a_{q}\in\mathbb{C}$. Being invariant under $\psi_{k}(\alpha)$, we get $\displaystyle f$ $\displaystyle=a_{q}x_{1}^{q}+a_{q-1}x_{1}^{q-1}x_{2}+\cdots+a_{1}x_{1}x_{2}^{q-1}+a_{0}x_{2}^{q}$ $\displaystyle=\psi_{k}(\alpha)f$ $\displaystyle=(-1)^{q}a_{q}x_{2}^{q}+(-1)^{q-1}a_{q-1}x_{2}^{q-1}x_{1}+\cdots- a_{1}x_{2}x_{1}^{q-1}+a_{0}x_{1}^{q}$ Thus $a_{i}=(-1)^{q-i}a_{q-i}$ for all $i=0,\cdots,q$. Similarly, the invariants of $f$ under $\psi_{k}(\alpha^{2})$ implies $q$ is even. Hence, $f$ has the form $\displaystyle f$ $\displaystyle=\sum_{i=0}^{\frac{q}{2}}a_{q-i}(x_{1}x_{2})^{i}[x_{1}^{q-2i}+(-1)^{q-i}x_{2}^{q-2i}].$ Moreover, $\displaystyle f$ $\displaystyle=\psi_{k}(\sigma)f=\sum_{i=0}^{\frac{q}{2}}a_{q-i}(x_{1}x_{2})^{i}[\xi^{-k(q-2i)}x_{1}^{q-2i}+(-1)^{q-i}\xi^{k(q-2i)}x_{2}^{q-2i}]$ implies $k(q-2i)=0\mod(2m)$. Then $q-2i=2hl$ for some integer $l$. Therefore, we can write $f=\sum_{q=2hl+2i}a_{q-i}(x_{1}x_{2})^{i}[x_{1}^{2hl}+(-1)^{q-i}x_{2}^{2hl}].$ (4.7) Now we show that $f\in\mathbb{C}[u_{1},u_{2},u_{3}]$. Taking $i$ even or odd, it is sufficient to prove $\widetilde{f}_{l}=x_{1}^{2hl}+x_{2}^{2hl}$ and $\widehat{f}_{l}=x_{1}x_{2}(x_{1}^{2hl}-x_{2}^{2hl})$ are invariant for every natural number $l$. When $l=1$, $\widetilde{f}_{l}=u_{2}$ and $\widehat{f}_{l}=u_{3}$. For $l+1$, we get $\displaystyle\widetilde{f}_{l+1}$ $\displaystyle=x_{1}^{2h(l+1)}+x_{2}^{2h(l+1)}=(x_{1}^{2h}+x_{2}^{2h})^{l+1}-\displaystyle{\sum_{d=1}^{l}}\left({}^{l+1}_{\ \ d}\right)x_{1}^{2hd}x_{2}^{(l+1-d)2h}$ (4.8) $\displaystyle=(x_{1}^{2h}+x_{2}^{2h})^{l+1}-\displaystyle{\sum_{d=1}^{\lfloor\frac{l}{2}\rfloor}}\left({}^{l+1}_{\ \ d}\right)(x_{1}x_{2})^{2hd}(x_{2}^{2h(l+1-2d)}+x_{1}^{2h(l+1-2d)}).$ Since $d\geq 1$, we have $l+1-2d\leq l-1<l$. Therefore, by the induction $\widetilde{f}_{l+1}\in\mathbb{C}[u_{1},u_{2},u_{3}]$. Likewise $\widehat{f}_{l+1}\in\mathbb{C}[u_{1},u_{2},u_{3}]$ since $\displaystyle\widehat{f}_{l+1}$ $\displaystyle=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h})(x_{1}^{2hl}+x_{1}^{2h(l-1)}x_{2}^{2h}+x_{1}^{2h(l-2)}x_{2}^{4h}+\ldots+x_{2}^{2hl})$ (4.9) $\displaystyle=x_{1}x_{2}(x_{1}^{2h}-x_{2}^{2h})[(x_{1}^{2hl}+x_{2}^{2hl})+(x_{1}x_{2})^{2h}(x_{1}^{2h(l-2)}+x_{2}^{2h(l-2)})+(x_{1}x_{2})^{4h}(x_{1}^{2h(l-4)}+x_{2}^{2h(l-4)})+\ldots].$ This proves the proposition. ∎ We note that the invariant ring $\mathbb{C}[\psi_{k}]$ is the same as the invariant ring of the standard representation of $\mathrm{Dic}_{h}$. A result of applying Dubrovin’s method is obtained in [2]. We summarize the construction here. The inverse of the Hessian of $u_{1}$ define a flat contravariant metric $\Omega_{2}(u)=\left(\begin{array}[]{cc}\frac{4}{3}u_{1}&\frac{2h}{3}u_{2}\\\ \frac{2h}{3}u_{2}&-\frac{2h^{2}}{3u_{1}}(u_{2}^{2}-6u_{1}^{h})\end{array}\right)$ (4.10) Then it turns out that for any vector field in the form $e=f(u_{1})\partial_{u_{2}}$ the Lie derivative $\Omega_{1}^{ij}(u):=\mathfrak{L}_{e}\Omega^{ij}_{2}(u)$ is flat. Here $\Omega_{1}(u)=\left(\begin{array}[]{cc}0&\frac{2}{3}\left(hf-2u_{1}f^{\prime}\right)\\\ \frac{2}{3}\left(hf-2u_{1}f^{\prime}\right)&-\frac{4}{3u_{1}}\left(h^{2}u_{2}f+ht_{1}u_{2}f^{\prime}\right)\end{array}\right)$ (4.11) The choice of $e$ was inspired by example 3.13. The two metrics $\Omega_{2}$ and $\Omega_{1}$ form a flat pencil of metrics. However, to be quasihomogenous, we must have $\mathfrak{L}_{e}\Omega^{ij}_{1}(u)=0$ which leads to the following differential equation $2hu_{1}ff^{\prime}-2u_{1}^{2}(f^{\prime})^{2}+h^{2}f^{2}=0$ (4.12) which has two independent solutions $f_{\pm}=u_{1}^{\frac{h}{2}\left(1\pm\sqrt{3}\right)}.$ (4.13) Let us take $e=f_{+}\partial_{u_{2}}=u_{1}^{\frac{h}{2}\left(1+\sqrt{3}\right)}\partial_{u_{2}}$. In this case, $\Omega_{1}(u)=\left(\begin{array}[]{cc}0&-\frac{2h}{\sqrt{3}}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h}\\\ -\frac{2h}{\sqrt{3}}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h}&-\frac{2}{3}\left(3+\sqrt{3}\right)h^{2}u_{1}^{\frac{1}{2}\left(1+\sqrt{3}\right)h-1}u_{2}\end{array}\right)$ (4.14) The two metrics $\Omega_{2}$ and $\Omega_{1}$ form a regular QFPM with charge $d=\frac{2+\sqrt{3}h}{\sqrt{3}h}.$ Then $\tau=-{\sqrt{3}\over 2h}u_{1}$ and the Euler vector field $E=-\frac{2}{\sqrt{3}h}u_{1}\partial_{u_{1}}-\frac{1}{\sqrt{3}}u_{2}\partial_{u_{2}}.$ (4.15) The flat coordinates of $\Omega_{1}$ reads $t_{1}=-\frac{\sqrt{3}}{2h}u_{1},~{}~{}t_{2}=u_{2}u_{1}^{-\frac{1}{2}\left(1+\sqrt{3}\right)h}.$ (4.16) The degrees of this Frobenius manifold are $-\frac{2}{\sqrt{3}n}$ and 1. We denote the type of this manifold by $\widetilde{Dic}_{m}$. It has the potential ${\mathbb{F}}=\frac{2^{-\sqrt{3}h}3^{\frac{1}{2}\left(\sqrt{3}h+1\right)}\left(-ht_{1}\right){}^{1-\sqrt{3}h}}{3h^{2}-1}+\frac{1}{2}t_{1}t_{2}^{2}.$ (4.17) Using theorem 2.6, the dual of $\widetilde{Dic}_{m}$ exists and we refer to it by ${Dic}_{m}$. It can be obtained equivalently by fixing $e=f_{-}\partial_{u^{2}}=u_{1}^{\frac{j}{2}\left(1-\sqrt{3}\right)}\partial_{u_{2}}$ in the computations above. It has the charge $d=\frac{2-\sqrt{3}h}{\sqrt{3}h}$, the degrees $\frac{2}{\sqrt{3}n},\,1$ and the potential $\mathbb{F}=\frac{2^{\sqrt{3}h}3^{\frac{1}{2}-\frac{\sqrt{3}h}{2}}\left(ht_{1}\right){}^{\sqrt{3}h+1}}{3h^{2}-1}+\frac{1}{2}t_{1}t_{2}^{2}.$ (4.18) We observe that Dubrovin computed by ad hoc procedure all possible potentials of 2-dimensional Frobenius manifolds [5]. The potentials found in this article are equivalent to Frobenius manifolds of charge $d$ having the potential $\mathbb{F}(z_{1},z_{2})=z_{1}^{k}+\frac{1}{2}z_{2}^{2}z_{1},~{}k={3-d\over 1-d}$ (4.19) However, finding them by using Dubrovin’s method on invariant rings is an interesting result. ### 4.3 Finite subgroups of $SL_{2}(\mathbb{C})$ In this section we use Dubrovin’s method on finite non trivial subgroups of $SL_{2}(\mathbb{C})$. They are classified up to conjugation and they are called binary polyhedral groups. They consist of the cyclic groups $\mathcal{C}_{m}$ and binary dihedral groups $\mathcal{D}_{m}$, binary tetrahedral group $\mathcal{T}$, binary octahedral group $\mathcal{O}$ and binary icosahedral group $\mathcal{I}$. We treat them as representations of the corresponding groups. It is known that the invariant rings of these representations are not polynomial rings and the relations between the generators lead to the classification of simple hypersurface singularities. We use the sets of generators of the invariant rings listed in [15]. Applying Dubrovin’s method, we obtain polynomial Frobenius manifolds. We know from section 3.1 that all of them has a dual rational Frobenius manifold. Thus, we write below only the flat coordinates and the type of the resulting Frobenius structure. Note that the results are not apparent by just examining the invariant rings. 1. 1. Cyclic groups $\mathcal{C}_{m}$: Here $m\geq 2$ and the invarinat ring is generated by $xy,~{}x^{m},~{}y^{m}$. We fix the following invariant polynomials $t_{1}=\frac{1}{m}xy,\ t_{2}=x^{m}+y^{m}$ Then the ring generated by $t_{1}$ and $t_{2}$ is isomorphic to the invariant ring of the standard representation of the dihedral group $I_{2}(m)$. Thus, using Dubrovin’s method and $(t_{1},t_{2})$ as coordinates on the orbits space, we get Frobenius manifold of type $I_{2}(m)$ and its dual. For the case of $t_{1}=\frac{1}{m}xy$ and $t_{2}=x^{m}$ then the Frobenius structure takes $\frac{1}{2}t_{1}t_{2}^{2}$ of charge $\frac{m-2}{m}$ and degrees $\frac{2}{m},1$. While by the change of coordinates $s_{1}=-t_{1},\ s_{2}=t_{2}t_{1}^{-w}$ the dual structure takes the form $\frac{1}{2}s_{1}s_{2}^{2}$. 2. 2. The binary dihedral group $\mathcal{D}_{m}$: This is the standard representation of the dicyclic group $\mathrm{Dic}_{m}$. A result of applying Dubrovin’s method is given in section 4.2. 3. 3. The binary tetrahedral $\mathcal{T}$: We fix the following set of generators of the invariant ring $t_{1}={5\over 12}xy\left(x^{4}-y^{4}\right),\ \ t_{2}=\left(x^{4}+y^{4}\right)^{3}-36x^{4}y^{4}\left(x^{4}+y^{4}\right),\ \ t_{3}=16x^{4}y^{4}+2\left(x^{4}-y^{4}\right).$ (4.20) We choose $(t_{1},t_{2})$ as coordinates on the orbits space. Then the Hessian of ${12\over 5}t_{1}$ defines a flat metric $\Omega_{2}(t)$ linear in $t_{2}$. Here, lemma 2.4 is applicable and we get a regular QFPM of charge $d=\frac{1}{2}$ with $\tau=t_{1}$ consists of $\Omega_{2}^{ij}(t)=\left(\begin{array}[]{cc}\frac{1}{2}t_{1}&t_{2}\\\ t_{2}&\frac{-4478976}{625}t_{1}^{3}\\\ \end{array}\right),\Omega_{1}^{ij}=\mathfrak{L}_{\partial_{t_{2}}}\Omega_{2}^{ij}(t)=\left(\begin{array}[]{cc}0&1\\\ 1&0\\\ \end{array}\right)$ (4.21) The resulting Frobenius manifold is of type $I_{2}(4)$. 4. 4. The binary octahedral $\mathcal{O}$: Let us fix the generators $t_{1}={7\over 12}(16x^{4}y^{4}+\left(x^{4}-y^{4}\right)^{2}),\ \ t_{2}=\left(xy\left(x^{4}-y^{4}\right)\right)^{2},\ \ t_{3}=yx^{17}-34y^{5}x^{13}+34y^{13}x^{5}-y^{17}x$ (4.22) In the coordinates $(t_{1},t_{2})$, the metric $\Omega_{2}(t)$ defined by the Hessian of ${12\over 7}t_{1}$ is linear in $t_{2}$ and leads to a regular QFPM with charge $\frac{1}{3}$. The resulting Frobenius manifold is of type $I_{2}(3)$. 5. 5. The binary icosahedral $\mathcal{I}$: We fix the generators of the invariant ring $\displaystyle t_{1}$ $\displaystyle={11\over 30}(x^{11}y+11x^{6}y^{6}-xy^{11}),\ \ t_{3}=x^{20}-228x^{15}y^{5}+494x^{10}y^{10}+228x^{5}y^{15}+y^{20}$ (4.23) $\displaystyle t_{2}$ $\displaystyle=x^{30}+522x^{25}y^{5}-10005x^{20}y^{10}-10005x^{10}y^{20}-522x^{5}y^{25}+y^{30}$ Fix $(t_{1},t_{2})$ as coordinates, the Hessian of ${30\over 11}t_{1}$ leads to a metric $\Omega_{2}(t)$ linear in $t_{2}$. The regular QFPM formed by $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{2}}\Omega_{2}$ leads to a Frobenius manifold of type $I_{2}(5)$. ## 5 Finite subgroups of $SL_{3}(\mathbb{C})$ Finite subgroups of $SL(3,\mathbb{C})$ are classified into the families $(\mathcal{A})$, $(\mathcal{B})$, …, $(\textbf{L})$ [24]. We treat them as representation of the corresponding groups. The fact that they are subset of $SL_{3}(2,\mathbb{C})$ means that they are not a reflection representation. Watanabe and Rotillon listed in [23] those subgroups where the invariant rings are complete intersections missing type $(\mathcal{J})$ and $(\mathcal{K})$. These missing groups were recognized by Yau and Yu [24]. In the end, there is a total of 29 types of finite subgroups of $SL_{3}(\mathbb{C})$ whose invariant rings are complete intersection and their sets of generators are known explicitly. We apply Dubrovin’s method to these groups and we summarize the result below. The set of generators is taken from [23] and we use the same numbering $(1)$, $(2)$, …, $(27)$ of the 27 subgroups listed there. Recall from the introduction that in order to apply Dubrovin’s method, we must find a minimal degree invariant polynomial where the Hessian defines a flat contravariant metric. (5.1) This condition excluded the following subgroups 1. 1. $(17)$ which are of type $(\mathcal{A})$. 2. 2. $(3)-(8)$, $(19)-(23)$ which are of type $(\mathcal{B})$. 3. 3. $(10)$, $(24)$ and $(25)$ which are of type $(\mathcal{C})$. 4. 4. $(13)$, $(15)$, $(16)$ and $(27)$ which are of types $(\mathcal{G})$, $(\textbf{L})$, $(\textbf{I})$ and $(\textbf{ E})$, respectively. 5. 5. The groups $(\mathcal{J})$ and $(\mathcal{K})$ which are not considered in [23]. Applying Dubrovin’s method to the remaining subgroups, we will find Frobenius structures of types $A_{3}$, $B_{3}$, $H_{3}$, $B_{3}^{1}$ (see example 3.6 ) and the trivial $T_{3}$ (see example 2.8). We know from section 3.1 that once an orbit space has Frobenius structure of type $A_{3}$, $B_{3}$ or $H_{3}$ then it also possesses the dual of that structure. Thus we will not mention explicitly the appearance of the dual structures $\widetilde{A}_{3}$, $\widetilde{B}_{3}$ and $\widetilde{H}_{3}$. In all cases below, we construct the regular QFPM using lemma 2.4. However, sometimes we fix a set of invariant polynomials different from the standard set of generators of the invariant ring. In each case, we will mention the type of the resulting Frobenius structure and its flat coordinates. 1. $(1)$ These groups are of type $(\mathcal{A})$ depending on an integer $m>1$. A minimal set of generators of the invariant rings consists of $x^{m},y^{m},z^{m},xyz$. The Hessian of $xyz$ does not define a flat metric. Hence, condition (5.1) exclude the case $m>3$. For $m=2$, we fix the invariant polynomials $u_{1}=x^{2}+y^{2}+z^{2},\ u_{2}=x^{2}y^{2}+z^{2}y^{2}+x^{2}z^{2},\ u_{3}=(xyz)^{2}.$ (5.2) Then $\\{u_{1},u_{2},u_{3}\\}$ can be identified with the set of generators of the invariant ring of the standard representations of Coxeter groups of type $B_{3}$. Thus, applying Dubrovin’s method, we get 5 Frobenius structures of the types listed in example 3.6. We also get the trivial Frobenius structure of type $T_{3}$ using the setting of the case (2) below. Thus we proved that the orbit spaces of this group has 6 different Frobenius structures. For $m=3$, we fix the invariant polynomials $u_{1}=x^{3}+y^{3}+z^{3},\ u_{2}=x^{3}y^{3}+y^{3}z^{3}+z^{3}x^{3},\ u_{3}=(xyz)^{3}.$ (5.3) The Hessian of $u_{1}$ defines a contravariant flat metric $\Omega_{2}$. This metric and its Christoffel symbols are almost linear in each variable $u_{i}$ and lemma 2.4 is applicable and we get three regular QFPM. Here, similar to the case $m=2$, we get 5 Frobenius manifold structures equivalence to the ones given in example 3.6. For QFPM formed by $\Omega_{2}$ and $\mathfrak{L}_{\partial_{u_{3}}}\Omega_{2}$, we get the type $B_{3}$. It has flat coordinates $t_{1}=\frac{2}{9}u_{1},\ t_{2}=-\frac{u_{1}^{2}-4u_{2}}{6\sqrt{2}},\ t_{3}=\frac{7u_{1}^{3}}{216}-\frac{1}{6}u_{2}u_{1}+u_{3}.$ (5.4) The FPM consists of $\Omega_{2}$ and $\mathfrak{L}_{\partial_{u_{2}}}\Omega_{2}$ leads to type $A_{3}$. It has flat coordinates $t_{1}={1\over 3}u_{1},\ t_{2}=u_{2}-{1\over 8}u_{1}^{2},\ t_{3}=\sqrt{u_{3}}.$ (5.5) While for the FPM formed by $\Omega_{2}$ and $\mathfrak{L}_{\partial_{u_{1}}}\Omega_{2}$, we get the type $B_{3}^{1}$. We can fix the flat coordinates $t_{1}=u_{1},\ t_{2}=u_{2}u_{3}^{-{1\over 4}},t_{3}={4\over 3}u_{3}^{1\over 4}.$ (5.6) 2. $(2)$ These are family of groups of type $(\mathcal{B})$ where $m\geq 1$. The polynomials $x^{2m}+y^{2m},\ (xy)^{2}$, $xyz\left(x^{2m}-y^{2m}\right)$ and $z^{2}$ form a minimal sets of generators for the invariant rings. However, because of condition (5.1), we need only to consider $m=1$. In this case, we fix the invariant polynomials $u_{1}=x^{2}+y^{2}+z^{2},u_{2}=z^{2},u_{3}=x^{2}y^{2}$ The metric $\Omega_{2}(u)$ defined by the Hessian of $u_{1}$ and its Christoffel symbols are linear in each variable $u_{i}$. However, lemma 2.4 is applicable only for $u_{2}$. The FPM consisting of $\Omega_{2}$ and $\Omega_{1}:=\mathfrak{L}_{\partial_{u_{2}}}\Omega_{2}$ is a regular quasihomogenous of charge 0 with $\tau=u_{1}$. We can fix the flat coordinates to be $t_{1}={1\over 2}u_{1},\ t_{2}=u_{2},\ t_{3}=u_{3}^{1\over 2}$ (5.7) which leads to a trivial Frobenius structure $T_{3}$. 3. $(9)$ These groups are of type $(\mathcal{C})$ with order $3m^{2}$ where $m>1$. Minimal sets of generators of the invariant rings consists of $xyz,x^{m}+y^{m}+z^{m},x^{m}y^{m}+x^{m}z^{m}+y^{m}z^{m}$, and $(x^{m}-y^{m})(z^{m}-x^{m})(y^{m}-z^{m})$. The argument of applying Dubrovin’s method is the same as of type $(1)$ above. 4. $(11)$ These groups are also of type $(\mathcal{C})$ where $m>1$. Minimal sets of generators of the invariant rings consists of $u_{1}=x^{m}+y^{m}+z^{m},\ u_{2}=x^{2}y^{2}z^{2},\ u_{3}=x^{m}y^{m}+y^{m}z^{m}+z^{m}x^{m}$ (5.8) and $u_{4}=xyz\left(x^{m}-y^{m}\right)\left(z^{m}-x^{m}\right)\left(y^{m}-z^{m}\right).$ (5.9) Since the Hessian $u_{2}$ does not define a flat metric, we consider only $2\leq m\leq 6$. The argument of applying Dubrovin’s method to the case $m=2$ is similar to (1). For $3\leq m\leq 6$, the contravariant metric $\Omega^{ij}_{2}$ defined by the Hessian of $u_{1}$ and its Christofel symbols are almost linear in $u_{1}$ and $u_{3}$ and we can apply lemma 2.4 to both variables. The FPM formed by $\Omega_{2}$ and $\Omega_{1}:=\mathfrak{L}_{\partial_{u_{3}}}\Omega_{2}$ is regular quasihomogeneous of degree $1\over 2$ with $\tau=u_{1}$. We can fix the flat coordinates $t_{1}={m-1\over 2m}u_{1},\ t_{2}=u_{2}^{m\over 4},\ t_{3}=u_{3}-{1\over 8}u_{1}^{2}.$ (5.10) The resulting Frobenius structure is polynomial of type $A_{3}$. Also, the FPM consists of $\Omega_{2}$ and $\Omega_{1}:=\mathfrak{L}_{\partial_{u_{1}}}\Omega_{2}$ is regular quasihomogeneous of degree $0$ with $\tau={m-1\over m}u_{1}$. We can fix the flat coordinates $t_{1}=u_{1},\ t_{2}=u_{2}^{m\over 8},\ t_{3}=u_{3}u_{2}^{-{m\over 8}}.$ (5.11) The results Frobenius structure is of type $B_{3}^{1}$. 5. $(12)$ This is a group of type $(\mathcal{F})$. A minimal set of generators of the invariant ring consists of $u_{1}=(x^{3}+y^{3}+z^{3})^{2}-12(x^{3}y^{3}+y^{3}z^{3}+z^{3}x^{3}),u_{2}=(x^{3}-y^{3})(y^{3}-z^{3})(z^{3}-x^{3}),$ (5.12) $u_{3}=(xyz)^{4}+216(xyz)^{3}(x^{3}+y^{3}+z^{3}),u_{4}=((x^{3}+y^{3}+z^{3})^{2}-18(xyz)^{2})^{2}.$ The FPM formed by $\Omega^{ij}_{2}$ and $\Omega^{ij}_{1}:=\mathfrak{L}_{\partial_{u_{3}}}\Omega^{ij}_{2}$ is regular quasihomogeneous of charge $d={1\over 2}$ with $\tau={5\over 12}u_{1}$. Flat coordinates are given by $t_{1}=\frac{5}{12}u_{1},\ t_{2}=10\sqrt{\frac{62}{41}}u_{2},\ t_{3}=u_{3}-\frac{847}{1312}u_{1}^{2}.$ (5.13) The resulting Frobenius structure is of type $A_{3}$. 6. $(14)$ This is a group of type $(\mathcal{H})$ and it has a minimal set of generators of the invariant ring consists of $u_{1}=x^{2}+yz,\ \ u_{2}=8yzx^{4}-2y^{2}z^{2}x^{2}-\left(y^{5}+z^{5}\right)x+y^{3}z^{3},$ $u_{3}=y^{10}+6z^{5}y^{5}+20x^{2}z^{4}y^{4}-160x^{4}z^{3}y^{3}+320x^{6}z^{2}y^{2}+z^{10}-4x\left(y^{5}+z^{5}\right)\left(32x^{4}-20yzx^{2}+5y^{2}z^{2}\right).$ The Hessian of $10u_{1}$ leads to a regular QFPM with $\Omega_{2}$ and $\Omega_{1}=\partial_{u_{3}}\Omega_{2}$ of charge $d={4\over 5}$ with $\tau={1\over 10}u_{1}$. By fixing the flat coordinates $t_{1}=\frac{1}{10}u_{1},\ t_{2}=\sqrt{2}u_{2}-\sqrt{2}u_{1}^{3},\ t_{3}=14u_{1}^{5}-20u_{2}u_{1}^{2}+u_{3},$ we arrive to a polynomial Frobenius structure of type $H_{3}$. 7. $(18)$ A family of representation of type $(\mathcal{B})$ of order $8pq^{2}$ where $p\geq 1$ and $q\geq 2$. The minimal set of generators of the invariant rings consists of $(x^{2pq}+y^{2pq}),(xy)^{2q},(xyz)^{2},(x^{2pq}-y^{2pq})xyz,z^{2q}$. The Hessian of $(xyz)^{2}$ does not define a flat metric. Hence, because of condition (5.1), we consider only two cases when $q=2$ or $q=3$ with $p=1$. In both cases we get 3 types of Frobenius structures as follows. First Frobenius structure is obtained by the regular QFPM formed by $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{2}}\Omega_{2}$ of charge $d=0$ with $\tau=t_{1}$. The flat coordinates are $t_{1}=\frac{2q-1}{2q}(x^{2q}+y^{2q}+z^{2q}),\ t_{2}=\frac{1}{2}z^{2q},\ t_{3}=(xy)^{q}.$ (5.14) The resulting Frobenius manifold is a trivial of type $T_{3}$. Other Frobenius structures are obtained by fixing the invariants $u_{1}=x^{2q}+y^{2q}+z^{2q},\ u_{2}=(xyz)^{2},\ u_{3}=-2x^{2q}y^{2q}-2x^{2q}z^{2q}-2y^{2q}z^{2q}.$ (5.15) We get regular QFPM with $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{1}}\Omega_{2}$ of charge 0 with $\tau=\frac{2q-1}{2q}u_{1}$. We choose the flat coordinates $t_{1}=\frac{2q-1}{2q}u_{1},\ t_{2}=u_{2}^{\frac{q}{4}},\ t_{3}=u_{3}u_{2}^{\frac{-q}{4}}$ (5.16) The resulting structure is of type $B_{3}^{1}$. Finally, we have regular QFPM with $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{3}}\Omega_{2}$ of charge $\frac{1}{2}$ with $\tau=\frac{2q-1}{4q}u_{1}$, we get type $A_{3}$ of the flat coordinates $t_{1}=\frac{2q-1}{4q}u_{1},\ t_{2}=\frac{2\sqrt{2q-1}}{\sqrt{q}}u_{2}^{\frac{q}{2}},\ t_{3}=u_{3}+\frac{1}{4}u_{1}^{2}.$ (5.17) 8. $(26)$ These are groups of type $(\mathcal{C})$ of order $9m^{2}$ for even $m\geq 2$. The set of minimal generators of invariant ring has $x^{3m}+y^{3m}+z^{3m},(xyz)^{2},x^{2m}y^{m}+x^{m}y^{2m}+y^{2m}z^{m}+y^{m}z^{2m}+z^{2m}x^{m}+z^{m}x^{2m},$ $xyz(x^{m}-y^{m})(y^{m}-z^{m})(z^{m}-x^{m}),(x^{m}-y^{m})^{2}(y^{m}-z^{m})^{2}(z^{m}-x^{m})^{2}.$ The only possible case for condition (5.1) is when $m=2$. We choose the flat coordinates $t_{1}=\frac{5}{12}(x^{6}+y^{6}+z^{6}),\ t_{2}=\sqrt{\frac{20}{3}}(xyz)^{3},\ t_{3}=x^{12}+y^{12}+z^{12}-\frac{3}{4}(x^{6}+y^{6}+z^{6})^{2}.$ Hence the Hessian of ${12\over 5}t_{1}$ leads to a regular QFPM with $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{3}}\Omega_{2}$ of charge $d={1\over 2}$ with $\tau=t_{1}$. Then the Frobenius structure is of type $A_{3}$. On the other hand, the Hessian of ${5\over 6}t_{1}$ leads to a regular QFPM formed by $\Omega_{2}$ and $\Omega_{1}=\partial_{t_{1}}\Omega_{2}$ of degree 0 with $\tau=t_{1}$. We fix the flat coordinates $t_{1}=\frac{5}{6}(x^{6}+y^{6}+z^{6}),\ t_{2}=(xyz)^{\frac{3}{2}},\ t_{3}=\frac{-5}{6}(xyz)^{\frac{-1}{2}}\left(x^{12}+y^{12}+z^{12}-\frac{3}{4}(x^{6}+y^{6}+z^{6})^{2}\right).$ (5.18) The resulting Frobenius structure is of type $B_{3}^{1}$. ## 6 Conclusions In this article, we consider invariants rings (not only polynomial ones) of finite linear representations as a source for Frobenius manifolds. The construction at the moment depends on explicit knowledge of the sets of generators. Then, it will be important to classify or characterize those finite groups representations when the Hessian of a minimal degree invariant polynomial defines a flat contravariant metric. Recall that this condition is satisfied for real representations but not for complex reflection representations which are not Shephard groups [18]. ## Acknowledge The authors thank Robert Howett, Hans-Christian Herbig and Christopher Seaton for useful discussions. They very much appreciate the Magma program’s support team for their helpful cooperation. This work was funded by the internal grant of Sultan Qaboos University (IG/SCI/DOMS/19/08). ## References * [1] Al-Maamari, Z.; Dinar, Y., Inversion symmetry on Frobenius manifolds, arXiv:2106.08000 (2021). * [2] Al-Maamari Z.; Dinar, Y., Dicyclic groups and Frobenius manifolds, SQU Journal for Science, 25(2), 107-111, (2020). * [3] Derksen, H.; Kemper, G., Computational invariant theory, Springer, (2015). * [4] Dubrovin, B., Differential geometry of the space of orbits of a Coxeter group, Surveys in differential geometry IV: integrable systems, 181–211, (1998). * [5] Dubrovin, B., Geometry of $2$D topological field theories, Integrable systems and quantum groups (Montecatini Terme, 1993), 120–348, Lecture Notes in Math., 1620, Springer, Berlin, (1996). * [6] Dubrovin B., Flat pencils of metrics and Frobenius manifolds, Integrable systems and algebraic geometry (Kobe/Kyoto, 1997), 47–72, World Sci. Publ., River Edge, NJ, (1998). * [7] Dubrovin B.; Zhang, Y., Extended affine Weyl groups and Frobenius manifolds, Compositio Math. 111, no. 2, 167–219 (1998). * [8] Dubrovin, B., On almost duality for Frobenius manifolds, Geometry, topology and mathematical physics, 75–132. Am. Math. Soc. Transl. Ser. 2, 212 (2004). * [9] Fordy, A. P.; Mokhov, O. I., ON a special class of compatible Poisson structures of hydrodynamic type, Physica D 152-153 475-490 (2001). * [10] Dubrovin, B.; Strachan, I. A. B.; Zhang, Y.; Zuo, D., Extended affine Weyl groups of BCD-type: their Frobenius manifolds and Landau-Ginzburg superpotentials, Adv. Math. 351, 897–946 (2019). * [11] Fulton, W.; Harris, J., Representation theory: A first course, V(129). Springer Science and Business Media, (2013). * [12] Howett, Robert; in personal communications. * [13] Hertling, C., Frobenius manifolds and moduli spaces for singularities, Cambridge Tracts in Mathematics, V(151), Cambridge University Press, (2002). * [14] Humphreys, J. E., Reflection groups and Coxeter groups, V(29), Cambridge University Press, (1990). * [15] Leuschke, G. J.; Wiegand, R, Cohen-Macaulay representations,Mathematical Surveys and Monographs, 181. American Mathematical Society, ISBN: 978-0-8218-7581-0 (2012). * [16] Mokhov, O. I., Compatible Dubrovin-Novikov Hamiltonian operators, the Lie derivative, and integrable systems of hydrodynamic type. (Russian) Teoret. Mat. Fiz. 133, no. 2, 279–288; translation in Theoret. and Math. Phys. 133 , no. 2, 1557–1564 (2002). * [17] Neusel, M., Invariant Theory, American Mathematical Society, Student Mathematical Library (Book 36), ISBN: 978-0821841327 (2006). * [18] Orlik, P.; Solomon, L., The Hessian map in the invariant theory of reflection groups, Nagoya Math. J. 109 , 1–21 (1988). * [19] Saito, K., On a linear structure of the quotient variety by a finite reflexion group. Publ. Res. Inst. Math. Sci. 29 , no. 4, 535–579 (1993). * [20] Saito, K.; Yano, T.; Sekeguchi, J., On a certain generator system of the ring of invariants of a finite reflection group, Comm. in Algebra 8(4) (1980). * [21] Sergyeyev, A. A simple way of making a Hamiltonian system into a bi-Hamiltonian one, Acta Applicandae Mathematica, 83(1), 183-197,2004. * [22] Steinberg, B., Representation Theory of Finite Groups An Introductory Approach, Springer Science$+$Business Media, (2012). * [23] Watanabe, K. I.; Rotillon, D., Invariant subrings of $\mathbb{C}[X,Y,Z]$ which are complete intersections, manuscripta mathematica, 39(2), 339-357, (1982). * [24] Yau, S. T.; Yau, S. S. T.; Yu, Y, Gorenstein quotient singularities in dimension three, (Vol. 505), American Mathematical Soc, (1993). * [25] Zuo, D., Frobenius Manifolds Associated to $B_{l}$ and $D_{l}$, Revisited, International Mathematics Research Notices, Vol. (2007). * [26] Zuo, D., Frobenius manifolds and a new class of extended affine Weyl groups $\widetilde{W}^{(k,k+1)}(A_{l})$, 2000 Mathematics Subject Classification, (2019). Yassir Dinar [email protected] Zainab Al-Maamari [email protected] Depatment of Mathematics College of Science Sultan Qaboos University Muscat, Oman
arxiv-papers
2021-07-27T02:25:44
2024-09-04T03:07:20.401377
{ "license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/", "authors": "Zainab Al-Maamari, Yassir Dinar", "submitter": "Yassir Dinar I", "url": "https://arxiv.org/abs/2107.12557" }
2107.12566
# Thunder CTF: Learning Cloud Security on a Dime Nicholas Springer Portland State University [email protected] Wu-chang Feng Portland State University [email protected] ###### Abstract Organizations have rapidly shifted infrastructure and applications over to public cloud computing services such as AWS (Amazon Web Services), Google Cloud Platform, and Azure. Unfortunately, such services have security models that are substantially different and more complex than traditional enterprise security models. As a result, misconfiguration errors in cloud deployments have led to dozens of well-publicized breaches. This paper describes Thunder CTF, a scaffolded, scenario-based CTF (Capture-the-Flag) for helping students learn about and practice cloud security skills. Thunder CTF is easily deployed at minimal cost and is highly extensible to allow for crowd-sourced development of new levels as security issues evolve in the cloud. ###### Index Terms: Cloud Security, Security Education, Capture-the-Flag ## I Introduction An overwhelming percentage of companies are leveraging public cloud services for their computing infrastructure, finding its economies of scale hard to pass up [1]. As companies move infrastructure and applications to public cloud platforms such as AWS, Google Cloud Platform, and Azure, it is becoming increasingly important for practitioners to be aware of security issues that may lead to compromise. More than 2/3 of all enterprises list security as the most significant concern for moving to the cloud [2]. Such concern is not unfounded, as the cloud presents its users with a new set of operational security configurations that can be difficult to comprehend and set up properly. As a result, breaches ranging from the discovery of unprotected cloud resources such as storage buckets [3] and search indexes [4], to more sophisticated application compromises [5] have led to the exposure of millions of financial and voter records. The shift to the cloud has added significant complexity to the practice of security. While legacy infrastructure must deal with machines, operating systems, routers, firewalls, software patching of vendor-supported software, as well as username and password management, cloud infrastructure must handle all of those issues potentially, while also dealing with role-based access control, zero-trust networks, API security, account access keys, authentication tokens, and federated identity providers. Additionally, cloud infrastructure security is moving increasingly into the hands of software development teams as well as a vast open-source software supply chain that no one in particular is in charge of, making things even more difficult to secure. Learning cloud security can be a daunting task with the broad range of topics to learn and skills to practice. One popular way is through Capture-the-Flag (CTF) exercises, which challenge players to find security flaws and execute exploits on intentionally vulnerable systems. CTF exercises have been successfully used as both a vehicle for experienced practitioners to sharpen their skills and for beginners to develop them. Unfortunately, with cloud security in a formative state, there are few CTFs that focus on providing guidance for beginners to learn about cloud security. Additionally, existing CTFs focus exclusively on securing AWS deployments [6, 7, 8, 9]. To address this, this paper describes Thunder CTF, a CTF and framework for helping both experienced and novice practitioners learn about securing projects on Google Cloud Platform [10]. Section II describes the overall design of the CTF including its initial levels and its framework for supporting extensibility. Section III describes the results of an initial deployment in an advanced elective course in our program. Finally, Section IV concludes and describes future work. ## II Curriculum and CTF Thunder CTF is designed with several overall goals. These goals include 1) modeling exercises on actual compromises and commonly found problems in existing cloud deployments, 2) scaffolding exercises to support differentiated instruction for the benefit of both novices and experienced practitioners, 3) creating an extensible framework that allows developers to add, remove, and customize levels based on current vectors of exploitation, and 4) making the CTF easily deployable to minimize the friction of setting it up and the cost to run it. ### II-A Scenario-based Rather than focusing on a single concept or skill, Thunder CTF levels are scenario-based and tied to actual compromises in order to better motivate the skills being practiced and to provide students a more engaging, realistic roleplaying experience. Scenarios are explicitly tied back to the real breaches that inspired them via a write-up at the end of each individual level, and scenarios often mirror the tactics and techniques enumerated in MITRE’s ATTACK matrix [11]: a framework for classifying typical adversarial behavior (e.g. initial access, persistence, privilege escalation, defence evasion, credential access, discovery, collection, exfiltration, and impact). This allows students to see a bit of the “forest” in which adversaries operate, rather than only looking at the ”trees” of individual exploits. Thunder CTF levels chain together multiple techniques and concepts in order to achieve an overall operational goal. Currently, the CTF consists of an initial set of 6 levels that cover important concepts in cloud security, such as open storage buckets, overprovisioned permissions, exfiltration of sensitive information via log files, security keys in source repositories, unsanitized error messages, access token compromise, backdoors via metadata, misconfigured IAM (Identity and Access Management) policies, IAM privilege escalation, exposed container images, and metadata credential compromise via server-side request forgery. Table I displays the 6 different scenarios currently implemented in Thunder CTF. As the table shows, scenarios chain together security vulnerabilities in order to show students how they would function in a context of compromising a project. Fig. 1 shows a screenshot of a student solving a6container, a level that recreates a series of steps similar to those used in the Capital One breach [5]. As the figure shows, a vulnerable proxy service is found that the student can use to access the internal metadata service. The service exposes a session token that can be activated by the student to access storage buckets that the proxy has access to. Within one of these buckets, a file containing credit card information is then found. Figure 1: Capital One breach level ### II-B Scaffolded CTF levels often target a particular level of expertise. Unfortunately, students that find the levels too easy can become bored and stop playing, while those that find the levels too difficult can become frustrated and stop playing. To overcome this, Thunder CTF is designed to support differentiated instruction across users with disparate abilities. It features scaffolded levels with incrementally increasing difficulties as well as an extensive hint system. The hint system allows novices to make consistent progress through the CTF, while affording experienced players a challenging experience when the hints are ignored and the levels are completed in an open-ended manner. Such a setup also allows a student to revisit the CTF and replay its levels with less support from hints to solidify their skill level. Fig. 2 shows an example of a hint that is available for students to use on a particular level when they are stuck. Thunder CTF hints are sequentially accessed by users to guide them towards level completion. As the figure shows, explanations within the hints teach not only the concepts required to perform the next step, but also the syntax of the commands, and code required to run them. Figure 2: Hint system in Thunder CTF ### II-C Extensible and Modular Security issues are constantly evolving. Where vulnerabilities such as Unvalidated Redirects and Forwards and Cross-Site Request Forgery were in the OWASP Top 10 in 2013, they are now nowhere to be found. Similarly, while access token compromise via Metadata exploitation (an exploit used in level 6) may be possible now, by the time this paper is published, the addition of a required, custom HTTP request header may completely remove it as a vector of future compromise [12, 13]. As a result of the rapidly changing landscape of security issues, Thunder CTF has been designed to be highly configurable and extensible, allowing levels to be quickly added and removed. Thunder CTF levels are modular and follow a specific structure, which reduces the process of creating new levels to simply filling in a template. Each level module contains as few as three files, which are displayed in Fig. 3. These files include a deployment configuration that specifies the cloud resources needed for the level, a deployment script that encodes the logic for deploying and configuring infrastructure, and a hint list file containing the HTML content of each hint. A level development guide, which explains the process of writing each file of a level module, as well as a template level module, are provided for level creators in the Thunder CTF repository [14]. Initial infrastructure deployment is done using Deployment Manager, GCP’s infrastructure-as-code solution. The level creator provides a YAML deployment configuration that specifies the infrastructure required by the level, which the deployment script passes to the framework’s deployment interface. The deployment interface renders the configuration using a template engine, allowing level creators to customize configurations at runtime. Then, the deployment interface uses the Google Cloud Deployment Manager API to launch the level infrastructure. By abstracting away the specifics of dealing with the Deployment Manager API, the deployment interface allows level creators to focus on actual level-specific configurations. An outline of a possible deployment configuration is shown in the first column of Fig. 3. Figure 3: Outline of example level module TABLE I: Thunder CTF level scenarios Scenario | Walkthrough description ---|--- a1openbucket | • List all storage buckets for a project using the command-line interface. • Copy a secret file stored within a bucket left open a2finance | • Activate a service account credential. • List permissions associated with a credential. • Download the contents of an accessible bucket. • Navigate a git repository that previously contained a sensitive ssh key. • Checkout repository version containing the initial commit of the key. • List project’s VM instances to find one containing an ssh key in its Metadata. • ssh into the instance and use its role to access the project’s logging service. • Find credit-card numbers in log entries that have not been properly sanitized a3password | • List all of the serverless functions for a project. • Access an API endpoint for a function to discover it requires authentication. • Obtain an identity token using your initial credentials and access API again. • Reverse-engineer endpoint to discover it requires a password field. • Use over-provisioned credential to download the function’s source code from its REST API. • Reverse-engineer function to expose a sensitive environment variable. • List the function’s Metadata to discover the secret and access the endpoint. a4error | • Obtain an identity token and use it to access a function via its URL. • Inject unexpected input to trigger an error. • Use credential to read the function’s log entries. • Find the function’s credentials within the error log and list its permissions. • Use the function’s credentials to list the project’s VM instances. • Add an ssh key to ethe Metadata of a VM instance. • Log into the instance to access a secret file. a5power | • List credential permissions to find its ability to overwrite a serverless function. • Overwrite function code to return credentials of the VM executing function. • List VM’s credential permissions to find its ability to view and edit IAM policies. • View IAM policy via an API to discover its update role permission. • Escalate privileges via an API to gain permissions to access storage buckets. • Access secret file in storage bucket a6container | • List the project’s VM instances to discover a web server run via a container. • Pull the container image and examine its code to find a hidden route implementing a proxy. • Perform a server-side request forgery (SSRF) attack on the Metadata service for the VM to obtain its credentials. • List VM’s credentials to find its ability to access storage buckets. • Access secret file in storage bucket In many cases, after infrastructure is deployed, it must be configured further before the level is ready to be played. The deployment script of each level performs these configurations after the initial infrastructure deployment is complete. An outline of a possible deployment script is shown in the second column of Fig. 3. Infrastructure could be configured using Google Cloud REST APIs, but using the APIs directly complicates level development. To address this, the CTF framework provides helper functions that perform common infrastructure configurations, such as uploading files to storage buckets or modifying security policies. The abstraction of common API calls into helper functions allows level creators to focus on the overall configuration logic of their level, rather than dealing with the details of the underlying Google Cloud API calls. Documentation of the framework helper functions is provided on the Thunder CTF website [15]. An important aspect of the scaffolding in Thunder CTF is provided by the hint system. To build an attractive, functional hint system, a good deal of development work is required. To simplify the process for level creators, Thunder CTF provides a hint templating system that allows level creators to focus solely on producing the content of hints rather than the formatting. When creating a level, level creators can provide a hint list file that contains the content of each hint. Using the hint list as input, the framework generates a styled HTML document that displays the hints in a sequential slideshow. This simplification takes the burden of hint styling and delivery away from level creators, allowing them to focus on the content of the hints versus their presentation. Finally, the framework of Thunder CTF provides extensibility both by supporting new level contributions within an existing CTF such as the 6 levels previously described, as well as by supporting the addition of entirely separate sequences of levels, effectively allowing content developers to design their own CTFs focused on new topics [10]. For that, Thunder CTF has a namespace system that allows the same framework to implement a different set of levels with a correspondingly different site to serve the web content. Using this, we are currently implementing a separate CTF focused on web and application security issues that leverages the Thunder CTF framework for deployment in the cloud. ### II-D Deployable Regardless of how well a CTF is designed, in order to be impactful, it must be widely used. Specifically, its code and content must be accessible, it must be easy to set up, and it must be either free to use or incur minimal cost. In addition, if being used in the context of a course, it must support levels that are polymorphic in nature to ensure each student has individually solved each level. Thunder CTF attempts to address each of these aspects. #### II-D1 Freely available code and content The code itself is free (as in speech), and students download the entire code repository as part of running Thunder CTF. While the hint-system is included in the repository and can be used directly by students, for convenience, we provide a hosted site for accessing level instructions and hints [10]. The repository is also structured to allow level contributions from the community in order to enable crowd-sourced development and deployment of new content. #### II-D2 Frictionless setup The setup for Thunder CTF can be done within minutes. Students that are new to Google Cloud sign up for a free account with up to $300 in credit [16]. From a web browser, they then launch Cloud Shell, a GCP-based command line interface that is already set up for accessing cloud resources, and clone the Thunder CTF repository. From there, they run a single Python script to deploy the level they wish to play (e.g. python3 thunder.py create thunder/a1openbucket). The script interfaces with Google’s Cloud Deployment Manager API to programmatically set up all of the level’s resources on-demand. When the level is completed, the same script is used to bring down all of the resources that have been deployed (e.g. python3 thunder.py destroy). This simplistic interface makes it easy for students to deploy and navigate levels. #### II-D3 Low cost Labs for cloud-based exercises often require a paid subscription to use [17]. Thunder CTF instead has been designed to be free (as in beer), with its resource consumption falling well within the free tier of Google Cloud. Specifically, each level utilizes virtual machines, cloud functions, containers, and API endpoints that fit within the “always-free” umbrella of Google Cloud. In addition, CTF levels make heavy use of serverless infrastructure that is billed only upon usage over a certain threshold. As a result, run-throughs of the CTF can cost as little as a dime, making the CTF a cost-effective way to learn and practice important cloud skills. #### II-D4 Polymorphic levels Finally, for deployments in courses, it is important to ensure that each student performs individual work in completing the exercises, and that solutions to the levels can’t simply be shared amongst them. To address this, the CTF framework includes a function that generates unique secret flags, which students look for when playing each level. This is done by hashing the combination of a constant level seed and the GCP project identifier for the player’s cloud project. With this, a validation site can be easily built to check solutions on a per-user basis. Although the students have full access to CTF code, flags could potentially be reversed, but we believe it is easier to solve the levels than to reverse-engineer the flags from code. ## III Evaluation The first use of Thunder CTF occurred in our Fall 2019 offering of Portland State University’s CS 430/530 Internet, Web, and Cloud Systems course with 48 students. The first half of the 10-week course covers key concepts in networking, operating systems, web development, and databases before transitioning to their use in cloud computing environments. At the beginning of the 6th week, a lecture on Google Cloud Identity and Access Management is given to students, followed by two weeks of labs that walk students through the basics of leveraging Cloud Storage, Cloud Datastore, App Engine, Cloud Run, Cloud Functions, and Kubernetes Engine to scale applications seamlessly. At the end of this sequence, the Thunder CTF levels were assigned to demonstrate how such services can be misconfigured in ways that expose them to attack. Students were given a due date for the exercises at the end of the 9th week, allowing them about a week to finish the levels. To assess the effectiveness of the CTF, we surveyed students at the beginning of the 10th week. Table II lists the questions that were asked in the survey. Our goal was to measure how well the CTF helped students learn about cloud security issues and develop skills in navigating cloud systems. In addition, we were interested in measuring the utility of the hint system for supporting students as they completed the exercise. TABLE II: Survey questions for Thunder CTF in CS 430/530: Internet, Web, and Cloud Systems (Fall 2019) Question --- Q1: Rate the CTF exercises for understanding security issues in the cloud. Q2: Rate the CTF exercises for developing skills in navigating the cloud. Q3: Rate the hint system as a mechanism for providing help as needed in solving CTF exercises. Of the 48 students in the class, 36 responded to the survey. Table III shows the results. As the table shows, students felt that the lecture material and CTF exercises were both helpful for learning about security issues and for developing cloud skills, while students found the hint system very helpful as a learning aid, validating our design. TABLE III: Helpfulness ratings of Thunder CTF (1=Very Unhelpful, 2=Somewhat Unhelpful, 3=Neither Helpful nor Unhelpful, 4=Somewhat Helpful, 5=Very Helpful) Question | 1 | 2 | 3 | 4 | 5 | Mean rating ---|---|---|---|---|---|--- Q1 | 1 | 3 | 3 | 19 | 10 | 3.94 Q2 | 1 | 2 | 4 | 20 | 9 | 3.94 Q3 | 1 | 0 | 1 | 10 | 24 | 4.56 ## IV Conclusion and Future Work With the move to cloud-based infrastructure, securing cloud applications and deployments is becoming extremely important. This paper describes a curriculum and CTF for not only teaching cloud security issues to students, but also developing their skills in applying them. Thunder CTF is designed to be applicable, extensible, and deployable, allowing it to be used in as an efficient training tool in an educational setting. Additionally, the scaffolded hint system makes the CTF accessible and informative even for novice practitioners with little background in cloud security. Results from an initial deployment of the CTF are promising, indicating that scaffolded CTFs can be effective at teaching security concepts to students. In future work, we will need to deploy and evaluate the use of the CTF in additional course offerings in order to attain a greater sample size. Similarly, deployments of the CTF in other course curriculums (such as security-specific courses) are necessary to understand how the technical background of students affects their experience using the CTF. ## Acknowledgment This material is supported by the National Science Foundation under Grant No. 1821841. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the National Science Foundation. ## References * [1] 451 Research, ”Voice of the Enterprise: Cloud Transformation Survey,” November 2017, https://451research.com. * [2] L. Columbus, ”83% of Enterprise Workloads Will Be In The Cloud By 2020,” January 2018, https://www.forbes.com. * [3] D. O’Sullivan, ”The RNC Files: Inside the Largest US Voter Data Leak,” https://www.upguard.com/breaches/the-rnc-files. * [4] B. Diachenko, ”Document Management Company Left Credit Reports Online,” January 2019, https://securitydiscovery.com. * [5] R. Walikar, ”An SSRF, Privileged AWS Keys and the Capital One Breach” August 2019, https://blog.appsecco.com. * [6] Rhino Security Labs, ”CloudGoat: The Vulnerable-by-Design AWS Environment,” https://github.com/RhinoSecurityLabs/cloudgoat. * [7] S. Piper, ”flAWS,” http://flaws.cloud. * [8] S. Piper, ”flAWS2,” http://flaws2.cloud. * [9] OWASP, ”OWASP ServerlessGoat: A Serverless Application Demonstrating Common Serverless Security FLaws,” https://github.com/OWASP/Serverless-Goat. * [10] N. Springer, ”Thunder CTF,” https://thunder-ctf.cloud. * [11] MITRE Corporation, ”MITRE ATTACK Cloud Matrix,” https://attack.mitre.org/matrices/enterprise/cloud. * [12] Google Cloud Platform, ”Migrating to v1 Metadata Server Endpoint,” https://cloud.google.com/compute/docs/migrating-to-v1-metadata-server. * [13] E. Johnson, ”Preventing the Capital One Breach,” https://ejj.io/blog/capital-one. * [14] N. Springer, ”Thunder CTF Level Development Guide,” https://https://github.com/NicholasSpringer/thunder-ctf/wiki. * [15] N. Springer, ”Thunder CTF Framework Documentation,” https://https:/thunder-ctf.cloud/pydocs/framework. * [16] Google Cloud Platform, ”GCP Free Tier,” https://cloud.google.com/free. * [17] Infosec Learning, ”Virtual Labs,” https://www.infoseclearning.com/virtual-labs.
arxiv-papers
2021-07-27T03:01:47
2024-09-04T03:07:20.417320
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Nicholas Springer (1), Wu-chang Feng (1) ((1) Portland State\n University)", "submitter": "Nicholas Springer", "url": "https://arxiv.org/abs/2107.12566" }
2107.12567
# Guided Optimization for Image Processing Pipelines Yuka Ikarashi1 , Jonathan Ragan-Kelley1 , Tsukasa Fukusato2 , Jun Kato3 , Takeo Igarashi2 MIT CSAIL1, The University of Tokyo2, AIST3 ###### Abstract Writing high-performance image processing code is challenging and labor- intensive. The Halide programming language simplifies this task by decoupling high-level algorithms from “schedules” which optimize their implementation. However, even with this abstraction, it is still challenging for Halide programmers to understand complicated scheduling strategies and productively write valid, optimized schedules. To address this, we propose a programming support method called “guided optimization.” Guided optimization provides programmers a set of valid optimization options and interactive feedback about their current choices, which enables them to comprehend and efficiently optimize image processing code without the time-consuming trial-and-error process of traditional text editors. We implemented a proof-of-concept system, Roly-poly, which integrates guided optimization, program visualization, and schedule cost estimation to support the comprehension and development of efficient Halide image processing code. We conducted a user study with novice Halide programmers and confirmed that Roly-poly and its guided optimization was informative, increased productivity, and resulted in higher-performing schedules in less time. ###### Index Terms: Guided optimization, interactive scheduling, Halide, programming environment, program visualization ## I Introduction Performance optimization is challenging even for experts because the number of optimization choices they have is enormous. The barrier is even higher for novices, for whom it is difficult to reason about what choices are valid and what their impact might be, and it is essential to help them break down the choice space to a manageable set of valid options. Performance and program visualization techniques are investigated widely in both academia and industry to address this issue, such as always-on visualization of call stacks [1], and parallel execution [2]. These methods, however, are text-based, and programmers need to carefully write syntactically correct code and manually explore a large space of optimization choices to decide an appropriate optimization strategy. The Halide programming language [3, 4] is a widely used open-source domain- specific language (DSL) for image processing. It is explicitly designed to achieve high-performance while significantly simplifying the coding process. Halide decouples high-level algorithms from their schedules. An algorithm is a functional definition of what to compute (e.g., a box blur algorithm or corner detection algorithm). Schedules define how to compute a given algorithm, especially issues related to performance optimization, including choices affecting memory locality and parallelism. Compared with general purpose programming languages such as C++ and Python, this separation allows Halide programmers to write the algorithm part first and optimize its performance independently. Figure 1: The overview of Roly-poly. However, writing optimized schedules in Halide is still challenging. While the scheduling language is concise, different scheduling choices cause complex, global transformations of the generated code. Understanding what choices are valid, and what effect they will have, is difficult as the implied transformations are invisible to the programmer and their effect must be modeled in the programmer’s head. It is also difficult to predict how schedules will perform. The most efficient schedules require complex trade- offs between parallelism, locality, and the total amount of computation in different places throughout a program. To find the best result, programmers need to repeatedly change scheduling code, compile and execute the program, benchmark the result, and inspect the generated code. Ongoing research explores removing this burden by automatically inferring fast schedules with no user involvement [5], but these techniques are still limited, and manual programming of schedules remains the standard practice in industry to retain explicit control. To make authoring schedules more accessible and productive, we present an interface and workflow for authoring schedules called guided optimization. Guided optimization presents multiple valid scheduling options to the user, together with interactive feedback on the current schedule state. This allows users to directly explore the space of valid schedules without struggling to mentally model the impact of individual scheduling operations, and to make more effective choices based on integrated feedback about their performance impacts. With such systematic help, we believe that Halide programmers can optimize image processing code more productively and effectively than with traditional manual scheduling. This paper introduces our prototype implementation, Roly-poly, to show the feasibility and effectiveness of the proposed method. Roly-poly also features program visualization and scheduling cost estimation to support guided optimization. Figure 1 shows the system overview of Roly-poly. This paper makes the following contributions: * • The proposal of guided optimization, a semi-automatic scheduling approach where the system enumerates a series of valid scheduling choices and asks users to choose one of the options at each step. * • An integration of cost estimation into guided optimization. * • A visualization of the scheduling strategy at each step of the guided optimization. * • An interview with Halide experts and a user study with Halide novices on the effectiveness of guided optimization. ## II Image Processing Scheduling in Halide Halide is embedded in C++ and can be used to build computational photography and computer vision applications efficiently. It decouples image processing code into an algorithm, which is a mathematical representation of image pixel transformation, and into a schedule, which dictates the order of computation and storage. The program output depends only on the algorithm, and changing schedules solely affects the performance. This separation allows programmers to explore various schedules after defining an algorithm without unintentionally changing the program output. Var x, y; Func kernel, bounded, blur_y, blur; kernel(x) = exp($-$x$\ast$x/(2$\ast$sigma$\ast$sigma))/ (sqrtf(2$\ast$ M_PI) $\ast$ sigma); bounded = BoundaryConditions::repeat_edge(input); blur_y(x, y) = (kernel(0) $\ast$ input(x, y) + kernel(1) $\ast$ (bounded(x, y-1) + bounded(x, y+1)) + kernel(2) $\ast$ (bounded(x, y-2) + bounded(x, y+2)) + kernel(3) $\ast$ (bounded(x, y-3) + bounded(x, y+3))); blur(x, y) = (kernel(0) $\ast$ blur_y(x, y) + kernel(1) $\ast$ (blur_y(x-1, y) + blur_y(x+1, y)) + kernel(2) $\ast$ (blur_y(x-2, y) + blur_y(x+2, y)) + kernel(3) $\ast$ (blur_y(x-3, y) + blur_y(x+3, y))); Algorithm 1: Gaussian Blur algorithm written in Halide. Figure 3: A dependency graph of a Gaussian Blur algorithm. ### II-A Scheduling Example with Gaussian Blur We describe basic scheduling concepts by considering an example of a Gaussian Blur algorithm run on a 256x256 image. Algorithm 1 shows a Gaussian algorithm written in Halide, and Figure 3 shows its dependency graph. It first sets a boundary condition on the input image and stores the result in bounded. Then, it applies a one-dimensional Gaussian kernel function vertically, storing the result in blur_y, and then applies a Gaussian kernel horizontally to blur_y to produce blur. The default schedule generates the following implementation: for x in 0..255 for y in 0..255 blur $(\cdots)$ = (kernel(0) $\ast$ blur_y(x, y) + $\cdots$; All functions are inlined to blur, and the loop simply iterates x and y. This inlining schedule has a maximal memory locality because seven elements of blur_y are produced and immediately are consumed by blur (likely readout of the CPU’s registers). However, this schedule also induces a maximal redundant computation. This schedule does not cache the result of blur_y, and it is computed each time it is used from blur with the same arguments. A schedule method called pre-computation can be used to reduce redundant computation. For example: for x in 0..255 for y in 0..255 blur_y $(\cdots)=\cdots$; for x in 0..255 for y in 0..255 blur $(\cdots)=\cdots$; In this schedule, blur_y is pre-computed before blur. This schedule has minimal redundant computations because all required elements of blur_y are pre-computed and stored in memory before they are subsequently loaded to compute blur. However, memory locality is sacrificed because an entire pre- computed image is usually too large to fit in a cache. Finally, tiling can be used to balance the advantages and the disadvantages of inlining and pre-computation. For example: for x_outer in 0..31 for y_outer in 0..15 for x_inner in 0..7 for y_inner in 0..15 blur_y $(\cdots)=\cdots$; for x_inner in 0..7 for y_inner in 0..15 blur $(\cdots)=\cdots$; Tiling divides a loop into an outer-loop and a smaller inner-loop. In this example, the outer-loop variables of x_outer and y_outer divide the input image into 512 (32x16) tiles. Each of these tiles has a size of 8x16. In this paper, we call the for-loop range (x_outer range of 32 and y_outer range of 16) a tile range and the divided image size (8x16 in this example) a tile size. The tile range is usually just called “for-loop range,” but we use this word to distinguish and emphasize that this for-loop exists only for dividing the image into smaller tiles. In short, if a for-loop of function child is nested inside a for-loop of function parent, (a tile size of child) = (tile size of parent) / (tile range of child). This schedule pre-computes blur_y for each tile of blur, which saves redundant computations while taking advantage of the memory locality of blur_y. Memory locality is important for efficient scheduling because loading data from a cache is significantly faster than loading it from the main memory. However, taking a too small tile size will result in redundant computation at the edge of each tiling. Therefore, calibrating the tile size so that it is small enough to fit in a cache and large enough to avoid too many redundant computations is essential for balancing redundant computation and memory locality trade-off. To summarize, choosing the function’s i) compute location in the for-loop (pre-computing or inlining) and ii) tile range are key methods for image processing optimization. ### II-B Expert Interview To understand the representative workflow of manual scheduling optimization and to collect advice in creating a tool for novice image processing programmers, we conducted interviews with Halide scheduling experts. We invited three experts aged $25$ to $30$ years with at least two years of Halide experience (one of them had an experience as a teaching assistant at an image processing class teaching Halide) and asked them to perform manual scheduling on Unsharp Masking (see Algorithm 2). The interview was conducted informally, asking them to explain the reasons for their schedule choices. We chose this task because its scheduling choices were complex enough to measure experts’ realistic scheduling procedures. After the participants completed the task, we asked them how they felt about manual scheduling process and what they felt short in the current programming environment. On average, an interview took 26 minutes, and the average runtime of a schedule was 32 ms. We learned from the interview the basic strategy of scheduling, which we explained in Section II-A. Participants told us that the iterative process of editing, compiling, and executing to check the runtime was laborious and said that they would like to use a tool integrating them into one screen with instant feedback. They also stated that even Halide experts often find it challenging to imagine the CPU and cache state given a schedule, and said that visualization would certainly be useful to picture them. Based on their comments, we designed an initial concept of Roly-poly. ## III Related Work ### III-A Performance Visualization Performance visualization techniques help programmers improve the time and energy efficiency of their programs [6]. Callgrind and Kcachegrind are tools that output the profile information about cache events and the dynamic call graph of the execution [7]. The Linux kernel supports the perf profiling tool, which displays CPU usage [8]. gprof implements more aesthetically pleasing visualization [9], and Intel’s VTune Amplifier is proprietary software used widely in professional high-performance computing (HPC) settings [10]. These systems focus on low-level visualizations, such as processor and memory visualization. Giving high-level (for-loop level) visualizations and suggestions are beyond the scope of these techniques. We believe that providing users with more abstract-level visual feedback will help them better comprehend image processing optimization. Moreover, these techniques target general programming languages and environments and do not utilize domain knowledge. Our target domain is image processing, which enables us to provide domain-specific optimization and visualization. The HPC community suggested many memory visualization techniques [6] such as visualization of cache hit and misses [13, 14], dynamic memory allocation [15], and the complex relationships between memory performance factors [16]. Halide visualization tools highlights computed memory region represented as image cells in each execution step [11], [12]. Although these techniques are powerful in visualizing the cache or memory state at one particular moment, their visualizations are low level, and they tend to express temporal transitions by continuous animation or not visualizing them at all. This limits users’ ease of understanding because they still need to observe the animation and guess what the performance bottleneck is by manually comparing the source code and the visualization. We envision addressing this issue in Roly-poly by visualizing the whole image processing pipeline as a single static image. ### III-B Program Visualization in General Program visualization maps programs to visual representations by analyzing source code, executable binaries, and data [17]. Omnicode visualizes the entire history of all runtime values for all program variables [18]. DejaVu shows an interactive video-player-like interface to visualize the value changes of user-selected variables [19]. Hoffswell et al. proposed to embed runtime value visualization within the text-based code [20]. Projection Boxes allows on-the-fly customization of visualizing runtime values of expressions at the code editor cursor [21]. These research focuses on comprehensible visualization of data structures and variables, and performance visualization is beyond their scope. ### III-C Program Visualization for Performance Improvement Few studies have pushed the boundaries and explored program visualizations aimed at performance improvement. PerformanceHat [22] and Beck et al. [23] augments the source code with runtime performance traces. Theseus enables always-on program visualization of call stacks and its interactive exploration during the web-based application development [1]. Projection Boxes shows program visualization next to the code and enables its flexible customization at the programmer’s will [21]. Cilkpride interactively updates the IDE with outputs of the Cilk performance profiler for parallel programs [2]. Skyline is a domain-specific IDE for deep neural network training programs that shows performance predictions and visualizations [24]. In adjacent research areas such as live coding, live programming, and exploratory programming, performance visualization is not yet actively investigated [25]. Roly-poly aims to achieve a similar goal as these works but is different for the following reasons: 1) Existing methods require users to write optimization code in text editors and provide performance visualization as an editor extension. Writing performance optimization code on text editors have an advantage of being highly customizable, but users are not free from making syntactical mistakes and still need to decide an optimization strategy within a large space of optimization choices. Roly-poly’s guided optimization controls the image processing optimization workflow itself, and sequentially provides a valid set of scheduling choices to users. The optimization choice a user can make is thus limited to valid schedules, and it is impossible to make syntactic errors in Roly-poly. 2) Roly-poly provides the performance cost estimation of each scheduling option, which is the first attempt in performance visualization literature. The key difference between Roly-poly and existing systems such as Cilkpride and Skyline is that Roly-poly’s cost does not show the current schedule’s performance, but it shows the predicted cost of the entire resulting pipeline. Thus, we believe that Roly-poly’s cost feedback is more global than existing systems. ### III-D Neural Network Visualization In the field of machine learning research, several methods have been proposed to visualize complex neural networks [26, 27, 28, 29, 30]. In contrast to traditional performance visualization techniques, most neural network visualization approaches show spatial and temporal information in one image, thus visualizing the whole pipeline. This approach helps users understand the overall system instead of one particular moment. These visualizations can be applied to 2D array computation in general, including our target domain of image processing pipelines. Inspired by these visualizations, Roly-poly takes a similar approach. Instead of animating the visualization, we envision visualizing the whole execution of the image processing pipeline in a single view. ### III-E Visual Programming Language Visual programming languages (VPLs) use an interactive and graphical approach to help users avoid syntactic errors. Agentsheets utilizes a drag-and-drop mechanism to prevent syntactic mistakes [31]. Alice [32] and Scratch [33] are block-based VPLs for novice programmers to learn the basic principles of programming by combining the provided blocks. Weintrop and Wilensky found that block-based programming tools were easier to use for high school students than text-based alternatives [34]. Inspired by the prior work on VPLs, Roly-poly offers an interactive block-like visualization of the execution of the image processing pipeline. Compared with manual text-based scheduling, we narrow users’ freedom by only providing a set of choices. However, our design choices are that using visual constraints in Roly-poly will help users focus only on essential ideas, not on syntactical mistakes. Also, some VPLs assign colors to categories based on their functionalities (e.g., control blocks and operators blocks). This inspired Roly-poly to assign distinguished colors to different functions. ## IV Design and Implementation of Roly-Poly Figure 4: A snapshot of Roly-poly’s user interface during the scheduling task of Unsharp Masking (see Algorithm 2). (a) Visualization of tile sizes. Each tile corresponds to a for-loop block in (c). (b) A dependency graph of the functions obtained by a static analysis of the algorithm. (c) Schedule section showing the for-loop blocks of the current schedule. (d) Instruction from the system. (e) Scheduling cost estimation of possible compute locations. (a) (b) (c) Figure 5: A snapshot of (a) the compute location selection phase and (b) tile range selection phase in the Gaussian Blur task. (c) The cost details can be shown in both phases. Our proof-of-concept system, Roly-poly, is divided into the front-end and back-end. The front-end of Roly-poly is implemented as a desktop application built with Electron111https://www.electronjs.org, which communicates with the always-on back-end Halide compiler. We utilized the Halide compiler’s program generation infrastructure for cost estimation and elimination of illegal schedules. Its program generator supports the essential image processing optimization methods of tiling and pre-computation. ### IV-A System Overview Figure 4 shows a screenshot of Roly-poly during the scheduling task of Unsharp Masking (see Algorithm 2). Section (a) shows a visualization of the tile sizes. Section (b) shows a dependency graph of the functions obtained by a static analysis of the algorithm. This is an automatically generated graph representing the functional dependencies, which is the same concept as in Figure 3. It updates the currently scheduled function with a red background (ratio is highlighted in Figure 4 (b)). This dependency graph visualization enables users understand the algorithm dependencies at a glance, without switching back and forth between the source code and schedule views. Section (c) shows a for-loop representation of the current schedule. Each for- loop block corresponds to a tile size visualization in section (a). Section (d) gives instructions for what users should do next. In the instructions, the currently scheduled function is highlighted in red (ratio is highlighted in this case). Section (e) shows a scheduling cost estimation by the compiler. It is important to note that these costs are just “estimates” and do not always match with the actual performance. So, the users still need to experiment with various schedules to find optimal schedule, using these cost estimation as a hint. ### IV-B Guided Optimization Guided optimization is a semi-automatic method that assists manual scheduling. Roly-poly provides step-by-step instructions to a user with a set of valid options. Users can experiment with various “valid” scheduling possibilities just by selecting options presented by the system. As we explained in the earlier section, the key factors to consider in image processing optimization are tiling and compute location. There are two scheduling phases in this system to support them. The compute location selection phase asks users to choose the function’s compute location (see Figure 5(a)), and the tile range selection phase allows them to choose or type the tile ranges (see Figure 5(b)). The system can only be one of these two phases. Users follow the system’s instructions and keep choosing from the suggestions until the scheduling of all functions has been completed. Users start scheduling an output function (e.g., blur in Algorithm 1 and unsharp in Algorithm 2) and continue scheduling functions following an inverse topological order from the output to input (e.g., input in Algorithm 1 and 2). For each function, users select a compute location and a tile range. When tiling does not apply to a function, the system skips the tiling phase. #### IV-B1 Compute location selection phase The schedule section (Figure 4 (c,e) and Figure 5(a)) shows a for-loop block of the current schedule. In the compute location selection phase, users choose the function’s compute location by clicking an arrow on the right side. If a user clicks Cost 3 in Figure 5(a), the system communicates with the Halide compiler and schedules Func sharpen between first and the second inner-most for-loop block in Figure 5(a). Tile sizes of for-loop blocks in (c) is visualized in (a). The cost of each compute location is shown on the right side. #### IV-B2 Tile range selection phase In the tile range selection phase, users choose a function’s tile range, as shown in Figure 5(b). Users either click the tile range suggestion or enter the custom tile range in the input box. The estimated cost of each tile range is shown on the right side. The tile range panel is hidden in the compute location selection phase, and it appears in the tile range selection phase. Each function is initially scheduled to be computed by two-fold for-loops, an external loop and a vectorized inner loop. The external loop is further divided into outer external loop and inner external loop. The tile range selection phase lets the user specify how to divide the external loop into the two loops. The user specifies the tile range of the outer loop and the system automatically computes the tile range of the inner loop. We made a design choice to let users select the tile ranges instead of letting them directly select the tile sizes, because it is more intuitive for novice Halide programmers to specify the ranges of for-loop than defining the unfamiliar concept of tile sizes. The system enumerates multiples of four for width and height to suggest tile ranges. It generates (tile_size_width_of_a_parent/4) $\times$ (tile_size_height_of_a_parent/4) number of tile ranges in total and calculates the estimated cost for each one. Then, the system sorts them in cost ascending order (the lowest cost first) and suggests the top five tile ranges. We empirically found that users often do not look at suggestions below the fifth one because they prefer entering a custom tile range to scrolling through too many options to explore their schedules. #### IV-B3 Visualization As users change the schedule, the visualization panel (a) is updated to reflect the current schedule. It visualizes the tile size of each for-loop block in the schedule section (c). Each function is assigned a color that is consistent throughout the scheduling process and in the visualization (see Figure 4 (a)). We divide the parent’s tile or image size by the children’s tile range to obtain the children’s tile size. For example, the image size is 2560$\times$1600 in Figure 4. The range of the for-loop block #1 is (0$\ldots$3)$\times$(0$\ldots$51), so the tile size of tile #1 becomes 640$\times$31 (x: 2560/4 = 640, y: 1600/52 $\approx$ 31). Similarly, the tile size of tile #2 is 32$\times$1 (640/20 = 32, 31/31 = 1). Tiles with parallel are automatically parallelized. Tiles with vectorized and the corresponding for-loop block are the innermost for-loop and they are automatically vectorized to use SIMD. Parallelization and vectorization are done by the compiler when applicable and users do not need to specify them. The system uses the Snap.svg JavaScript SVG library to render each tile. #### IV-B4 Cost Estimation Roly-poly uses a cost model generated by backend Halide compiler to interactively estimate the performance characteristics of different choices. Guided optimization guides users to schedule functions one by one, and the cost of not yet scheduled functions are set default to the cost of inline schedule. The estimated total cost and cost details are shown in both the compute location selection phase and the tile range selection phase. It also shows the estimated cost of the current schedule below the instruction section (see Figure 4 (d)). The estimated total cost is calculated by many internal parameters, and three main parameters are shown. The load cost is a cost of loading from memory, the store cost is a cost of storing to the memory, and the compute cost is a cost of CPU computation. ### IV-C Usage Scenario We will explain the scheduling flow step-by-step, taking an example of one particular scheduling flow in a Gaussian Blur optimization task (see Algorithm 1). Suppose that a programmer called Sofia is optimizing a Gaussian Blur using Roly-poly. She first loads an algorithm file into the system. The system analyzes the algorithm, creates a default schedule, and presents an initial user interface. Note that users do not need to manually write any scheduling code before and throughout the scheduling process. The system then gives the first instruction “Choose or type the tile range of Func blur.” She notices “Func blur” in the instruction and in the dependency graph are highlighted in red. She then understands that she needs to choose the tile range for the highlighted function. In the bottom right of the UI, she sees five buttons with x, y, and two numbers. Those buttons are highlighted in yellow when she mouse-overs them, so she notices that these are clickable. She also notices that “Cost:” and numbers are shown on the right side of buttons. She thinks that a lower cost indicates a better runtime, but she wants to try a slightly larger tiling size as an experiment, so she chooses the second top tile size with “Cost: 9.” The instruction and the tile range suggestion in this stage are shown in Figure 5(b). After clicking the tile range, the system gives a new instruction “Choose the compute location of Func blur_y.” She notices that the highlight of a function dependency graph changed to blur_y. She mouse-overs the arrows on the right side of scheduling section, noticing that those are buttons and are clickable. She understands that the tile size of this for-loop block is shown on the left, in the visualization. Then, she explores the system and compares the costs and decides to choose an arrow with cost 15 because she wants to compute blur_y in the outer loop. The actual schedule section in this stage is shown in Figure 5(a). After she clicks the button, the instruction tells her to “Choose the compute location of Func bounded.” She compares the costs and tile sizes in visualization, and chooses the third arrow. After that, the instruction says, “Choose a compute location of Func kernel.” She chooses the first arrow because she wants to pre-compute kernel before the other for-loops. Finally, she chooses Func kernel’s tile range in response to an instruction “Choose or type the tile range of Func kernel.” After that, she notices that the scheduling is completed because the instruction says “Done!” ## V User Study We conducted a user study with novice Halide programmers to compare the effectiveness of Roly-poly and the manual scheduling operation. ### V-A Procedure Var x, y, c; Func kernel, bounded, gray, blur_y, blur, sharpen, ratio, unsharp; kernel(x) = exp(-x$\ast$x /(2 $\ast$ sigma $\ast$ sigma)) / (sqrtf(2 $\ast$ M_PI) $\ast$ sigma); bounded = BoundaryConditions::repeat_edge(input); gray(x, y) = 0.299f $\ast$ bounded(x, y, 0) + 0.587f $\ast$ bounded(x, y, 1) + 0.114f $\ast$ bounded(x, y, 2); blur_y(x, y) = (kernel(0) $\ast$ gray(x, y) + kernel(1) $\ast$ (gray(x, y-1) + gray(x, y+1)) + kernel(2) $\ast$ (gray(x, y-2) + gray(x, y+2)) + kernel(3) $\ast$ (gray(x, y-3) + gray(x, y+3))); blur(x, y) = (kernel(0) $\ast$ blur_y(x , y) + kernel(1) $\ast$ (blur_y(x-1, y) + blur_y(x+1, y)) + kernel(2) $\ast$ (blur_y(x-2, y) + blur_y(x+2, y)) + kernel(3) $\ast$ (blur_y(x-3, y) + blur_y(x+3, y))); sharpen(x, y) = 2 $\ast$ gray(x, y) - blur(x, y); ratio(x, y) = sharpen(x, y) / gray(x, y); unsharp(x, y, c) = ratio(x, y) $\ast$ input(x, y, c); Algorithm 2: Unsharp Masking algorithm written in Halide. We asked 10 participants (P1, P2, $\cdots$, P10) to perform the Unsharp Masking scheduling task with Roly-poly and manual scheduling in a within- subjects design. Participants had eight years of programming experience on average. All participants had professional programming experience in image processing for commercial and research purposes. All participants had no previous experience with the Halide programming language and none of them participated in the expert interview (Section II-B). Each participant was invited to a 60-minute session. We conducted all of our studies online using Chrome Remote Desktop. We first gave 20-minute tutorials on the basic concepts of image processing in Halide. The introduction covered the content of Section II which we presented earlier, such as to consider the cache locality and to avoid redundant computation. We provided the Unsharp Masking algorithm, as shown in Algorithm 2, and asked participants to write schedules and optimize its runtime as much as possible within 15 minutes. For each task, half of the participants were asked to perform the scheduling with Roly-poly first, and the other half were asked to perform scheduling manually first. In the manual scheduling task, we provided an example code of two methods (compute_at(...) for pre-computing a function and tile(...) for tiling a function) and allowed them to browse the Halide tutorial if they wanted. After the scheduling session, we spent 10 minutes giving them a questionnaire and a semi-structured interview. We recorded their manipulation process and analyzed it afterward. Figure 7: A box and whisker plot showing the distribution of the best runtime of unsharp masking by participants with manual and Roly-poly scheduling, the best runtime from expert interview (see Section II-B), runtime from the auto- scheduler, and runtime of the default inline schedule. Figure 8: The results of user study questionnaire. ### V-B Overview of Results Figure 7 is a box and whisker plot showing the distribution of the best runtime of unsharp masking by participants with manual and Roly-poly scheduling, the best runtime from expert interview (Section II-B), runtime from the auto-scheduler [5], and runtime of the default inline schedule. Halide provides the default inlining schedule for algorithms without any user- specified schedule, and the runtime of the Unsharp Masking default schedule was 128 ms. From the user study, five participants could not write any faster code than the default schedule with manual, and all participants achieved better runtime with Roly-poly than with manual. The average runtime of the unsharp masking with Roly-poly was 16.5 ms, and the average runtime with manual was 82 ms. The best runtime from expert interview was 9.8ms and runtime from the auto-scheduler was 12.7 ms. Thus the result was better in the order of expert, auto-scheduler, Roly-poly, manual, and default. This result supports our initial motivation that the expert’s manually scheduled runtime is faster than auto-scheduler’s. Moreover, while novices were not quite able to beat the auto-scheduler in their first 15 minutes with Roly-poly, they already come surprisingly close, while their results with manual scheduling are several times slower. We analyzed the recording video to understand the challenges faced by participants on manual scheduling. We found that six participants spent most of their time becoming familiar with Halide scheduling syntax, such as how each schedule function take different arguments. Four participants quickly understood the syntax and spent their time figuring out good schedules by trying different schedules. Figure 8 shows the post-study questionnaire results. All participants answered that they were able to schedule more efficiently with Roly-poly. Nine participants answered that they could better explore schedules with Roly-poly. Nine participants answered that they could learn more about optimization with Roly-poly. All participants answered that they would recommend Roly-poly to other novice Halide programmers over the manual scheduling. Below are the results of semi-structured interviews. All participants stated that they found manual scheduling challenging, reasoning that the search space was too large, or they felt the effect of each method was a black box. P5, P7, and P9 gave overall comments on their experience. * • P9: I prefer this tool (Roly-poly) more as a Halide scheduling beginner, as it does a lot of hand-holding for people who haven’t done scheduling before. The concept and effect of the scheduling methods (e.g., tile size, compute location) were clearly visualized and provided a more intuitive explanation to learn about scheduling. * • P5: I was not familiar with typical code structures in image processing optimization nor Halide syntax, and Roly-Poly as a visual programming tool helped me in overcoming these obstacles. * • P7: It was difficult to understand how the manual scheduling works because the search space was too large, and I couldn’t find out which function I should have tiled or set compute location to. In the end, it kind of got faster by trying out some methods, but I didn’t understand at all how it got faster. ### V-C Guided Optimization All participants said that the guided optimization features were especially useful in Roly-poly. In particular, P9 and P6 said that the features of sequentially scheduling functions and the instruction telling the next step were useful. * • P9: Guided optimization gave me a clear idea of which function should be scheduled in what order and prevents a lot of potential errors from happening. * • P6: Guided optimization helped me build a step-by-step strategy for optimization. Necessary information were displayed at the right time of the optimization step. P7 and P10 said that the guided optimization feature of selecting a schedule from valid options was useful because they did not have to understand the Halide syntax and the details of image processing optimization. * • P7: For novice users like myself, limiting the search space to valid choices was more understandable. * • P10: Roly-poly was a better starting point for image processing optimization as I didn’t need to fully understand the Halide language syntax. The optimization process was self-contained within a GUI. P1 and P6 said that Roly-poly was useful because it gave them faster and interactive feedback, which enabled them to explore more schedules. * • P1: Roly-Poly gave me faster and more interactive feedback, so I had more time to do trial-and-error within the time limit, which helped me better understand the scheduling as a result. * • P6: I had to go back and forth between the tutorial and code with manual scheduling, which took me a while to experiment. Roly-poly made it easy to do what I wanted to do and especially made it easier to explore. However, on a more negative note, P3 mentioned that it was “too kind” and that it might prevent users from learning. Also, P5 mentioned that if he was not a novice he would prefer using the manual scheduling, even though he found that Roly-poly was useful as a beginner. * • P3: When we consider teaching or learning the optimization in Halide, I think Roly-Poly is ‘too kind’ for users (annoying things, which is important for programming in many cases, are almost completely hidden!). For example, I encountered compile errors when I tried manual scheduling. However, Roly-Poly hides such errors (it doesn’t allow me to choose invalid compute location), and this would prevent users from learning things such as ‘Why is this compute location invalid?’ * • P5: Roly-Poly enables a more friendly way to explore arguments for me, but just in a subspace of the scheduling space. If I am not a novice, maybe I will prefer to use manual scheduling. ### V-D Cost Estimation Eight participants said that the cost estimation helped them select schedules from valid options, because it helped them narrow down the optimization space and made it easier to understand the relationship between scheduling methods and the resulting optimization. * • P1: The cost estimation was really informative and helpful to make decisions on scheduling. I could understand which choice I should make at each step. * • P7: Roly-poly showed costs in detail, showing total costs, memory costs, and compute costs. I could prioritize regarding each details. P9, however, added that the cost could be deceiving. * • P9: Cost estimation was useful but could be deceiving. It provides you with ‘probably good’ guesses that basically avoid irrational choices, but it also discourage the user from exploring other options which could lead to a potentially better solution. This comment provided the insight that the cost suggestion might prevent users from exploring the scheduling space freely and deepening their understanding of scheduling strategies when they just follow the best cost estimation. ### V-E Visualization Participants found that the visualization of tile sizes was useful, because it gave a meaning to for-loop blocks. P3 and P9 mentioned that the visualization helped them comprehend the one to one correspondence of for-loop blocks and tile sizes. P7 mentioned that the visualization made the compute location selection phase clearer. * • P3: I understood from the visualization that the input image was split into multiple tiles and each tile is also split into multiple sub-tiles. The visualization also told me how functions were executed by step-by-step execution procedure. * • P9: Associating the visualization result (tile sizes) with the for-loop block and showing them in the same row gave me an intuitive idea on how each decision affected the scheduling process. * • P7: It was clear from the arrow and the dashed line that I can click the arrow and execute the current Func between for-loop blocks. However, P6 found that the visualization was hard to grasp at a glance. * • P6: Visualization was helpful when I examined closely, but when the scheduling pipeline became more complex, it displayed too much information on the screen and it was slightly difficult to keep track of each tile size. ## VI Discussion and Future Work We learned from the user study that cost suggestions might lead users to blindly follow the best cost without understanding why. It is necessary to assess this effect by conducting a user study with and without the cost suggestion and identify the best way to present a cost to foster users’ understanding. For example, showing the cost at first and hiding it after several attempts might help users’ understanding. We utilized the Halide compiler’s program generator to generate valid schedule options. This approach has the advantage that we can show the estimated cost, but it has the disadvantage of limiting the user’s search space to that of program generator’s. Although the key optimization methods of tiling and pre- computation are supported, advanced methods such as fusing and cloning are not supported by the program generator. Moreover, Roly-poly guides users through the functions sequentially, which forces users to schedule functions in a given order. We plan to investigate whether it is useful to give users the freedom to choose the order of functions to schedule, or whether it is too much detail. Roly-poly’s guided optimization and the visualization can be ported to other algorithm-schedule decoupled languages such as Taichi [35] and Tiramisu [36] by writing schedule generators for them. One area of future work that Roly- poly has inspired is to create a guided optimization system for these languages and also for different application domains, such as optimization for machine learning. ## VII Conclusion We presented an interactive scheduling system that features guided optimization as well as cost estimation and program visualization. Guided optimization lets users select tile ranges and compute locations from valid choices step-by-step and provides interactive feedback of the current schedule, thereby helping Halide programmers achieve good performance. We conducted a user study to assess the effectiveness and limitations of Roly- poly by recruiting novice Halide programmers. All participants preferred Roly- poly to manual when it came to optimization efficiency and learning, and many of them appreciated the guided optimization features. Cost estimation received mixed feedback, and we suggested some possible research directions for further investigation. We hope that Roly-poly encourages further development of interactive scheduling systems in the future. ## Acknowledgments This work was supported by JSPS KAKENHI Grant Number JP19K20316 and JST CREST Grant Number JPMJCR20D4, Japan. ## References * [1] T. Lieber, J. R. Brandt, and R. C. Miller, “Addressing misconceptions about code with always-on programming visualizations,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2014, pp. 2481–2490, doi: 10.1145/2556288.2557409. * [2] G. Chau, “Cilkpride: Always-on Visualizations for Parallel Programming,” Master thesis, Massachusetts Institute of Technology, 2017. * [3] J. Ragan-Kelley, A. Adams, S. Paris, M. Levoy, S. Amarasinghe, and F. Durand, “Decoupling algorithms from schedules for easy optimization of image processing pipelines,” ACM Trans. Graph., vol. 31, no. 4, p. 32:1-32:12, Jul. 2012, doi: 10.1145/2185520.2185528. * [4] J. Ragan-Kelley, C. Barnes, A. Adams, S. Paris, F. Durand, and S. Amarasinghe, “Halide: a language and compiler for optimizing parallelism, locality, and recomputation in image processing pipelines,” in Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, NY, USA, Jun. 2013, pp. 519–530, doi: 10.1145/2491956.2462176. * [5] A. Adams et al., “Learning to optimize halide with tree search and random programs,” ACM Trans. Graph., vol. 38, no. 4, p. 121:1-121:12, Jul. 2019, doi: 10.1145/3306346.3322967. * [6] K. E. Isaacs et al., “State of the Art of Performance Visualization,” 2014, doi: 10.2312/eurovisstar.20141177. * [7] J. Weidendorfer, “Sequential Performance Analysis with Callgrind and KCachegrind,” in Tools for High Performance Computing, Berlin, Heidelberg, 2008, pp. 93–113, doi: 10.1007/978-3-540-68564-7_7. * [8] “Tutorial - Perf Wiki.” https://perf.wiki.kernel.org/index.php/Tutorial (accessed Apr. 20, 2021). * [9] S. L. Graham, P. B. Kessler, and M. K. Mckusick, “Gprof: A call graph execution profiler,” SIGPLAN Not., vol. 17, no. 6, pp. 120–126, Jun. 1982, doi: 10.1145/872726.806987. * [10] “Fix Performance Bottlenecks with Intel® VTune™ Profiler,” Intel. https://www.intel.com/content/www/us/en/develop/tools/oneapi/ components/vtune-profiler.html (accessed Apr. 20, 2021). * [11] J. Knezevic, “Schedule Visualization and Analysis for Halide Image Processing Language,” Master thesis, Massachusetts Institute of Technology, 2013. * [12] “HalideTraceViz,” https://github.com/halide/Halide/blob/master/util/ HalideTraceViz.cpp (accessed Apr. 20, 2021). * [13] A. N. M. I. Choudhury, K. C. Potter, and S. G. Parker, “Interactive visualization for memory reference traces,” in Proceedings of the 10th Joint Eurographics / IEEE - VGTC conference on Visualization, Chichester, GBR, May 2008, pp. 815–822, doi: 10.1111/j.1467-8659.2008.01212.x. * [14] A. N. M. I. Choudhury and P. Rosen, “Abstract visualization of runtime memory behavior,” in 2011 6th International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), Sep. 2011, pp. 1–8, doi: 10.1109/VISSOF.2011.6069452. * [15] S. Moreta and A. Telea, “Visualizing Dynamic Memory Allocations,” in 2007 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, Jun. 2007, pp. 31–38, doi: 10.1109/VISSOF.2007.4290697. * [16] A. Giménez et al., “MemAxes: Visualization and Analytics for Characterizing Complex Memory Performance Behaviors,” IEEE Transactions on Visualization and Computer Graphics, 2018, doi: 10.1109/TVCG.2017.2718532. * [17] G.- Roman and K. C. Cox, “Program visualization: the art of mapping programs to pictures,” in International Conference on Software Engineering, May 1992, pp. 412–420, doi: 10.1145/143062.143157. * [18] H. Kang and P. J. Guo, “Omnicode: A Novice-Oriented Live Programming Environment with Always-On Run-Time Value Visualizations,” in Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, Oct. 2017, pp. 737–745, doi: 10.1145/3126594.3126632. * [19] J. Kato, S. McDirmid, and X. Cao, “DejaVu: integrated support for developing interactive camera-based programs,” in Proceedings of the 25th annual ACM symposium on User interface software and technology, New York, NY, USA, Oct. 2012, pp. 189–196, doi: 10.1145/2380116.2380142. * [20] J. Hoffswell, A. Satyanarayan, and J. Heer, “Augmenting Code with In Situ Visualizations to Aid Program Understanding,” in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2018, pp. 1–12, doi: 10.1145/3173574.3174106. * [21] S. Lerner, “Projection Boxes: On-the-fly Reconfigurable Visualization for Live Programming,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, Apr. 2020, pp. 1–7, doi: 10.1145/3313831.3376494. * [22] J. Cito, P. Leitner, C. Bosshard, M. Knecht, G. Mazlami, and H. C. Gall, “PerformanceHat: augmenting source code with runtime performance traces in the IDE,” in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, New York, NY, USA, May 2018, pp. 41–44, doi: 10.1145/3183440.3183481. * [23] F. Beck, O. Moseler, S. Diehl, and G. D. Rey, “In situ understanding of performance bottlenecks through visually augmented code,” in 2013 21st International Conference on Program Comprehension (ICPC), May 2013, pp. 63–72, doi: 10.1109/ICPC.2013.6613834. * [24] G. X. Yu, T. Grossman, and G. Pekhimenko, “Skyline: Interactive In-Editor Computational Performance Profiling for Deep Neural Network Training,” in Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, Oct. 2020, pp. 126–139, doi: 10.1145/3379337.3415890. * [25] P. Rein, S. Ramson, J. Lincke, R. Hirschfeld, and T. Pape, Exploratory and Live, Programming and Coding: A Literature Study Comparing Perspectives on Liveness, vol. 3. 2018. * [26] W. Abdulla and P. Ferriere, “Hiddenlayer,” https://github.com/waleedka/hiddenlayer (accessed Apr. 20, 2021). * [27] H. Iqbal, “PlotNeuralNet,” https://github.com/HarisIqbal88/PlotNeuralNet (accessed Apr. 20, 2021). * [28] “NN-SVG.” https://alexlenail.me/NN-SVG/ (accessed Apr. 20, 2021). * [29] “TensorSpace.js.” https://tensorspace.org/ (accessed Apr. 20, 2021). * [30] K. Wongsuphasawat et al., “Visualizing Dataflow Graphs of Deep Learning Models in TensorFlow,” IEEE Transactions on Visualization and Computer Graphics, vol. 24, no. 1, pp. 1–12, Jan. 2018, doi: 10.1109/TVCG.2017.2744878. * [31] A. Repenning, A. Ioannidou, and J. Zola, “AgentSheets: End-User Programmable Simulations.,” J. Artificial Societies and Social Simulation, vol. 3, Jun. 2000. * [32] S. Cooper, W. Dann, and R. Pausch, “Alice: a 3-D tool for introductory programming concepts,” J. Comput. Sci. Coll., vol. 15, no. 5, pp. 107–116, Apr. 2000. * [33] M. Resnick et al., “Scratch: programming for all,” Commun. ACM, vol. 52, no. 11, pp. 60–67, Nov. 2009, doi: 10.1145/1592761.1592779. * [34] D. Weintrop and U. Wilensky, “To block or not to block, that is the question: students’ perceptions of blocks-based programming,” in Proceedings of the 14th International Conference on Interaction Design and Children, New York, NY, USA, Jun. 2015, pp. 199–208, doi: 10.1145/2771839.2771860. * [35] Y. Hu, T.-M. Li, L. Anderson, J. Ragan-Kelley, and F. Durand, “Taichi: a language for high-performance computation on spatially sparse data structures,” ACM Trans. Graph., vol. 38, no. 6, p. 201:1-201:16, Nov. 2019, doi: 10.1145/3355089.3356506. * [36] R. Baghdadi et al., “Tiramisu: A Polyhedral Compiler for Expressing Fast and Portable Code,” arXiv:1804.10694 [cs], Dec. 2018, Accessed: Apr. 20, 2021. [Online]. Available: http://arxiv.org/abs/1804.10694.
arxiv-papers
2021-07-27T03:02:17
2024-09-04T03:07:20.428721
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yuka Ikarashi, Jonathan Ragan-Kelley, Tsukasa Fukusato, Jun Kato,\n Takeo Igarashi", "submitter": "Yuka Ikarashi", "url": "https://arxiv.org/abs/2107.12567" }
2107.12568
# Version Space Algebras are Acyclic Tree Automata James Koppel MITCambridgeMAUSA [email protected] ###### Abstract. Version space algebras are ways of representing spaces of programs which can be combined using union, intersection, and cross-product/“join" operators. In their reified form as ASTs with explicit union and join nodes, they have the ability to compactly represent exponentially-large spaces of programs, owing to which they have become become the most popular approach to enumerative program synthesis since the introduction of FlashFill in 2010. We present a linear-time semantics-preserving constructive embedding from version space algebras into nondeterministic finite tree automata, showing that the former are but a special case of the latter. Combined with recent results finding a correspondence between e-graphs and minimal deterministic tree automata, this shows that tree automata are strict generalizations of all recent major approaches to efficiently representing large spaces of programs by sharing. synthesis e-graphs tree-automata ††conference: ; ; ††copyright: rightsretained ## 1\. Introduction Enumerative program synthesis is the technique of listing a large number of programs and choosing the best one; deductive program synthesis is the process of starting with description and finding the right set of rewrites to transform it into the desired program. Since there can be exponentially many terms and rewrite sequences of a given size, both are greatly aided by compact representations of large spaces of terms. In the past decade, two approaches have gained great popularity for solving this problem, version space algebras (VSAs) and equivalence graphs (e-graphs), with the latter also being applied to semantic code search (Premtoon et al., 2020) and equivalence-checking (Alet et al., 2021; Stepp et al., 2011). More recently, Wang (Wang et al., 2017) applied a third and very old data structure to the same problem of representing spaces of terms: tree automata. We give an example of each. Consider representing the set of $9$ terms $\mathcal{T}=\\{f(g(X),g(Y))\\}$, where $X,Y\in\\{a,b,c\\}$. Fig. 1 gives the e-graph, VSA, and tree automaton representing this set. But the similarity between the three is striking, and they all appear to function by sharing subterms in the same way. Though works involving VSAs, e-graphs, and tree automata typically construct and use them very differently, their representational capabilities appear quite similar. In fact, we shall see that their capabilities are not only similar but identical, with tree automata being strict generalizations of the other two, which correspond to restricted forms of tree automata. Pollock and Haan (Pollock and Haan, 2021) provided half this story in a recent write-up, showing that e-graphs are isomorphic to minimal determinstic finite tree automata (minimal DFTAs), with the well-known congruence-closure algorithm used in e-graph maintenance being equivalent to tree-automata minimization. In this short paper, we show the other half, that version space algebra correspond to acyclic nondeterministic tree automata. (a) E-graph (b) Version-space algebra (c) Tree automaton. Rectangles represent transitions. Figure 1. There has been foreshadowing in the literature of a connection between VSAs and automata. The FlashFill paper (Gulwani, 2011), which sparked the wave of synthesis papers based on version-space algebras, featured an intersection algorithm for associative VSAs immediately noted to be similar to the intersection of string automata. Correspondences between schemes for sharing substructure and automata go at least back to the discovery of the correspondence between binary decision diagrams and string automata (Michon and Champarnaud, 1998). Yet, though the similarities between VSAs and tree automata may be obvious to one who digests Fig. 1, this paper appears to be the first to state it publicly and give a formal correspondence. ## 2\. Preliminaries We now present formal definitions of both version space algebras and tree automata. In both developments, we shall use $\Sigma$ to denote a signature, a set of symbols. Both VSAs and tree automata represent sets of terms over a given signature $\Sigma$. We do not formally restrict symbols to be of a given arity. We shall also provide a normalized form of version space algebras which makes their correspondence with tree automata particularly simple. ### 2.1. Version Space Algebra Abstractly speaking, a version space algebra (VSA) is a space of programs equipped with union, intersection, and independent join operators. (Lau et al., 2003) In the past decade however, they have become synonymous with their typical concrete representation as ASTs augmented with explicit union and join nodes, used for compactly storing large spaces of programs in enumerative synthesis. In this form, they can be considered the general version of searching program spaces by dynamic programming, as they achieve their efficiency by sharing common subterms of programs within the space. The FlashMeta/PROSE paper (Polozov and Gulwani, 2015) is the definitive work for VSAs as currently used; we replicate their formalism in brief here. ###### Definition 2.1 (Version space algebra (Orthodox definition)). Let $N$ be a symbol in a signature $\Sigma$. A _version space algebra_ over $\Sigma$ is a representation for a set $\widetilde{N}$ of terms rooted at $N$. The grammar of VSAs is: $\displaystyle\widetilde{N}\;:=\;\left\\{P_{1},\dots,P_{k}\right\\}\;|\;\boldsymbol{\mathsf{U}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\;|\;F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$ where $F$ is any $k$-ary node in $\Sigma$, and $P_{j}$ are terms generated by signature $\Sigma$. The semantics of a VSA as a set of programs is given as follows: $\displaystyle\llbracket\left\\{P_{1},\dots,P_{k}\right\\}\rrbracket^{\textsc{VSA}}$ $\displaystyle=$ $\displaystyle\left\\{P_{1},\dots,P_{k}\right\\}$ $\displaystyle\llbracket\boldsymbol{\mathsf{U}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\rrbracket^{\textsc{VSA}}$ $\displaystyle=$ $\displaystyle\bigcup_{i=1}^{k}\llbracket\widetilde{N}_{i}\rrbracket^{\textsc{VSA}}$ $\displaystyle\llbracket F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})\rrbracket^{\textsc{VSA}}$ $\displaystyle=$ $\displaystyle\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{i}\in\llbracket\widetilde{N}_{i}\rrbracket^{\textsc{VSA}}\right\\}$ While syntactically represented as trees, VSAs are treated as DAGs by automatically sharing all identical subterms. The requirement that all duplicate nodes are shared, while semantically unnecessary, becomes quite important when analyzing the embedding into tree automata. We hence modify our presentations to annotate every distinct $\boldsymbol{\mathsf{U}}$ and $F_{\text{\tiny\Bowtie}}$ node with a unique explicit label $l$. The VSA must satisfy the uniqueness property that no two distinct nodes may have the same children. Further, we shall henceforth assume that these are the only two node types in a VSA: ###### Observation 1. If a language has a finite set of constructors and constants, then the set nodes of VSAs are redundant. All program sets can be expressed using union and join nodes, e.g.: $\left\\{f(A,g(B)),g(C)\right\\}$ can be represented $\boldsymbol{\mathsf{U}}(f(A(),g(B())),g(C()))$, treating $A,B$, and $C$ as nullary constructors. Finally, note that any join node $F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$ can be replaced with a unary union node, namely $\boldsymbol{\mathsf{U}}(F_{\text{\tiny\Bowtie}}(\widetilde{N}_{1},\dots,\widetilde{N}_{k}))$. Combining these observations, we can thus transform any VSA to be composed of strictly-alternating layers of union and join nodes. We use the symbol $\mathbb{P}(\widetilde{N})$ (i.e.: sets of VSAs) to represent the union-node layers. Here is a definition for these normalized VSAs; the semantics are the same as in orthodox VSAs. ###### Definition 2.2 (Version space algebra (Normalized definition)). A _normalized version space algebra_ is a representation for a set $\widetilde{N}$ of terms. The grammar of normalized VSAs is: $\displaystyle\widetilde{N}$ $\displaystyle\;:=\;F_{\text{\tiny\Bowtie}}^{l}(\mathbb{P}(\widetilde{N})_{1},\dots,\mathbb{P}(\widetilde{N})_{k})$ $\displaystyle\mathbb{P}(\widetilde{N})$ $\displaystyle\;:=\;\boldsymbol{\mathsf{U}}^{l}(\widetilde{N}_{1},\dots,\widetilde{N}_{k})$ ### 2.2. Tree Automata Tree automata are generalizations of ordinary string automata to trees. Tree automata consume a tree bottom-to-top, associating a state with every node, choosing the state for each node based on the states of its children. When every node is unary except for a special “start" symbol, they behave identically to string automata. Tree automata can both be considered operationally, as a machine that inputs a tree over a signature $\Sigma$ and outputs “accept" or “reject," and denotationally, as a representation of a set (or language) of trees. The definitive treatment of tree automata is Comon (Comon, 1997). We present our definition below, along with that of the denotation of a tree automaton: ###### Definition 2.3 ((Bottom-up) Nondeterministic Finite Tree Automata (NFTA)). A (bottom-up) finite tree automaton over signature $\Sigma$ is a tuple $\mathcal{A}=(\mathcal{Q},\Sigma,\mathcal{Q}_{f},\Delta)$ where $\mathcal{Q}$ is a set of states, $\mathcal{Q}_{f}\subset\mathcal{Q}$ is a set of final states, and $\Delta\subseteq\Sigma\times\mathcal{Q}^{*}\times\mathcal{Q}$ is a set of transitions of the form $f(q_{1},\dots,q_{k})\rightarrow q$. The denotation of a transition and state, both within a larger automaton with transitions $\Delta$, are given mutually-recursively by: $\displaystyle\llbracket q\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=$ $\displaystyle\bigcup\left\\{\llbracket F(q_{1},\dots,q_{k})\rightarrow q\rrbracket^{\textsf{TA}}_{\Delta}\mathrel{\big{|}}(F(q_{1},\dots,q_{k})\rightarrow q)\in\Delta\right\\}$ $\displaystyle\llbracket F(q_{1},\dots,q_{k})\rightarrow q\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=$ $\displaystyle\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{i}\in\llbracket q_{i}\rrbracket^{\textsf{TA}}_{\Delta}\right\\}$ ## 3\. Embedding In this section, we present the embedding of a version space algebras into tree automaton, and prove that the resulting automaton represents the same set of terms. ###### Definition 3.1 (Embedding of VSA into TA). Let $\widetilde{N}$ be a normalized VSA over $\Sigma$. We shall construct a tree automaton corresponding to $\boldsymbol{\mathsf{U}}^{r}(\widetilde{N})$, where $r$ is a new “root" label. Let $\mathsf{subs}(\boldsymbol{\mathsf{U}}^{r}(\widetilde{N}))$ be the set of subnodes of $\boldsymbol{\mathsf{U}}^{r}(\widetilde{N})$. For each union node $\boldsymbol{\mathsf{U}}^{l}(\dots)\in\mathsf{subs}(\boldsymbol{\mathsf{U}}^{r}(\widetilde{N}))$, define the automaton state $q^{l}$. Let the set of all such states be $\mathcal{Q}$. We define the transitions as $\Delta=\left\\{F(q^{l_{1}},\dots,q^{l_{k}})\rightarrow q^{l}\mathrel{\big{|}}\boldsymbol{\mathsf{U}}^{l}(\dots,F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{l_{1}}(\dots),\dots,\boldsymbol{\mathsf{U}}^{l_{k}}(\dots)),\dots)\in\mathsf{subs}(F_{\text{\tiny\Bowtie}}^{r}(\widetilde{N}))\right\\}$ Finally, we define $\displaystyle\mathsf{VSAToTA}(\widetilde{N})=(\mathcal{Q},\Sigma,\left\\{q^{r}\right\\},\Delta)$ Note that the resulting automaton is not necessarily deterministic, as the same join node may be a child of distinct union nodes. It is, however, acyclic, as VSAs are acyclic. ###### Remark 1. The construction of Definition 3.1 creates one transition in the tree automaton per edge between a join and union in the VSA, and each such transition may have as children a significant fraction of states in the automaton. Naively implemented, for a VSA with $V$ nodes and $E$ edges, it is thus actually $O(VE)$ in time and space, although the number of states and transitions is still $O(V+E)$. However, this can be accelerated by giving identity to repeated transitions. That is, given the set of transitions $F(q_{1},\dots,q_{k})\rightarrow r_{1},\dots,F(q_{1},\dots,q_{k})\rightarrow r_{m}$ One can represent these by the factored representation $\delta_{i}=F(q_{1},\dots,q_{k})$ and $\delta_{i}\rightarrow r_{1},\dots,\delta_{i}\rightarrow r_{m}$, where $i$ is some new label, thus restoring the implementation to $O(V+E)$ time and space. Graphically, this appears as multiple states of the tree automaton sharing the same inbound transitions (hyperedges). ###### Theorem 3.2 (Correctness of Embedding). $\llbracket\widetilde{N}\rrbracket^{\textsc{VSA}}=\llbracket\mathsf{VSAToTA}(\widetilde{N})\rrbracket^{\textsf{TA}}$ ###### Proof. Let $\mathcal{Q}$ be the states of $\mathsf{VSAToTA}(\widetilde{N})$, with union nodes $\boldsymbol{\mathsf{U}}^{l}$ corresponding to states $q^{l}$. We show by mutual induction that $\llbracket\boldsymbol{\mathsf{U}}^{j}(\dots)\rrbracket^{\textsc{VSA}}=\llbracket q^{j}\rrbracket^{\textsf{TA}}_{\Delta}$ and that, for any $q$, $\llbracket F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{1}}(\dots),\dots,F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{k}}(\dots))\rrbracket^{\textsc{VSA}}=\llbracket q^{i}\rrbracket^{\textsf{TA}}_{\Delta}$ The theorem immediately follows. First, for join nodes: $\displaystyle\llbracket F_{\text{\tiny\Bowtie}}(\boldsymbol{\mathsf{U}}^{i_{1}}(\dots),\dots,\boldsymbol{\mathsf{U}}^{i_{k}}(\dots)\rrbracket^{\textsc{VSA}}$ $\displaystyle=\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{j}\in\llbracket\boldsymbol{\mathsf{U}}^{i_{j}}\rrbracket^{\textsc{VSA}}\right\\}$ $\displaystyle=\left\\{F(P_{1},\dots,P_{k})\mathrel{\big{|}}P_{j}\in\llbracket q^{i_{j}}\rrbracket^{\textsf{TA}}_{\Delta}\right\\}$ $\displaystyle=\llbracket F(q^{i_{1}},\dots,q^{i_{k}})\rightarrow q\rrbracket^{\textsf{TA}}_{\Delta}$ Now, for union nodes: $\displaystyle\llbracket\boldsymbol{\mathsf{U}}^{l}(F_{\text{\tiny\Bowtie}}^{i_{1}}(\dots),\dots,F_{\text{\tiny\Bowtie}}^{i_{k}}(\dots))\rrbracket^{\textsc{VSA}}$ $\displaystyle=\bigcup_{j=1}^{k}\llbracket F^{i_{j}}(\dots)\rrbracket^{\textsc{VSA}}$ $\displaystyle=\bigcup_{j=1}^{k}\llbracket F^{i_{j}}(\dots)\rightarrow q^{l}\rrbracket^{\textsf{TA}}_{\Delta}$ $\displaystyle=\llbracket q^{l}\rrbracket^{\textsf{TA}}_{\Delta}$ ∎ ## 4\. Conclusion E-graphs became very popular in 2020-2021 with the publication of egg (Willsey et al., 2021) and a number of deductive synthesis/transformation papers based on it. By connecting e-graphs to tree automata, Pollock and Haan allowed a wealth of prior work to be applied to e-graphs. In particular, they solved the problem of e-graph intersection, making them usable in inductive synthesis. (Pollock and Haan, 2021) But, through another lens, they showed that much of the excitement around e-graphs may be better directed at tree automata. Our work furthers this story, showing that tree automata were secretly behind another of the past decade’s great advances in program synthesis, and promising to unite both communities in continuing to gain new techniques by study of tree automata. Finally, a word to all data structure designers: if ever you encounter a tree- like or DAG-like data structure with alternating levels of conjunction-esque and disjunction-esque nodes, you may be dealing with a tree automaton in disguise. ## References * (1) * Alet et al. (2021) Ferran Alet, Javier Lopez-Contreras, James Koppel, Maxwell Nye, Armando Solar-Lezama, Tomas Lozano-Perez, Leslie Kaelbling, and Joshua Tenenbaum. 2021. A Large-Scale Benchmark for Few-Shot Program Induction and Synthesis. In _International Conference on Machine Learning_. PMLR, 175–186. * Comon (1997) Hubert Comon. 1997\. Tree Automata Techniques and Applications. _http://www. grappa. univ-lille3. fr/tata_ (1997). * Gulwani (2011) Sumit Gulwani. 2011\. Automating String Processing in Spreadsheets using Input-Output Examples. _ACM Sigplan Notices_ 46, 1 (2011), 317–330. * Lau et al. (2003) Tessa Lau, Steven A Wolfman, Pedro Domingos, and Daniel S Weld. 2003. Programming by Demonstration Using Version Space Algebra. _Machine Learning_ 53, 1 (2003), 111–156. * Michon and Champarnaud (1998) Jean-Francis Michon and Jean-Marc Champarnaud. 1998. Automata and Binary Decision Diagrams. In _International Workshop on Implementing Automata_. Springer, 178–182. * Pollock and Haan (2021) Joshua Pollock and Altan Haan. 2021. E-Graphs Are Minimal Deterministic Finite Tree Automata (DFTAs) · Discussion #104 · egraphs-good/egg. https://github.com/egraphs-good/egg/discussions/104 * Polozov and Gulwani (2015) Oleksandr Polozov and Sumit Gulwani. 2015. FlashMeta: A Framework for Inductive Program Synthesis. In _Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications_. 107–126. * Premtoon et al. (2020) Varot Premtoon, James Koppel, and Armando Solar-Lezama. 2020\. Semantic Code Search via Equational Reasoning. In _Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation_. 1066–1082. * Stepp et al. (2011) Michael Stepp, Ross Tate, and Sorin Lerner. 2011. Equality-Based Translation Validator for LLVM. In _International Conference on Computer Aided Verification_. Springer, 737–742. * Wang et al. (2017) Xinyu Wang, Isil Dillig, and Rishabh Singh. 2017. Synthesis of Data Completion Scripts using Finite Tree Automata. _Proceedings of the ACM on Programming Languages_ 1, OOPSLA (2017), 1–26. * Willsey et al. (2021) Max Willsey, Chandrakana Nandi, Yisu Remy Wang, Oliver Flatt, Zachary Tatlock, and Pavel Panchekha. 2021\. Egg: Fast and Extensible Equality Saturation. _Proceedings of the ACM on Programming Languages_ 5, POPL (2021), 1–29.
arxiv-papers
2021-07-27T03:02:56
2024-09-04T03:07:20.442350
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "James Koppel", "submitter": "James Koppel", "url": "https://arxiv.org/abs/2107.12568" }
2107.12571
# CFLOW-AD: Real-Time Unsupervised Anomaly Detection with Localization via Conditional Normalizing Flows Denis Gudovskiy1 Shun Ishizaka2 Kazuki Kozuka2 1Panasonic AI Lab, USA 2Panasonic Technology Division, Japan [email protected] {ishizaka.shun, kozuka.kazuki}@jp.panasonic.com ###### Abstract Unsupervised anomaly detection with localization has many practical applications when labeling is infeasible and, moreover, when anomaly examples are completely missing in the train data. While recently proposed models for such data setup achieve high accuracy metrics, their complexity is a limiting factor for real-time processing. In this paper, we propose a real-time model and analytically derive its relationship to prior methods. Our CFLOW-AD model is based on a conditional normalizing flow framework adopted for anomaly detection with localization. In particular, CFLOW-AD consists of a discriminatively pretrained encoder followed by a multi-scale generative decoders where the latter explicitly estimate likelihood of the encoded features. Our approach results in a computationally and memory-efficient model: CFLOW-AD is faster and smaller by a factor of 10$\times$ than prior state-of-the-art with the same input setting. Our experiments on the MVTec dataset show that CFLOW-AD outperforms previous methods by 0.36% AUROC in detection task, by 1.12% AUROC and 2.5% AUPRO in localization task, respectively. We open-source our code with fully reproducible experiments111Our code is available at github.com/gudovskiy/cflow-ad. ## 1 Introduction Anomaly detection with localization (AD) is a growing area of research in computer vision with many practical applications _e.g_. industrial inspection [4], road traffic monitoring [20], medical diagnostics [44] _etc_. However, the common supervised AD [32] is not viable in practical applications due to several reasons. First, it requires labeled data which is costly to obtain. Second, anomalies are usually rare long-tail examples and have low probability to be acquired by sensors. Lastly, consistent labeling of anomalies is subjective and requires extensive domain expertise as illustrated in Figure 1 with industrial cable defects. Figure 1: An example of the proposed out-of-distribution (OOD) detector for anomaly localization trained on anomaly-free $\mathcal{D_{\mathrm{train}}}$ (top row). Sliced cable images are from the MVTec dataset [4], where the bottom row illustrates $\mathcal{D_{\mathrm{test}}}$ ground truth masks for anomalies (red) and the middle row shows examples of anomaly-free patches (green). The OOD detector learns the distribution of anomaly-free patches ${\bm{x}}$ with $p_{X}({\bm{x}})$ density and transforms it into a Gaussian distribution with $p_{Z}({\bm{z}})$ density. Threshold $\tau$ separates in- distribution patches from the OOD patches with $p_{\tilde{Z}}({\bm{z}})$ density. With these limitations of the supervised AD, a more appealing approach is to collect only unlabeled anomaly-free images for train dataset $\mathcal{D_{\mathrm{train}}}$ as in Figure 1 (top row). Then, any deviation from anomaly-free images is classified as an anomaly. Such data setup with low rate of anomalies is generally considered to be unsupervised [4]. Hence, the AD task can be reformulated as a task of out-of-distribution detection (OOD) with the AD objective. While OOD for low-dimensional industrial sensors (_e.g_. power-line or acoustic) can be accomplished using a common $k$-nearest-neighbor or more advanced clustering methods [10], it is less trivial for high-resolution images. Recently, convolutional neural networks (CNNs) have gained popularity in extracting semantic information from images into downsampled feature maps [4]. Though feature extraction using CNNs has relatively low complexity, the post-processing of feature maps is far from real-time processing in the state- of-the-art unsupervised AD methods [8]. To address this complexity drawback, we propose a CFLOW-AD model that is based on conditional normalizing flows. CFLOW-AD is agnostic to feature map spatial dimensions similar to CNNs, which leads to a higher accuracy metrics as well as a lower computational and memory requirements. We present the main idea behind our approach in a toy OOD detector example in Figure 1. A distribution of the anomaly-free image patches ${\bm{x}}$ with probability density function $p_{X}({\bm{x}})$ is learned by the AD model. Our translation-equivariant model is trained to transform the original distribution with $p_{X}({\bm{x}})$ density into a Gaussian distribution with $p_{Z}({\bm{z}})$ density. Finally, this model separates in-distribution patches ${\bm{z}}$ with $p_{Z}({\bm{z}})$ from the out-of-distribution patches with $p_{\tilde{Z}}({\bm{z}})$ using a threshold $\tau$ computed as the Euclidean distance from the distribution mean. ## 2 Related work We review models222For comprehensive review of the existing AD methods we refer readers to Ruff _et al_. [31] and Pang _et al_. [26] surveys. that employ the data setup from Figure 1 and provide experimental results for popular MVTec dataset [4] with factory defects or Shanghai Tech Campus (STC) dataset [22] with surveillance camera videos. We highlight the research related to a more challenging task of pixel-level anomaly localization (segmentation) rather than a more simple image-level anomaly detection. Napoletano _et al_. [25] propose to use CNN feature extractors followed by a principal component analysis and $k$-mean clustering for AD. Their feature extractor is a ResNet-18 [13] pretrained on a large-scale ImageNet dataset [16]. Similarly, SPADE [7] employs a Wide-ResNet-50 [43] with multi-scale pyramid pooling that is followed by a $k$-nearest-neighbor clustering. Unfortunately, clustering is slow at test-time with high-dimensional data. Thus, parallel convolutional methods are preferred in real-time systems. Numerous methods are based on a natural idea of generative modeling. Unlike models with the discriminatively-pretrained feature extractors [25, 7], generative models learn distribution of anomaly-free data and, therefore, are able to estimate a proxy metrics for anomaly scores even for the unseen images with anomalies. Recent models employ generative adversarial networks (GANs) [35, 36] and variational autoencoders (VAEs) [3, 38]. A fully-generative models [35, 36, 3, 38] are directly applied to images in order to estimate pixel-level probability density and compute per-pixel reconstruction errors as anomaly scores proxies. These fully-generative models are unable to estimate the exact data likelihoods [6, 24] and do not perform better than the traditional methods [25, 7] according to MVTec survey in [4]. Recent works [34, 15] show that these models tend to capture only low-level correlations instead of relevant semantic information. To overcome the latter drawback, a hybrid DFR model [37] uses a pretrained feature extractor with multi-scale pyramid pooling followed by a convolutional autoencoder (CAE). However, DFR model is unable to estimate the exact likelihoods. Another line of research proposes to employ a student-teacher type of framework [5, 33, 41]. Teacher is a pretrained feature extractor and student is trained to estimate a scoring function for AD. Unfortunately, such frameworks underperform compared to state-of-the-art models. Patch SVDD [42] and CutPaste [19] introduce a self-supervised pretraining scheme for AD. Moreover, Patch SVDD proposes a novel method to combine multi- scale scoring masks to a final anomaly map. Unlike the nearest-neighbor search in [42], CutPaste estimates anomaly scores using an efficient Gaussian density estimator. While the self-supervised pretraining can be helpful in uncommon data domains, Schirrmeister _et al_. [34] argue that large natural-image datasets such as ImageNet can be a more representative for pretraining compared to a small application-specific datasets _e.g_. industrial MVTec [4]. The state-of-the-art PaDiM [8] proposes surprisingly simple yet effective approach for anomaly localization. Similarly to [37, 7, 42], this approach relies on ImageNet-pretrained feature extractor with multi-scale pyramid pooling. However, instead of slow test-time clustering in [7] or nearest- neighbor search in [42], PaDiM uses a well-known Mahalanobis distance metric [23] as an anomaly score. The metric parameters are estimated for each feature vector from the pooled feature maps. PaDiM has been inspired by Rippel _et al_. [29] who firstly advocated to use this measure for anomaly detection without localization. DifferNet [30] uses a promising class of generative models called normalizing flows (NFLOWs) [9] for image-level AD. The main advantage of NFLOW models is ability to estimate the exact likelihoods for OOD compared to other generative models [35, 36, 3, 38, 37]. In this paper, we extend DifferNet approach to pixel-level anomaly localization task using our CFLOW-AD model. In contrast to RealNVP [9] architecture with global average pooling in [30], we propose to use conditional normalizing flows [2] to make CFLOW-AD suitable for low- complexity processing of multi-scale feature maps for localization task. We develop our CFLOW-AD with the following contributions: * • Our theoretical analysis shows why multivariate Gaussian assumption is a justified prior in previous models and why a more general NFLOW framework objective converges to similar results with the less compute. * • We propose to use conditional normalizing flows for unsupervised anomaly detection with localization using computational and memory-efficient architecture. * • We show that our model outperforms previous state-of-the art in both detection and localization due to the unique properties of the proposed CFLOW-AD model. Figure 2: Overview of our CFLOW-AD with a fully-convolutional translation- equivariant architecture. Encoder $h({\bm{\lambda}})$ is a CNN feature extractor with multi-scale pyramid pooling. Pyramid pooling captures both global and local semantic information with the growing from top to bottom receptive fields. Pooled feature vectors ${\bm{z}}^{k}_{i}$ are processed by a set of decoders $g_{k}({\bm{\theta}}_{k})$ independently for each $k$th scale. Our decoder is a conditional normalizing flow network with a feature input ${\bm{z}}^{k}_{i}$ and a conditional input ${\bm{c}}^{k}_{i}$ with spatial information from a positional encoder (PE). The estimated multi-scale likelihoods $p^{k}_{i}$ are upsampled to the input size and added up to produce anomaly map. ## 3 Theoretical background ### 3.1 Feature extraction with Gaussian prior Consider a CNN $h({\bm{\lambda}})$ trained for classification task. Its parameters ${\bm{\lambda}}$ are usually found by minimizing Kullback-Leibler ($D_{KL}$) divergence between joint train data distribution $Q_{{\bm{x}},{\bm{y}}}$ and the learned model distribution $P_{{\bm{x}},{\bm{y}}}({\bm{\lambda}})$, where $({\bm{x}},{\bm{y}})$ is an input-label pair for supervised learning. Typically, the parameters ${\bm{\lambda}}$ are initialized by the values sampled from the Gaussian distribution [12] and optimization process is regularized as $\operatorname*{arg\,min}_{{\bm{\lambda}}}D_{KL}\left[Q_{{\bm{x}},{\bm{y}}}\|P_{{\bm{x}},{\bm{y}}}({\bm{\lambda}})\right]+\alpha R({\bm{\lambda}}),$ (1) where $R({\bm{\lambda}})$ is a regularization term and $\alpha$ is a hyperparameter that defines regularization strength. The most popular CNNs [13, 43] are trained with $L_{2}$ weight decay [17] regularization ($R({\bm{\lambda}})=\|{\bm{\lambda}}\|_{2}^{2}$). That imposes multivariate Gaussian (MVG) prior not only to parameters ${\bm{\lambda}}$, but also to the feature vectors ${\bm{z}}$ extracted from the feature maps of $h({\bm{\lambda}})$ [11] intermediate layers. ### 3.2 A case for Mahalanobis distance With the same MVG prior assumption, Lee _et al_. [18] recently proposed to model distribution of feature vectors ${\bm{z}}$ by MVG density function and to use Mahalanobis distance [23] as a confidence score in CNN classifiers. Inspired by [18], Rippel _et al_. [29] adopt Mahalanobis distance for anomaly detection task since this measure determines a distance of a particular feature vector ${\bm{z}}$ to its MVG distribution. Consider a MVG distribution $\mathcal{N}({\bm{\mu}},{\bm{\Sigma}})$ with a density function $p_{Z}({\bm{z}})$ for random variable ${\bm{z}}\in\mathbb{R}^{D}$ defined as $p_{Z}({\bm{z}})=(2\pi)^{-D/2}\det{\bm{\Sigma}}^{-1/2}e^{-\frac{1}{2}({\bm{z}}-{\bm{\mu}})^{T}{\bm{\Sigma}}^{-1}({\bm{z}}-{\bm{\mu}})},$ (2) where ${\bm{\mu}}\in\mathbb{R}^{D}$ is a mean vector and ${\bm{\Sigma}}\in\mathbb{R}^{D\times D}$ is a covariance matrix of a true anomaly-free density $p_{Z}({\bm{z}})$. Then, the Mahalanobis distance $M({\bm{z}})$ is calculated as $M({\bm{z}})=\sqrt{({\bm{z}}-{\bm{\mu}})^{T}{\bm{\Sigma}}^{-1}({\bm{z}}-{\bm{\mu}})},$ (3) Since the true anomaly-free data distribution is unknown, mean vector and covariance matrix from (3) are replaced by the estimates $\hat{{\bm{\mu}}}$ and $\hat{{\bm{\Sigma}}}$ calculated from the empirical train dataset $\mathcal{D_{\mathrm{train}}}$. At the same time, density function $p_{\tilde{Z}}({\bm{z}})$ of anomaly data has different $\tilde{{\bm{\mu}}}$ and $\tilde{{\bm{\Sigma}}}$ statistics, which allows to separate out-of- distribution and in-distribution feature vectors using $M({\bm{z}})$ from (3). This framework with MVG distribution assumption shows its effectiveness in image-level anomaly detection task [29] and is adopted by the state-of-the-art PaDiM [8] model in pixel-level anomaly localization task. ### 3.3 Relationship with the flow framework Dinh _et al_. [9] introduce a class of generative probabilistic models called normalizing flows. These models apply change of variable formula to fit an arbitrary density $p_{Z}({\bm{z}})$ by a tractable base distribution with $p_{U}({\bm{u}})$ density and a bijective invertible mapping $g^{-1}:Z\rightarrow U$. Then, the $\log$-likelihood of any ${\bm{z}}\in Z$ can be estimated by $\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})=\log p_{U}({\bm{u}})+\log\left|\det{\bm{J}}\right|,$ (4) where a sample ${\bm{u}}\sim p_{U}$ is usually from standard MVG distribution $({\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}}))$ and a matrix ${\bm{J}}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}},{\bm{\theta}})$ is the Jacobian of a bijective invertible flow model $({\bm{z}}=g({\bm{u}},{\bm{\theta}})$ and ${\bm{u}}=g^{-1}({\bm{z}},{\bm{\theta}}))$ parameterized by vector ${\bm{\theta}}$. The flow model $g({\bm{\theta}})$ is a set of basic layered transformations with tractable Jacobian determinants. For example, $\log|\det{\bm{J}}|$ in RealNVP [9] coupling layers is a simple sum of layer’s diagonal elements. These models are optimized using stochastic gradient descent by maximizing $\log$-likelihood in (4). Equivalently, optimization can be done by minimizing the reverse $D_{KL}\left[\hat{p}_{Z}({\bm{z}},{\bm{\theta}})\|p_{Z}({\bm{z}})\right]$ [27], where $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ is the model prediction and $p_{Z}({\bm{z}})$ is a target density. The loss function for this objective is defined as $\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})-\log p_{Z}({\bm{z}})\right].$ (5) If $p_{Z}({\bm{z}})$ is distributed according to Section 3.1 MVG assumption, we can express (5) as a function of Mahalanobis distance $M({\bm{z}})$ using its definition from (3) as $\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\frac{M^{2}({\bm{z}})-E^{2}({\bm{u}})}{2}+\log\frac{|\det{\bm{J}}|}{\det{\bm{\Sigma}}^{-1/2}}\right],$ (6) where $E^{2}({\bm{u}})=\|{\bm{u}}\|_{2}^{2}$ is a squared Euclidean distance of a sample ${\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}})$ (detailed proof in Appendix A). Then, the loss in (6) converges to zero when the likelihood contribution term $|\det{\bm{J}}|$ of the model $g({\bm{\theta}})$ (normalized by $\det{\bm{\Sigma}}^{-1/2}$) compensates the difference between a squared Mahalanobis distance for ${\bm{z}}$ from the target density and a squared Euclidean distance for ${\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}})$. This normalizing flow framework can estimate the exact likelihoods of any arbitrary distribution with $p_{Z}$ density, while Mahalanobis distance is limited to MVG distribution only. For example, CNNs trained with $L_{1}$ regularization would have Laplace prior [11] or have no particular prior in the absence of regularization. Moreover, we introduce conditional normalizing flows in the next section and show that they are more compact in size and have fully-convolutional parallel architecture compared to [7, 8] models. ## 4 The proposed CFLOW-AD model ### 4.1 CFLOW encoder for feature extraction We implement a feature extraction scheme with multi-scale feature pyramid pooling similar to recent models [7, 8]. We define the discriminatively- trained CNN feature extractor as an encoder $h({\bm{\lambda}})$ in Figure 2. The CNN encoder maps image patches ${\bm{x}}$ into a feature vectors ${\bm{z}}$ that contain relevant semantic information about their content. CNNs accomplish this task efficiently due to their translation-equivariant architecture with the shared kernel parameters. In our experiments, we use ImageNet-pretrained encoder following Schirrmeister _et al_. [34] who show that large natural-image datasets can serve as a representative distribution for pretraining. If a large application-domain unlabeled data is available, the self-supervised pretraining from [42, 19] can be a viable option. One important aspect of a CNN encoder is its effective receptive field [21]. Since the effective receptive field is not strictly bounded, the size of encoded patches ${\bm{x}}$ cannot be exactly defined. At the same time, anomalies have various sizes and shapes, and, ideally, they have to be processed with the variable receptive fields. To address the ambiguity between CNN receptive fields and anomaly variability, we adopt common multi-scale feature pyramid pooling approach. Figure 2 shows that the feature vectors ${\bm{z}}^{k}_{i}\in\mathbb{R}^{D_{k}},i\in\\{H_{k}\times W_{k}\\}$ are extracted by $K$ pooling layers. Pyramid pooling captures both local and global patch information with small and large receptive fields in the first and last CNN layers, respectively. For convenience, we number pooling layers in the last to first layer order. ### 4.2 CFLOW decoders for likelihood estimation We use the general normalizing flow framework from Section 3.3 to estimate $\log$-likelihoods of feature vectors ${\bm{z}}$. Hence, our generative decoder model $g({\bm{\theta}})$ aims to fit true density $p_{Z}({\bm{z}})$ by an estimated parameterized density $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ from (1). However, the feature vectors are assumed to be independent of their spatial location in the general framework. To increase efficacy of distribution modeling, we propose to incorporate spatial prior into $g({\bm{\theta}})$ model using conditional flow framework. In addition, we model $\hat{p}^{k}_{Z}({\bm{z}},{\bm{\theta}})$ densities using $K$ independent decoder models $g_{k}({\bm{\theta}}_{k})$ due to multi-scale feature pyramid pooling setup. Our conditional normalizing flow (CFLOW) decoder architecture is presented in Figure 2. We generate a conditional vector ${\bm{c}}^{k}_{i}$ using a 2D form of conventional positional encoding (PE) [39]. Each ${\bm{c}}^{k}_{i}\in\mathbb{R}^{C_{k}}$ contains $\sin$ and $\cos$ harmonics that are unique to its spatial location $(h_{k},w_{k})_{i}$. We extend unconditional flow framework to CFLOW by concatenating the intermediate vectors inside decoder coupling layers with the conditional vectors ${\bm{c}}_{i}$ as in [2]. Then, the $k$th CFLOW decoder contains a sequence of conventional coupling layers with the additional conditional input. Each coupling layer comprises of fully-connected layer with $(D_{k}+C_{k})\times(D_{k}+C_{k})$ kernel, softplus activation and output vector permutations. Usually, the conditional extension does not increase model size since $C_{k}\ll D_{k}$. For example, we use the fixed $C_{k}=128$ in all our experiments. Our CFLOW decoder has translation- equivariant architecture, because it slides along feature vectors extracted from the intermediate feature maps with kernel parameter sharing. As a result, both the encoder $h({\bm{\lambda}})$ and decoders $g_{k}({\bm{\theta}}_{k})$ have convolutional translation-equivariant architectures. We train CFLOW-AD using a maximum likelihood objective, which is equivalent to minimizing loss defined by $\begin{split}\mathcal{L}({\bm{\theta}})&=D_{KL}\left[p_{Z}({\bm{z}})\right\|\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})]\approx\\\ &\frac{1}{N}\sum^{N}_{i=1}\left[\frac{\|{\bm{u}}_{i}\|_{2}^{2}}{2}-\log\left|\det{\bm{J}}_{i}\right|\right]+\text{const},\end{split}$ (7) where the random variable ${\bm{u}}_{i}=g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$, the Jacobian ${\bm{J}}_{i}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ for CFLOW decoder and an expectation operation in $D_{KL}$ is replaced by an empirical train dataset $\mathcal{D_{\mathrm{train}}}$ of size $N$. For brevity, we drop the $k$th scale notation. The derivation is given in Appendix B. After training the decoders $g_{k}({\bm{\theta}}_{k})$ for all $K$ scales using (7), we estimate test dataset $\mathcal{D_{\mathrm{test}}}$ $\log$-likelihoods as $\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},\hat{{\bm{\theta}}})=-\frac{\|{\bm{u}}_{i}\|_{2}^{2}+D\log(2\pi)}{2}+\log\left|\det{\bm{J}}_{i}\right|.$ (8) Next, we convert $\log$-likelihoods to probabilities $p^{k}_{i}=e^{\log\hat{p}_{Z}({\bm{z}}^{k}_{i},{\bm{c}}^{k}_{i},\hat{{\bm{\theta}}}_{k})}$ for each $k$th scale using (8) and normalize them to be in $\left[0:1\right]$ range. Then, we upsample $p^{k}_{i}$ to the input image resolution ($H\times W$) using bilinear interpolation ${\bm{P}}_{k}=b(p^{k})\in\mathbb{R}^{H\times W}$. Finally, we calculate anomaly score maps ${\bm{S}}^{H\times W}$ by aggregating all upsampled probabilities as ${\bm{S}}=\max_{\sum^{K}_{k=1}{\bm{P}}_{k}}-\sum^{K}_{k=1}{\bm{P}}_{k}$. Table 1: Complexity estimates for SPADE [7], PaDiM [8] and our CFLOW-AD. We compare train and test complexity as well as memory requirements. All models use the same encoder $h({\bm{\lambda}})$ setup, but diverge in the post-processing. SPADE allocates memory for a train gallery ${\mathbb{G}}$ used in $k$-nearest-neighbors. PaDiM keeps large matrices $({\bm{\Sigma}}^{k}_{i})^{-1},i\in\\{H_{k}\times W_{k}\\}$ for Mahalanobis distance. Our model employs trained decoders $g_{k}({\bm{\theta}}_{k})$ for post-processing. Model | Train | Test | Memory ---|---|---|--- SPADE [7] | ${\mathbb{G}}$ | $\sum\nolimits_{{\bm{v}}\in{\mathbb{G}}}\|{\bm{v}}-{\bm{z}}_{i}\|_{2}^{2}$ | ${\bm{\lambda}}+{\mathbb{G}}$ PaDiM [8] | ${\bm{\Sigma}}^{-1}_{i}$ | $M({\bm{z}}_{i})$ | ${\bm{\lambda}}+{\bm{\Sigma}}^{-1}_{i}$ Ours | $\mathcal{L}({\bm{\theta}})$ | $\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ | ${\bm{\lambda}}+{\bm{\theta}}$ ### 4.3 Complexity analysis Table 1 analytically compares complexity of CFLOW-AD and recent state-of-the- art models with the same pyramid pooling setup _i.e_. ${\bm{z}}^{k\in\\{1\ldots K\\}}=h({\bm{x}},{\bm{\lambda}})$. SPADE [7] performs $k$-nearest-neighbor clustering between each test point ${\bm{z}}^{k}_{i}$ and a gallery ${\mathbb{G}}$ of train data. Therefore, the method requires large memory allocation for gallery ${\mathbb{G}}$ and a clustering procedure that is typically slow compared to convolutional methods. PaDiM [8] estimates train-time statistics _i.e_. inverses of covariance matrices $({\bm{\Sigma}}^{k}_{i})^{-1}\in\mathbb{R}^{D_{k}\times D_{k}},i\in\\{H_{k}\times W_{k}\\}$ to calculate $M({\bm{z}}^{k}_{i})$ at test-time. Hence, it has low computational complexity, but it stores in memory $H_{k}\times W_{k}$ matrices of $D_{k}\times D_{k}$ size for every $k$th pooling layer. Our method optimizes generative decoders $g_{k}({\bm{\theta}}_{k})$ using (7) during the train phase. At the test phase, CFLOW-AD simply infers data $\log$-likelihoods $\log\hat{p}_{Z}({\bm{z}}_{i},{\bm{c}}_{i},\hat{{\bm{\theta}}})$ using (8) in a fully-convolutional fashion. Decoder parameters ${\bm{\theta}}_{k\in\\{1\ldots K\\}}$ are relatively small as reported in Table 6. ## 5 Experiments Table 2: Ablation study of CFLOW-AD using localization AUROC metric on the MVTec [4] dataset, %. We experiment with input image resolution ($H\times W$), encoder architecture (ResNet-18 (R18), WideResnet-50 (WRN50) and MobileNetV3L (MNetV3)), type of normalizing flow (unconditional (UFLOW) and conditional (CFLOW)), number of coupling (# of CL) and pooling layers (# of PL). Encoder | WRN50 | WRN50 | WRN50 | WRN50 | WRN50 | R18 | R18 | MNetV3 | MNetV3 ---|---|---|---|---|---|---|---|---|--- # of CL | 4 $\quad\longrightarrow\quad$ 8 | 8 | 8 | 8 | 8 | 8 | 8 | 8 # of PL | 2 | 2 $\quad\longrightarrow\quad$ 3 | 3 | 3 | 3 | 3 | 3 | 3 H$\times$W | 256 | 256 | 256 $\quad\longrightarrow\quad$ 512 | 512 | 256 $\quad\longrightarrow\quad$ 512 | 256 $\quad\longrightarrow\quad$ 512 Type | CFLOW | CFLOW | CFLOW | CFLOW $\rightarrow$ UFLOW | CFLOW | CFLOW | CFLOW | CFLOW Bottle | 97.28$\pm$0.03 | 97.24$\pm$0.03 | 98.76$\pm$0.01 | 98.98$\pm$0.01 | 98.83$\pm$0.01 | 98.47$\pm$0.03 | 98.64$\pm$0.01 | 98.74 | 98.92 Cable | 95.71$\pm$0.01 | 96.17$\pm$0.07 | 97.64$\pm$0.04 | 97.12$\pm$0.06 | 95.29$\pm$0.04 | 96.75$\pm$0.04 | 96.07$\pm$0.06 | 97.62 | 97.49 Capsule | 98.17$\pm$0.02 | 98.19$\pm$0.05 | 98.98$\pm$0.00 | 98.64$\pm$0.02 | 98.40$\pm$0.12 | 98.62$\pm$0.02 | 98.28$\pm$0.05 | 98.89 | 98.75 Carpet | 98.50$\pm$0.01 | 98.55$\pm$0.01 | 99.23$\pm$0.01 | 99.25$\pm$0.01 | 99.24$\pm$0.00 | 99.00$\pm$0.01 | 99.29$\pm$0.00 | 98.64 | 99.00 Grid | 93.77$\pm$0.05 | 93.88$\pm$0.16 | 96.89$\pm$0.02 | 98.99$\pm$0.02 | 98.74$\pm$0.00 | 93.95$\pm$0.04 | 98.53$\pm$0.01 | 94.75 | 98.81 Hazelnut | 98.08$\pm$0.01 | 98.13$\pm$0.02 | 98.82$\pm$0.01 | 98.89$\pm$0.01 | 98.88$\pm$0.01 | 98.81$\pm$0.01 | 98.41$\pm$0.01 | 98.88 | 99.00 Leather | 98.92$\pm$0.02 | 99.00$\pm$0.06 | 99.61$\pm$0.01 | 99.66$\pm$0.00 | 99.65$\pm$0.00 | 99.45$\pm$0.01 | 99.51$\pm$0.02 | 99.50 | 99.64 Metal Nut | 96.72$\pm$0.03 | 96.72$\pm$0.06 | 98.56$\pm$0.03 | 98.25$\pm$0.04 | 98.16$\pm$0.03 | 97.59$\pm$0.05 | 96.42$\pm$0.03 | 98.36 | 98.78 Pill | 98.46$\pm$0.02 | 98.46$\pm$0.01 | 98.95$\pm$0.00 | 98.52$\pm$0.05 | 98.20$\pm$0.08 | 98.34$\pm$0.02 | 97.80$\pm$0.05 | 98.69 | 98.44 Screw | 94.98$\pm$0.06 | 95.28$\pm$0.06 | 98.10$\pm$0.05 | 98.86$\pm$0.02 | 98.78$\pm$0.01 | 97.38$\pm$0.03 | 98.40$\pm$0.03 | 98.04 | 99.09 Tile | 95.52$\pm$0.02 | 95.66$\pm$0.06 | 97.71$\pm$0.02 | 98.01$\pm$0.01 | 97.98$\pm$0.02 | 95.10$\pm$0.02 | 95.80$\pm$0.10 | 96.07 | 96.48 Toothbrush | 98.02$\pm$0.03 | 97.98$\pm$0.00 | 98.56$\pm$0.02 | 98.93$\pm$0.00 | 98.89$\pm$0.00 | 98.44$\pm$0.02 | 99.00$\pm$0.01 | 98.09 | 98.80 Transistor | 93.09$\pm$0.28 | 94.05$\pm$0.11 | 93.28$\pm$0.40 | 80.52$\pm$0.13 | 76.28$\pm$0.14 | 92.71$\pm$0.23 | 83.34$\pm$0.46 | 97.79 | 95.22 Wood | 90.65$\pm$0.10 | 90.59$\pm$0.07 | 94.49$\pm$0.03 | 96.65$\pm$0.01 | 96.56$\pm$0.02 | 93.51$\pm$0.03 | 95.00$\pm$0.04 | 92.24 | 94.96 Zipper | 96.80$\pm$0.02 | 97.01$\pm$0.05 | 98.41$\pm$0.09 | 99.08$\pm$0.02 | 99.06$\pm$0.01 | 97.71$\pm$0.06 | 98.98$\pm$0.01 | 97.50 | 99.07 Average | 96.31 | 96.46 | 97.87 | 97.36 | 96.86 | 97.06 | 96.90 | 97.59 | 98.16 Table 3: The detailed comparison of PaDiM [8], SPADE [7], CutPaste [19] and our CFLOW-AD on the MVTec [4] dataset for every class using AUROC or, if available, a tuple (AUROC, AUPRO) metric, %. CFLOW-AD model is with the best hyperparameters from Section 5.2 ablation study. For fair comparison, we group together results with the same encoder architectures such as ResNet-18 and WideResNet-50. Task | Localization | Detection | Localization ---|---|---|--- Encoder | ResNet-18 | EffNetB4 | WideResNet-50 Class/Model | CutPaste | Ours | CutPaste | Ours | CutPaste | Ours | SPADE | PaDiM | Ours Bottle | 97.6 | 98.64 | 98.3 | 100.00 | 100.0 | 100.0 | (98.4, 95.5) | (98.3, 94.8) | (98.98, 96.80) Cable | 90.0 | 96.75 | 80.6 | 97.62 | 96.2 | 97.59 | (97.2, 90.9) | (96.7, 88.8) | (97.64, 93.53) Capsule | 97.4 | 98.62 | 96.2 | 93.15 | 95.4 | 97.68 | (99.0, 93.7) | (98.5, 93.5) | (98.98, 93.40) Carpet | 98.3 | 99.29 | 93.1 | 98.20 | 100.0 | 98.73 | (97.5, 94.7) | (99.1, 96.2) | (99.25, 97.70) Grid | 97.5 | 98.53 | 99.9 | 98.97 | 99.1 | 99.60 | (93.7, 86.7) | (97.3, 94.6) | (98.99, 96.08) Hazelnut | 97.3 | 98.81 | 97.3 | 99.91 | 99.9 | 99.98 | (99.1, 95.4) | (98.2, 92.6) | (98.89, 96.68) Leather | 99.5 | 99.51 | 100.0 | 100.00 | 100.0 | 100.0 | (97.6, 97.2) | (98.9, 88.8) | (99.66, 99.35) Metal Nut | 93.1 | 97.59 | 99.3 | 98.45 | 98.6 | 99.26 | (98.1, 94.4) | (97.2, 85.6) | (98.56, 91.65) Pill | 95.7 | 98.34 | 92.4 | 93.02 | 93.3 | 96.82 | (96.5, 94.6) | (95.7, 92.7) | (98.95, 95.39) Screw | 96.7 | 98.40 | 86.3 | 85.94 | 86.6 | 91.89 | (98.9, 96.0) | (98.5, 94.4) | (98.86, 95.30) Tile | 90.5 | 95.80 | 93.4 | 98.40 | 99.8 | 99.88 | (87.4, 75.9) | (94.1, 86.0) | (98.01, 94.34) Toothbrush | 98.1 | 99.00 | 98.3 | 99.86 | 90.7 | 99.65 | (97.9, 93.5) | (98.8, 93.1) | (98.93, 95.06) Transistor | 93.0 | 97.69 | 95.5 | 93.04 | 97.5 | 95.21 | (94.1, 87.4) | (97.5, 84.5) | (97.99, 81.40) Wood | 95.5 | 95.00 | 98.6 | 98.59 | 99.8 | 99.12 | (88.5, 97.4) | (94.9, 91.1) | (96.65, 95.79) Zipper | 99.3 | 98.98 | 99.4 | 96.15 | 99.9 | 98.48 | (96.5, 92.6) | (98.5, 95.9) | (99.08, 96.60) Average | 96.0 | 98.06 | 95.2 | 96.75 | 97.1 | 98.26 | (96.0, 91.7) | (97.5, 92.1) | (98.62, 94.60) ### 5.1 Experimental setup We conduct unsupervised anomaly detection (image-level) and localization (pixel-level segmentation) experiments using the MVTec [4] dataset with factory defects and the STC [22] dataset with surveillance camera videos. The code is in PyTorch [28] with the FrEIA library [1] used for generative normalizing flow modeling. Industrial MVTec dataset comprises 15 classes with total of 3,629 images for training and 1,725 images for testing. The train dataset contains only anomaly-free images without any defects. The test dataset contains both images containing various types of defects and defect-free images. Five classes contain different types of textures (carpet, grid, leather, tile, wood), while the remaining 10 classes represent various types of objects. We resize MVTec images without cropping according to the specified image resolution (_e.g_. $H\times W=256\times 256,512\times 512$ _etc_.) and apply $\pm 5^{\circ}$ augmentation rotations during training phase only. STC dataset contains 274,515 training and 42,883 testing frames extracted from surveillance camera videos and divided into 13 distinct university campus scenes. Because STC is significantly larger than MVTec, we experiment only with $256\times 256$ resolution and apply the same pre-processing and augmentation pipeline as for MVTec. We compare CFLOW-AD with the models reviewed in Section 2 using MVTec and STC datasets. We use widely-used threshold-agnostic evaluation metrics for localization: area under the receiver operating characteristic curve (AUROC) and area under the per-region-overlap curve (AUPRO) [4]. AUROC is skewed towards large-area anomalies, while AUPRO metric ensures that both large and small anomalies are equally important in localization. Image-level AD detection is reported by the AUROC only. We run each CFLOW-AD experiment four times on the MVTec and report mean ($\mu$) of the evaluation metric and, if specified, its standard deviation ($\pm\sigma$). For the larger STC dataset, we conduct only a single experiment. As in other methods, we train a separate CFLOW-AD model for each MVTec class and each STC scene. All our models use the same training hyperparameters: Adam optimizer with 2e-4 learning rate, 100 train epochs, 32 mini-batch size for encoder and cosine learning rate annealing with 2 warm-up epochs. Since our decoders are agnostic to feature map dimensions and have low memory requirements, we train and test CFLOW-AD decoders with 8,192 (32$\times$256) mini-batch size for feature vector processing. During the train phase 8,192 feature vectors are randomly sampled from 32 random feature maps. Similarly, 8,192 feature vectors are sequentially sampled during the test phase. The feature pyramid pooling setup for ResNet-18 and WideResnet-50 encoder is identical to PaDiM [8]. The effects of other architectural hyperparameters are studied in the ablation study. ### 5.2 Ablation study Table 2 presents a comprehensive study of various design choices for CFLOW-AD on the MVTec dataset using AUROC metric. In particular, we experiment with the input image resolution ($H\times W$), encoder architecture (ResNet-18 [13], WideResnet-50 [43], MobileNetV3L [14]), type of normalizing flow (unconditional (UFLOW) or conditional (CFLOW)), number of flow coupling layers (# of CL) and pooling layers (# of PL). Our study shows that the increase in number of decoder’s coupling layers from 4 to 8 gives on average 0.15% gain due to a more accurate distribution modeling. Even higher 1.4% AUROC improvement is achieved when processing 3-scale feature maps (layers 1, 2 and 3) compared 2-scale only (layers 2, 3). The additional feature map (layer 1) with larger scale ($H_{1}\times W_{1}=32\times 32$) provides more precise spatial semantic information. The conditional normalizing flow (CFLOW) is on average 0.5% better than the unconditional (UFLOW) due to effective encoding of spatial prior. Finally, larger WideResnet-50 outperforms smaller ResNet-18 by 0.81%. MobileNetV3L, however, could be a good design choice for both fast inference and high AUROC. Importantly, we find that the optimal input resolution is not consistent among MVTec classes. The classes with macro objects _e.g_. cable or pill tend to benefit from the smaller-scale processing (256$\times$256), which, effectively, translates to larger CNN receptive fields. Majority of classes perform better with 512$\times$512 inputs _i.e_. smaller receptive fields. Finally, we discover that the transistor class has even higher AUROC with the resized to 128$\times$128 images. Hence, we report results with the highest performing input resolution settings in the Section 5.3 comparisons. Table 4: Average AUROC and AUPRO on the MVTec [4] dataset, %. Both the best detection and localization metrics are presented, if available. CFLOW-AD is with WideResNet-50 encoder. Metric | AUROC | AUPRO ---|---|--- Model | Detection | Localization DifferNet [30] | 94.9 | - | - DFR [37] | - | 95.0 | 91.0 SVDD [42] | 92.1 | 95.7 | - SPADE [7] | 85.5 | 96.0 | 91.7 CutPaste [19] | 97.1 | 96.0 | - PaDiM [8] | 97.9 | 97.5 | 92.1 CFLOW-AD (ours) | 98.26 | 98.62 | 94.60 Table 5: Average AUROC on the STC [22] dataset, %. Both the best available detection and localization metrics are showed. CFLOW-AD is with WideResNet-50 encoder. Metric | AUROC ---|--- Model | Detection | Localization CAVGA [40] | - | 85.0 SPADE [7] | 71.9 | 89.9 PaDiM [8] | - | 91.2 CFLOW-AD (ours) | 72.63 | 94.48 ### 5.3 Quantitative comparison Table 4 summarizes average MVTec results for the best published models. CFLOW- AD with WideResNet-50 encoder outperforms state-of-the-art by 0.36% AUROC in detection, by 1.12% AUROC and 2.5% AUPRO in localization, respectively. Table 3 contains per-class comparison for the subset of models grouped by the task and type of encoder architecture. CFLOW-AD is on par or significantly exceeds the best models in per-class comparison with the same encoder setups. Table 5 presents high-level comparison of the best recently published models on the STC dataset. CFLOW-AD outperforms state-of-the-art SPADE [7] by 0.73% AUROC in anomaly detection and PaDiM [8] by 3.28% AUROC in anomaly localization tasks, respectively. Note that our CFLOW-AD models in Tables 3-4 use variable input resolution as discussed in the ablation study: 512$\times$512, 256$\times$256 or 128$\times$128 depending on the MVTec class. We used fixed 256$\times$256 input resolution in Table 5 for the large STC dataset to decrease training time. Other reference hyperparameters in Tables 4-5 are set as: WideResnet-50 encoder with 3-scale pooling layers, conditional normalizing flow decoders with 8 coupling layers. Figure 3: Examples of the input images with ground truth anomaly masks (top row) for various classes of the MVTec. Our CFLOW-AD model from Table 4 estimates anomaly score maps (middle row) and generates segmentation masks (bottom row) for a threshold selected to maximize F1-score. The predicted segmentation mask should match the corresponding ground truth as close as possible. Figure 4: Distribution of anomaly scores for the cable class from the MVTec learned by CFLOW-AD model from Table 4. Green density represent scores for the anomaly-free feature vectors, while region of red-color density shows scores for feature vectors with anomalies. The threshold $\tau$ is selected to optimize F1-score. ### 5.4 Qualitative results Figure 3 visually shows examples from the MVTec and the corresponding CFLOW-AD predictions. The top row shows ground truth masks from $\mathcal{D_{\mathrm{test}}}$ including examples with and without anomalies. Then, our model produces anomaly score maps (middle row) using the architecture from Figure 2. Finally, we show the predicted segmentation masks with the threshold selected to maximize F1-score. Figure 4 presents an additional evidence that our CFLOW-AD model actually addresses the OOD task sketched in Figure 1 toy example. We plot distribution of output anomaly scores for anomaly-free (green) and anomalous feature vectors (red). Then, CFLOW-AD is able to distinguish in-distribution and out- of-distribution feature vectors and separate them using a scalar threshold $\tau$. ### 5.5 Complexity evaluations Table 6: Complexity comparison in terms of inference speed (fps) and model size (MB). Inference speed for CFLOW-AD models from Table 3 is measured for (256$\times$256) / (512$\times$512) inputs. Complexity metric and Model | Inference speed, fps | Model size, MB ---|---|--- STC | MVTec R18 encoder only | 80 / 62 | 45 PaDiM-R18 [8] | 4.4 | 210 | 170 CFLOW-AD-R18 | 34 / 12 | 96 WRN50 encoder only | 62 / 30 | 268 SPADE-WRN50 [7] | 0.1 | 37,000 | 1,400 PaDiM-WRN50 [8] | 1.1 | 5,200 | 3,800 CFLOW-AD-WRN50 | 27 / 9 | 947 MNetV3 encoder only | 82 / 61 | 12 CFLOW-AD-MNetV3 | 35 / 12 | 25 In addition to analytical estimates in Table 1, we present the actual complexity evaluations for the trained models using inference speed and model size metrics. Particularly, Table 1 compares CFLOW-AD with the models from Tables 4-5 that have been studied by Defard _et al_. [8]. The model size in Table 6 is measured as the size of all floating-point parameters in the corresponding model _i.e_. its encoder and decoder (post- processing) models. Because the encoder architectures are identical, only the post-processing models are different. Since CFLOW-AD decoders do not explicitly depend on the feature map dimensions (only on feature vector depths), our model is significantly smaller than SPADE and PaDiM. If we exclude the encoder parameters for fair comparison, CFLOW-AD is 1.7$\times$ to 50$\times$ smaller than SPADE and 2$\times$ to 7$\times$ smaller than PaDiM. Inference speed in Table 6 is measured with INTEL I7 CPU for SPADE and PaDiM in Defard _et al_. [8] study with 256$\times$256 inputs. We deduce that this suboptimal CPU choice was made due to large memory requirements for these models in Table 6. Thus, their GPU allocation for fast inference is infeasible. In contrast, our CFLOW-AD can be processed in real-time with 8$\times$ to 25$\times$ faster inference speed on 1080 8GB GPU with the same input resolution and feature extractor. In addition, MobileNetV3L encoder provides a good trade-off between accuracy, model size and inference speed for practical inspection systems. ## 6 Conclusions We proposed to use conditional normalizing flow framework to estimate the exact data likelihoods which is infeasible in other generative models. Moreover, we analytically showed the relationship of this framework to previous distance-based models with multivariate Gaussian prior. We introduced CFLOW-AD model that addresses the complexity limitations of existing unsupervised AD models by employing fully-convolutional translation- equivariant architecture. As a result, CFLOW-AD is faster and smaller by a factor of 10$\times$ than prior models with the same input resolution and feature extractor setup. CFLOW-AD achieves new state-of-the-art for popular MVTec with 98.26% AUROC in detection, 98.62% AUROC and 94.60% AUPRO in localization. Our new state-of- the-art for STC dataset is 72.63% and 94.48% AUROC in detection and localization, respectively. Our ablation study analyzed design choices for practical real-time processing including feature extractor choice, multi-scale pyramid pooling setup and the flow model hyperparameters. ## References * [1] Lynton Ardizzone, Jakob Kruse, Carsten Rother, and Ullrich Köthe. Analyzing inverse problems with invertible neural networks. In Proceedings of the International Conference on Learning Representations (ICLR), 2019. * [2] Lynton Ardizzone, Carsten Lüth, Jakob Kruse, Carsten Rother, and Ullrich Köthe. Guided image generation with conditional invertible neural networks. arXiv:1907.02392, 2019. * [3] Christoph Baur, Benedikt Wiestler, Shadi Albarqouni, and Nassir Navab. Deep autoencoding models for unsupervised anomaly segmentation in brain MR images. arXiv:1804.04488, 2018. * [4] Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. MVTec AD – a comprehensive real-world dataset for unsupervised anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019. * [5] Paul Bergmann, Michael Fauser, David Sattlegger, and Carsten Steger. Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020. * [6] Paul Bergmann, Sindy Löwe, Michael Fauser, David Sattlegger, and Carsten Steger. Improving unsupervised defect segmentation by applying structural similarity to autoencoders. Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2019\. * [7] Niv Cohen and Yedid Hoshen. Sub-image anomaly detection with deep pyramid correspondences. arXiv:2005.02357v3, 2021. * [8] Thomas Defard, Aleksandr Setkov, Angelique Loesch, and Romaric Audigier. PaDiM: a patch distribution modeling framework for anomaly detection and localization. In Proceedings of the International Conference on Pattern Recognition (ICPR) Workshops, 2021. * [9] Laurent Dinh, Jascha Sohl-Dickstein, and Samy Bengio. Density estimation using real NVP. In Proceedings of the International Conference on Learning Representations (ICLR), 2017. * [10] Markus Goldstein and Seiichi Uchida. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLOS ONE, 2016. * [11] Ian J. Goodfellow, Yoshua Bengio, and Aaron Courville. Deep Learning. MIT Press, 2016. * [12] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2015. * [13] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2016. * [14] Andrew Howard, Mark Sandler, Grace Chu, Liang-Chieh Chen, Bo Chen, Mingxing Tan, Weijun Wang, Yukun Zhu, Ruoming Pang, Vijay Vasudevan, Quoc V. Le, and Hartwig Adam. Searching for MobileNetV3. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2019. * [15] Polina Kirichenko, Pavel Izmailov, and Andrew Gordon Wilson. Why normalizing flows fail to detect out-of-distribution data. In Advances in Neural Information Processing Systems, 2020. * [16] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. ImageNet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, 2012. * [17] Anders Krogh and John Hertz. A simple weight decay can improve generalization. In Advances in Neural Information Processing Systems, 1992. * [18] Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In Advances in Neural Information Processing Systems, 2018. * [19] Chun-Liang Li, Kihyuk Sohn, Jinsung Yoon, and Tomas Pfister. CutPaste: Self-supervised learning for anomaly detection and localization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021. * [20] Yingying Li, Jie Wu, Xue Bai, Xipeng Yang, Xiao Tan, Guanbin Li, Shilei Wen, Hongwu Zhang, and Errui Ding. Multi-granularity tracking with modularlized components for unsupervised vehicles anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2020. * [21] Wenjie Luo, Yujia Li, Raquel Urtasun, and Richard Zemel. Understanding the effective receptive field in deep convolutional neural networks. In Advances in Neural Information Processing Systems, 2016. * [22] Weixin Luo, Wen Liu, and Shenghua Gao. A revisit of sparse coding based anomaly detection in stacked RNN framework. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2017. * [23] Prasanta Chandra Mahalanobis. On the generalized distance in statistics. Proceedings of the National Institute of Sciences (Calcutta), 1936\. * [24] Eric Nalisnick, Akihiro Matsukawa, Yee Whye Teh, Dilan Gorur, and Balaji Lakshminarayanan. Do deep generative models know what they don’t know? In Proceedings of the International Conference on Learning Representations (ICLR), 2019. * [25] Paolo Napoletano, Flavio Piccoli, and Raimondo Schettini. Anomaly detection in nanofibrous materials by CNN-based self-similarity. Sensors, 2018. * [26] Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. Deep learning for anomaly detection: A review. ACM Comput. Surv., 2021. * [27] George Papamakarios, Eric Nalisnick, Danilo Jimenez Rezende, Shakir Mohamed, and Balaji Lakshminarayanan. Normalizing flows for probabilistic modeling and inference. Journal of Machine Learning Research, 2021. * [28] Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. Automatic differentiation in PyTorch. In Autodiff workshop at Advances in Neural Information Processing Systems, 2017. * [29] Oliver Rippel, Patrick Mertens, and Dorit Merhof. Modeling the distribution of normal data in pre-trained deep features for anomaly detection. arXiv:2005.14140, 2020. * [30] Marco Rudolph, Bastian Wandt, and Bodo Rosenhahn. Same same but DifferNet: Semi-supervised defect detection with normalizing flows. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2021. * [31] Lukas Ruff, Jacob Reinhard Kauffmann, Robert Vandermeulen, Gregoire Montavon, Wojciech Samek, Marius Kloft, Thomas G. Dietterich, and Klaus-Robert Müller. A unifying review of deep and shallow anomaly detection. Proc of the IEEE, 2021. * [32] Babak Saleh, Ali Farhadi, and Ahmed Elgammal. Object-centric anomaly detection by attribute-based reasoning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2013. * [33] Mohammadreza Salehi, Niousha Sadjadi, Soroosh Baselizadeh, Mohammad Hossein Rohban, and Hamid R. Rabiee. Multiresolution knowledge distillation for anomaly detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021. * [34] Robin Tibor Schirrmeister, Yuxuan Zhou, Tonio Ball, and Dan Zhang. Understanding anomaly detection with deep invertible networks through hierarchies of distributions and features. In Advances in Neural Information Processing Systems, 2020. * [35] Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Georg Langs, and Ursula Schmidt-Erfurth. f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Medical image analysis, 2019. * [36] Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Ursula Schmidt-Erfurth, and Georg Langs. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In International Conference on Information Processing in Medical Imaging, 2017. * [37] Yong Shi, Jie Yang, and Zhiquan Qi. Unsupervised anomaly segmentation via deep feature reconstruction. Neurocomputing, 2021. * [38] A. Vasilev, V. Golkov, M. Meissner, I. Lipp, E. Sgarlata, V. Tomassini, D.K. Jones, and D. Cremers. q-space novelty detection with variational autoencoders. MICCAI 2019 International Workshop on Computational Diffusion MRI, 2019. * [39] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Ł ukasz Kaiser, and Illia Polosukhin. Attention is all you need. In Advances in Neural Information Processing Systems, 2017. * [40] Shashanka Venkataramanan, Kuan-Chuan Peng, Rajat Vikram Singh, and Abhijit Mahalanobis. Attention guided anomaly localization in images. In Proceedings of the European Conference on Computer Vision (ECCV), 2020. * [41] Guodong Wang, Shumin Han, Errui Ding, and Di Huang. Student-teacher feature pyramid matching for unsupervised anomaly detection. arXiv:2103.04257, 2021. * [42] Jihun Yi and Sungroh Yoon. Patch SVDD: Patch-level SVDD for anomaly detection and segmentation. In Proceedings of the Asian Conference on Computer Vision (ACCV), 2020. * [43] Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. In Proceedings of the British Machine Vision Conference (BMVC), 2016\. * [44] Kang Zhou, Yuting Xiao, Jianlong Yang, Jun Cheng, Wen Liu, Weixin Luo, Zaiwang Gu, Jiang Liu, and Shenghua. Gao. Encoding structure-texture relation with P-Net for anomaly detection in retinal images. In Proceedings of the European Conference on Computer Vision (ECCV), 2020. ## Appendix A Relationship with the flow framework The loss function for the reverse $D_{KL}\left[\hat{p}_{Z}({\bm{z}},{\bm{\theta}})\|p_{Z}({\bm{z}})\right]$ objective [27], where $\hat{p}_{Z}({\bm{z}},{\bm{\theta}})$ is the model prediction and $p_{Z}({\bm{z}})$ is a target density, is defined as $\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})-\log p_{Z}({\bm{z}})\right].$ (5) The first term in (5) can be written using (4) definition for a standard MVG prior $({\bm{u}}\sim\mathcal{N}({\bm{0}},{\bm{I}}))$ as $\log\hat{p}_{Z}({\bm{z}},{\bm{\theta}})=\log(2\pi)^{-D/2}-E^{2}({\bm{u}})/2+\log\left|\det{\bm{J}}\right|,$ (5.1) where $E^{2}({\bm{u}})=\|{\bm{u}}\|_{2}^{2}$ is a squared Euclidean distance of ${\bm{u}}$. Similarly, the second term in (5) can be written for MVG density (2) using a square of Mahalanobis distance as $\log p_{Z}({\bm{z}})=\log(2\pi)^{-D/2}+\log\det{\bm{\Sigma}}^{-1/2}-M^{2}({\bm{z}})/2.$ (5.2) By substituting (5.1-5.2) into (5), the constants $\log(2\pi)^{-D/2}$ are eliminated and the loss is $\mathcal{L}({\bm{\theta}})=\mathbb{E}_{\hat{p}_{Z}({\bm{z}},{\bm{\theta}})}\left[\frac{M^{2}({\bm{z}})-E^{2}({\bm{u}})}{2}+\log\frac{|\det{\bm{J}}|}{\det{\bm{\Sigma}}^{-1/2}}\right].$ (6) ## Appendix B CFLOW decoders for likelihood estimation We train CFLOW-AD using a maximum likelihood objective, which is equivalent to minimizing the forward $D_{KL}$ objective [27] with the loss defined by $\mathcal{L}({\bm{\theta}})=D_{KL}\left[p_{Z}({\bm{z}})\right\|\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})],$ (7) where $\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})$ is a conditional normalizing flow (CFLOW) model with a condition vector ${\bm{c}}\in\mathbb{R}^{C}$. The target density $p_{Z}({\bm{z}})$ is usually replaced by a constant because the parameters ${\bm{\theta}}$ do not depend on this density during gradient- based optimization. Then by analogy with unconditional flow (4), the loss (7) for $\hat{p}_{Z}({\bm{z}},{\bm{c}},{\bm{\theta}})$ can be written as $\mathcal{L}({\bm{\theta}})=-\mathbb{E}_{p_{Z}({\bm{z}})}\left[\log p_{U}({\bm{u}})+\log\left|\det{\bm{J}}\right|\right]+\text{const}.$ (7.1) In practice, the expectation operation in (7.1) is replaced by an empirical train dataset $\mathcal{D_{\mathrm{train}}}$ of size $N$. Using the definition of base distribution with $p_{U}({\bm{u}})$, the final form of (7) can be expressed as $\mathcal{L}({\bm{\theta}})\approx\frac{1}{N}\sum^{N}_{i=1}\left[\frac{\|{\bm{u}}_{i}\|_{2}^{2}}{2}-\log\left|\det{\bm{J}}_{i}\right|\right]+\text{const},$ (7.2) where the random variable ${\bm{u}}_{i}=g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ and the Jacobian ${\bm{J}}_{i}=\nabla_{{\bm{z}}}g^{-1}({\bm{z}}_{i},{\bm{c}}_{i},{\bm{\theta}})$ depend both on input features ${\bm{z}}_{i}$ and conditional vector ${\bm{c}}_{i}$ for CFLOW model.
arxiv-papers
2021-07-27T03:10:38
2024-09-04T03:07:20.453433
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Denis Gudovskiy, Shun Ishizaka, Kazuki Kozuka", "submitter": "Denis Gudovskiy", "url": "https://arxiv.org/abs/2107.12571" }
2107.12577
# Quantum control of nuclear spin qubits in a rapidly rotating diamond A. A. Wood [email protected] School of Physics, University of Melbourne, Victoria 3010, Australia R. M. Goldblatt School of Physics, University of Melbourne, Victoria 3010, Australia R. E. Scholten School of Physics, University of Melbourne, Victoria 3010, Australia A. M. Martin School of Physics, University of Melbourne, Victoria 3010, Australia ###### Abstract Nuclear spins in certain solids couple weakly to their environment, making them attractive candidates for quantum information processing and inertial sensing. When coupled to the spin of an optically-active electron, nuclear spins can be rapidly polarized, controlled and read via lasers and radiofrequency fields. Possessing coherence times of several milliseconds at room temperature, nuclear spins hosted by a nitrogen-vacancy center in diamond are thus intriguing systems to observe how classical physical rotation at quantum timescales affects a quantum system. Unlocking this potential is hampered by precise and inflexible constraints on magnetic field strength and alignment in order to optically induce nuclear polarization, which restricts the scope for further study and applications. In this work, we demonstrate optical nuclear spin polarization and rapid quantum control of nuclear spins in a diamond physically rotating at $1\,$kHz, faster than the nuclear spin coherence time. Free from the need to maintain strict field alignment, we are able to measure and control nuclear spins in hitherto inaccessible regimes, such as in the presence of a large, time-varying magnetic field that makes an angle of more than $100^{\circ}$ to the nitrogen-lattice vacancy axis. The field induces spin mixing between the electron and nuclear states of the qubits, decoupling them from oscillating rf fields. We are able to demonstrate that coherent spin state control is possible at any point of the rotation, and even for up to six rotation periods. We combine continuous dynamical decoupling with quantum feedforward control to eliminate decoherence induced by imperfect mechanical rotation. Our work liberates a previously inaccessible degree of freedom of the NV nuclear spin, unlocking new approaches to quantum control and rotation sensing. ## I Introduction Robust solid state substrates such as diamond confer an important advantage to the spin qubits hosted within: coherent operation in real-world environments at room temperature. This makes diamond quantum sensors promising probes of physical phenomena in demanding environments, such as rotation at timescales commensurate with quantum decoherence [1, 2]. Employing color-center based spin qubits as precision quantum sensors in a range of applications is rapidly evolving, and understanding how quantum spins in solids behave when motional and rotational degrees of freedom are present is becoming of critical importance [3, 4, 5, 6, 7]. Of the many known solid state color-centers, the nitrogen-vacancy center in diamond [8, 9] is the most widely studied and, for quantum applications, the most eminently promising. While much interest is focused on the remarkable properties of the negatively- charged NV- center (hereafter simply NV) electron spin, the intrinsic nuclear spin hosted within the defect underpins some of the most important emerging applications. Unlike 13C nuclear spins, which are randomly distributed about the diamond lattice, the 14N or 15N nitrogen nucleus is intrinsic to every NV center, an attractive feature for scalable quantum processors and memories based on nuclear spins [10, 11] as well as multi-modal ancilla based sensing [12, 13]. Featuring millisecond-long coherence times due to isolation from the environment [14, 15], the intrinsic nuclear spin is also an eminently feasible system to probe the interplay between classical rotation and quantum angular momentum, having found applications in quantum rotation sensing [16, 17, 18, 19, 20, 21] and quantum information processing [22]. Accessing the nuclear degree of freedom and its myriad benefits in the rotating frame first requires nuclear spin hyperpolarization, which can be achieved using the electron spin. While a range of alternative methods exist [23, 24, 25, 26, 27, 28], the simplest and fastest method uses a magnetic field applied precisely parallel to the N-V axis, which induces an avoided crossing in the NV excited state triplet [29]. At this excited-state level anti-crossing (ESLAC), $B\sim 500$ G, the NV $m_S=0$ and $m_S=-1$ states approach degeneracy in the excited state. During optical illumination, coupled electron-nuclear spin states undergo spin-conserving flip-flop transitions that, with further optical cycling, result in a transfer of population to a single nuclear spin sublevel $m_I$. This process, which can be completed with a single $5$-$10\,\upmu$s laser pulse, also results in nuclear state-dependent fluorescence and enables optical quantum state readout [30, 31]. The optical polarization procedure described above is relatively insensitive to magnetic field strength [31], but misalignments of less than a degree from the NV axis are sufficient to totally suppress optically-mediated nuclear spin polarization and readout [29]. Polarization at high magnetic fields is desirable due to the enhanced nuclear gyromagnetic ratio ($20\times$ higher at 500 G [32] than at zero field), enabling fast quantum gate operations. As a consequence, the NV-nuclear spin system typically must be deployed with the strict condition of magnetic field alignment parallel to the NV axis. This inflexible requirement severely restricts the usefulness of nuclear spins in scenarios where the motional and rotational degrees of freedom of a quantum system are not fixed [33, 34, 35, 4]. However, precise magnetic field alignment is only necessary for the optical polarization and readout procedure, and is not necessary to coherently _control_ the nuclear spin. In this work, we overcome the restrictive, inflexible conditions of optically- induced nuclear hyperpolarization in a truly demanding sensing environment: a frame physically rotating at 1 kHz, faster than the quantum decoherence rate. In our experiment, a (100)-cut diamond is mounted so that one NV orientation class makes a $54.7^{\circ}$ angle to the rotation axis, and a $\sim$500 G magnetic field is aligned so that at a given initialization time, within a narrow window, the nuclear spin can be optically polarized via the ESLAC. Beyond this alignment window, the NV axis and magnetic field are free to assume any possible relative orientation dictated by the rotation of the diamond. Resonant radiofrequency fields can then be applied to drive the nuclear spins, with optical readout occurring when the NV-magnetic field alignment is reached again after one period. We are thus able to study for the first time the NV nuclear spin at high fields free from the restrictions of precise magnetic field alignment, performing first-time measurements that are virtually impossible with a stationary diamond. Rapid rotation in the presence of a large off-axis field represents a significant perturbation to the NV-nuclear spin system, inducing mixing between electron and nuclear spin states. The rotation is also mechanical, and thus subject to the vicissitudes of mechanically-driven processes such as period jitter and drift which invariably impact the coherence of the rotating qubits. We use feedforward control to eliminate the significant frequency shifts imposed by the off-axis magnetic field and dynamical decoupling to suppress the deleterious aspects of mechanical rotation. This quantum decoupling sequence can be made to eliminate _any_ detectable effects of physical rotation on-demand: preserving the nuclear spins through an entire cycle of rotation in the presence of a noisy perturbation and demonstrating the precise level of control our experiments can achieve. ## II Experiment Rapid physical rotation on the order of the NV electron spin coherence time $T_2\sim 100\,\upmu$s imposes significant but achievable demands on the stability and reproducibility of mechanical rotation. In previous work, we have demonstrated quantum control and measurement of single NV electron spins rotating at up to 200,000 rpm ($3.33\,$kHz) [36, 37]. Working with ensembles of NV centers reduces some of the complexity associated with optical measurement of a rotating diamond [1, 38]. However, magnetic field alignment during rotation for optical polarization of nuclear spins imposes challenges comparable to that of measuring single NV centers, given the strict requirements for alignment. A schematic of our experiment is depicted in Figure 1(a) and more details can be found in Ref. 111See Supplemental Material.. An electronic grade diamond (ppb N concentration, Element6) containing an ensemble of NV centers is mounted on its (100) face to the end of the shaft of a high-speed electric motor. A $480\,$G magnetic field from a permanent magnet is applied at a $54.7^{\circ}$ angle to the rotation axis. Spinning at $1\,$kHz, the motor controller generates a timing signal that is fed into a delay generator to trigger laser, radiofrequency and microwave pulses synchronous with the diamond rotation [36]. Adjusting the delay time effectively controls the azimuthal angle of the diamond, which is then set so that the NV and magnetic field are precisely aligned at a particular time during the rotation. A microscope objective on a three-axis piezo scanner focuses $1\,$mW of 532 nm laser light near the exact rotation center of the diamond. The green light optically pumps the NV and its nuclear spin into the $|m_S=0,m_I=+1\rangle$ state, and the same objective lens collects the emitted red fluorescence and directs it to an avalanche photodiode, forming a confocal microscope. Figure 1: Rotating diamond experiment and NV energy levels (a) Schematic of the experiment: a diamond containing an ensemble of NV centers is rotated by an electric motor at $1\,$kHz. A $480\,$G magnetic field is applied so that at a particular azimuthal rotation angle, the field momentarily aligns with the NV axis, polarizing the host 14N nuclear spin. Radiofrequency (microwave) fields are generated by a coil (wire) antenna (lower panel) and are used with a 532 nm laser to prepare, read and control the NV and its nuclear spin. (b) NV energy levels, showing nuclear spin rf transitions, excited state level anti-crossing and optical pumping process. ## III Optical polarization An NV electron spin state can be optically pumped to almost $100\,\%$ polarization within one microsecond [40, 41]. The nuclear spin polarization process is slower, typically taking up to five or more microseconds to complete [31]. The degree of polarization also depends on the magnetic field strength [42]. In our experiments, the temporal dependence of optical pumping is convolved with the angular variation of the magnetic field alignment imposed by rotation, and therefore the nuclear spin polarization efficiency is also affected by rotation. To understand this effect, we study the time- dependent photoluminescence (PL) emitted from the NV during optical pumping. Figure 2: Quantum state measurement and control of a rotating ensemble of nuclear spins. (a) Ensemble NV PL as a function of time while rotating at 1 kHz, with the laser switched on approximately 10$\upmu$s before the NV and magnetic field come into alignment. When this occurs, optical pumping polarises the 14NV into the $|m_S=0,m_I=+1\rangle$ state, which exhibits brighter fluorescence. After this point, the laser depolarizes the nuclear spin, leading to a characteristic $4\,\upmu$s-wide Gaussian profile in time, equivalent to a $1.2\,^{\circ}$ angular window where polarization of the nuclear spin is possible. (b) State dependence of NV PL while rotating (left). Optimizing the fluorescent contrast (right) amounts to timing the laser pulse to activate on the rising edge of the Gaussian feature (approximately 2$\upmu$s from the peak) and subsequently extinguish without depolarizing the spin ensemble. We find that between 2-3 $\upmu$s yields optimum results. (c) A variable duration pulse of resonant (5.1 MHz) rf is applied immediately following nuclear polarization. The diamond then rotates a full period before state readout, and we observe Rabi oscillations (blue circles). We can also first apply a resonant $\pi$-pulse after polarization, which flips the nuclear spin into the dark $m_I=0$ state before applying a variable duration rf pulse after a rotation period (orange squares). After first ensuring optimum optical pumping while stationary 222See Supplementary Information [URL], we then studied the nuclear spin polarization dynamics while the diamond was rotating. Figure 2(a) depicts the measured photoluminescence as the NV axis approaches alignment with the magnetic field, $t_p=8\,\upmu$s after the laser is switched on. For meaningful quantum measurement, we must detect the difference in brightness dependent on the 14N spin state. We reduced $t_p$ so that the laser switched on just before the NV axis and magnetic field are aligned, and observe a difference in fluorescence when an rf $\pi$-pulse is applied prior to readout (Fig. 2(b)). If the laser is not promptly extinguished, the light rapidly depolarizes the 14N beyond the point where the magnetic field and the NV axis are aligned. The nuclear spin polarization is therefore limited to what is possible within the narrow window depicted in Fig. 2(b). The maximum fluorescence contrast (and thus nuclear spin polarization) is markedly lower while rotating compared to stationary ($2.5\,\%$ vs. $6\,\%$). Nevertheless, we were able to perform and unambiguously detect quantum spin manipulations on the rotating ensemble. We varied the duration of the rf pulse, tracing out time-domain Rabi oscillations with the nuclear spin first initialized into the $|m_S=0,m_I=+1\rangle$ state after optical pumping. In a further experiment, we applied a resonant $\pi$-pulse and a variable-duration rf pulse at the start and end of the cycle respectively, and thus measured Rabi oscillations from the nuclear spin initialized to the $|m_S=0,m_I=0\rangle$ state. The nuclear (and electron) spin adiabatically follows the quantization axis set by the NV zero-field splitting and magnetic field during the rotation. The second measurement in Fig 2(c) effectively confirms this adiabaticity, since the NV electron and nuclear spin state is the same at the start and end of the rotation. ## IV Electron-nuclear spin-mixing Rotation in the presence of a large field imparts a significant perturbation, effectively tilting the magnetic field from $0$ to $109^{\circ}$ and back, which results in strong, time-dependent mixing of the electron and nuclear spin levels. Mixing of the electron spin levels augments the nuclear spin energies, resulting in larger perturbations to the nuclear spin transition frequencies than that of the magnetic field alone. Misalignment of the magnetic field not only suppresses nuclear spin polarisation, it also quenches the fluorescence of the NV electron spin [44] for much smaller fields than that used in this work. Rotation of the diamond therefore provides us with a unique means of studying both the NV and its nuclear spin in hitherto inaccessible regimes of magnetic field strength and alignment. Before further experimental investigation, we consider the Hamiltonian of the NV-14N system and the effects of a large, time-dependent off-axis magnetic field. For the electron spin $\bm{S}$ and nuclear spin $\bm{I}$ (both spin-1), the interaction Hamiltonian is $\displaystyle H$ $\displaystyle=D_\text{zfs}S_z^{2}-\gamma_e\bm{S}\cdot\bm{B}-\gamma_n\bm{I}\cdot\bm{B}+QI_z^{2}$ (1) $\displaystyle+A_\parallel S_zI_z+A_\perp(S_xI_x+S_yI_y).$ Here, $D_\text{zfs}/2\pi=2.870\,$GHz is the NV zero-field splitting, $\gamma_e/2\pi=-2.8$ MHz G-1 and $\gamma_n/2\pi=307\,$Hz G-1 the electron and nuclear gyromagnetic ratios, $Q/2\pi=-4.9457\,$ MHz [31] the nuclear quadrupolar splitting and $A_\parallel/2\pi=-2.162\,$MHz and $A_\perp/2\pi=-2.62\,$MHz the longitudinal and transverse coupling constants for the electron-nuclear hyperfine interaction, respectively. It is simplest to include the effects of physical rotation by considering the magnetic field as initially parallel to the NV axis and rotating about an axis $z^{\prime}$. In our case $z^{\prime}$ makes an angle of $54.7^{\circ}$ to the diamonds rotation axis due to the $\langle 100\rangle$ cut. In Figure 3(a), we project the instantaneous eigenstates of $H(t)$ on to the bare eigenvectors of $H(0)$ for the initial configuration of electron and nuclear spin state that follows immediately after optical pumping, that is, $|m_S=0,m_I=+1\rangle$. This state adiabatically evolves into an almost equal superposition of $m_I=\pm 1$ nuclear spin states, before returning to the initial state at the completion of the rotation. Figure 3: State mixing in the electron and nuclear spin manifolds of the NV-14N system. (a) Initialized to the $|m_S,m_I\rangle=|0,+1\rangle$ ground state, we project the corresponding instantaneous eigenstate of $H(\phi_\text{rot})$ onto the bare eigenstates of $H$ when the field is aligned to the NV axis. (b) Experimental pulse sequence used: a laser pulse optically pumps the NV-nuclear spin, followed by an rf pulse with swept frequency is applied after a variable delay time, and after a full period the resultant spin state is read out. (c,top) NODMR contrast as a function of rf frequency and delay time. (c, bottom) Fitted center frequency extracted from Gaussian fits to the data in (b). Overlaid is the theoretical prediction derived from solving for the instantaneous energies of the system Hamiltonian. Error bars are smaller than data points, and represent standard error of fits. To proceed further, we next consider driving the nuclear spin in the intervening regime with rf, where the NV-magnetic field angle is significant. We perform NODMR spectroscopy at different stages of the rotation by controlling the time between rf $\pi$-pulse ($t_\pi=7\,\upmu$s when stationary) and laser readout ($1\,\upmu$s) at a rotational speed of 1 kHz. We extract the resonance frequency from Gaussian fits to the data shown in Fig 3(c, top) and compare against the expected NODMR transition frequency predicted by solving for the eigenvalues of $H(t)$ for the known magnetic field strength ($480\,$G), which shows remarkably good agreement. The time offset is attributed to the extended duration of the rf pulses: while the rf Rabi $\pi$-pulse is $t_\pi\approx 7\,\upmu$s while stationary near the field alignment point, we must increase the pulse duration to $20\,\upmu$s in order to see any contrast for delay times where the magnetic field is at a significant angle. We used a coil antenna that produces rf fields parallel to the rotation axis, which should therefore result in a rotationally-symmetric rf rabi frequency. That we see significant azimuthal angular dependence of the rf coupling as the diamond rotates implies some other interaction is at work. ## V Nuclear spin de-augmentation To better understand why the rf coupling is reduced, we examine several key aspects of how the nuclear spin, augmented by the NV electron spin, couples to the rf field. At the ESLAC and when $B$ is parallel to the NV axis, the observed rf Rabi frequencies are $\alpha_0\sim 20$ times what would be predicted based purely on the ${}^{14}N$ gyromagnetic ratio, $\gamma_{14N}/2\pi=307.7\,$Hz/G, due to the presence of the NV electron spin [32, 45]. The electronic augmentation stems from the transverse hyperfine coupling interaction, which is quantified by the constant $A_\perp$. In the presence of an off-axis magnetic field, the effective hyperfine coupling has different components parallel and perpendicular to the new quantization axis $z^{\prime}$, which is no longer parallel to the NV axis. The Hamiltonian $H$ in Eq. 1 is diagonalized by the transformation $P^{-1}HP=E$, with $P$ the matrix of eigenvectors and $E$ a diagonal matrix of energy eigenvalues. To reveal the augmentation of the nuclear spin gyromagnetic ratio, we transform the rf coupling Hamiltonian $H_\text{rf}=B_\text{rf}(t)\left(\gamma_eS_x+\gamma_NI_x\right)$ into the basis where $H$ is diagonal, $H^{\prime}_\text{rf}=P^{-1}H_\text{rf}P$. Eliminating the time dependence of $H_\text{rf}$ with the rotating-wave approximation and computing the matrix element corresponding to the nuclear spin transition of interest, in this case, $|m_S=0,m_I=+1\rangle\rightarrow|0,0\rangle$, we have $\alpha_0=\frac{1}{\gamma_NB_\text{rf,0}}\langle 0,0|H^{\prime}_\text{rf}|0,+1\rangle$ (2) for $B||z$ and $B_\text{rf,0}$ the amplitude of the oscillating field. When the diamond is rotated, the increasingly off-axis magnetic field tilts the quantization axis further from the NV axis. Since the nuclear spin eigenenergies never approach degeneracy (and the rotation rate $f=1/T$ is slow and thus adiabatic), we can denote the instantaneous eigenstates as $|\eta(t)\rangle$ and $|\zeta(t)\rangle$, with $|\eta(0)\rangle=|\eta(T)\rangle=|0,+1\rangle$ and $|\zeta(0)\rangle=|\zeta(T)\rangle=|0,0\rangle$. We then extract the effective augmentation factor $\alpha^{\prime}_0(t)=1/\gamma_NB_\text{rf,0}\langle\zeta(t)|H^{\prime}_\text{rf}(t)|\eta(t)\rangle.$ (3) In our previous experiment, the rf field was roughly parallel to the rotation axis. A purely geometric argument, whereby $\Omega(t)\sim|\hat{\bm{n}}(t)\times\bm{B}_\text{rf}|$, would have the Rabi frequency remain constant across the rotation. The tilted quantization axis due to the magnetic field results in a significant reduction of the rf Rabi frequency through a rotation cycle. Our experiment gives us a unique opportunity to detect this effect, given that the angle between the NV and magnetic field is free to assume any angle after (and before) optical polarization (readout). In the next section, we compare experimental measurements of this effect with theory. ## VI Feed-forward quantum control To further characterize the time/angle dependence of gyromagnetic augmentation, we would ideally measure the rf Rabi frequency across the full rotation in an experiment. However, the large, rapid changes in the transition energy (Fig. 3(c)), far exceeding our maximum achievable Rabi frequency ($70\,$kHz), preclude straightforward investigation. We tackle this problem by applying feed-forward quantum control. With the data in Fig. 3(c) as a guide, we can synthesize a sine wave signal, frequency modulated in a manner set by the angular variation of the two-level splitting using an arbitrary waveform generator (AWG). This feed-forward ensures the rf frequency is always close to resonance with the nuclear spin throughout the rotation cycle, as shown in Fig. 6(a), eliminating to a significant extent the strong modulation of the transition energy imparted by the off-axis magnetic field. We determine the feedforward waveform by first measuring the frequency $f_0$ of the nuclear spin transition (while stationary) to a precision of better than 100 Hz with optimized magnetic field alignment. From this, we then compute the FM profile by diagonalizing Eq. 1 for the equivalent magnetic field $B_0$ at each azimuthal angle corresponding to the experiment time, assuming that at the peak alignment point $\theta_B\approx 0$ and $\theta_{NV}=54.7^{\circ}$. Using just this simple assumption, we can obtain high-fidelity rf pulses at any point of the rotation. Figure 4: Feed-forward quantum control of nuclear spins in a rapidly rotating diamond. (a) Using the observed variation of the $|0,+1\rangle\rightarrow|0,0\rangle$ transition frequency with rotation angle, we generate a frequency-modulated rf signal using an AWG that ensures the rf is always resonant with the nuclear spin transition. The rf is digitally gated synchronous with the rotation after a delay time $t_d$, and Rabi oscillations are traced out by varying the gate time. (b) We are able to drive near- resonant Rabi oscillations at any point in the rotation which markedly slow down due to the time-varying electron-nuclear spin augmentation. Error bars derive from photon counting statistics. (c) The relative variation of the Rabi frequency matches well with a fully-constrained model of the effective nuclear gyromagnetic ratio, based on Eq. 3. Error bars represent uncertainty in fitted Rabi frequencies. We then initiate Rabi oscillations at a delay time $t_D$ with a variable- duration gated rf pulse from the AWG. The results are shown in Fig. 4(b), and in Fig. 4(c) we plot the extracted Rabi frequency. Our experimental results are well explained by the model and the arguments based on the loss of gyromagnetic augmentation induced by an off-axis magnetic field, Eq. 3. Despite the reduced rf coupling, we are able to control the quantum state of the nuclear spin at essentially any point throughout the rotation, which enables us to then deploy interferometric measurement sequences to quantify the coherence of the rotating nuclear spin. ## VII Coherence of rotating nuclear spins The results of the previous section allow us to map out the angular variation of the rf Rabi frequency and adjust the pulse durations in a multiple-pulse sequence such as Ramsey interferometry, or spin-echo. As the control signal is generated by an arbitrary waveform generator, we have the freedom of absolute phase control of the rf at any point of the rotation. To measure the ensemble dephasing time $T_2^{\ast}$ of the nuclear spins, we use a Ramsey pulse sequence, $\pi/2-\tau-\pi/2$ and vary the phase of the final rf $\pi/2$-pulse to trace out fringes. This way, phase shifts induced by an imperfect feedforward profile do not affect the perceived fringe visibility. The spin coherence time $T_2$ is measured using a $\pi/2-\tau/2-\pi-\tau/2-\pi/2$ spin- echo sequence, where again the phase of the final rf pulse is varied to measure the fringe amplitude. An additional control parameter is the time the pulse sequence starts at, $t_D$, which allows us to select the state superpositions used in the interferometry sequence. Figure 5(a,b) shows the pulse sequence, Ramsey and spin-echo data with the extracted fringe phase and amplitude for $t_D=0$ and $t_D=200\,\upmu$s. We observe that when the interferometric interrogation region includes the rapid change in state populations around the time where the magnetic field and NV axis come into alignment (0 - 200 $\upmu$s and 800 - 1000 $\upmu$s), the coherences drop sharply, $T_2^{\ast}=86(9)\,\mu$s and $T_2=186(22)\,\mu$s. When the Ramsey or spin-echo sequence excludes these regions, the coherence times are much longer: $T_2^{\ast}=299(22)\,\mu$s and $T_2=2(1)$ms. A particularly stark example of this difference being for spin- echo starting at 200 $\upmu$s: around $800\,\upmu$s in Fig. 5, the state populations begin to change rapidly and the spin-echo signal quickly damps 333Due to the long rf pulse durations ($t_\pi\approx 50\,\upmu$s), $\tau=800\,\upmu$s corresponds to the final rf pulse occurring almost $900\,\upmu$s into the rotation.. While excluding the rapidly varying regions improves the coherence times, our observed rotating coherence times are still well below that observed when the diamond is held stationary ($T_2^{\ast}=1.5\,$ms, $T_2=6.5(4)$ms). In Fig. 5(c), we increase the spin-echo time in two-period intervals ($2\,$ms), with the rf pulses applied only when the NV axis and magnetic field are aligned ($t_D=0$). Here, we see the contrast persists to times commensurate with what is observed while stationary, $T_2=5.0(1)$ms, demonstrating coherent quantum measurement of nuclear spins physically rotating at 1 kHz. Figure 5: Quantum coherence measurement of rapidly rotating nuclear spins. a) Pulse sequence: using feedforward control of the rf frequency, and adjusting rf pulse lengths to execute $\pi/2$ or $\pi$-pulses, we perform Ramsey or spin-echo interferometry on the rotating nuclear spin ensemble. The phase of the final $\pi/2$-pulse is varied to trace out fringes (b). The spin coherence times while rotating are then derived by fitting an exponential decay to the fringe amplitudes as a function of interrogation time $\tau$. In (c), we do the same spin-echo measurement but restrict $\tau$ to twice-integer multiples of the rotation period (1 ms). Phase differences accumulated in subsequent periods cancel, and we recover the spin-echo signal (d). The observed spin coherence time $T_2=5.0(1)$ ms is close to the measured stationary value of $6.5(4)$ ms. Error bars in signal data derive from photon counting statistics, and error bars on fringe amplitudes are standard error in the fitted sinusoidal amplitude. With these results, we can begin to piece together the effect of rotation on the coherence of the NV nuclear spin. The data in Fig. 5(c,d) are compelling evidence that the intrinsic coherence of the nuclear spin is unaffected by adiabatic physical rotation in the presence of a large off-axis magnetic field. However, the rotation is not necessarily perfect, and spin-echo contrast observed at 2$n$ period intervals only means that the period-to- period variability of the rotation speed is small, since whatever (noisy) phase accumulated in the first period is canceled in the second period that immediately follows it. Moreover, if the angular velocity within a period is not constant, such that the NV axis traces out an ellipse or more complicated parametric shape each period, phase effects from this effect will aslo be eliminated with spin-echo at two-period intervals. Loss of coherence at non- periodic intervals does not automatically imply that our feedforward frequency control is imperfect either, since for coherence to vanish, noise and irreproducibility must be present. The most obvious source of noise is the stability of the diamond rotation. We performed an independent measurement of the motor stability using laser detection of a fiducial 444See Supplementary Information and found that the period exhibited a typical standard deviation of 323 ns. Even such small period jitter has a disproportionately severe effect on the relative phase between the local oscillator (the AWG waveform) and the NV due to the large perturbation induced by the magnetic field, in particular the rapid vartiation in transition frequency close to the magnetic field alignment point. A linear frequency increase results in a quadratic increase in integrated phase, and while this is partially canceled by the feedforward waveform, small differences in the nuclear spin phase due to period jitter are nevertheless amplified quadratically and result in a loss of phase coherence between the start and end of the frequency sweep. After $t_D=200\,\upmu$s, the phase increases approximately linearly (the transition frequency is almost constant in time), and thus coherence loss from period jitter is suppressed. When the nonlinear phase accumulation begins towards the end of the period (_i.e._ total sequence times $>800\,\upmu$s), we again see a sharp drop in coherence. ## VIII Continuous dynamical decoupling of an ensemble of strongly-perturbed nuclear spins The detrimental effect of motor period jitter can be eliminated by working in a frame where phase accumulation is determined entirely by the phase coherence of the rf field, dynamically decoupling the nuclear spin from its environment. Since the rf Rabi frequency varies across the rotation due to gyromagnetic augmentation (Sec. V), multi-pulse dynamical decoupling is nontrivial to implement without risk of introducing significant pulse fidelity issues. We instead opt to employ continuous dynamical decoupling, or spin-locking, in conjunction with quantum feedforward control. A pure $|0,+1\rangle$ is prepared at the NV axis-magnetic field alignment point, an rf $\pi/2$-pulse is then applied followed immediately by a variable duration spin-locking rf pulse $90^{\circ}$ out of phase to the first rf pulse. After a variable spin-locking time, a final $\pi/2$-pulse (calibrated to the requisite length based on gyromagnetic augmentation) is applied, and its phase varied to reveal fringes. The results of spin-lock control for rotation at $1\,$kHz are depicted in Figure 6, and compared against stationary results. The lower amplitude of the rotating data is due to the deficiencies of state polarization discussed in Sec. III. The slight dips in contrast coincide with lower Rabi frequency regions (Fig. 4(c)), we thus attribute the contrast dip to imperfect readout ($\pi/2$-pulse) calibration. We also observe a small but measurable phase change across the rotation, which we attribute to a time-dependent detuning introduced through imperfect calibration of the feedforward profile. Otherwise, the stationary and rotating spin-lock measurements are in remarkable agreement, with the spin coherence and phase before and after a rotation virtually the same. The data in Fig. 6 demonstrate coherent decoupling of the nuclear spin while adiabatically rotating in the presence of a significant, noisy, time-dependent perturbation; that is, the off-axis magnetic field. The combination of feedforward quantum control and spin- locking allow us to eliminate the significant effects of the off-axis magnetic field, jitter of the rotation period, and effectively even the rotation itself, since the nuclear spin accumulates essentially no phase during the rotation while under spin-lock control. Figure 6: Spin-lock dynamical decoupling of rotating nuclear spins. (a) AWG pulse sequence. While generating a feedforward rf signal synchronous with the diamond rotation, the output is gated into three pulses, a $\pi/2$ pulse (zero phase), a variable duration pulse $90^{\circ}$ out of phase to the initiation pulse and a final $\pi/2$ pulse with variable phase and a duration set by the instantaneous Rabi frequency (Fig.4). Laser pulses before (after) prepare (read) the NV spin state. (b) Sample spin-lock signal fringes for rotation at $1\,$kHz. Error bars derive from photon counting statistics. (c) Fitted fringe amplitude as a function of spin-locking time for rotating and stationary diamond. Error bars are standard error in fitted fringe amplitudes. ## IX Discussion This work represents the first study of the effects of rapid physical rotation and significant magnetic field angles on the quantum properties of the 14N nuclear spin in diamond. Magnetic fields used in this work allow rapid polarization of the nuclear spin via the NV excited state level anticrossing, and an interesting new regime to probe how off-axis magnetic fields affect the nuclear spin where mixing with the electron spin is significant. Optical polarization and readout of nuclear spins can still be achieved while rotating at periods much shorter than the ensemble dephasing time of the nuclear spin, and standard quantum state manipulations ($\pi/2$, $\pi$-pulses) can be carried out with high fidelity. The large perturbation imposed by the off-axis magnetic field leads to considerable state mixing within each electron spin manifold of the NV, resulting in a $20\,\%$ modulation of the nuclear spin transition frequency as the diamond is rotated. We counter this effect with feedforward quantum control, modulating the rf waveform that drives the nuclear spins with the same characteristic function imposed by the magnetic field. With feedforward control, the rf and two-level system remain in resonance despite the significant perturbation of the off-axis magnetic field, and for the first time we can observe how the NV nuclear spin behaves in such circumstances. A key observation we make is that the electronic augmentation of the nuclear gyromagnetic ratio depends sensitively on the alignment of the magnetic field, and as a result the nuclear spin Rabi frequency drops by almost an order of magnitude throughout the rotation. Nevertheless, we retain coherent control over the nuclear spin with appropriately tailored FM quantum control pulses that still execute high-fidelity gate operations. Using feedforward control and the standard quantum sensing protocols of Ramsey and spin-echo interferometry, we observe the effects of noisy, imperfect rotation on the coherence of the nuclear spin, and with spin-locking, we eliminate these effects as well, demonstrating almost complete decoupling of the nuclear spins from the significant perturbations imposed by rotation. We attribute the reduced coherence times we see when performing interferometry within a single period as evidence of imperfect rotation, a conclusion reinforced by the observation that coherence remains when the interrogation time is set to an even multiple of rotation periods. Imperfect rotation couples to the coherence of the qubits magnetically, via the perturbed transition frequency induced by rotation in the presence of an off axis bias magnetic field. While feedforward eliminates a significant fraction of the relative phase between the rf and the qubits, noise in the form of period jitter of the motor makes the relative phase vary with each iteration of the experiment, an effect accentuated when the transition frequency varies sharply (_i.e._ at the beginning and end of the rotation). This effect is the same for spin-echo and Ramsey, and in spin-echo the sensitivity can in fact be higher depending on the difference between feedforward signal and qubit transition frequency. One avenue of improvement is an optimization procedure for the feedforward waveform. To accommodate the possibility of non-circular rotation, we require an ‘on-the-fly’ means of optimizing the feedforward profile using quantum measurement of the nuclear spins while rotating. However, this is a non- trivial undertaking, given the subtle, more interesting effects of rotation such a procedure may erase. There are two non-trivial quantum phases that the qubit accumulates while rotating that are related to the geometric Berry phase [48, 49]. The first of these relates to the path the rf field traces out in real space, and its subsequent appearance in projective Hilbert space (the Bloch sphere), which we reported on previously in [37]. The second is the ‘conventional’, state-dependent Berry phase equivalent to the solid angle swept out by the quantization axis of the system (tilted from the N-V axis by the magnetic field) as the diamond is rotated. In a rotating quantum interferometry sequence, we detect an indistinguishable combination of these ‘interesting’ physical effects and more mundane effects such as an offset or skew in the feedforward profile compared to the transition frequency. Before a rigorous, definitive quantum measurement of rotationally-induced phases can be undertaken, further work is needed to better understand how the desired phase and systematic effects can be distinguished. The unique capabilities developed in this work lay the foundations for several interesting avenues of future inquiry. The strong off-axis field regime of the NV is also generally inaccessible due to quenched optical contrast [44]. While control of the NV electron spin with microwaves is not considered here, it could bring new insights to our understanding of the NV coupling to strain and electric fields in the high transverse field regime, and considerable richness to future work employing nuclear spins in the rotating frame. Another intriguing possibility is employing other nuclear spin species, such as 13C, which couple to each other via the dipolar interaction in natural abundance samples. An interesting interplay is then expected between NV-mediated nuclear hyperpolarization and spin diffusion [50, 51] and rotational averaging of homonuclear couplings, since the experimental configuration in our work emulates that of NMR magic-angle spinning [52, 53]. Devoid of the nuclear quadrupole interaction exhibited by the spin-1 14N nucleus, the ground state splitting of the 15N is only $\sim 200$ kHz, allowing exploration of the regime where rotation speed, Rabi frequency and Larmor frequency are all comparable. Additionally, the nuclear spin state mixing observed in this work would be radically different in the case of 15N, with the nuclear spin more inclined to follow the external magnetic field due to the absence of the intrinsic quadrupole axis. Finally, extension to the ground-state level anticrossing (GSLAC) and the consequent effects on gyromagnetic augmentation [54, 45, 32] would be possible with a stronger magnetic field than used in our experiments. ## X Conclusions In this work, we have demonstrated quantum measurement and control of an ensemble of nuclear spins rotating in the presence of a large, off-axis magnetic field. We have shown, for the first time, how quantum feedforward of the rf drive can be used to maintain coherent control of the nuclear spins even when the magnetic field is orthogonal to the NV axis. Furthermore, we reveal how imperfect rotation couples to the coherence of the nuclear spins, and using continuous dynamical decoupling, preserve the coherence of the spin ensemble over a full rotation period. Our work highlights the unique flexibility the NV center in diamond brings to quantum sensing, allowing access to a long-lived nuclear quantum memory embedded within a robust substrate that can be rapidly rotated at quantum coherent timescales. We also harness the power of dynamical decoupling to suppress all traces of the large magnetic perturbation and noisy, imperfect rotation, effectively giving us the ability to induce physical rotation on-demand. This work unlocks a previously frozen degree of freedom for the NV and its host nuclear spin, opening a wide range of possibilities for practical quantum sensing [20, 21] and fundamental quantum science with rotating systems [35, 4, 6, 37, 55, 56]. ## Acknowledgements We thank L. C. L. Hollenberg, J.-P. Tetienne and L. D. Turner for insightful discussions. This work was supported by the Australian Research Council (DP190100949). A. A. W. acknowledges valuable support from the UoM Albert Shimmins Research Continuity Scheme. ## References * Wood _et al._ [2017] A. A. Wood, E. Lilette, Y. Y. Fein, V. S. Perunicic, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Magnetic pseudo-fields in a rotating electron–nuclear spin system, Nat Phys 13, 1070-1073 (2017). * Fu _et al._ [2020] K.-M. C. Fu, G. Z. Iwata, A. Wickenbrock, and D. Budker, Sensitive magnetometry in challenging environments, AVS Quantum Sci. 2, 044702 (2020). * Hoang _et al._ [2016] T. M. Hoang, J. Ahn, J. Bang, and T. Li, Electron spin control of optically levitated nanodiamonds in vacuum, Nat Comms 7, 12250 (2016). * Delord _et al._ [2018] T. Delord, P. Huillery, L. Schwab, L. Nicolas, L. Lecordier, and G. Hétet, Ramsey Interferences and Spin Echoes from Electron Spins Inside a Levitating Macroscopic Particle, Phys. Rev. Lett. 121, 053602 (2018). * Delord _et al._ [2017a] T. Delord, L. Nicolas, Y. Chassagneux, and G. Hétet, Strong coupling between a single nitrogen-vacancy spin and the rotational mode of diamonds levitating in an ion trap, Phys. Rev. A 96, 063810 (2017a). * Delord _et al._ [2020] T. Delord, P. Huillery, L. Nicolas, and G. Hétet, Spin-cooling of the motion of a trapped diamond, Nature 580, 56 (2020). * Perdriat _et al._ [2021a] M. Perdriat, C. Pellet-Mary, P. Huillery, L. Rondin, and G. Hétet, Spin-Mechanics with Nitrogen-Vacancy Centers and Trapped Particles, Micromachines 12, 651 (2021a). * Doherty _et al._ [2013] M. W. Doherty, N. B. Manson, P. Delaney, F. Jelezko, J. Wrachtrup, and L. C. L. Hollenberg, The nitrogen-vacancy colour centre in diamond, Phys Rep , 528, 1 (2013). * Schirhagl _et al._ [2014] R. Schirhagl, K. Chang, M. Loretz, and C. L. Degen, Nitrogen-Vacancy Centers in Diamond: Nanoscale Sensors for Physics and Biology, Ann Rev of Phys Chem 65, 83 (2014). * Fuchs _et al._ [2011] G. D. Fuchs, G. Burkard, P. V. Klimov, and D. D. Awschalom, A quantum memory intrinsic to single nitrogen-vacancy centres in diamond, Nat Phys 7, 789 (2011). * Zaiser _et al._ [2016] S. Zaiser, T. Rendler, I. Jakobi, T. Wolf, S.-Y. Lee, S. Wagner, V. Bergholm, T. Schulte-Herbrüggen, P. Neumann, and J. Wrachtrup, Enhancing quantum sensing sensitivity by a quantum memory, Nat Comms 7, 12279 (2016). * Liu _et al._ [2019] Y.-X. Liu, A. Ajoy, and P. Cappellaro, Nanoscale Vector dc Magnetometry via Ancilla-Assisted Frequency Up-Conversion, Phys. Rev. Lett. 122, 100501 (2019). * Qiu _et al._ [2021] Z. Qiu, U. Vool, A. Hamo, and A. Yacoby, Nuclear spin assisted magnetic field angle sensing, npj Quant Inform 7, 1 (2021). * Smeltzer _et al._ [2009] B. Smeltzer, J. McIntyre, and L. Childress, Robust control of individual nuclear spins in diamond, Phys. Rev. A 80, 050302 (2009). * Neumann _et al._ [2010] P. Neumann, J. Beck, M. Steiner, F. Rempp, H. Fedder, P. R. Hemmer, J. Wrachtrup, and F. Jelezko, Single-Shot Readout of a Single Nuclear Spin, Science 329, 542 (2010). * Maclaurin _et al._ [2012] D. Maclaurin, M. W. Doherty, L. C. L. Hollenberg, and A. M. Martin, Measurable Quantum Geometric Phase from a Rotating Single Spin, Phys. Rev. Lett. 108, 240403 (2012). * Ledbetter _et al._ [2012] M. P. Ledbetter, K. Jensen, R. Fischer, A. Jarmola, and D. Budker, Gyroscopes based on nitrogen-vacancy centers in diamond, Phys. Rev. A 86, 052116 (2012). * Ajoy and Cappellaro [2012] A. Ajoy and P. Cappellaro, Stable three-axis nuclear-spin gyroscope in diamond, Phys. Rev. A 86, 062104 (2012). * Jaskula _et al._ [2018] J.-C. Jaskula, K. Saha, A. Ajoy, D. J. Twitchen, M. Markham, and P. Cappellaro, Cross-sensor Feedback stabilization of an emulated quantum spin gyroscope, Phys. Rev. Applied 11, 054010 (2019). * Soshenko _et al._ [2020] V. V. Soshenko, S. V. Bolshedvorskii, O. Rubinas, V. N. Sorokin, A. N. Smolyaninov, V. V. Vorobyov, and A. V. Akimov, Nuclear spin gyroscope based on the NV center in diamond, Phys. Rev. Lett. 126, 197702 (2021). * Jarmola _et al._ [2021] A. Jarmola, S. Lourette, V. M. Acosta, A. G. Birdwell, P. Blümler, D. Budker, T. Ivanov, and V. S. Malinovsky, Demonstration of diamond nuclear spin gyroscope, arXiv:2107.04257 (2021). * Wrachtrup and Jelezko [2006] J. Wrachtrup and F. Jelezko, Processing quantum information in diamond, J. Phys.: Condens. Matter 18, S807 (2006). * Pagliero _et al._ [2014] D. Pagliero, A. Laraoui, J. D. Henshaw, and C. A. Meriles, Recursive polarization of nuclear spins in diamond at arbitrary magnetic fields, Appl. Phys. Lett. 105, 242402 (2014). * Chakraborty _et al._ [2017] T. Chakraborty, J. Zhang, and D. Suter, Polarizing the electronic and nuclear spin of the NV-center in diamond in arbitrary magnetic fields: analysis of the optical pumping process, New J. Phys. 19, 073030 (2017). * Xu _et al._ [2019] N. Xu, Y. Tian, B. Chen, J. Geng, X. He, Y. Wang, and J. Du, Dynamically Polarizing Spin Register of N-V Centers in Diamond Using Chopped Laser Pulses, Phys. Rev. Applied 12, 024055 (2019). * Goldman _et al._ [2020] M. Goldman, T. Patti, D. Levonian, S. Yelin, and M. Lukin, Optical Control of a Single Nuclear Spin in the Solid State, Phys. Rev. Lett. 124, 153203 (2020). * Gulka _et al._ [2021] M. Gulka, D. Wirtitsch, V. Ivády, J. Vodnik, J. Hruby, G. Magchiels, E. Bourgeois, A. Gali, M. Trupke, and M. Nesladek, Room-temperature control and electrical readout of individual nitrogen-vacancy nuclear spins, arXiv:2101.04769 (2021). * Huillery _et al._ [2021] P. Huillery, J. Leibold, T. Delord, L. Nicolas, J. Achard, A. Tallaire, and G. Hétet, Coherent microwave control of a nuclear spin ensemble at room temperature, Phys. Rev. B 103, L140102 (2021). * Jacques _et al._ [2009] V. Jacques, P. Neumann, J. Beck, M. Markham, D. Twitchen, J. Meijer, F. Kaiser, G. Balasubramanian, F. Jelezko, and J. Wrachtrup, Dynamic Polarization of Single Nuclear Spins by Optical Pumping of Nitrogen-Vacancy Color Centers in Diamond at Room Temperature, Phys. Rev. Lett. 102, 057403 (2009). * Steiner _et al._ [2010] M. Steiner, P. Neumann, J. Beck, F. Jelezko, and J. Wrachtrup, Universal enhancement of the optical readout fidelity of single electron spins at nitrogen-vacancy centers in diamond, Phys. Rev. B 81, 035205 (2010). * Jarmola _et al._ [2020] A. Jarmola, I. Fescenko, V. M. Acosta, M. W. Doherty, F. K. Fatemi, T. Ivanov, D. Budker, and V. S. Malinovsky, Robust optical readout and characterization of nuclear spin transitions in nitrogen-vacancy ensembles in diamond, Phys. Rev. Research 2, 023094 (2020). * Chen _et al._ [2015] M. Chen, M. Hirose, and P. Cappellaro, Measurement of transverse hyperfine interaction by forbidden transitions, Phys. Rev. B 92, 020101 (2015). * McGuinness _et al._ [2011] L. P. McGuinness, Y. Yan, A. Stacey, D. A. Simpson, L. T. Hall, D. Maclaurin, S. Prawer, P. Mulvaney, J. Wrachtrup, F. Caruso, R. E. Scholten, and L. C. L. Hollenberg, Quantum measurement and orientation tracking of fluorescent nanodiamonds inside living cells, Nat Nano 6, 358 (2011). * Maclaurin _et al._ [2013] D. Maclaurin, L. T. Hall, A. M. Martin, and L. C. L. Hollenberg, Nanoscale magnetometry through quantum control of nitrogen–vacancy centres in rotationally diffusing nanodiamonds, New J. Phys. 15, 013041 (2013). * Delord _et al._ [2017b] T. Delord, L. Nicolas, L. Schwab, and G. Hétet, Electron spin resonance from NV centers in diamonds levitating in an ion trap, New J. Phys. 19, 033031 (2017b). * Wood _et al._ [2018a] A. A. Wood, E. Lilette, Y. Y. Fein, N. Tomek, L. P. McGuinness, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Quantum measurement of a rapidly rotating spin qubit in diamond, Science Advances 4, eaar7691 (2018a). * Wood _et al._ [2020] A. Wood, L. Hollenberg, R. Scholten, and A. Martin, Observation of a Quantum Phase from Classical Rotation of a Single Spin, Phys. Rev. Lett. 124, 020401 (2020). * Wood _et al._ [2018b] A. A. Wood, A. G. Aeppli, E. Lilette, Y. Y. Fein, A. Stacey, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, $T_2$-limited sensing of static magnetic fields via fast rotation of quantum spins, Phys. Rev. B 98, 174114 (2018b). * Note [1] See Supplemental Material [URL]. * Robledo _et al._ [2011] L. Robledo, H. Bernien, T. v. d. Sar, and R. Hanson, Spin dynamics in the optical cycle of single nitrogen-vacancy centres in diamond, New J. Phys. 13, 025013 (2011). * Tetienne _et al._ [2012] J.-P. Tetienne, L. Rondin, P. Spinicelli, M. Chipaux, T. Debuisschert, J.-F. Roch, and V. Jacques, Magnetic-field-dependent photodynamics of single NV defects in diamond: an application to qualitative all-optical magnetic imaging, New J. Phys. 14, 103033 (2012). * Busaite _et al._ [2020] L. Busaite, R. Lazda, A. Berzins, M. Auzinsh, R. Ferber, and F. Gahbauer, Dynamic 14N nuclear spin polarization in nitrogen-vacancy centers in diamond, Phys. Rev. B 102, 224101 (2020). * Note [2] See Supplemental Material [URL]. * Epstein _et al._ [2005] R. J. Epstein, F. M. Mendoza, Y. K. Kato, and D. D. Awschalom, Anisotropic interactions of a single spin and dark-spin spectroscopy in diamond, Nature Physics 1, 94 (2005). * Sangtawesin _et al._ [2016] S. Sangtawesin, C. A. McLellan, B. A. Myers, A. C. B. Jayich, D. D. Awschalom, and J. R. Petta, Hyperfine-enhanced gyromagnetic ratio of a nuclear spin in diamond, New J. Phys. 18, 083016 (2016). * Note [3] Due to the long rf pulse durations ($t_\pi\approx 50\tmspace+{.1667em}\upmu$s), $\tau=800\tmspace+{.1667em}\upmu$s corresponds to the final rf pulse occurring almost $900\tmspace+{.1667em}\upmu$s into the rotation. * Note [4] See Supplemental Material [URL]. * Berry [1984] M. V. Berry, Quantal Phase Factors Accompanying Adiabatic Changes, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 392, 45 (1984). * Aharonov and Anandan [1987] Y. Aharonov and J. Anandan, Phase change during a cyclic quantum evolution, Phys. Rev. Lett. 58, 1593 (1987). * Wunderlich _et al._ [2017] R. Wunderlich, J. Kohlrautz, B. Abel, J. Haase, and J. Meijer, Optically induced cross relaxation via nitrogen-related defects for bulk diamond 13C hyperpolarization, Phys. Rev. B 96, 220407 (2017). * Pagliero _et al._ [2018] D. Pagliero, K. R. K. Rao, P. R. Zangara, S. Dhomkar, H. H. Wong, A. Abril, N. Aslam, A. Parker, J. King, C. E. Avalos, A. Ajoy, J. Wrachtrup, A. Pines, and C. A. Meriles, Multispin-assisted optical pumping of bulk 13C nuclear spin polarization in diamond, Phys. Rev. B 97, 024422 (2018). * Andrew _et al._ [1958] E. R. Andrew, A. Bradbury, and R. G. Eades, Nuclear Magnetic Resonance Spectra from a Crystal rotated at High Speed, Nature 182, 1659 (1958). * Wood _et al._ [2021] A. A. Wood, R. M. Goldblatt, R. P. Anderson, L. C. L. Hollenberg, R. E. Scholten, and A. M. Martin, Anisotropic electron-nuclear interactions in a rotating quantum spin bath, arXiv:2105.07365 (2021). * Sangtawesin _et al._ [2014] S. Sangtawesin, T. Brundage, and J. Petta, Fast Room-Temperature Phase Gate on a Single Nuclear Spin in Diamond, Phys. Rev. Lett. 113, 020506 (2014). * Pellet-Mary _et al._ [2021] C. Pellet-Mary, P. Huillery, M. Perdriat, and G. Hétet, Magnetic-Torque Enhanced by Tunable Dipolar interactions, arXiv:2103.00836 (2021). * Perdriat _et al._ [2021b] M. Perdriat, P. Huillery, C. Pellet-Mary, and G. Hétet, Angle Locking of a Levitating Diamond using Spin-Diamagnetism, arXiv:2102.13637 (2021b).
arxiv-papers
2021-07-27T03:39:36
2024-09-04T03:07:20.466664
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Alexander A. Wood, Russell M. Goldblatt, Robert E. Scholten and Andy\n M. Martin", "submitter": "Alexander Wood", "url": "https://arxiv.org/abs/2107.12577" }
2107.12590
# The Reflectance Spectra of CV-CK Carbonaceous chondrites from the Near Infrared to the Visible S. Tanbakouei ,1,2 Josep M. Trigo-Rodríguez ,1,2 J. Llorca,3 C.E. Moyano- Cambero,1,2 I.P. Williams,4 Andrew S. Rivkin 5 1Institute of Space Sciences (CSIC), Meteorites, Minor Bodies and Planetary Sciences Group, Campus UAB, c/Can Magrans s/n, 08193 Cerdanyola del Vallès (Barcelona), Catalonia, Spain 2Institut d’Estudis Espacials de Catalunya (IEEC), Gran Capità, 2-4, despatx 201, 08034 Barcelona, Catalonia, Spain 3Institute of Energy Technologies, Department of Chemical Engineering and Barcelona Research Center in Multiscale Science and Engineering, Universitat Politècnica de Catalunya, EEBE, 08019 Barcelona, Catalonia, Spain 4School of Physics and Astronomy, Queen Mary, University of London, Mile End Rd. London E1 4NS, UK. 5John Hopkins University Applied Physics Laboratory, Laurel, MD, USA. E-mails: [email protected], [email protected] (Accepted XXX. Received YYY; in original form ZZZ) ###### Abstract Carbonaceous chondrite meteorites are so far the only available samples representing carbon-rich asteroids and in order to allow future comparison with samples returned by missions such as Hayabusa 2 and OSIRIS-Rex, is important to understand their physical properties. Future characterization of asteroid primitive classes, some of them targeted by sample-return missions, requires a better understanding of their mineralogy, the consequences of the exposure to space weathering, and how both affect the reflectance behavior of these objects. In this paper, the reflectance spectra of two chemically- related carbonaceous chondrites groups, precisely the Vigrano (CVs) and Karoonda (CKs), are measured and compared. The available sample suite includes polished sections exhibiting different petrologic types: from 3 (very low degree of thermal metamorphism) to 5 (high degree of thermal metamorphism). We found that the reflective properties and the comparison with the Cg asteroid reflectance class point toward a common chondritic reservoir from which the CV-CK asteroids collisionally evolved. In that scenario the CV and CK chondrites could be originated from 221 Eos asteroid family, but because of its collisional disruption, both chondrite groups evolved separately, experiencing different stages of thermal metamorphism, annealing and space weathering. ###### keywords: Asteroids-Meteoites-Minor bodies ††pubyear: 2019††pagerange: The Reflectance Spectra of CV-CK Carbonaceous chondrites from the Near Infrared to the Visible –B Accepted for publication in MNRAS on July 19th, 2021 ## 1 Introduction Most meteorites originates from asteroids and as such they provide samples that can be directly studied in laboratories. Though they have different size scales, an asteroid and a meteorite can share compositional and reflectance properties because they contain similar rock-forming minerals (Cloutis et al., 2012; Trigo-Rodríguez et al., 2015). The undifferentiated chondritic meteorites have proven to be good proxies to understand the properties of chondritic asteroids (Cloutis et al., 2012; Trigo-Rodriguez et al., 2014; Beck et al., 2014; Moyano-Cambero et al., 2017; Tanbakouei et al., 2019). Meteorites can be studied in through dedicated laboratory experiments, but the properties of an asteroid are usually inferred from ground-based observations, though a few also have been observed from spacecraft (see e.g. Gaffey et al., 2002). Asteroids are subjected to space weathering processes that alter the initial surface properties of the body (Brunetto et al., 2015; Colonna et al., 2019). Collisional evolution of asteroids provides meter-sized meteoroids that are producing meteorite falls (Trigo-Rodriguez & Blum, 2009; Beitz et al., 2016). So that, the Earth receives a continuous delivery of asteroidal materials providing invaluable source of scientific information (Colonna et al., 2019). Each one of these rocks has the potential to explain the story of its progenitor body and provide information about the processes that occurred in their parent asteroids (Binzel et al., 2010, 2015). For instance, collisional gardening has been at work for 4.5 Gyrs and this bombardment modified the primordial properties of chondritic asteroids (Beitz et al., 2016; Blum et al., 2006). The spectral properties of the near-Earth target asteroid 162173 Ryugu reported by Hayabusa 2 mission, have compared so far by Kitazato et al. (2019) with the meteorites of CMs, CIs and CV3 Allende. Another mission, called OSIRIS - REx (Origins, Spectral Interpretation, Resource Identification, Security, Regolith Explorer), explored the near-Earth asteroid (101955) Bennu providing a good insight about the reflectance properties of the asteroid in the visible and near infrared range (Lauretta et al., 2017; Barucci et al., 2020; Rizos et al., 2021). Hamilton et al. (2019) also established a comparison with CMs and CIs chondrites to infer the different degrees of hydration of the parent asteroids. Laboratory reflectance spectra of meteorites are often used to identify the main rock-forming minerals of asteroids (Gaffey et al., 2002; Cloutis et al., 2011; Cloutis et al., 2012; Beck et al., 2014). Over the years, additional information such as physico-chemical properties of carbonaceous chondrites (CCs) and primitive asteroids and their reflective behavior, was obtained by increasingly sensitive and precise spectrometers (Barucci et al., 2005; Cloutis et al., 2011; Trigo-Rodriguez et al., 2014). Carbonaceous chondrites come from undifferentiated objects with sizes between one and hundreds of kilometres, formed in the outer region of the main asteroid belt (MB) or beyond, and sculpted by collisions (Chapman et al., 1975; Vernazza et al., 2011; Beitz et al., 2016). The characterization of carbonaceous chondrites is often challenging because their reflectance spectra are dark, sometimes involving silicates and oxides, but also including minor contribution from opaque amorphous materials. The crystalline and amorphous materials within protoplanetary disks are thermally processed and accreted to make bodies of various sizes and compositions, depending on the heliocentric distance of formation (Trigo-Rodríguez et al., 2019). The presence of some of these components alter their light scattering properties, and link these meteorites to some of the darkest objects of our Solar System (Cloutis et al., 2011). In this paper we study the similarities in the reflectance behavior of the CV group- named after Vigarano meteorite- and the CK group, named after Karoonda, given that a chemical similarity was already established between both groups previously (Greenwood et al., 2010; Wasson et al., 2013). According to the relation between CV and CKs, different degrees of thermal metamorphism and aqueous alteration, resulting from the asteroidal collision and differentiated metamorphism could be studied (Wasson, Isa & Rubin, 2013; Trigo-Rodríguez, 2015; Chaumard & Devouard, 2016; Rubin & Ma, 2017). We explore a scenario in which CV and CK chondrites evolved differently as consequence of the catastrophic disruption of a moderately large progenitor asteroid. The surviving asteroid fragments were dynamically separated and exposed to impacts with other bodies, so at the end the degree of oxidation was different. Oxidation, experienced by the presence of Fe+3 in low-Ca pyroxenes, and abundant Ni in olivine, are indicative that metamorphism occurred in most CK samples, since petrographic type 4 or higher types indicate thermal metamorphism (Noguchi, 1993). Such physical process also leads to Fe enrichment in CAIs (Chaumard et al., 2014). As a consequence of metamorphism, the total carbon contents of CKs tend to decrease with increasing metamorphic grade (Jarosewich, 2006; Greenwood et al., 2010). In fact, Geiger & Bischoff (1995) suggested that CK chondrites formed by metamorphic heating of a CV like precursor under oxidizing conditions. Some part of the metamorphism is due to collisions and the associated shocks, and so the resultant minerals are those being identified in our spectra (Urzaiz, Trigo-Rodriguez & Mestres, 2015). Huber et al. (2006) chose CK samples of un- weathered Antarctic meteorites to analyse the bulk elemental chemistry using INAA (Instrumental Neutron Activation Analysis) and petrographic techniques. These authors concluded that, as consequence of the aqueous alteration on the parent asteroid, CK chondrites became highly oxidized (Clayton & Mayeda, 1999). All CK chondrites contain shock-induced fractured and darkened silicates exhibiting tiny (< 0.3-10 $\mu$m) grains of magnetite and pentlandite throughout the interiors of many silicate grains (Brearley & Jones, 1998; Kallemeyn, Rubin & Wasson, 1991). Hashiguchi, Tomeoka & Ohnishi (2008) proposed that these opaque regions were produced as a consequence of the progressive shock-darkening that creates vesicles and holes. The olivine in CK chondrites had been seen as spherical grains (0.1–5 ${\mu}$m) of magnetite and pentlandite, and other silicates. Noguchi (1993) and Geiger & Bischoff (1995) remarked that $\mu$m-sized magnetite grains act as opaque in the interior of silicates, thus contributing to shock darkening. The process of post-shock annealing could led to minimize influence of shock in olivine (Bauer, 1979; Rubin, 2004, 2012). According to Brearley (1991) silicate blackening could be due to shock but other processes could have been at work. We use CV and CK meteorite reflectance spectra to identify specific spectral features that can be used to characterize the parent bodies of these meteorites in remote telescopic observations. As these groups have experienced different degrees of metamorphism, their reflectance behavior might help us to establish some evolutionary patterns with other CC classes, which we wish to identify how these patterns deal with the effects of shock in the history of their parental asteroids. Another clear example of the importance of the collisional history of asteroids is (2) Pallas (Marsset et al., 2020). Establishing new reflectance spectra links is of key importance as collisionally processed transitional asteroids and short period comets could also produce carbonaceous chondrites (Tanbakouei et al., 2020). The paper is organized as follow: In Section 2, sample selection and the instrumental procedures are explanied in details. One section is also didecated to data analysis which explains the parameters in Table 3. In Section 3 the results and obtained spectrcal reflectivity figures are provided. Section 4 will talk about the comparisons of our result with previuos methods, comparison of the reflectivity between CVs and Cks, and comparison of these chondrites with Cg asteroidal classes. Also a brief paragraph is provided about the Eos Family compare to CK carbonaceous chondrites. Section 5 is the conclusion part of the study. Appendix is provided as some supplmentary figures. ## 2 Instrumental procedure ### 2.1 Samples characterization using microscope techniques At the Institute of Space Sciences meteorite clean laboratory, we previously study the sections using a Zeiss Scope, with magnifications up to 500X, and with a Motic BA310Pol Binocular microscope. Main minerals are identified using Reflected (RL) and Transmitted light (TL) techniques and later confirmed using Energy-Dispersive X-ray Spectrometry (EDS) using an electron microscope (see below). In this way we recognize the principal features and minerals forming each rock (Table 1). In addition, TL informs about the degree of terrestrial weathering experienced by each meteorite. Transmitted light (TL) microscopy is particularly useful as allows distinguishing the action of water in some aqueous alteration minerals like e.g. oxides and clays. Under the action of water crystalline silicates become blurry and show distinguishable alteration colors and textures. We always look for well-preserved sections, exhibiting a minimum terrestrial weathering. We applied similar methods for characterizing aqueous alteration as in chondrites (Trigo-Rodriguez et al., 2006; Rubin et al., 2007; Trigo-Rodríguez, 2015; Trigo-Rodríguez et al., 2019) allow us to make sure that our thin sections are not too altered. Rusty interiors with Fe- oxides can be clearly identified as an orange background in transmitted light, not observed in our selected sections. Once we identify a quite pristine section, we bring it for study using a Scanning Electron Microscope (SEM) at the Institut Català de Nanociència i Nanotecnologia (ICN2). In particular we used a FEI Quanta 650 FEG with a Back Scattered Electron Detector (BSED). This SEM was operated in low-vacuum mode with each thin section uncoated so we can detect the C abundance using a Energy-Dispersive X-ray Spectrometer (EDS) attached to the SEM. In particular, the instrument is an Inca 250 SSD XMax20 with Peltier cooling and with a detector area of 20 mm2. These analyses were used over selected 1 mm2 regions of interest (ROIs) and also on specific points in order to understand the sample’s mineralogy. Using all these chemical data we can rule out possible weathered areas. This is an important point as we wish having a minimum participation of minerals produced during the stay of meteorites on Earth. ### 2.2 UV-NIR spectroscopy and data analysis The next step is to obtain the reflectance spectrum of each meteorite. To make sure that the reflectance spectrum is not affected by terrestrial weathering we chose a ROI of the interior of the meteorite section, far from the meteorite thin section. A Shimadzu UV3600 UV–Vis–NIR spectrometer was used to obtain reflectance spectra of thick and thin meteorite sections. As our spectrometer has a slot window of 1 $\times$ 0.2 mm2 we chose regions unaffected by weathering to be as much representative of the original parent body mineralogy. Several CV and CK carbonaceous chondrites from the NASA Antarctic collection were selected (Table 1) and measured using the spectrometer setup described by (Trigo-Rodriguez et al., 2014). The standard setting for the spectrometer is an integrating sphere (ISR) with a working range of 180-2600 nm, although the signal becomes noisy beyond about 2000 nm. In order to cover a wide range of wavelengths, the spectrometer uses multiple lamps, detectors and diffraction gratings which produce some artefacts that are removed in the spectra presented below. We used thin ($\sim$30 $\mu$m) and thick ($\sim$1 mm) meteorite sections to obtain the spectra. All our samples had a larger area than the spectrometer beam to avoid signal reflections by other materials, following procedure (Trigo-Rodríguez, 2015). Moyano-Cambero et al. (2016) demonstrated using the same instrument that the incident light is not transmitted through the section. The spectra presented here covers the 400 to 1800 nm spectral range and allows comparison with asteroidal spectra taken from ground or space-based telescopes. The spectrometer diffraction illumination originates from one of two lamps and passes through a variable slit, then is filtered with a grating to select the desired wavelength and afterwards is split into two alternating but identical beams with a chopper. Next the beam interacts with the sample and is routed to the detector. The reference beam interacts with the material and then goes to the same detector. The interior of the integrating sphere is coated with a duraflect reflecting polymer. The spectra obtained via this specific spectrometer, always shows noise between 800 and 900 nm plus two instrumental peaks (one from 1500 to 1600 nm and the other from 1900 to 2200 nm) (Moyano- Cambero et al., 2016). Above 2000 nm, the spectra becomes noisy and loses uniformity, due mostly to humidity, carbon dioxide, and system hardware. To avoid displaying unreliable data, the spectra above the 1800 nm are not included. The peaks at 1500-1600 nm and at 1900-2200 nm are attributed to an unsuccessful instrumental correction applied by the software to remove the presence of the BaSO4 (Fig 10 in the appendix) substrate of the final spectra that has been previously explained in these papers (Moyano-Cambero et al., 2016; Tanbakouei et al., 2019). A new correction had been applied to the spectra to remove those peaks, but the final result in those regions became a bit noisier than desired. The region between 800 and 900 nm was deleted, as it does not include usable data and was too noisy to be reliable. The meteorite specimens studied here are listed in Table 1. We have tried to chose samples from different petrologic types from CK3 to CK5. Table 1: Meteorite specimens analyzed, petrologic type, estimated weathering grade, oxidation state and main rock-forming minerals. Meteorite name Petrologic type Weathering grade Oxidation state Dominant rock- forming minerals Allende CV3 W1 Oxidized Oliv., pyrox., troilite and CAIs ALH 84028 CV3 W0 Oxidized Oliv., pyrox., trolilite and CAIs ALH 85002 CK4 W1 Oxidized Oliv., pyrox., plagioclase and magnetite LAR 12265 CK5 W2 Oxidized Oliv., pyrox., sulphide and magnetite (shock darkened) LAR 04318 CK4 W1 Oxidized Oliv., pyrox., sulphide and magnetite MET 00430 CV3 W2 Oxidized Oliv., pyrox., and CAIs MET 01017 CV3-an W2 Reduced Oliv., pyrox., metal and sulphide MET 01074 CV3 W1 Oxidized Oliv., pyrox., and CAIs MIL 07002 CV3 W2 Oxidized Oliv., pyrox., and CAIs PCA 82500 CK3 W2-3 Oxidized Oliv., pyrox., troilite, metal and CAIs To obtain the spectral features of different minerals existed on our studied samples, the main peak of each mineral band is identified. The band center and width of the peaks are given in Table 3. All the spctral parameters including maximum and minimum peaks, their centers, and the width of each band are measured by a python code. The instrumental error is basically the step of the spectrometer which is $\sim$1 nm. ## 3 Results The discovery of a significant number of new CK chondrites in Antarctica has increased the availability of such chondrites. Some of these new CK chondrites exhibit low levels of terrestrial weathering, making them a good source for spectroscopic comparison with other carbonaceous chondrites and to some extent with asteroids. The reflectance spectra of five CK chondrites obtained in this work are shown in Fig 1. We used the average data among CK spectral reflectance and made the BaS$O_{4}$ correction above. Pecora Escarpment (PCA 82500) and Larkman Nunatak 04318 (LAR 04318) were corrected two times to reduce noises (Moyano-Cambero et al., 2016). Figure 1: The reflectance spectra of five CK chondrites. The arrows mark the band positions of various minerals . The newly-obtained reflectance spectra of CK chondrites sections included in this study are shown in Fig 1 with different wavelength ranges. They have slightly red to blue spectral slopes beyond 900 nm (mostly red in the 900 to 1800 nm region and a bit blue slopped, above 1500 nm), exhibiting an olivine- like absorption band in the 1000-1200 nm region ( Fig 1). In the CK spectra it can be seen that the centre of the absorption bands does not change its position with the metamorphic grades, but correlates with the olivine composition. The depth of the bands, however, increases with higher degrees of thermal metamorphism, with the deepest band being found in CK6 spectra (Fig 2), while CK3–5 petrographic grades display shallower band depths (Fig 2). Figure 2: Comparison of CK reflectance spectra from meteorite powders studied in the RELAB spectral database in the range of 300 nm to 2500 nm range. a) Mean spectral reflectance of three different petrological types of CKs. b) Mean spectral reflectance of three different petrological type of CKs with error bars. The reflectance spectra of CV chondrites, with the exception of Allende, displays a decreasing reflectance toward wavelengths short ward of 500 nm, which is the plausible result of the formation of iron oxyhydroxides due to terrestrial weathering. Significantly, the narrow absorption band in ALH 85002 and Allende, is due to its deep extinction below 400 nm and could be correlated with maghemite and magnetite (Tang et al., 2003). It appears in Fig 3 that fine-grained CVs have shallower olivine absorption bands. Particularly, the 1000 nm olivine absorption band is the main feature observed in CK and CV spectra, but it is deeper in CKs than in CV chondrites. In our reflectance spectra of CK chondrites, the olivine absorption feature at 1050 nm is dominant, indicating that it is a major rock-forming component. Another distinguishable bands are a low-Ca pyroxene band at 900 nm and a plagioclase feldspar band at 1250 nm (see Table 3). Cloutis et al. (2012) suggests that some CCs do not have well-defined olivine absorption bands, due to not having experienced high enough temperatures to reduce the spectrum-darkening effects of opaques or to recrystallize from pre-existing phyllosilicates. Figure 3: Reflectance spectra of CV carbonaceous chondrites between 400 and 1900 nm. The spectra were normalized to 8 at 650 nm. Ol. is Olivine, Pl. is Plagioclase feldspear, Fe-hy is Iron-Oxydydroxide and Low-Ca Py. is Low-Ca Pyroxene. Several representative absorption bands have been reported in different CK and CV spectra. First, a narrow band at 600 nm, attributed to FeO and Fe2O3 contents (Hunt & Ashley, 1979) are described in several spectra (Lazzarin et al., 2004; Belskaya et al., 2010). There is also a broader band around 650 nm, which is assigned to plagioclase feldspar (Geiger & Bischoff, 1995). Another commonly found band appears between 900 to 1100 nm, being associated with olivine (Hunt & Ashley, 1979). The most common mineral in CK chondrites is indeed olivine (Cloutis et al., 2012). It exhibits an absorption feature centred near 1060 nm that can be seen in our Figure 4. With increasing Fe2+ content, the centre of this absorption band moves to longer wavelengths, becomes deeper and darker by increasing the overall reflectance (see e.g. King & Ridley, 1987). In our data the olivine band extends between 950 and 1150 nm (see Fig 4), which has shown in Table 2 and Table 3 as the spectral properties of the studied chondrites. Plagioclase feldspar is a minor silicate phase in CK chondrites (< 0.1 wt. %) that may exhibit a weak Fe absorption band near 1250 nm which appears weakly represented in our spectra (Adams & Goullaud, 1978). Figure 4: Comparison of the spectra of CK4 chondrite ALH 85002 obtained for this study, and another one from Brown University Keck/NASA RELAB obtained from a powder of the same meteorite. They are normalized to 1 at 550 nm and a $BaSO_{4}$ correction was applied to ours. The presence of pyroxene is noticeable as a 2000 nm absorption band in RELAB data, which varies from 1800 to 2080 nm when corresponding to low–Ca pyroxenes, to 1900-2380 nm for high–Ca Pyroxenes (Cloutis et al., 2012). Due to the noise introduced by our spectrometer, we cannot properly characterize pyroxene on the samples analyzed here, but the CK spectral data shows a tail of this band near 1850 nm. The presence of pyroxene generally affects the olivine band positions, but this effect is less important in CKs than in other CCs (Cloutis et al., 1986). This is because pyroxene abundances in CKs are generally too low compared to olivine to appreciably affect olivine band positions (Cloutis et al., 2012). The spectral shape of the magnetite is a function of grain size and location (Morris et al., 1985) but it commonly represented by an absorption band that can be seen near 1000 nm. In our CK spectra, the location of this absorption band varies from 980 to 1050 nm depending on the specimen analysed (Fig 5). We also noticed that other minor phases associated with refractory inclusions can be weakly featured as well, with fassaite, the most common mineral forming Ca- and Al- rich Inclusions (CAIs), being the best example at about 980 nm (Table 2). Figure 5: Comparison of reflectance spectra of three petrologic types of CK chondrites in our study (One CK3, two CK4 and two CK5 are mentioned in Table 1). A $BaSO_{4}$ correction was applied to all. ## 4 Discussion In this section we compare the obtained reflectance spectra with previously published data. This is important, to do this since our procedure obtains the reflectance spectra using polished sections of the meteorites, while previous published results used powders from ground meteorites (Trigo-Rodriguez et al., 2014; Moyano-Cambero et al., 2017). ### 4.1 Comparison between samples prepared by different methods Here we start the comparison of our reflectance spectra with the most extended procedure that describes the reflectance spectra obtained from meteorite powders. Cloutis et al. (2012) identified compositions and spectral features in CK chondrites with small grain sizes (10-30 $\mu$m). The CK chondrites are highly oxidized with petrologic types from 3 to 6, with high abundance of the fayalite Fe2SiO4 member of the olivine family (Geiger & Bischoff, 1995; Huber et al., 2006). The RELAB database at Brown University Keck/NASA also contains CK chondrite spectra covering a wavelength range from 400 to 1900 nm and measured on powders of various sizes (Cloutis et al., 2012). Our spectra show significant differences compared with RELAB data shown in Fig 4. The spectrum of Allan Hills 85002 (ALH 85002) in RELAB has a lower reflectance than the spectrum obtained for this meteorite in our studies. These differences may be due to measuring a polished meteorite surface instead of the fine-grained powders (<125 $\mu$m) which are used in RELAB. Moyano-Cambero et al. (2017) also indicated that the behavior of reflectance spectra in the UV region of the ground samples is remarkably different from our meteorite sections. In our ALH 85002 data the steep slope found by RELAB below 600 nm does not exist. This is possibly produced by terrestrial weathering in the samples studied by RELAB (Moyano-Cambero et al., 2017). Hendrix & Vilas (2006) also mentioned that flattening between 400 and 600 nm indicates high Fe content (Cloutis et al., 2010). As we work with polished samples, the metal grains contribute more to the spectrum than in the powder used in RELAB (Trigo-Rodriguez et al., 2014). As a result, the behavior below 600 nm and other features in our spectra are very similar to changes in space-weathered asteroids (Hendrix & Vilas, 2006). It is notable that the narrow absorption band in ALH 85002 around 450 nm (see Fig 1) could be assigned to magnetite, due to its deep extinction below 400 nm (Tang et al., 2003). We can also notice that the spectrum of ALH 85002 exhibits the lower reflectance in the NIR (see Fig 1). This is consistent with a CK5 shock-darkened specimen (Table 2) which has decreased its reflectance due to the presence of fractured materials, melts and opaques. PCA 82500 is another CK chondrite that have experienced shock- darkening so its reflectance spectrum is almost flat in NIR (See Fig 1). In consequence, both meteorites are excellent examples of the effect of impact processing in this C-rich asteroids: the initial red slopes are flattened as consequence of shock-darkening to end as neutral in NIR. To compare with previous papers, Salisbury et al. (1975) found that the spectrum of CK4 Karoonda, which is a well preserved fall, shows the shallowest absorption features in the 500-600 nm interval and a very weak olivine absorption band in 1000 nm region. Hiroi et al. (1993) also identified the blue-sloped reflectance spectra for <125 $\mu$m powders of CK4 ALH 85002 and CK4/5 Yamato 693 (Y 693) in the range of 500-2500 nm, and an olivine-like absorption band near 1050 nm. ### 4.2 Comparison of CKs with CV carbonaceous chondrites The CK chondrite group was defined by Kallemeyn et al. (1991) as having close compositional and textural relationship with the CV chondrites, but they are distinguishable from one another by their refractory lithophile abundances, refractory inclusions abundance, and the presence of igneous rims around chondrules, among other features. As previous author Greenwood et al. (2003); Greenwood et al. (2004, 2010) and Devouard et al. (2006) have suggested, there are some connections between CV and CK chondrites. CKs are also the most oxidized extraterrestrial rocks found so far, owing to their low abundance in Ni and Fe and their high content of fayalite and magnetite (Geiger & Bischoff, 1995). CV3-an Meteorite Hills 01017 (MET 01017) is possibly a reduced chondrite (Busemann et al., 2007). CV3 MET 00430 and CV3 MET 01074 are highly oxidized Bali-like type (CV3OxB) (Brearley & Wagner, 2014; Jogo et al., 2018). CV3 Allende is an oxidized Allende-like type (CV3OxA) (Bland et al., 2000). CV3 Miller Range 07002 (MIL 07002) is possibly oxidized and intermediate between CVOxA and CVOxB (Isa et al., 2012). CV3 Allan Hills 84028 (ALH 84028) is also an oxidized Allende-like type (Bland et al., 2000) (Table 1). Table 2: Spectral features of the spectrum of the meteorites studied here. The estimated error for each value is in the last digit. Meteorites Specific reflectance bands Band centers Peak width LAR 04318 Olivine 1350 0.67 Magnetite 975 0.67 Iron oxide 475 3.62 Plagioclase felspar 1470 1.53 PCA 82500 Oilivine 1405 3.48 Magnetite 1025 2.33 Iron oxide 460 1.28 Plagioclase felspar 1485 2.97 ALH 85002 Magnetite 1050 3.33 Olivine 1445 0.73 Plagioclase felspar 1365 0.82 Iron oxide 460 0.79 LAR 12265 thick Oilivine 1395 0.793 Magnetite 1025 0.58 Iron oxide 465 5.21 LAR 12265 thin Oilivine 1315 2.41 Magnetite 1010 1.05 Iron oxide 465 4.32 ALH 84028 Oilivine 1445 0.98 Low-Ca pyroxene 1014 2.46 Iron oxide 450 0.59 Plagioclase felspar 1365 0.72 Allende Oilivine 1410 1.65 Low-Ca pyroxene 990 1.55 Iron oxide 450 1.56 Plagioclase felspar 1365 0.89 Mill 07002 Oilivine 1300 0.58 Low-Ca pyroxene 945 1.82 Iron oxide 465 2.28 Plagioclase felspar 1335 1.58 MET 01017 Oilivine 1280 2.31 Low-Ca pyroxene 915 2.10 Iron oxide 460 1.42 Plagioclase felspar 1395 1.90 MET 00430 Oilivine 1225 0.74 Low-Ca pyroxene 920 1.04 Iron oxide 570 2.03 Plagioclase felspar 1290 0.57 MET 01074 Oilivine 1310 1.57 Low-Ca pyroxene 960 0.91 Iron oxide 465 3.89 Plagioclase felspar 1395 1.25 Table 3: Comparison between the CK spectral properties of the data in Brown University Keck/NASA RELAB Spectrum PH-D2M-035/C1PH35, and our data, a spectrum taken from the visible and infrared imaging spectrometer at EEBE center of UPC. Wavelengths (nm) Wavelengths (nm) Wavelengths (nm) Minerals (Ours) (Cloutis et al., 2012) (RELAB) 580 650 Iron oxide (FeO) 980 950-1100 1100-1200 Magnetite (Fe3O4) 1380 1250 1050 Olivine ((Mg,Fe)2SiO4) 940 - - Low-Ca pyroxene 1300 1250 1350 Plagioclase Feldspar 2100 2100 Fassaite Table 4: Average spectral slope and the reflectivity of the meteorites at some specific points. First coloumn is the name of the meteorite sample, the second coloumn is the Average spectral slope (%/ nm) in the indicated range, the third, forth and last coloumn are the reflectivity at designated wavelengths. The estimated error for each value is in the last digit. Met. Av. in (1000-1800 nm) Ref. at 600 nm Ref. at 1200 nm Ref. at 1800 nm LAR 04318 0.0016 9.90 8.00 8.90 PCA 82500 0.0004 9.05 8.68 8.80 ALH 85002 0.0062 8.19 8.00 8.41 LAR 12265 thick 0.0014 8.21 7.90 8.70 LAR 12265 thin 0.0013 8.08 7.90 8.70 ALH 84028 0.0065 9.70 10.48 10.7 Allende 0.0007 9.81 10.70 11.00 Mill 07002 0.0016 9.90 9.65 9.90 MET 01017 0.0001 9.75 10.75 11.5 MET 00430 0.0019 9.90 9.95 10.50 MET 01074 0.0006 9.85 9.75 10.90 The importance of collisional gardening of the CK parent asteroid was proposed because of different features noticed in their matrices (Rubin & Ma, 2017). Matrix-rich regions in the CK chondrites formed by comminuted and ground materials, mostly micron-sized angular silicate grains that are pressed and crushed chondrules, demonstrate the degree of collisional processing in these samples (Rubin & Ma, 2017). Back-scattered electron (BSE) images of ALH 85002 exemplify the internal fractures usually contained in their rock-forming silicates and the subsequent comminution of the materials. As consequence of these processes secondary minerals were formed, acting as opaques that change the spectral reflectance behavior (Fig 6). On the other hand, the primary mineralogy of CVs seem to be better preserved than the CKs, so seems plausible that they suffered a minor extent of collisional processing. For example, thin sections of CV3oxA Allende (Norton, 2002) reveal little evidence of crushing. Although many reduced CV3 chondrites show impact signs (Scott et al., 1992), they have not been extensively crushed (Kracher et al., 1985). ### 4.3 Comparing laboratory spectra of CCs with remote asteroidal reflectance spectra As a result of the reflectance affinity and the chemical evidence found by (Wasson, Isa & Rubin, 2013), we found plausible that CV and CK chondrites were associated with a common parent asteroid that experienced splitting and differentiated evolution by consequence of separated orbital evolution. Greenwood et al. (2010) and Cloutis et al. (2012) suggested that CVs and CKs may have a common parent body, Eos asteroid family should be its most likely source. It is also consistent with the suggestion that the 221 Eos asteroid collisional family proposed to be associated with CV meteorites (Greenwood et al., 2010), could be a possible source of CK chondrites since they share a a blue-sloped features in the NIR region (800-2500 nm) specially beyond $\sim$1500 nm (Cloutis et al., 2012). Then, collisionally processed fragments of 221 Eos family could be the source of high petrologic chondrites. Figure 6: Back-scattered electron (BSE) image of regions of CK4 chondrite ALH 85002. It is a nice example of well preserved CK consisting of well compacted silicate-rich chondrules, sulfides and accessory minerals. The dominant minerals and their respective tonality are: olivine – light gray; orthopyroxene – medium gray; plagioclase – dark gray; sulfide and magnetite – white; fractures and pores being black. We have compared our mean reflectance spectra with the Cg asteroidal reflectance class of the Bus-DeMeo Taxonomy Classification (DeMeo et al., 2009). It is important to remark that Mothé-Diniz & Carvano (2005) and Mothé- Diniz et al. (2008) compared spectra of 221 Eos asteroid members with the spectra of different CC groups. They previously realized in that work that many members of that asteroid family are consistent with CK3, CK4 and CK5 chondrites in the NIR region, but differ in the visible region (Salisbury et al., 1975). 221 Eos and its family members are classified as K asteroids in the Bus-DeMeo taxonomy (DeMeo et al., 2009) (See Fig 11 in the appendix) . We used a Cg class spectrum for comparison with the spectra of CK chondrites in the range of 400-1800 nm (Fig 7). Figure 7: CK reflectance spectra compared with reflectivity of Cg-type asteroids in the UV-NIR range. The Cg spectrum is normalized and the multiplied with a reflectance value in order to bring it on the same scale. Moreover, the recent simulated space weathering experiments on CV3 meteorite Allende by Gillis-Davis et al. (2017) showed that the weathered meteorite shows a different weathering trend for the continuum slope between 450-550 nm. The absorption band in 900-1400 nm region in CV3 meteorites resembles the same region in Ryugu although it is not well-defined there (De León et al., 2018). The absorption bands in the range of 1050 to 1250 nm in ureilites corresponds to olivine, so we infer that the same bands in CVs and CKs are also associated with olivine (Cloutis et al., 2010; Cloutis et al., 2012; Le Corre et al., 2017). Our results show that Cg spectral type asteroids could match the spectra of CK chondrites according to what was found between 500 and 800 nm (Fig 7). In general, several specific features in an asteroid reflectance spectrum display the effect of aqueous alteration in the asteroid surface (Barucci et al., 2005). As we combined our spectra with the Bus-DeMeo Taxonomy Classification tool, it is realized that the overall shape of most CK spectra seems to be similar to Cg-type asteroids (DeMeo et al., 2009). Recent analytical work on the CV and CK magnetite composition, found differences in Cr isotopic abundances (Dunn et al., 2016; Yin et al., 2017). Nevertheless, the parent bodies could be very similar, because those findings on minor elements cannot account for significant differences in their reflectance spectroscopic characteristics. Our working hypothesis suggesting both CV and CK groups could be the result of a differentiated outcome from separate bodies belonging to a collisional family could explain those subtile differences. In addition, such scenario could be consistent with the presence of two CV7 chondrites listed in the Meteoritical Bulletin. The presence of such metamorphosed CVs could suggest two separate metamorphic sequences, but they could be rare impact melts and not type-7 after all. Then, it seems that more analytical data is needed to demonstrate that CV and CKs are not related as we propose. ### 4.4 Eos family comparisons In order to demonstrate that the CV and CK groups could be a good match for the Eos family we have compared three asteroids of that family: 221 Eos, 661 Cloelia and 742 Edisona with our meteorite spectra (Clark et al., 2009). Fig. 8 shows the spectral comparison between CKs and the three asteroids, while the CVs are compared in Fig. 9. The spectral slope of the asteroids match well these exhibited by the CV and CKs. In addition, there are some common noticeable features. The spectra of 221 Eos and 661 Cloelia exhibit two olivine bands at 1050 and 1450 nm that also noticeable in our CK spectra, with exception of the anomalous LAR 04318. Also the minor band associated with plagioclase feldspar at 1370 nm is also a common feature between the three asteroids and our CKs. In the NIR the reflectance spectrum of 221 Eos has resemblance with the flat behavior of ALH 85002, while such flat behavior is more extreme for asteroid 742 Edisona that exhibits a NIR spectrum resembling that of the shock-darkened PCA 82500. Concerning the CV reflectance spectra, they are having a similar slope, but the olivine features are not so marked as these exhibited by the three asteroid spectra. Morate et al. (2018) found a wide diversity of near- infrared colours for 328 members of this family which highlights the compositional variation among them. Figure 8: CKs reflectance spectra compared with reflectivity of A) 221 Eos, B) 661 Cloelia and C) 742 Edisona in the range between 900 nm to 1900 nm. Blue ones are the spectra of ALH 85002, LAR 04318, PCA 82500, LAR 12265 thick, LAR 12265 thin which are shown in the previous plots. Figure 9: CVs reflectance spectra compared with reflectivity of A) 221 Eos, B) 661 Cloelia and C) 742 Edisona in the range between 900 nm to 1900 nm. Blue ones are the spectra of ALH 84028, MIL 07002, Allende, MET 00430, MET 01017, which are shown in the previous plots. ## 5 Conclusions We have tested a working hypothesis for the formation of the parent bodies of CV and CK chondrites. The CKs could have formed from CVs after impacts and high temperatures, and these processes made them aqueously altered and annealed (Wasson, Isa & Rubin, 2013). Such a working scenario implies an evolutionary processing of CKs from CV materials and suggests that meteorite collections should have specimens exhibiting gradational differences with significant consequences in their reflectance spectra. Such scenario is consistent with our current study of CV and CK reflectance spectra. Then, from the study of CV and CK reflectance spectra we reach the following conclusions: 1. 1. We found a significant similitude between the reflectance spectra of CV-CK chondrites and asteroids belonging to the Cg spectral class. Specific diversity could be consequence of thermal heating due to different degree of collisional processing. 2. 2. A common behavior for CK chondrite reflectance spectra is found. We realize that with increasing metamorphic grade, the reflectance decreases producing a deeper 1000 nm region absorption feature. But in general, higher petrographic degree is consistent with higher reflectivity, mainly in the visible region. The band depth of olivine in CKs increases while the thermal metamorphism increases: the CK3 petrographic grades of meteorites display shallower band depths, while the CK5 spectra exhibit the deepest band depths. 3. 3. The correlation between CV and CK reflectance spectra, together with the chemical similitude claimed in previous studies, suggest that both groups could have originated from a common parent body that was broken apart a long time ago. In this evolutionary scenario, different asteroid fragments could have been dynamically separated by the action of non-gravitational forces. As a consequence of differentiated collisional evolution, each asteroid ended with different degrees of space weathering, aqueous alteration and thermal metamorphism. 4. 4. Collisional processing is also clearly affecting these meteorites. As consequence of shock, the main silicates are crushed and fragmented, producing shock-induced minerals and opaques that remain in the minerals matrixes. The main consequence is that the overall reflectance decreases and the spectra change from red slope to a more neutral behavior in the NIR region. 5. 5. If our evolutionary scenario is correct, secondary minerals could be formed as a natural consequence of the collisional processing and aqueous alteration of their parent asteroids. A natural increasing in the opaque minerals in the matrices of these meteorites could have direct influence on the progressive darkening found in the spectra of CV-CK chondrites. ## Acknowledgements This research has been funded by the research project (PGC2018-097374-B-I00, P.I.: JMT-R), funded by FEDER/Ministerio de Ciencia e Innovación – Agencia Estatal de Investigación. ST is hired in the framework of that research project. This study was done in the frame of a PhD. on Physics at the Autonomous University of Barcelona (UAB). JL is a Serra Húnter Fellow and is grateful to ICREA Academia program and GC 2017 SGR 128. US Antarctic meteorite samples are recovered by the Antarctic Search for Meteorites (ANSMET) program which has been funded by NSF and NASA, and characterized and curated by the Department of Mineral Sciences of the Smithsonian Institution and Astromaterials Acquisition and Curation Office at NASA Johnson Space Center. The Institute of Space Sciences (CSIC) is international repository of these Antarctic samples. We thank all these institutions for providing the Antarctic meteorites studied here. This research utilizes spectra acquired by with the NASA RELAB facility at Brown University. ## Data availability Spectral data in this paper are subjected to one year embargo from the publication date of the article to allow the completion of the research project and conclude the meteorite spectral database. Once the embargo expires the data will be available in a repository upon reasonable request. ## References * Adams & Goullaud (1978) Adams J. B., Goullaud L., 1978, in Lunar and Planetary Science Conference Proceedings. pp 2901–2909 * Barucci et al. (2005) Barucci M. A., et al., 2005, Astronomy & Astrophysics, 430, 313 * Barucci et al. (2020) Barucci M., et al., 2020, Astronomy & Astrophysics, 637, L4 * Bauer (1979) Bauer J. F., 1979, in Lunar and Planetary Science Conference Proceedings. pp 2573–2596 * Beck et al. (2014) Beck P., Garenne A., Quirico E., Bonal L., Montes-Hernandez G., Moynier F., Schmitt B., 2014, Icarus, 229, 263 * Beitz et al. (2016) Beitz E., Blum J., Parisi M. G., Trigo-Rodriguez J., 2016, The Astrophysical Journal, 824, 12 * Belskaya et al. (2010) Belskaya I., Fornasier S., Krugly Y. N., Shevchenko V., Gaftonyuk N., Barucci M. A., Fulchignoni M., Gil-Hutton R., 2010, Astronomy & Astrophysics, 515, A29 * Binzel et al. (2010) Binzel R. P., et al., 2010, Nature, 463, 331 * Binzel et al. (2015) Binzel R. P., Reddy V., Dunn T., 2015, Asteroids IV, , P. Michel et al. (eds), Arizona StateUniv., Tucson, US, 1, 243 * Bland et al. (2000) Bland P., Hoffman E., Krot A., Berry F., 2000, Meteoritics and Planetary Science Supplement, 35, A28 * Blum et al. (2006) Blum J., Schräpler R., Davidsson B. J., Trigo-Rodríguez J. M., 2006, The Astrophysical Journal, 652, 1768 * Brearley (1991) Brearley A., 1991, in Lunar and Planetary Science Conference. * Brearley & Jones (1998) Brearley A., Jones R., 1998, Reviews in Mineralogy * Brearley & Wagner (2014) Brearley A., Wagner A., 2014, in 77th Annual Meeting of the Meteoritical Society. * Brunetto et al. (2015) Brunetto R., Loeffler M. J., Nesvornỳ D., Sasaki S., Strazzulla G., 2015, Asteroids iv, pp 597–616 * Busemann et al. (2007) Busemann H., Alexander M. O., Nittler L. R., 2007, Meteoritics & Planetary Science, 42, 1387 * Chapman et al. (1975) Chapman C. R., Morrison D., Zellner B., 1975, Icarus, 25, 104 * Chaumard & Devouard (2016) Chaumard N., Devouard B., 2016, Meteoritics & Planetary Science, 51, 547 * Chaumard et al. (2014) Chaumard N., Devouard B., Bouvier A., Wadhwa M., 2014, Meteoritics & Planetary Science, 49, 419 * Clark et al. (2009) Clark B. E., Ockert-Bell M. E., Cloutis E. A., Nesvorny D., Mothé-Diniz T., Bus S. J., 2009, Icarus, 202, 119 * Clayton & Mayeda (1999) Clayton R. N., Mayeda T. K., 1999, Geochimica et Cosmochimica Acta, 63, 2089 * Cloutis et al. (1986) Cloutis E. A., Gaffey M. J., Jackowski T. L., Reed K. L., 1986, Journal of Geophysical Research: Solid Earth, 91, 11641 * Cloutis et al. (2010) Cloutis E. A., Hardersen P. S., Bish D. L., Bailey D. T., Gaffey M. J., Craig M. A., 2010, Meteoritics & Planetary Science, 45, 304 * Cloutis et al. (2011) Cloutis E., Hiroi T., Gaffey M., Alexander C. O., Mann P., 2011, Icarus, 212, 180 * Cloutis et al. (2012) Cloutis E., Hudon P., Hiroi T., Gaffey M., 2012, Icarus, 221, 911 * Colonna et al. (2019) Colonna G., Capitelli M., Laricchiuta A., 2019, Hypersonic Meteoroid Entry Physics, by G. Colonna, M. Capitelli and A. Laricchiuta. ISBN: 978-0-7503-1666-8. IOP ebooks. Bristol, UK: IOP Publishing, 2019 * De León et al. (2018) De León J., et al., 2018, Icarus, 313, 25 * DeMeo et al. (2009) DeMeo F. E., Binzel R. P., Slivan S. M., Bus S. J., 2009, Icarus, 202, 160 * Devouard et al. (2006) Devouard B., Ferriere L., Zanda-Hewins B., Messaoudi M., 2006, Meteorit. Planet. Sci, 41, A203 * Dunn et al. (2016) Dunn T. L., Gross J., Ivanova M. A., Runyon S. E., Bruck A. M., 2016, Meteoritics & Planetary Science, 51, 1701 * Gaffey et al. (2002) Gaffey M., Cloutis E., Kelley M., Reed K., Bottke W., Cellino A., Paolicchi P., Binzel R., 2002, Asteroids III, Univ. Arizona Press Tucson, AZ, 183-204 * Geiger & Bischoff (1995) Geiger T., Bischoff A., 1995, Planetary and Space Science, 43, 485 * Gillis-Davis et al. (2017) Gillis-Davis J. J., Lucey P. G., Bradley J. P., Ishii H. A., Kaluna H. M., Misra A., Connolly Jr H. C., 2017, Icarus, 286, 1 * Greenwood et al. (2003) Greenwood R., Kearsley A., Franchi I., 2003, 66th Annual Meteoritical Society Meeting, Munster, Germany * Greenwood et al. (2004) Greenwood R., Franchi I., Kearsley A., Alard O., 2004, 35th Lunar and Planetary Science Conference, Houston, Texas, USA * Greenwood et al. (2010) Greenwood R., Franchi I., Kearsley A., Alard O., 2010, Geochimica et Cosmochimica Acta, 74, 1684 * Hamilton et al. (2019) Hamilton V., et al., 2019, Nature Astronomy, 3, 332 * Harris et al. (2020) Harris C. R., et al., 2020, Nature, 585, 357–362 * Hashiguchi et al. (2008) Hashiguchi M., Tomeoka K., Ohnishi I., 2008, 43 * Hendrix & Vilas (2006) Hendrix A. R., Vilas F., 2006, The Astronomical Journal, 132, 1396 * Hiroi et al. (1993) Hiroi T., Pieters C. M., Zolensky M. E., Lipschutz M. E., 1993, Science, 261, 1016 * Huber et al. (2006) Huber H., Rubin A. E., Kallemeyn G. W., Wasson J. T., 2006, Geochimica et Cosmochimica Acta, 70, 4019 * Hunt & Ashley (1979) Hunt G. R., Ashley R. P., 1979, Economic Geology, 74, 1613 * Hunter (2007) Hunter J. D., 2007, Computing in Science Engineering, 9, 90 * Isa et al. (2012) Isa J., Rubin A., Wasson J., 2012, in Lunar and Planetary Science Conference. * Jarosewich (2006) Jarosewich E., 2006, Meteoritics & Planetary Science, 41, 1381 * Jogo et al. (2018) Jogo K., Ito M., Nakamura T., Kobayashi S., Lee J. I., 2018, Earth, Planets and Space, 70, 37 * Kallemeyn et al. (1991) Kallemeyn G. W., Rubin A. E., Wasson J. T., 1991, Geochimica et Cosmochimica Acta, 55, 881 * King & Ridley (1987) King T. V., Ridley W. I., 1987, Journal of Geophysical Research: Solid Earth, 92, 11457 * Kitazato et al. (2019) Kitazato K., et al., 2019, Science, 364, 272 * Kracher et al. (1985) Kracher A., Keil K., Kallemeyn G., Wasson J., Clayton R., Huss G., 1985, Journal of Geophysical Research: Solid Earth, 90, 123 * Lauretta et al. (2017) Lauretta D., et al., 2017, Space Science Reviews, 212, 925 * Lazzarin et al. (2004) Lazzarin M., Marchi S., Magrin S., Barbieri C., 2004, L25 * Le Corre et al. (2017) Le Corre L., et al., 2017, Monthly Notices of the Royal Astronomical Society, 475, 614 * Marsset et al. (2020) Marsset M., et al., 2020, Nature Astronomy, pp 1–8 * Morate et al. (2018) Morate D., Licandro J., Popescu M., de León J., 2018, Astronomy & Astrophysics, 617, A72 * Morris et al. (1985) Morris R. V., Lauer Jr H. V., Lawson C. A., Gibson Jr E. K., Nace G. A., Stewart C., 1985, Journal of Geophysical Research: Solid Earth, 90, 3126 * Mothé-Diniz & Carvano (2005) Mothé-Diniz T., Carvano J., 2005, Astronomy & Astrophysics, 442, 727 * Mothé-Diniz et al. (2008) Mothé-Diniz T., Carvano J., Bus S., Duffard R., Burbine T., 2008, Icarus, 195, 277 * Moyano-Cambero et al. (2016) Moyano-Cambero C. E., Trigo-Rodr$\acute{\iota}$guez J. M., Llorca J., Fornasier S., Barucci M. A., Rimola A., 2016, Meteoritics & Planetary Science, 51, 1795 * Moyano-Cambero et al. (2017) Moyano-Cambero C. E., et al., 2017, The Astrophysical Journal, 835, 157 * Noguchi (1993) Noguchi T., 1993, Antarctic Meteorite Research, 6, 204 * Norton (2002) Norton O., 2002, The Observatory, 122, 297 * Rizos et al. (2021) Rizos J., et al., 2021, Icarus, 364, 114467 * Rubin (2004) Rubin A. E., 2004, Geochimica et Cosmochimica Acta, 68, 673 * Rubin (2012) Rubin A. E., 2012, Geochimica et Cosmochimica Acta, 90, 181 * Rubin & Ma (2017) Rubin A. E., Ma C., 2017, Chemie der Erde-Geochemistry, 77, 325 * Rubin et al. (2007) Rubin A. E., Trigo-Rodríguez J. M., Huber H., Wasson J. T., 2007, Geochimica et Cosmochimica Acta, 71, 2361 * Salisbury et al. (1975) Salisbury J. W., Hunt G. R., Lenhoff C. J., 1975, Modern Geology, 5, 115 * Scott et al. (1992) Scott E. R., Keil K., Stoeffler D., 1992, Geochimica et Cosmochimica Acta, 56, 4281 * Tanbakouei et al. (2019) Tanbakouei S., Trigo-Rodríguez J. M., Sort J., Michel P., Blum J., Nakamura T., Williams I., 2019, Astronomy & Astrophysics, 629, A119 * Tanbakouei et al. (2020) Tanbakouei S., Trigo-Rodriguez J. M., Williams I., Llorca J., et al., 2020, arXiv preprint arXiv:2007.06212, In Press * Tang et al. (2003) Tang J., Myers M., Bosnick K. A., Brus L. E., 2003, The Journal of Physical Chemistry B, 107, 7501 * Trigo-Rodríguez (2015) Trigo-Rodríguez J. M., 2015, Planetary Materials. EMU Notes in Mineralogy, 15, 67 * Trigo-Rodriguez & Blum (2009) Trigo-Rodriguez J. M., Blum J., 2009, Planetary and Space Science, 57, 243 * Trigo-Rodriguez et al. (2006) Trigo-Rodriguez J. M., Rubin A. E., Wasson J. T., 2006, Geochimica et Cosmochimica Acta, 70, 1271 * Trigo-Rodriguez et al. (2014) Trigo-Rodriguez J. M., et al., 2014, Monthly Notices of the Royal Astronomical Society, 437, 227 * Trigo-Rodríguez et al. (2015) Trigo-Rodríguez J. M., et al., 2015, Monthly Notices of the Royal Astronomical Society, 449, 2119 * Trigo-Rodríguez et al. (2019) Trigo-Rodríguez J. M., Rimola A., Tanbakouei S., Soto V. C., Lee M., 2019, Space Science Reviews, 215, 18 * Urzaiz et al. (2015) Urzaiz M., Trigo-Rodriguez J., Mestres N., 2015, in Lunar and Planetary Science Conference. p. 1785 * Van Rossum & Drake (2009) Van Rossum G., Drake F. L., 2009, Python 3 Reference Manual. CreateSpace, Scotts Valley, CA * Van Rossum & Drake Jr (1995) Van Rossum G., Drake Jr F. L., 1995, Python tutorial. Centrum voor Wiskunde en Informatica Amsterdam, The Netherlands * Vernazza et al. (2011) Vernazza P., et al., 2011, Icarus, 216, 650 * Virtanen et al. (2020) Virtanen P., et al., 2020, Nature Methods, 17, 261 * Wasson et al. (2013) Wasson J. T., Isa J., Rubin A. E., 2013, Geochimica et Cosmochimica Acta, 108, 45 * Wes McKinney (2010) Wes McKinney 2010, in Stéfan van der Walt Jarrod Millman eds, Proceedings of the 9th Python in Science Conference. pp 56 – 61 * Yin et al. (2017) Yin Q.-Z., Sanborn M., Ziegler K., 2017, in Lunar and Planetary Science Conference. ## Appendix A Complementary figures Figure 10: Barium sulphate ($BaSO_{4}$) standard baseline, used in the correction applied to calibrate the detector (Moyano-Cambero et al., 2016). Figure 11: Spectral comparisons of CK chondrites with other averaged asteroid spectral classes ruled out during the investigation. A)C ateroid classes, B) B asteroid classess, C)K asteroid classes and D)L asteroid classes . ## Appendix B Python Code Van Rossum & Drake (2009); Van Rossum & Drake Jr (1995) import pandas as pd import matplotlib.pyplot as plt from scipy.signal import (find$\\_$peaks), peak$\\_$widths import numpy as np Virtanen et al. (2020); Harris et al. (2020); Hunter (2007); Wes McKinney (2010) # get max peaks peaksMax, $\\_$= find$\\_$peaks(CK4$\\_$LAR$\\_$04318, distance=70) # get min peaks peaksMin,$\\_$= find$\\_$ peaks(-CK4$\\_$LAR$\\_$04318, distance=70) # get max peak width widths, h$\\_$eval, left$\\_$ips, right$\\_$ips = peak$\\_$widths(-CK4$\\_$LAR$\\_$04318, peaksMax) # get min peak width widths, h$\\_$eval, left$\\_$ips, right$\\_$ips = peak$\\_$widths(-CK4$\\_$LAR$\\_$04318, peaksMin) print("Widths of each min peak: ", widths) —————————————————————————————————
arxiv-papers
2021-07-27T04:21:21
2024-09-04T03:07:20.487383
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Safoura Tanbakouei, Josep M. Trigo-Rodriguez, J.Llorca,\n C.E.Moyano-Cambero, I.P.Williams, Andrew S. Rivkin", "submitter": "Safoura Tanbakouei", "url": "https://arxiv.org/abs/2107.12590" }
2107.12591
## Combining Probabilistic Logic and Deep Learning for Self-Supervised Learning Hoifung Poon, Microsoft Research, Redmond WA, USA Hai Wang, JD Finance America Corporation, Mountain View CA, USA Hunter Lang, MIT CSAIL, Cambridge MA, USA Deep learning has proven effective for various application tasks, but its applicability is limited by the reliance on annotated examples. Self- supervised learning has emerged as a promising direction to alleviate the supervision bottleneck, but existing work focuses on leveraging co-occurrences in unlabeled data for task-agnostic representation learning, as exemplified by masked language model pretraining. In this chapter, we explore task-specific self-supervision, which leverages domain knowledge to automatically annotate noisy training examples for end applications, either by introducing labeling functions for annotating individual instances, or by imposing constraints over interdependent label decisions. We first present deep probabilistic logic (DPL), which offers a unifying framework for task-specific self-supervision by composing probabilistic logic with deep learning. DPL represents unknown labels as latent variables and incorporates diverse self-supervision using probabilistic logic to train a deep neural network end-to-end using variational EM. Next, we present self-supervised self-supervision (S4), which adds to DPL the capability to learn new self-supervision automatically. Starting from an initial seed self-supervision, S4 iteratively uses the deep neural network to propose new self supervision. These are either added directly (a form of structured self-training) or verified by a human expert (as in feature-based active learning). Experiments on real-world applications such as biomedical machine reading and various text classification tasks show that task-specific self-supervision can effectively leverage domain expertise and often match the accuracy of supervised methods with a tiny fraction of human effort. ### 1.1 Introduction Figure 1.1: Deep Probabilistic Logic: A general framework for combining task- specific self-supervision strategies by composing probabilistic logic with deep learning. Learning amounts to maximizing conditional likelihood of virtual evidence given input by summing up latent label decisions. Machine learning has made great strides in enhancing model sophistication and learning efficacy, as exemplified by recent advances in deep learning [1]. However, contemporary supervised learning techniques require a large amount of labeled data, which is expensive and time-consuming to produce. This problem is particularly acute in specialized domains like biomedicine, where crowdsourcing is difficult to apply. Self-supervised learning has emerged as a promising paradigm to overcome the annotation bottleneck by automatically generating noisy training examples from unlabeled data. However, existing work predominantly focuses on task-agnostic representation learning by modeling co- occurrences in unlabeled data, as exemplified in masked language model pretraining [2]. While successful, it still requires manual annotation of task-specific labeled examples to fine-tune pretrained models for end applications. In this chapter, we explore task-specific self-supervised learning, which can directly generate training examples for end applications. The key insight is to introduce a general framework that can best leverage human expert bandwidth by accepting and leveraging alternative forms of supervision. For example, with relatively small effort, domain experts can produce labeling functions [3, 4] and joint inference constraints [5, 6, 7, 8]. Additionally, there are ample available resources such as ontologies and knowledge bases that can be leveraged to automatically annotate training examples in unlabeled data [9, 10]. Using such self-specified supervision templates, we can automatically produce training examples at scale from unlabeled data. A central challenge in leveraging such diverse forms of self-supervision is that they are inherently noisy and may be contradictory with each other. We present deep probabilistic logic (DPL), which provides a unifying framework for task-specific self-supervision by composing probabilistic logic with deep learning [11]. DPL models label decisions as latent variables, represents prior knowledge on their relations using Markov logic (weighted first-order logical formulas) [12], and alternates between learning a deep neural network for the end task and refining uncertain formula weights for self-supervision, using variational EM. Probabilistic logic offers a principled way to combine noisy and inconsistent self-supervision. Feedback from deep learning helps resolve noise and inconsistency in the initial self-supervision. Experiments on biomedical machine reading show that distant supervision, data programming, and joint inference can be seamlessly combined in DPL to substantially improve machine reading accuracy, without requiring any manually labeled examples. Figure 1.2: Self-Supervised Self-Supervision (S4): S4 builds on deep probabilistic logic and uses probabilistic logic to represent self-supervision for learning a deep neural network for the end prediction task. Starting from pre-specified self-supervision, S4 interleaves structure learning and active learning steps to introduce new self-supervision for training the neural network and refining the graphical model parameters. Self-supervision factors from initialization, structure learning, and active learning are shown in blue, red, and black, respectively. DPL still requires human experts to manually specify self-supervision. We next present Self-Supervised Self-Supervision (S4), which is a general framework for learning to add new self-supervision, by extending DPL with structure learning and active learning capabilities (see Figure 1.2) [13]. S4 first runs DPL using the pre-specified seed self-supervision (represented as a Markov logic network), then iteratively proposes new self-supervision (weighted logical formula) using the trained deep neural network, and determines whether to add it directly to the self-supervision Markov logic network or ask a human expert to vet it. The former can be viewed as structured self-training, which generalizes self-training [14] by adding not only individual labels but also arbitrary probabilistic factors over them. The latter subsumes feature-based active learning [15] with arbitrary features expressible using probabilistic logic. By combining the two in a unified framework, S4 can leverage both paradigms for generating new self-supervision and subsume many related approaches as special cases. Using transformer-based models [16] for the deep neural network in DPL, we explore various self-supervision proposal mechanisms based on neural attention and label entropy. Our method can learn to propose both unary potential factors over individual labels and joint-inference factors over multiple labels. Experiments on various text classification tasks show that S4 can substantially improve over the seed self-supervision by proposing new self-supervision, often matching the accuracy of fully supervised systems with a fraction of human effort. We first review related work in self-supervised learning and combining probabilistic logic with deep learning. We then present deep probabilistic logic and self-supervised self-supervision in details. We conclude by discussing several exciting future directions. We focus on natural language processing (NLP) applications in this chapter, but our methods are potentially applicable to other domains and tasks. ### 1.2 Task-Specific Self-Supervision Techniques to compensate for the lack of direct supervision come in many names and forms [10, 3, 17, 18, 11]. Self-supervision has emerged as an encompassing paradigm that views these as instances of using self-specified templates to generate noisy labeled examples on unlabeled data. The name self-supervision is closely related to self-training [14], which bootstraps from a supervised classifier, uses it to annotate unlabeled instances, and iteratively adds confident labels to retrain the classifier. Task-agnostic self-supervision generalizes word embedding and language modeling by learning to predict self- specified masked tokens, as exemplified by recent pretraining methods such as BERT [2]. In this chapter, we focus on task-specific self-supervision and use pretrained models as a building block for task-specific learning. Below, we review three popular forms of task-specific self-supervision: distant supervision, data programming, and joint inference. ##### Distant supervision This paradigm was first introduced for binary relation extraction [9, 10]. In its simplest form, distant supervision generates a positive example if an entity pair with a known relation co-occurs in a sentence, and samples negative examples from co-occurring entity pairs not known to have the given relation. It has recently been extended to cross-sentence relation extraction [19, 20]. In principle, one simply looks beyond single sentences for co- occurring entity pairs. However, this can introduce many false positives and prior work used a small sliding window and filtering (minimal-span) to mitigate training noise. Even so, accuracy is relatively low. Both [19] and [20] used ontology-based string matching for entity linking, which also incurs many false positives, as entity mentions can be highly ambiguous (e.g., PDF and AAAS are gene names). Distant supervision for entity linking is relatively underexplored, and prior work generally focuses on Freebase entities, where links to the corresponding Wikipedia articles are available for learning [21]. ##### Data Programming Instead of annotated examples, domain experts are asked to produce labeling functions, each of which assigns a label to an instance if the input satisfies certain conditions, often specified by simple rules [22]. This paradigm is useful for semantic tasks, as high-precision text-based rules are often easy to come by. However, there is no guarantee on broad coverage, and labeling functions are still noisy and may contradict with each other. The common denoising strategy assumes that labeling functions make random mistakes, and focuses on estimating their accuracy and correlation [3, 17, 23]. A more sophisticated strategy also models instance-level labels and uses instance embedding to estimate instance-level weight for each labeling function [24]. ##### Joint Inference Distant supervision and data programming focus on infusing task-specific self- supervision on individual labels. Additionally, there is rich linguistic and domain knowledge that does not specify values for individual labels, but imposes constraints on their joint distribution. For example, if two mentions are coreferent, they should agree on entity properties [6]. There is a rich literature on joint inference for NLP applications. Notable methodologies include constraint-driven learning [5], general expectation [7], posterior regularization [8], and probabilistic logic [6]. Constraints can be imposed on relational instances or on model expectations. Learning and inference are often tailor-made for each approach, including beam search, primal-dual optimization, weighted satisfiability solvers, etc. Recently, joint inference has also been used in denoising distant supervision. Instead of labeling all co-occurrences of an entity pair with a known relation as positive examples, one only assumes that at least one instance is positive [25, 26]. Existing self-supervision paradigms are typically special cases of deep probabilistic logic (DPL). E.g., data programming admit only self-supervision for individual instances (labeling functions or their correlations). Anchor learning [27] is an earlier form of data programming that, while more restricted, allows for stronger theoretical learning guarantees. Prototype learning is an even earlier special case with labeling functions provided by “prototypes” [28, 29]. Using Markov logic to model self-supervision, DPL can incorporate arbitrary prior beliefs on both individual labels and their interdependencies, thereby unleashing the full power of joint inference [30, 31, 32, 33] to amplify and propagate self-supervision signals. Self-supervised self-supervision (S4) further extends DPL with structure learning capability. Most structure learning techniques are developed for the supervised setting, where structure search is guided by labeled examples [34, 35]. Moreover, traditional relational learning induces deterministic rules and is susceptible to noise and uncertainty. Bootstrapping learning is one of the earliest and simplest self-supervision methods with some rule-learning capability, by alternating between inducing characteristic contextual patterns and classifying instances [36, 37]. The pattern classes are limited and only applicable to special problems (e.g., “A such as B” to find $\tt ISA$ relations). Most importantly, they lack a coherent probabilistic formulation and may suffer catastrophic semantic drift due to ambiguous patterns (e.g., “cookie” as food or compute use). [38] and [39] designed a more sophisticated rule induction approach, but their method uses deterministic rules and may be sensitive to noise and ambiguity. Recently, Snuba [40] extends the data programming framework by automatically adding new labeling functions, but like prior data programming methods, their self-supervision framework is limited to modeling prior beliefs on individual instances. Their method also requires access to a small number of labeled examples to score new labeling functions. Another significant advance in S4 is by extending DPL with the capability to conduct structured active learning, where human experts are asked to verify arbitrary virtual evidences, rather than a label decision. Note that by admitting joint inference factors, this is more general than prior use of feature-based active learning, which focuses on per-instance features [15]. As our experiments show, interleaving structured self-training learning and structured active learning results in substantial gains, and provides the best use of precious human bandwidth. [41] previously considered active structure learning in the context of Bayesian networks. Anchor learning [27] can also suggest new self-supervision for human review. Darwin [42] incorporates active learning for verifying proposed rules, but it doesn’t conduct structure learning, and like Snuba and other data programming methods, it only models individual instances. ### 1.3 Combining Probabilistic Logic with Deep Learning Probabilistic logic combines logic’s expressive power with the capability of graphical models to handle uncertainty. A representative example is Markov logic [12], which defines a probability distribution using weighted first- order logical formulas as templates for a Markov model. Given random variables $X$ for a problem domain, Markov logic uses a set of weighted first-order logical formulas $(w_{i},f_{i}):i$ to define a joint probability distribution $P(X)\propto\exp\sum_{i}\leavevmode\nobreak\ w_{i}\cdot f_{i}(X)$. Intuitively, the weight $w_{i}$ correlates with how likely formula $f_{i}$ holds true. A logical constraint is a special case when $w_{i}$ is set to $\infty$ (or a sufficiently large number). Probabilistic logic has been applied to incorporating joint inference and other task-specific self- supervision for various NLP tasks [43, 6, 44], but its expressive power comes at a price: learning and inference are generally intractable, and end-to-end modeling often requires heavy approximation [45]. Recently, there has been increasing interest in combining probabilistic logic with deep learning, thereby harnessing probabilistic logic’s capability in representing and reasoning with knowledge, as well as leveraging deep learning’s strength in distilling complex patterns from high-dimension data. Most existing work focuses on incorporating probabilistic logic in inference, typically by replacing discrete logical predicates with neural representation and jointly learning global probabilistic logic parametrization and local neural networks, as exemplified by differentiable proving [46] and DeepProbLog [47]. By contrast, we leverage probabilistic logic to provide self-supervision for deep learning. These two approaches are complementary and can be combined, i.e., by using probabilistic logic to infuse prior knowledge for both learning and inference, as explored in recent work on knowledge graph embedding [48]. Deep generative models also combine deep learning with probabilistic models, but focus on uncovering latent factors to support generative modeling and semi-supervised learning [49, 50]. Knowledge infusion is limited to introducing structures among latent variables (e.g., Markov chain) [51]. Deep probabilistic programming provides a flexible interface for exploring such composition [52]. In deep probabilistic logic and self-supervised self- supervision, we instead combine a discriminative neural network predictor with a generative self-supervision model based on Markov logic, and can fully leverage their respective capabilities to advance co-learning [53, 54]. Deep neural networks also provide a powerful feature-induction engine to support structure learning and active learning. ### 1.4 Deep Probabilistic Logic: A Unifying Framework for Self-Supervision In this section, we introduce deep probabilistic logic (DPL) as a unifying framework for task-specific self-supervision. Label decisions are modeled as latent variables. Self-supervision is represented as generalized virtual evidence, and learning maximizes the conditional likelihood of virtual evidence given input. The use of probabilistic logic is limited to modeling self-supervision, leaving end-to-end modeling to the deep neural network for end prediction. This alleviates the computational challenges in using probabilistic logic end-to-end, while leveraging the strength of deep learning in distilling complex patterns from high-dimension data. Infusing knowledge in neural network training is a long-standing challenge in deep learning [55]. [56, 57] first used logical rules to help train a convolutional neural network for sentiment analysis. DPL draws inspiration from their approach, but is more general and theoretically well-founded. [56, 57] focused on supervised learning and the logical rules were introduced to augment labeled examples via posterior regularization [8]. DPL can incorporate both direct and indirect supervision, including posterior regularization and other forms of self-supervision. Like DPL, [57] also refined uncertain weights of logical rules, but they did it in a heuristic way by appealing to symmetry with standard posterior regularization. We provide a novel problem formulation using generalized virtual evidence, which shows that their heuristic is a special case of variational EM and opens up opportunities for other optimization strategies. We first review the idea of virtual evidence and show how it can be generalized to represent any form of self-supervision. We then formulate the learning objective and show how it can be optimized using variational EM. #### 1.4.1 Deep Probabilistic Logic Given a prediction task, let $\mathcal{X}$ denote the set of possible inputs and $\mathcal{Y}$ the set of possible outputs. The goal is to train a prediction module $\Psi(x,y)$ that scores output $y$ given input $x$. We assume that $\Psi(x,y)$ defines the conditional probability $P(y|x)$ using a deep neural network with a softmax layer at the top. Let $X=(X_{1},\cdots,X_{N})$ denote a sequence of inputs and $Y=(Y_{1},\cdots,Y_{N})$ the corresponding outputs. We consider the setting where $Y$ are unobserved, and $\Psi(x,y)$ is learned using task-specific self- supervision. ##### Virtual evidence Pearl [58] first introduced the notion of virtual evidence, which has been used to incorporate label preference in semi-supervised learning [59, 60, 61] and grounded learning [62]. Suppose we have a prior belief on the value of $y$. It can be represented by introducing a binary variable $v$ as a dependent of $y$ such that $P(v=1|y=l)$ is proportional to the prior belief of $y=l$. $v=1$ is thus an observed evidence that imposes soft constraints over $y$. Direct supervision (i.e., observing the true label) for $y$ is a special case when the belief is concentrated on a specific value $y=l^{*}$ (i.e., $P(v=1|y=l)=0$ for any $l\neq l^{*}$). The virtual evidence $v$ can be viewed as a reified variable for a potential function $\Phi(y)\propto P(v=1|y)$. This enables us to generalize virtual evidence to arbitrary potential functions $\Phi(X,Y)$. In the rest of the paper, we will simply refer to the potential functions as virtual evidences, without introducing the reified variables explicitly. ##### DPL Let $K=(\Phi_{1},\cdots,\Phi_{V})$ be a set of virtual evidence derived from prior knowledge. DPL comprises of a supervision module over K and a prediction module over all input-output pairs (Figure 1.1), and defines a probability distribution: $P(K,Y|X)\propto\prod_{v}\leavevmode\nobreak\ \Phi_{v}(X,Y)\cdot\prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i})$ Without loss of generality, we assume that virtual evidences are log-linear factors, which can be compactly represented by weighted first-order logical formulas [12]. Namely, $\Phi_{v}(X,Y)=\exp(w_{v}\cdot f_{v}(X,Y))$, where $f_{v}(X,Y)$ is a binary feature represented by a first-order logical formula. A hard constraint is the special case when $w_{v}=\infty$ (in practice, it suffices to set it to a large number, e.g., 10). In prior use of virtual evidence, $w_{v}$’s are generally pre-determined from prior knowledge. However, this may be suboptimal. Therefore, we consider a general Bayesian learning setting where each $w_{v}$ is drawn from a pre-specified prior distribution $w_{v}\sim P(w_{v}|\alpha_{v})$. Fixed $w_{v}$ amounts to the special case when the prior is concentrated on the preset value. For uncertain $w_{v}$’s, we can compute their maximum a posteriori (MAP) estimates and/or quantify the uncertainty. ##### Distant supervision Virtual evidence for distant supervision is similar to that for direct supervision. For example, for relation extraction, distant supervision from a knowledge base of known relations will set $f_{KB}(X_{i},Y_{i})=\mathbb{I}[\text{\tt In-KB}(X_{i},r)\land Y_{i}=r]$, where $\text{\tt In-KB}(X_{i},r)$ is true iff the entity tuple in $X_{i}$ is known to have relation $r$ in the KB. ##### Data programming Virtual evidence for data programming is similar to that for distant supervision: $f_{L}(X_{i},Y_{i})=\mathbb{I}[L(X_{i})=Y_{i}]$, where $L(X_{i})$ is a labeling function provided by domain experts. Labeling functions are usually high-precision rules, but errors are still common, and different functions may assign conflicting labels to an instance. Existing denoising strategies either assume that each function makes random errors independently, and resolves the conflicts by weighted votes [22], or attempts to learn and account for the dependencies between labeling functions [63]. In DPL, the former can be done by simply treating error probabilities as uncertain parameters and inferring them during learning, and the latter can be done with structure learning over the virtual evidences. ##### Joint inference Constraints on instances or model expectations can be imposed by introducing the corresponding virtual evidence [8] (Proposition 2.1). The weights can be set heuristically [5, 64, 6] or iteratively via primal-dual methods [8]. In addition to instance-level constraints, DPL can incorporate arbitrary high- order soft and hard constraints that capture the interdependencies among multiple instances. For example, identical mentions in proximity probably refer to the same entity, which is useful for resolving ambiguous mentions by leveraging their unambiguous coreferences (e.g., an acronym in apposition of the full name). This can be represented by the virtual evidence $f_{\tt Joint}(X_{i},Y_{i},X_{j},Y_{j})=\mathbb{I}[{\tt Coref}(X_{i},X_{j})\land Y_{i}=Y_{j}]$, where ${\tt Coref}(X_{i},X_{j})$ is true iff $X_{i}$ and $X_{j}$ are coreferences. Similarly, the common denoising strategy for distant supervision replaces the mention-level constraints with type-level constraints [25]. Suppose that $X_{E}\subset X$ contains all $X_{i}$’s with co-occurring entity tuple $E$. The new constraints simply impose that, for each $E$ with known relation $r\in KB$, $Y_{i}=r$ for at least one $X_{i}\in X_{E}$. This can be represented by a high-order factor on $(X_{i},Y_{i}:X_{i}\in X_{E})$. Input: Virtual evidences $K=\Phi_{1:V}$, deep neural network $\Psi$, inputs $X=(X_{1},\cdots,X_{N})$, unobserved outputs $Y=(Y_{1},\cdots,Y_{N})$. Output: Learned prediction module $\Psi^{*}$ Initialize: $\Phi^{0}\sim\text{priors}$, $\Psi^{0}\sim\text{uniform}$. for _$t=1:T$_ do $\displaystyle\qquad\qquad q^{t}(Y)\leftarrow P(Y|\Phi^{t-1},\Psi^{t-1},X)\text{ (approximately)}$ $\displaystyle\qquad\qquad\Phi^{t}\leftarrow\arg\min_{\Phi}\leavevmode\nobreak\ D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\ \prod_{v}\leavevmode\nobreak\ \Phi_{v}(X,Y))$ $\displaystyle\qquad\qquad\Psi^{t}\leftarrow\arg\min_{\Psi}\leavevmode\nobreak\ D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\ \prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i}))$ end for return $\Psi^{*}=\Psi^{T}$. Algorithm 1 DPL Learning ##### Parameter learning Learning in DPL maximizes the conditional likelihood of virtual evidences $P(K|X)$. We could directly optimize this objective by summing out the latent variable $Y$ to compute the gradient and run backpropagation. Instead, in this work we opted for a modular approach using (variational) EM, since both the E- and M-steps reduce to standard inference and learning problems, and because summing out $Y$ is often computationally intractable when using joint inference. See Algorithm 1. In the E-step, we compute an approximation $q(Y)$ for $P(Y|K,X)$. Exact inference is generally intractable, but there is a plethora of approximate inference methods that can efficiently produce an estimate for $P(Y|K,X)$. In this work we chose to use loopy belief propagation (BP) [65]. For each virtual evidence factor $f$, BP computes a “pseudo-marginal” $q_{f}(Y)$, which is an estimate of $\mathbb{E}_{P(Y|K,X)}[f(X,Y)]$. In particular, BP also computes estimates $q_{BP}(Y_{i})\approx\mathbb{E}_{P(Y|K,X)}[Y_{i}]$, the posterior marginal for each instance’s label variable. We set $q(Y)=\prod_{i}q_{BP}(Y_{i})$, the product of approximate marginals returned by BP. While this is not theoretically principled (e.g., mean-field iteration may compute a better factored approximation $q(Y)$), BP provides a good balance of speed and flexibility in dealing with complex, higher-order factors. Note that inference with _high-order factors_ of large size (i.e., factors involving many label variables $Y_{i}$) can still be challenging with BP. However, there is a rich body of literature for handling such structured factors in a principled way. For example, in our biomedical machine reading application, we alter the BP message passing schedule so that each at-least- one factor (for denoising distant supervision; see next subsection) will compute messages to its variables jointly by renormalizing their current marginal probabilities with noisy-or [66], which is a soft version of dual decomposition [67]. In the M-step, we treat the approximation $q(Y)$ as giving probabilistic label assignments to $Y$, and use those assignments to optimize $\Phi$ and $\Psi$ via standard supervised learning. The M-step naturally decouples into two separate optimization tasks, one for the supervision module $\Phi$ and one for the prediction module $\Psi$. For the prediction module (represented by a deep neural network), the optimization task $\arg\min_{\Psi}\leavevmode\nobreak\ D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\ \prod_{i}\leavevmode\nobreak\ \Psi(X_{i},Y_{i}))$ reduces to standard deep learning with cross-entropy loss, where the label distribution over $Y$ is given by our current estimate $q^{t}(Y_{i})$ for the marginal $\mathbb{E}_{P(Y|K,X)}[Y_{i}]$. That is, we train the deep network $\Psi$ to minimize the cross-entropy $-\frac{1}{N}\sum_{i}\sum_{y}q^{t}(Y_{i}=y)\log\Psi(X_{i},y)$. For the supervision module $\Phi$, the optimization task $\arg\min_{\Phi}\leavevmode\nobreak\ D_{KL}(q^{t}(Y)\leavevmode\nobreak\ ||\leavevmode\nobreak\ \prod_{v}\leavevmode\nobreak\ \Phi_{v}(X,Y))$ similarly reduces to standard parameter learning for log-linear models (i.e., learning all $w_{v}$’s that are not fixed). Given the estimate for $P(Y|K,X)$ produced in the E-step, this is a convex optimization problem with a unique (under certain conditions) global optimum. Here, we simply use gradient descent, with the partial derivative for $w_{v}$ being $\mathbb{E}_{\Phi(Y,X)}\leavevmode\nobreak\ [f_{v}(X,Y)]-\mathbb{E}_{q(Y)}\leavevmode\nobreak\ [f_{v}(X,Y)]$. For a tied weight, the partial derivative will sum over all features that originate from the same template. The second expectation is easy to compute given $q(Y)$ estimated in the E-step. The first expectation, on the other hand, requires probabilistic inference in the graphical model _excluding_ the prediction module $\Psi$. But this can again be computed using belief propagation, similar to the E-step, except that the messages are limited to factors within the supervision module (i.e., messages from $\Psi$ are no longer included). Convergence is usually fast, upon which BP returns an approximation to $\mathbb{E}_{\Phi(Y,X)}\leavevmode\nobreak\ [f_{v}(X,Y)]$. As in the E-step, there are some nuances in the M-step when the BP approximation is not exact. [68] contains a more formal discussion of parameter learning with approximate inference methods. For a more theoretically principled approach, one could use tree-reweighted belief propagation in the M-step and mean-field iteration in the E-step. However, we find that our approach is easy to implement and work reasonably well in practice. As aforementioned, the parameter learning problem for the supervision module is much simpler than end-to-end learning with probabilistic logic, as it focuses on refining uncertain weights for task-specific self- supervision, rather than learning complex input patterns for label prediction (handled in deep learning). Figure 1.3: Example of DPL combining various task-specific self-supervision using probabilistic logic. ##### Example Figure 1.3 shows a toy example on how DPL combines various task-specific self- supervision for predicting drug-gene interaction (e.g., gefitinib can be used to treat tumors with EGFR mutations). Self-supervision is modeled by probabilistic logic, which defines a joint probability distribution over latent labeling decisions for drug-gene mention pairs in unlabeled text. Here, distant supervision prefers classifying mention pairs of known relations, whereas the data programming formula opposes classifying instances resembling citations, and the joint inference formula ensures that at least one mention pair of a known relation is classified as positive. Formula weight signifies the confidence in the self-supervision, and can be refined iteratively along with the prediction module. ##### Handling label imbalance One challenge for distant supervision is that negative examples are often much more numerous. A common strategy is to subsample negative examples to attain a balanced dataset. In preliminary experiments, we found that this was often suboptimal, as many informative negative examples were excluded from training. Instead, we restored the balance by up-weighting positive examples. In DPL, an additional challenge is that the labels are probabilistic and change over iterations. In this paper, we simply used hard EM, with binary labels set using 0.5 as the probability threshold, and the up-weighting coefficient recalculated after each E-step. Figure 1.4: Example of cross-sentence relation extraction for precision cancer treatment. #### 1.4.2 Biomedical Machine Reading There is a long-standing interest in biomedical machine reading (e.g., [69, 70]), but prior studies focused on supervised approaches. The advent of big biomedical data creates additional urgency for developing scalable approaches that can generalize to new reading tasks. For example, genome sequencing cost has been dropping faster than Moore’s Law, yet oncologists can only evaluate tumor sequences for a tiny fraction of patients, due to the bottleneck in assimilating relevant knowledge from publications. Recently, [20] formulated precision oncology machine reading as cross-sentence relation extraction (Figure 1.4) and developed the state-of-the-art system using distant supervision. While promising, their results still leave much room to improve. Moreover, they used heuristics to heavily filter entity candidates, with significant recall loss. In this section, we use cross-sentence relation extraction as a case study for combining task-specific self-supervision using deep probabilistic logic (DPL). First, we show that DPL can substantially improve machine reading accuracy in a head-to-head comparison with [20], using the same entity linking method. Next, we apply DPL to entity linking itself and attain similar improvement. Finally, we consider further improving the recall by removing the entity filter. By applying DPL to joint entity linking and relation extraction, we more than doubled the recall in relation extraction while attaining comparable precision as [20] with heavy entity filtering. ##### Evaluation Comparing task-specific self-supervision methods is challenging as there is often no annotated test set for evaluating precision and recall. In such cases, we resort to the standard strategy used in prior work by reporting sample precision (estimated proportion of correct system extractions) and absolute recall (estimated number of correct system extractions). Absolute recall is proportional to recall and can be used to compare different systems (modulo estimation errors). ##### Datasets We used the same unlabeled text as [20], which consists of about one million full text articles in PubMed Central (PMC)111www.ncbi.nlm.nih.gov/pmc. Tokenization, part-of-speech tagging, and syntactic parsing were conducted using SPLAT [71], and Stanford dependencies [72] were obtained using Stanford CoreNLP [73]. For entity ontologies, we used DrugBank222www.drugbank.ca and Human Gene Ontology (HUGO)333www.genenames.org. DrugBank contains 8257 drugs; we used the subset of 599 cancer drugs. HUGO contains 37661 genes. For knowledge bases, we used the Gene Drug Knowledge Database (GDKD) [74] and the Clinical Interpretations of Variants In Cancer (CIVIC)444civic.genome.wustl.edu. Together, they contain 231 drug-gene- mutation triples, with 76 drugs, 35 genes and 123 mutations. | Distant Supervision: GDKD, CIVIC --- Data Programming (Entity) Mention matches entity name exactly. Mention not a stop word. Mention not following figure designation. Mention’s POS tags indicate it is a noun. Data Programming (Relation) Less than 30% of words are numbers in each sentence. No more than three consecutive numbers. No more than two “et al”. No more than three tokens start with uppercase. No more than three special characters. No more than three keywords indicative of table or figure. Entity mentions do not overlap. Joint Inference: Relation holds in at least one instance. (a) Relation Extraction | Distant Supervision: HGNC --- Data Programming No verbs in POS tags. Mention not a common word. Mention contains more than two characters or one word. More than 30% of characters are upper case. Mention contains both upper and lower case characters. Mention contains both character and digit. Mention contains more than six characters. Dependency label from mention to parent indicative of direct object. Joint Inference Identical mentions nearby probably refer to the same entity. Appositive mentions probably refer to the same entity. Nearby mentions that match synonyms of same entity probably refer to the given entity. (b) Entity Linking Table 1.1: DPL combines three types of task-specific self-supervision for relation extraction and entity linking #### 1.4.3 Cross-sentence relation extraction Let $e_{1},\cdots,e_{m}$ be entity mentions in text $T$. Relation extraction can be formulated as classifying whether a relation $R$ holds for $e_{1},\cdots,e_{m}$ in $T$. To enable a head-to-head comparison, we used the same cross-sentence setting as [20], where $T$ spans up to three consecutive sentences and $R$ represents the ternary interaction over drugs, genes, and mutations (whether the drug is relevant for treating tumors with the given gene mutation). ##### Entity linking In this subsection, we used the entity linker from Literome [75] to identify drug, gene, and mutation mentions, as in [20]. This entity linker first identifies candidate mentions by matching entity names or synonyms in domain ontologies, then applies heuristics to filter candidates. The heuristics are designed to enhance precision, at the expense of recall. For example, one heuristics would filter candidates of length less than four, which eliminates key cancer genes such as ER or AKT. ##### Prediction module We used the same graph LSTM as in [20] to enable head-to-head comparison on self-supervision. Briefly, a graph LSTM generalizes a linear-chain LSTM by incorporating arbitrary long-ranged dependencies, such as syntactic dependencies, discourse relations, coreference, and connections between roots of adjacent sentences. A word might have precedents other than the prior word, and its LSTM unit is expanded to include a forget gate for each precedent. See [20] for details. ##### Supervision module We used DPL to combine three types of task-specific self-supervision for cross-sentence relation extraction (Table 1.1 (a)). For distant supervision, we used GDKD and CIVIC as in [20]. For data programming, we introduced labeling functions that aim to correct entity and relation errors. Finally, we incorporated joint inference among all co-occurring instances of an entity tuple with the known relation by imposing the at-least-one constraint (i.e., the relation holds for at least one of the instances). For development, we sampled 250 positive extractions from DPL using only distant supervision [20] and excluded them from future training and evaluation. | System | Prec. | Abs. Rec. | Unique ---|---|---|--- Peng 2017 | 0.64 | 6768 | 2738 DPL + $\tt EMB$ | 0.74 | 8478 | 4821 DPL | 0.73 | 7666 | 4144 $-$ $\tt DS$ | 0.29 | 7555 | 4912 $-$ $\tt DP$ | 0.67 | 4826 | 2629 $-$ $\tt DP$ $\tt(ENTITY)$ | 0.70 | 7638 | 4074 $-$ $\tt JI$ | 0.72 | 7418 | 4011 (a) | Pred. Mod. | Prec. | Abs. Rec. | Unique ---|---|---|--- BiLSTM | 0.60 | 6243 | 3427 Graph LSTM | 0.73 | 7666 | 4144 (b) Table 1.2: Comparison of sample precision and absolute recall in test extraction on PMC. (a) Ablation study on self-supervision (DS: distant supervision, DP: data programming, JI: joint inference). DPL + $\tt EMB$ is our system using PubMed-trained word embedding, whereas DPL uses original Wikipedia-trained word embedding in [20]. (b) Comparison of prediction model, with same set of self-supervision and Wikipedia-trained word embedding. ##### Experiment results We compared DPL with the state-of-the-art system of [20]. We also conducted ablation study to evaluate the impact of self-supervision strategies. For a fair comparison, we used the same probability threshold in all cases (an instance is classified as positive if normalized probability score is at least 0.5). For each system, sample precision was estimated by sampling 100 positive extractions and manually determining the proportion of correct extractions by an author knowledgeable about this domain. Absolute recall is estimated by multiplying sample precision with the number of positive extractions. Table 1.2 (a) shows the results. DPL substantially outperformed [20], improving sample precision by ten absolute points and raising absolute recall by 25%. Combining self-supervision is key to this performance gain, as evident from the ablation results. While distant supervision remained the most potent source of task-specific self-supervision, data programming and joint inference each contributed significantly. Replacing out-of-domain (Wikipedia) word embedding with in-domain (PubMed) word embedding [76] also led to a small gain. [20] only compared graph LSTM and linear-chain LSTM in automatic evaluation, where distant-supervision labels were treated as ground truth. They found significant but relatively small gains by graph LSTM. We conducted additional manual evaluation comparing the two in DPL. Surprisingly, we found large performance difference, with graph LSTM outperforming linear-chain LSTM by 13 absolute points in precision and raising absolute recall by over 20% (Table 1.2 (b)). This suggests that [20] might have underestimated performance gain using automatic evaluation. #### 1.4.4 Entity linking Let $m$ be a mention in text and $e$ be an entity in an ontology. The goal of entity linking is to predict $\tt Link(m,e)$, which is true iff $m$ refers to $e$, for every candidate mention-entity pair $m,e$. We focus on genes in this paper, as they are particularly noisy. ##### Prediction module We used BiLSTM with attention over the ten-word windows before and after a mention. The embedding layer is initialized by word2vec embedding trained on PubMed text [76]. The word embedding dimension was 200. We used 5 epochs for training, with Adam as the optimizer. We set learning rate to 0.001, and batch size to 64. ##### Supervision module As in relation extraction, we combined three types of self-supervision using DPL (Table 1.1 (b)). For distant supervision, we obtained all mention-gene candidates by matching PMC text against the HUGO lexicon. We then sampled a subset of 200,000 candidate instances as positive examples. We sampled a similar number of noun phrases as negative examples. For data programming, we introduced labeling functions that used mention characteristics (longer names are less ambiguous) or syntactic context (genes are more likely to be direct objects and nouns). For joint inference, we leverage linguistic phenomena related to coreference (identical, appositive, or synonymous mentions nearby are likely coreferent). | System | Acc. | F1 | Prec. | Rec. ---|---|---|---|--- String Match | 0.18 | 0.31 | 0.18 | 1.00 DS | 0.64 | 0.71 | 0.62 | 0.83 DS + DP | 0.66 | 0.71 | 0.62 | 0.83 DS + DP + JI | 0.70 | 0.76 | 0.68 | 0.86 (a) | | F1 | Precision | Recall ---|---|---|--- GNormPlus | 0.78 | 0.74 | 0.81 DPL | 0.74 | 0.68 | 0.80 (b) Table 1.3: (a) Comparison of gene entity linking results on a balanced test set. The string-matching baseline has low precision. By combining various types of task-specific self-supervision, DPL substantially improved precision while retaining reasonably high recall. (b) Comparison of gene entity linking results on BioCreative II test set. GNormPlus is the state-of-the-art system trained on thousands of labeled examples. DPL used only task-specific self- supervision. ##### Experiment results For evaluation, we annotated a larger set of sample gene-mention candidates and then subsampled a balanced test set of 550 instances (half are true gene mentions, half not). These instances were excluded from training and development. Table 1.3 (a) compares system performance on this test set. The string-matching baseline has a very low precision, as gene mentions are highly ambiguous, which explains why [20] resorted to heavy filtering. By combining various task-specific self-supervision, DPL improved precision by over 50 absolute points, while retaining a reasonably high recall (86%). All self- supervision contributed significantly, as the ablation tests show. We also evaluated DPL on BioCreative II, a shared task on gene entity linking [69]. We compared DPL with GNormPlus [77], the state-of-the-art supervised system trained on thousands of labeled examples in BioCreative II training set. Despite using zero manually labeled examples, DPL attained comparable F1 and recall (Table 1.3 (b)). The difference is mainly in precision, which indicates opportunities for more task-specific self-supervision. #### 1.4.5 Joint entity and relation extraction An important use case for machine reading is to improve knowledge curation efficiency by offering extraction results as candidates for curators to vet. The key to practical adoption is attaining high recall with reasonable precision [20]. The entity filter used in [20] is not ideal in this aspect, as it substantially reduced recall. In this subsection, we consider replacing the entity filter by the DPL entity linker. See Table 1.4 (a). Specifically, we added one labeling function to check if the entity linker returns a normalized probability score above $p_{\tt TRN}$ for gene mentions, and filtered test instances if the gene mention score is lower than $p_{\tt TST}$. We set $p_{\tt TRN}=0.6$ and $p_{\tt TST}=0.3$ from preliminary experiments. The labeling function discouraged learning from noisy mentions, and the test-time filter skips an instance if the gene is likely wrong. Not surprisingly, without entity filtering, [20] suffered large precision loss. All DPL versions substantially improved accuracy, with significantly more gains using the DPL entity linker. | System | Prec | Abs. Rec. | Unique ---|---|---|--- Peng 2017 | 0.31 | 11481 | 5447 DPL (RE) | 0.52 | 17891 | 8534 $+$ EL (TRN) | 0.55 | 21881 | 11047 $+$ EL (TRN/TST) | 0.61 | 20378 | 10291 (a) | Gene | Drug | Mut. | Gene-Mut. | Relation ---|---|---|---|--- 27% | 4% | 20% | 45% | 24% (b) Table 1.4: (a) Comparison of sample precision and absolute recall (all instances and unique entity tuples) when all gene mention candidates are considered. [20] used distant supervision only. RE: DPL relation extraction. EL: using DPL entity linking in RE training (TRN) and/or test (TST). (b) Error analysis for DPL relation extraction. Figure 1.5: Example of relation- extraction errors corrected by DPL with additional task-specific self- supervision. #### 1.4.6 Discussion ##### Scalability DPL is efficient to train, taking around 3.5 hours for relation extraction and 2.5 hours for entity linking in our PubMed-scale experiments, with 25 CPU cores (for probabilistic logic) and one GPU (for LSTM). For relation extraction, the graphical model of probabilistic logic contains around 7,000 variables and 70,000 factors. At test time, it is just an LSTM, which predicted each instance in less than a second. In general, DPL learning scales linearly in the number of training instances. For distant supervision and data programming, DPL scales linearly in the number of known facts and labeling functions. As discussed before, joint inference with high-order factors is more challenging, but can be efficiently approximated. For inference in probabilistic logic, we found that loopy belief propagation worked reasonably well, converging after 2-4 iterations. Overall, we ran variational EM for three iterations, using ten epochs of deep learning in each M-step. We found these worked well in preliminary experiments and used the same setting in all final experiments. ##### Accuracy To understand more about DPL’s performance gain over distant supervision, we manually inspected some relation-extraction errors fixed by DPL after training with additional self-supervision. Figure 1.5 shows two such examples. While some data programming functions were introduced to prevent errors stemming from citations or flattened tables, none were directly applicable to these examples. This shows that DPL can generalize beyond the original self- supervision. While the results are promising, there is still much to improve. Table 1.4 (b) shows estimated precision errors for relation extraction by DPL. (Some instances have multiple errors.) Entity linking can incorporate more task- specific self-supervision. Joint entity linking and relation extraction can be improved by feeding back extraction results to linking. Improvement is also sorely needed in classifying mutations and gene-mutation associations. The prediction module can also be improved, e.g., by adding attention to graph LSTM. DPL offers a flexible framework for exploring all these directions. ### 1.5 Self-Supervised Self-Supervision Input: Seed virtual evidences $I$, deep neural network $\Psi$, inputs $X=(X_{1},\ldots,X_{N})$, unobserved outputs $Y=(Y_{1},\ldots,Y_{N})$, human query budget $T$. Output: Learned prediction module $\Psi$ and virtual evidences $K=\\{(f_{v}(X,Y),w_{v}):v\\}$. Initialize: $K=I$; $Q=\emptyset$; $i=0$. for _$i=1\ldots M$_ do while _Structured Self-Training not converged_ do $\Psi,K\leftarrow\mbox{{DPL-Learn}}(K,\Psi,X,Y)$ $v=\texttt{PropSST}(K,\Psi,X,Y)$; $K\leftarrow K\cup v$; end while if _$|Q| <T$_ then $v=\mbox{{PropFAL}}(K,\Psi,X,Y,Q);Q\leftarrow Q\cup v$; if $\mbox{{Human-Accept}}(v)$ then $K\leftarrow K\cup v$ end if end for Algorithm 2 Self-Supervised Self-Supervision (S4) In this section, we present the Self-Supervised Self-Supervision (S4) framework, which extends deep probabilistic logic (DPL) with the capability to learn new self-supervision. Let $\mathcal{V}=\\{(f_{v},w_{v},\alpha_{v}):v\\}$ be the set of all candidate virtual evidences, where $f_{v}(X,Y)$ is a first- order logical formula, $w_{v}$ is the weight, and $\alpha_{v}$ is the weight prior (for non-fixed $w_{v}$). Let $K$ be the set of virtual evidences maintained by the algorithm, initialized by the seed $I$. The key idea of S4 is to interleave structure learning and active learning to iteratively propose new virtual evidence $v\in\mathcal{V}$ to augment $K$ (Figure 1.2). Specifically, S4 can be viewed as conducting structure learning in the factor graph that specifies the virtual evidence. Structure learning has been studied intensively in the graphical model literature [34]. It is also known as feature selection or feature induction in general machine learning literature [78]. Here, we are introducing structured factors for self-supervision, rather than as feature templates to be used during training. Another key difference from standard structure learning is the deep neural network, which provides an alternative view from the virtual evidence space and enables multi-view learning in DPL. The neural network can also help identify candidate virtual evidences, e.g., via neural attention. Self-training is a special case where candidate virtual evidences are individual label assignments (i.e., $f_{v}=I[y_{v}=l_{v}]$). S4 can thus be viewed as conducting structured self- training (SST) by admitting arbitrary Markov logic formulas as virtual evidence. In data programming and other prior self-supervision methods, human experts need to pre-specify all self-supervision upfront. While it is easy to generate a small seed by identifying the most salient self-supervision, this effort can quickly become tedious and more challenging as the experts are required to enumerate the less salient templates. On the other hand, given a candidate, it’s generally much easier for experts to validate it. This suggests that for the best utilization of human bandwidth, we should focus on leveraging them to produce the initial self-supervision and verify candidate self-supervision. Consequently, in addition to structured self-training (SST), S4 incorporates feature-based active learning (FAL) (i.e., active learning of self- supervision). When SST converges, S4 will switch to the active learning mode by proposing a candidate virtual evidence for human verification (i.e., labeling a feature rather than an instance in standard active learning). Intuitively, in FAL we are proposing virtual evidences for which the labels of the corresponding instances are still uncertain. If the human expert can provide definitive supervision on the label, the information gain will be large. By contrast, in SST, we favor virtual evidences with skewed posterior label assignments for their corresponding instances, as they can potentially amplify the signal. Algorithm 2 describes the S4 algorithm. S4 first conducts DPL using the initial self-supervision $I$, then interleaves structured self-training (SST) with feature-based active learning (FAL). SST steps are repeated until there is little change in the probabilistic labels ($<1\%$ in our experiments). DPL learning updates the deep neural network and the graphical model parameters with warm start (i.e., the parameters are initialized with the previous parameters). All proposed queries are stored and won’t be proposed again. The total amount of human effort consists of generating the seed $I$ and validating $T$ queries. S4 is a general algorithmic framework that can combine various strategies for designing $\mathcal{V}$, $\tt PropSST$, and $\tt PropFAL$. In standard structure learning, $\tt PropSST$ would attempt to maximize the learning objective (e.g., conditional likelihood of seed virtual evidences) by iteratively conducting greedy structure changes. However, this is very expensive to compute, since it requires a full DPL run just to score each candidate. Instead, we take inspiration from the feature-induction and relational learning literature and use heuristic approximations that are much faster to evaluate. In the most general setting, $\mathcal{V}$ contains all possible potential functions. In practice, we can restrict it to obtain a good trade-off between expressiveness and computation for the problem domain. Interestingly, as we will see in the experiment section, even with relatively simple classes of self-supervision, S4 can dramatically improve over DPL through structure learning and active learning. We use text classification from natural language processing (NLP) as a running example to illustrate how to apply S4 in practice. Here, the input $X_{i}=(t_{1},\ldots,t_{s_{i}})$ is a sequence of tokens and the output $Y_{i}$ is the classification label (e.g., $\tt pos$ or $\tt neg$ in sentiment analysis). #### 1.5.1 Candidate Self-Supervision For $\mathcal{V}$, the simplest choice is to use tokens. Namely, $f_{t,l}(X_{i},Y_{i})=\mathbb{I}[t\in X_{i}\land Y_{i}=l]$. For simplicity, we can use a fixed weight and prior for all initial virtual evidence, i.e., $\mathcal{V}=\\{(f_{t,l},w,\alpha):t,l\\}$. Take sentiment analysis as an example. $X_{i}$ may represent a movie review and $Y_{i}\in\\{0,1\\}$ the sentiment. A virtual evidence for self-supervision may stipulate that if the review contains the word “good”, the sentiment is more likely to be positive. This can be represented by the formula $f_{\text{good},1}(X_{i},Y_{i})=\mathbb{I}[\text{``good''}\in X_{i}\wedge Y_{i}=1]$ with a positive weight. A more advanced choice for $\mathcal{V}$ may include high-order joint-inference factors, such as $f_{ij}(Y_{i},Y_{j})=\mathbb{I}[Y_{i}=Y_{j}]$. If we add this factor for similar pairs $X_{i},X_{j}$, it stipulates that instances with similar input are likely to share the same label. Here we define similar pairs with a function ${\tt Sim}(X_{i},X_{j})$ between $X_{i}$ and $X_{j}$, such as the cosine similarity between the sentence (or document) embeddings of $X_{i}$ and $X_{j}$, based on the current deep neural network. Note that this is different from graph-based semi-supervised learning or other kernel-based methods in that the similarity metric is not pre-specified and fixed, but rather evolving along with the neural network for the end task. #### 1.5.2 Structured Self-Training ($\tt PropSST$) From DPL learning, we obtain the current marginal estimate of the latent label variables $q_{i}(Y_{i})$, which we would treat as probabilistic labels in assessing candidate virtual evidence. There are many sensible strategies for proposing candidates in structured self-training (i.e., $\tt PropSST$). For token-based self-supervision, a common technique from the feature-selection literature is to choose a token highly correlated with a label. For example, we can choose the token $t$ that occurs much more frequently in instances for a given label $l$ than others using our noisy label estimates. We find that this often leads to very noisy proposals and semantic drift. A simple refinement is to restrict our scoring to instances containing some initial self-supervised tokens. However, this still has the drawback that a word may occur more often in instances of a class for reasons other than contributing to the label classification. We therefore consider a more sophisticated strategy based on neural attention. Namely, we will credit occurrences using the normalized attention weight for the given token in each instance. Formally, let $A_{\Psi}(X_{i},j)$ represent the normalized attention weight the neural network $\Psi$ assigns to the $j$-th token in $X_{i}$ for the final classification. We define average weighted attention for token $t$ and label $l$ as ${\tt Attn}(t,l)=\frac{1}{C_{t}}\sum_{i,j:X_{i,j}=t}\leavevmode\nobreak\ q_{i}(Y_{i}=l)\cdot A_{\Psi}(X_{i},j)$, where $C_{t}$ is the number of occurrences of $t$ in $X$. Then $\tt PropSST$ would simply score token-based self-supervision $f_{t,l}$ using relative average weighted attention: $S_{\text{token}}(t,l)={\tt Attn}(t,l)-\sum_{l^{\prime}\neq l}{\tt Attn}(t,l^{\prime})$. In each iteration, $\tt PropSST$ picks the top scoring $f_{t,l}$ that has not been proposed yet as the new virtual evidence to add to $K$. We also consider an entropy-based score function that works for arbitrary input-based features. It treats the prediction module $\Psi$ as a black box, and only uses the posterior label assignments $q_{i}(Y_{i})$. Consider candidate virtual evidence $f_{b,l}(X_{i},Y_{i})=\mathbb{I}[b(X_{i})\wedge Y_{i}=l]$, where $b$ is a binary function over input $X_{i}$. This clearly generalizes token-based virtual evidence. Define ${\tt Ent}(b)=H\left(\frac{1}{C_{b}}\sum_{i:b(X_{i})=1}q_{i}(Y_{i})\right)$, where $H$ is the Shannon entropy and $C_{b}$ is the number of instances for which the feature $b$ holds true. This function represents the entropy of the average posterior among all instances with $b(X_{i})=1$. $\tt PropSST$ will then use $S_{\text{entropy}}(b)=1/{\tt Ent}(b)$ to choose the $b^{*}$ with the lowest average entropy and then pick label $l^{*}$ with the highest average posterior probability for $b^{*}$. In our experiments, this performs similarly to attention-based scores. For joint-inference self-supervision, we consider the similarity-based factors defined earlier, and leave the exploration of more complex factors to future work. To distinguish task-specific similarity from pretrained similarity, we use the difference between the similarity computed using the current fine- tuned BERT model and that using the pretrained one. Formally, let ${\tt Sim}_{\text{pretrained}}(X_{i},X_{j})$ be the cosine similarity between the embeddings of $X_{i}$ and $X_{j}$ generated by the pretrained BERT model, and ${\tt Sim}_{\Psi}(X_{i},X_{j})$ be that between the embeddings using the current learned network $\Psi$. $\tt PropSST$ would score the joint-inference factor using the relative similarity and choose the top scoring pairs to add to self-supervision: $S_{\text{joint}}(X_{i},X_{j})={\tt Sim}_{\Psi}(X_{i},X_{j})-{\tt Sim}_{\text{pretrained}}(X_{i},X_{j})$. #### 1.5.3 Feature-Based Active Learning ($\tt PropFAL$) For active learning, a common strategy is to pick the instance with highest entropy in the label distribution based on the current marginal estimate. In feature-based active learning, we can similarly pick the feature $b$ with the highest average entropy ${\tt Ent}(b)$. Note that this is opposite to how we use the entropy-based score function in $\tt PropSST$, where we choose the feature with the lowest average entropy. In $\tt PropFAL$, we will identify $b^{*}=\operatorname*{arg\,max}({\tt Ent}(b))$, present $f_{b^{*},l}(X,Y)=\mathbb{I}[b^{*}(X)\land Y=l]$ for all possible labels $l$, and ask the human expert to choose a label $l^{*}$ to accept or reject them all. #### 1.5.4 Experiments We use the natural language processing (NLP) task of text classification to explore the potential for S4 to improve over DPL using structure learning and active learning. We used three standard text classification datasets: IMDb [79], Stanford Sentiment Treebank [80], and Yahoo! Answers [81]. IMDb contains movie reviews with polarity labels (positive/negative). There are 25,000 training instances with equal numbers of positive and negative labels, and the same numbers for test. Stanford Sentiment Treebank (StanSent) also contains movie reviews, but was annotated with five labels ranging from very negative to very positive. We used the binarized version of StanSent, which collapses the polarized categories and discards the neutral sentences. It contains 6,920 training instances and 1,821 test instances, with roughly equal split. Overall, the StanSent reviews are shorter than IMDb’s, and they often exhibit more challenging linguistic phenomena (e.g., nested negations or sarcasm). The Yahoo dataset contains 1.4 million training questions and 60,000 test questions from Yahoo! Answers; these are equally split into 10 classes. In all our experiments with S4, we withheld gold labels from the system, used the training instances as unlabeled data, and evaluated on the test set. We reported test accuracy, as all of the datasets are class-balanced. For our neural network prediction module $\Psi(X_{i},Y_{i})$, we used the standard BERT-base model pretrained using Wikipedia [2], along with a global-context attention layer as in [82], which we also used for attention-based scoring. We truncated the input text to 512 tokens, the maximum allowed by the standard BERT model. All of our baselines (except supervised bag-of-words) use the same BERT model. For all virtual evidences, we used initial weight $w=2.2$ (the log-odds of 90% probability) and used an $\alpha$ corresponding to an L2 penalty of $5\times 10^{-8}$ on $w$. Our results are not sensitive to these values. In all experiments, we use the Adam optimizer with an initial learning rate tuned over $[0.1,0.01,0.001]$. The optimizer’s history is reset after each EM iteration to remove old gradient information. We always performed 3 EM iterations and trained $\Psi$ for 5 epochs per iteration. For the global- context attention layer, we used a context dimension of 5. The model is warm- started across EM iterations (in DPL), but _not_ across the outer iterations in S4 (the for loop). In all experiments, we used the Adam optimizer with an initial learning rate tuned over $[0.1,0.01,0.001]$. The optimizer’s history is reset after each EM iteration to remove old gradient information. For virtual evidence, we focus on token-based unary factors and similarity- based joint factors, as discussed in the previous section, and leave the exploration of more complex factors to future work. Even with these factors, our self-supervised $\Psi$ models often nearly match the accuracy of the best supervised models. We also compare with Snorkel, a popular self-supervision system [3]. We use the latest Snorkel version [63], which models correlations among same-instance factors. Snorkel cannot incorporate joint-inference factors across different instances. In all of our Snorkel baselines, we separately tuned the initial learning rate over the same set, and trained the deep neural network for the same number of total epochs that DPL uses to ensure a fair comparison. To simulate human supervision for unary factors, we trained a unigram model using the training data with L1 regularization and selected the 100 tokens with the highest weights for each class as the oracle self-supervision. By default, we used the top tokens for each class in the initial self-supervision $I$. We also experimented with using random tokens from the oracle in $I$ to simulate lower-quality initial supervision and to quantify the variance of S4. For the set of oracle joint factors, we fine-tuned the standard BERT model on the training set, used the $\tt CLS$ embedding BERT produces to compute input similarity, and picked the 100 input pairs whose similarity changed the most between the fine-tuned model and the initial model. | Algorithm | Sup. size $|I|$ | Test acc (%) ---|---|--- BoW | 25k | 87.1 DNN | 25k | 91.0 Self-training | 100 | 69.9 1k | 88.5 Snorkel | 6 | 76.6 DPL | 6 | 80.7 S4-SST | 6 | 85.5 S4 ($T=20$) | 6 | 85.6 Snorkel | 20 | 82.4 DPL | 20 | 78.9 S4-SST | 20 | 86.4 S4 ($T=20$) | 20 | 86.9 Snorkel | 40 | 84.6 DPL | 40 | 85.2 S4-SST | 40 | 86.6 S4 ($T=20$) | 40 | 86.8 (a) IMDb | Algorithm | Sup. size $|I|$ | Test acc (%) ---|---|--- BoW | 6.9k | 78.9 DNN | 6.9k | 90.9 Self-training | 50 | 78.0 100 | 81.8 Snorkel | 6 | 63.5 DPL | 6 | 57.2 S4-SST | 6 | 73.0 S4-SST + J | 6 | 76.2 S4 + J ($T=20$) | 6 | 81.4 Snorkel | 20 | 73.0 DPL | 20 | 72.4 S4-SST | 20 | 83.3 S4-SST + J | 20 | 85.1 S4 + J ($T=20$) | 20 | 84.4 Snorkel | 40 | 73.6 DPL | 40 | 77.0 S4-SST | 40 | 84.9 S4-SST + J | 40 | 86.3 S4 + J $(T=20)$ | 40 | 85.4 (b) Stanford Table 1.5: System comparison on IMDb and Stanford. We first investigate whether structure learning can help in S4 by running without feature-based active learning. We set the query budget $T=0$ in Algorithm 2. Because we only take structured self-training steps when $T=0$, we denote this version of S4 as S4-SST. Table 1.5 (a) shows the results on IMDb. With just six self-supervised tokens (three per class), S4-SST already attained 86% test accuracy, which outperforms self-training with 100 labeled examples by 16 absolute points, and is only slightly worse than self-training with 1000 labeled examples or supervised training with 25,000 labeled examples. By conducting structure learning, S4-SST substantially outperformed DPL, gaining about 5 absolute points in accuracy (a 25% relative reduction in error), and also outperformed the Snorkel baseline by 8.9 points. Interestingly, with more self-supervision at 20 tokens, DPL’s performance drops slightly, which might stem from more noise in the initial self- supervision. By contrast, S4-SST capitalized on the larger seed self- supervision and attained steady improvement. Even with substantially more self-supervision at 40 tokens, S4-SST still attained similar accuracy gain, demonstrating the power in structure learning. On average across different initial amounts of supervision $|I|$, S4-SST outperforms DPL by 5.6 points and Snorkel by 5.3 points. Next, we consider the full S4 algorithm with a budget of up to $T=20$ human queries (S4 ($T=20$)). Overall, by automatically generating self-supervision from structure learning, S4-SST already attained very high accuracy on this dataset. However, active learning can still produce some additional gain. The only randomness in Table 1.5 is the initialization of the deep network $\Psi$, with negligible effect. --- (a) --- (b) --- (c) | Init. pos. | Init. neg. | New pos. | New neg. ---|---|---|--- refreshing | lacks | superb | terrible moving | waste | lovely | horrible caught | bland | touching | negative magic | stink | charming | boring captures | 1 | delightful | 2 (d) Figure 1.6: S4-SST learning in IMDb. (a) S4-SST learning curves with various numbers of initial self-supervised tokens. (b) comparison between the learning curves of S4-SST with just six self-supervised tokens and self-training with an order of magnitude more direct supervision (100/200 labeled examples). (c) multiple runs of S4-SST with 20 _random_ oracle self-supervised tokens (rather than the top oracle tokens). (d) pre-specified self-supervised tokens and proposed tokens in the first few iterations. Figure 1.6 (a) shows how S4-SST iterations improve the test accuracy of the learned neural network with different amounts of initial virtual evidence. Not surprisingly, with more initial self-supervision, the gain is less pronounced, but still significant. Figure 1.6 (b) compares the learning curves of S4-SST with those of self-training. Remarkably, with just _six_ self-supervised tokens, S4-SST not only attained substantial gain over the iterations, but also easily outperformed self-training despite the latter using an order of magnitude more label information (up to 200 labeled examples). This shows that S4 is much more effective in leveraging bounded human effort for supervision. Figure 1.6 (c) shows 10 runs of S4-SST when it was initialized with 20 _random_ oracle tokens (10 per class), rather than the _top_ 20 tokens from the oracle. As expected, DPL’s initial performance is worse than with the top oracle tokens. However, over the iterations, S4-SST was able to recover even from particularly poor initial state, gaining up to 20 absolute accuracy points over DPL in the process. The final accuracy of S4-SST is 85.2 $\pm$ 0.9, compared to 71.5 $\pm$ 6.5 for DPL and 72.9 $\pm$ 6.7 for Snorkel, a mean improvement of more than 12 absolute accuracy points over both baselines. S4-SST’s gains over DPL and Snorkel are statistically significant using a paired $t$-test (samples are paired when the algorithms have the same initial factors $I$) with $p=0.01$. This indicates that S4-SST is robust to noise in the initial self-supervision. Figure 1.6 (d) shows the initial self-supervised tokens and the ones learned by S4-SST in the first few iterations. We can see that S4-SST is able to learn highly relevant self-supervision tokens. S4 has similar gains over DPL, Snorkel, and self-training on the Stanford dataset. See Table 1.5 (b). The Stanford dataset is much more challenging and for a long while, it was hard to exceed 80% test accuracy [80]. Interestingly, S4-SST was able to surpass this milestone using just 20 initial self- supervision tokens. As in IMDb, the only randomness is in the initialization of $\Psi$, which is negligible. For IMDb, as can be seen above, even with simple token-based self-supervision, S4-SST already performed extremely well. So we focused our investigation of joint-inference factors on the more challenging Stanford dataset (S4-SST + J). While S4-SST already performed very well with token-based self-supervision, by incorporating joint-inference factors, it could still gain up to 3 absolute accuracy points. An example learned joint-inference factor is between the sentence pair: This is no “Waterboy!” and “It manages to accomplish what few sequels can—it equals the original and in some ways even better”. Note that Waterboy is widely considered a bad movie, hence the first sentence expresses a positive sentiment, just like the second. It is remarkable that S4 can automatically induce such factors with complex and subtle semantics from small initial self-supervision. The Stanford results also demonstrated that active learning could play a bigger role in more challenging scenarios. With limited initial self- supervision ($|I|=6$), the full S4 system (S4+J (T=20)) gained 8 absolute points over S4-SST and 5 absolute points over S4-SST+J. With sufficient initial self-supervision and joint-inference, however, active learning was actually slightly detrimental ($|I|=20,40$). | | $|I|=6$ | $|I|=10$ | $|I|=20$ | $|I|=40$ ---|---|---|---|--- $T=5$ | 79.0 | 83.8 | 84.0 | 85.9 $T=10$ | 79.5 | 83.7 | 85.0 | 86.0 $T=20$ | 82.7 | 84.5 | 85.8 | 86.4 (a) IMDb | | $|I|=6$ | $|I|=10$ | $|I|=20$ | $|I|=40$ ---|---|---|---|--- $T=5$ | 71.4 | 77.5 | 82.5 | 83.9 $T=10$ | 72.3 | 77.4 | 82.5 | 83.7 $T=20$ | 77.1 | 80.8 | 83.4 | 84.0 (b) Stanford Table 1.6: S4-FAL test results (no SST steps) Finally, we evaluate S4-FAL, which conducts active learning but not structure learning. See Table 1.6. As expected, performance improved with larger initial self-supervision ($I$) and human query budget ($T$). Active learning helps the most when initial self-supervision is limited. Compared to S4 with structure learning, however, active learning alone is less effective. For example, without requiring any human queries, S4-SST outperformed S4-FAL on both IMDB and Stanford even when the latter was allowed up to $T=20$ human queries. $|I|$ | Entropy-based | Attention-based ---|---|--- 6 | 82.1 | 85.5 20 | 84.9 | 86.4 40 | 85.5 | 86.6 (a) $|I|$ | Entropy-based | Attention-based ---|---|--- 6 | 77.2 | 73.0 20 | 85.1 | 83.3 40 | 85.7 | 84.9 (b) Table 1.7: Entropy-based scoring ($S_{\text{entropy}}$) perform comparably as attention-based scoring ($S_{\text{token}}$). Algorithm | Sup. size | Test acc (%) ---|---|--- BoW | 140k | 71.2 DNN | 140k | 79.8 Self-training | 50 | 38.4 Snorkel | 50 | 37.2 DPL | 50 | 41.8 S4-SST | 50 | 49.1 Self-training | 100 | 38.2 Snorkel | 100 | 36.5 DPL | 100 | 41.7 S4-SST | 100 | 52.3 Table 1.8: Comparison of test accuracy on Yahoo! Answers. Table 1.7 compares S4-SST test accuracy using entropy-based scoring ($S_{\text{entropy}}$) and attention-based scoring ($S_{\text{token}}$). Entropy-based scoring slightly outperforms attention-based scoring on Stanford Sentiment and slightly trails on IMDb. Overall, the two perform comparably but entropy-based scoring is more generally applicable. S4-SST obtains similarly substantial gains on Yahoo using token-based factors and attention scoring. See Table 1.8. We focused our experiments on a fixed 10% of the training set due to its very large size (1.4 million examples). There are 10 classes, so initial self-supervision size of 50 (100) represents 5 (10) initial tokens per class (for S4, DPL, and Snorkel), or 5 (10) labeled examples per class (for self-training). Compared to binary sentiment analysis in IMDb and Stanford, Yahoo represents a much more challenging dataset, with ten classes and larger input text for each instance. The linguistic phenomena are much more diverse, and therefore neither Snorkel or DPL performed much better than self-training, as token-based self-supervision confers not much more information than a labeled example. However, S4-SST is still able to attain substantial improvement over the initial self-supervision. E.g., with initial supervision size of 100, S4-SST gained about 11 absolute accuracy points over DPL, and 16 absolute points over Snorkel. Additionally, S4-SST is able to better utilize the new factors than Snorkel. If we run Snorkel using the same initial factors as S4-SST and also add the new factors proposed by S4-SST in each iteration, the accuracy improved from 36.5 to 44.2, but still trailed S4-SST (52.3) by 8 absolute points. Interestingly, both DPL and Snorkel perform better on Yahoo with _fewer_ initial factors, at 5 per class, suggesting they are sensitive to noise in the less reliable initial self- supervision. By contrast, S4-SST is more noise-tolerant and benefits from additional initial supervision. ### 1.6 Conclusions In this chapter, we present deep probabilistic logic (DPL) as a unifying framework for task-specific self-supervised learning, by composing probabilistic logic with deep learning. We further present self-supervised self-supervision (S4), which extends DPL with structure learning and active learning capabilities. Experiments on biomedical machine reading and text classification tasks show that DPL enables effective combination of disparate task-specific self-supervision strategies, while S4 can further improve application performance by proposing additional self-supervision. Overall, this enables the most effective use of human expert bandwidth by focusing on identifying the most salient self-supervision for initialization and verifying proposed self-supervision. While we focus on NLP tasks in this chapter, our methods are general and can potentially be applied to other domains. Future directions include: combining DPL with deep generative models and probabilistic programming methods; further investigation in combining structure learning and active learning in S4; exploring alternative optimization strategies and more sophisticated self-supervision classes and proposal algorithms; applications to other domains. ## References * [1] LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521(7553):436–444. * [2] Devlin J, Chang MW, Lee K, et al. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:181004805. 2018;. * [3] Ratner AJ, De Sa CM, Wu S, et al. Data programming: Creating large training sets, quickly. In: Advances in neural information processing systems; 2016. p. 3567–3575. * [4] Bach SH, He B, Ratner A, et al. Learning the structure of generative models without labeled data. In: International Conference on Machine Learning; 2017. p. 273–282. * [5] Chang MW, Ratinov L, Roth D. Guiding semi-supervision with constraint-driven learning. In: Proceedings of the 45th annual meeting of the association of computational linguistics; 2007. p. 280–287. * [6] Poon H, Domingos P. Joint unsupervised coreference resolution with markov logic. In: Proceedings of the conference on empirical methods in natural language processing; Association for Computational Linguistics; 2008. p. 650–659. * [7] Druck G, Mann G, McCallum A. Learning from labeled features using generalized expectation criteria. In: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval; ACM; 2008\. p. 595–602. * [8] Ganchev K, Gillenwater J, Taskar B, et al. Posterior regularization for structured latent variable models. Journal of Machine Learning Research. 2010;11(Jul):2001–2049. * [9] Craven M, Kumlien J. Constructing biological knowledge bases by extracting information from text sources. In: Proceedings of the Seventh International Conference on Intelligent Systems for Molecular Biology; 1999. * [10] Mintz M, Bills S, Snow R, et al. Distant supervision for relation extraction without labeled data. In: Proceedings of the Joint Conference of the Forty-Seventh Annual Meeting of the Association for Computational Linguistics and the Fourth International Joint Conference on Natural Language Processing; 2009\. * [11] Wang H, Poon H. Deep probabilistic logic: A unifying framework for indirect supervision. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing; 2018. p. 1891–1902. * [12] Richardson M, Domingos P. Markov logic networks. Machine learning. 2006;62(1-2):107–136. * [13] Lang H, Poon H. Self-supervised self-supervision by combining deep learning and probabilistic logic. In: Proceedings of the Thirty Fifth Annual Meeting of the Association for the Advancement of Artificial Intelligence; 2021. * [14] McClosky D, Charniak E, Johnson M. Effective self-training for parsing. In: Proceedings of the main conference on human language technology conference of the North American Chapter of the Association of Computational Linguistics; Association for Computational Linguistics; 2006. p. 152–159. * [15] Druck G, Settles B, McCallum A. Active learning by labeling features. In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1-Volume 1; Association for Computational Linguistics; 2009\. p. 81–90. * [16] Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need. In: Advances in neural information processing systems; 2017. p. 5998–6008. * [17] Bach SH, He B, Ratner A, et al. Learning the structure of generative models without labeled data. In: Proceedings of the 34th International Conference on Machine Learning-Volume 70; 2017. p. 273–282. * [18] Roth D. Incidental supervision: Moving beyond supervised learning. In: Thirty-First AAAI Conference on Artificial Intelligence; 2017. * [19] Quirk C, Poon H. Distant supervision for relation extraction beyond the sentence boundary. In: Proceedings of the Fifteenth Conference on European chapter of the Association for Computational Linguistics; 2017. * [20] Peng N, Poon H, Quirk C, et al. Cross-sentence n-ary relation extraction with graph lstms. Transactions of the Association for Computational Linguistics. 2017;5:101–115. * [21] Huang H, Heck L, Ji H. Leveraging deep neural networks and knowledge graphs for entity disambiguation. arXiv preprint arXiv:150407678. 2015;. * [22] Ratner AJ, De Sa CM, Wu S, et al. Data programming: Creating large training sets, quickly. In: Advances in Neural Information Processing Systems; 2016. p. 3567–3575. * [23] Varma P, He BD, Bajaj P, et al. Inferring generative model structure with static analysis. In: Advances in neural information processing systems; 2017. p. 240–250. * [24] Liu L, Ren X, Zhu Q, et al. Heterogeneous supervision for relation extraction: A representation learning approach. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing; 2017. p. 46–56. * [25] Hoffmann R, Zhang C, Ling X, et al. Knowledge-based weak supervision for information extraction of overlapping relations. In: Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics; 2011\. * [26] Lin Y, Shen S, Liu Z, et al. Neural relation extraction with selective attention over instances. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics; Vol. 1; 2016. p. 2124–2133. * [27] Halpern Y, Horng S, Choi Y, et al. Electronic medical record phenotyping using the anchor and learn framework. Journal of the American Medical Informatics Association. 2016;23(4):731–740. * [28] Haghighi A, Klein D. Prototype-driven learning for sequence models. In: Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics; Association for Computational Linguistics; 2006. p. 320–327. * [29] Poon H. Grounded unsupervised semantic parsing. In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers); 2013. p. 933–943. * [30] Chang MW, Ratinov L, Roth D. Guiding semi-supervision with constraint-driven learning. In: Proceedings of the 45th annual meeting of the association of computational linguistics; 2007. p. 280–287. * [31] Druck G, Mann G, McCallum A. Learning from labeled features using generalized expectation criteria. In: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval; 2008. p. 595–602. * [32] Poon H, Domingos P. Joint unsupervised coreference resolution with markov logic. In: Proceedings of the 2008 conference on empirical methods in natural language processing; 2008. p. 650–659. * [33] Ganchev K, Graça J, Gillenwater J, et al. Posterior regularization for structured latent variable models. Journal of Machine Learning Research. 2010;11(67):2001–2049. * [34] Friedman N, Koller D. Being bayesian about network structure. a bayesian approach to structure discovery in bayesian networks. Machine learning. 2003;50(1-2):95–125. * [35] Kok S, Domingos P. Learning the structure of markov logic networks. In: Proceedings of the 22nd international conference on Machine learning; 2005. p. 441–448. * [36] Hearst MA. Automatic acquisition of hyponyms from large text corpora. In: Proceedings of the 14th conference on Computational linguistics-Volume 2; Association for Computational Linguistics; 1992. p. 539–545. * [37] Carlson A, Betteridge J, Kisiel B, et al. Toward an architecture for never-ending language learning. In: Twenty-Fourth AAAI Conference on Artificial Intelligence; 2010. * [38] Yarowsky D. Unsupervised word sense disambiguation rivaling supervised methods. In: 33rd annual meeting of the association for computational linguistics; 1995\. p. 189–196. * [39] Collins M, Singer Y. Unsupervised models for named entity classification. In: 1999 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora; 1999. * [40] Varma P, Ré C. Snuba: automating weak supervision to label training data. Proceedings of the VLDB Endowment. 2018;12(3):223–236. * [41] Tong S, Koller D. Active learning for structure in bayesian networks. In: International joint conference on artificial intelligence; Vol. 17; Citeseer; 2001\. p. 863–869. * [42] Galhotra S, Golshan B, Tan WC. Adaptive rule discovery for labeling text data. arXiv preprint arXiv:200506133. 2020;. * [43] Poon H, Domingos P. Joint inference in information extraction. In: AAAI; Vol. 7; 2007. p. 913–918. * [44] Poon H, Vanderwende L. Joint inference for knowledge extraction from biomedical literature. In: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics; Association for Computational Linguistics; 2010. p. 813–821. * [45] Kimmig A, Bach S, Broecheler M, et al. A short introduction to probabilistic soft logic. In: Proceedings of the NIPS Workshop on Probabilistic Programming: Foundations and Applications; 2012. p. 1–4. * [46] Rocktäschel T, Riedel S. End-to-end differentiable proving. Advances in Neural Information Processing Systems. 2017;30. * [47] Manhaeve R, Dumancic S, Kimmig A, et al. Deepproblog: Neural probabilistic logic programming. Advances in Neural Information Processing Systems. 2018;31:3753–3760. * [48] Qu M, Tang J. Probabilistic logic neural networks for reasoning. In: NeurIPS; 2019\. * [49] Kingma DP, Welling M. Auto-encoding variational bayes. arXiv preprint arXiv:13126114. 2013;. * [50] Kingma DP, Mohamed S, Rezende DJ, et al. Semi-supervised learning with deep generative models. In: Advances in Neural Information Processing Systems; 2014\. p. 3581–3589. * [51] Johnson M, Duvenaud DK, Wiltschko A, et al. Composing graphical models with neural networks for structured representations and fast inference. In: Advances in neural information processing systems; 2016. p. 2946–2954. * [52] Tran D, Hoffman MD, Saurous RA, et al. Deep probabilistic programming. arXiv preprint arXiv:170103757. 2017;. * [53] Blum A, Mitchell T. Combining labeled and unlabeled data with co-training. In: Proceedings of the eleventh annual conference on Computational learning theory; 1998. p. 92–100. * [54] Grechkin M, Poon H, Howe B. Ezlearn: Exploiting organic supervision in large-scale data annotation. arXiv preprint arXiv:170908600. 2017;. * [55] Towell GG, Shavlik JW. Knowledge-based artificial neural networks. Artificial intelligence. 1994;70(1-2):119–165. * [56] Hu Z, Ma X, Liu Z, et al. Harnessing deep neural networks with logic rules. In: Proceedings of the 2016 Conference on Association for Computational Linguistics; 2016. * [57] Hu Z, Yang Z, Salakhutdinov R, et al. Deep neural networks with massive learned knowledge. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing; 2016. p. 1670–1679. * [58] Pearl J. Probabilistic reasoning in intelligent systems: networks of plausible inference. Elsevier; 2014. * [59] Reynolds SM, Bilmes JA. Part-of-speech tagging using virtual evidence and negative training. In: Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing; Association for Computational Linguistics; 2005. p. 459–466. * [60] Subramanya A, Bilmes J. Virtual evidence for training speech recognizers using partially labeled data. In: The Conference of the North American Chapter of the Association for Computational Linguistics; Association for Computational Linguistics; 2007. p. 165–168. * [61] Li X. On the use of virtual evidence in conditional random fields. In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 3-Volume 3; Association for Computational Linguistics; 2009\. p. 1289–1297. * [62] Parikh AP, Poon H, Toutanova K. Grounded semantic parsing for complex knowledge extraction. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics; 2015. p. 756–766. * [63] Ratner A, Hancock B, Dunnmon J, et al. Training complex models with multi-task weak supervision. In: Proceedings of the AAAI Conference on Artificial Intelligence; Vol. 33; 2019. p. 4763–4771. * [64] Mann GS, McCallum A. Generalized expectation criteria for semi-supervised learning of conditional random fields. Proceedings of ACL-08: HLT. 2008;:870–878. * [65] Murphy KP, Weiss Y, Jordan MI. Loopy belief propagation for approximate inference: An empirical study. In: Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence; Morgan Kaufmann Publishers Inc.; 1999\. p. 467–475. * [66] Keith K, Handler A, Pinkham M, et al. Identifying civilians killed by police with distantly supervised entity-event extraction. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing; 2017. p. 1547–1557. * [67] CarøE CC, Schultz R. Dual decomposition in stochastic integer programming. Operations Research Letters. 1999;24(1-2):37–45. * [68] Domke J. Learning graphical model parameters with approximate marginal inference. IEEE transactions on pattern analysis and machine intelligence. 2013;35(10):2454–2467. * [69] Morgan AA, Lu Z, Wang X, et al. Overview of biocreative ii gene normalization. Genome biology. 2008;9(2):S3. * [70] Kim JD, Ohta T, Pyysalo S, et al. Overview of bionlp’09 shared task on event extraction. In: Proceedings of the Workshop on Current Trends in Biomedical Natural Language Processing: Shared Task; Association for Computational Linguistics; 2009. p. 1–9. * [71] Quirk C, Choudhury P, Gao J, et al. MSR SPLAT, a language analysis toolkit. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics:Demonstration Session; 2012. * [72] de Marneffe MC, MacCartney B, Manning CD. Generating typed dependency parses from phrase structure parses. In: Proceedings of the Fifth International Conference on Language Resources and Evaluation; 2006. * [73] Manning CD, Surdeanu M, Bauer J, et al. The Stanford CoreNLP natural language processing toolkit. In: Proceedings of the Fifty-Second Annual Meeting of the Association for Computational Linguistics: System Demonstrations; 2014. * [74] Dienstmann R, Jang IS, Bot B, et al. Database of genomic biomarkers for cancer drugs and clinical targetability in solid tumors. Cancer Discovery. 2015;5. * [75] Poon H, Quirk C, DeZiel C, et al. Literome: PubMed-scale genomic knowledge base in the cloud. Bioinformatics. 2014;30(19). * [76] Pyysalo S, Ginter F, Moen H, et al. Distributional semantics resources for biomedical text processing. In: Proceedings of LBM 2013; 2013. p. 39–44. Available from: http://lbm2013.biopathway.org/lbm2013proceedings.pdf. * [77] Wei CH, Kao HY, Lu Z. Gnormplus: an integrative approach for tagging genes, gene families, and protein domains. BioMed research international. 2015;2015. * [78] Hall MA. Correlation-based feature selection for machine learning. 1999;. * [79] Maas AL, Daly RE, Pham PT, et al. Learning word vectors for sentiment analysis. In: Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies-volume 1; Association for Computational Linguistics; 2011. p. 142–150. * [80] Socher R, Perelygin A, Wu J, et al. Recursive deep models for semantic compositionality over a sentiment treebank. In: Proceedings of the 2013 conference on empirical methods in natural language processing; 2013. p. 1631–1642. * [81] Zhang X, Zhao J, LeCun Y. Character-level convolutional networks for text classification. In: Advances in neural information processing systems; 2015. p. 649–657. * [82] Yang Z, Yang D, Dyer C, et al. Hierarchical attention networks for document classification. In: Proceedings of the 2016 conference of the North American chapter of the association for computational linguistics: human language technologies; 2016. p. 1480–1489.
arxiv-papers
2021-07-27T04:25:56
2024-09-04T03:07:20.502883
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Hoifung Poon, Hai Wang, Hunter Lang", "submitter": "Hai Wang", "url": "https://arxiv.org/abs/2107.12591" }
2107.12592
# Detection of cybersecurity attacks through analysis of web browsing activities using principal component analysis Insha Ullah, Kerrie Mengersen, Rob J Hyndman, and James McGree Insha Ullah was a research associate in the Science and Engineering Faculty, Queensland University of Technology, QLD, Australia, 4000. E-mail: [email protected] Kerrie Mengersen and James McGree are with the Queensland University of Technology, Australia. Rob J Hyndman is with Monash University, Australia. ###### Abstract Organizations such as government departments and financial institutions provide online service facilities accessible via an increasing number of internet connected devices which make their operational environment vulnerable to cyber attacks. Consequently, there is a need to have mechanisms in place to detect cyber security attacks in a timely manner. A variety of Network Intrusion Detection Systems (NIDS) have been proposed and can be categorized into signature-based NIDS and anomaly-based NIDS. The signature-based NIDS, which identify the misuse through scanning the activity signature against the list of known attack activities, are criticized for their inability to identify new attacks (never-before-seen attacks). Among anomaly-based NIDS, which declare a connection anomalous if it expresses deviation from a trained model, the unsupervised learning algorithms circumvent this issue since they have the ability to identify new attacks. In this study, we use an unsupervised learning algorithm based on principal component analysis to detect cyber attacks. In the training phase, our approach has the advantage of also identifying outliers in the training dataset. In the monitoring phase, our approach first identifies the affected dimensions and then calculates an anomaly score by aggregating across only those components that are affected by the anomalies. We explore the performance of the algorithm via simulations and through two applications, namely to the UNSW-NB15 dataset recently released by the Australian Centre for Cyber Security and to the well-known KDD’99 dataset. The algorithm is scalable to large datasets in both training and monitoring phases, and the results from both the simulated and real datasets show that the method has promise in detecting suspicious network activities. ###### Index Terms: Intrusion detection, Cyber security, Singular value decomposition, Principal component analysis, Unsupervised algorithm. ## 1 Introduction The vulnerability of government departments and industries to cyber attacks is rising due to the increased usage and reliance on network-connected platforms and internet-connected devices. As such, there is a need to not only have secure cyber systems but also have mechanisms in place to detect cyber security attacks in a timely manner. The analysis of automatically generated logs from network and system devices can provide deep insight into the current state of security of computer systems. In addition, effective threat intelligence can be performed which can proactively predict several possible attack vectors relevant to government departments. However, there are particular challenges in dealing with such data, including the sheer volume of events of web browsing activity. Thus, computationally efficient approaches are needed for handling and analyzing such data. Network intrusion detection, as a particular form of anomaly detection, is an active area of research. Many Network Intrusion Detection Systems (NIDS) are designed to protect against malicious activities on the network [e.g. see 1, 2, 3, for references]. These systems can be classified into two main categories [4]: signature-based NIDS (also known as misuse-based NIDS) and anomaly-based NIDS [5, 6]. In signature-based NIDS, misuse is identified by scanning the activities’ signatures against a database of known malicious activities signatures. Many companies (such as Splunk111https://www.splunk.com and Sumo Logic222https://www.sumologic.com) and open source packages (such as ElasticSearch333https://www.elastic.co/ and Graylog444https://www.graylog.org/) provide log analysis services based on static signature matching. Although the signature-based NIDS have seen high accuracies and low false alarm rates against the known type of attacks, they lack the ability to identify new attacks due to the incomplete list of known malicious activities. Another shortcoming of the signature-based NIDS is that the attackers need to make only a slight modification to their signature to avoid them [7]. On the other hand, in an anomaly-based NIDS a profile of normal activities is built using machine learning algorithms and future activities are scanned against the normal profile. A variety of supervised and unsupervised statistical machine learning algorithms have been proposed for intrusion detection. In general, the supervised learning (classification) algorithms are known to have superior performance compared with the unsupervised (clustering) algorithms in terms of classification accuracy. However, their requirement of having a pre-labelled training dataset is often unavailable in many applications. For example, large networks can easily produce hundreds of gigabytes in logs each day. A large training dataset may be required to learn the normal behavior of such a large system. Further, the normal activities patterns may change over time, which may require retraining of the previously fitted model periodically. In such cases, it may not always be feasible to label each instance of a network activities dataset as normal or malicious since it requires human involvement to review and classify training data, and this requirement does not scale to large data sets. Further, some anomalies may be unknown or at least unseen in the training dataset. Consequently, unsupervised learning methods seem more appealing for monitoring network activities since they do not require a pre-labelled training dataset. However, they do require a clean dataset (free of attacks) if the monitoring objective is to uncover both known and new types of attacks but we note that this is generally easy to acquire [8]. Precisely, an unsupervised anomaly- based NIDS works in two phases: training and monitoring. In the training phase, a model or an algorithm is used to learn the normal behavior of a system using a ‘normal’ activity dataset. In the monitoring phase, the learned model is used to evaluate the behavior of the future network traffic. A behavior that is inconsistent with the trained model triggers an alert such that the activity can be further investigated. If the investigation leads to a declaration of the identified anomaly as normal activity, this activity should be included in the normal profile and the model is re-trained for future scanning. Unsupervised anomaly-based NIDS have the ability to identify what is referred to as zero-day or never-before-seen attacks [9]. Note also that in some applications the objective may be to detect only new attacks, in which case the training dataset is allowed to contain the known types of attacks. A variety of unsupervised learning algorithms have already been adapted for intrusion detection. However, some of these are computationally intensive and require large computer memory to operate in practice [e.g. see 10, 11]. Dimension reduction approaches such as principal component analysis (PCA) have also been proposed [12, 13]. These are appealing because they are statistically coherent, computationally faster and scalable. However, PCA- based NIDS have been criticized by [8] for several reasons. First, these NIDS are sensitive to the choice of the number of principal components that capture the normal activities patterns. Often ad hoc approaches are used to make this choice. Second, the effectiveness of PCA is sensitive to the level of aggregation of the traffic measurements. Third, the presence of unusual observations in the normal activities data that are used for training purpose makes the NIDS less effective. Fourth, correctly identifying which flow triggered the anomaly detector is an inherently challenging problem. Most of the PCA-based NIDS developed so far share disadvantages highlighted by [8]. For example, [14] and [15] have used the proportion of variance captured and the scree-plot method, respectively, to choose the number of components. These ad hoc procedures to select the number of PCs render the PCA less effective, since it is likely to miss the components that describe the anomaly if they are among the minor components (last PCs that explain less variance and are often dropped from the analysis). To address the third issue; that is, the existence of unusual observations in the normal activities data, [16] have used PCA based on robust estimators; however, the selection of the number of components is still an unsolved problem in their study. A large number of variables could be recorded to describe the behavior of the network traffic [17]. It could be that an anomaly is different from normal activities patterns with respect to fewer variables and the other variables are irrelevant. This is assumed by [18], for example, and is the usual assumption of variable selection methods. It may also be that a set of variables that distinguishes one kind of anomaly from normal activities behavior differs from the set that are useful in identifying another kind of anomaly. PCA seeks to derive new variables called principal components (PCs) as linear combinations of the input variables such that a few of the new variables account for the maximum variability among the input variables. If the data are similarly scaled, the magnitude of the coefficients (also referred to as loadings) in a PC reflect relative importance of the respective input variables in describing the variation ascribed to that PC and the signs of the coefficients specify positive or negative correlation between the input variables. Typically each input variable has a non-zero coefficient across all PCs even if the variables are just a random noise. However, in practice it is common that majority of the component loadings are close to zero [19] and are of less practical significance. A variable that makes an anomaly detectable in a large number of observations is important and a PC that has a large loading for this important variable needs to be taken into account when calculating scores for anomaly detection. It is also likely that this important variable has high correlation with all other variables that too are useful in identifying the same anomaly, hence are likely to have larger loadings for the same PCs. In this paper we propose to use PCA to more effectively detect unusual web browsing activities and attempt to address the issues raised by [8]. In the training phase we fit the PCA model using the normal activities dataset and find the bootstrap distribution of the standard deviations of the standardized PCs. These bootstrap distributions are useful in identifying the important PCs and also helps in locating large influential observations if there are any in the training set of data. In the monitoring phase, we take into account fewer important components to calculate anomaly scores for future connections. The scores of anomalous activities based on only important components are expected to deviate substantially from the scores obtained for normal connections and hence should be useful in identifying intrusions. For illustration we consider the performance of this approach in a simulation study and through application to two publicly available datasets including UNSW-NB15 dataset recently released by the Australian Centre for Cyber Security. Our method is straightforward to understand, computationally efficient to implement and empirical evaluation on several real-world datasets suggests that it is more effective in detecting abnormal activities when compared to existing methods. ## 2 Principal component analysis PCA is traditionally used as a dimension reduction technique since it tends to capture as much variation as possible in a few components and is a useful tool to visualize high-dimensional data in a manageable low-dimensional space [20, 21, 22]. It uses an orthogonal transformation to transform a set of $p$ (possibly correlated) observed variables into another set of $p$ uncorrelated variables. The new derived set of variables are the $p$ principal components (PCs). Each PC is a linear combination of the originally observed variables such that the first PC stands for the axis along which the observed data exhibit the highest variance, the second PC stands for the axis that is orthogonal to the first PC and along which the observed data exhibit the second highest variance, the third PC stands for the axis that is orthogonal to the first two PCs and along which the observed data exhibit the third highest variance, and so on. Similarly, the $p$th PC (the last one) stands for the axis that is orthogonal to the remaining $p-1$ PCs and along which the observed data exhibit the least variance. In this way, the $p$ orthogonal dimensions of variability that exist in the data are captured in $p$ PCs and the proportion of variability that each PC accounts for accumulates to the total variation in the data. It is often the case that the first $q$ ($q\ll p$) PCs retain interpretable patterns in the observed data and the rest contain variation mainly due to noise [20]. More formally, let $y_{ij}$ denote a real-valued observation made of the $j$th variable on the $i$th subject, where $i=1,\ldots,n$ and $j=1,\ldots,p$. Assume that the $n$ observations are arranged in $n$ rows of a $n\times p$ matrix ${Y}$ with columns corresponding to $p$ variables or features. We standardize columns of matrix $Y$ to have zero mean and unit standard deviation, and store the resultant values in a matrix $X$, that is, the elements $x_{ij}$ of $X$ are obtained by $x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$, where $\bar{y}_{j}$ and $s_{j}$ are the mean and standard deviation of the $j$th column of matrix $Y$, respectively. The PCA can be performed by singular value decomposition (SVD) of $X$, that is, the $n\times p$ matrix is decomposed as $X=U\Gamma V^{T},$ (1) where $U$ is $n\times p$ matrix with orthonormal columns, $\Gamma$ is a $p\times p$ diagonal matrix containing non-negative singular values and $V$ is a $p\times p$ matrix with orthonormal columns. Denote the sample correlation matrix of $X$ by $R$, which can be expressed as $R=\frac{1}{n-1}X^{T}X=V\Lambda V^{T},$ (2) where $\Lambda=1/(n-1)\Gamma^{2}$ is a $p\times p$ diagonal matrix containing $p$ eigenvalues $\boldsymbol{\lambda}=(\lambda_{1},\ldots,\lambda_{p})^{T}$ on the diagonal in decreasing order of magnitude. It follows that the $p$ columns of matrix $V$ contain the eigenvectors of $R$ and hence are the desired axes of variation. The derived set of $p$ transformed variables (the PCs) are obtained by $Z=XV.$ It is important to note that the matrix $U$ above contains standardized PCs in columns and is a scaled version of $Z$, which is provided additionally in (1). To see this, multiply (1) on the right by $V$ as follows $XV=U\Gamma$ or $Z=U\Gamma.$ In practice, the first $q$ major components are of greater interest since they account for most of the variation in the data and the dimension of $Z$ is thus reduced from $p$ to $q$, that is $\tilde{Z}=X\tilde{V},$ where $\tilde{V}$ is a $p\times q$ matrix that contains the first $q$ columns of $V$ and $\tilde{Z}$ contains the first $q$ PCs. A lower rank approximation of $X$ can be obtained by $\tilde{X}=\tilde{Z}\tilde{V}^{T},$ (3) which is the best approximation of $X$ in the least-square-sense by a matrix of rank $q$ [23]. If $X$ has a multivariate normal distribution, then the statistic $t_{i}=\sum_{j=1}^{q}\frac{z_{ij}^{2}}{\lambda_{j}}=(n-1)\sum_{j=1}^{q}u_{ij}^{2},$ (4) follows a chi-square distribution with $q$ degrees of freedom that is $t_{i}\sim\chi^{2}_{q}$ distribution [12, 23], where $z_{ij}$ and $u_{ij}$ are the elements of $Z$ and $U$. Determining a suitable value of $q$ is a model selection problem and a poor model choice may result in an incomplete representation of the data. A suitable choice is made through domain knowledge or using data exploration together with some available heuristic options [24, 23]. ### 2.1 Intrusion detection system based on PCA As mentioned above, an unsupervised NIDS operates in two phases: the training phase and the monitoring phase. In the training phase, the normal activities patterns are learned through fitting a model to the recorded clean dataset (referred to as training set of data). Precisely, assume that $p$ features are measured for each of the $n$ normal activities connections. Let $y_{ij}$ be the recorded observation of the $i$th normal activity connection made on the $j$th feature contained in a $n\times p$ training data matrix ${Y}$. The columns of the matrix $Y$ are standardized to have zero mean and unit standard deviation, and the standardized training dataset is stored in a matrix $X$, that is, the elements of $X$ are obtained by $x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$, where $\bar{y}_{j}$ and $s_{j}$ are the mean and standard deviation of the $j$th column of matrix $Y$, respectively. A PCA model given in (1) is fitted to the data in $X$. In the monitoring phase, a newly observed set of network traffic connections (referred to as test set of data) is checked with the normal activities model learned in the training phase and an anomaly warning is triggered if any of the new connections shows deviation from the trained model. More formally, let $Y^{f}$ be an $m\times p$ matrix of newly observed set of connections. To obtain $X^{f}$, we adjust each element $y^{f}_{ij}$ of the matrix $Y^{f}$ by first subtracting the mean of the $j$th column of the normal activities dataset $Y$ and then divide by the standard deviation of the $j$th column of normal activities dataset $Y$ that is $x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$. [12] develop an intrusion detection system based on the statistic $t_{i}$ in (4). They propose to monitor two statistics: one based on principal components (first few components that account for most of the variation in the data) and another based on minor components (last few components). To obtain a threshold for monitoring future data, they rely on the empirical distribution of $t_{i}$ (they have not mentioned any specific estimation method) since the assumption of multivariate normality is often violated in network connections data. Since different kinds of attacks might create shifts (anomalies) along different eigenvectors, the disadvantage of this approach is that it might miss signals along the eigenvectors that are disregarded. [14] proposed to monitor the error induced by the approximate reconstruction of the actual connection using the expression in (3) instead of monitoring two statistics; that is, they monitor $\varepsilon=||X^{f}-\tilde{X}^{f}||^{2},$ where $\tilde{X}^{f}=X^{f}\tilde{V}\tilde{V}^{T}$ and $\tilde{V}$ is based on the normal activities dataset obtained in (1). We will refer to the method of [12] as PCC and that of [14] as WBPCA for the rest of this paper. [14] have shown numerically that WBPCA has a slightly better performance than PCC in terms of detection rate and false discovery rate. The downside of WBPCA is that it only takes into account the principal components and ignores the minor components completely; therefore, their monitoring models are likely to be less sensitive to the attacks that affect only the minor components and anomalies that are rare events. It is possible that a particular type of attack creates a shift along the directions of fewer eigenvectors (possibly a mix of some principal and some minor components) and there is negligible or no change along the other dimensions. This is because each PC is a linear combination of the $p$ observed variables and it is common in practice that a particular PC has larger coefficients for some of the $p$ observed variables while the coefficients for the remainder of the observed variable are close to zero. Now if an anomalous connection differs to the normal activity connections with respect to only one feature (say F) and only one particular PC (say PCF) has a large coefficient for F (the coefficient for the remainder of the observed variables may or may not be large), the shift caused by this anomalous connection will be expressed only along PCF. In this case, if $t_{i}$ is based on only the PCF, the anomaly will be more likely to be detected, compared to if $t_{i}$ is based on the rest of the components. Further, the first few PCs that account for most of the variation in the data are noisier and the possibility is that the perturbations caused by anomalies might be less pronounced along these PCs, compared to the PCs that account for less variation in the data. In order to make the system more sensitive to such anomalies, it is important to take into account the most affected dimensions rather than choosing some of the principal or minor components which (if not affected) will add noise and may actually obscure the anomalies. We propose a similar system to PCC that is based on PCA but unlike the above mentioned approaches we take into account the dimensions that may be most affected by anomalies or attacks. To proceed, re-write the expression in (1) as $XV\Gamma^{-1}=U.$ (5) Since the columns of $U$ are orthonormal, we have $(n-1)\textrm{cov}(XV\Gamma^{-1})=(n-1)\textrm{cov}(U)=I,$ (6) where $I$ is an identity matrix. If $X$ and $X^{f}$ are generated by the same model then the same relationship in (6) holds for $X^{f}$, that is, $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})=(n-1)\textrm{cov}(U^{f})=I.$ On the other hand, if $X^{f}$ is generated by a different model then all or some of the diagonal elements of $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$ will be larger than unity. It is possible that some of the diagonal elements of $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$ are less affected or not affected at all. In this situation, it is more sensible to evaluate the standard deviations of the columns of $\sqrt{n-1}U^{f}$, say $s_{j}^{u}$ (the diagonal elements of $(n-1)\textrm{cov}(X^{f}V\Gamma^{-1})$), and consider those dimensions for which the corresponding $s_{j}^{u}$’s deviate from unity. In our monitoring system, we exploit the above fact and consider only those components that are affected by the anomalies, thereby making the system more sensitive to the deviations from the normal activities model. Let $r_{j}^{u}$ be the standard deviation of the $j$th column of $\sqrt{n-1}U$. To account for sampling variation in each $s_{j}^{u}$, we use a threshold $\delta_{j}^{(1-\alpha)}$ obtained as the $(1-\alpha)$th quantile of the bootstrap distribution of $r_{j}^{u}$. The $j$th component is considered affected if $s_{j}^{u}$ exceeds $\delta_{j}^{(1-\alpha)}$ and is thus considered towards the final score $t_{i}^{f}$ of the newly observed data. To identify the anomalous connection, we use another threshold $\theta^{(1-\alpha)}$ obtained as the $(1-\alpha)$th quantile of $\chi^{2}_{q}$, where $q$ is the number of $s_{j}^{u}$ that exceed $\delta_{j}^{(1-\alpha)}$. Our system is then based on the anomaly affected components. We call this proposal AAD and formalize it in the following algorithm: 1. 1. Obtain $X$ by standardizing the normal activities dataset $Y$ that is $x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$. 2. 2. Estimate $V$ and $\Lambda$ based on $X$ using singular value decomposition. 3. 3. Obtain $\delta_{j}^{(1-\alpha)}$ based on the bootstrap distribution of $r_{j}^{u}$. 4. 4. Obtain $U^{f}$ using the newly observed dataset that is $U^{f}=X^{f}V\Gamma^{-1}$, where $x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$. 5. 5. Calculate $s_{j}^{u}$’s, the standard deviations of the columns of $\sqrt{n-1}U^{f}$. In the absence of intrusion, we expect all $s_{j}^{u}$’s to be unity. If $s_{j}^{u}>\delta_{j}^{(1-\alpha)}$ for any $j$, then declare the possible presence of anomalous connections in $Y^{f}$. 6. 6. To identify the anomalous connections, calculate $t_{i}^{f}$ using the expression in (4) that is $t_{i}^{f}=(n-1)\sum_{j=1}^{q}(u_{ij}^{f})^{2}$, where the sum is performed over the $q$ affected columns of $U^{f}$. 7. 7. For the $i$th connection, if $t_{i}^{f}>\theta^{(1-\alpha)}$, where $\theta^{(1-\alpha)}$ is the $(1-\alpha)$th quantile of $\chi^{2}_{q}$, then declare it anomalous. It is important to reiterate here that AAD relies on the assumption of multivariate normality for its threshold $\theta_{\alpha}$. As noted above, this assumption is often violated in network data and may render AAD unreliable. One solution is to consider the bootstrap distribution of $t_{i}$ which requires upfront knowledge of the components whose $s_{j}^{u}$ exceeds $\delta^{(1-\alpha)}$. In our use of AAD, we rely on the bootstrap distribution of $\theta^{(1-\alpha)}$ unless otherwise stated. Making available a computationally cumbersome bootstrap distribution of $t_{i}$ in real time — after knowing the important components that need to be evaluated — may impede the real time detection in large-scale networks. In such situations, one could use the empirical distribution of $t_{i}$ as this is computationally faster to evaluate. Another possibility is to use $t_{i}^{fw}=(n-1)\sum_{j=1}^{q}w_{j}u_{ij}^{2},$ (7) where $w_{j}=s_{j}^{u}$. In the absence of any intrusion or anomaly, we have $s_{j}^{u}=r_{j}^{u}=1$; therefore, both $t_{i}$ and $t_{i}^{f}$ follow the same distribution. However, some of the $s_{j}^{u}$’s will be larger than unity in the presence of unusual connections in $X^{f}$. Giving more importance to the components that are affected by weighting them with corresponding $s_{j}^{u}$’s will make the anomalies more pronounced and will result in a shift in $t_{i}^{fw}$ relative to $t_{i}$ for all anomalous connections in $X^{f}$. In the rest of this paper, we refer to a detection system based on (7) as WAAD and describe it via the following algorithm: 1. 1. Obtain $X$ by standardizing the normal activities dataset $Y$ that is $x_{ij}=(y_{ij}-\bar{y}_{j})/{s_{j}}$. 2. 2. Estimate $V$ and $\Lambda$ based on $X$ using singular value decomposition. 3. 3. Obtain $U^{f}$ using the future activities dataset that is $U^{f}=X^{f}V\Gamma^{-1}$, where $x^{f}_{ij}=(y^{f}_{ij}-\bar{y}_{j})/s_{j}$. 4. 4. Calculate $s_{j}^{u}$’s, the standard deviations of the columns of $\sqrt{n-1}U^{f}$. In the absence of intrusion, we expect all $s_{j}^{u}$’s to be unity. If $s_{j}^{u}>\delta_{j}^{(1-\alpha)}$ for any $j$, then declare the possible presence of anomalous connections in $Y^{f}$. 5. 5. To identify the anomalous connections, calculate $t_{i}^{fw}$ using the expression in (7) that is $t_{i}^{fw}=(n-1)\sum_{j=1}^{p}w_{j}(u_{ij}^{f})^{2}$. 6. 6. For the $i$th connection, if $t_{i}^{fw}>\theta^{(1-\alpha)}$, where $\theta^{(1-\alpha)}$ is the $(1-\alpha)$th quantile of the bootstrap distribution of $t_{i}^{w}=(n-1)\sum_{j=1}^{q}w_{j}(u_{ij})^{2}$, then declare it anomalous. Like AAD, WAAD requires the bootstrap distribution of $t_{i}^{w}$, which in turn requires the upfront knowledge of the $s_{j}^{u}$. The WAAD also consider the unaffected components (although with lower weights) in the calculation of $t_{i}^{w}$ and $t_{i}^{fw}$, which makes it noisier; therefore, it may not be as effective in identifying anomalies as the AAD. ## 3 Simulation study The goal of this section is to numerically evaluate the performance of our proposed methods for detecting anomalies. We also demonstrated the effectiveness of the proposed methods in comparison to the WBPCA while considering a number of factors that might be affecting the performance of the methods. In the presence of true mean $\mu$ and covariance $\Sigma$, we included a Mahalanobis distance approach [18] based on $\mu$ and $\Sigma$ as a gold standard. The squared Mahalanobis distance between a sample $x_{i}^{f}$ and $\mu$ given a true covariance matrix $\Sigma$ is given by $D_{i}^{2}=(x_{i}^{f}-\mu)\Sigma^{-1}(x_{i}^{f}-\mu)^{T}.$ In the absence of anomalous observations and under the assumption of normality and independence of observations, the quantity $D^{2}$ follows an exact chi- square distribution with $p$ degrees of freedom; that is, $D_{i}^{2}\sim\chi^{2}_{(p)}$ [25]. In the rest of the paper we will refer to this approach as TRUE. We generated a clean dataset $Y$ of size $n$ from a $p$-dimensional multivariate normal distribution with mean vector $\mu$ and a covariance matrix $\Sigma$. For the clean dataset, without loss of generality, we set $\mu=0$ and considered $\Sigma=\Sigma_{\rho}$ having a first-order autoregressive correlation structure, AR(1); that is, the elements of $\Sigma_{\rho}$ are given by $\sigma_{ij}=\rho^{|i-j|}~{}~{}~{}~{}\textrm{for}~{}~{}1\leq i,j\leq p,$ where $\rho\in[0,1)$ is a parameter that determines $\Sigma$. A smaller value of $\rho$ shifts variance towards minor components. For example, $\Sigma_{0}$ equals an identity matrix in which case the variance is uniformly distributed over $p$ components. On the other hand, a larger value of $\rho$ shifts more variance towards the principal components in which case the first few eigenvalues will explain most of the variation. To generate a set of anomalous observations, we followed the simulation setup provided in [26], which allows a shift along a set of chosen eigenvectors. We chose a smaller set of observations from $n$ normal observations and made them anomalous by adding a constant of size $\eta=c\sqrt{\lambda_{j}}$, where $c\in\\{1,2,3\\}$, along a few chosen eigenvectors from $V$. This set of anomalous observations was then used to contaminate another set of $m$ normal observations $Y^{f}$ randomly chosen from training dataset. For example, an observation $y_{i}^{f}$ was anomalous if it was reconstructed after a shift is created along some of the $v_{j}$’s (the columns of $V$) by adding a constant $\eta$ to the corresponding $z_{ij}$ (the $ij$th element of $Z$). We used the AAD and WAAD as detailed in Section 2.1 in comparison to WBPCA and TRUE to detect and identify the $m$ anomalous observations. For WBPCA, we calculated the eigenvalues of correlation matrix and retained components using “eigenvalue greater than one rule”. We used the Receiver Operating Characteristic (ROC) curve, a plot of the true positive rate against the false positive rate, as a metric to evaluate the performance of the methods [8]. $\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig1a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig1b.pdf}\\\ \includegraphics[scale={0.15},angle={270}]{Fig1c.pdf}\end{array}$ Figure 1: ROC curves. A sample of size $n=10,000$ is drawn from a $30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train a PCA model. A set of 100 anomalous observations are created to contaminate another set of $m=5000$ normal observations by adding a constant of size $\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them along a random set of three distinct eigenvectors. The results are averaged over 1000 independent experiments. In each experiment the set of three eigenvectors along which the shifts are created is allowed to vary. $\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig2a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig2b.pdf}\\\ \includegraphics[scale={0.15},angle={270}]{Fig2c.pdf}\end{array}$ Figure 2: ROC curves. A sample of size $n=10,000$ is drawn from a $30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train PCA model. A set of 100 anomalous observations are created to contaminate another set of $m=5000$ normal observations by adding a constant of size $\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them along the last three eigenvectors. The results are averaged over 1000 independent experiments. $\begin{array}[]{c}\includegraphics[scale={0.15},angle={270}]{Fig3a.pdf}\includegraphics[scale={0.15},angle={270}]{Fig3b.pdf}\\\ \includegraphics[scale={0.15},angle={270}]{Fig3c.pdf}\end{array}$ Figure 3: ROC curves. A sample of size $n=10,000$ is drawn from a $30$-dimensional normal distribution with $\mu=0$ and $\Sigma_{0.9}$ to train PCA model.A set of 100 anomalous observations are created to contaminate another set of $m=5000$ normal observations by adding a constant of size $\eta=c\sqrt{\lambda_{j}}$: (a) $c=1$, (b) $c=2$ and (c) $c=3$, to shift them along the first three eigenvectors. The results are averaged over 1000 independent experiments. For the experiments, the results of which are shown here, we set $p=30$, $\rho=0.9$, and created anomalous observations by choosing 100 normal observations at random and shifted them along three chosen eigenvectors. We then contaminated $m=4900+100=5000$ observations chosen randomly from $n=10,000$ normal observations with the 100 anomalous observations. The average ROC curves for 1000 independent experiments are presented in Figures 1, 2 and 3. The three eigenvectors along which the shifts were created were randomly selected in each of the 1000 independent experiments (see results in Figure 1), were fixed to the last three eigenvectors (see results in Figure 2) and were fixed to the first three eigenvectors (see results in Figure 3). Overall, the detection rate increased with increasing size of the shift and the results clearly indicated the superior performance of AAD in terms of achieving higher detection rate with much lower false alarm rate. Further, AAD performed consistently well regardless of the dimension of the created shift. Its performance was even better than the TRUE. The reason is that the Mahalanobis distance also aggregates across all variables including irrelevant variables, hence masking the outlying effect. Similar to AAD, the performance of WAAD was also consistent across the three simulation scenarios; however, it was still polluted by the aggregated noise in $t_{i}^{fw}$ due to the unaffected dimensions. The effectiveness of WBPCA varied depending on the chosen dimension along which the shift was created. The WBPCA detection rate was lower if the shift was along the principal components (see Figure 3). However, its performance improved when the shift was created along the minor components (see Figure 2). This is because most of the error variation lies along the dominant eigenvectors when $\rho$ is close to one which makes it difficult to detect anomalous observations. ## 4 Real data analysis In this section, we demonstrate the performance of our proposed methods and those from the literature through the analysis of two real network datasets, namely the UNSW-NB15 dataset and KDD’99 dataset. ### 4.1 UNSW-NB15 dataset A real UNSW-NB15 dataset was recently released by the Australian Centre for Cyber Security. The dataset is described in [27] and analyzed (using a variety of methods) in [28] and [29]. It is publicly available for research purposes555https://www.unsw.adfa.edu.au/unsw-canberra- cyber/cybersecurity/ADFA-NB15-Datasets/. This dataset has 49 features and a total of 2,540,044 connection records including a variety of attacks. The 49 features also include 12 features that are derived from the rest of 35 directly measured features and the two attributes that represent class labels. We do not use the 12 derived features and also exclude seven nominal features (Source IP address, Destination IP address, Source port number, Destination port number, transaction protocol, service and state). All the records are labelled as normal records or attacks using the IXIA PerfectStorm tool666https://www.ixiacom.com/products/perfectstorm that contains the signatures of naive attacks and is continuously updated from a CVE site777https://cve.mitre.org/. The attacks are further categorized into their types: Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode, Worms [see 27, for the description of each type of attack]. Some of the above mentioned nominal variables could be included in the analysis in the form of binary indicator variables since they have a small number of categories in the available data (transaction protocol has 135 categories, service has 16 categories and state 13 categories). However, the number of categories may vary in practical applications. As mentioned earlier, the key requirement of an unsupervised NIDS is the availability of a normal activities dataset. In the UNSW-NB15 dataset, the abnormal traffic is introduced synthetically at particular time points, so we have a large portion of the data that is not affected by the abnormal traffic (i.e. observations 186,789 to 1,087,248, which we will refer to as clean data). We used the observations from 300,001 to 900,000 of the clean data to train the PCA model and to estimate $\delta_{j}^{(1-\alpha)}$. The data observed before 300,001 and after 900,000 are used as a test set of data. We used 5,000 bootstrap samples of size 10,000 to construct the distributions of $r_{j}^{u}$’s (see Figure 4). The bootstrap distributions of $r_{j}^{u}$’s were expected to be centered at one. At this point it is important to notice that the network connections data are usually skewed which may make the bootstrap distributions of $r_{j}^{u}$’s slightly off from the expected center of one. However, misplacement of the entire distribution of $r_{j}^{u}$ is an indication of the presence of outliers in the data. The presence of large outliers in the training data has the potential to make a NIDS less sensitive. We noticed peculiarities in the distributions of some of the $r_{j}^{u}$’s, particularly the distributions of $r_{8}^{u}$, $r_{9}^{u}$ and $r_{20}^{u}$ were far-off from the expected center. This indicated the presence of some unusually large observations of the variables in the training data that were loading heavily on PC-8, PC-9 and PC-20. The PC-8 had loadings of 0.91 and 0.19, respectively, for ‘source bits per second’ and ‘destination bits per second’, PC-9 had loadings of 0.21 and 0.97, respectively for ‘source bits per second’ and ‘record total duration’ (loading for all other variable were less than 0.1) and the PC-20 had a large loading of -0.70 and 0.71, respectively, for ‘source jitter’ and ‘destination jitter’. By further inspection we found six unusually large values of the ‘record total duration’, 39 unusually large values of the ‘source bits per second’, 3 unusually large values of the ‘destination bits per second’, and 31 unusually large values of the ‘source jitter’. Most of the 31 connections that had unusually large values for the ‘source jitter’ had also unusual values for the ‘destination jitter’. The removal of these 79 unusual observations considerably alleviated the peculiarities in the distributions of $r_{j}^{u}$ (see Figure 5). (a) Figure 4: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap samples of size 10000 from the training set of the UNSW-NB15 dataset. The horizontal gray line indicates the expected value of $r_{j}^{u}$ in the absence of anomalous activities. (a) Figure 5: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap samples of size 10000 from the training set of the UNSW-NB15 dataset after removal of 79 unusual connections. The horizontal gray line indicates the expected value of $r_{j}^{u}$ in the absence of anomalous activities. (a) Figure 6: Plot of $s_{j}^{u}$’s for UNSW-NB15 dataset. The whole UNSW-NB15 dataset was examined at once. $\begin{array}[]{c}\includegraphics[scale={0.250}]{Fig4.png}\includegraphics[scale={0.250}]{Fig5.png}\\\ \includegraphics[scale={0.250}]{Fig6.png}\includegraphics[scale={0.250}]{Fig7.png}\end{array}$ Figure 7: Plots of the score statistic $t_{i}^{f}$ for the UNSW-NB15 dataset: (a) AAD, (b) AAD based on the four most affected dimensions (see Figure 6), (c) WAAD and (d) WBPCA. The horizontal green line indicates the threshold value $\theta_{\alpha=0.0001}$. The training dataset is shaded in light-blue. (a) Figure 8: ROC curves for all categories of attacks in UNSW-NB15 dataset. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWall.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWall.png}\\\ \includegraphics[scale={0.250}]{rocUNSWall.png}\end{array}$ Figure 9: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from training dataset is contaminated with 100 attack connections randomly chosen from all categories of attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWDoS.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWDoS.png}\\\ \includegraphics[scale={0.250}]{rocUNSWDoS.png}\end{array}$ Figure 10: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from training dataset is contaminated with 100 attack connections randomly chosen from ‘DoS’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWFuzzers.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWFuzzers.png}\\\ \includegraphics[scale={0.250}]{rocUNSWFuzzers.png}\end{array}$ Figure 11: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from training dataset is contaminated with 100 attack connections randomly chosen from ‘Fuzzers’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotncUNSWGeneric.png}\includegraphics[scale={0.250}]{barplotwhichcUNSWGeneric.png}\\\ \includegraphics[scale={0.250}]{rocUNSWGeneric.png}\end{array}$ Figure 12: Plots of the UNSW-NB15 dataset. A random sample of size 9900 from training dataset is contaminated with 100 attack connections randomly chosen from ‘Generic’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. We used the AAD, WAAD and WBPCA as detailed in Section 2.1 to try to detect and identify the attack connections. For the WBPCA, we calculated the eigenvalues using the correlation scale and retained components using the Kaiser’s rule also referred to as “eigenvalue greater than one rule” [30]. We projected the entire test data onto the eigenspace obtained using the training data and found that some of the $s_{j}^{u}$’s are strongly affected (for example, see the largest four $s_{j}^{u}$’s with indices 6, 11, 21, 26 in Figure 6). The plots for the score statistic $t_{i}^{f}$ based on the methods AAD, WAAD and WBPCA are portrayed in Figure 7. To see the patterns in the test set of data in comparison to the training set of data, we also plot our training data together with the test set of data, where the training set of the data is shaded in light-blue in each plot of the figure. Overall, the methods are able to detect and identify attacks equally well (AAD, WAAD and WBPCA detect and identify, respectively, 99.836%, 99.876% and 99.830% of the anomalous connections). Figure 7 reveals that the normal activities observations of the test data observed during the attack periods also exhibit some peculiar patterns that indicate anomalous connections (in that the corresponding $t_{i}^{f}$ exceeds the threshold $\theta^{(1-.0001)}$). The normal activities data observed during attack periods also show some anomalous block-like patterns that cannot be seen in the period when clean data were observed. The false alarm rate is high for all methods due to these anomalous patterns of normal activities data happening during the attack periods (see Figure 7 and Figure 8). Although no concrete conclusion could be drawn, it could be that the normal activities are disturbed by the attacks or that some anomalous connections are mislabeled as normal. We also calculated the score statistic $t_{i}^{f}$ based on the four most affected dimensions (see the largest $s_{j}^{u}$’s with indices 6, 11, 21, and 26 in Figure 6) and plot the results in Figure 7(b). Considering only these four components in the final score $t_{i}^{f}$ was almost as good in terms of detection and identification of anomalous connections and other anomalous patterns, since it further pushed the block like anomalous structures across the threshold of normal activities data. Often the attacks do not happen all at once, in which case it may be more natural to try to detect and identify a smaller number of anomalous connections in a large batch of normal connections. We therefore contaminated a large sample of size 9900 randomly drawn from the training data with 100 connections randomly drawn from the set of anomalous connections ($m=9900+100$) and used all three methods (AAD, WAAD and WBPCA) to detect and identify the 100 attack connections. We repeated the experiment 1000 times and show the results in Figure 9. The results indicated that 22 components out of 26 were affected by the anomalies (see Figure 9 (a)) and they were not necessarily only among the first few components (see Figure 9 (b)). Taking only the affected components into account made the NIDS slightly more effective both in terms of detection rate and false positive rate (see Figure 9 (c)). We also repeated the experiments separately for each type of attack and show the results for ‘DoS’, ‘Fuzzers’ and ‘Generic’ attacks , respectively, in Figures 10, 11 and 12. The performance of the proposed methods was found to be superior in detecting individual types of attacks. Note that that most of the attacks affected the same components both in combination and separately, which may be due to similar patterns across different types of attacks as exhibited in Figure 7. ### 4.2 KDD’99 dataset The KDD’99 dataset888http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html is perhaps the most well-known and wildly used reference network dataset for the evaluation of NIDS [31]. It was released by MIT Lincoln Lab for a 1998 DARPA evaluation program that was aimed to survey and evaluate research in intrusion detection. The training dataset consists of 4,898,431 connections, which was prepared from 4 gigabytes of compressed raw tcpdump data of 7 weeks of network traffic by [32]. It contains 972,781 normal connections and 3,925,650 anomalous connections. The anomalous connections are due to 23 types of attacks listed in Table I and each of which falls into one of 4 categories: denial-of- service, unauthorized access from a remote machine, unauthorized access to local superuser privileges by a local unprivileged user, and surveillance and probing [17]. Some of these 23 types of attacks are rare; for example, ‘spy’ happens two times and ‘perl’ happens three times in the whole dataset. Others happen frequently in the dataset; for example, there are 2,807,886 ‘smurf’ connections. !tb Attack type Frequency back 2203 buffer_overflow 30 ftp_write 8 guess_passwd 53 imap. 12 ipsweep 12481 land. 21 loadmodule 9 multihop 7 neptune 1072017 nmap 2316 normal 972781 perl 3 phf 4 pod 264 portsweep 10413 rootkit 10 satan 15892 smurf 2807886 spy 2 teardrop 979 warezclient 1020 warezmaster 20 TABLE I: Attack types in KDD’99 dataset. Similarly, around two million connection records were obtained separately from the two weeks of test data. However, following [14], we used only the training set and drop the original test data completely. The dataset has 41 features excluding the one that represents class labels [17]. Among these 41 features, 34 are numeric and 7 are nominal. We include only 23 numeric features in our experiments and exclude all nominal features and 11 numeric features (‘wrong_fragment’, ‘urgent’, ‘hot’, ‘num_failed_logins’, ‘num_compromised’, ‘root_shell’, ‘su_attempted’, ‘num_root’ and ‘num_file_creations’) since these feature have a small number of non-zero values in the training set of data (the values for ‘wrong_fragment’ and ‘num_outbound_cmds’ are zero for all connections). We used $n=972,781$ normal connections data for training the PCA model. As in the previous application, we constructed the distributions of $r_{j}^{u}$’s based on 5,000 bootstrap samples of size 10,000 (see Figure 13). The distributions of some of the $r_{j}^{u}$’s were centered away from one (see the box-plots for $r_{6}^{u}$, $r_{7}^{u}$ and $r_{11}^{u}$), indicating the possible presence of some unusual observations of the variables that have large coefficients for PC-6, PC-7 and PC-11. The PC-6, PC-7 and PC-11 all had large coefficients for ‘src_bytes’ and ‘dst_bytes’ (PC-6 had loadings of -0.51 and -0.58, PC-7 had loadings of -0.46 and -0.39, and PC-11 had loadings of -0.70 and 0.70, respectively for ‘src_bytes’ and ‘dst_bytes’. Further inspection revealed eight unusually large values of the ‘src_bytes’ and eight unusually large values of the ‘dst_bytes’. The removal of these 16 unusual observations re-centered the distributions of $r_{6}^{u}$, $r_{7}^{u}$ and $r_{11}^{u}$ closer to one (see Figure 14). (a) Figure 13: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap samples of size 10000 from the training set of the KDD’99 dataset. The horizontal gray line indicates the expected value of $r_{j}^{u}$ in the absence of anomalous activities. (a) Figure 14: Plot of the values of $r_{j}^{u}$’s obtained using 5000 bootstrap samples of size 10000 from the training set of the KDD’99 dataset after removal of eight unusual observations. The horizontal gray line indicates the expected value of $r_{j}^{u}$ in the absence of anomalous activities. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotms.png}\includegraphics[scale={0.250}]{barplotall.png}\\\ \includegraphics[scale={0.250}]{kdd99roc.png}\end{array}$ Figure 15: Plots of the KDD’99 dataset. A random sample of size 9900 from normal activities dataset is contaminated with 100 attack connections randomly chosen from all categories of attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmssmurf.png}\includegraphics[scale={0.250}]{barplotsmurf.png}\\\ \includegraphics[scale={0.250}]{kdd99rocsmurf.png}\end{array}$ Figure 16: Plots of the KDD’99 dataset. A random sample of size 9900 from normal activities dataset is contaminated with 100 attack connections randomly chosen from ‘smurf’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmsneptune.png}\includegraphics[scale={0.250}]{barplotneptune.png}\\\ \includegraphics[scale={0.250}]{kdd99rocneptune.png}\end{array}$ Figure 17: Plots of the KDD’99 dataset. A random sample of size 9900 from normal activities dataset is contaminated with 100 attack connections randomly chosen from ‘neptune’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmssatan.png}\includegraphics[scale={0.250}]{barplotsatan.png}\\\ \includegraphics[scale={0.250}]{kdd99rocsatan.png}\end{array}$ Figure 18: Plots of the KDD’99 dataset. A random sample of size 9900 from normal activities dataset is contaminated with 100 attack connections randomly chosen from ‘satan’ attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. $\begin{array}[]{c}\includegraphics[scale={0.250}]{barplotmsrare.png}\includegraphics[scale={0.250}]{barplotrare.png}\\\ \includegraphics[scale={0.250}]{kdd99rocrare.png}\end{array}$ Figure 19: Plots of the KDD’99 dataset. A random sample of size 9900 from normal activities dataset is contaminated with 100 attack connections randomly chosen from all less frequent attacks. In (a) is the distribution of the number of components found relevant, in (b) are the components found effected and in (c) are the average ROC curves. The experiment is repeated 1000 times. For the test data, we contaminated a large sample of size 9900 randomly drawn from normal activities data with 100 anomalous connections randomly drawn from the set of anomalous connections ($m=9900+100$) and used the AAD, WAAD and WBPCA to detect and identify the 100 attack connections. We repeated the experiment 1000 times and show the results in Figure 15. The results indicated that there were indeed a few components out of 32 that were affected by the anomalies and they were not necessarily only among the first few components (see Figure 15 (a) and (b)). Taking only the affected components into account made the NIDS much more effective both in terms of detection rate and false positive rate (see Figure 15 (c)). We also repeated the experiments separately for the three most frequent attacks, namely ‘smurf’, ‘neptune’ and ‘satan’, and show the results, respectively, in Figures 16, 17 and 18. The performance of the proposed methods was found to be superior in detecting individual type of attacks. As mentioned earlier, some of the attacks were rare and the probability for them to be included in a random sample of sized 100 was negligible. Therefore, we repeated the experiment with all attacks which occurred less than 1,000 times. The results are presented in Figure 19. The number of affected components was less stable due to the mixture of varieties of rare attacks each of which altered a varying number of components (see Figure 19 (a) and (b)) compared to the case when individual type of attacks were confronted. The detection rate was low and comparable for all methods. This indicates that the proposed methods AAD and WAAD perform similarly to WBPCA when varieties of attacks are introduced at the same time and improve the detection rate when normal connections are contaminated with a single type of attack at a time. ## 5 Discussion and conclusion The use of PCA for network anomaly detection has been criticized due to its limited effectiveness in detecting and identifying anomalous activities [8]. One reason for this is that the anomaly scores are calculated by aggregation across the major principal components (the first few components that explain most of the variation in the data), which often includes components that are relatively unaffected by the anomalies, or the alterations caused by anomalies along these components are less pronounced because of greater variation along these components. Moreover, the existing methods exclude some of the minor components from the aggregation that could be more strongly affected, or the alterations caused by anomalies along these components are more pronounced because of lower variation along these components. In this paper, we highlight this shortcoming of previous studies and propose to calculate scores by aggregating across only those components that are affected by the anomalies or give more weight to the components that are more affected. To support our findings, we have conducted a simulation study which showed that the identification rate could be considerably increased if the scores were aggregated only across affected components while leaving out the unaffected components. Anomaly identification was higher when the most affected components were weighted more highly. Through the analysis of real datasets we showed that the attacks created shifts only along the direction of a few components (a mix of principal and minor components) and that most of the components are relatively unaffected, so when excluded from the calculation of anomaly scores, the detection rate improves. Although, our simulation study is limited to the multivariate normal distribution, the applications to real data indicated that that the proposed methods can perform well even if the data is non-normal. However, further simulations—simulations from heavy-tailed and skewed distributions—would strengthen this assertion. ## References * [1] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: methods, systems and tools,” _IEEE communications surveys & tutorials_, vol. 16, no. 1, pp. 303–336, 2014. * [2] A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” _IEEE Communications Surveys & Tutorials_, vol. 18, no. 2, pp. 1153–1176, 2016. * [3] D. Sahoo, C. Liu, and S. C. Hoi, “Malicious url detection using machine learning: A survey,” _arXiv preprint arXiv:1701.07179_ , 2017. * [4] M.-L. Shyu, K. Sarinnapakorn, I. Kuruppu-Appuhamilage, S.-C. Chen, L. Chang, and T. Goldring, “Handling nominal features in anomaly intrusion detection problems,” in _15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications. RIDE-SDMA 2005._ IEEE, 2005, pp. 55–62. * [5] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges,” _computers & security_, vol. 28, no. 1-2, pp. 18–28, 2009. * [6] H. Om and T. Hazra, “Statistical techniques in anomaly intrusion detection system,” _International Journal of Advances in Engineering & Technology_, vol. 5, no. 1, pp. 387–398, 2012. * [7] P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, “Phishnet: predictive blacklisting to detect phishing attacks,” in _INFOCOM 2010: Proceedings of the IEEE Conference on Computer Communications_. Citeseer, 2010, pp. 1–5. * [8] H. Ringberg, A. Soule, J. Rexford, and C. Diot, “Sensitivity of pca for traffic anomaly detection,” _ACM Sigmetrics Performance Evaluation Review_ , vol. 35, no. 1, pp. 109–120, 2007. * [9] R. Perdisci, G. Gu, and W. Lee, “Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems,” in _Sixth International Conference on Data Mining, 2006 (ICDM 2006)._ IEEE, 2006, pp. 488–498. * [10] Z. Muda, W. Yassin, M. Sulaiman, and N. Udzir, “Intrusion detection based on k-means clustering and naïve bayes classification,” in _7th International Conference on Information Technology in Asia CITA 2011_. IEEE, 2011, pp. 1–6. * [11] S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, and C. D. Perkasa, “A novel intrusion detection system based on hierarchical clustering and support vector machines,” _Expert systems with Applications_ , vol. 38, no. 1, pp. 306–313, 2011. * [12] M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang, “A novel anomaly detection scheme based on principal component classifier,” Miami University Department of Electrical and Computer Engineering, Tech. Rep., 2003. * [13] A. Lakhina, M. Crovella, and C. Diot, “Characterization of network-wide anomalies in traffic flows,” in _Proceedings of the 4th ACM SIGCOMM conference on Internet measurement_. ACM, 2004, pp. 201–206. * [14] W. Wang and R. Battiti, “Identifying intrusions in computer networks with principal component analysis,” in _The First International Conference on Availability, Reliability and Security (ARES 2006)_. IEEE, 2006, pp. 270–279. * [15] C. Callegari, L. Gazzarrini, S. Giordano, M. Pagano, and T. Pepe, “A novel PCA-based network anomaly detection,” in _IEEE International Conference on Communications (ICC)_. IEEE, 2011, pp. 1–5. * [16] R. Kwitt and U. Hofmann, “Unsupervised anomaly detection in network traffic by means of robust PCA,” in _International Multi-Conference on Computing in the Global Information Technology, 2007 (ICCGI 2007)._ IEEE, 2007, pp. 37–41. * [17] W. Lee and S. J. Stolfo, “A framework for constructing features and models for intrusion detection systems,” _ACM transactions on Information and system security TiSSEC_ , vol. 3, no. 4, pp. 227–261, 2000. * [18] M. Koeman, J. Engel, J. Jansen, and L. Buydens, “Critical comparison of methods for fault diagnosis in metabolomics data,” _Scientific reports_ , vol. 9, no. 1, p. 1123, 2019. * [19] H. Zou, T. Hastie, and R. Tibshirani, “Sparse principal component analysis,” _Journal of computational and graphical statistics_ , vol. 15, no. 2, pp. 265–286, 2006. * [20] I. Jolliffe, _Principal component analysis_ , 3rd ed. Springer Series in Statistics. New York: Springer Verlag, 2002\. * [21] O. Alter, P. O. Brown, and D. Botstein, “Singular value decomposition for genome-wide expression data processing and modeling,” _Proceedings of the National Academy of Sciences_ , vol. 97, no. 18, pp. 10 101–10 106, 2000\. * [22] E. J. McTavish, J. E. Decker, R. D. Schnabel, J. F. Taylor, and D. M. Hillis, “New world cattle show ancestry from multiple independent domestication events,” _Proceedings of the National Academy of Sciences_ , vol. 110, no. 15, pp. E1398–E1406, 2013. * [23] G. Saporta and N. Niang, “Principal component analysis: application to statistical process control,” _Data analysis_ , pp. 1–23, 2009. * [24] S. Valle, W. Li, and S. J. Qin, “Selection of the number of principal components: the variance of the reconstruction error criterion with a comparison to other methods,” _Industrial & Engineering Chemistry Research_, vol. 38, no. 11, pp. 4389–4401, 1999. * [25] R. A. Johnson, D. W. Wichern _et al._ , _Applied multivariate statistical analysis_. Prentice hall Upper Saddle River, NJ, 2002, vol. 5, no. 8. * [26] D. I. Warton, “Penalized normal likelihood and ridge regularization of correlation and covariance matrices,” _Journal of the American Statistical Association_ , vol. 103, no. 481, pp. 340–349, 2008. * [27] N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in _Military Communications and Information Systems Conference MilCIS, 2015_. IEEE, 2015, pp. 1–6. * [28] ——, “The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” _Information Security Journal: A Global Perspective_ , vol. 25, no. 1-3, pp. 18–31, 2016. * [29] N. Moustafa, J. Slay, and G. Creech, “Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks,” _IEEE Transactions on Big Data_ , 2017. * [30] H. F. Kaiser, “The application of electronic computers to factor analysis,” _Educational and psychological measurement_ , vol. 20, no. 1, pp. 141–151, 1960. * [31] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in _IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009)._ IEEE, 2009, pp. 1–6. * [32] S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based modeling for fraud and intrusion detection: Results from the jam project,” in _Proceedings of the DARPA Information Survivability Conference & Exposition_, 2000, pp. 130–144.
arxiv-papers
2021-07-27T04:38:46
2024-09-04T03:07:20.520532
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Insha Ullah, Kerrie Mengersen, Rob J Hyndman and James McGree", "submitter": "Insha Ullah Dr", "url": "https://arxiv.org/abs/2107.12592" }
2107.12593
# PoBO: A Polynomial Bounding Method for Chance-Constrained Yield-Aware Optimization of Photonic ICs Zichang He and Zheng Zhang, Member, IEEE This work was partly supported by NSF grants #1763699 and #1846476. Zichang He and Zheng Zhang are with Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106, USA (e-mails: [email protected]; [email protected]). ###### Abstract Conventional yield optimization algorithms try to maximize the success rate of a circuit under process variations. These methods often obtain a high yield but reach a design performance that is far from the optimal value. This paper investigates an alternative yield-aware optimization for photonic ICs: we will optimize the circuit design performance while ensuring a high yield requirement. This problem was recently formulated as a chance-constrained optimization, and the chance constraint was converted to a stronger constraint with statistical moments. Such a conversion reduces the feasible set and sometimes leads to an over-conservative design. To address this fundamental challenge, this paper proposes a carefully designed polynomial function, called optimal polynomial kinship function, to bound the chance constraint more accurately. We modify existing kinship functions via relaxing the independence and convexity requirements, which fits our more general uncertainty modeling and tightens the bounding functions. The proposed method enables a global optimum search for the design variables via polynomial optimization. We validate this method with a synthetic function and two photonic IC design benchmarks, showing that our method can obtain better design performance while meeting a pre-specified yield requirement. Many other advanced problems of yield-aware optimization and more general safety-critical design/control can be solved based on this work in the future. ###### Index Terms: Photonic design automation; yield-aware optimization; chance constrained programming; uncertainty quantification; process variation. ## I Introduction The increasing process variations have resulted in significant performance degradation and yield loss in semiconductor chip design and fabrications [1, 2]. Compared with electronic ICs, photonic ICs are more sensitive to process variations (e.g., geometric uncertainties) due to their large device dimensions compared with the small wavelength. Therefore, yield modeling and optimization for photonic ICs is highly desired [3, 4]. The yield optimization and yield-aware robust design have been investigated in the electronic design automation community for a long time and have been paid increasing attention in the photonic design automation [5, 6, 7, 8]. Typical yield-aware design techniques include geometric approaches [9], geostatistics- motivated performance modeling [10], yield-aware Pareto surface [11], yield- driven iterative robust design [12], computational intelligence assisted approaches [13], corner-based method [14], Bayesian yield optimization [15] and so forth. Yield estimation is the key component in a yield optimizer.Advanced yield estimators can be generally classified as Monte- Carlo-based [16, 17] and non-Monte-Carlo-based [18, 19, 20] methods. Among the non-Monte-Carlo ones, surrogate modeling aims to approximate some circuit behaviors under variations to speed up the sampling and simulation process [21, 22, 23]. Typical surrogate models include posynomial models [24], linear quadratic models [25], support vector machine [26, 27], Gaussian process [28, 29], sparse polynomial [30], generalized polynomial chaos expansions [31, 32], and some variants [33]. Focusing on generalized polynomial chaos expansion, advanced techniques have also been developed to handle high-dimensional [34, 35, 36, 37, 38], mixed-integer [39] or non-Gaussian correlated [40] process variations. The polynomial chaos expansion based modeling and optimization has been widely used in both electronics [41, 42, 43] and photonic IC design [44, 45, 46, 47]. While most existing yield optimization approaches try to maximize the yield of a circuit, the obtained design performance (e.g., signal gain, power dissipation) may be far from the achievable optimal solution. Recently, an alternative approach was proposed in [48] to achieve both excellent yield and design performance. Instead of simply maximizing the yield, the work [48] optimizes a design performance metric while enforcing a high yield requirement. Specifically, the yield requirement is formulated as some chance constraints [49], which are further transformed to tractable constraints of the first and second statistical moments. The chance constrained modeling itself has been widely used in many engineering fields [50, 51, 52]. The moment bounding method offers a provably sufficient condition of the chance constraint. However, the bounding gap may be too large in many applications [53]. The resulting overly-reduced feasible region may lead to an over- conservative design. Paper contributions. This paper proposes a novel Polynomial Bounding method for chance-constrained yield-aware Optimization (PoBO) under truncated non- Gaussian correlated variations. Leveraging the recent uncertainty quantification techniques [40, 48], PoBO employs and modifies the idea of kinship functions [54] to approximate the original chance constraints with a better polynomial bounding method. PoBO provides a less conservative design than moment-based bounding methods [48] while ensuring a pre-specified yield requirement. The specific contributions of this paper include: * • A better bounding method of the chance constraints via optimal polynomial kinship functions. Compared with existing work in the control community [54], we avoid the assumption of the independence among random variables and the convexity of kinship functions. The relaxation allows more general non- Gaussian correlated uncertainty modeling and tightens the bounding functions. Within a family of polynomial functions, the optimal polynomial kinship functions can be efficiently solved via semidefinite programming. Our bounding method preserves the polynomial formulation of the provided surrogate models. It enables the advanced polynomial optimization solvers, which provide a sequence of convex relaxations via semidefinite optimization and searches for the global design. * • Numerical implementation of the PoBO framework. Based on available uncertainty quantification solvers, we implement PoBO efficiently based on some pre- calculated optimal polynomial kinship functions and quadrature samples and weights without requiring any additional circuit simulations. * • Validations on a synthetic function and two photonic IC design examples. Our method offers better design performance while meeting the pre-specified yield requirements. This method requires a small number of circuit simulations due to its compatibility with recent data-efficient uncertainty quantification methods [36, 40]. While this work focuses on the fundamental theory, algorithms and their validation on small-size photonic circuits, the proposed method can be combined with sparse or low-rank surrogate modeling methods [34, 36] to handle large-scale design cases with much more design variables and process variations. ## II Background This section reviews chance-constrained yield-aware optimization and its implementation via moment bounding [48]. ### II-A Chance-Constrained Yield-Aware Optimization We denote the design variables by $\mathbf{x}=[x_{1},x_{2},\ldots,x_{d_{1}}]^{T}\in\mathbf{X}$, and the process variations by random parameters $\boldsymbol{{\xi}}=[\xi_{1},\xi_{2},\ldots,\xi_{d_{2}}]^{T}\in\mathbf{\Xi}$. Let $\\{y_{i}(\mathbf{x},\boldsymbol{{\xi}})\\}_{i=1}^{n}$ denote $n$ performance metrics that are considered in yield estimation, $\\{u_{i}\\}_{i=1}^{n}$ denote their corresponding upper bounds specifying the design requirements. An indicator function is defined as $I(\mathbf{x},\boldsymbol{{\xi}})=\begin{cases}1,&y_{i}(\mathbf{x},\boldsymbol{{\xi}})\leq u_{i},\forall i=[n];\\\ 0,&\text{otherwise}.\end{cases}$ (1) Here $[n]=\\{1,2,\cdots,n\\}$. The yield at a certain design choice $\mathbf{x}$ is defined as $Y(\mathbf{x})=\mathbb{P}_{\boldsymbol{{\xi}}}(\mathbf{y}(\mathbf{x},\boldsymbol{{\xi}})\leq\mathbf{u})=\mathbb{E}_{\boldsymbol{{\xi}}}[I(\mathbf{x},\boldsymbol{{\xi}})].$ (2) In conventional yield optimization, one often tries to achieve the best possible yield. This often requires losing remarkable design performance $f(\mathbf{x},\boldsymbol{{\xi}})$ in order to achieve a high yield. Simply maximizing the yield may lead to an over-conservative design. As an example shown in Fig. 1, one may lose lots of performance (from $2.2$ to $1.4$) while just getting marginal yield improvement from $99\%$ to $100\%$. Figure 1: The trade-off between yield and an objective design performance for the example from V-A. Simply maximizing the yield can lead to over- conservative performance. In order to avoid an over-conservative design, a chance-constrained optimization was proposed in [48]: $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}\quad$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[f(\mathbf{x},\boldsymbol{{\xi}})]$ (3a) $\displaystyle\mathop{\mathrm{s.t.}}\quad$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(y_{i}(\mathbf{x,}\boldsymbol{{\xi}})\leq u_{i})\geq 1-\epsilon_{i},\forall i=[n].$ (3b) where $f(\mathbf{x},\boldsymbol{{\xi}})$ is the performance metric that we aim to optimize, and $\epsilon_{i}\in[0,1]$ is a risk level to control the probability of meeting each design constraint. Instead of simply maximizing the yield, the chance-constrained optimization tries to achieve a good balance between yield and performance: one can optimize the performance $f(\mathbf{x},\boldsymbol{{\xi}})$ while ensuring a high yield. The circuit yield can be controlled by $\epsilon_{i}$: reducing $\epsilon_{i}$ ensures a lower failure rate and thus a higher yield. The chance-constrained optimization (3) is generally hard to solve. Firstly, the feasible set produced by the chance constraints is often non-convex and hard to estimate. Secondly, it is also expensive to estimate the design objective function $f(\mathbf{x},\boldsymbol{{\xi}})$ and design constraint function $y_{i}(\mathbf{x},\boldsymbol{{\xi}})$ due to the lack of analytical expressions. Fortunately, a moment bounding method was combined with uncertainty quantification techniques in [48] to make the problem tractable. ### II-B Moment Bounding Method for (3) Employing the Chebyshev-Cantelli inequality, one can ensure the chance constraint via a moment bounding technique [55, 48]. Specifically, with the first and second-order statistical moments of the constraint function, one can convert the probabilistic constraint in (3) to a deterministic one: $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[{f}(\mathbf{x},\boldsymbol{{\xi}})]$ (4) $\displaystyle\mathop{\mathrm{s.t.}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})]+\gamma_{\epsilon_{i}}\sqrt{\text{Var}_{\boldsymbol{{\xi}}}[{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})]}\leq u_{i},\forall i\in[n],$ where constant $\gamma_{\epsilon_{i}}=\sqrt{\frac{1-\epsilon_{i}}{\epsilon_{i}}}$. When the objective and constraint functions are described by certain surrogate models such as generalized polynomial chaos [32, 40], one can easily extract their mean and variances. This can greatly simplify the problem and reduce the computational cost, as shown by the yield-aware optimization of photonic IC in [48]. The moment constraint in (4) is a sufficient but unnecessary condition of the original chance constraint in (3). Therefore, any feasible solution of (4) should satisfy the probability constraint of (3). However, the feasible set produced by a moment bounding can be much smaller than exact one [53]. This usually leads to an over-conservative design solution. When the risk level is very small, the moment bounding method may even produce an empty feasible set, leading to an unsolvable problem (see Section V). Figure 2: The feasible set of an original chance constraint, moment bounding (the cross region of two orange lines), and the proposed polynomial bounding. ## III Proposed Polynomial Bounding Method To avoid the possible over-conservative bounding of the moment methods [48], we propose to bound the chance constraint via a more accurate polynomial method. Fig. 2 plots the feasible regions obtained by different bounding methods for the synthetic example in Sec. V-A. For the same chance constraints, the moment bounding method produces a feasible set that is much smaller than the exact one, whereas our polynomial bounding method generates a better approximation of the feasible set. Due to the more accurate approximation of the feasible set, our proposed polynomial bounding method can provide a less conservative design in yield-aware optimization. Now we describe how to generate the polynomial bounds via kinship functions. ### III-A Kinship Function The kinship function was first proposed to construct a convex approximation of an indicator function in [54]. We generalize the concepts of [54] with two relaxations: * • We do not require the convexity of a kinship function. * • We do not require the random variables $\boldsymbol{{\xi}}$ to be mutually independent. Instead, we assume that they are truncated non-Gaussian correlated. We slightly modify the definition of a kinship function. ###### Definition 1 (Kinship function). A kinship function $\kappa(z):[-1,\infty)\rightarrow\mathbb{R}$ is a function that satisfies the following constraints: * • $\kappa(z)=1$ when $z=0$; * • $\kappa(z)\geq 0$ for any $z\in[-1,+\infty)$; * • $\kappa(z_{1})\geq\kappa(z_{2})$ for any $z_{1}\geq z_{2}$ in the range $[-1,\infty)$. Based on kinship functions, the following theorem offers an upper bound for any probability of constraint violations. ###### Theorem 1 (Risk integral [54]). Let $\kappa(\cdot)$ be a kinship function, $g(\mathbf{x},\boldsymbol{{\xi}})\geq-1$, and $V_{\kappa}(\mathbf{x})$ be a risk integral quantity: $V_{\kappa}(\mathbf{x})\coloneqq\int\limits_{\mathbf{\Xi}}\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}},$ (5) then we have $\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:g(\mathbf{x},\boldsymbol{{\xi}})>0\\}\leq V_{\kappa}(\mathbf{x})$. ###### Proof. According to Definition 1, $\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]$ is nonnegative in $[-1,\infty)$ and greater than 1 if $g(\mathbf{x},\boldsymbol{{\xi}})\geq 0$. Therefore, for any probability measure $\mu(\boldsymbol{{\xi}})$ on $\mathbf{\Xi}$, we have: $\displaystyle V_{\kappa}(\mathbf{x})$ $\displaystyle\geq\int\limits_{\\{\boldsymbol{{\xi}}\in\mathbf{\Xi},g(\mathbf{x},\boldsymbol{{\xi}})>0\\}}\kappa[g(\mathbf{x},\boldsymbol{{\xi}})]\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}$ (6a) $\displaystyle\geq\int\limits_{\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:g(\mathbf{x},\boldsymbol{{\xi}})>0\\}}\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}=\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi},g(\mathbf{x},\boldsymbol{{\xi}})>0\\}.$ (6b) ∎ There exist many possible choices of kinship functions. Next, we will show how to pick some polynomial kinship functions. We consider the polynomial function family because it is compatible with existing surrogate modeling techniques [32, 36, 34] to facilitate yield-aware optimization. Figure 3: Different kinship functions. Black curve: an indicator function. ### III-B Optimal Polynomial Kinship Function An optimal kinship function is defined as a kinship function that minimizes its integral over $[-1,0]$ [54]: $\kappa^{\star}(\cdot)\coloneqq\mathop{\mathrm{argmin}}\limits_{\kappa(\cdot)\in{\cal K}}\int_{-1}^{0}\kappa(z)dz.$ (7) Here ${\cal K}$ is the set of all possible kinship functions that satisfy the constraints in Definition 1. Let $z=g(\mathbf{x},\boldsymbol{{\xi}})$, then the above definition can be understood as minimizing the gap between the left- and right-hand sides of (6a). Now we consider choosing a kinship function from a family of order-$\rho$ polynomials ${\cal K}_{\rho}\coloneqq\\{\kappa(z)|\kappa(z)=\sum_{i=0}^{\rho}\zeta_{i}z^{i}\\}$. The optimal polynomial kinship function, denoted as $\kappa_{\rho}(\cdot)$, can be constructed by solving the following optimization problem: $\begin{array}[]{cc}\min\limits_{\zeta_{0},\ldots,\zeta_{\rho}}&\int\limits_{-1}^{0}\kappa_{\rho}(z)dz\\\ \mathop{\mathrm{s.t.}}&\kappa_{\rho}(z)=\zeta_{0}+\zeta_{1}z+\cdots+\zeta_{\rho}z^{\rho}\in{\cal K}_{\rho},\\\ &\kappa_{\rho}(0)=1,\;\kappa_{\rho}(-1)=0,\\\ &\kappa_{\rho}^{\prime}(z)\geq 0,\;\forall z\geq-1.\end{array}$ (8) The optimization problem can be reformulated as semidefinite programming and the details are provided in Appendix A. The obtained optimal polynomial kinship function $\kappa_{\rho}(\cdot)$ with different orders are visualized in Fig. 3. Since we relax the convexity requirement, given the same polynomial order, the proposed polynomial function is a tighter approximation to the indicator function than a convex one [54] for $z\in[-1,0]$. Based on the obtained optimal polynomial kinship function $\kappa_{\rho}(\cdot)$, we bound the original chance constraint (3b) by enforcing the upper bound of the failure probability below $\epsilon_{i}$: $\mathbb{P}_{\boldsymbol{{\xi}}}(y_{i}(\mathbf{x,}\boldsymbol{{\xi}})>u_{i})\leq\\\ \int\limits_{\mathbf{\Xi}}\kappa_{\rho}(y_{i}(\mathbf{x},\boldsymbol{{\xi}})-u_{i})\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}\leq\epsilon_{i}.$ (9) The order of $\kappa_{\rho}(\cdot)$ controls the upper bound of violation probability. When $\rho$ is small, the bounding gap in (6a) is large. As $\rho\rightarrow\infty$, the polynomial bounding leads to a worst-case robust design optimization according to Theorem 3 in [54]. This is equivalent to setting a risk level $\epsilon_{i}=0$, which leads to an extremely over- conservative design. Fortunately, this is not a trouble in practice since we do not use a very high-order polynomial due to the computational issues. In practice, there exists an optimal order $\rho^{\star}$ for bounding the violation probability most accurately. The optimal $\rho^{\star}$ is unknown a-priori, but heuristically we find that setting $\rho\in[5,10]$ usually offers an excellent bound. The proposed bounding method can be extended to deal with joint chance constraints by constructing a multivariate polynomial kinship function. We plan to report the results in a future paper. ## IV The PoBO Framework Based on the proposed polynomial bounding for chance constraints, we further present the novel PoBO method to achieve less conservative yield-aware optimization. ### IV-A Workflow of PoBO Our PoBO framework has two weak assumptions on the design and random variables: * • The design variable $\mathbf{x}$ is box-bounded, i.e., $\mathbf{x}\in\mathbf{X}=[a,b]^{d_{1}}$. This is normally the case in circuit optimization. * • The process variations $\boldsymbol{{\xi}}$ are truncated and non-Gaussian correlated with a joint probability density function $\mu(\boldsymbol{{\xi}})$. The 2nd assumption is not strong at all. Many practical process variations are correlated and not guaranteed to be Gaussian. Additionally, the values of almost all practical geometric or material parameters are bounded, although some simplified unbounded distributions (e.g., Gaussian distributions) were used in previous literature for the ease of implementation. The overall flow of PoBO is summarized below. * • Step 1: Surrogate modeling. We use the recent uncertainty quantification solver [40] to construct polynomial surrogate models for the objective and constraint functions, i.e., $f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ and $y_{i}(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}}),\forall i=[n]$. * • Step 2: Bounding the chance constraints via the proposed optimal polynomial kinship functions. This transforms a chance-constrained probabilistic optimization problem to a tractable deterministic one with a high-quality solution. * • Step 3: Design optimization. We use a polynomial optimization solver, e.g., the semidefinite programming [56], to obtain a globally optimal solution. The PoBO framework reformulates the original chance-constrained optimization (3) to the following optimization: $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}\quad$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\hat{f}(\mathbf{x},\boldsymbol{{\xi}})]$ (10a) $\displaystyle\mathop{\mathrm{s.t.}}\quad$ $\displaystyle V_{\kappa}^{(i)}(\mathbf{x})=\int\limits_{\mathbf{\Xi}}\kappa_{\rho}(\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}))\mu(\boldsymbol{{\xi}})d\boldsymbol{{\xi}}\leq\epsilon_{i},\;\forall i\in[n].$ (10b) Here $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})\coloneqq\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})-u_{i}$, $\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ and $\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})$ are the polynomial surrogate models of $f(\mathbf{x},\boldsymbol{{\xi}})$ and $y_{i}(\mathbf{x},\boldsymbol{{\xi}})$, respectively. In the following subsections, we will describe the implementation details of this PoBO framework. ### IV-B Building Surrogate Models We employ the advanced stochastic collocation method with non-Gaussian correlated uncertainty [40, 48] in Step 1. This method approximates a smooth stochastic function as the linear combination of some orthogonal and normalized polynomial basis functions: $f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})=\sum_{\lvert\boldsymbol{\alpha}\rvert+\lvert\boldsymbol{\beta}\rvert=0}^{p}c_{\boldsymbol{\alpha},\boldsymbol{\beta}}\mathbf{\Phi}_{\boldsymbol{\alpha}}(\mathbf{x})\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}}).$ (11) Here $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$ are two index vectors, $\mathbf{\Phi}_{\boldsymbol{\alpha}}(\mathbf{x})$ and $\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}})$ are two series of orthogonal polynomial basis functions, and $p$ upper bounds the total order of the product of two basis functions. The corresponding coefficients $c_{\boldsymbol{\alpha},\boldsymbol{\beta}}$ are calculated via a projection method using some optimization-based quadrature samples and weights of $\mathbf{x}$ and $\boldsymbol{{\xi}}$ [40]. When the parameter dimensionality is not high, this method only needs a small number of simulation samples to produce a highly accurate surrogate model with a provable error bound. ### IV-C Scaling the Yield Metrics ${\upsilon}_{i}(\mathbf{x},\boldsymbol{{\xi}})$ To bound the failure probability $\mathbb{P}\\{\boldsymbol{{\xi}}\in\mathbf{\Xi}:\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})>0\\}$ via the optimal kinship function, $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ must be in the range $[-1,\infty)$ according to Definition 1. Once $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ is lower bounded, we can always scale it to meet this requirement. Since $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ is a polynomial function in our problem setting, and both $\mathbf{x}$ and $\boldsymbol{{\xi}}$ are assumed bounded, we can compute the minimum value ${\upsilon_{i}^{-}}\coloneqq{\min\limits_{\mathbf{x}\in\mathbf{X},\boldsymbol{{\xi}}\in\mathbf{\Xi}}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})}$. Then we change the lower bound of $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})$ to -1 as follows: $\begin{matrix}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})\longleftarrow-\frac{1}{\upsilon_{i}^{-}}\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}),\;\forall i\in[n].\end{matrix}$ (12) The scaling factor $-\frac{1}{\upsilon_{i}^{-}}$ is positive as long as the problem (10) is solvable. This is because the existence of $\mathbf{x}\in\mathbf{X}$ and $\boldsymbol{{\xi}}\in\mathbf{\Xi}$ such that $\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}})<0$ is the necessary condition to satisfy the yield constraint. We can easily avoid $\upsilon_{i}^{-}=0$ by adding a sufficiently small perturbation. ### IV-D Calculating Risk Integral $V_{\kappa}^{(i)}(\mathbf{x})$ Figure 4: An example of optimized quadrature rule for a two-dimensional truncated Gaussian mixture model with two components. The color bar of the right figure represents the weights of all samples. The shown quadrature rule satisfies the exact integration up to order 6. In order to upper bound the probability of violating a design constraint, we need to calculate the integration in (10b). This can be a challenging task for a truncated non-Gaussian correlated random vector $\boldsymbol{{\xi}}$ since classical numerical quadrature rules [57, 58] do not work for non-Gaussian correlated variables. Fortunately, we can reuse the quadrature rule of $\boldsymbol{{\xi}}$ as the by-product of building the surrogate models in Sec. IV-B. Specifically, the quadrature points and weights $\\{\boldsymbol{{\xi}}_{l},w_{l}\\}_{l=1}^{M}$ compute the exact integration up to order $2q$, obtained by solving the following optimization problem [40]: $\min_{\boldsymbol{{\xi}}_{l},w_{l}\geq 0}\;\sum_{\lvert\boldsymbol{\beta}\rvert=0}^{2q}{\left(\mathbb{E}_{\boldsymbol{{\xi}}}\left[\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}})\right]-\sum_{l=1}^{M}\mathbf{\Psi}_{\boldsymbol{\beta}}(\boldsymbol{{\xi}}_{l})w_{l}\right)}^{2}.$ (13) An example of the solved quadrature is shown in Fig. 4. The detailed accuracy analysis and the bound of $M$ are provided in [40], which is omitted here. 1:Box-bounded design variable $\mathbf{x}\in\mathbf{X}$, truncated non- Gaussian correlated variations $\boldsymbol{{\xi}}\in\mathbf{\Xi}$, risk levels $\mathbf{\epsilon}$ 2:Optimized design $\mathbf{x}^{\star}$ 3:Formulate the chance-constrained problem (3). 4:Obtain surrogate models for the design objective function $f(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ and constraint functions $y_{i}(\mathbf{x},\boldsymbol{{\xi}})\approx\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}}),\forall i\in[n]$. 5:Scale the yield metrics ${\upsilon_{i}}(\mathbf{x},\boldsymbol{{\xi}})$ via Eq. (12). 6:Compute the optimal polynomial kinship function $\kappa_{\rho}(\cdot)$ via (8). 7:Calculate risk integral $V_{\kappa}^{(i)}(\mathbf{x})$ via the quadrature rule obtained from (13). 8:Seek the optimal design of problem (14) via a global polynomial optimization solver. Algorithm 1 Flow of the proposed PoBO. Theoretically, we need a quadrature rule to exactly calculate the integration up to order $p\rho$ in (10b). The exact quadrature rule can be computed offline via solving (13) with $q=\lceil\frac{\rho p}{2}\rceil$. In practice, a low-order quadrature rule, like $q=p$, often offers sufficient numerical accuracy. Therefore, we can directly use the quadrature rule used when building surrogate model (11) to calculate the risk integral $V_{\kappa}^{(i)}(\mathbf{x})$. Since the quadrature points will not be simulated, it does not introduce any additional computational burdens. Based on the quadrature rule, problem (10) can be converted to the following deterministic constrained polynomial optimization (14): $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\hat{f}(\mathbf{x},\boldsymbol{{\xi}})]$ (14) $\displaystyle\mathop{\mathrm{s.t.}}$ $\displaystyle\sum_{l=1}^{M}w_{l}\kappa_{\rho}(\upsilon_{i}(\mathbf{x},\boldsymbol{{\xi}}_{l}))\leq\epsilon_{i},\quad\forall i\in[n].$ Note that the expectation value in the objective function can be easily obtained since $\hat{f}(\mathbf{x},\boldsymbol{{\xi}})$ is a generalized polynomial-chaos expansion [32, 40]. ### IV-E Algorithm Summary We summarize PoBO in Alg. 1. Below are some remarks: * • In line 4 of Alg. 1, the optimal polynomial kinship functions (8) can be computed offline. * • In line 5 of Alg. 1, the optimization-based quadrature rule in [40] can be used to calculate the risk integral without any additional simulations. The quadrature rule can be computed offline as well. * • This method enables a global polynomial optimization solver to obtain the optimal design of (14). Since a high polynomial order can increase the computational burden, the current PoBO framework becomes inefficient for high-dimensional design problems. This challenge may be overcome in the future by using other nonlinear optimization solvers, or a better polynomial optimization solver (e.g. a sparse polynomial solver) that can exploit the sparse structure of the polynomial surrogate. ## V Numerical Results In this section, we validate the proposed PoBO framework via the synthetic example and two realistic photonic IC examples from [48]. The polynomial optimization is solved via GloptiPoly 3 [56], which is a global optimization solver based on hierarchical semidefinite programming. Our codes are implemented in MATLAB and run on a computer with a 2.3 GHz CPU and 16 GB memory. TABLE I: Optimization Results for Synthetic Function Risk level $\epsilon$ Method Objective $\Delta_{1}$ (%) $\Delta_{2}$ (%) Yield (%) 0.01 Moment [48] N/A* N/A* N/A* N/A* Proposed 1.14 1.01 0.99 99.98 0.05 Moment [48] 1.88 5.25 5.26 99.98 Proposed 2.11 5.21 3.97 98.76 0.1 Moment [48] 2.19 10.47 10.98 99.36 Proposed 2.26 10.67 7.98 97.08 * The algorithm fails with no feasible solution. Figure 5: The schematic of a third-order Mach-Zehnder interferometer. Figure 6: The transmission curves of the MZI. The grey lines show the performance uncertainties. The orange and blue curves show the transmission rates at the drop and through ports, respectively. The mean values of the bandwidth, crosstalk, and attenuation are denoted as BW, XT, and $\alpha$, respectively. (a) The initial design: $\mathbf{x}$=[150, 150, 150]; (b) Design after Bayesian yield optimization [15]: $\mathbf{x}$=[286.63, 170.59, 299.3]; (c) Design with the moment-bounding yield-aware optimization [48]: $\mathbf{x}$=[300, 149.67, 300]; (d) Design with the proposed PoBO method: $\mathbf{x}$=[300, 112.15, 300]. TABLE II: Optimization Results for MZI Benchmark Risk level $\epsilon$ | Method | Simulation # | $\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}]$ (GHz) | $\Delta_{1}$ (%) | $\Delta_{2}$ (%) | Yield (%) ---|---|---|---|---|---|--- 0.05 | Moment [48] | 35 | 184.53 | 5.26 | 5.26 | 100 Proposed | 35 | 190.99 | 5.26 | 5.26 | 100 0.07 | Moment [48] | 35 | 187.02 | 7.53 | 7.53 | 100 Proposed | 35 | 192.10 | 7.53 | 7.2 | 99.7 0.1 | Moment [48] | 35 | 189.35 | 11.11 | 11.11 | 100 Proposed | 35 | 193.28 | 11.11 | 4.22 | 93.8 N/A* | BYO [15] | 2020 | 182.82 | N/A* | N/A* | 100 * * No risk level is defined for BYO method. Correspondingly, no gap $\Delta$ is defined. Figure 7: The probability density function of the optimized bandwidth of the MZI by Bayesian yield optimization [15], moment bounding [48] and the proposed PoBO (with $\epsilon=0.1$). Baseline Methods. We choose the moment-bounding chance-constraint optimization [48] as the baseline for comparison. On the photonic IC benchmarks, we further compare our with the Bayesian yield optimization (BYO) method [15], a recent state-of-the-art yield optimization approach. Gap of chance constraints. We modify the indicator function (1) to define an indicator function ${I_{i}}(\mathbf{x},\boldsymbol{{\xi}})$ for each individual design constraint in yield definition: ${{I_{i}}(\mathbf{x},\boldsymbol{{\xi}})=\begin{cases}1,&\hat{y}_{i}(\mathbf{x},\boldsymbol{{\xi}})\leq u_{i};\\\ 0,&\text{otherwise}\end{cases},\forall i=[n].}$ With $N$ random samples, the individual success rate for each design constraint is evaluated as ${Y_{i}}(\mathbf{x})=\begin{matrix}\sum_{j=1}^{N}{I_{i}}(\mathbf{x},\boldsymbol{{\xi}}_{j})/N.\end{matrix}$ The gap for the $i$-th chance constraint is the relative difference between $Y_{i}$ and the pre-specified success rate $1-\epsilon_{i}$: $\Delta_{i}=\frac{{Y_{i}}(\mathbf{x})-(1-\epsilon_{i})}{1-\epsilon_{i}},\;\forall i=[n].$ (15) The chance-constrained optimization can always provide a solution to ensure the yield requirement controlled by $\epsilon_{i}$’s if a feasible solution exists. Therefore, $\Delta_{i}$ is always non-negative. Notice that we do not attempt to achieve the highest yield. Instead, our goal is to avoid over- conservative design while ensuring the pre-specified yield requirement. Therefore, given a certain risk level, we prefer a smaller gap $\Delta_{i}$ and a less conservative design solution with better objective performance. ### V-A Synthetic Function We first consider a synthetic function with design variables $\mathbf{x}\in\mathbf{X}={[-1,1]}^{2}$ and random parameters $\boldsymbol{{\xi}}$ following a truncated Gaussian mixture model. Specifically, we assume $\mu(\boldsymbol{{\xi}})=\frac{1}{2}\mathcal{TN}(\bar{\boldsymbol{\mu}}_{1},\mathbf{\Sigma}_{1},\mathbf{a}_{1},\mathbf{b}_{1})+\frac{1}{2}\mathcal{TN}(\bar{\boldsymbol{\mu}}_{2},\mathbf{\Sigma}_{2},\mathbf{a}_{2},\mathbf{b}_{2})$, with $\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[0.1,-0.1]}^{T}$, $\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=10^{-2}\begin{bmatrix}1&-0.75\\\ -0.75&1\end{bmatrix}$, $\mathbf{a}_{1}=-{[0.2,0.4]}^{T}$, $\mathbf{a}_{2}=-{[0.4,0.2]}^{T}$, $\mathbf{b}_{1}={[0.4,0.2]}^{T}$ and $\mathbf{b}_{2}={[0.2,0.4]}^{T}$. Here $\mathcal{TN}(\bar{\boldsymbol{\mu}},\mathbf{\Sigma},\mathbf{a},\mathbf{b})$ denotes a distribution that is a normal distribution with mean $\bar{\boldsymbol{\mu}}$ and variance $\mathbf{\Sigma}$ in the box $[\mathbf{a},\mathbf{b}]$. We consider the following chance-constrained optimization: $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[3(x_{1}+\xi_{1})-(x_{2}+\xi_{2}))]$ (16) $\displaystyle\mathop{\mathrm{s.t.}}$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}({(x_{1}+\xi_{1})}^{2}+(x_{2}+\xi_{2})\leq 1)\geq 1-\epsilon_{1},$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}({(x_{1}+\xi_{1})}^{2}-(x_{2}+\xi_{2})\leq 1)\geq 1-\epsilon_{2},$ where the two risk levels are set to be equal $\epsilon_{1}=\epsilon_{2}=\epsilon$. We use 2nd-order polynomials to approximate the three analytical functions and bound the chance constraint with an order-10 optimal polynomial kinship function. As shown in Table I, compared with the moment method [48], the proposed PoBO method produces a better objective value and smaller gaps for chance constraints while meeting the pre-specified yield requirement. Clearly, a smaller $\epsilon_{i}$ produces a higher yield. The moment bounding method fails to work when $\epsilon=0.01$ while our PoBO can still solve this problem. Figure 8: The schematic of a microring add-drop filter. Figure 9: The probability density function of the optimized bandwidth of the microring filter by Bayesian yield optimization [15], moment bounding [48] and the proposed PoBO (with $\epsilon=0.1$). ### V-B Mach-Zehnder Interferometer We consider a third-order Mach-Zehnder interferometer (MZI) which consists of three port coupling and two arms, as shown in Fig. 5. The coupling coefficients $\tau$ between the MZ arms play an important role in the design, whose relationship with the the gap $g$ (nm) is $\tau=\exp(-\frac{g}{260})$. The gap variables $\mathbf{x}=[g_{1},g_{2},g_{3}]$ have the design space of $\mathbf{X}={[100,300]}^{3}$. Their corresponding process variations $\boldsymbol{{\xi}}$ follows a truncated Gaussian mixture distribution (see Appendix B). We aim to maximize the expected 3-dB bandwidth (BW, in GHz) with probability constraints on the crosstalk (XT, in dB) and the attenuation ($\alpha$, in dB) of the peak transmission. Therefore, the yield-aware chance- constrained design is formulated as $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}(\mathbf{x},\boldsymbol{{\xi}})]$ (17) $\displaystyle\mathop{\mathrm{s.t.}}$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\text{XT}(\mathbf{x},\boldsymbol{{\xi}})\leq\text{XT}_{0})\geq 1-\epsilon_{1},$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\alpha(\mathbf{x},\boldsymbol{{\xi}})\leq\alpha_{0})\geq 1-\epsilon_{2}.$ The two risk levels are set to be equal $\epsilon_{1}=\epsilon_{2}=\epsilon$. The thresholds of the crosstalk ($\text{XT}_{0}$) and the attenuation ($\alpha_{0}$) are -4 dB and 1.6 dB respectively. We build three 2nd-order polynomial surrogate models for BW, XT, and $\alpha$, respectively. We further bound the probabilistic yield constraints via an order-5 optimal polynomial kinship function. The optimized results and comparisons are listed in Table II. It shows that at the same risk level, the proposed PoBO method can achieve larger bandwidth while meeting the yield requirements and having smaller gaps for the chance constraints. The simulation samples are the ones used for building surrogate models. The proposed PoBO requires the same number of simulations as the moment bounding method [48], and both of them require much fewer simulation samples than the Bayesian yield optimization due to the efficient surrogate modeling. Fig. 6 compares the frequency response before and after the yield-aware optimization with $\epsilon=0.1$. Our PoBO method has a higher expected bandwidth compared with the Bayesian yield optimization, the moment bounding method, and the initial design. Fig. 7 further shows the probability density of the optimized bandwidth by different models. It clearly shows that our proposed method produces the highest bandwidth while meeting the yield requirement. ### V-C Microring Add-Drop Filter We further consider the design of an optical add-drop filter consisting of three identical silicon microrings coupled in series, as shown in Fig. 8. The design variables are the coupling coefficients $\mathbf{x}=[K_{1},K_{2},K_{3},K_{4}]$ that are to be optimized within the interval of $\mathbf{X}={[0.3,0.6]}^{4}$. The process variations $\boldsymbol{{\xi}}$ are described by a truncated Gaussian mixture model (see Appendix B). The design problem is to maximize the expected 3-dB bandwidth (BW, in GHz) with constraints on the extinction ratio (RE, in dB) of the transmission at the drop port and the roughness ($\sigma_{\text{pass}}$, in dB) of the passband that takes its standard deviation, formulated as: $\displaystyle\max_{\mathbf{x}\in\mathbf{X}}$ $\displaystyle\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}(\mathbf{x},\boldsymbol{{\xi}})]$ (18) $\displaystyle\mathop{\mathrm{s.t.}}$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\text{RE}(\mathbf{x},\boldsymbol{{\xi}})\geq\text{RE}_{0})\geq 1-\epsilon_{1},$ $\displaystyle\mathbb{P}_{\boldsymbol{{\xi}}}(\sigma_{\text{pass}}(\mathbf{x},\boldsymbol{{\xi}})\leq\sigma_{0})\geq 1-\epsilon_{2}.$ The two risk levels are set to be equal $\epsilon_{1}=\epsilon_{2}=\epsilon$. The thresholds of the extinction ratio ($\text{RE}_{0}$) and the roughness of the passband ($\sigma_{0}$) are 20 dB and 0.65 dB respectively. Figure 10: The transmission curves of the microring add-drop filter. The grey lines show the performance uncertainties. The orange and blue curves show the transmission rates at the drop and through ports, respectively. The mean values of the extinction ratio, bandwidth, and roughness are denoted as RE, BW, and $\sigma_{\text{pass}}$, respectively. (a) The initial design: $\mathbf{x}$=[0.45, 0.45, 0.45, 0.45]; (b) Design after Bayesian yield optimization [15]: $\mathbf{x}$=[0.5758, 0.3718, 0.3720, 0.5746]; (c) Design with the moment-bounding yield-aware optimization [48]: $\mathbf{x}$=[0.6, 0.3751, 0.3642 0.6]; (d) Design with the proposed PoBO optimization: $\mathbf{x}$=[0.6, 0.3971, 0.3642, 0.6]. TABLE III: Optimization Results for Microring Add-drop Filter benchmark Risk level $\epsilon$ | Method | Simulation # | $\mathbb{E}_{\boldsymbol{{\xi}}}[\text{BW}]$ (GHz) | $\Delta_{1}$ (%) | $\Delta_{2}$ (%) | Yield (%) ---|---|---|---|---|---|--- 0.05 | Moment [48] | 65 | N/A* | N/A* | N/A* | N/A* Proposed | 65 | 116.85 | 5.26 | 4.84 | 99.6 0.07 | Moment [48] | 65 | 112.64 | 7.53 | 7.42 | 99.9 Proposed | 65 | 120.05 | 7.53 | 6.67 | 99.2 0.1 | Moment [48] | 65 | 118.47 | 11.11 | 10.78 | 99.7 Proposed | 65 | 123.05 | 11.11 | 8.33 | 97.5 N/A | BYO [15] | 2020 | 117.42 | N/A | N/A | 95.1 * * The algorithm fails with no feasible solution. Similarly, we build three 2nd-order polynomial surrogate models for BW, RE, and $\sigma_{\text{pass}}$ and bound the chance constraints via an order-5 optimal polynomial kinship function. The optimized results and comparisons are shown in Table III. The moment bounding [48] fails when $\epsilon=0.05$ since no feasible solution is found under its over-conservative bounding. At all risk levels, the proposed method can achieve larger bandwidth while meeting the yield requirements and having smaller gaps for the chance constraints. As shown in Fig. 9, the proposed PoBO has a higher expected bandwidth compared to Bayesian yield optimization, existing yield-aware chance-constraint optimization via moment bounding [48]. Fig. 10 shows the frequency response before and after the yield-aware optimization with $\epsilon=0.1$. All the reported design problems can be solved within a few minutes on a regular laptop computer. ## VI Conclusion and Future Work This paper has proposed a novel Polynomial Bounding method for chance- constrained yield-aware Optimization (PoBO) of photonic ICs with truncated non-Gaussian correlated uncertainties. In PoBO, we first construct surrogate models with a few simulation samples for the interested quantities based on available uncertainty quantification solvers. To avoid over-conservative design, we have proposed an optimal polynomial kinship function to tightly bound the chance constraints. This bounding method can be efficiently implemented without additional simulations. It also preserves the polynomial form and enables seeking a globally optimal design. The proposed PoBO is verified with a synthetic function, a Mach-Zehnder interferometer, and a microring add-drop filter. In all experiments, the proposed PoBO has achieved the yield requirements, produced tighter bounds on the chance constraints than the state-of-the-art moment bounding method, and led to better design objective performances with a few simulation samples. On the two photonic IC examples, the proposed method has also reduced the simulation samples by $58\times$ compared with Bayesian yield optimization. The theoretical and numerical results of this work have laid the foundation of many future topics. Possible extensions of this work include, but are not limited to: (1) improved algorithms to handle many design parameters and process variation, (2) formulations and algorithms to handle joint chance constraint for yield descriptions, (3) PoBO with non-polynomial surrogates. The proposed framework is very generic, and it can also be employed in other applications beyond EDA, including probabilistic control of energy systems, safety-critical control of autonomous systems, and so forth. ## Appendix A Solution to Optimal Polynomial Kinship (8) Given a $\rho$-order optimal kinship function $\kappa_{\rho}(\cdot)$, we introduce two positive semidefinite matrices $\mathbf{Y}_{1}\in\mathbb{R}^{(n_{1}+1)\times(n_{1}+1)}$ and $\mathbf{Y}_{2}\in\mathbb{R}^{(n_{2}+1)\times(n_{2}+1)}$ with $n_{1}=\lfloor(\rho-1)/2\rfloor$ and $n_{2}=\lfloor(\rho-2)/2\rfloor$. We further define two series of Hankel matrices $\mathbf{H}_{1,m}\in\mathbb{R}^{(n_{1}+1)\times(n_{1}+1)}$ and $\mathbf{H}_{2,m}\in\mathbb{R}^{(n_{2}+1)\times(n_{2}+1)}$ as $\mathbf{H}_{k,m}\left(i,j\right)=\begin{cases}1,&i+j=m+1\\\ 0,&\text{otherwise}\end{cases},k=1,2.$ (19) Based on the sum-of-square representation of a nonnegative univariate polynomial, we can reformulate (8) as a finite dimensional semidefinite programming (20), which can be handled by many efficient solvers and toolboxes [59]. The detailed proof will be similar to the Corollary 1 of [54], where the difference is the order of nonnegative polynomial. $\centering\begin{array}[]{c}\min_{{\zeta_{0}},\ldots,{\zeta_{\rho}},{\mathbf{Y}_{1}},{\mathbf{Y}_{2}}}\;\sum_{i=0}^{\rho}\frac{(-1)^{i}}{i+1}\zeta_{i}\\\ \mathop{\mathrm{s.t.}}\;\zeta_{0}=1,\\\ \sum_{i=0}^{\rho}(-1)^{i}\zeta_{i}=0,\\\ \text{Tr}(\mathbf{Y}_{1}\mathbf{H}_{1,m})+\text{Tr}(\mathbf{Y}_{2}\mathbf{H}_{2,m})=\\\ \sum_{i=m+1}^{\rho}\frac{i!(-1)^{i-m-1}}{k!(i-m-1)!}\zeta_{i},m=0,1,\ldots,\rho-2,\\\ \mathbf{Y}_{k}\succeq 0,\;k=1,2.\end{array}\@add@centering$ (20) ## Appendix B Details about benchmark setup In the MZI benchmark (Sec. V-B), the process variations on the coupling coefficients are described by a truncated Gaussian mixture model with two components: $\mu(\mathbf{\xi})=\frac{1}{2}\mathcal{TN}_{1}(\bar{\boldsymbol{\mu}}_{1},\mathbf{\Sigma}_{1},\mathbf{a}_{1},\mathbf{b}_{1})+\frac{1}{2}\mathcal{TN}_{2}(\bar{\boldsymbol{\mu}}_{2},\mathbf{\Sigma}_{2},\mathbf{a}_{2},\mathbf{b}_{2}),$ (21) where $\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[3,3,3]}^{T}$, $\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=3^{2}\begin{bmatrix}1&0.4&0.1\\\ 0.4&1&0.4\\\ 0.1&0.4&1\end{bmatrix},\mathbf{a}_{1}=-\mathbf{b}_{2}={[-6,-6,-6]}^{T},\mathbf{a}_{2}=-\mathbf{b}_{1}={[-12,-12,-12]}^{T}.$ In the microring benchmark (Sec. V-C), the process variations on the coupling coefficients are described the same as Eq. (21) with different parameters $\bar{\boldsymbol{\mu}}_{1}=-\bar{\boldsymbol{\mu}}_{2}={[0.03,0.03,0.03,0.03]}^{T}$, $\mathbf{\Sigma}_{1}=\mathbf{\Sigma}_{2}=0.03^{2}\begin{bmatrix}1&0.4&0.1&0.4\\\ 0.4&1&0.4&0.1\\\ 0.1&0.4&1&0.4\\\ 0.4&0.1&0.4&1\end{bmatrix},\mathbf{a}_{1}=-\mathbf{b}_{2}={[-0.06,-0.06,-0.06,-0.06]}^{T},\mathbf{a}_{2}=-\mathbf{b}_{1}={[-0.12,-0.12,-0.12,-0.12]}^{T}.$ ## References * [1] G. Gielen, P. De Wit, E. Maricau, J. Loeckx, J. Martin-Martinez, B. Kaczer, G. Groeseneken, R. Rodriguez, and M. Nafria, “Emerging yield and reliability challenges in nanometer CMOS technologies,” in _Proc. Design, Autom. Test Eur. Conf. Exhibit._ , 2008, pp. 1322–1327. * [2] X. Chen, M. Mohamed, Z. Li, L. Shang, and A. R. Mickelson, “Process variation in silicon photonic devices,” _Appl. Opt._ , vol. 52, no. 31, pp. 7638–7647, 2013. * [3] T. Lipka, J. Müller, and H. K. Trieu, “Systematic nonuniformity analysis of amorphous silicon-on-insulator photonic microring resonators,” _J. Light. Technol._ , vol. 34, no. 13, pp. 3163–3170, 2016. * [4] W. Bogaerts, Y. Xing, and U. Khan, “Layout-aware variability analysis, yield prediction, and optimization in photonic integrated circuits,” _IEEE J. Sel. Top. Quantum Electron._ , vol. 25, no. 5, pp. 1–13, 2019. * [5] K. J. Antreich, H. E. Graeb, and C. U. Wieser, “Circuit analysis and optimization driven by worst-case distances,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 13, no. 1, pp. 57–71, 1994\. * [6] F. Gong, Y. Shi, H. Yu, and L. He, “Variability-aware parametric yield estimation for analog/mixed-signal circuits: Concepts, algorithms, and challenges,” _IEEE Des. Test_ , vol. 31, no. 4, pp. 6–15, 2014. * [7] Z. Lu, J. Jhoja, J. Klein, X. Wang, A. Liu, J. Flueckiger, J. Pond, and L. Chrostowski, “Performance prediction for silicon photonics integrated circuits with layout-dependent correlated manufacturing variability,” _Opt. Express_ , vol. 25, no. 9, pp. 9712–9733, 2017. * [8] J. Pond, J. Klein, J. Flückiger, X. Wang, Z. Lu, J. Jhoja, and L. Chrostowski, “Predicting the yield of photonic integrated circuits using statistical compact modeling,” in _Integrated Optics: Physics and Simulations III_ , vol. 10242, 2017, p. 102420S. * [9] Y. Xu, K.-L. Hsiung, X. Li, L. T. Pileggi, and S. P. Boyd, “Regular analog/RF integrated circuits design using optimization with recourse including ellipsoidal uncertainty,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 28, no. 5, pp. 623–637, 2009. * [10] G. Yu and P. Li, “Yield-aware analog integrated circuit optimization using geostatistics motivated performance modeling,” in _Proc. Intl. Conf. Computer Aided Design_ , 2007, pp. 464–469. * [11] S. K. Tiwary, P. K. Tiwary, and R. A. Rutenbar, “Generation of yield-aware Pareto surfaces for hierarchical circuit design space exploration,” in _Proc. Design Autom. Conf_ , 2006, pp. 31–36. * [12] Y. Li and V. Stojanovic, “Yield-driven iterative robust circuit optimization algorithm,” in _Proc. Design Autom. Conf_ , 2009, pp. 599–604. * [13] B. Liu, F. V. Fernández, and G. G. Gielen, “Efficient and accurate statistical analog yield optimization and variation-aware circuit sizing based on computational intelligence techniques,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 30, no. 6, pp. 793–805, 2011\. * [14] M. Barros, J. Guilherme, and N. Horta, “Analog circuits optimization based on evolutionary computation techniques,” _Integration_ , vol. 43, no. 1, pp. 136–155, 2010. * [15] M. Wang, F. Yang, C. Yan, X. Zeng, and X. Hu, “Efficient Bayesian yield optimization approach for analog and SRAM circuits,” in _Proc. Design Autom. Conf_ , 2017, pp. 1–6. * [16] A. Singhee, S. Singhal, and R. A. Rutenbar, “Practical, fast Monte Carlo statistical static timing analysis: Why and how,” in _Proc. Intl. Conf. Computer Aided Design_ , 2008, pp. 190–195. * [17] A. Papoulis and H. Saunders, _Probability, random variables and stochastic processes_. McGraw-Hill, 2001. * [18] C. Gu and J. Roychowdhury, “An efficient, fully nonlinear, variability-aware non-Monte-Carlo yield estimation procedure with applications to SRAM cells and ring oscillators,” in _Proc. Asia South Pac. Design Autom. Conf._ , 2008, pp. 754–761. * [19] F. Gong, X. Liu, H. Yu, S. X. Tan, J. Ren, and L. He, “A fast non-Monte-Carlo yield analysis and optimization by stochastic orthogonal polynomials,” _ACM Trans. Des. Autom. Electron. Syst._ , vol. 17, no. 1, pp. 1–23, 2012. * [20] Z. Gao and R. Rohrer, “Efficient non-Monte-Carlo yield estimation,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , pp. 1–1, 2021\. * [21] X. Shi, H. Yan, Q. Huang, J. Zhang, L. Shi, and L. He, “Meta-model based high-dimensional yield analysis using low-rank tensor approximation,” in _Proc. Design Autom. Conf_ , 2019, pp. 1–6. * [22] J. Yao, Z. Ye, and Y. Wang, “An efficient SRAM yield analysis and optimization method with adaptive online surrogate modeling,” _IEEE Trans. Very Large Scale Integr. (VLSI) Syst._ , vol. 23, no. 7, pp. 1245–1253, 2014. * [23] X. Li, J. Le, P. Gopalakrishnan, and L. T. Pileggi, “Asymptotic probability extraction for nonnormal performance distributions,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 26, no. 1, pp. 16–37, 2006\. * [24] X. Li, P. Gopalakrishnan, Y. Xu, and T. Pileggi, “Robust analog/RF circuit design with projection-based posynomial modeling,” in _Proc. Intl. Conf. Computer Aided Design_ , 2004, pp. 855–862. * [25] X. Li, Y. Zhan, and L. T. Pileggi, “Quadratic statistical $max$ approximation for parametric yield estimation of analog/rf integrated circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 27, no. 5, pp. 831–843, 2008. * [26] A. Ciccazzo, G. Di Pillo, and V. Latorre, “A SVM surrogate model-based method for parametric yield optimization,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 35, no. 7, pp. 1224–1228, 2015. * [27] H. Ma, E.-P. Li, A. C. Cangellaris, and X. Chen, “Support vector regression-based active subspace (SVR-AS) modeling of high-speed links for fast and accurate sensitivity analysis,” _IEEE Access_ , vol. 8, pp. 74 339–74 348, 2020. * [28] A. C. Sanabria-Borbón, S. Soto-Aguilar, J. J. Estrada-López, D. Allaire, and E. Sánchez-Sinencio, “Gaussian-process-based surrogate for optimization-aided and process-variations-aware analog circuit design,” _Electronics_ , vol. 9, no. 4, p. 685, 2020. * [29] M. Wang, W. Lv, F. Yang, C. Yan, W. Cai, D. Zhou, and X. Zeng, “Efficient yield optimization for analog and SRAM circuits via Gaussian process regression and adaptive yield estimation,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 37, no. 10, pp. 1929–1942, 2017. * [30] Y. Wang, M. Orshansky, and C. Caramanis, “Enabling efficient analog synthesis by coupling sparse regression and polynomial optimization,” in _Proc. Design Autom. Conf_ , 2014, pp. 1–6. * [31] D. Xiu and G. E. Karniadakis, “Modeling uncertainty in flow simulations via generalized polynomial chaos,” _J. Comput. Phys._ , vol. 187, no. 1, pp. 137–167, 2003. * [32] Z. Zhang, T. A. El-Moselhy, I. M. Elfadel, and L. Daniel, “Stochastic testing method for transistor-level uncertainty quantification based on generalized polynomial chaos,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 32, no. 10, pp. 1533–1545, 2013. * [33] R. Trinchero and F. G. Canavero, “Combining LS-SVM and GP regression for the uncertainty quantification of the EMI of power converters affected by several uncertain parameters,” _IEEE Trans. Electromagn. Compat._ , vol. 62, no. 5, pp. 1755–1762, 2020. * [34] X. Li, “Finding deterministic solution from underdetermined equation: large-scale performance variability modeling of analog/RF circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 29, no. 11, pp. 1661–1668, 2010. * [35] Z. Zhang, X. Yang, I. V. Oseledets, G. E. Karniadakis, and L. Daniel, “Enabling high-dimensional hierarchical uncertainty quantification by ANOVA and tensor-train decomposition,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 34, no. 1, pp. 63–76, 2014. * [36] Z. Zhang, T.-W. Weng, and L. Daniel, “Big-data tensor recovery for high-dimensional uncertainty quantification of process variations,” _IEEE Trans. Compon. Packag. Manuf. Technol._ , vol. 7, no. 5, pp. 687–697, 2016. * [37] Z. He and Z. Zhang, “High-dimensional uncertainty quantification via active and rank-adaptive tensor regression,” in _Proc. Electr. Perform. Electron. Packag. Syst._ , 2020, pp. 1–3. * [38] Z. He and Z. Zhang, “High-dimensional uncertainty quantification via tensor regression with rank determination and adaptive sampling,” _accepted by IEEE Trans. Compon. Packag. Manuf. Technol., doi: 10.1109/TCPMT.2021.3093432_ , 2021. * [39] Z. He, W. Cui, C. Cui, T. Sherwood, and Z. Zhang, “Efficient uncertainty modeling for system design via mixed integer programming,” in _Proc. Intl. Conf. Computer Aided Design_ , 2019, pp. 1–8. * [40] C. Cui and Z. Zhang, “Stochastic collocation with non-Gaussian correlated process variations: Theory, algorithms, and applications,” _IEEE Trans. Compon. Packag. Manuf. Technol._ , vol. 9, no. 7, pp. 1362–1375, 2018. * [41] P. Manfredi, D. V. Ginste, D. De Zutter, and F. G. Canavero, “Stochastic modeling of nonlinear circuits via SPICE-compatible spectral equivalents,” _IEEE Trans. Circuits Syst. I, Reg. Papers_ , vol. 61, no. 7, pp. 2057–2065, 2014. * [42] M. Ahadi and S. Roy, “Sparse linear regression (SPLINER) approach for efficient multidimensional uncertainty quantification of high-speed circuits,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , vol. 35, no. 10, pp. 1640–1652, 2016. * [43] A. Kaintura, T. Dhaene, and D. Spina, “Review of polynomial chaos-based methods for uncertainty quantification in modern integrated circuits,” _Electronics_ , vol. 7, no. 3, p. 30, 2018. * [44] A. Waqas, P. Manfredi, and D. Melati, “Performance variability analysis of photonic circuits with many correlated parameters,” _J. Light. Technol._ , 2021. * [45] A. Waqas, D. Melati, P. Manfredi, and A. Melloni, “Stochastic process design kits for photonic circuits based on polynomial chaos augmented macro-modelling,” _Opt. Express_ , vol. 26, no. 5, pp. 5894–5907, 2018. * [46] T.-W. Weng, Z. Zhang, Z. Su, Y. Marzouk, A. Melloni, and L. Daniel, “Uncertainty quantification of silicon photonic devices with correlated and non-Gaussian random parameters,” _Opt. Express_ , vol. 23, no. 4, pp. 4242–4254, 2015. * [47] T.-W. Weng, D. Melati, A. Melloni, and L. Daniel, “Stochastic simulation and robust design optimization of integrated photonic filters,” _Nanophotonics_ , vol. 6, no. 1, pp. 299–308, 2017. * [48] C. Cui, K. Liu, and Z. Zhang, “Chance-constrained and yield-aware optimization of photonic ICs with non-Gaussian correlated process variations,” _IEEE Trans. Comput.-Aided Design Integr. Circuits Syst._ , 2020. * [49] A. Shapiro, D. Dentcheva, and A. Ruszczyński, _Lectures on stochastic programming: modeling and theory_. SIAM, 2014. * [50] A. Mesbah, S. Streif, R. Findeisen, and R. D. Braatz, “Stochastic nonlinear model predictive control with probabilistic constraints,” in _Proc. Am. Control Conf._ , 2014, pp. 2413–2419. * [51] M. P. Vitus, Z. Zhou, and C. J. Tomlin, “Stochastic control with uncertain parameters via chance constrained control,” _IEEE Trans. Autom. Control_ , vol. 61, no. 10, pp. 2892–2905, 2015. * [52] Z. Wang, C. Shen, F. Liu, X. Wu, C.-C. Liu, and F. Gao, “Chance-constrained economic dispatch with non-Gaussian correlated wind power uncertainty,” _IEEE Trans. Power Syst._ , vol. 32, no. 6, pp. 4880–4893, 2017. * [53] B. P. Van Parys, P. J. Goulart, and D. Kuhn, “Generalized Gauss inequalities via semidefinite programming,” _Math. Program._ , vol. 156, no. 1-2, pp. 271–302, 2016. * [54] C. Feng, F. Dabbene, and C. M. Lagoa, “A kinship function approach to robust and probabilistic optimization under polynomial uncertainty,” _IEEE Trans. Autom. Control_ , vol. 56, no. 7, pp. 1509–1523, 2010. * [55] G. C. Calafiore and L. El Ghaoui, “On distributionally robust chance-constrained linear programs,” _J. Optim. Theory Appl._ , vol. 130, no. 1, pp. 1–22, 2006. * [56] D. Henrion, J.-B. Lasserre, and J. Löfberg, “Gloptipoly 3: moments, optimization and semidefinite programming,” _Optim. Methods Softw._ , vol. 24, no. 4-5, pp. 761–779, 2009. * [57] G. H. Golub and J. H. Welsch, “Calculation of Gauss quadrature rules,” _Math. Comp._ , vol. 23, no. 106, pp. 221–230, 1969. * [58] T. Gerstner and M. Griebel, “Numerical integration using sparse grids,” _Numer. Algorithms_ , vol. 18, no. 3, pp. 209–232, 1998. * [59] J. Lofberg, “YALMIP : a toolbox for modeling and optimization in MATLAB,” in _Proc. Intl. Conf. Robot. Autom._ , 2004, pp. 284–289.
arxiv-papers
2021-07-27T04:42:41
2024-09-04T03:07:20.535696
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Zichang He, Zheng Zhang", "submitter": "Zichang He", "url": "https://arxiv.org/abs/2107.12593" }
2107.12600
# PiSLTRc: Position-informed Sign Language Transformer with Content-aware Convolution Pan Xie, Mengyi Zhao, Xiaohui Hu Pan Xie and Mengyi Zhao are with the School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China (e-mail: [email protected], [email protected]).Xiaohui Hu is with the Science and Technology on Integrated Information System Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing 100191, China (e-mail: [email protected]) ###### Abstract Since the superiority of Transformer in learning long-term dependency, the sign language Transformer model achieves remarkable progress in Sign Language Recognition (SLR) and Translation (SLT). However, there are several issues with the Transformer that prevent it from better sign language understanding. The first issue is that the self-attention mechanism learns sign video representation in a frame-wise manner, neglecting the temporal semantic structure of sign gestures. Secondly, the attention mechanism with absolute position encoding is direction and distance unaware, thus limiting its ability. To address these issues, we propose a new model architecture, namely PiSLTRc, with two distinctive characteristics: (i) content-aware and position- aware convolution layers. Specifically, we explicitly select relevant features using a novel content-aware neighborhood gathering method. Then we aggregate these features with position-informed temporal convolution layers, thus generating robust neighborhood-enhanced sign representation. (ii) injecting the relative position information to the attention mechanism in the encoder, decoder, and even encoder-decoder cross attention. Compared with the vanilla Transformer model, our model performs consistently better on three large-scale sign language benchmarks: PHOENIX-2014, PHOENIX-2014-T and CSL. Furthermore, extensive experiments demonstrate that the proposed method achieves state-of- the-art performance on translation quality with $+1.6$ BLEU improvements. ###### Index Terms: sign language recognition, sign language translation, content-aware neighborhood gathering, position-informed convolution, relative position encoding. ## I Introduction Sign language (SL) is a native language of people with disabled hearing. As a visual language, it consists of various hand gestures, movements, facial expressions, transitions, etc. Sign Language Recognition (SLR) and Translation (SLT) aim at converting the video-based sign languages into sign gloss sequences and spoken language sentences, respectively. Most previous works in this field focus on continuous SLR with the gloss supervision [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13], few attempts have been made for SLT [14, 15, 16, 17]. The main difference is that gloss labels are in the same order with sign gestures, and thus the gloss annotations significantly ease the syntactic alignment under the SLR methods. However, the word ordering rules in natural language are distinct from their counterparts in video-based sign languages [18]. Moreover, sign videos are composed of continuous sign gestures represented by sub-video clips without explicit boundaries. Therefore, directly learning the mapping between frame-wise signs and natural language words is challenging. To achieve better translation performance, a promising research line is to perform joint sign language recognition and translation model, which recognizing glosses and translating natural language sentences simultaneously [14, 15]. By doing so, learning with the glosses supervision can better understand sign videos and bring significant benefits to sign language translation. Along this line, Camgzet et al. [15] proposes a joint model, Sign Language Transformer (SLTR), which is based on vanilla Transformer [19]. They learn recognition and translation simultaneously and achieve state-of-the-art results due to the Transformer’s advantage in sequence modeling tasks. However, there are still some inherent flaws that limit the capabilities of the Transformer model when solving the SLR and SLT tasks: * (a) The self-attention mechanism aggregates temporal sign visual features in a frame-wise manner. This mechanism neglects the temporal structure of sign gestures represented by sub-videos, leading to substantial ambiguity in recognition and translation. * (b) The attention mechanism is permutation-insensitive. Thus position encoding is essential to inject position information for sequence learning, e.g., sign video learning and sentence learning. However, the absolute position encoding used in vanilla Sign Language Transformer (SLTR) [15] is demonstrated distance and direction unaware [20, 21], thus limit its ability for better performance. To remedy this first shortcoming (a), an intuitive idea is to gather neighboring temporal features to enhance the frame-wise sign representation. However, it is difficult to determine the boundaries of a sign gesture and select the surrounding neighbors precisely. In this paper, we propose a Content-aware and Position-aware Temporal Convolution (CPTcn) to learn robust sign representations. We first propose a content-aware neighborhood gathering method to adaptively select the surrounding neighbors. Specifically, we leverage the local consistency of sign gestures. That is to say, adjacent frames that belong to a sign gesture share similar semantics. Accordingly, we dynamically select neighboring features based on the similarities. Then we aggregate the selected features with temporal convolution layers. However, temporal convolution with a limited receptive field is insufficient to capture the position information of the features in the selected region [22]. To alleviate the drawback, we inject position awareness into convolution layers with Relative Position Encoding (RPE). By aggregating with neighboring similar features, our CPTcn module obtains discriminative sign representations, thus improving the recognition and translation results. To solve the second issue (b), we inject relative position information into the learning of sign videos and target sentences. Furthermore, we consider the relative position between sign frames and target words. To the best of our knowledge, we are the first trying to model the position relationship between source sequence and target sequence in sequence-to-sequence architectures. There are several existing methods to endow the self-attention mechanism with relative position information [20, 23, 24, 25, 26]. In this paper, we adopt the Disentangled Relative Position Encoding (DRPE) [24] in our video-based sign language learning, target sentence learning, and their mapping learning. Note that, different from RPE mentioned above, DRPE contains the correlations between relative position and sign features, which is proven effective to bring improvements [24, 27]. With the distance and direction awareness learning from DRPE, our improved Transformer model learns better feature representations, thus gaining significant improvements. We call our approach PiSLTRc for ”Position-informed Sign Language TRansformer with content-aware convolution”. The overview of our model can be seen in Figure 1. The main technical contributions of our work are summarized as follows: * 1) We propose a content-aware and position-aware CPTcn module to learn neighborhood-enhanced sign features. Specifically, We first introduce a novel neighborhood gathering method based on the semantic similarities. Then we aggregate the selected features with position-informed temporal convolution layers. * 2) We endow the Transformer model with relative position information. Compared with absolute position encoding, relative position encoding performs better for sign video and natural sentence learning. Furthermore, we are the first to consider the relative position relationship between sign frames and target words. * 3) Equipped with the proposed two techniques, our model achieves state-of-the-art performance in translation accuracy on the largest public dataset RWTH- PHOENIX-Weather 2014T. Also, we obtain significant improvements in recognition accuracy compared with other RGB-based models on both PHOENIX-2014 and PHOENIX-2014-T dataset. The remainder of this paper is organized as follows. Section II reviews related works in sign language and position encoding. Section III introduces the architecture of our proposed PiSLTRc model. Section IV provides implementation details on our model, presents a quantitative analysis that provides some intuition as to why our proposed techniques work, and finally presents the experimental results compared with several baseline models. Figure 1: The overview of our sign language Transformer model equipped with Content-aware and Position-aware Temporal Convolution (CPTcn) and Disentangled Relative Position Encoding (DRPE). ## II Related Work ### II-A Sign Language Recognition Most previous sign language works focus on continuous sign language recognition (cSLR), which is a weakly supervised sequence labeling problem [2]. cSLR aims at transcribing video-based sign language into gloss sequence. With the released of larger-scale cSLR datasets [28], numerous researches burst out implementing sign language recognition tasks in an end-to-end manner [1, 2, 3, 6, 4, 5, 7, 8, 9, 10, 11, 12, 13]. The gloss annotations are in same order with sign language, this monotonic relationship significantly ease the syntactic alignment with the cSLR methods. However, the relationship between gloss sequences and the spoken natural language is non-monotonic. Thus it is infeasible to realize SLT with cSLR methods. Fortunately, the knowledge learned by cSLR can be transferred to SLT models and facilitate their performance. ### II-B Sign Language Translation Sign language Translation (SLT) is much more challenging because the alignment learning of frame-wise sign gestures and natural language words is difficult. Camgz et al. [14] first introduce an end-to-end SLT model that uses Convolution Neural Networks (CNNs) backbone to capture spatial feature and utilizes attention-based encoder-decoder model [29] to learn the mapping of sign videos and natural language sentences. Based on this work, Camgz et al. [15] replace the sequence-to-sequence structure with Transformer architecture [19] which is the state-to-the-art model in Neural Machine Translation (NMT) area. Furthermore, they jointly learn the sign language recognition and translation with a shared Transformer encoder and demonstrate that joint training provides significant benefits. Our work is built upon their joint sign language Transformer model, where we improve the Transformer with our proposed CPTcn module and endow the Transformer model with relative position information. ### II-C Position Encoding in Convolution Temporal convolution neural network is a common method to model sequential information [30, 31, 32, 33]. Convolution layer is demonstrated implicitly to learn absolute position information from the commonly used padding operation [22]. However, it is insufficient to learn powerful representations that encode sequential information, especially with the limited receptive field. Explicitly encoding absolute position information is shown effective to learn image features [22]. Upon their hypothesis, we apply relative position encoding (RPE) to the temporal convolution layers, aiming to model the positional correlations between the current feature and its surrounding neighbors. ### II-D Position Encoding in Self-attention Transformer entirely relies on the attention mechanism, which does not explicitly model the position information. To remedy the drawback, the sinusoidal absolute position encoding [19] and learnable absolute position encoding [34] are proposed to endow their model with position information. Afterward, relative position encoding is proposed to model long sequence [27] and provides the model with relation awareness [21, 20]. In our work, we reuse the disentangled position encoding [24] to exploit the distance and direction awareness with relative position encoding. Moreover, we also explore the position relationship between sign video and target sentence. Note that, different from RPE in convolution, DRPE in attention mechanism considers the relationship between content and position feature, which is demonstrated effective in previous works [27, 24]. Our experiments indicated that the relative position information is vital for sequence-to-sequence mapping learning. Figure 2: Vanilla self-attention and self-attention equipped with Content- aware and Position-aware Temporal Convolution (CPTcn). Where neighborhood gathering denotes selecting adjacent relevant features in a contiguous local region, TCNs denote stacked temporal convolution layers. ## III Method ### III-A Preliminaries and Model Overview Figure 1 illustrates the overall architecture of our proposed model, which jointly learns to recognize and translate sign videos into gloss annotations and spoken language sentences. In the following subsections, we will first revisit the sign language Transformer structure and then give detailed descriptions about our proposed two methods: content-aware and position-aware temporal convolution (CPTcn), and self-attention with disentangled relative position encoding (DRPE). ### III-B Joint Sign Language Transformer Structure Given a series of video frames, the vanilla sign language Transformer (SLTR) model firstly adopts a CNN backbone to extract frame-wise spatial features and uses a word embedding to transfer one-hot natural language words into dense vectors. Then a Transformer-based encoder-decoder model is utilized to learn SLR and SLT simultaneously. For SLR, the encoder output learned temporal sign features. A Connectionist Temporal Classification (CTC) [35] loss is applied to learn the mapping of gloss annotations and sign features. For SLT, the decoder output decomposes sequence level conditional probabilities in an autoregressive manner and then calculates the cross-entropy loss for each word. Meanwhile, the learning of SLR and SLT share the Transformer encoder. Vanilla Transformer is a sequence-to-sequence structure, which consists of several Transformer blocks. Each block contains a multi-head self-attention and a fully feed-forward network. Given a feature sequence $F\in R^{M\times d}$ with $M$ frames, taking single-head attention as an example, the standard self-attention can be formulated as: $\displaystyle Q=FW_{\\_}q,K=FW_{\\_}k,V=FW_{\\_}v,$ (1) $\displaystyle S=QK^{T},$ $\displaystyle\text{Attn}(Q,K,V)=\textup{softmax}(\dfrac{S}{\sqrt{d}})V,$ $\displaystyle a_{\\_}{ij}=\dfrac{exp(s_{\\_}{ij}/\sqrt{d})}{\sum_{\\_}{j^{\prime}}exp(s_{\\_}{ij^{\prime}}/\sqrt{d})}$ where $W_{\\_}q,W_{\\_}k,W_{\\_}v\in R^{d\times d}$ represents projection matrices. $S\in R^{M\times M}$ represents the similarity computed by query $Q\in R^{M\times d}$ and key $K\in R^{M\times d}$. $a_{\\_}{ij}$ represent the normalized attention weights respectively. Our work concentrates on improving the self-attention mechanism to understand sign video and target sentences better. To focus on our main contributions, we omit the detailed architecture and refer readers to [19] for reference. ### III-C Content-aware and Position-aware Temporal Convolution As shown in Figure 2, we propose content-aware and position-aware temporal convolution (CPTcn) to learn local temporal semantics, aiming at obtaining more discriminative sign representations. In this section, we first introduce a content-aware neighborhood gathering method, which adaptively selects surrounding neighbors. Secondly, we elaborate on the detail of endowing the temporal convolution with relative position information, which models the relationship between surrounding features and the current feature. Finally, we incorporate the proposed CPTcn module with the self-attention mechanism. Figure 3: Our proposed content-aware neighborhood gathering method, compared with the centered neighborhood gathering method. #### III-C1 Content-aware neighborhood gathering Method In sign videos, we observe that each sign gesture usually lasts about 0.5$\sim$0.6 seconds ($\sim$16 frames). However, the vanilla Sign Language Transformer (SLTR) model aggregates sign features in a frame-wise manner, thus neglecting the local temporal structure of sign gestures. Unlike their work, we develop a content-aware neighborhood gathering method to adaptively select the relevant surrounding features, which are around a specific feature and in a contiguous region. Shown as Figure 3, we obtain the clip-level feature with neighboring features via three steps: 1). Given the sequential representations $F=\\{f_{\\_}1,f_{\\_}2,...,f_{\\_}M\\}$ from the CNN backbone model, we apply outer tensor product to get a similarity matrix $s\in R^{M\times M}$: $\displaystyle s=\frac{FF^{T}}{\sqrt{d}}$ (2) where the diagonal elements in $s$ represent similarities towards the features themselves. 2). To ensure neighbors are going to be selected instead of the far-away ones, we only consider a range $[t-l,t+l]$ for a specific feature $f_{\\_}t\in{R^{d}}$ to keep local semantic consistency. Then we replace the similarity scores with -inf outside this range and at the current feature. Mathematically, the selecting criterion for $f_{\\_}t$ becomes as: $\displaystyle s_{\\_}{t,j}=\begin{cases}s_{\\_}{t,j},&\text{$j\in[\max(0,t-l),t)$ \& $(t,\min(t+l,M)]$}\\\ -inf,&\text{others}\end{cases}$ (3) where $l$ represents the maximum distance among the considering features from the current feature. Then we apply the softmax function to obtain the masked distribution $d^{t}\in R^{M}$ in the local region around the current feature $f_{\\_}t$: $d_{\\_}{t}=\text{softmax}(s_{\\_}{t})$ (4) Note that the weight at the current feature is zero, thus the summation of the weights before and after the current feature is 1. 3). It is hard to determine the size and boundaries of the local region. Fortunately, the normalized distribution of similarities obtained in Equation 4 indicates the location of similar neighbors. Therefore, we use the weights of the normalized distribution before and after the current feature to adaptively determine the size of the selected region. Respectively, we define the size before and after the current feature with $l_{\\_}{-}$ and $l_{\\_}{+}$: $\displaystyle l_{\\_}{-}=\gamma\sum d_{\\_}{t,j}\cdot l$ $\displaystyle,\quad\text{$\max(0,t-l)\leq j<t$}$ (5) $\displaystyle l_{\\_}{+}=\gamma\sum d_{\\_}{t,j}\cdot l$ $\displaystyle,\quad\text{$t<j\leq\min(t+l,M)$}$ $\displaystyle l_{\\_}r=l_{\\_}{-}$ $\displaystyle+l_{\\_}{+}=\gamma\cdot l$ where $\gamma$ is a hyperparameter to control the size of selected region, and the size of the region is $l_{\\_}r$. We define the final selected contiguous region as $LSR_{\\_}t$ (Locally Similar Region) for a specific feature ${f_{\\_}t}$: $\displaystyle\text{LSR}_{\\_}t=\\{f_{\\_}{t-l_{\\_}{-}},..,f_{\\_}t,...,f_{\\_}{t+l_{\\_}{+}}\\}$ (6) Finally, we adaptively obtain the clip-level features which are in a contiguous local region: $\displaystyle f_{\\_}{t}^{r}=\mathcal{F}_{\\_}{CNG}(f_{\\_}t,LSR_{\\_}t)$ (7) where $\mathcal{F}_{\\_}{CNG}$ denotes the content-aware neighborhood gathering method, and $f_{\\_}t^{r}\in R^{l_{\\_}r\times d}$ denotes the current feature $f_{\\_}t$ with its $l_{\\_}r$ surrounding neighbors. The clip-level features with temporal surrounding neighbors can be computed using Algorithm 1. Algorithm 1 Content-aware neighborhood gathering Method. 1:Frame-wise spatial feature $F\in R^{M\times d}$ from CNN backbone; 2:Clip-level features $F^{r}\in R^{M\times l_{\\_}r\times d}$; 3:$s=\frac{1}{\sqrt{d}}ff^{T}$; 4:$s=\text{localmask}(s,l-1,-\text{inf})$; 5:$s=\text{diagonalmask}(s,-\text{inf})$; 6:$a=\text{softmax}(s,\text{dim}=-1)$; 7:$F^{r}=[]$ 8:for $t=0,...,M-1$ do 9: $l_{\\_}{-}=sum(a[max(0,t-l):t])*l*\gamma$ 10: $l_{\\_}{+}=sum(a[t,t+1:min(t+l,M)])*l*\gamma$ 11: $\text{inds}=[t-l_{\\_}{-},..,t,..,t+l_{\\_}{+}]$ 12: $\text{neighbors}=\text{indexselect}(f_{\\_}{t},\text{inds})$ 13: $F^{r}\text{ append neighbors}$ 14:end for 15:$\text{concatenate}(F^{r},\text{dim}=0)$ 16:return $F^{r}$; #### III-C2 Position-aware Temporal Convolution Temporal convolution is a common method to aggregate sequential features. However, convolution layers with a limited receptive field are insufficient to capture the position information [22], which is important for sign gesture understanding. More specifically, the recognition of sign language is sensitive to the frame order. Absolute position encoding used in previous methods [15, 16] is a promising approach to encode position information. However, it is demonstrated direction- and distance-unaware [21]. Inspired by recent work on language modelling [25], we infuse relative position information to the clip-level feature. We first compute the relative position matrix $R\in R^{M\times l_{\\_}r}$ between the frame-wise feature and the current feature: $\displaystyle R_{\\_}{t,p}=p-t,\quad\text{$t\in[0,M-1]$, $p\in(t-l_{\\_}{-},t+l_{\\_}{+}]$}.$ (8) Then we represent the relative position indices in learnable embedding space, and obtain the position embeddings $\Phi_{\\_}{rpe}\in R^{M\times l_{\\_}r\times d}$. Adding $\Phi_{\\_}{rpe}$ to clip-level features $F^{r}$, resulting in position-informed clip-level representation: $\displaystyle\hat{F^{r}}=F^{r}+\Phi_{\\_}{rpe}.$ (9) Lastly, we aggregate the clip-level features with position information to compressed features $F_{\\_}{ag}\in R^{M\times d}$, and apply a residual function: $\displaystyle F_{\\_}{ag}=\text{MaxPool}(\text{Relu}(\text{LN}(\text{Conv1d}(\hat{F^{r}}))))+F$ (10) where LN represents the Layer Normalization [36]. Conv1d(·) performs a 1-D convolution filter on time dimension with Relu(·) activation function. As shown in Figure 2, we use two layers of such a network, which is omitted here for readability. #### III-C3 Self-attention with CPTcn Similar to the vanilla Transformer model, we feed the aggregated feature $F_{\\_}{ag}$ to the self-attention mechanism. Note that, as shown in Figure 2, we only set $K=V=F_{\\_}{ag}$, and keep $Q$ as original frame-wise representation $F$. The reason for this design is to maintain the difference within adjacent features in $Q$. Experimental result demonstrates that this network design performs better than $Q=K=V=F_{\\_}{ag}$. ### III-D Self-Attention with DRPE As shown in Figure 1, we further inject relative position information into the attention mechanism for sign video learning, target sentence learning, and mapping learning between them. Most existing approaches for endowing the attention mechanism relative position information are based on pairwise distance [20]. They have been explored in machine translation [20], music generation [37] and language modelling [23, 24]. Here, we propose a disentangled relative position encoding (DRPE) [24]. Different from RPE used in Section III-C2, DRPE considers the correlations between relative positions and content features, which are proven that improving the performance [24, 27]. Specifically, we separate the content features and relative position encoding to compute attention weights. The first line of projection in Equation 1 is reparameterized as: $\displaystyle Q_{\\_}f=FW_{\\_}{q,c},K_{\\_}f=FW_{\\_}{k,c},V_{\\_}f=FW_{\\_}{v,c}$ (11) $\displaystyle Q_{\\_}p=PW_{\\_}{q,p},K_{\\_}p=PW_{\\_}{k,p}$ where $F\in R^{M\times d}$ represent the content feature. $Q_{\\_}f,K_{\\_}f,V_{\\_}f\in R^{M\times d}$ represent query, key and value content vectors which are obtained with projection matrices $W_{\\_}{q,c},W_{\\_}{k,c},W_{\\_}{v,c}\in R^{d\times d}$. $P\in R^{2\mathcal{L}\times d}$ represents created learned relative position embedding, where $\mathcal{L}$ is the max relative distance. $Q_{\\_}p,K_{\\_}p\in R^{2\mathcal{L}\times d}$ represent the projected position embedding with projection matrices $W_{\\_}{q,p},W_{\\_}{k,p}\in R^{d\times d}$, respectively. Following this, we generate the attention weights with the relative position bias. The calculation of pairwise content-content is in the same way as standard self-attention, thereby generating the content-based content vector. While the calculation of pairwise content-position is different from standard self-attention. We first create a relative position distance matrix $R^{rel}\in R^{M\times M}$, and then generate the position-based content vectors. The $2\sim 4$ lines of computing attention weights in Equation 1 are reparameterized as: $\displaystyle s_{\\_}{i,j}^{rel}=$ $\displaystyle\\{Q_{\\_}{f,i},{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}}\\}\times\\{K_{\\_}{f,j},{\color[rgb]{0,0,1}K_{\\_}pR^{rel}_{\\_}{j-i}}\\}^{T}$ (12) $\displaystyle=$ $\displaystyle\begin{matrix}\underbrace{Q_{\\_}{f,i}K_{\\_}{f,j}^{T}}\\\ \textit{c2c}\end{matrix}+\begin{matrix}\underbrace{Q_{\\_}{f,i}{\color[rgb]{0,0,1}{K_{\\_}p}^{T}{R^{rel}_{\\_}{j-i}}^{T}}}\\\ \textit{c2p}\end{matrix}+\begin{matrix}\underbrace{{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}}K_{\\_}{f,j}^{T}}\\\ \textit{p2c}\end{matrix}+$ $\displaystyle\begin{matrix}\underbrace{{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{i-j}{K_{\\_}p}^{T}{R^{rel}_{\\_}{j-i}}^{T}}}\\\ \textit{p2p}\end{matrix}$ $\displaystyle\textup{Attn}($ $\displaystyle Q_{\\_}f,K_{\\_}f,V_{\\_}f,{\color[rgb]{0,0,1}Q_{\\_}pR^{rel}_{\\_}{q-k}},{\color[rgb]{0,0,1}K_{\\_}pR^{rel}_{\\_}{k-q}})=\textup{softmax}(\dfrac{S^{rel}}{\sqrt{4d}})V_{\\_}f,$ $\displaystyle a_{\\_}{ij}=$ $\displaystyle\dfrac{exp(s^{rel}_{\\_}{ij}/\sqrt{4d})}{\sum_{\\_}{j^{\prime}}exp(s^{rel}_{\\_}{ij^{\prime}}/\sqrt{4d})}$ where $S^{rel}\in R^{M\times M}$ represents the unnormalized attention score matrix and $s^{rel}_{\\_}{ij}$ represents the score computed by query at position $i$ and key at the position $j$. $R^{rel}_{\\_}{q-k}\in R^{M\times M}$ represents the relative distance matrix computed by the positions of query and key. $R^{rel}_{\\_}{i-j}$ lies in the $(i,j)$-th of $R^{rel}_{\\_}{q-k}$, and represents the relative distance between $i$-th query and $j$-th key. $R^{rel}_{\\_}{k-q}\in R^{M\times M}$ and $R^{rel}_{\\_}{j-i}$ are computed in similar ways. Note that $R^{rel}_{\\_}{i-j}$ and $R^{rel}_{\\_}{j-i}$ are opposite numbers thus providing our model with directional information. Moreover, in the first line of the above equation, the first item $c2c$ represents content-to-content which is the content-based content vectors. The second and third item $c2p$ and $p2c$ represent content-to-position and position-to-content respectively, which are relative position based content vectors. $p2p$ represents position-to-position which is omitted in vanilla DRPE [24]. However, in our experiments, we find that $p2p$ bring improvements to our performance in both recognition and translation. Therefore, we keep this item of position-to-position. In Section IV-C3, we analyze the impact of different item in the first line of Equation 12. Preceding this, in the last two lines, we apply softmax function and scaling factor $\frac{1}{\sqrt{4d}}$ to get normalized scaled attention weights. Totally, there are two differences between the DRPE method applied in our architecture and DeBERTa [24]. The first is that we consider the position-to- position information, which is omitted in DeBERTa. Experimental results in Table V show the effectiveness of this item. The second difference is that DRPE is used in text-only in DeBERTa for language modeling. However, in our proposed model, as seen in Figure 1, we apply the relative position method in text-only target sentence learning, image-only sign video learning, and even the cross-modal video sequence and target sentence interaction. Experimental results in Table IV show the effectiveness of our improvements. Note that we are the first to consider the relative position relationship between sign frames and target words. In summary, equipping with the CPTcn module and DRPE in self-attention layers, the heart module in the Transformer model, we finally arrive at our proposed PiSLTRc model. ## IV Experiments ### IV-A Dataset and Metrics We evaluate our method on three datasets, including PHOENIX-2014 [28], PHOENIX-2014-T [14] and Chinese Sign Language (CSL)[38]. PHOENIX-2014 is a publicly available German Sign Language dataset, which is the most popular benchmark for continuous SLR. The corpus was recorded from broadcast news about weather. It contains videos of 9 different signers with a vocabulary size of 1295. The split of videos for Train, Dev, and Test is 5672, 540, and 629, respectively. PHOENIX-2014-T is the benchmark dataset of sign language recognition and translation. It is an extension of the PHOENIX14 dataset [28]. Parallel sign language videos, gloss annotations, and spoken language translations are available in PHOENIX14T, which makes it feasible to learn SLR and SLT tasks jointly. The corpus is curated from a public television broadcast in Germany, where all signers wear dark clothes and perform sign language in front of a clean background. Specifically, the corpus contains 7096 training samples (with 1066 different sign glosses in gloss annotations and 2887 words in German spoken language translations), 519 validation samples, and 642 test samples. CSL is a Chinese Sign Language dataset, which is also a widely used benchmark for continuous SLR. These videos were recorded in a laboratory environment, using a Microsoft Kinect camera with a resolution of 1280 × 720 and a frame rate of 30 FPS. In this corpus, there are 100 sentences, and each sentence is signed five times by 50 signers (in total 2,500 videos). As no official split is provided, we split the dataset by ourselves. We give 20,000 and 5,000 samples to the training set and testing set, respectively. When splitting the dataset, we ensure that the sentences in the training and testing sets are the same, but the signers are different. We evaluate our model on the performance of SLR and SLT as following [14]: Sign2gloss aims to transcribe sign language videos to sign glosses. It is evaluated using word error rate (WER), which is a widely used metric for cSLR: $\displaystyle\text{WER}=\dfrac{\\#\text{substitution}+\\#\text{deletion}+\\#\text{insertion}}{\\#\text{words in reference}}$ (13) Sign2text aims to directly translate sign language videos to spoken language translation without intermediary representation. It is evaluated using BLEU [39] which is widely used for machine translation. Sign2(gloss+text) aims to jointly learn continuous SLR and SLT simultaneously. This approach is currently state-of-the-art in the performance of SLT since the training of cSLR brings benefits for sign video understanding, thus improving the performance of translation. ### IV-B Implementation and Evaluation Details #### IV-B1 Network Details Like Camgz et al. [15], we extract frame-wise spatial sign features with CNN backbone from CNN-LSTM-HMM [2]. Then we apply the improved Transformer network to learn SLR and SLT simultaneously. Its setting used in our experiments is based on Camgz et al. [15]. Specifically, we use 512 hidden units, 8 heads, 6 layers, and 0.1 dropout rate. In our proposed CPTcn model, the size of the select contiguous local similar region $l_{\\_}r$ is set to be 16 (about 0.5-0.6 seconds), which is the average time needed for completing a gloss. We analyze the impact of the size in Section IV-C1. The setting of two temporal convolution layers is F3-S1-P0-F3-S1-P0, where F, S, P denote the kernel filter size, stride, and padding size, respectively. The analysis of different modules of the position-informed convolution is concluded in Section IV-C2. In the self-attention and cross-attention mechanism, we apply DRPE to inject relative position information. We set the max relative distance $\mathcal{L}$ to be 32 in our experiments. The analysis of the DRPE is conduct in Section IV-C3. Besides, we train the SLR and SLT simultaneously. Thus we set $\lambda_{\\_}R$ and $\lambda_{\\_}T$ as the weight of recognition loss and translation loss. #### IV-B2 Training We use the Adam optimizer [40] to optimize our model. We adopt the warmup schedule for learning rate that increases the learning rate from 0 to 6.8e-4 within the first 4000 warmup steps and gradually decay it with respect to the inverse square root of training steps. We train the model on 1 NVIDIA TITAN RTX GPU, and use 5 checkpoints averaging for the final results. #### IV-B3 Decoding During inference, we adopt CTC beam search decoder with a beam size of 5 for SLR decoding. Meanwhile, we also utilize the beam search with the width of 5 for SLT decoding, and we apply a length penalty [41] with $\alpha$ values ranging from 0 to 2. ### IV-C Ablation Study TABLE I: Evaluation of different neighborhood gathering method on PHOENIX-2014-T. ”NG” is the abbreviation of neighborhood gathering. NG method | SLR(WER) | SLT(BLEU-4) ---|---|--- DEV | TEST | DEV | TEST w/o NG | 24.23 | 24.92 | 20.54 | 20.80 Centered NG ($l_{\\_}r=16$) | 23.64 | 24.17 | 20.73 | 21.23 Sparse NG ($l_{\\_}r=16$) | 23.06 | 23.52 | 21.83 | 22.08 Content-aware NG ($l_{\\_}r=16$) | 22.23 | 23.01 | 23.17 | 23.40 TABLE II: Evaluation of the size of the selected local similar region on PHOENIX-2014-T. Size of LSR | SLR(WER) | SLT(BLEU-4) ---|---|--- DEV | TEST | DEV | TEST $l_{\\_}r=8$ | 22.85 | 23.85 | 22.30 | 22.99 $l_{\\_}r=12$ | 22.52 | 23.62 | 22.31 | 23.51 $l_{\\_}r=16$ | 22.23 | 23.01 | 23.17 | 23.40 $l_{\\_}r=20$ | 23.02 | 23.74 | 22.85 | 22.86 #### IV-C1 Analysis of content-aware neighborhood gathering method In our proposed CPTcn module, we introduce a content-aware neighborhood gathering method to select the relevant surrounding neighbors dynamically. Three potential concerns with using this method are: 1) How many improvements does the content-aware method bring? 2) Must be the selected features contiguous in position? 3) What is the appropriate size of the selected region? In Table I, we compared three methods to verify the first two questions: the essential of whether the selected region is content-aware and contiguous. For notation, w/o NG means no neighborhood gathering method. Centered NG means directly to select k features centered around the current feature. Sparse NG means dynamically selecting k features with the highest similarity, which may be discontinuous in position. Content-aware NG means to select k contiguous features adaptively based on similarity using our proposed content-aware segmentation method. We can see those neighborhood gathering methods effectively improve the performance. Sparse NG substantially outperforms Centered NG. This gap suggests that the content-aware method is critical for feature selecting. Moreover, Content-aware NG performs better than other methods. This indicates that our content-aware contiguous feature aggregation is more suitable for capturing sign gesture representation. In Table II, we explore the appropriate size of the select local similar region (LSR). The performance of our model performs best when the size of LSR is 16. This is consistent with the finding that the 16-frame (about 0.5-0.6 seconds) is the average time needed for completing a gloss. Besides, by gathering the larger width regions (for example, 20 frames), we observed slight performance degradation. This is because 20 frames (about 1 second) usually contain more than one gesture and thus lower the performance. TABLE III: Evaluation of different model in CPTcn module on PHOENIX-2014-T. ”PE” denotes position encoding. ”APE” denotes absolute position encoding. module in CPTcn | SLR (WER) | SLT (BLEU-4) ---|---|--- DEV | TEST | DEV | TEST w/o PE | 23.44 | 24.03 | 21.15 | 21.47 w/ APE | 22.89 | 23.47 | 21.89 | 22.18 w/ RPE | 22.23 | 23.01 | 23.17 | 23.40 w/o Redisual | 24.19 | 25.31 | 20.78 | 20.36 w/o LN | 23.01 | 23.72 | 21.99 | 21.57 CPTcn | 22.23 | 23.01 | 23.17 | 23.40 #### IV-C2 Analysis of position-aware Temporal Convolution In the first two lines in Table III, we study the relative position encoding in the CPTcn module. Experimental results show that position information is crucial for aggregating the sequential features. Furthermore, compared with absolute position encoding (APE), relative position encoding (RPE) bring improvements with $+1.22$ BLEU scores and $-0.46\%$ WER score on the test dataset. The result supports the conjecture of Yan et. al. [21] that RPE provides direction and distance awareness for sequence modeling compared with APE method. Moreover, we explore the network design of the temporal feature aggregator method in the $3\sim 4$ lines in Table III. Experiments show that residual connection is essential. And Layer normalization is effective for sequential feature modeling. Figure 4: Qualitative recognition results of our proposed modules from Dev set (D: delete, I: insert, S: substitute). #### IV-C3 Analysis of DRPE in self-attention We further conduct comparative experiments to analyze the effectiveness of disentangle relative position encoding (DRPE) in the attention mechanism. As shown in Figure 1, we replace absolute position encoding (APE) with DRPE in three places: encoder self-attention, decoder self-attention, and encoder- decoder cross attention. For notation, in Table IV, ”Enc-SA” means self- attention in the encoder module. ”Dec-SA” means self-attention in the decoder module. ”Enc-Dec-CA” means cross attention between encoder and decoder. In the $1\sim 4$ lines of Table IV, we can see that the DRPE method used in the encoder and decoder all brings significant improvements. This further demonstrates that relative position encoding provides the direction and distance awareness for sequence representation learning. In addition, we find that the performance of DRPE used only in the encoder is better than that of DRPE used only in the decoder. This phenomenon suggests that direction and distance information are more critical for sign video learning than sentence representation learning. TABLE IV: Analysis of DRPE in encoder self-attention and decoder self- attention.”SA” is the abbreviation of self-attention. ”CA” means the cross- attention of encoder-decoder. Method | SLR (WER) | SLT (BLEU-4) ---|---|--- DEV | TEST | DEV | TEST w/ APE | 25.36 | 25.27 | 20.12 | 20.39 Enc-SA w/ DRPE | 22.89 | 23.76 | 22.35 | 22.47 Dec-SA w/ DRPE | 23.29 | 23.84 | 21.89 | 21.27 Enc-SA & Dec-SA w/ DRPE | 22.54 | 22.89 | 22.78 | 22.90 Enc-Dec-CA w/ DRPE | 23.74 | 23.93 | 21.59 | 21.41 All w/ DRPE | 22.23 | 23.01 | 23.17 | 23.40 TABLE V: Analysis of different item in DRPE. ”c2c” denotes content-to-content, ”c2p” denotes content-to-position, ”p2c” denotes position-to-content, and ”p2p” denotes position-to-position. Item in DRPE | SLR (WER) | SLT (BLEU-4) ---|---|--- DEV | TEST | DEV | TEST c2c only | 25.79 | 25.85 | 20.03 | 20.18 \+ c2p & p2c | 22.57 | 23.26 | 22.84 | 22.79 \+ p2p | 22.23 | 23.01 | 23.17 | 23.40 As we move to the fourth line in Table IV, the results show that DRPE in encoder-decoder attention also increases the performance. This phenomenon shows that even if the order of the word in the natural language is inconsistent with the sign language gloss, the relative position information still benefits their mapping learning. Different from DRPE used in DeBERTa [24], we further explore the effectiveness of different items mentioned in Equation 12 in our task. Experimental results are shown in Table V, the correlations between content and position feature bring significant improvement. Moreover, the position-to-position item also benefits our model. This result is consistent with the conclusion in Ke et al. [26]. Accordingly, we adopt these four items in our disentangled relative position encoding. TABLE VI: Qualitative results with different methods on SLT task. GT: | in der nacht sinken die temperaturen auf vierzehn bis sieben grad . ---|--- | (at night the temperatures drop to fourteen to seven degrees .) SLTR: | heute nacht werte zwischen sieben und sieben grad . | (tonight values between seven and seven degrees .) PiSLTRc: | heute nacht kühlt es ab auf vierzehn bis sieben grad . | (tonight it’s cooling down to fourteen to seven degrees .) GT: | an der saar heute nacht milde sechzehn an der elbe teilweise nur acht grad . | (on the saar tonight a mild sixteen on the elbe sometimes only eight degrees .) SLTR: | südlich der donau morgen nur zwölf am oberrhein bis zu acht grad . | (south of the danube tomorrow only twelve on the upper rhine up to eight degrees .) PiSLTRc: | am oberrhein heute nacht bis zwölf am niederrhein nur kühle acht grad . | (on the upper rhine tonight until twelve on the lower rhine only a cool eight degrees .) GT: | am tag von schleswig holstein bis nach vorpommern und zunächst auch in brandenburg gebietsweise länger andauernder regen . | (In the south, denser clouds sometimes appear, otherwise it is partly clear or only slightly cloudy .) SLTR: | am mittwoch in schleswig holstein nicht viel regen . | (not much rain on wednesday in schleswig holstein .) PiSLTRc: | am donnerstag erreicht uns dann morgen den ganzen tag über brandenburg bis zum teil dauerregen . | (on thursday we will reach us tomorrow the whole day over brandenburg until partly constant rain.) GT: | im süden gibt es zu beginn der nacht noch wolken die hier und da auch noch ein paar tropfen fallen lassen sonst ist es meist klar oder nur locker bewölkt . | (In the south there are still clouds at the beginning of the night that drop a few drops here and there, otherwise it is mostly clear or only slightly cloudy .) SLTR: | im süden tauchen im süden teilweise dichtere wolken auf sonst ist es verbreitet klar . | (in the south there are sometimes denser clouds in the south otherwise it is widely clear .) PiSLTRc: | im süden tauchen auch mal dichtere wolken auf sonst ist es gebietsweise klar oder nur locker bewölkt . | (In the south, denser clouds sometimes appear, otherwise it is partly clear or only slightly cloudy .) TABLE VII: The evaluation results on sign2gloss task on PHOENIX-2014-T dataset. sign2gloss | DEV | TEST ---|---|--- Model | del/ins | WER | del/ins | WER DNF [6] | 5.9/3.0 | 22.7 | 6.8/2.9 | 23.4 CNN+LSTM+HMM [2] | - | 24.5 | - | 26.5 SLTR-R [15] | - | 24.9 | - | 24.6 FCN [10] | 6.5/3.2 | 22.9 | 5.8/4.7 | 23.7 STMC (RGB) [12] | - | 25.0 | - | - PiSLTRc-R (ours) | 4.9/4.2 | 21.8 | 5.1/4.4 | 22.9 TABLE VIII: The evaluation results on sign2gloss task on PHOENIX-2014 dataset. sign2gloss | DEV | TEST ---|---|--- Model | del/ins | WER | del/ins | WER DeepHand [1] | 16.3/4.6 | 47.1 | 15.2/4.6 | 45.1 DeepSign [42] | 12.6/5.1 | 38.3 | 11.1/5.7 | 38.8 SubUNets [11] | 14.6/4.0 | 40.8 | 14.3/4.0 | 40.7 Staged-Opt [3] | 13.7/7.3 | 39.4 | 12.2/7.5 | 38.7 Re-Sign [43] | - | 27.1 | - | 26.8 DNF [6] | 7.8/3.5 | 23.8 | 7.8/3.4 | 24.4 CNN-LSTM-HMM [2] | - | 26.0 | - | 26.0 FCN [10] | - | 23.7 | - | 23.9 STMC (RGB) [12] | - | 25.0 | - | - SBD-RL [44] | 9.9/5.6 | 28.6 | 8.9/5.1 | 28.6 SLTR-R(our implementation) | 8.9/4.2 | 24.5 | 9.0/4.3 | 24.6 PiSLTRc-R (ours) | 8.1/3.4 | 23.4 | 7.6/3.3 | 23.2 #### IV-C4 Qualitative Analysis on SLR In Figure 4, we show two examples with different methods on the SLR task. Equipped with proposed approaches, our PiSLTRc model learns accurate sign gesture recognition and thus achieving significant improvements. Furthermore, we find that the model trained based on CTC loss function tends to predict ”peak” on the continuous gestures. And our proposed CPTcn model is adequate to alleviate this situation. As shown in Figure 4, the recognition of adjacent frames in a contiguous region is more precise. #### IV-C5 Qualitative Analysis on SLT In Table VI, we show several examples with different models on the SLT task. Compared with the vanilla SLTR model [15], our proposed PiSLTRc produces target sentences with higher quality and accuracy. Comparing the translation results of the first example as illustrated in Table VI, we see that ”vierzehn (fourteen)” is mistranslated as ”sieben (seven)” in SLRT model. However, it is correctly translated in our PiSLTRc model. As we move to the second example in this table, we see that ”heute nacht (tonight)” is mistranslated as ”morgen (tomorrow)” in SLRT model, and it is correctly in our PiSLTRc model. To sum up, specific numbers and named entities are challenging since there is no grammatical context to distinguish one from another. However, in these two examples, we see that our model translates specific numbers and named entities more precisely. This demonstrates that our proposed model has a stronger ability to understand sign videos. When we move to the third and fourth example in the Table VI, we see that our model generate complete sentence with less under-translation. For example, in the third example, ”gebietsweise länger andauernder regen (rain lasting longer in some areas)” is under-translated in SLTR model, while it is correctly translated as ”bis zum teil dauerregen (partly constant rain)” in our PiSLTRc model. In summary, our proposed model performs better than the previous SLTR model when facing the specifical numbers and name entities, which are challenging to translate since there is no grammatical context to distinguish one from another. Moreover, the sentences produced follow standard grammar. Nevertheless, it may be improved on the translation quality of the long sentences in the future. #### IV-C6 Limitation We leverage neighboring similar features to enhance sign representation. The selected features are in a fixed-size region. This is not consistent with the characteristics of sign language. That is to say, the number of frames corresponding to different sign gestures is dynamic. TABLE IX: The evaluation results on sign2text task on on Phoenix2014T dataset. sign2text | DEV | TEST ---|---|--- Model | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 RNN-based[14] | 31.80 | 31.87 | 19.11 | 13.16 | 9.94 | 31.80 | 32.24 | 19.03 | 12.83 | 9.58 TSPnet [16] | - | - | - | - | - | 34.96 | 36.10 | 23.12 | 16.88 | 13.41 SLTR-T [15] | - | 45.54 | 32.60 | 25.30 | 20.69 | - | 45.34 | 32.31 | 24.83 | 20.17 Multi-channel [17] | 44.59 | - | - | - | 19.51 | 43.57 | - | - | - | 18.51 PiSLTRc-T (ours) | 47.89 | 46.51 | 33.78 | 26.78 | 21.48 | 48.13 | 46.22 | 33.56 | 26.04 | 21.29 TABLE X: The evaluation results on sign2(gloss+text) task on on Phoenix2014T dataset. sign2(gloss+text) | DEV | TEST ---|---|--- Model | WER | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 | WER | ROUGE | BLEU-1 | BLEU-2 | BLEU-3 | BLEU-4 RNN-based[14] | - | 44.14 | 42.88 | 30.30 | 23.02 | 18.40 | - | 43.80 | 43.29 | 30.39 | 22.82 | 18.13 SLTR [15] | 24.61 | - | 46.56 | 34.03 | 26.83 | 22.12 | 24.49 | - | 47.20 | 34.46 | 26.75 | 21.80 Multi-channel [17] | - | - | - | - | - | 22.38 | - | - | - | - | - | 21.32 STMC(RGB-based) [45] | - | 44.30 | 44.06 | 32.69 | 25.45 | 20.74 | - | 44.70 | 45.08 | 33.80 | 26.44 | 21.55 PiSLTRc (ours) | 22.23 | 49.87 | 47.37 | 35.41 | 28.09 | 23.17 | 23.01 | 49.72 | 48.50 | 35.97 | 28.37 | 23.40 TABLE XI: The evaluation results on sign2gloss task on CSL dataset. sign2gloss | WER ---|--- S2VT [46] | 25.0 LS-HAN [38] | 17.3 HLSTM-attn [47] | 10.2 CTF [48] | 11.2 DenseTCN [49] | 14.3 SF-Net [50] | 3.8 FCN [10] | 3.0 SLTR-R(our implementation) | 3.7 PiSLTRc-R (ours) | 2.8 ### IV-D Comparison Against Baselines In this section, we compare several state-of-the-art models to demonstrate the effectiveness of our work. Similar to Camgz et al. [15], we elaborate the comparison between our proposed model and baseline models in the three tasks: sign2gloss, sign2text, and sign2(gloss+text). #### IV-D1 sign2gloss We evaluate this task in three datasets: PHOENIX-2014-T, PHOENIX-2014 and CSL. In Table VII, we compare our model with several methods for the sign2gloss task on PHOENIX-2014-T dataset. DNF [6] adopt iterative optimization approaches to tackle the weakly supervised problem. They first train an end- to-end recognition model for alignment proposal, and then use the alignment proposal to tune the feature extractor. CNN-LSTM-HMM [2] embeds powerful CNN- LSTM models in multi-stream HMMs and combines them with intermediate synchronization constraints among multiple streams. Vanilla SLTR-R [15] uses the backbone pretrained with CNN-LSTM-HMM setup and then employes a two- layered transformer encoder model. FCN [10] is built upon an end-to-end fully convolutional neural network for cSLR. Furthermore, they introduce a Gloss Feature Enhancement (GFE) to enhance the frame-wise representation, where GFE is trained to provide a set of alignment proposals for the frame feature extractor. STMC (RGB) [12] proposes a spatial-temporal multi-cue network to learn the video-based sequence. For a fair comparison, we only selected the RGB-based model of STMC without leveraging the additional information of hand, face, and body pose. PiSLTRc-R is our model which is trained when the weight of translation loss $\lambda_{\\_}T$ is set zero. Similar to vanilla SLTR-R, our work extracts feature from the CNN-LSTM-HMM backbone. As shown in this table, our proposed PiSLTRc-R surpasses the vanilla SLTR model by $12\%$ and $7\%$ on Dev and Test datasets, respectively. Furthermore, in the RGB-based models, we achieve state-of-the-art performance on the sign2gloss task. In Table VIII we also evaluate our PiSLTRc-R model on the PHOENIX-2014 dataset. Compared with existed baseline models, our proposed model achieves comparable results. Note that the vanilla SLTR-R does not report the experimental results on the PHOENIX-2014 dataset. We implement it by ourselves. Compared with SLTR-R, our PiSLTRc-R model gains $4\%$ and $5\%$ improvements on Dev and Test datasets, respectively. In Table XI we conduct experiments on CSL dataset. We see that our proposed PiSLTRc-R model achieves state-of-the-art performance. Compared with the SLTR-R model, our PiSLTRc-R model gains $24\%$ improvements on the Test datasets (5,000 examples split by ourselves), respectively. #### IV-D2 sign2text In Table IX, we compare our approach with several sign2text methods on PHOENIX-2014-T dataset. The RNN-based model [14] adopt full frame features from Re-sign. TSPnet [16] utilizes I3D [51] to extract the spatial features, and further finetune I3D on two WSLR datasets [52, 53]. Multi-channel [17] allows both the inter and intra contextual relationship between different asynchronous channels to be modelled within the transformer network itself. PiSLTRc-T is our model that training with the weight of recognition loss $\lambda_{\\_}R$ being zero. Like in sign2gloss, SLTR-T and our PiSLTRc-T model utilize the pretrained feature from CNN-LSTM-HMM. Experimental results show that our proposed model achieves state-of-the-art performance and surpasses the vanilla SLTR-T model by $3.8\%$ and $5.6\%$ BLEU-4 scores. #### IV-D3 sign2(gloss+text) In Table X, we compare our model on sign2(gloss+text) task. In this task, we jointly learn sign language recognition and translation simultaneously. Namely, $\lambda_{\\_}R$ and $\lambda_{\\_}T$ are set as non-zero. Note that different settings will obtain different results. Weighing up the performance on recognition and translation in our experiments, we set $\lambda_{\\_}R=\lambda_{\\_}T=1.0$. Compared with vanilla SLTR, our model gains significant improvements on both two tasks. Experiments demonstrate that our proposed techniques bring significant improvements for recognition and translation quality based on the sign language Transformer model. ## V Conclusion In this paper, we indicate two drawbacks of the sign language Transformer (SLTR) model for sign language recognition and translation. The first shortcoming is that self-attention aggregates sign visual features in a frame- wise manner, thus neglecting the temporal semantic structure of sign gestures. To overcome this problem, we propose a CPTcn module to generate neighborhood- enhanced sign features by leveraging the temporal semantic consistency of sign gestures. Specifically, we introduce a novel content-aware neighborhood gathering method to select relevant features dynamically. And then, we apply position-informed temporal convolution layers to aggregate them. The second disadvantage is the absolute position encoding used in the vanilla SLTR model. It is demonstrated unable to capture the direction and distance information, which are critical for sign video understanding and sentence learning. Therefore, we inject relative position information to SLTR model with disentangled relative position encoding (DRPE) method. Extensive experiments on two large-scale sign language datasets demonstrate the effectiveness of our PiSLTRc framework. ## References * [1] O. Koller, H. Ney, and R. Bowden, “Deep hand: How to train a cnn on 1 million hand images when your data is continuous and weakly labelled,” _2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 3793–3802, 2016. * [2] O. Koller, N. C. Camgoz, H. Ney, and R. Bowden, “Weakly supervised learning with multi-stream cnn-lstm-hmms to discover sequential parallelism in sign language videos,” _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , vol. 42, pp. 2306–2320, 2020. * [3] R. Cui, H. Liu, and C. Zhang, “Recurrent convolutional neural networks for continuous sign language recognition by staged optimization,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 1610–1618, 2017. * [4] J. Pu, W. Zhou, and H. Li, “Dilated convolutional network with iterative optimization for continuous sign language recognition,” in _International Joint Conferences on Artificial Intelligence Organization (IJCAI)_ , 2018, pp. 885–891. * [5] H. Wang, X. Chai, and X. Chen, “A novel sign language recognition framework using hierarchical grassmann covariance matrix,” _IEEE Transactions on Multimedia_ , vol. 21, pp. 2806–2814, 2019. * [6] R. Cui, H. Liu, and C. Zhang, “A deep neural framework for continuous sign language recognition by iterative training,” _IEEE Transactions on Multimedia_ , vol. 21, pp. 1880–1891, 2019. * [7] J. Pu, W. Zhou, and H. Li, “Iterative alignment network for continuous sign language recognition,” _2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 4160–4169, 2019. * [8] J. Pu, W. Zhou, H. Hu, and H. Li, “Boosting continuous sign language recognition via cross modality augmentation,” _Proceedings of the 28th ACM International Conference on Multimedia_ , 2020. * [9] H. Hu, W. Zhou, J. Pu, and H. Li, “Global-local enhancement network for nmfs-aware sign language recognition,” _ArXiv_ , vol. abs/2008.10428, 2020\. * [10] K. L. Cheng, Z. Yang, Q. Chen, and Y.-W. Tai, “Fully convolutional networks for continuous sign language recognition,” in _European Conference on Computer Vision (ECCV)_. Springer, 2020, pp. 697–714. * [11] N. C. Camgöz, S. Hadfield, O. Koller, and R. Bowden, “Subunets: End-to-end hand shape and continuous sign language recognition,” _2017 IEEE International Conference on Computer Vision (ICCV)_ , pp. 3075–3084, 2017. * [12] H. Zhou, W. Zhou, Y. Zhou, and H. Li, “Spatial-temporal multi-cue network for continuous sign language recognition,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , vol. 34, no. 07, 2020, pp. 13 009–13 016. * [13] J. Huang, W. Zhou, H. Li, and W. Li, “Attention-based 3d-cnns for large-vocabulary sign language recognition,” _IEEE Transactions on Circuits and Systems for Video Technology_ , vol. 29, no. 9, pp. 2822–2832, 2019\. * [14] N. C. Camgöz, S. Hadfield, O. Koller, H. Ney, and R. Bowden, “Neural sign language translation,” _2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 7784–7793, 2018. * [15] N. C. Camgöz, O. Koller, S. Hadfield, and R. Bowden, “Sign language transformers: Joint end-to-end sign language recognition and translation,” _2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 10 020–10 030, 2020. * [16] D. Li, C. Xu, X. Yu, K. Zhang, B. Swift, H. Suominen, and H. Li, “Tspnet: Hierarchical feature learning via temporal semantic pyramid for sign language translation,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2020. * [17] N. C. Camgoz, O. Koller, S. Hadfield, and R. Bowden, “Multi-channel transformers for multi-articulatory sign language translation,” in _European Conference on Computer Vision (ECCV)_. Springer, 2020, pp. 301–319. * [18] R. Pfau, M. Salzmann, and M. Steinbach, “The syntax of sign language agreement: Common ingredients, but unusual recipe,” _Glossa_ , vol. 3, pp. 1–46, 2018. * [19] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin, “Attention is all you need,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2017, pp. 5998–6008. * [20] P. Shaw, J. Uszkoreit, and A. Vaswani, “Self-attention with relative position representations,” in _2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (NAACL-HLT)_ , 2018, pp. 464–468. * [21] H. Yan, B. Deng, X. Li, and X. Qiu, “Tener: Adapting transformer encoder for named entity recognition,” _ArXiv_ , vol. abs/1911.04474, 2019. * [22] M. A. Islam, S. Jia, and N. D. B. Bruce, “How much position information do convolutional neural networks encode?” in _International Conference on Learning Representations (ICLR)_ , 2020. * [23] Z. Dai, Z. Yang, Y. Yang, J. Carbonell, Q. V. Le, and R. Salakhutdinov, “Transformer-xl: Attentive language models beyond a fixed-length context,” in _Proceedings of the 57th Conference of the Association for Computational Linguistics (ACL)_ , 2019. * [24] P. He, X. Liu, J. Gao, and W. Chen, “Deberta: Decoding-enhanced bert with disentangled attention,” in _International Conference on Learning Representations (ICLR)_ , 2021. * [25] C. Raffel, N. Shazeer, A. Roberts, K. Lee, S. Narang, M. Matena, Y. Zhou, W. Li, and P. J. Liu, “Exploring the limits of transfer learning with a unified text-to-text transformer,” _J. Mach. Learn. Res._ , vol. 21, pp. 140:1–140:67, 2020. * [26] G. Ke, D. He, and T. Liu, “Rethinking positional encoding in language pre-training,” in _International Conference on Learning Representations (ICLR)_ , 2021. * [27] Z. Yang, Z. Dai, Y. Yang, J. Carbonell, R. Salakhutdinov, and Q. V. Le, “Xlnet: Generalized autoregressive pretraining for language understanding,” in _Annual Conference on Neural Information Processing Systems (NeurIPS)_ , 2019. * [28] J. Forster, C. Schmidt, O. Koller, M. Bellgardt, and H. Ney, “Extensions of the sign language recognition and translation corpus rwth-phoenix-weather,” in _Proceedings of the Ninth International Conference on Language Resources and Evaluation, (LREC)_ , 2014. * [29] T. Luong, H. Pham, and C. D. Manning, “Effective approaches to attention-based neural machine translation,” in _Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP)_ , 2015. * [30] B. Martinez, P. Ma, S. Petridis, and M. Pantic, “Lipreading using temporal convolutional networks,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_ , 2020, pp. 6319–6323. * [31] Z. Xia, X. Hong, X. Gao, X. Feng, and G. Zhao, “Spatiotemporal recurrent convolutional networks for recognizing spontaneous micro-expressions,” _IEEE Transactions on Multimedia_ , vol. 22, no. 3, pp. 626–640, 2020. * [32] D. Guo, W. Li, and X. Fang, “Fully convolutional network for multiscale temporal action proposals,” _IEEE Transactions on Multimedia_ , vol. 20, no. 12, pp. 3428–3438, 2018. * [33] S. Zhang, S. Zhang, T. Huang, and W. Gao, “Speech emotion recognition using deep convolutional neural network and discriminant temporal pyramid matching,” _IEEE Transactions on Multimedia_ , vol. 20, no. 6, pp. 1576–1590, 2018. * [34] J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “Bert: Pre-training of deep bidirectional transformers for language understanding,” in _2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, (NAACL-HLT)_ , 2019. * [35] A. Graves, S. Fernández, F. Gomez, and J. Schmidhuber, “Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks,” in _Machine Learning, Proceedings of the Twenty-Third International Conference, (ICML)_ , 2006. * [36] J. Ba, J. Kiros, and G. E. Hinton, “Layer normalization,” _ArXiv_ , vol. abs/1607.06450, 2016. * [37] C.-Z. A. Huang, A. Vaswani, J. Uszkoreit, I. Simon, C. Hawthorne, N. Shazeer, A. M. Dai, M. Hoffman, M. Dinculescu, and D. Eck, “Music transformer: Generating music with long-term structure,” in _International Conference on Learning Representations (ICLR)_ , 2019. * [38] J. Huang, W. Zhou, Q. Zhang, H. Li, and W. Li, “Video-based sign language recognition without temporal segmentation,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , 2018. * [39] K. Papineni, S. Roukos, T. Ward, and W.-J. Zhu, “Bleu: a method for automatic evaluation of machine translation,” in _Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL)_ , 2002. * [40] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” _CoRR_ , vol. abs/1412.6980, 2015. * [41] Y. Wu, M. Schuster, Z. Chen, Q. V. Le, M. Norouzi, W. Macherey, M. Krikun, Y. Cao, Q. Gao, K. Macherey, J. Klingner, A. Shah, M. Johnson, X. Liu, L. Kaiser, S. Gouws, Y. Kato, T. Kudo, H. Kazawa, K. Stevens, G. Kurian, N. Patil, W. Wang, C. Young, J. Smith, J. Riesa, A. Rudnick, O. Vinyals, G. S. Corrado, M. Hughes, and J. Dean, “Google’s neural machine translation system: Bridging the gap between human and machine translation,” _ArXiv_ , vol. abs/1609.08144, 2016. * [42] O. Koller, S. Zargaran, H. Ney, and R. Bowden, “Deep sign: Hybrid cnn-hmm for continuous sign language recognition,” in _Proceedings of the British Machine Vision Conference (BMVC)_ , 2016. * [43] O. Koller, S. Zargaran, and H. Ney, “Re-sign: Re-aligned end-to-end sequence modelling with deep recurrent cnn-hmms,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 3416–3424, 2017. * [44] C. Wei, J. Zhao, W. gang Zhou, and H. Li, “Semantic boundary detection with reinforcement learning for continuous sign language recognition,” _IEEE Transactions on Circuits and Systems for Video Technology_ , vol. 31, pp. 1138–1149, 2021. * [45] H. Zhou, W. Zhou, Y. Zhou, and H. Li, “Spatial-temporal multi-cue network for sign language recognition and translation,” _IEEE Transactions on Multimedia_ , pp. 1–1, 2021. * [46] S. Venugopalan, M. Rohrbach, J. Donahue, R. Mooney, T. Darrell, and K. Saenko, “Sequence to sequence – video to text,” _2015 IEEE International Conference on Computer Vision (ICCV)_ , pp. 4534–4542, 2015. * [47] D. Guo, W. Zhou, H. Li, and M. Wang, “Hierarchical lstm for sign language translation,” in _Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)_ , 2018. * [48] S. Wang, D. Guo, W. gang Zhou, Z. Zha, and M. Wang, “Connectionist temporal fusion for sign language translation,” _Proceedings of the 26th ACM international conference on Multimedia (ACM MM)_ , 2018. * [49] D. Guo, S. Wang, Q. Tian, and M. Wang, “Dense temporal convolution network for sign language translation,” in _International Joint Conferences on Artificial Intelligence Organization (IJCAI)_ , 2019. * [50] Z. Yang, Z. Shi, X. Shen, and Y.-W. Tai, “Sf-net: Structured feature network for continuous sign language recognition,” _ArXiv_ , vol. abs/1908.01341, 2019. * [51] J. Carreira and A. Zisserman, “Quo vadis, action recognition? a new model and the kinetics dataset,” _2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)_ , pp. 4724–4733, 2017. * [52] D. Li, C. Rodriguez-Opazo, X. Yu, and H. Li, “Word-level deep sign language recognition from video: A new large-scale dataset and methods comparison,” _2020 IEEE Winter Conference on Applications of Computer Vision (WACV)_ , pp. 1448–1458, 2020. * [53] H. R. V. Joze and O. Koller, “Ms-asl: A large-scale data set and benchmark for understanding american sign language,” in _Proceedings of the British Machine Vision Conference (BMVC)_ , 2019.
arxiv-papers
2021-07-27T05:01:27
2024-09-04T03:07:20.560895
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Pan Xie and Mengyi Zhao and Xiaohui Hu", "submitter": "Pan Xie", "url": "https://arxiv.org/abs/2107.12600" }
2107.12601
# Microphone Array Generalization for Multichannel Narrowband Deep Speech Enhancement ###### Abstract This paper addresses the problem of microphone array generalization for deep- learning-based end-to-end multichannel speech enhancement. We aim to train a unique deep neural network (DNN) potentially performing well on unseen microphone arrays. The microphone array geometry shapes the network’s parameters when training on a fixed microphone array, and thus restricts the generalization of the trained network to another microphone array. To resolve this problem, a single network is trained using data recorded by various microphone arrays of different geometries. We design three variants of our recently proposed narrowband network to cope with the agnostic number of microphones. Overall, the goal is to make the network learn the universal information for speech enhancement that is available for any array geometry, rather than learn the one-array-dedicated characteristics. The experiments on both simulated and real room impulse responses (RIR) demonstrate the excellent across-array generalization capability of the proposed networks, in the sense that their performance measures are very close to, or even exceed the network trained with test arrays. Moreover, they notably outperform various beamforming methods and other advanced deep-learning-based methods. Index Terms: Multichannel speech enhancement, microphone array generalization, deep learning ## 1 Introduction Microphone arrays are extensively applied in intelligent speech communication systems. Multichannel speech enhancement, owing to its additional spatial information, is widely studied in recent years and tends to have superior performance relative to monaural speech enhancement. Beamforming [1] is a classic multichannel speech enhancement model preserving the desired signal from the target direction and suppressing signals from other directions. Different in the manners of utilizing spatial information, recent studies on multichannel speech enhancement DNNs can be divided into two categories: i) monaural deep masking or mapping [2] followed by beamforming [3],[4]; ii) directly learning spatial information by inputting multichannel signals or cross-channel features into the network, and performing end-to-end speech enhancement. Methods in the first class have become the most popular front- ends for automatic speech recognition (ASR) [5]. In addition, they are free from the microphone array generalization problem, since both monaural speech enhancement DNN and beamforming can be flexibly applied on any array configurations. Especially, [6] and [7] further strengthen the array generalization capability by exhaustively employing each microphone in an array as a reference microphone. However, these approaches solely focus on learning monaural speech T-F information channel by channel with DNNs and the performance strongly depends on the estimation accuracy of beamforming parameters. We thus believe that simultaneously exploiting the spatial and monaural information with DNN could further improve the estimation of speech on target direction, as is done in the end-to-end time-domain methods [8, 9] and T-F domain methods [10, 11]. Neural beamforming takes the multichannel signals as input and explicitly performs as a beamformer [12, 13, 14] and sometimes it is trained to leverage the spatial cues, such as interaural phase/level difference in [15, 16, 17]. These methods apparently have the microphone array generalization problem which, however, have not been considered in their original papers. Very recently, the FaSNet [18] integrated with a transform-average-concatenate (TAC) [19] was proposed to process signals with varying number of microphones, where the TAC module together with cross-correlation functions between channels were employed to learn the spatial information. In [20], a self-attention network is used to exploit the spatial information with a varying number of microphones. Both these two methods, i.e. [19] and [20], alternate the temporal processing layers and spatial processing layers, which is arguably problematic for learning some temporal-spatial-combined information, such as the directional continuity of speakers and the spatial diffuseness of noise. Figure 1: Diagram of the basic NBDF and proposed three variants of NBDF network architectures. In this work, we propose a new speech enhancement network being able to work with any microphone arrays. The importance of microphone array generalization is two-fold. First, the spatial correlations of multichannel signals are array-dependent. Previously, the training and test data are always recorded with the same microphone array. However, recording a large dataset with a new microphone array is time and budget-consuming. Second, DNN models with great microphone array generalization capability are favorable in Cloud applications and robot group intelligence, where recording end-devices are different. Our proposed networks, once trained, are able to enhance multichannel signals without requiring any prior knowledge of microphone arrays. In our previous works [21, 22], a narrow band deep filtering (NBDF) method was proposed, which inputs the frequency-wise multichannel signals to a long short-term memory (LSTM) network, and predicts the clean speech at the corresponding frequency. NBDF has achieved excellent speech enhancement performance in terms of both human perception and ASR, thus it is used as the baseline network in this paper. We propose three variants of NBDF in this work to account for the varying number of microphones, namely channel-padding NBDF (CP-NBDF), channel-convolutional NBDF (CC-NBDF), and pair-wise NBDF (PW-NBDF). A large number of virtual microphone arrays with simulated RIRs are used for training. Multichannel signals are generated by convolving RIRs with single- channel speech clips. By using the toolkit presented in [23] and [24], multichannel spatially diffuse babble, white and spatially correlated wind noise are generated respecting geometries of those arrays. The multichannel speech enhancement network normally recovers the monaural clean speech of a reference channel. We propose a simple and effective network training scheme to allow the users to specify a reference channel for their own microphone array during test. Besides, a magnitude augmentation scheme is proposed to account for the fact that different microphone arrays could have different configurations in terms of recording volume or frequency response. Overall, combining all of these, the network is trained to learn the universal information for speech enhancement that is available in any microphone array. Experiments demonstrate that our proposed networks have excellent generalization capability to various unseen simulated and real arrays. Moreover, they achieve better speech enhancement performance than various beamforming methods and the advanced FaSNet-TAC method [19]. ## 2 System description ### 2.1 Signal model and narrow band deep filtering recap The multichannel microphone signal $X$ is the mixture of multichannel clean speech $S$ and noise $N$ represented in the short-time Fourier transform (STFT) domain. $X_{m}(k,t)=S_{m}(k,t)+N_{m}(k,t).$ (1) where $m\in[1,M],k\in[1,K],t\in[1,T]$ are the microphone, frequency and time indices, respectively. $T$ and $K$ are the total number of frames and frequency-bins. $M$ denotes the number of microphones. This work focuses on studying speech enhancement on different microphone arrays to predict the speech $S_{r}(k,t)$ of one selected reference channel, thence the reverberation is not suppressed even if presenting in $\hat{S}_{r}(k,t)$. NBDF (Fig.1 (a)) is a DNN processing multichannel speech frequency-wisely. Uncoupling the inter-frequency dependency from full-band signal makes the network focus on learning the narrow-band spatial and temporal information to recognize speech components on each T-F unit. Besides, by solely exploiting narrowband information, the NBDF network generalizes well to new speakers and new noise scenarios with unseen spectral patterns, which naturally matches with our objective, such as the Cloud applications. NBDF network is composed of two stacked Bi-directional LSTM (BLSTM) layers and one fully connected (FC) layer with sigmoid activation before the output, shown in Fig. 1 (a). Different frequencies of one signal are independently processed by the network. The frequency-wise input $\mathbf{X}\in\mathbb{R}^{T\times 2M}$, is the concatenation of multichannel real and imaginary parts of STFT coefficients channel by channel. The target, i.e. monaural magnitude ratio mask (MRM) sequence $\in\mathbb{R}^{T\times 1}$, is the ratio of magnitudes between clean speech and noisy mixture at the reference channel. During inference, the predicted MRM is multiplied with the noisy mixture of the reference channel to restore the magnitude of clean speech. The phase of the recovered signal remains the same as the noisy mixture. Each input sample is normalized by dividing the mean of the STFT magnitude of all frames at the reference channel. We take the mean square error of MRM as the training loss. The enhanced reverberant reference channel signal $\hat{s_{r}}(t)$ is finally obtained with inverse STFT. ### 2.2 Inner microphone array generalization To achieve the cross-array generalization, it’s necessary to first resolve the inner-array generalization, namely the generalization problem for one constant microphone array. This includes two aspects: i) the reference channel selection mechanism. During test, different reference channels can be used with the already-trained network. The optimal reference channel can be selected by the human users based on their prior knowledge or by an automatic selection algorithm [25]. The network then predicts the clean speech of the selected reference channel; ii) the network’s immunity to the microphone permutation. The rationale is that the spatial information should be conveyed by the correlation between microphones rather than by a certain recording permutation of the microphone array. These two aspects are also very important when the network is tested on an unseen microphone array, as its reference channel and permutation are completely irrelevant to the training arrays. A network trained with a constant reference channel and a fixed permutation, will overfit to such setup and hardly generalizes to others. We propose a novel training scheme to account for the addressed aspects. Regarding reference channel, a trivial way is to encode the reference channel selection as a one-hot vector and input it to the network along with the signals. This one-hot vector will specify the reference channel index during test. We simplify this scheme by using a constant one-hot vector that always specifies the first channel as the reference channel and shift it to the first channel, namely the first two elements in $\mathbf{X}$. The constant one-hot vector can be omitted in this way. Rest channels are shuffled (independently for each sample) to make the network trained with various permutations. As a consequence, the network is able to recognize the reference channel (always the first input channel) in the basic NBDF network, CC-NBDF, and CP-NBDF and to be invariant to the permutation. ### 2.3 Three variants of NBDF The most straightforward way to make the NBDF network adapt to microphone arrays with varying number of microphones is to set an upper bound for the number of microphones, say $M^{\prime}$ (preset eight in this paper) in channel-padding NBDF (shown in Fig. 1 (b)). The network is trained on various arrays with maximum $M^{\prime}$ microphones. When $M<M^{\prime}$, the $M$ channels are first organized using the training scheme in Section 2.2 and the last $M^{\prime}-M$ channels are padded with zeros. It always learns the global spatial information as in basic NBDF. This mechanism partially solves the varying number of microphones problem, since it can not process more than $M^{\prime}$ channels. In channel-convolutional NBDF, as is done in [10], the inter-channel information can be locally learned by time-distributed convolutional neural networks (CNN)s, and correspondingly the channel-dimension can be ablated with multilayer CNNs. We proposed a channel convolutional NBDF network, as shown in Fig. 1 (c). The input, $\mathbf{X}\in\mathbb{R}^{T\times M\times 2}$, is convolved by the first CNN layer to fixed $N$ feature maps and then is transferred to $M-2$ consecutive shared CNN layers. Channel convolutional module is followed by a basic NBDF model. For the dual-channel case, only the first CNN layer functions. All channels of input are organized with the above training scheme. Comparing to the basic NBDF network which learns global spatial information, the CC-NBDF uses CNNs to recursively learn the accumulated local inter-channel information, which may lack some global channel dependencies. In pair-wise NBDF shown in Fig. 1 (d), each microphone pair is composed of the reference microphone and one of the other microphones: $\mathbf{X}_{1,m}\in\mathbb{R}^{T\times 4},\ m\in[2,M]$, where $1$ in subscript means the first channel is reference channel. The input sequence $\mathbf{X}\in\mathbb{R}^{T\times 2M}$ is uncoupled as $M-1$ dual-channel narrowband sequences which are parallelly input to the shared LSTM, i.e. BLSTM 1 in Fig. 1 (d). This works for any array with a different number of microphones and free from the permutation problem owing to pair-wise mapping. The $M-1$ outputs of this LSTM layer are averaged and then sent to BLSTM 2 and FC layer same as the basic NBDF network. Similar to channel convolutional NBDF, it learns inter-channel correlation pair-wisely but differently learns the global channel relation from the mean-pooled feature. The good point is that all microphone pairs are formed with the reference channel, which provides sufficient information for mask estimation at the reference channel. ### 2.4 Magnitude augmentation Each microphone has its own characteristics such as its unique frequency response, recording volume, and noise floor. It is reflected by the different magnitude levels while recording the same signal. To take this effect into account, during training, we multiply STFT magnitude for each microphone at each frequency with a randomly chosen factor. This data augmentation technique largely increases the data diversity in terms of the relative magnitudes between microphones and may improve the generalization capability while testing unseen array. Table 1: Speech enhancement results on a constant array (SIMU 6-CH LA). SNR is in the range of [-5,0] dB. Model | PESQ | STOI (%) | SDR (dB) ---|---|---|--- Unprocessed | 1.68 | 63.9 | -2.4 Constant-reference-permutation | 2.67 | 78.2 | 10.6 Constant-permutation | 2.64 | 77.3 | 10.5 Proposed training scheme | 2.62 | 76.5 | 10.3 Table 2: Speech enhancement results of microphone array generalization. SNR is uniformly distributed in the range of [-5,0] dB. | PESQ / STOI (%) / SDR (dB) | Model size | 2-CH | 4-CH CA | 4-CH LA | 6-CH CA | 6-CH LA ---|---|---|---|---|---|---|--- | Unprocessed | - | 1.70 | 62.4 | -2.4 | 1.70 | 61.5 | -2.5 | 1.69 | 63.1 | -2.3 | 1.70 | 61.6 | -2.5 | 1.70 | 63.0 | -2.3 | BeamformIt [26] | - | 1.81 | 63.0 | -1.1 | 1.72 | 59.5 | -2.7 | 1.87 | 63.2 | -0.5 | 1.78 | 60.9 | -1.6 | 1.88 | 62.8 | -0.3 | Oracle MVDR | - | 1.83 | 64.7 | -0.5 | 1.84 | 64.9 | -0.5 | 1.93 | 68.3 | 1.1 | 1.94 | 66.7 | 0.5 | 1.97 | 69.1 | 1.5 | FaSNet-TAC [19] | 2.75M | 2.36 | 73.5 | 10.0 | 2.43 | 74.0 | 10.1 | 2.40 | 75.3 | 10.5 | 2.47 | 74.7 | 10.4 | 2.43 | 75.7 | 10.6 | CP-NBDF (prop.) | 1.21M | 2.53 | 72.8 | 9.5 | 2.72 | 75.2 | 9.9 | 2.62 | 74.9 | 10.1 | 2.75 | 75.7 | 10.0 | 2.64 | 75.1 | 10.1 SIMU | CC-NBDF (prop.) | 1.33M | 2.51 | 72.1 | 9.4 | 2.70 | 74.6 | 9.8 | 2.60 | 74.4 | 10.1 | 2.74 | 75.1 | 9.9 | 2.64 | 74.8 | 10.1 | PW-NBDF (prop.) | 1.19M | 2.49 | 73.0 | 9.2 | 2.73 | 76.1 | 10.0 | 2.61 | 75.8 | 10.0 | 2.79 | 76.9 | 10.2 | 2.67 | 76.6 | 10.2 | PW-NBDF with MA (prop.) | 1.19M | 2.56 | 73.1 | 9.8 | 2.77 | 76.1 | 10.2 | 2.66 | 75.8 | 10.4 | 2.82 | 77.0 | 10.3 | 2.71 | 76.6 | 10.5 | One-array-dedicated | 1.20M | 2.58 | 73.6 | 10.0 | 2.69 | 76.0 | 9.0 | 2.63 | 76.0 | 10.2 | 2.77 | 76.4 | 10.1 | 2.65 | 75.8 | 10.2 | Microphone-number-dedicated | 1.20M | 2.52 | 72.8 | 9.7 | 2.75 | 76.0 | 10.1 | 2.62 | 75.1 | 10.3 | 2.78 | 76.3 | 10.1 | 2.66 | 75.8 | 10.2 | Unprocessed | - | 1.67 | 63.4 | -2.9 | 1.70 | 64.3 | -2.4 | 1.67 | 68.4 | -2.3 | 1.67 | 62.7 | -3.1 | 1.66 | 68.0 | -2.4 | BeamformIt [26] | - | 1.73 | 64.3 | -1.4 | 1.72 | 63.9 | -1.7 | 1.80 | 70.5 | -0.7 | 1.75 | 63.6 | -1.8 | 1.80 | 70.4 | -0.9 | Oracle MVDR | - | 1.84 | 69.9 | 0.4 | 1.88 | 72.7 | 0.5 | 2.09 | 84.2 | 3.0 | 2.02 | 77.4 | 1.8 | 2.16 | 85.1 | 2.9 | FaSNet-TAC [19] | 2.75M | 2.28 | 74.7 | 10.0 | 2.40 | 76.7 | 10.7 | 2.39 | 81.5 | 10.9 | 2.38 | 76.3 | 10.6 | 2.40 | 81.5 | 10.9 | CP-NBDF (prop.) | 1.22M | 2.45 | 73.4 | 9.3 | 2.67 | 78.4 | 10.3 | 2.61 | 82.5 | 10.3 | 2.65 | 77.9 | 9.9 | 2.61 | 82.4 | 10.1 REAL | CC-NBDF (prop.) | 1.33M | 2.43 | 73.4 | 9.2 | 2.65 | 78.0 | 10.3 | 2.58 | 82.0 | 10.3 | 2.64 | 77.3 | 9.9 | 2.59 | 81.7 | 10.2 | PW-NBDF (prop.) | 1.19M | 2.42 | 74.9 | 9.0 | 2.68 | 79.2 | 10.3 | 2.62 | 83.4 | 10.3 | 2.70 | 79.1 | 10.1 | 2.66 | 83.6 | 10.4 | PW-NBDF with MA (prop.) | 1.19M | 2.50 | 75.1 | 9.7 | 2.72 | 79.3 | 10.6 | 2.67 | 83.5 | 10.7 | 2.73 | 79.2 | 10.3 | 2.70 | 83.7 | 10.6 | One-array-dedicated | 1.20M | 2.56 | 76.7 | 10.1 | 2.68 | 80.0 | 10.7 | 2.89 | 86.9 | 11.1 | 2.73 | 80.2 | 10.2 | 2.83 | 86.1 | 11.0 | Microphone-number-dedicated | 1.20M | 2.43 | 74.6 | 9.4 | 2.70 | 79.4 | 10.5 | 2.65 | 83.8 | 10.5 | 2.69 | 78.7 | 10.1 | 2.65 | 83.1 | 10.2 ## 3 Experiment and evaluation ### 3.1 Experimental setup To collect a large amount of data from different microphone arrays, we use virtual microphone arrays with simulated RIRs and simulated multichannel noise in this work. We totally plant 116 virtual microphone arrays with different sizes, geometry and numbers of microphones. For training, 114 virtual arrays are used with microphone numbers in the range of [2, 8] in different (linear, circular, circular with center microphone, nonuniform linear, ad-hoc) shapes. For each shape, there are five different diameters in the range of [0.15, 0.5] m. RIRs are simulated with different room setups using the toolkit [27] for each of these arrays. Three virtual rooms are created and each virtual array is randomly positioned at 1m height. The azimuth, the source-array distance and reverberation time (RT60) are randomly chosen in ranges of [$0^{\circ},360^{\circ}$), (0.5, 4.5) m and [0.14, 1] s. As for test, the microphone linear array (LA) presented in [28] and the circular array (CA) provided in the _REVERB challenge_ [29] with real-measured RIRs are used. For LA, the spacing of eight microphones is [4,4,4,8,4,4,4] cm, and the RIRs are measured with two source-array distances, 13 azimuths and three RT60 setups (0.16, 0.36, 0.61) s. For CA, eight microphones form a circle with a diameter of 20 cm, and the RIRs are measured with two source-array distances, two azimuths and three RT60 setups (0.25 s, 0.68 s, 0.73 s) s. Besides the real arrays, we also test the rest two virtual arrays, which have exactly the same geometry as the two real arrays, respectively. The RIRs for the virtual microphones are simulated with RT60 randomly chosen from a range of [0.25, 0.75] s. To have a varying number of microphones, 2-, 4-, 6-ch sub-arrays (excluded in training) are extracted from each SIMU and REAL original 8-ch array, which then generates five types of sub-arrays: 2-CH (from both LA and CA) arrays, 4-CH CA, 4-CH LA, 6-CH partial CA and 6-CH LA. We create 12000, 2000 and 1200 (600 per sub-array) multichannel noisy reverberant speech for training, validation and test, respectively. Clean utterances from TIMIT [30] are convolved with multichannel RIRs. Multichannel spatially diffuse noise is generated by using [23] with babble or white noise clips and wind noise from [24]. Multichannel speech (containing only one single source) and diffuse noise are mixed with a signal-to-noise ratio (SNR) randomly chosen from the range of [-5, 10] dB for training while from [-5, 0] dB for test. STFT is performed with 512 samples-long (32 ms) hamming window and a hop size of 256-samples. Adam is used for optimization with a learning rate of 0.001. Magnitude augmentation (MA) in Section 2.4 is applied for PW- NBDF with multiplication factors randomly chosen from [0.75, 1.33]. Three objective evaluation metrics are adopted: i) perceptual evaluation speech quality (PESQ) [31]; ii) short-time objective intelligibility (STOI) [32]; iii) signal-to-distortion ratio (SDR) [33]. Three baseline methods are compared. FaSNet with TAC111https://github.com/yluo42/TAC [19] is trained with the same data as for the proposed network. The scale invariant-SNR (SI-SNR) is taken as the training loss. BeamformIt [26] and Oracle MVDR are compared as well where the Oracle MVDR beamformer estimates the steering vector and noise covariance matrix using the clean (reverberant) speech and pure noise of the test signal, respectively. ### 3.2 Results and discussion First, we evaluate the performance while taking the training scheme presented in Section 2.2 for a constant array (the simulated 6-CH LA for test in this experiment). Two setups are tested as benchmarks: i) Six NBDF models trained with fixed permutation by alternately setting different channels as the reference. The evaluation metrics of six models are averaged. This setup, referred to as constant-reference-permutation, uses the same reference channel and channel permutation for training and test, which is supposed to achieve the best performance in the same framework but lack inner-array generalization. ii) The randomly selected reference channel placed at the first place while the rest are in a constant permutation. The constant- permutation setup allows to alter the reference channel during test, but other microphones follow the same permutation with training. We remind that the proposed training scheme allows altering both the reference channel and the permutation during test. In Table 1, the performance slightly decreases from constant-reference-permutation benchmark to constant-permutation benchmark, then further to the proposed scheme, which demonstrates that the proposed scheme is able to largely increase the flexibility of multichannel speech enhancement model on a fixed array with a tiny loss of performance. To evaluate the cross array generalization capability, two other benchmark models are tested: I) the basic NBDF network is independently trained for each test microphone sub-array using the proposed training scheme, namely one- array-dedicated. II) Different basic NBDF networks are trained using arrays for each group of arrays with the same number of microphones in training sets, three networks for 2-CH, 4-CH and 6-CH groups respectively. This is referred to as microphone-number-dedicated. This setup allows to work on an unseen array with the same microphone number as the corresponding network. The results are shown in Table 2. Our proposed methods have comparable results on SIMU data, in the sense that their performances are close to, even exceed the one-array-dedicated model especially for PW-NBDF. On REAL data, similar behaviors to SIMU data are observed, which demonstrates that the model trained with virtual microphone arrays and simulated RIRs can generalize to real microphone arrays. Furthermore, by integrating MA, PW-NBDF is consistently improved, which shows the effectiveness of this data augmentation technique. The better performance of PW-NBDF relative to CP-NBDF, probably reveals that global spatial correlation can be somehow represented by dual-channel correlation in the NBDF framework. To achieve good performance however, the inter channel correlation has to be effectively learned, as PW-NBDF with shared LSTM outperforms CC-NBDF with shared CNNs. Better performance scores are achieved by both FaSNet-TAC and all of the proposed networks compared to BeamformIt and Oracle MVDR, as shown in Table 2. This demonstrates that learning spatial information with DNNs compared to hand-crafted beamforming techniques is indeed more efficient, for noise reduction, especially in reverberant and low-SNR environments. Compared to FaSNet-TAC, our proposed _PW-NBDF with MA_ with less than half of the model size, and achieves notably better PESQ and STOI scores and comparable SDR scores (despite the FaSNet-TAC’s training loss, i.e. SI-SNR, is extremely similar to SDR). This performance superiority is possibly due to the fact that the proposed network simultaneously learns the temporal-spatial information, which is important for modeling the directional continuity of speakers and the spatial diffuseness of noise. ## 4 Conclusion This paper systematically studies the microphone array generalization problem with respect to reference channel, microphone permutation, array geometry, and magnitude variation between microphones. We have proposed a network training scheme, three narrowband network architectures, and a magnitude augmentation technique, which overall achieves a simple yet effective multichannel speech enhancement network with excellent microphone array generalization performance. Moreover, the proposed network achieves better speech enhancement performance than the oracle beamforming technique and the advanced FaSNet-TAC method. One shortcoming of this work is that the simulated multichannel noise used in the experiments is ideally diffuse. However, the real-recorded multichannel noise has much more complex spatial characteristics, it could be an arbitrary combination of partially diffuse, directional, and spatially- uncorrelated noise. This issue will be studied in future work. ## References * [1] E. Hänsler and G. Schmidt, _Acoustic echo and noise control: a practical approach_. John Wiley & Sons, 2005, vol. 40. * [2] D. Wang and J. Chen, “Supervised speech separation based on deep learning: An overview,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 26, no. 10, pp. 1702–1726, 2018. * [3] J. Heymann, L. Drude, and R. Haeb-Umbach, “Neural network based spectral mask estimation for acoustic beamforming,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 196–200. * [4] T. Higuchi, N. Ito, T. Yoshioka, and T. Nakatani, “Robust mvdr beamforming using time-frequency masks for online/offline asr in noise,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 5210–5214. * [5] T. Ochiai, S. Watanabe, T. Hori, and J. R. Hershey, “Multichannel end-to-end speech recognition,” in _Proceedings of the 34 th International Conference on Machine Learning, Sydney, Australia_ , 2017. * [6] Z.-Q. Wang, P. Wang, and D. Wang, “Complex spectral mapping for single-and multi-channel speech enhancement and robust asr,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 28, pp. 1778–1787, 2020. * [7] Z.-Q. Wang and D. Wang, “Multi-microphone complex spectral mapping for speech dereverberation,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 486–490. * [8] N. Tawara, T. Kobayashi, and T. Ogawa, “Multi-channel speech enhancement using time-domain convolutional denoising autoencoder.” in _INTERSPEECH_ , 2019, pp. 86–90. * [9] C.-L. Liu, S.-W. Fu, Y.-J. Li, J.-W. Huang, H.-M. Wang, and Y. Tsao, “Multichannel speech enhancement by raw waveform-mapping using fully convolutional networks,” _IEEE/ACM Transactions on Audio, Speech, and Language Processing_ , vol. 28, pp. 1888–1900, 2020. * [10] S. Chakrabarty and E. A. Habets, “Time–frequency masking based online multi-channel speech enhancement with convolutional recurrent neural networks,” _IEEE Journal of Selected Topics in Signal Processing_ , vol. 13, no. 4, pp. 787–799, 2019. * [11] Y. Masuyama, M. Togami, and T. Komatsu, “Consistency-aware multi-channel speech enhancement using deep neural networks,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 821–825. * [12] X. Xiao, S. Watanabe, H. Erdogan, L. Lu, J. Hershey, M. L. Seltzer, G. Chen, Y. Zhang, M. Mandel, and D. Yu, “Deep beamforming networks for multi-channel speech recognition,” in _2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2016, pp. 5745–5749. * [13] B. Tolooshams, R. Giri, A. H. Song, U. Isik, and A. Krishnaswamy, “Channel-attention dense u-net for multichannel speech enhancement,” in _2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 836–840. * [14] Z. Meng, S. Watanabe, J. R. Hershey, and H. Erdogan, “Deep long short-term memory adaptive beamforming networks for multichannel robust speech recognition,” in _2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2017, pp. 271–275. * [15] X. Zhang and D. Wang, “Deep learning based binaural speech separation in reverberant environments,” _IEEE/ACM transactions on audio, speech, and language processing_ , vol. 25, no. 5, pp. 1075–1084, 2017. * [16] Z.-Q. Wang and D. Wang, “All-neural multi-channel speech enhancement.” in _INTERSPEECH_ , 2018, pp. 3234–3238. * [17] N. Shankar, G. S. Bhat, and I. M. Panahi, “Efficient two-microphone speech enhancement using basic recurrent neural network cell for hearing and hearing aids,” _The Journal of the Acoustical Society of America_ , vol. 148, no. 1, pp. 389–400, 2020. * [18] Y. Luo, C. Han, N. Mesgarani, E. Ceolini, and S.-C. Liu, “Fasnet: Low-latency adaptive beamforming for multi-microphone audio processing,” in _2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU)_. IEEE, 2019, pp. 260–267. * [19] Y. Luo, Z. Chen, N. Mesgarani, and T. Yoshioka, “End-to-end microphone permutation and number invariant multi-channel speech separation,” in _ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)_. IEEE, 2020, pp. 6394–6398. * [20] D. Wang, Z. Chen, and T. Yoshioka, “Neural Speech Separation Using Spatially Distributed Microphones,” in _Proc. Interspeech 2020_ , 2020, pp. 339–343. [Online]. Available: http://dx.doi.org/10.21437/Interspeech.2020-1089 * [21] X. Li and R. Horaud, “Multichannel speech enhancement based on time-frequency masking using subband long short-term memory,” in _2019 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA)_. IEEE, 2019, pp. 298–302. * [22] X. Li and R. Horaud, “Narrow-band deep filtering for multichannel speech enhancement,” _arXiv preprint arXiv:1911.10791_ , 2019. * [23] E. A. Habets, I. Cohen, and S. Gannot, “Generating nonstationary multisensor signals under a spatial coherence constraint,” _The Journal of the Acoustical Society of America_ , vol. 124, no. 5, pp. 2911–2917, 2008. * [24] D. Mirabilii and E. A. Habets, “Simulating multi-channel wind noise based on the corcos model,” in _2018 16th International Workshop on Acoustic Signal Enhancement (IWAENC)_. IEEE, 2018, pp. 560–564. * [25] H. Erdogan, J. R. Hershey, S. Watanabe, M. I. Mandel, and J. Le Roux, “Improved mvdr beamforming using single-channel mask prediction networks.” in _Interspeech_ , 2016, pp. 1981–1985. * [26] X. Anguera, C. Wooters, and J. Hernando, “Acoustic beamforming for speaker diarization of meetings,” _IEEE Transactions on Audio, Speech, and Language Processing_ , vol. 15, no. 7, pp. 2011–2021, September 2007. * [27] E. A. Habets, “Room impulse response generator,” _Technische Universiteit Eindhoven, Tech. Rep_ , vol. 2, no. 2.4, p. 1, 2006. * [28] E. Hadad, F. Heese, P. Vary, and S. Gannot, “Multichannel audio database in various acoustic environments,” in _2014 14th International Workshop on Acoustic Signal Enhancement (IWAENC)_. IEEE, 2014, pp. 313–317. * [29] K. Kinoshita, M. Delcroix, S. Gannot, E. A. Habets, R. Haeb-Umbach, W. Kellermann, V. Leutnant, R. Maas, T. Nakatani, B. Raj _et al._ , “A summary of the reverb challenge: state-of-the-art and remaining challenges in reverberant speech processing research,” _EURASIP Journal on Advances in Signal Processing_ , vol. 2016, no. 1, p. 7, 2016. * [30] J. S. Garofolo, L. F. Lamel, W. M. Fisher, J. G. Fiscus, D. S. Pallett, and N. L. Dahlgren, “Darpa timit acoustic phonetic continuous speech corpus cdrom,” 1993. * [31] A. W. Rix, J. G. Beerends, M. P. Hollier, and A. P. Hekstra, “Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs,” in _2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221)_ , vol. 2. IEEE, 2001, pp. 749–752. * [32] C. H. Taal, R. C. Hendriks, R. Heusdens, and J. Jensen, “A short-time objective intelligibility measure for time-frequency weighted noisy speech,” in _2010 IEEE International Conference on Acoustics, Speech and Signal Processing_ , 2010, pp. 4214–4217. * [33] E. Vincent, R. Gribonval, and C. Fevotte, “Performance measurement in blind audio source separation,” _IEEE Transactions on Audio, Speech, and Language Processing_ , vol. 14, no. 4, pp. 1462–1469, 2006.
arxiv-papers
2021-07-27T05:03:18
2024-09-04T03:07:20.576040
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Siyuan Zhang and Xiaofei Li", "submitter": "Siyuan Zhang", "url": "https://arxiv.org/abs/2107.12601" }
2107.12602
# Moving efficiently through a crowd: a nature inspired traffic rule Danny Raj M [email protected] Department of chemical engineering, Indian Institute of Science Bangalore, India Kumaran V [email protected] Department of chemical engineering, Indian Institute of Science Bangalore, India ###### Abstract In this article, we propose a traffic rule inspired from nature, that facilitates an elite agent to move efficiently through a crowd of inert agents. When an object swims in a fluid medium or an intruder is forced through granular matter, characteristic flow-fields are created around them. We show that if inert agents, made small movements based on a traffic rule derived from these characteristic flow-fields, they efficiently reorganize and transport enough space for the elite to pass through. The traffic rule used in the article is a dipole-field which satisfactorily captures the features of the flow-fields around a moving intruder. We study the effectiveness of this dipole traffic rule using numerical simulations in a 2D periodic domain, where one self-propelled elite agent tries to move through a crowd of inert agents that prefer to stay in a state of rest. Simulations are carried out for a wide range of strengths of the traffic rule and packing density of the crowd. We characterize and analyze four regions in the parameter space—free-flow, motion due to cooperation, frozen and collective drift regions—and discuss the consequence of the traffic rule in light of the collective behavior observed. We believe that the proposed method can be of use in a swarm of robots working in constrained environments. ###### pacs: ## I Introduction As population increases, so does the average number of vehicles on roads. This leads to large commuting times, traffic jams, unsafe driving conditions etc. that makes traveling on road quite frustrating. In densely populated countries, where the throughput of traffic is high, lane-flow is often not enforced: in order to use up the extra space available on the roads. This is particularly the case in most roads in India where the traffic is dense and heterogeneous (consisting of two, three, four wheeler and sometimes even long trucks). In these dense-traffic flows, it is not uncommon for emergency vehicles like ambulances, rushing to a hospital with a patient, or a fire- rescue mobile speeding towards an accident zone, to be slowed down considerably or even get stuck in the traffic. Delays in reaching the spot, could mean life or death in cases depending on the severity of the need of the emergency service. Roadway-infrastructures that are in place in developing countries are not ambulance friendly, resulting in a bottle-neck for the health servicesR (2014); Menezes (2016); Sharma (2016); Service (2017). Nevertheless, a skilled ambulance driver tries to maneuver through the crowd, while the vehicles around the ambulance try to make small movements to make enough space for the ambulance to move through. From the perspective of traffic management, one might ask: how should the vehicles coordinate and move to maximize the mobility of the ambulance? A common solution that drivers resort to under such circumstances is to create an empty lane in front of the ambulance, wide enough to allow it to pass through. This is done with the vehicles moving to the sides or away from the ambulance. However, this is possible only for the case where the density of the traffic is small enough for the vehicles to make space for an extra lane. When densities are high, ambulances often remain stuck, waiting for the traffic to be released at a nearby junctionSundar _et al._ (2015) (a behaviour which is also observed in experiments with pedestrians who anticipate and respond to an intruderNicolas _et al._ (2019)). How then should vehicles move under dense traffic conditions? Is there a traffic rule that the vehicles can follow to make small coordinated movements such that the re-arrangement creates enough space for the ambulance to pass through? Here, a traffic rule, refers to the movement strategy that a vehicle can follow; typically a function of the state of the surrounding traffic and the state of the vehicle with priority. #### Motion in crowded environments: In search of a traffic rule that maximizes the mobility of the ambulance (elite agent), we turn to the several known natural and artificial systems where we find motion in crowded environments. Swimmers move through a fluid by displacing the fluid around them van Houwelingen _et al._ (2019); the size/mass of the swimmer (even a micro-swimmer) is several orders of magnitude greater than the molecules of the fluid that are displacedSpagnolie and Lauga (2012). An example with similar features, where the sizes are comparable, can be found in the field of granular physicsCandelier and Dauchot (2010); Kolb _et al._ (2014). A solid intruder is driven at a constant force or velocity, through a granular medium that is either at rest or under steady vibration. Grains are displaced locally around the intruder and the resultant dynamics leads to fluctuations in the velocity of the intruder or the force required to maintain the same velocity. This constitutes the field of active micro- rheology where the local structure of the medium is characterized from the measured fluctuations. In addition, when the intruder used, has a structural asymmetry like in a tapered rod (fore-aft), the intruder motion in a vibrated granular bed is spontaneous due to the difference in rate of collisions between the front and the rearKumar _et al._ (2014). Motion of these rods are mediated via consistent re-arrangement of grains around the rod as it passes through. When many rods are used, the grain re-arrangement around each of the rods can result in long range interactions between other rods, that can give rise to flocking. Intruder motion through granular medium results in strong re-arrangements of the inert grains around the intruder. With increasing density, intruder-motion undergoes a fluidization transition from smooth to intermittent motion before finally exhibiting jamming. Another interesting example of motion through a crowded environment is the experiments of Tennenbaum et al Tennenbaum _et al._ (2016), where they study the rheology of a suspension of fire ants. These ants under low stress can interlock with its neighbors to exhibit a solid like behavior and then open-up under the application of a high loading to behave more fluid-like, exhibiting a non-Newtonian behavior. When a heavy object is placed on top of a suspension of army ants packed in a column, they start to open up their inter-lock and facilitate the motion of the heavy object through the dense suspension. One would notice that the motion of ants are in such a way that they move away from the front of the object while continuously filling up its wake. These ants exhibit motion to allow the passage of the heavy object. #### Grains and traffic : There are many differences between grains and vehicles that one should have in mind before attempting to transfer ideas from granular physics to traffic dynamics. Vehicles have a heading direction: movement is along the direction in which the vehicle has oriented or its reverse; vehicles turn to change its direction. Grains, on the other hand, do not have such a heading and they flow or move in the direction where the force acts. Also, typical traffic scenarios exhibit non-reciprocity in the inter-agent force: when B approaches A from behind, only B is expected to slow down without any change in the behavior in AHelbing (2004). That is, the forces between two nearby agents A and B are not equal and opposite $(\mathbf{F}_{A-B}\neq\mathbf{F}_{B-A})$. Since, grains do not have this heading direction which is necessary to define what the front and back of an agent is, we do not consider this feature in the model presented in this article. The solution to the problem of moving through a crowd is non-obvious even for the case where the agents move like grains. In addition to being a simpler starting point, it bears relevance to a system where the agents are capable of movement in all directions, operated in a constrained environment (like drones). Hence, in the remainder of the article, we focus our attention to agents that do not have an orientation and investigate the problem of identifying and evaluating the traffic rule that an inert crowd of agents can follow to facilitate large movement of an elite agent. ## II Model ### II.1 Deriving a nature-inspired traffic rule In granular physics (and other complex flows too), one can characterize the micro-structure of the granular medium and its response to local stress, by observing the motion of an intruder through the medium Squires and Brady (2005); KHAIR and BRADY (2006); Wilson _et al._ (2009); Wilson and Poon (2011); Reichhardt and Reichhardt (2015); Zia (2018). By posing a problem where we search for a traffic rule that maximizes the mobility of the intruder or elite (objective), we are in fact solving an inverse problem where our interest is in determining the optimal microrheology of the crowd. An intruder driven through a granular medium generates a characteristic flow of grains around it, which can be visualized by averaging the particle velocities over time. It is a flow-field with a source-sink like feature due to the emptying of grains from the frontal region of the intruder while simultaneously filling its rear end (fig 6b in ref Candelier and Dauchot (2010)). A simple functional expression that can capture the trend qualitatively is a dipole field, let’s call this $U$. Note that the velocity fields observed in real granular flow scenarios do not necessarily have a $1/r^{2}$ dependence or a fore-aft symmetric decay. Figure 1: Dipole field ($U(\mathbf{r}_{j})$ as in Eq 1), plotted around the elite agent and the directions of the force and the resultant motion of the inert agents according to the dipole traffic rule, when $\mathbf{v}_{e}<\mathbf{v}_{0}$. The arrows here represent the direction and not the magnitude (which scales as $\frac{1}{r^{2}}$, where $r$ is the distance of the inert from the elite). The vector displacement w.r.t. the elite, $\mathbf{r}_{j}$, is marked for a single inert agent. #### Traffic rule: One can define a traffic rule based on this dipole field: i) imagine this fictitious field $U$ to be around the elite agent (e), ii) inert agents (j) respond to this field through a force on them proportional to $U$ evaluated at the position of the inert. $U$ is given as in Eq 1 (corresponding to two- dimensional flows) where, $\mathbf{v}_{0}$ is the desired velocity of the elite agent whose instantaneous velocity is $\mathbf{v}_{e}$, $\mathbf{r}_{j}$ is the position vector of the inert with respect to the elite and $r=\|\mathbf{r}_{j}\|$ (as illustrated in figure 1). $\displaystyle\mathbf{U}(\mathbf{r}_{j})=\frac{(\mathbf{v}_{e}-\mathbf{v}_{0})}{r^{2}}.\Bigg{[}\boldsymbol{\delta_{ij}}-2\frac{\mathbf{\mathbf{r}}_{j}\otimes\mathbf{\mathbf{r}}_{j}}{r^{2}}\Bigg{]}$ (1) $\displaystyle\text{where, }\mathbf{r}_{j}=\mathbf{x}_{j}-\mathbf{x}_{e}$ Note that when the elite agent travels at the desired velocity, the strength of the dipole field drops to zero. This way, the motion of the inert is induced by the traffic rule only when the elite is unable to move in its desired velocity, thereby minimizing the need for the motion of inert whenever possible. From the perspective of an optimization formulation, this choice of implementation of the dipole traffic rule, implicitly encodes for two objectives simultaneously: maximising the mobility of the elite agent at minimal or no movement of the inert agents. ### II.2 Particle based model Agents in traffic flows can be modeled in a way similar to grains in granular flows. A discrete particle approach to granular matter, involves modeling grains as particles with finite size, defined by the positions and velocities of their center of masses. Their positions are updated based on the instantaneous velocities, which evolve based on Newton’s second law of motion. Hence to solve this problem, a complete knowledge of the different forces on the grain is necessary: external, inter-particle, particle-boundary, etc. All the forces experienced by grains have a physical origin that include friction, inertia, gravity, incompressibility etc. While agents in traffic flow exhibit some of these characteristics like inertia, impenetrability etc., their motion is primarily behavioral in nature—where agent tries to move with a velocity it desires or avoids collision with neighbors etc. This behavioral maneuvering can be explained with what are called, social forcesHelbing and Molnár (1995). We model agents as finite sized, circular particles (with radius $R$) moving on a 2D plane under the influence of social forces. Eq 2 shows how the position of an agent $\mathbf{x}_{j}$ is updated based on the knowledge of its velocity $\mathbf{v}_{j}$. Eq 3 is the Newton’s second law with the social forces for the agents. Agents experience three different types of forces in our model. i) restitution force that always attempts to bring the agent to its desired state of rest or motion ii) collision-avoidance force that prevents collision between agents and the iii) dipole force inspired from nature, which induces or coordinates the motion of inert around the elite. $\frac{d\mathbf{x}_{j}}{dt}=\mathbf{v}_{j}$ (2) $m_{i}\frac{d\mathbf{v}_{i}}{dt}=-m_{i}\frac{\mathbf{v}_{i}}{\tau}+\sum_{\forall j\neq i}\mathbf{F}_{ij}^{r}+K\mathbf{U}_{i}$ (3a) $m_{e}\frac{d\mathbf{v}_{e}}{dt}=m_{e}\frac{\mathbf{v}_{0}-\mathbf{v}_{e}}{\tau}+\sum_{\forall j\neq e}\mathbf{F}_{ej}^{r}$ (3b) $\displaystyle\mathbf{F}_{ij}^{r}=\begin{cases}-\gamma_{r}(\mathbf{d}_{ij}-2R)^{-(B+1)}\hat{\mathbf{d}}_{ij}&|\mathbf{d}_{ij}|<l_{cr},\mathbf{\dot{d}}_{ij}>0\\\ 0&\mbox{otherwise}\end{cases}$ (3c) $\displaystyle\text{where, }\mathbf{d}_{ij}=\mathbf{x}_{i}-\mathbf{x}_{j}\text{ and }\mathbf{\dot{d}}_{ij}=\mathbf{v}_{i}\cdot\mathbf{d}_{ji}+\mathbf{v}_{j}\cdot\mathbf{d}_{ij}$ The first terms in the R.H.S. of Eq 3a and 3b , are the restitution social force for the inert and elite respectively, similar to that used in refHelbing _et al._ (2000a, b). In the absence of all other forces, the inert agents will stop moving while an elite agent will move with a velocity $\mathbf{v}_{0}$, in $\mathcal{O}(\tau)$ seconds. The motivation of the agents to move in certain directions with a preferred speed, is what makes the system of agents active; energy is pumped into the system through this term. The second term is the inter-agent interaction force, that brings in the agent’s reaction to a nearby neighbor, to avoid collision. The third term (only seen in Eq 3a)), incorporates the effect of the traffic rule explained in section II.1. The dipole field is conceptualized as a force, $\mathbf{F}_{dipole}=K\mathbf{U}$, where $K$ is the strength of the dipole force ($K=0$ represents the case with no traffic rule). The motion of the elite agent is modeled in a similar fashion, as shown in Eq 3b. The only differences are the desired velocity $\mathbf{v}_{0}$ instead of the state of rest and the absence of the traffic rule. In the swarm robotics community, the approach to modeling collective behavior discussed here, is termed as physicomimetics Spears _et al._ (2005). Agents avoid collisions with other agents by responding to their approach. $\mathbf{F}_{ij}^{r}$ characterizes the force between agents $i\text{ and }j$ when they are in close proximity and approaching each other. The nature of the force as defined in Eq 3c does not allow the circular agents (with area $2\pi R^{2}$) to overlap: force $\to\infty$ when $|\mathbf{d}_{ij}|\to 2R$. The dependence of the magnitude of force on the distance between agents $|\mathbf{d}_{ij}|$ is defined by the parameter $B$. If the value of $B$ is very high, the interaction between agents tends to become hard-sphere, like in a granular medium. However, in traffic flow scenarios, one would expect the agents to respond to approaching agents in advance and slow down to prevent a collision (due to the behavioral origin of the social force). To model such a behavior, one has to choose a smaller value for $B$, but care should be taken to eliminate long range correlations that may arise. Hence, we employ $B=2$ in our simulations (similar to Helbing _et al._ (2000b)), and use a cut-off length $l_{cr}=3R$, to make an agent interact only with its immediate neighbors. In addition to proximity, we consider this force only when agents approach each other, i.e. $\mathbf{\dot{{d}}}>0$. As a result, agents moving with the same velocity will not experience a force even if they are in close proximity, allowing them to have a heterogeneous density field in a crowded system. If the interaction had been purely repulsive and not dependent on whether or not the agents approached each other, then the interaction would have attempted to smooth-out the density variations in the system. This feature in the interaction is common in real dense traffic, where agents respond to neighbors only when they approach. An agent decelerates slowly when the approaching agents are far away, a faster response when they are in close proximity and no response when not approaching. When the agents are crowded, in a slowly drifting jammed state, they do not try to move away from each other, but only move in desired direction while avoiding collisions. ## III Results and Discussion Figure 2: The density–dipole-field strength ($K-\rho$) parameter space can be divided into four regions: I – free flow, II – motion with traffic rule, III – frozen and IV – collective drift. Thick lines – total mobility and thin lines – only due to collective drift. To test the effectiveness of the dipole traffic rule, simulations are carried out for a range of packing densities $\rho\in(0.2,0.85)$ and dipole strengths $K\in[0,50]$, in a 2D periodic domain (unit cell width and length, $W\times L$), consisting of $150$ agents which include $1$ elite agent (other system sizes are also attempted to make sure that there is no loss of generality). Two types of initial configurations of agents are used in our simulations; a regular triangular and a disordered random packing (obtained from Specht (2018)). Unless specified, the results shown in the article are for the case of regular initial arrangements. The initial configurations are subject to fluctuating forces with collision avoidance to perturb the agents from any symmetric arrangements. The resultant assembly of agents then serves as the initial condition for the simulations with the traffic rule. The desired direction and speed of the elite agent are set as $-x$ direction and unity respectively, as shown in Eq 4. $\mathbf{v}_{0}=\mathbf{e}_{-x}$ (4) The parameters, relaxation time scale $\tau$ and the mass $m_{i}\text{ and }m_{e}$ of the agents, are chosen to be unity without loss of generality. The dynamics of the traffic problem depends on the parameter $\gamma_{r}$ which is the strength of the inter-agent interaction. However, the qualitative features of the results presented in the article are expected to remain unchanged. Based on the dynamics of traffic flow, we identify four regions in the parameter space, highlighted in figure 2 (see ESI for video). 1. 1. A free-flow region corresponding to low packing densities, where motion of the elite is possible even in the absence of the dipole force (hashed region, marked as I), 2. 2. Motion under cooperation region where the dipole traffic rule is essential for movement of the elite (region II), 3. 3. Frozen region where motion of the elite is insignificant (thick solid lines mark the different contours of mobility, in region III) and 4. 4. Collective drift region (IV) where the local frozen micro structure determines the flow direction and speed of drift of the entire assembly (thin solid lines mark the mobility due to drifting, which is found in some parts of region II as well). In what follows, we analyze the movement of the elite in these four different regions in the parameter space. We compute the mobility of the elite, and probe into the movement of the inert agents in light of the collective phenomena exhibited. ### III.1 Free flow regime When packing densities are less than approximately $0.5$, the elite agent forces its way through the inert crowd even in the absence of the dipole traffic rule. As the elite travels through the crowd, it encounters inert agents that behave as obstacles to the motion of the elite, thereby reducing its mobility $\mathcal{M}$, defined as the time-averaged velocity of the elite agent in the principle direction of motion (see, Eq 5). $\mathcal{M}=\frac{\int_{0}^{T}{\mathbf{v}_{e}\cdot\mathbf{e}_{-x}dt}}{T}\\\ $ (5) The mobility $\mathcal{M}$ quantifies the net-movement in the direction of $\mathbf{v}_{0}$, averaged over time. In addition to slowing down, interaction with the inert results in drifting $\mathcal{D}$ along the direction perpendicular to the principle direction of motion. We define $\mathcal{D}$ as the average absolute velocity in that direction as shown in Eq 6. $\mathcal{D}=\frac{\int_{0}^{T}{|\mathbf{v}_{e}\cdot\mathbf{e}_{y}|dt}}{T}$ (6) The drift $\mathcal{D}$ quantifies the average excursions of the elite in a direction transverse to that of the intended one ($\mathbf{e}_{\pm y}$). When the elite agent travels in the direction of $\mathbf{v}_{0}$, at all time, $\mathcal{D}$ takes a value of $0$ and $\mathcal{M}$ takes the value of $1$. Figure 3: Mobility characteristics in the free-flow region. (a) - Mobility $\mathcal{M}$ as a function of $K$ for different values of the density; (b) - Drift $\mathcal{D}$ as a function of $K$ for different values of the density; (c) - Normalized drift and mobility $\bar{\zeta}$ as a function of K for different values of density, collapses onto a single curve In the presence of the traffic rule, the inert agents move around the elite, resulting in a reduction in the interactions between the elite and the inert agents and thereby reducing the resistance. As a result, with increasing $K$, mobility increases (with $\mathcal{M}|_{K\to\infty}\to 1$, see figure 3 (a)). However, drifting exhibits a non-monotonic behaviour with $K$. We find that $\mathcal{D}$ initially increases and then it decreases with $K$ as $\mathcal{D}|_{K\to\infty}\to 0$ (see figure 3(b)). This is because, in the absence of any traffic rule $(K=0)$, motion of the elite in the principle direction is strongly reduced due to head-on collisions with the neighbouring inert agents, which subsequently reduces the total movement in the perpendicular direction. However, the ratio of drift to mobility ($\mathcal{D}/\mathcal{M}$), is found to be monotonically decreasing. We observe the normalized mobility and drift-mobility ratio, $\bar{\mathcal{M}}$ and $\bar{(\frac{\mathcal{D}}{\mathcal{M}})}$ computed as in Eq 7, to be invariant to packing density, depending only on $K$ as, $\big{[}1-\exp\big{(}{-aK^{b}\big{)}}\big{]}$ (where $a,b=0.5$) in the free- flow regime. $\displaystyle\bar{\zeta}(K)=\frac{\zeta(\rho,K)-\zeta(\rho,0)}{{\zeta(\rho,\infty)}-\zeta(\rho,0)}$ (7) $\displaystyle\text{where, }\zeta=\frac{\mathcal{D}}{\mathcal{M}}\text{ or }\mathcal{M}\text{ and }\rho\lesssim 0.5$ Figure 4: Crowd-characteristics at high densities, where motion is possible only with the dipole traffic rule. (a)- $q_{6}$ order parameter for the neighbors around the elite agent as a function of time for $K={0,12}$ of $\rho=0.73$. We observe fluctuations in the order parameter when the traffic rule is in place; (b)- Time-averaged $q_{6}$ order parameter as a function of distance from the elite $(r_{ej})$ for $K={0,12}$ of $\rho=0.73$, shows melting of the assembly close to the elite; (c)- Local crowd configuration around the elite for the case without any traffic rule; (d)- Dynamically evolving local crowd configuration around the elite as the dipole traffic rule coordinates the re-arrangement of the inert agents to facilitate the motion of the elite. ### III.2 Frozen vs motion with traffic rule As the density of packing is increased $(>0.5)$, the motion of the elite agent is strongly constrained and the system eventually becomes frozen (which corresponds to $\mathcal{M}\leq 0.075$). When completely frozen and in the absence of the traffic rule, the entire system consisting of both the elite and the inert, drifts with a velocity $\mathbf{v}_{i}=\mathbf{v}_{0}/N$, and with a corresponding $\mathcal{M}=1/N$ due to the forcing of the elite agent. The arrangement of the agents around the elite becomes compact and triangular. One could evaluate the $q_{6}$ order parameter, defined as $\big{\langle}\sum_{k\in\eta_{j}}\exp(-6\theta_{jk}\rm{i})\big{\rangle}_{j}$, where $\eta_{j}$ consists of the $6$ nearest neighbours of the agent $j$. When the arrangement around an agent is triangular (close packed), the order parameter takes the value of unity. When the assembly is frozen, the corresponding $q_{6}$ averaged over all the agents, becomes $\approx 1$. Presence of the dipole traffic rule, does not guarantee motion of the elite as the system may still be frozen. As the strength $K$ of the dipole force is increased, the inert agents around the elite begin to make enough movements, to give rise to the motion of the elite. If one were to compute the $q_{6}$ order parameter for the inert agents, just around the elite agent, it is quite evident that the crystallized agents melt, to make the motion of the elite agent possible as seen in figure 4a. We observe periodic oscillations in the $q_{6}$ parameter as the elite moves through the inert crowd, when the dipole rule is turned on. In contrast, when the traffic rule is not in place, the $q_{6}$ parameter rises to a value close to unity and stays unchanged. We also observe that the melting is local. A time-averaged $q_{6}$ order parameter, plotted as a function of distance from the elite $r_{ej}$ (see, figure 4b) shows, a reduced $(\langle q_{6}\rangle_{t})$ near the elite which increases monotonically to higher values far away from the elite in the presence of the traffic rule. This suggests that the change in configuration of the agents that facilitates motion of the elite is primarily local in nature. To understand how the changes in local configuration facilitates the motion of the elite, we examine the position and motion of the immediate neighbours of the elite agent at various time points, as the elite cruises through the inert crowd. Figure 4c, shows the compact triangular arrangement of the inert around the elite when the assembly is frozen. Without the traffic rule, the elite tries to move forward and very soon results in tight arrangements that restricts any further motion (i and ii in figure 4a, c). On the other hand (see figure 4d), when the dipole traffic rule is switched on, the agents initially form a compact configuration which arises as a result of the forward motion of the elite through the crowd. Once this motion is no longer possible, due to the local compaction of the assembly, the inert agents begin to slide around the elite (due to the traffic rule). This gives rise to more of the inert agents in the rear of the elite than its front, breaking the fore-aft symmetry and resulting in a smaller value of $q_{6}$ parameter (see configurations 1 to 3 in figure 4a, d). As the inert moves around the elite, it opens up space in front of the elite and introduces new neighbours for the elite to interact with changing the immediate configuration around it. Once sufficient space is created, the elite agent quickly moves to the new configuration (4-5 transition in figure 4a, d) to result in another compacted local arrangement and the process continues. One should note that several other re-arrangement events as the elite moves, and periods of drifting can make the configuration change much more complicated. However, the series of steps described in figure 4d conveys the major events that occur during the motion of elite in the presence of a traffic rule at high densities. Figure 5: Micro-structure of the frozen assembly (top panels) and the corresponding drift direction (lower panels) as observed in the numerical simulations and that which is calculated based on Eq 9c using varying amounts of information of the micro-structure (agents within $C_{1},C_{2},C_{3}$, all $N$ agents and including their images). ### III.3 Collective drift At very high packing densities, when the assembly of agents is frozen, the only motion expected is a slow drift, where the elite agent pushes the all the agents with a velocity $\|\mathbf{v}_{k}\|=\frac{\|\mathbf{v}_{0}\|}{N}$; this is indeed observed when $K$ is small. However, interestingly at high values of $K$, we observe a more significant drift (in the direction $\mathbf{e}_{-x}$, for regularly packed initial configurations) where the $\|\mathbf{v}_{k}\|\gg\frac{\|\mathbf{v}_{0}\|}{N}$. If the drifting observed is due to the dipole traffic rule, then the features of drifting, namely the magnitude and direction of the drift velocity, should be a function of the local packing, or the frozen microstructure. Here, the microstructure of the frozen assembly refers to the relative displacement of the inert agents around the elite: $\mathbf{r}_{j}$ (as defined in Eq 1). Simulations with a randomly packed assembly of agents (initial configuration), reveals that the direction can be arbitrary and dependent on the arrangement of the inert agents around the elite. When the density of packing is such that the system exhibits intermittent dynamics, we observe drifting to occur during the periods when the elite is caged and every time the cage breaks and the elite moves to a new one, there is major restructuring of the inert agents around the elite which results in the emergence of a new drift direction every time (see ESI for video). To understand the relation between the steady state drift velocity $\mathbf{v}_{s}$ and the microstructure of the frozen assembly, we can go back to the governing equations Eq 3a and 3b. Assuming steady state and frozen-‘ness’ of the assembly—which means that the the direction of the drift is a constant and there is no change in the microstructure—one can derive a relation between $\mathbf{v}_{s}$ and $\mathbf{I}_{ij}$. $\mathbf{I}_{ij}=\boldsymbol{\delta_{ij}}-2\frac{\mathbf{\mathbf{r}}_{j}\otimes\mathbf{\mathbf{r}}_{j}}{r^{2}}$ (8) Here the tensor $\mathbf{I}_{ij}$, is purely a function of the frozen microstructure $\mathbf{r}_{j}$, and quantifies the contributions of the local arrangement on the dipole traffic rule (Eq 8 is same as the term within the square brackets in Eq 1). When the assembly is frozen, the structure of the assembly remains unchanged. Hence, we can neglect the force between agents (collision avoidance) and sum all the forces up as shown in Eq 9a, where $\mathbf{v}_{i}$ becomes the drift velocity $\mathbf{v}_{s}$ (note: in our study we have assumed $m_{e}=m_{i}=1$). Substituting Eq 1 in 9a, gives rise to Eq 9b. With further simplification one can arrive at Eq 9c which shows the relation between the frozen crowd-microstructure and the drift velocity. $\sum_{\forall j\neq e}\Big{(}K\mathbf{U}_{j}-\frac{\mathbf{v}_{s}}{\tau}\Big{)}+\frac{\mathbf{v}_{0}-\mathbf{v}_{s}}{\tau}=0$ (9a) $\sum_{\forall j\neq e}\Big{(}K(\mathbf{v}_{s}-\mathbf{v}_{0})\mathbf{I}_{ij}-\frac{\mathbf{v}_{s}}{\tau}\Big{)}+\frac{\mathbf{v}_{0}-\mathbf{v}_{s}}{\tau}=0$ (9b) $\mathbf{v}_{s}=\mathbf{v}_{0}\cdot\Big{(}K\tau\sum_{\forall j\neq e}\mathbf{I}_{ij}-\delta_{ij}\Big{)}\Big{(}K\tau\sum_{\forall j\neq e}\mathbf{I}_{ij}-N\delta_{ij}\Big{)}^{-1}$ (9c) When the strength of the traffic rule is very high, $K\to\infty$, $K\tau\sum_{\forall j\neq e}\mathbf{I}_{ij}\gg N\delta_{ij}>\delta_{ij}$, which results in $\mathbf{v}_{s}=\mathbf{v}_{0}$. Even if the elite is not able to make a way through the crowd, the elite can achieve its desired direction and speed through collective drift. It is interesting to find that the effect of local microstructure becomes irrelevant for very large $K$ and desired motion $\mathbf{v}_{0}$ of the elite is forced on every agent in the system. Similarly, when $K\to 0$, we recover the motion of a frozen crowd with just the elite agent propelling $\mathbf{v}_{s}=\frac{\mathbf{v}_{0}}{N}$. For intermediate values of $K$, where the effect of microstructure is important, it is interesting to ask how much of this microstructure, around the elite, actually contributes to the drifting direction and magnitude. To answer this question, we analyze the $r$ and $\theta$ dependence of the dipole force. Let’s begin with the $r$-dependence. Agents far away experience only a smaller magnitude of force $\sim\frac{1}{r^{2}}$. However, the number of agents at a distance $l$ from the elite has an $r^{2}$ dependence. Hence the total force would be $r^{2}\times\frac{1}{r^{2}}=\mathcal{O}(1)$. This suggests that drifting depends on the microstructure of the entire assembly. Turning to the $\theta$-dependence, for the form of the dipole force used (Eq 1), the integral around the elite at a distance $l$ from it, is zero $\big{(}\int_{\theta}\mathbf{U}_{\mathbf{r}_{j}=l}d\theta=0\big{)}$. However, because of the granularity of the agent assembly around the elite (since inert agents are comparable in size to the elite), and the absence of symmetry (due to the perturbations given to the initial conditions), the $\theta$ positions around the elite are not well represented. As a result, the integral does not vanish $(=0)$ giving rise to a non-zero value for sum of dipole forces. However, as $l$ increases, agents positions become less granular and the integral may take smaller values. This is sensitively dependent on how the agents are frozen around the elite. Only when the distance is much larger than the length scale in the system $l\gg R$, the integral might vanish. This large $l$, would correspond to a system size $\gg(10\times N)$, much greater than that considered in this work. To understand the effect of microstructure further, we turn to numerical simulations. Once the agent-assembly is frozen, for high densities, one can compute the $I_{ij}$ for each agent in the frozen assembly, and estimate the drift velocity $\mathbf{v}_{s}$ from Eq 9c. Instead of using all the information of the inert-agent positions, we compute the $\mathbf{v}_{s}$ from partial information of the microstructure, with only agents around the elite, say $r=C_{k}$. The different distances $C_{k}$ considered are $C_{1}=3R$, $C_{2}=6R$, $C_{3}=\frac{1}{2}W$ and $C_{k}>L$ corresponding to the entire microstructure. In addition, we also consider the effect of the images of the elite for $C_{k}>L$. Figure 5 shows the drift velocity of the assembly observed in simulation and that which is computed from both the partial and complete knowledge of the frozen microstructure. The three configurations presented are exemplary of the drifting frozen assemblies observed in our simulations. We see that $\mathbf{v}_{s}$ computed from the microstructure information withing $C_{1}$ seldom predicts the correct direction or the magnitude. Clearly as $C_{k}$ increases, the predictions become better. Deviations from the observed drifting, even for large values of $C_{k}$, can be attributed to the departure from the assumptions made to perform these calculations: steady- state and frozen-ness of the assembly. It is interesting to note the large variation in the observed drifting even among the select few examples in figure 5. When comparing figures 5 (a) and (b) (regular packed initial configurations), we observe an overall collective drift in the direction that the elite desires to move in. However, we observe that speeds of drifting differ by a factor of $2$. On the other hand, when one begins with a disordered assembly where the heterogeneity in the density of packing and the corresponding variation in the microstructure is high, both the direction and magnitude can be very different (as in figure 5 (c)). One should note that it is impossible to predict the direction of drifting from only a visual observation of the assembly of the inert crowd. The 2D periodicity of the domain allows the agents to drift in any direction. If the assembly was 1D periodic (say in $\mathbf{e}_{\pm x}$, parallel to the desired direction of the elite), bound by walls in the perpendicular direction ($W\mathbf{e}_{\pm y}$), drifting would have been constrained to $\mathbf{e}_{\pm x}$ directions. This is because the walls, by definition, are immovable and hence are capable of absorbing forces in the $\mathbf{e}_{y}$ direction. ### III.4 Mobility of the elite The mobility of the elite agent computed from Eq 5 includes both, i) the motion of the elite due to re-arrangement of the inert agents $\mathcal{M}_{e}$, and ii) the drifting of the entire assembly when frozen, $\mathcal{M}_{d}$, both in the presence and absence of the traffic rule. To compute $\mathcal{M}_{d}$, we analyze the variations in the total area of the first Voronoi neighbors of the elite agent. The time-stamps $t_{d}$ corresponding to drifting of the assembly are identified (corresponding to negligible or no variations in the Voronoi areas) and the quantity $\langle\mathbf{v}_{e}\cdot\mathbf{e}_{x}\rangle\Big{|}_{t\in t_{d}}$ is evaluated at $t_{d}$, to determine the mobility $\mathcal{M}_{d}$. Previously in figure 2, where the four distinct regions are marked, we show two sets of contours: the thick lines belong to $\mathcal{M}$, the total mobility and the thin ones are $\mathcal{M}_{d}$ that are only due to collective drifting. Any mobility of the elite in region IV is only due to $\mathcal{M}_{d}$, whereas in high-K part of region II, mobility is due to both $\mathcal{M}_{d}$ and $\mathcal{M}_{e}$. Hence, one can subtract the contribution of $\mathcal{M}_{d}$ from the total mobility $\mathcal{M}$, to compute $\mathcal{M}_{e}$. Figure 6, shows the contours of $\mathcal{M}_{e}$. At a certain crowd-density $\rho_{0}$, in the absence of the traffic rule $K=0$, the elite agent would have a corresponding mobility $\mathcal{M}_{e}=\mathcal{M}_{0}$. If the density of the crowd were to increase, so will the dipole strength $K$ required to maintain the same mobility $\mathcal{M}_{0}$. However, the crowd cannot be packed to a density greater than the maximum $\rho_{m}=\frac{\pi}{2\sqrt{(3)}}$.,which also means that close to this value of packing density no amount of dipole force can facilitate motion of the elite. Hence, we expect $K$ to diverge at $\rho_{m}$, i.e., $\rho\to\rho_{m}$, $K_{c}\to\infty$. This can be captured nicely by the functional form relating $K_{c}\text{ to }\rho$ as shown in Eq 10. $K_{c}=\frac{\alpha}{(\rho_{m}-\rho)^{\beta}}$ (10) For very small values of $\mathcal{M}_{0}\to 0$, the mobility curves start to get dense and can be sufficiently explained by Eq 10 with $\beta$ as high as $\simeq 4$ and $\alpha$ is $\mathcal{O}(10^{-2})$ (the fit is shown as a thick dotted line in figure 6). Figure 6: Contours of the mobility of the elite agent, $\mathcal{M}_{e}$ without any contributions from drifting. The dotted line corresponds to the fit ($\alpha=0.01$ and $\beta=4$) as in Eq 10. Figure 7: Representative trajectories of the inert agents in the crowd. ### III.5 Trajectories of the inert While the primary objective of the traffic rule is to maximise the movement of the elite agent through the crowd, the secondary objective is to achieve the primary at minimum movement of the inert. Hence, it is important to understand how the inert move around the elite to achieve the elite’s mobility. We explore the trajectories formed by the inert agent as the elite moves past them and classify them broadly into five different types. #### Non-intersecting: When there is no traffic rule in place, the elite pushes the inert away as it tries to move through the crowd (at low packing densities). This results in trajectories as shown in figure 7a. #### Intersecting: In the presence of a traffic rule, inert agents respond to the elite agent differently depending on their relative position with respect to elite. An agent in front of the elite is pushed away, while that in its rear position is pulled towards it. Hence, as an elite agent passes by, an inert moves away and then towards the elite, giving rise to trajectories that intersect, like the one seen in figure 7b. Multiple crossings observed in the figure is due to multiple encounters with the elite (as a result of the 2D periodic domain). #### Coiled: When the inert agents are slightly away from the elite in the transverse direction, they exhibit coiled trajectories as shown in figure 7c which results in very minimal displacement to make space for the elite to pass by. #### Trapped agents: In a small range of densities $\sim(0.42,0.55)$ and $K>20$ we observe trapping of inert agents in the sink part of the dipole field of the elite. When densities are lower, the effect of the traffic rule is also low because the elite’s velocity is close to $\mathbf{v}_{0}$ (see Eq 1). However, as the density increases, $\mathbf{v}_{e}$ reduces and consequently, the traffic rule strength becomes higher and affects the motion of agents in the neighborhood significantly—with the inert attracted to the sink and repelled from the source. Inert agents get trapped in the rear end of the elite and follow it as it moves through the crowd. As the density is increased further, the inert experiences more collisions with other inert agents in the crowd which dislodges the inert from the elite’s tail. This phenomenon leads to the formation of long trajectories like the ones shown in figure 7d. From the perspective of the secondary objective of the traffic problem, trapping should be avoided. #### Collective drifting: When the system as a whole exhibits drifting due to the traffic rule (section III.3), we observe all agents to move in a similar manner. Figure 7e, shows how all the inert agents have similar trajectories during drifting. Slight differences could be due to minor re-arrangements that occur while the frozen assembly drifts. Collective drifting fails to fulfil the secondary objective of minimising the movement of the inert. But one should note that in the absence of any drifting, the assembly is frozen and does not fulfil the primary objective of the problem which is to facilitate the motion of the elite. ## IV Conclusions As we slowly enter the age of autonomous vehicles, there is a need to deal with the challenges associated with decentralized-control. Control algorithms in vehicles should not just be designed to avoid collisions, but also react to a time of emergency, like the one described in the introduction of the article—ambulance rushing to the hospital—where there is a need to facilitate motion of the vehicle with priority. Identifying the optimal control strategy for the above problem or any other traffic problem for that matter, can be a very hard problem to solve, since we are dealing with many agents. Hence, swarm engineering has always reached out to bio-inspired methods for answers. The work presented in this article, is an example of a nature-inspired method to the solution of a complex-traffic problem. The traffic rule presented in this article circumvents the use of an optimization approach to scheduling the movement of the inert agents around the elite. However, it implicitly encodes two important objectives that are relevant for the traffic problem: increasing the movement of the elite agent with only minimal movement of the inert agents. #### Summary: We study the problem of movement of an elite agent with priority through an otherwise inert crowd. Taking advantage of the similarities in granular and traffic flows, we propose a solution from the knowledge of the flow fields of grains around an active intruder. We derive a traffic rule that the inert agents can follow and make small movements to allow the passage of the elite agent. The inert agents respond to an imaginary dipole field around the elite and rearrange accordingly to create enough space for the elite to move. We find that depending on the packing density of the crowd and the strength of the dipole field, the parameter space can be divided into different regions with characteristic flows. We show that the motion of the elite with the traffic rule is more efficient than without it. As density increases, the motion of the elite is via the local melting of the crystallized assembly. At even higher densities, where melting is not observed, motion can be due to a collective drifting mechanism, which depends on the local configuration of the inert around the elite. #### Can the rule be used in real Indian traffic scenario?: The traffic rule facilitates the inert agents to move around the elite creating space in front of it and occupy the space already formed at the elite’s wake as it propels forward. It is interesting to note that in real lane-less flows, when an ambulance tries to make its way through a crowd, vehicles in the front of it begin to form denser arrangements, while those at the back readily occupy the empty space in the ambulance’s wake, without giving any opportunity for the transport of the available space from the back to the front of the elite agent—much like the case with no traffic rule in our simulations. This is because, in real vehicular traffic, the maneuver that the inert have to follow according to the traffic rule discussed in this article, is close to impossible to achieve for human drivers under normal conditions. However, it could be a possibility when the entire crowd is in motion, where the inert can simply slow down and drift sideways to occupy the space behind the elite. When the agents are autonomous and self-driving, it may be possible to implement this traffic rule. #### Other problems in swarm robotics: The above idea can be extended to other interesting problems in robotics, namely the movement of a drone or a swarm of them, through an array of obstacles. The problem here, is to figure out the optimal flight path that results in efficient movement of the drones. If a dipole field is assumed to be centered around a perceived obstacle, it will help in guiding the motion of drones around it. In the case of multiple obstacles, a simple superposition of all the fields can essentially provide a possible safe path for the drones. It would be interesting to see how this rule would fare, in a virtual environment in the presence of collision avoidance measures and then eventually test these nature-inspired rules on real swarm robots. ###### Acknowledgements. DRM would like to thank DST INSPIRE faculty award for the funding. ## References * R (2014) S. R. R, “When city traffic halts ambulances,” (2014). * Menezes (2016) N. Menezes, “That elusive key to opening up gridlock for ambulances,” (2016). * Sharma (2016) M. Sharma, “City plights: Stuck between life and death on Delhi’s roads,” (2016). * Service (2017) N. E. Service, “Three ambulances get stuck in Bengaluru traffic,” (2017). * Sundar _et al._ (2015) R. Sundar, S. Hebbar, and V. Golla, IEEE Sensors Journal 15, 1109 (2015). * Nicolas _et al._ (2019) A. Nicolas, M. Kuperman, S. Ibañez, S. Bouzat, and C. Appert-Rolland, Scientific Reports 9, 1 (2019). * van Houwelingen _et al._ (2019) J. van Houwelingen, R. P. Kunnen, W. van de Water, A. P. Holten, G. J. F. van Heijst, and H. J. Clercx, Sports Engineering 22, 1 (2019). * Spagnolie and Lauga (2012) S. E. Spagnolie and E. Lauga, Journal of Fluid Mechanics 700, 105 (2012), arXiv:1211.6996 . * Candelier and Dauchot (2010) R. Candelier and O. Dauchot, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics 81, 1 (2010), arXiv:0909.4628 . * Kolb _et al._ (2014) E. Kolb, P. Cixous, and J. C. Charmet, Granular Matter 16, 223 (2014). * Kumar _et al._ (2014) N. Kumar, H. Soni, S. Ramaswamy, and A. K. Sood, Nature Communications 5, 1 (2014). * Tennenbaum _et al._ (2016) M. Tennenbaum, Z. Liu, D. Hu, and A. Fernandez-Nieves, Nature Materials 15, 54 (2016). * Helbing (2004) D. Helbing, Computational Materials Science 30, 180 (2004). * Squires and Brady (2005) T. M. Squires and J. F. Brady, Physics of Fluids 17, 1 (2005). * KHAIR and BRADY (2006) A. S. KHAIR and J. F. BRADY, Journal of Fluid Mechanics 557, 73 (2006). * Wilson _et al._ (2009) L. G. Wilson, A. W. Harrison, A. B. Schofield, J. Arlt, and W. C. Poon, Journal of Physical Chemistry B 113, 3806 (2009). * Wilson and Poon (2011) L. G. Wilson and W. C. Poon, Physical Chemistry Chemical Physics 13, 10617 (2011). * Reichhardt and Reichhardt (2015) C. Reichhardt and C. J. Reichhardt, Physical Review E - Statistical, Nonlinear, and Soft Matter Physics 91, 1 (2015), arXiv:1409.1586 . * Zia (2018) R. N. Zia, Annual Review of Fluid Mechanics 50, 371 (2018). * Helbing and Molnár (1995) D. Helbing and P. Molnár, Physical Review E 51, 4282 (1995), arXiv:9805244 [cond-mat] . * Helbing _et al._ (2000a) D. Helbing, I. Farkas, and T. Vicsek, Nature 407, 487 (2000a), arXiv:0009448 [cond-mat] . * Helbing _et al._ (2000b) D. Helbing, I. J. Farkas, and T. Vicsek, Physical Review Letters 84, 1240 (2000b). * Spears _et al._ (2005) W. M. Spears, D. F. Spears, R. Heil, W. Kerr, and S. Hettiarachchi, in _Swarm Robotics_ , edited by E. $\backslash$cSahin and W. M. Spears (Springer Berlin Heidelberg, Berlin, Heidelberg, 2005) pp. 84–97. * Specht (2018) E. c. Specht, “Packomania: [section 1] Packings of equal and unequal circles in fixed-sized containers with maximum packing density,” (2018).
arxiv-papers
2021-07-27T05:04:43
2024-09-04T03:07:20.587745
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Danny Raj M and Kumaran V", "submitter": "Danny Raj Masila", "url": "https://arxiv.org/abs/2107.12602" }
2107.12603
11institutetext: Deakin University # Federated Learning Meets Natural Language Processing: A Survey Ming Liu Stella Ho Mengqi Wang Longxiang Gao Yuan Jin He Zhang ###### Abstract Federated Learning aims to learn machine learning models from multiple decentralized edge devices (e.g. mobiles) or servers without sacrificing local data privacy. Recent Natural Language Processing techniques rely on deep learning and large pre-trained language models. However, both big deep neural and language models are trained with huge amounts of data which often lies on the server side. Since text data is widely originated from end users, in this work, we look into recent NLP models and techniques which use federated learning as the learning framework. Our survey discusses major challenges in federated natural language processing, including the algorithm challenges, system challenges as well as the privacy issues. We also provide a critical review of the existing Federated NLP evaluation methods and tools. Finally, we highlight the current research gaps and future directions. ###### Keywords: Federated Learning Natural Language Processing Language Modelling Privacy. ## 1 Introduction Modern machine learning algorithms rely on big amounts of data, especially when training deep neural models from high dimensional data such as text and image. Most data naturally come from end users, which are distributed and separated by different end devices. It is necessary to learn well performed machine learning models while preserving users’ privacy. Federated learning (FL) has become a new machine learning paradigm to train a model across multiple decentralized edge devices or servers holding local data samples without exchanging them. The term federated learning was first proposed in 2016 by [40]: ”We term our approach Federated Learning, since the learning task is solved by a loose federation of participating devices (which we refer to as clients) which are coordinated by a central server.” In the real world scenario, organizations such as different hospitals hold confidential data, while these hospitals would like to train a disease classification model for common use, it is hard to ask them to upload their own data to the cloud. Even within the same hospital, different departments often save patients’ information locally. Another example is human beings create lots of text data by their smartphones, these data are building blocks for now-days big language models. However, it is shown that most language models suffer from ethic problems, since they may leak users’ personal information in an unexpected way. Recent efforts in federated learning have been devoted to interdisciplinary areas: not only machine learning is required, but also techniques from distributed optimization, statistics, cybersecurity, communication, systems, cryptography and many more. Meanwhile, the data ranges from structured to unstructured format, which is not limited to tabulars, time series and images. Among most federated learning studies, Google has led the use of federated learning in Natural Language Processing through Gboard mobile keyboard, Pixel phones and Android Messages. While Google has launched several applications on langauge modeling tasks, Apple is using FL for wake-up word detection in Siri, doc.ai is developing cross-device FL solutions for biomedical research, and Snips has introduced cross-device FL for hotword detection. In this paper, we take a survey on the existing FL algorithms for Natural Language Processing (NLP). Starting from language modeling, we will review current federated learning algorithms on various NLP tasks: classification, recommendation, speech recognition and health text mining and others . We organize the survey as follows: in Section 2, basic federated learning concepts, frameworks, optimization toward non-IID data, privacy are discussed. Section 3 reviews federated learning in NLP. Section 4 discusses the common evaluation aspects and tools. Section 5 highlights current research challenges and some future directions. Section 6 gives the conclusion. ## 2 Federated learning In this section, we first review basics of federated learning, including the problem setup, non-iid data distribution, frameworks, optimization algorithms and privacy preservation. Then, we extend federated learning to other distributed machine learning paradigms and discuss their difference. #### Problem formulation In this wrok, we consider the following distributed optimization process: $\min_{\textbf{w}}\\{\mathcal{L}(\textbf{w})=\sum_{k=1}^{N}p_{k}\mathcal{L}_{k}(\textbf{w})\\}$, where $N$ is the total number of user devices, $p_{k}$ is the weight of the $k$-th device such that $p_{k}\geq 0$ and $\sum_{k=1}^{N}p_{k}=1$. Suppose the $k$-th device has the amount of $n_{k}$ training data: $\textbf{x}_{k}=(x_{k,1},x_{k,2},...,x_{k,n_{k}})$. The local training objective $\mathcal{L}_{k}(.)$is defined by: $\mathcal{L}_{k}(\textbf{w})=\frac{1}{n_{k}}\sum_{j=1}^{n_{k}}l(\textbf{w};x_{k,j})$, where $l(.;.)$ is a user-specified loss function. #### Non-IID data and Learning Strategies Typical centralized supervised learning algorithms have the IID assumption, i.e., the training and test data is independently identically distributed. In decentralized settings like federated learning, non-IID poses a challenge because the different data distribution result in significant skewness across devices or locations. Non-IID data among devices/locations encompass many different forms. There can be skewed distribution of features (probability $\mathcal{P}(x)$), labels (probability $\mathcal{P}(y)$), or the relationship between features and labels (e.g., varying $\mathcal{P}(y|x)$ or $\mathcal{P}(x|y)$) among devices/locations. Previous reviews categorized this this as horizontal, vertical and hybrid data partitions in Federated Learning. In this review, we focus on skewed distribution of labels, i.e., $\mathcal{P}_{P_{i}}(y)\not=\mathcal{P}_{P_{j}}(y)$ for different data partitions $P_{i}$ and $P_{j}$. Previous study has shown DNN models with batch normalization suffer from Non- IID data [25], the accuracy of FL reduces significantly by up to 55% for neural networks trained for highly skewed non-IID data [69], where each clinet device trains only on a single class of data. Common techiniques to deal with non-IID include: * • data augmentation: create a common dataset which can be shared globally, the dataset can come from a publicly available proxy data source [69], or perhaps a distillation of the raw data following [61]. * • schedule client participation during training : FedFMC, FedCD, cluster similar devices / multi-center/ hirarchical clustering of local updates, FedPD, adapts the communication frequency of decentralized learning algorithms to the (skew- induced) accuracy loss between data partitions [25] * • greater number of models, but more communication cost: * • ensemble: similar to scheduling * • regularization on the server, e.g. FedAwS, server imposes a geo- metric regularizer after each round to encourage classes to be spreadout in the embedding space * • personalized FL/ continual local training, based on MAML #### Optimization While a variety of studies have made assumptions for the per-client optimization functions in the IID setting, we review basic convergence results for $H$-smooth convex functions under the assumption that the variance of the stochastic gradients is bounded by $\sigma^{2}$. Given the following notations in a standard FL setting: $N$ is the total number of clients, $M$ is the number of participated clients per round, $T$ is the total number of communication rounds, $K$ is the local SGD steps per round. Federated averaging can conducted in either of the following two settings: one is to keep $x$ fixed in local updates during each round and compute a total of $KM$ gradients at the current $x$, in order to run accelerated minibatch SGD, the convergence rate is then upper bounded by $O(\frac{H}{T^{2}}+\frac{\mu}{\sqrt{TKM}})$. The other is to ignore all but 1 of the M active clients, which allows sequential SGD to run for $KT$ steps, this approach has an upper bound of $O(\frac{H}{(TK)^{2}}+\frac{\mu}{\sqrt{TK}})$. As in the non-IID settings, key assumptions are given for inter-client gradient, local functions on each client and other participation constraints. A detailed discussion of different convergence rates for non-IID setting can be found in [30]. #### Frameworks There are three basic frameworks for FL: centralized, decentralized and heterogeneous. In the centralized federated learning setting, a central server is used to orchestrate the different steps of the algorithms and coordinate all the participating nodes during the learning process. The server is responsible for the nodes selection at the beginning of the training process and for the aggregation of the received model updates. Since all the selected nodes have to send updates to a single entity, the server may become a bottleneck of the system. Most NLP applications like keyboard word prediction is using the cetralized setting. In the decentralized federated learning setting, the nodes are able to coordinate themselves to obtain the global model. This setup prevents single point failures as the model updates are exchanged only between interconnected nodes without the orchestration of the central server. Nevertheless, the specific network topology may affect the performances of the learning process. Most blockchain-based federated learning falls into the decentralized setting. An increasing number of application domains involve a large set of heterogeneous clients, e.g., mobile phones and IoT devices. Most of the existing Federated learning strategies assume that local models share the same global model architecture. Recently, a new federated learning framework named HeteroFL was developed to address heterogeneous clients equipped with very different computation and communication capabilities. The HeteroFL technique can enable the training of heterogeneous local models with dynamically-varying computation complexities while still producing a single global inference model. #### Privacy In most FL settings, privacy preservation is conducted to make sure users’ information is not leaked during the learning process. Physically, local data is not allowed to leave end users’ devises. However, it is still possible to reconstruct the original data by taking the model weights or gradients. Therefore, we consider privacy preservstion on three aspects in FL: users’ personal information, local data and machine learning models. Take the smart phone keyboard next word prediction as an example, users personal information refers to facts about their location, name, sex as well as hidden information like keyboard typing pattern. Local data then concludes the messages, photos and videos in their phones, while a machine learning model could be the a language model which predicts the next word given some preceding words. Users’ personal information is often correlated with the local data, e.g., a person’s age can be inferred with his/her chat messages. Common techniques for privacy preservation of user data includes: differential privacy [10], secure Multi-Party Computation [15], homomorphic encryption [43] and trusted execution environments [11]. Verifiability enables parties to prove that they have executed their parts of a computation faithfully. Techniques for verifiability include both zero knowledge proofs (ZKPs) [13] and trusted execution environments (TEEs) [11]. As for model attack, adversarial learning techniques can be leveraged in FL setting, ## 3 Federated learning in NLP ### 3.1 Language modeling A language model (LM) refers to a model that provides probabilities of word sequences through an unsupervised distribution estimation. As an essential component for NLP systems, LM is utilised in a variety of NLP tasks, i.e., machine translation, text classification, relation extraction, question- answering, etc. In FL, most LMs are deployed on a virtual mobile keyboard, i.e., the Google Keyboard (Gboard). Thereby, recent literature are mostly produced by authors from Google, LLC. Recent works on language modelling in Federated NLP mainly target on solving a word-level LM problem in mobile industry. That is mobile keyboard suggestion, which is a well representative of federated NLP applications. To improve mobile keyboard suggestions, federated NLP models aim to be more reliable and resilient. Existing models offer quality improvements in typing or even expression (e.g., emoji) domains, such as next-world predictions, emoji predictions, query suggestions, etc. Considering the characteristics of mobile devices, a decentralized computation approach is constrained by computation resource and low-latency requirement. A mobile device has limited RAM and CPU budgets, while we expect keyboards to provide a quick and visible response of an input event within 20 milliseconds. Thereby, the model deployed in client sides should perform fast inference. Most works [67, 20, 47, 5, 29, 52, 58] consider variants of LSTMs [24] as the client model. Given the limited computation budget on each device, we expect the parameter space of a neural language model to be as small as possible without degrading model performance. CIFG [17] is a promising candidate to diminish LM’s complexity and inference-time latency. It employs a single gate to harness both the input and recurrent cell self-connections. In such a way, the amount of parameters is downsized by 25 $\%$ [17]. [20] leverages CIFG for next word predictions, and simplifies the CIFG model by removing peephole connections. To further optimise the model in size and training time, they ties input embedding and CIFG output projection matrices. [47] applies a pretrained CIFG network as an emoji prediction model. In particular, the pretraining process involves all layers, excluding the output projection layer, using a language learning task. To enhance performance, the authors enable embedding sharing between inputs and outputs. The pretraining of LM exhibits fast convergence for the emoji model. [5] employs a character-level RNN [63], targeting on out-of-vocabulary(OOV) learning tasks, under FL settings. Specifically, they use CIFG with peephole connections and a projection layer. The projection layer diminishes the dimension of output and accelerates the training. They use multi-layer LSTMs to enhance the representation power of the model, which learns the probability of word occurrence. GRU [8] is another simpler variant of the LSTM. [29] leverage GRU as the neural language model for mobile keyboard next-word predictions. Similar to CIFG, it reduces the model complexity on parameter spaces without hurting the model performance. To downsize the amount of trainable parameters, they also apply tied embedding in the embedding layer and output layer by share of the weights and biases. [67] proposes another LM for keyboard query suggestions to reduce the burden of training LSTMs. Specifically, they train a LSTM model on the server for generating suggestion candidates, while merely federated training a triggering model, that decides the occurrence of the candidates. The triggering model uses logistic regression to infer the probability of a user click, significantly lessening the computation budgets in comparison of RNN models. [6] also states the direct use of RNN is not the proper means to decode due to its large parameters size, which further causes slow inference. Hereby, they propose to leverage a n-gram LM that derived from a federated RNN for decoding. In particular, they overcome large memory footprints problem and enhance model performance by introducing an approximation algorithm based on SampleApprox [57]. It approximates RNN models into n-gram models. Still, they use CIFG and group-LSTM (GLSTM) [32] for approximation. While, GPT2 [46] is one of the state-of-the-art transformer-based LMs with 1.5 billion parameters. Considering its performance on centralized language modeling tasks, [52] uses GPT2 as LM. They propose a dimensionality reduction algorithm to downsize the dimension of GPT2 word embedding to desired values (100 and 300). For federated optimization, existing federated optimization algorithms differ in client model aggregation on the server-side. In federated language modeling, most existing works [67, 20, 6, 47, 5, 52, 58] use FedAvg as the federated optimization algorithm. Another optimization strategy, called FedAtt, has also shown its feasibility and validity in language models [29]. In FedAvg, gradients, that computed locally over a large population of clients, are aggregated by the server to build a novel global model. Every client is trained by locally stored data and computes the average gradient with the current global model via one or more steps of SGD. Then, it communicates model updates with the server. The server performs the weighted aggregation of the client updates to build a novel global model. Client updates are immediately abandoned on the sever once the accumulation is completed. [20] trains the global model from scratch in the server, using FedAvg. Specifically, the initial global model has either been randomly initialized or pretrained on proxy data. However, it increases the federated training rounds on clients. Thereby, it leads to a high communication and computation costs in FL. They also use SGD as the server-sided optimizer for training. They found Adam and AdaGrad provide no beneficial improvement on convergence. [52] introduces a novel federated training approach, called central pre-training with federated fine-tuning. To address the drawback in [20], the server pretrains a model with centralized and public data as the global model at the initial time. Each clients then obtains the pretrained weights as the initial weights, and later trained on local data in a federated fashion. But the improvement is limited to large network, i.e., GPT2. They also propose a pretrained word embedding layer for federated training, which only enhance accuracy for the large word embedding network (i.e., GPT2). Whereas, with the combination of pretraining models, it harms the performance. They leverage Adam as the optimizer for training. [5] uses momentum and adaptive L2-norm clipping on each client’s gradient in FedAvg, leading to a faster convergence. The authors argue momentum and adaptive clipping performed on gradients improves the robustness of model convergence and performance. [58] also uses clipping for regularization in FedAvg by setting the upper bound of user updating to constrain each client contribution (i.e., clipping). In addition, [47] founds using momentum with Nesterov accelerated gradients significantly outperforms using SGD as server optimizer, in terms of convergence rate and model performance. [6] applies Nesterov momentum as both the local and the server optimizer. [29] first introduces the attention mechanism into federated aggregation of client models. This optimization algorithm is referred as Attentive Federated Aggregation (FedAtt). It is a layer-wise soft attention mechanism applied on the trained parameters of the NN model. Intuitively, the federated optimization algorithm learns to optimize the global model by providing a good generalization on each client model for a quick local adaptation. Hereby, it reduces local training rounds and saves the computation budgets, further accelerating the learning process. The generalization in FedAtt is decided by the similarity between each client and the server, and the relative importance of each client. For a good generalization, they minimise the weighted summed distance of each client model and the global model on parameters spaces. They introduce attentive weights as the weights of the client models. Particularly, the attentive weight of each client model is a non-parametric attention score derived from each layer of NN. Differ from pre-trained FedAvg, FedAtt finds a well-generalized global model on each federated training round by iteratively updating parameters. Consequently, it further lessens the federated communication budgets. For local training, the client-sided optimizer is momentum. While, for global parameters updates, they uses SGD. The existing works on federated language modeling mainly contribute on optimizing model aggregation process, but not focusing on privacy preserving approach. Adding privacy preserving techniques into federated optimization process is seen as a bonus, rather than an essential means of privacy guarantees. In Federated LMs, the commonly used privacy preserving technique is differential privacy (DP) [9]. A DP algorithm is expected to characterize the underlying probability distribution without compromising personally identifiable data. In general, it injects calibrated noise into the aggregated data while not affecting the outcomes. Most DP approaches are used for user- level privacy guarantees. In FL, we define user-level DP as a privacy guarantees, to preserve the trained models with or without the presence of any one client’s data. DP usually serves on the client sides before model aggregation [62]. [29] integrates a randomized mechanism in FedAtt optimization by introducing a white noise with the mean of 0 and the standard deviation $\sigma$. They also introduce a magnitude coefficient $\beta\in(0,1]$ to govern the effect of the randomization in FL. However, the level of its DP guarantees is unrevealed. Hereby, it fails to show the trade- off between data utility and privacy protection for its privacy-preserving countermeasure implementation. [58] incorporates the Gaussian mechanism in FedAvg to cope with the user-based heterogeneity of data in language models. In particular, it perform DP guarantees by adding Gaussian noise with a noise multiplier of 1, after clipping. They argue a high level of DP guarantees exhibits a notable reduction in unintended memorization, caused by heterogeneity of training data. ### 3.2 Classification Text Classification is procedure of identifying the pre-defined Text Classification is the procedure of identifying the pre-defined category for varied-length of text [1]. It can be extended to many NLP applications including sentiment analysis, question answering and topic labeling . Traditional text classification tasks can be deconstructed into four steps: text preprocessing, dimension reduction, classification and evaluation. Though the deep learning models have achieved state-of-the-art results in text classification [41], uploading or sharing text data to improve model performance is not always feasible due to different privacy requirements of clients. For example, financial institutions that wish to train a chatbot for their clients cannot be allowed to upload all text data from the client-side to their central server due to strict privacy protection statements. Then applying the federated learning paradigm is an approach to solve the dilemma due to its advances in privacy preservation and collaborative training. In which, the central server can train a powerful model collaboratively with different local labeled data at client devices without uploading the raw data considering increasing privacy concerns in public. However, there are several challenges for applying federated learning to text classification tasks in NLP. One is to design proper aggregating algorithms to handle the gradients or weights uploaded by different client models. Traditional federated learning can be considered as a special paradigm of distributed learning, thus aggregating algorithms, such as FedAvg [40], FedAtt [29] has been proposed to generalize the model on the central server. Considering the unevenly distributed data at different client devices and different amounts of data at the different local datasets. [71] has attempted the text classification using the standard FedAvg algorithm to update the model parameter with local trained models. It uses different local datasets to pre-train the word embeddings, and then concatenate all word embeddings. After filtering the widths and feature maps from the concatenated word embeddings, the max-over-time pooling was used to aggregate the features, thus getting vectors with the same length. Finally, they use softmax activation on the fully connected layer, it will translate the vectors to the final sentence classification results (categories). Later, scientists from the Machine learning area brought in new approaches of uploading and aggregating, for example, using Knowledge distillation [23]. [22] however use fine-tuning instead of FedAvg to update parameters. [36] average the logits outputs from the last layer of the model instead of directly take the average of model parameters. It then uses knowledge distillation to learn the knowledge from the client devices instead of traditional. In addition, model compression has been introduced to federated text classification tasks due to the dilemma of computation restraints on the client-side. They attempted to reduce the model size on the client-side to enable the real application of federated learning. The computation restriction on the client devices limits the application of traditional FL. For example, 4-layer BERT or 6-layer BERT is still too large for mobile devices such as smartphones. The scholars then focus to perform the model compression while still following the federated learning paradigm. The knowledge distillation then has been applied to transfer local model information while keeping the model size small at the local devices in [48]. It utilises knowledge distillation instead of model parameter fusion to update parameters. The soft- label predictions on a public distillation dataset are sent to the central model to be distilled. Thus, the central model can learn the local knowledge on client devices through distilling the logits of different client models without sharing or uploading the local model parameters and gradients. To ensure the privacy preservation of FL while keeping the communication, the encryption of data is one of the top priority considerations in applying federated learning in NLP. Encryption on communication between edge-device and central server is a standard approach in federated learning to preserve privacy for end-users on edge devices. [71] adds encryption on client-central server communication using differential privacy. It used the approach [60] proposed the attack-adaptive aggregation which prevent the attack at the central server aggregation module. To overcome the communication dilemma of FL, one-shot or few-shot federated learning was proposed to allow the central server can successfully train the central model with only one or a few rounds of communication under poor communication scenarios. However, the shared data restriction of federated learning is still left to be solved. Considering the trend of higher restriction of data sharing and uploading, it will be harder to get a sufficient size of data shared to both central servers and client servers. In this way, the knowledge distillation cannot be used to solve the model compression problem in federated learning. [70] reduced the communication of previous federated learning by utilising the soft labels dataset distillation mentioned in [18] and [54]. It thus successfully extend the soft-labeling methods to two new techniques: soft-reset and random masking, and then successfully using the dataset distillation [61] to realise the one-round communication federated learning for text classification tasks. Each client in [70] distils their local dataset to a much smaller synthetic one, and then only uploads the small-sized synthetic dataset to the server. Thus, no gradients or weights is transmitting from the client model to the central server model. The distilled dataset can be as small as one data sample per category, in this way the communication in federated learning can be reduced to as low as one round. ### 3.3 Speech Recognition Speech recognition is the task of recognising speech within audio and converting it into text. Voice assistants such as Amazon Alexa or Apple Siri use on-device processing to detect wake-up words (e.g. ”Hey Siri”), which is a typical usage for speech recognition on smartphones. Only when the wake-up words are detected, further processing like information retrieval or question answering will be running on the cloud. Methods for speech recognition include dynamic time wraping [42], Hidden Markov Models [45] and modern end-to-end deep neural models [16]. More recently, wav2vec [3] masks the speech input in the latent space and solves a contrastive task defined over a quantization of the latent representations which are jointly learned, this method demonstrates the feasibility of speech recognition with limited amounts of labeled data. On device wake-up word detectors face two main challenges: First, it should run with minimal memory footprint and computational cost. Second, the wake word detector should behave consistently in any usage setting, and show robustness to background noise. [68] performed neural network architecture evaluation and exploration for running keyword spotting on resource- constrained microcontrollers, they showed that it is possible to optimize these neural network architectures to fit within the memory and compute constraints of microcontrollers without sacrificing accuracy. [34] investigated the use of federated learning on crowdsourced speech data to learn a resource-constrained wake word detector. They showed that a revisited Federated Averaging algorithm with per-coordinate averaging based on Adam in place of standard global averaging allows the training to reach a target stopping criterion of 95% recall per 5 FAH within 100 communication rounds on their crowdsourced dataset for an associated upstream communication costs per client of 8MB. They also open sourced the Hey Snips wake word dataset 111http:// research.snips.ai/datasets/keyword-spotting. [65] proposed a decentralized feature extraction approach in federated learning to address privacy-preservation issues for speech recognition, which is built upon a quantum convolutional neural network (QCNN) composed of a quantum circuit encoder for feature extraction, and a recurrent neural network (RNN) based end-to-end acoustic model (AM). The proposed decentralized framework takes advantage of the quantum learning progress to secure models and to avoid privacy leakage attacks. [19] introduced a framework for speech recognition by which the degree of non-IID-ness can be varied, consequently illustrating a trade-off between model quality and the computational cost of federated training. They also showed that hyperparameter optimization and appropriate use of variational noise are sufficient to compensate for the quality impact of non-IID distributions, while decreasing the cost. ### 3.4 Sequence Tagging Sequence tagging, e.g. POS tagging, Named Entity Recognition, plays an important role in both natural language understanding and information extraction. Statistical models like Hidden Markov Model and Conditional Random Fields were heavily used, modern approaches rely on deep representations from Recurrent Neural Net, Convolution Neural Net or transformer like architectures. A few recent works focus on biomedical Named Entity Recognition in the federated setting. [39] pretrained and fine tuned BERT models for NER tasks in a federated manner using clinical texts, their results suggested that conducting pretraining and fine tuning in a federated manner using data from different silos resulted in reduced performance compared with training on centralized data. This loss of performance is mainly due to separation of data as ”federated communication loss” . Given the limit of data access, the experiments were conducted with clinical notes from a single healthcare system to simulate different silos. [14] proposed a FedNER method for medical NER, they decomposed the medical NER model in each platform into a shared module and a private module. The private module was updated in each platform using the local data to model the platform-specific characteristics. The shared module was used to capture the shareable knowledge among different platforms, and was updated in a server based on the aggregated gradients from multiple platforms. The private module consists of two top layers in our medical NER model, i.e, Bi-LSTM and CRF, which aim to learn platform-specific context representations and label decoding strategies. The private module was only trained with local data and exchange neither its parameters nor gradients. The shared module consisted of the other bottom layers in our NER model, such as the word-level CNN and all types of embedding. Different from the private module, the shared one mainly aims to capture the semantic information in texts. [56] introduced a privacy preserving medical relation extraction model based on federated learning, they leveraged a strategy based on knowledge distillation. Such a strategy uses the uploaded predictions of ensemble local models to train the central model without requiring uploading local parameters. ### 3.5 Recommendation Recommendation systems are heavily data-driven. Typical recommendation models use collaborative filtering methods [55], in which past user item interactions are sufficient to detect similar users and/or similar items and make predictions based on these estimated proximities. Collaborative filtering algorithms can be further divided into two sub-categories that are generally called memory based and model based approaches. Memory based approaches directly works with values of recorded interactions, assuming no model, and are essentially based on nearest neighbours search (for example, find the closest users from a user of interest and suggest the most popular items among these neighbours). Model based approaches assume an underlying “generative” model that explains the user-item interactions and try to discover it in order to make new predictions. Unlike collaborative methods that only rely on the user-item interactions, content based approaches [44] use additional information about users and/or items. If we consider the example of a movies recommendation system, this additional information can be, for example, the age, the sex, the job or any other personal information for users as well as the category, the main actors, the duration or other characteristics for the movies (items). Given different partitions of users and items, federated recommendation models can be horizontal, vertical or transfered. In horizontal federated recommendation systems, items are shared but users belong to different parties. A typical work is Federated Collaborative Filter (FCF) [2] proposed to use a central server to keep the item latent factor matrix, while the user latent factors are stored locally on each device. In the training time, the server distributes the item latent factor to each party, the participants update their user latent factor by local rating matrix data and send the item latent factor updates back to the server for aggregation. To avoid the inter trust problem, [21] introduced a fully decentralized setting where participants have full access to the item latent factor and communicate with each other to update the model. Moreover, meta learning has been used for personalized federated recommendation. [12] designed a meta learner to learn generalized model parameters for each participant, then each participant’s recommendation is regarded as a personalized task where a support set is used to generate the recommendation model and the gradient is computed on a query set. [28] introduced another fedrated meta learning algorithm for recommendation, in which separate support and query sets are not necessary. Their approach performs relatively well within less amount of training episodes. Besides, [35] proposed DiFacto, which is a distributed factorization method and addressed the efficiency problem when it comes to large scale user item matrices. In comparison, vertical federated systems have been designed for feature distributed learning problem where participants hold different feature sets. [26] proposed an asynchronous stochastic gradient descent algorithm. Each party could use an arbitrary model to map its local features to a local prediction. Then local predictions from different parties are aggregated into a final output using linear and nonlinear transformations. The training procedure of each party is allowed to be at various iterations up to a bounded delay. This approach does not share any raw data and local models. Therefore, it has fewer privacy risks. Besides, for a higher level of privacy, it can easily incorporate the DP technique. Similar to horizontal FedRec, there are also works that further utilize cryptography techniques. [7] presented a secure gradient-tree boosting algorithm. This algorithm adopts HE methods to provide lossless performance as well as preserving privacy. And [51] proposed a secure linear regression algorithm. MPC protocols are designed using garbled circuits to obtain a highly scalable solution. Parties of vertical FedRec could also be two recommenders with different item sets. For instance, a movie RecSys and a book RecSys have a large user overlapping but different items to recommend. It is assumed that users share a similar taste in movies with books. With FedRec, the two parties want to train better recommendation algorithms together in a secure and privacy-preserving way. [50] proposed a secure, distributed item-based CF method. It jointly improves the effect of several RecSys, which offer different subsets of items to the same underlying population of users. Both the predicted ratings of items and their predicted rankings could be computed without compromising privacy nor predictions’ accuracy. We refer readers to [66] for more detailed discussion for federated recommendation systems. ### 3.6 Health Text Mining Federated learning has emerged as an important framework for health text mining, due to the privacy concern among different hospitals and medical organizations. Besides, most health data exhibits systemic bias towards some specific groups or patterns, e.g. hospitals, diseases and communities. Again, this non-IID issue raises big challenges when applying federated learning into heath text mining tasks. There have been some tasks that were studied in federated learning setting in healthcare, including patient similarity learning [33], patient representation learning and phenotyping [31, 38], predictive or classification modeling [4, 27, 49], biomedical named entity recognition. Specifically, [38] designed a two-stage federated approach for medical record classification. In the first stage, they pre-trained a patient representation model by training an neural network to predict ICD and CPT codes from the text of the notes. In the second stage, a phenotyping machine learning model was trained in a federated manner using clinical notes that are distributed across multiple sites for the target phenotype. In this stage, the notes mapped to fixed-length representations from stage one are used as input features and whether the patient has a certain disease is used as a label with one of the three classes: presence, absence or questionable. [37] proposed a simple federated architecture for early detection of Type-2 diabetes. After comparing the proposed federated learning model against the centralised approach, they showed that the federated learning model ensures significant privacy over centralised learning model whereas compromising accuracy for a subtle extend. To cope with the imbalanced and non-IID distribution inherent in user’s monitoring data, [64] designed a generative convolutional autoencoder (GCAE), which aims to achieve accurate and personalized health monitoring by refining the model with a generated class-balanced dataset from user’s personal data. It is noticed that GCAE is lightweight to transfer between the cloud and edges, which is useful to reduce the communication cost of federated learning in FedHome. [53] described a federated approach on a brain age prediction model on structural MRI scans distributed across multiple sites with diverse amounts of data and subject (age) distributions. In these heterogeneous environments, a Semi-Synchronous protocol provides faster convergence. ### 3.7 Other NLP Tasks More recently, FedNLP provided a research-oriented benchmarking framework for advancing federated learning (FL) in natural language processing (NLP). It uses FedML repository as the git submodule. In other words, FedNLP only focuses on adavanced models and dataset, while FedML supports various federated optimizers (e.g., FedAvg) and platforms (Distributed Computing, IoT/Mobile, Standalone). A text generation example can also be found in TensorFlow Tutorial 222https://colab.research.google.com/github/tensorflow/federated/blob/master/docs/tutorials /federated_learning_for_text_generation.ipynb#scrollTo=iPFgLeZIsZ3Q. So far, we have not found any work on other generation works on Machine Translation and Summatization. ## 4 Benchmarks ### 4.1 Evaluation Aspects #### Model Evaluation In principle, FL based NLP models should not only be evaluated against traditional performance metrics (such as model accuracy), but also the change of model performance with different system and data settings. Various systems settings consider the number of nodes, the weight of the nodes, the quality of the nodes. While the data setting focus on different data distribution caused by either label bias or feature bias. #### Communication Evaluation There is no doubt that the communication rounds of nodes play an important role in the performance of the model. Due to the uncertainty of the federated network, communication is huge resource consumption. There is always a natural trade off between computation and communication among the nodes and server. #### Privacy Evaluation The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. [59] discussed a selection of over eighty privacy metrics and introduce categorizations based on the aspect of privacy they measure, their required inputs, and the type of data that needs protection. In general, privacy metrics can be classified with four common characteristics: adversary models, data sources, inputs and output meatures. #### User Response Evaluation Apart from the above automatic evaluation methods, on-line FL-based NLP models also consider the response from users, e.g. FL language models take next word click rate as an important metric, FL recommendation systems would not only like to keep old customers but also attract new customers. ### 4.2 Tools There are a few tools for common federated learning, including PySyft 333https://github.com/OpenMined/PySyft, TFF 444https://www.tensorflow.org/federated, FATE 555https://github.com/FederatedAI/FATE, Tensor/IO 666https://doc- ai.github.io/tensorio/, FedML 777https://github.com/FedML-AI/FedML and FedNLP 888https://github.com/FedML-AI/FedNLP. PySyft decouples private data from model training using federated learning, DP and MPC within PyTorch. With TFF, TensorFlow provides users with a flexible and open framework through which they can simulate distributed computing locally. FATE support the Federated AI ecosystem, where a secure computing protocol is implemented based on homomorphic encryption and MPC. Tensor/IO is a lightweight crossplatform library for on-device machine learning, bringing the power of TensorFlow and TensorFlow Lite to iOS, Android, and React native applications. ## 5 Challenges and Future Directions ### 5.1 Algorithm-Level #### Big language models Since the paradigm pre-training + fine tuning has dominated most NLP tasks, pre-trained language models such as BERT and GPT are useful and transferable to develop downstream tasks. Often times the larger the pre-trained language model is, the more likely it will be for downstream model performance. However, in the FL setting, it is not possible to allocate large size language models like GPT-3 on the participants. Technique like knowledge distillation could be useful, it remains unknown whether downsized language can maintain the performance. #### Non-iid Data distributions Real world data from different participants is always non-iid, the challenge is how to learn from high quality data and labels. Given a fixed annotation budget, active learning may be leveraged to not only select significant data points, but also actively choose worthwhile participants. Furthermore, weakly supervised learning and meta learning algorithms may also be used to use more unlabeled data from different participants. #### Personalization Personalized FL can be viewed as an intermediate paradigm between the server- based FL paradigm that produces a global model and the local model training paradigm. The challenge is to strike a careful balance between local task- specific knowledge and shared knowledge useful for the generalization properties of FL models. For most deep NLP models, techniques like early shaping, sample weighing and transfer learning can be explored. ### 5.2 System-Level #### Spatial Adaptability This refers to the ability of the FL system to handle variations across client data sets as a result of (i) the addition of new clients, and/or (ii) dropouts and stragglers. These are practical issues prevalent in complex edge computing environments, where there is significant variability in hardware capabilities in terms of computation, memory, power and network connectivity #### Computation Communication Trade-off Frequent and large scale deployment of updates, monitoring, and debugging for FL NLP models is challenging. The trade-off between local and global update frequency, as well as the communication frequency can be explored. #### Privacy concern Even though FL assumes the data never leave the device, it is still possible to reconstruct the original data by taking the model weights or gradients. Privacy preservation on three aspects in FL can be explored: users’ personal information, local data and machine learning models. ## 6 Conclusion In this paper, we review common NLP tasks in the FL setting, including language modeling, text classification, speech recognition, sequence tagging, recommendation, health text mining and other tasks. In general, the performance federated NLP models still lie behind that of centralized ones. Also, large scale pre-trained language models and advanced privacy preservation techniques have not widely been used in the FL based NLP, which could be the potentials for future research. We point out both algorithm and system level challenges for FL based NLP models. In the future, we will further evaluate representative NLP models (e.g. transformers) in the FL environment and give more comparable insights on real world applications. ## References * [1] Aggarwal, C.C., Zhai, C.: A survey of text classification algorithms. In: Mining text data, pp. 163–222. Springer (2012) * [2] Ammad-Ud-Din, M., Ivannikova, E., Khan, S.A., Oyomno, W., Fu, Q., Tan, K.E., Flanagan, A.: Federated collaborative filtering for privacy-preserving personalized recommendation system. arXiv preprint arXiv:1901.09888 (2019) * [3] Baevski, A., Zhou, H., Mohamed, A., Auli, M.: wav2vec 2.0: A framework for self-supervised learning of speech representations. arXiv preprint arXiv:2006.11477 (2020) * [4] Brisimi, T.S., Chen, R., Mela, T., Olshevsky, A., Paschalidis, I.C., Shi, W.: Federated learning of predictive models from federated electronic health records. International journal of medical informatics 112, 59–67 (2018) * [5] Chen, M., Mathews, R., Ouyang, T., Beaufays, F.: Federated learning of out-of-vocabulary words. ArXiv abs/1903.10635 (2019) * [6] Chen, M., Suresh, A.T., Mathews, R., Wong, A., Allauzen, C., Beaufays, F., Riley, M.: Federated learning of n-gram language models. In: Proceedings of the 23rd Conference on Computational Natural Language Learning (CoNLL). pp. 121–130. Association for Computational Linguistics, Hong Kong, China (Nov 2019). https://doi.org/10.18653/v1/K19-1012, https://www.aclweb.org/anthology/K19-1012 * [7] Cheng, K., Fan, T., Jin, Y., Liu, Y., Chen, T., Yang, Q.: Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019) * [8] Cho, K., Merrienboer, B.V., Gulcehre, C., Ba Hdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using rnn encoder-decoder for statistical machine translation. Computer Science (2014) * [9] Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the Third conference on Theory of Cryptography (2006) * [10] Dwork, C.: Differential privacy: A survey of results. In: International conference on theory and applications of models of computation. pp. 1–19. Springer (2008) * [11] Ekberg, J.E., Kostiainen, K., Asokan, N.: Trusted execution environments on mobile devices. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp. 1497–1498 (2013) * [12] Fallah, A., Mokhtari, A., Ozdaglar, A.: Personalized federated learning: A meta-learning approach. arXiv preprint arXiv:2002.07948 (2020) * [13] Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of cryptology 1(2), 77–94 (1988) * [14] Ge, S., Wu, F., Wu, C., Qi, T., Huang, Y., Xie, X.: Fedner: Privacy-preserving medical named entity recognition with federated learning. arXiv e-prints pp. arXiv–2003 (2020) * [15] Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version 78 (1998) * [16] Graves, A., Jaitly, N.: Towards end-to-end speech recognition with recurrent neural networks. In: International conference on machine learning. pp. 1764–1772. PMLR (2014) * [17] Greff, K., Srivastava, R., Koutník, J., Steunebrink, B., Schmidhuber, J.: Lstm: A search space odyssey. IEEE Transactions on Neural Networks and Learning Systems 28, 2222–2232 (2017) * [18] Guha, N., Talwalkar, A., Smith, V.: One-shot federated learning. arXiv preprint arXiv:1902.11175 (2019) * [19] Guliani, D., Beaufays, F., Motta, G.: Training speech recognition models with federated learning: A quality/cost framework. arXiv preprint arXiv:2010.15965 (2020) * [20] Hard, A., Rao, K., Mathews, R., Beaufays, F., Augenstein, S., Eichner, H., Kiddon, C., Ramage, D.: Federated learning for mobile keyboard prediction. ArXiv abs/1811.03604 (2018) * [21] Hegedűs, I., Danner, G., Jelasity, M.: Decentralized recommendation based on matrix factorization: a comparison of gossip and federated learning. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. pp. 317–332. Springer (2019) * [22] Hilmkil, A., Callh, S., Barbieri, M., Sütfeld, L.R., Zec, E.L., Mogren, O.: Scaling federated learning for fine-tuning of large language models. arXiv preprint arXiv:2102.00875 (2021) * [23] Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015) * [24] Hochreiter, Sepp, Schmidhuber, Jurgen: Long short-term memory. Neural Computation (1997) * [25] Hsieh, K., Phanishayee, A., Mutlu, O., Gibbons, P.: The non-iid data quagmire of decentralized machine learning. In: International Conference on Machine Learning. pp. 4387–4398. PMLR (2020) * [26] Hu, Y., Niu, D., Yang, J., Zhou, S.: Fdml: A collaborative machine learning framework for distributed features. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. pp. 2232–2240 (2019) * [27] Huang, L., Shea, A.L., Qian, H., Masurkar, A., Deng, H., Liu, D.: Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. Journal of biomedical informatics 99, 103291 (2019) * [28] Jalalirad, A., Scavuzzo, M., Capota, C., Sprague, M.: A simple and efficient federated recommender system. In: Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. pp. 53–58 (2019) * [29] Ji, S., Pan, S., Long, G., Li, X., Jiang, J., Huang, Z.: Learning private neural language modeling with attentive aggregation. 2019 International Joint Conference on Neural Networks (IJCNN) pp. 1–8 (2019) * [30] Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawitz, K., Charles, Z., Cormode, G., Cummings, R., et al.: Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019) * [31] Kim, Y., Sun, J., Yu, H., Jiang, X.: Federated tensor factorization for computational phenotyping. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 887–895 (2017) * [32] Kuchaiev, O., Ginsburg, B.: Factorization tricks for lstm networks (2017) * [33] Lee, J., Sun, J., Wang, F., Wang, S., Jun, C.H., Jiang, X.: Privacy-preserving patient similarity learning in a federated environment: development and analysis. JMIR medical informatics 6(2), e20 (2018) * [34] Leroy, D., Coucke, A., Lavril, T., Gisselbrecht, T., Dureau, J.: Federated learning for keyword spotting. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 6341–6345. IEEE (2019) * [35] Li, M., Liu, Z., Smola, A.J., Wang, Y.X.: Difacto: Distributed factorization machines. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. pp. 377–386 (2016) * [36] Lin, T., Kong, L., Stich, S.U., Jaggi, M.: Ensemble distillation for robust model fusion in federated learning (2021) * [37] Lincy, M., Kowshalya, A.M.: Early detection of type-2 diabetes using federated learning (2020) * [38] Liu, D., Dligach, D., Miller, T.: Two-stage federated phenotyping and patient representation learning. arXiv preprint arXiv:1908.05596 (2019) * [39] Liu, D., Miller, T.: Federated pretraining and fine tuning of bert using clinical notes from multiple silos. arXiv preprint arXiv:2002.08562 (2020) * [40] McMahan, H.B., Moore, E., Ramage, D., y Arcas, B.A.: Federated learning of deep networks using model averaging. CoRR abs/1602.05629 (2016), http://arxiv.org/abs/1602.05629 * [41] Minaee, S., Kalchbrenner, N., Cambria, E., Nikzad, N., Chenaghlu, M., Gao, J.: Deep learning–based text classification: A comprehensive review. ACM Computing Surveys (CSUR) 54(3), 1–40 (2021) * [42] Müller, M.: Dynamic time warping. Information retrieval for music and motion pp. 69–84 (2007) * [43] Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop. pp. 113–124 (2011) * [44] Pazzani, M.J., Billsus, D.: Content-based recommendation systems. In: The adaptive web, pp. 325–341. Springer (2007) * [45] Rabiner, L., Juang, B.: An introduction to hidden markov models. ieee assp magazine 3(1), 4–16 (1986) * [46] Radford, A.: Language models are unsupervised multitask learners * [47] Ramaswamy, S.I., Mathews, R., Rao, K., Beaufays, F.: Federated learning for emoji prediction in a mobile keyboard. ArXiv abs/1906.04329 (2019) * [48] Sattler, F., Marban, A., Rischke, R., Samek, W.: Communication-efficient federated distillation. arXiv preprint arXiv:2012.00632 (2020) * [49] Sharma, P., Shamout, F.E., Clifton, D.A.: Preserving patient privacy while training a predictive model of in-hospital mortality. arXiv preprint arXiv:1912.00354 (2019) * [50] Shmueli, E., Tassa, T.: Secure multi-party protocols for item-based collaborative filtering. In: Proceedings of the eleventh ACM conference on recommender systems. pp. 89–97 (2017) * [51] Slavkovic, A.B., Nardi, Y., Tibbits, M.M.: ” secure” logistic regression of horizontally and vertically partitioned distributed databases. In: Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007). pp. 723–728. IEEE (2007) * [52] Stremmel, J., Singh, A.: Pretraining federated text models for next word prediction. ArXiv abs/2005.04828 (2020) * [53] Stripelis, D., Ambite, J.L., Lam, P., Thompson, P.: Scaling neuroscience research using federated learning. arXiv preprint arXiv:2102.08440 (2021) * [54] Sucholutsky, I., Schonlau, M.: Soft-label dataset distillation and text dataset distillation. arXiv preprint arXiv:1910.02551 (2019) * [55] Suganeshwari, G., Ibrahim, S.S.: A survey on collaborative filtering based recommendation system. In: Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’). pp. 503–518. Springer (2016) * [56] Sui, D., Chen, Y., Zhao, J., Jia, Y., Xie, Y., Sun, W.: Feded: Federated learning via ensemble distillation for medical relation extraction. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). pp. 2118–2128 (2020) * [57] Suresh, A.T., Roark, B., Riley, M., Schogol, V.: Approximating probabilistic models as weighted finite automata. ArXiv abs/1905.08701 (2019) * [58] Thakkar, O., Ramaswamy, S.I., Mathews, R., Beaufays, F.: Understanding unintended memorization in federated learning. ArXiv abs/2006.07490 (2020) * [59] Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Computing Surveys (CSUR) 51(3), 1–38 (2018) * [60] Wan, C.P., Chen, Q.: Robust federated learning with attack-adaptive aggregation. arXiv preprint arXiv:2102.05257 (2021) * [61] Wang, T., Zhu, J.Y., Torralba, A., Efros, A.A.: Dataset distillation. arXiv preprint arXiv:1811.10959 (2018) * [62] Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farhad, F., Jin, S., Quek, T., Poor, H.: Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security 15, 3454–3469 (2020) * [63] Williams, R.J., Zipser, D.: A learning algorithm for continually running fully recurrent neural networks. Neural Computation 1(2) (1998) * [64] Wu, Q., Chen, X., Zhou, Z., Zhang, J.: Fedhome: Cloud-edge based personalized federated learning for in-home health monitoring. IEEE Transactions on Mobile Computing (2020) * [65] Yang, C.H.H., Qi, J., Chen, S.Y.C., Chen, P.Y., Siniscalchi, S.M., Ma, X., Lee, C.H.: Decentralizing feature extraction with quantum convolutional neural network for automatic speech recognition. arXiv preprint arXiv:2010.13309 (2020) * [66] Yang, L., Tan, B., Zheng, V.W., Chen, K., Yang, Q.: Federated recommendation systems. In: Federated Learning, pp. 225–239. Springer (2020) * [67] Yang, T., Andrew, G., Eichner, H., Sun, H., Li, W., Kong, N., Ramage, D., Beaufays, F.: Applied federated learning: Improving google keyboard query suggestions. ArXiv abs/1812.02903 (2018) * [68] Zhang, Y., Suda, N., Lai, L., Chandra, V.: Hello edge: Keyword spotting on microcontrollers. arXiv preprint arXiv:1711.07128 (2017) * [69] Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 (2018) * [70] Zhou, Y., Pu, G., Ma, X., Li, X., Wu, D.: Distilled one-shot federated learning (2020) * [71] Zhu, X., Wang, J., Hong, Z., Xiao, J.: Empirical studies of institutional federated learning for natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: Findings. pp. 625–634 (2020)
arxiv-papers
2021-07-27T05:07:48
2024-09-04T03:07:20.603540
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Ming Liu, Stella Ho, Mengqi Wang, Longxiang Gao, Yuan Jin, He Zhang", "submitter": "Ming Liu Dr", "url": "https://arxiv.org/abs/2107.12603" }
2107.12604
# Image Scene Graph Generation (SGG) Benchmark Xiaotian Han Microsoft Cloud + AI Jianwei Yang Microsoft Research at Redmond Houdong Hu Microsoft Cloud + AI Lei Zhang Jianfeng Gao Microsoft Research at Redmond Pengchuan Zhang Microsoft Research at Redmond ###### Abstract There is a surge of interest in image scene graph generation (object, attribute and relationship detection) due to the need of building fine-grained image understanding models that go beyond object detection. Due to the lack of a good benchmark, the reported results of different scene graph generation models are not directly comparable, impeding the research progress. We have developed a much-needed scene graph generation benchmark based on the maskrcnn-benchmark[13] and several popular models. This paper presents main features of our benchmark and a comprehensive ablation study of scene graph generation models using the Visual Genome[11] and OpenImages Visual relationship detection[10] datasets. Our codebase is made publicly available at https://github.com/microsoft/scene_graph_benchmark. ## 1 Introduction Understanding a visual scene goes beyond recognizing individual objects in isolation. Visual attributes of an object and relationships between objects also constitute rich semantic information about the scene. Scene Graph Generation (SGG) [18] is a task to detect objects, their attributes and relationships using scene graphs [11], a visually-grounded graphical structure of an image. SGG has proven useful for building more visually-grounded and compositional models for other computer vision and vision-language tasks, like image/text retrieval [9, 17], image captioning [4, 20, 6], visual question answering [3, 5], action recognition [7], image generation [8, 14], and 3D scene understanding [2]. Code base | Supported datasets | Supported methods | Last commit time (Pytorch version) | Attribute detection | OD/SGG decouple-able ---|---|---|---|---|--- Neural Motif [21] | VG | IMP,NM | 11/07/2018 (0.3) | No | No RelDN [22] | VG, OI | NM,GRCNN,RelDN | 08/19/2019 (1.0) | No | Yes GRCNN [19] | VG | IMP,MSDN,GRCNN | 03/31/2020 (1.0) | No | No SGG-Pytorch [15] | VG | IMP,NM,VCTree [16] | 12/13/2020 (1.2) | Yes | No SG Benchmark (ours) | VG, OI | IMP,MSDN,NM,GRCNN,RelDN | 06/07/2021 (1.7) | Yes | Yes Table 1: Comparison of different open-sourced code bases for scene graph generation (SGG). Our code base supports two datasets (Visual Genome (VG) and Open Images (OI)) and five popular SGG methods. It is maintained regularly with up-to-date Pytorch support. It supports both attribute and relationship detection, and its object detection module (OD) and SGG module are decouple- able, which enables user to use customized OD models/results. There are several open-sourced code bases and models for SGG, see, e.g., [21, 19, 22, 15]. However, none of the existing code bases satisfies the following five criteria that from our perspective are important for easy use: (1) Support both Visual Genome (VG) and Open Images (OI) datasets, where VG is a popular academic testbed and OI is a large-scale public benchmark; (2) Support various popular methods, especially RelDN [22] that we found is very effective in improving SGG performance; (3) Under continuous maintenance and up-to-date Pytorch support; (4) Support attribute detection, which is crucial in vision- language downstream tasks [1, 23]; and (5) Make the object detection (OD) module and the SGG module decouple-able, allowing users to use their customized detection models and results. Our SGG Benchmark code base, built on top of maskrcnn-benchmark [13], satisfies all these five criteria and has several other useful features. We compare ours with existing SGG code bases in Table 1 and list main features of our code base as below. * • Provide a generic SGG dataset class that supports both VG and OI datasets and is easily adaptable to customized SGG datasets. We have integrated evaluation metrics from official Open Images relationship detection challenge for OpenImages Visual relationship detection[10], and implemented widely used Visual Genome relationship detection Recall calculation for scene graph generation on the Visual Genome[11]. * • Support multiple popular scene graph generation algorithms. We have integrated five widely used scene graph generation algorithms into our framework, including iterated message passing (IMP) [18], multi-level scene detection networks (MSDN) [12], graph R-CNN (GRCNN) [19], neural motif (NM) [21] and RelDN [22]. * • Modular design with decouple-able object detection and SGG modules. We have decomposed SGG framework into three components: object detection, attribute classification and relationship detection. One can easily replace or insert new components. Our framework decouples object detection and relationship detection so that one can do relationship detection with bounding boxes and labels from any object detector. * • Fast and portable dataset format. Our code base uses Tab Separated Values (TSV) data format, which is portable and flexible for data manipulations. We have also developed tools to visualize this data format directly. We will release the visualization tool later. * • Large models with state of the art performance. We have trained large models with ResNeXt-152 backbone for both object detection and scene graph generation. Our large models achieve state of the art performance on both Open Images relationship detection and Visual Genome scene graph generation. * • Image feature extraction for downstream vision-language tasks. We provide a easy-to-use pipeline to extract object and relation features from our pretrained models. The features exacted from our large models, when used as the input of downstream vision-language models, achieve SOTA performance on seven major vision-language tasks [23]. Besides presenting major improvements in our code base (Section 2) and benchmarking results on VG and OI datasets (Section 3), we report a comprehensive ablation study of current models’ capability in Section 4. We study the frequency prior in relationship detection and found that the SOTA models are only slightly better than the frequency prior baseline. We also ablate the error of SGG models into different sources, including object detection error, relation proposal error and relation classification error. We hope the study can provide insights to build better SGG models. ## 2 Major improvements in SGG methods. In our code base, we have re-implemented five widely used SGG algorithms, i.e, IMP [18], MSDN [12], GRCNN [19], NM [21] and RelDN [22], with two major improvements as described below. Figure 1: Illustration of coupled and decoupled SGG model architecture. ### 2.1 Decouple object and relationship detection Most existing SGG models use a two-stage model architecture (object detection first and then relationship prediction), e.g., [18, 12, 19, 21], where the relationship detection module extracts relation features from the same backbone of the object detection module, as shown in Figure 1 Left. The object detector (the yellow part) is pre-trained with the object detection task. To train the relationship detection module (the green part), one either (1) trains only the parameters in the relationship detection module, resulting in sub-optimal relationship detection performance, or (2) trains the full network with both object and relationship detection losses in a multi-task learning fashion, typically resulting in OD performance drop compared to the pre- trained object detector. This tightly coupled model architecture also makes SGG models difficult to make use of off-the-shelf object detectors, such as calling a Cloud service for object detection. To resolve these issues, our code base supports both the coupled and decoupled SGG model architecture. As shown in Figure 1 Right, the decoupled model introduces a separate relation backbone for relationship detection, which enables users to use their customized detection models/results. In our current implementation, we use [13] as our object detector, but the decoupled model can receive detection results from any object detectors. In Table 5, we show that this decoupled model architecture outperforms the coupled counterpart. The extra computational and memory cost from the relation backbone is minor, because the major cost of an SGG model is from its relation head. ### 2.2 No refinement of object detection results It is a common practice in training SGG models that the relationship detection module also learns to output refined object detection results, which either only refines the object classification (labels and confidences), e.g., [18, 12, 19], or refines both object classification and box regression, e.g., [21]. This refinement introduces extra OD parameters and an OD loss in the relationship detection module. The hope is that by jointly training OD and relationship detection, the OD performance can be improved. However, we found that it is not the case. The refined OD results are typically worse than the pre-trained OD results. As shown in Table 6, the worse and constantly-changing OD results also make it more difficult to train the relationship module, resulting in worse relationship detection performance. Therefore, we do not refine the object detection results in the relationship module. ## 3 SGG Benchmarks on VG and OI ### 3.1 Datasets and evaluation metrics Our code base provides a generic SGG dataset class that supports both VG and OI datasets. It is easily adaptable to customized SGG datasets, too. We listed the main features of these two datasets and their evaluation metrics as below. Visual Genome Scene Graph Generation. The Visual Genome dataset for Scene Graph Generation, introduced by IMP [18], contains 150 object and 50 relation categories. We follow their train/val splits. The evaluation codes are adopted from IMP [18] and NM [21]. The evaluation metrics are based on Recalls of three settings: (1) predicate classification (predcls): given a ground truth set of object boxes and labels, predict edge labels, (2) scene graph classification (sgcls): given ground truth boxes, predict box labels and edge labels and (3) scene graph detection (sgdet): predict boxes, box labels and edge labels. Open Images Visual Relationship Detection. We follow Open Images Challenge 2018 Visual Relationship Detection Track. We use official recommended validation subset to split the data. The train and val sets contains 53,953 and 3,234 images respectively. There are 9 different relationships, 57 different object classes and 5 different attributes. We adopt the evaluation code from Open Images Visual Relationship Detection Challenge 2018 official evaluation. The metrics are based on detection average precision/recall. Following RelDN, we scale each predicate category by their relative ratios in the val set, which we refer to as the weighted mAP (wmAP), to solve extreme predicate class imbalance problem. The final evaluation score is calculated as $Score=0.2*recall@50+0.4*wmAP(Triplet)+0.4*wmAP(Phrase)$. ### 3.2 SGG methods and frequency baselines We benchmark five scene graph generation methods, including iterative message passing (IMP) [18], multi-level scene detection networks (MSDN) [12], graph R-CNN (GRCNN) [19], Neural Motif [21] and RelDN [22]. Since object labels are highly predictive of relationship labels, we additionally include two simple yet strong frequency baselines (first proposed in [21]) built from training set statistics. The first, “Freq”, gives the most likely relation type given the object and subject labels, based on training set statistics. The second, “Freq+Overlap”, additionally requires that the two boxes have overlap in order for the pair to count as a valid relation. ### 3.3 Benchmarking Results We present benchmarking results on Open Images Visual Relationship Detection in Table 2. The object detection model is a ResNeXt152-FPN detector trained on OpenImagesVRD dataset. Its performance is 76.11 [email protected] over 57 object classes used in relation detection. The RelDN performs the best. The “Freq+Overlap” baseline performs very competitively, better or as good as all methods except RelDN. Thanks to the large and strong ResNeXt152 backbone, our new RelDN result sets a new SOTA performance on this OI VRD task. Model | Score | Recall@50 | wmAP(Triplet) | mAP(Triplet) | wmAP(Phrase) | mAP(Phrase) | Triplet proposal recall | Phrase proposal recall ---|---|---|---|---|---|---|---|--- Neural Motif | 39.48 | 72.54 | 29.35 | 29.26 | 33.10 | 35.02 | 73.64 | 78.70 MSDN | 39.64 | 71.76 | 30.40 | 36.76 | 32.81 | 40.89 | 72.54 | 75.85 IMP | 40.01 | 71.81 | 30.88 | 45.97 | 33.25 | 50.42 | 72.81 | 76.04 Freq+Overlap | 40.12 | 72.63 | 30.18 | 31.82 | 33.81 | 37.08 | 74.81 | 78.26 GRCNN | 43.54 | 74.17 | 34.73 | 39.56 | 37.04 | 43.63 | 74.11 | 77.32 RelDN | 51.08 | 75.40 | 40.85 | 44.24 | 49.16 | 50.60 | 78.74 | 90.39 Table 2: Open Images Scene Graph Detection results on val set. All models share the same object detector, which is an ResNeXt152-FPN detector trained on 57 object classes used in this dataset. All models are inferenced in unconstrained mode (each subject and object pair can have at most 2 predicates). We present benchmarking results on Visual Genome in Table 3. The object detection model is a ResNet50-FPN detector trained on Visucal Genome. Its performance is 28.15 [email protected] over 150 object classes. RelDN is still the best performer. All the other methods achieve similar performance as the “Freq+Overlap” baseline. Model | sgdet@20 | sgdet@50 | sgdet@100 | sgcls@20 | sgcls@50 | sgcls@100 | predcls@20 | predcls@50 | predcls@100 ---|---|---|---|---|---|---|---|---|--- Neural Motif | 21.8 | 30.1 | 33.8 | 30.2 | 35.1 | 36.5 | 52.1 | 61.2 | 63.2 Freq+Overlap | 21.6 | 29.0 | 34.0 | 31.9 | 35.7 | 36.6 | 53.4 | 60.5 | 62.1 IMP | 21.7 | 29.3 | 34.5 | 29.2 | 33.9 | 35.3 | 48.8 | 57.6 | 59.9 MSDN | 22.4 | 30.0 | 35.3 | 29.7 | 34.4 | 35.9 | 51.2 | 59.6 | 61.6 GRCNN | 22.9 | 30.1 | 34.8 | 30.5 | 34.9 | 36.2 | 52.1 | 59.9 | 61.8 RelDN | 24.0 | 32.4 | 37.8 | 31.9 | 35.7 | 36.6 | 54.0 | 60.9 | 62.5 Table 3: Visual Genome Scene Graph Detection results on val set. All models share the same object detector, which is a ResNet50-FPN detector. All models are evaluated in constrained mode (each subject and object pair can only have 1 predicate). ## 4 Ablation Experiments In order to justify our two major changes to existing SGG methods and understand the limitation of these methods, we perform the following ablation study on the OI VRD task. Coupled vs decoupled SGG model architecture. As mentioned in Section 2.1, our code base supports both the coupled and decoupled model architecture. In Table 5, we show that the decoupled arch outperforms the coupled arch. Table 5 also shows that the coupled arch with full model trained by both object and relation detection losses performs the worst. This indicates that the relationship detection task is not helping object detection, but instead making its performance worse. OD | Relation | score | Recall@50 | wmAP(Triplet) | mAP(Triplet) | wmAP(Phrase) | mAP(Phrase) | Triplet proposal recall | Phrase proposal recall ---|---|---|---|---|---|---|---|---|--- predicted objects | “Freq+Overlap” | 40.12 | 72.63 | 30.18 | 29.35 | 33.81 | 34.05 | 77.10 | 89.92 predicted objects | model relation | 46.96 | 74.42 | 38.78 | 41.38 | 41.41 | 44.68 | 77.51 | 89.98 gt objects | “Freq+Overlap” | 78.94 | 93.38 | 77.87 | 73.89 | 72.81 | 68.67 | 93.87 | 94.73 gt objects | model relation | 86.41 | 93.29 | 86.46 | 85.36 | 82.93 | 81.76 | 93.84 | 97.32 gt objects | gt pairs + “Freq+Overlap” | 95.58 | 99.89 | 97.21 | 84.72 | 91.80 | 79.66 | 100 | 100 gt objects | gt pairs + predicted relation | 94.21 | 99.86 | 95.22 | 84.67 | 90.38 | 80.43 | 100 | 100 Table 4: We use the pre-trained RelDN model from [22] for this ablation study. The mAP of object detector (ResNeXt101-FPN) is 71.33. When using predicted bounding box, the bbox pair recall (regardless of predicate) are 86.94(Triplet) and 95.17(Phrase). Model | Recall@50 ---|--- Coupled, only Rel_head is trained | 74.31 Coupled, full model is trained | 66.47 Decoupled | 75.40 Table 5: Comparison of coupled and decoupled models. All these experiments are conducted on OI VRD Dataset with ResNeXt152-FPN as backbone and RelDN as relation head. Model | refined | not refined ---|---|--- IMP | 69.90 | 71.43 MSDN | 68.08 | 71.36 Neural Motif | 71.46 | 72.68 Table 6: Comparison of using object label predicted by relation head (refined object detection) and label predicted by pre-trained object detector. All models are trained on OI VRD dataset with ResNeXt152-FPN backbone and the reported numbers are Recall@50. Should OD be refined or not? In Table 6, we show that it is more desirable to directly use the pre-trained OD results in the relationship detection module, instead of further refining them. Ablate SGG error into different sources. In Table 4, we ablate SGG errors into three sources: errors from object detection (predicted objects vs ground-truth objects), errors from relation proposal (model’s proposed pairs vs ground- truth pairs), and errors from relation classification. We use two models for this experiment: the pre-trained RelDN model (ResNeXt101-FPN) from [22] and the “Freq+Overlap” baseline. We can see that the majority of SGG error comes from the object detection, because the score jumps from 40.96 to 86.41 by replacing the predicted objects with the ground-truth objects. The relation proposal is the second major source of SGG error source, because the score jumps from 86.41 to 94.21 by further replacing the proposed pairs with the ground-truth pairs. Finally, the classification error contributes to the gap from 94.21 to 100. Table 4 also shows that the “Freq+Overlap” baseline is even better than the RelDN model in terms of relation classification, but worse in terms of relation proposals. The barrier of frequency/language prior. As discussed in the last paragraph, the models’ relation classification capability is almost the same as the ”Freq+Overlap” baseline on OI VRD. Since VG task has more predicate classes (50) compared with OI VRD (10), it would be more difficult for the ”Freq+Overlap” baseline. Therefore, we use models trained on VG task to further study if SGG methods only learned the frequency prior from training data. In Table 7, we first compute every method’s relation classification accuracy (the diagonal part) and their pair-wise perfect ensemble accuracy (the lower-diagonal part). As the diagonal shows, all the methods has nearly the same and are slightly worse than the ”Freq+Overlap” baseline. However, all the methods are to some degree different from the ”Freq+Overlap” baseline because the pair-wise ensemble models (the last row) are clearly better than those single models (the diagonal). To further quantify the similarity of two SGG models (including the ”Freq+Overlap” baseline), We calculated their pair- wise similarity based on models’ predictions in Table 8. From these results, we can see the model predictions similarity range from 70.89% to 84.17%. From these results, we conclude that the difference in terms of relation classification capability between learned SGG models and the ”Freq+Overlap” baseline are very small. To further improve SGG performance, new SGG methods should learn more visual signals different from the frequency prior. Model | IMP | MSDN | Neural Motif | GRCNN | RelDN | Freq+Overlap ---|---|---|---|---|---|--- IMP | 63.85 | | | | | MSDN | 69.85 | 64.82 | | | | Neural Motif | 67.71 | 70.27 | 65.21 | | | GRCNN | 70.61 | 68.51 | 70.57 | 64.80 | | RelDN | 71.14 | 70.03 | 70.67 | 69.99 | 66.12 | Freq+Overlap | 70.38 | 69.36 | 69.69 | 69.76 | 69.03 | 66.23 Table 7: Visual Genome models predicate predictions pair-wise ensemble accuracy ($\frac{TP+TN}{TP+TN+FP+FN}$). We assume a perfect ensemble setting where the ensemble model is correct as long as there is a correct prediction in the ensemble. Model | IMP | MSDN | Neural Motif | GRCNN | RelDN | Freq+Overlap ---|---|---|---|---|---|--- IMP | 100 | | | | | MSDN | 73.83 | 100 | | | | Neural Motif | 84.17 | 74.53 | 100 | | | GRCNN | 71.06 | 80.12 | 73.59 | 100 | | RelDN | 70.89 | 75.98 | 75.15 | 76.86 | 100 | Freq+Overlap | 74.49 | 79.17 | 80.30 | 78.21 | 83.56 | 100 Table 8: Visual Genome model predictions similarity comparison under force relation mode. The similarity is defined as $\frac{\text{\\# matched triplets}}{\text{\\# total unique triplets}}$, triplet is defined as $(subj\\_instance,predicate,obj\\_instance)$. ## 5 Feature Extraction Pipelines Our SGG benchmark supports feature extraction for downstream computer vision and vision-language tasks. Given an image, we can extract both object-level features and relation-level features. Object-level features are extracted from the object detector. Each bounding box has a feature vector. Relation-level features are extracted from the scene graph detector. Each relation pair has a feature vector. ## References * [1] P. Anderson, X. He, C. Buehler, D. Teney, M. Johnson, S. Gould, and L. Zhang. Bottom-up and top-down attention for image captioning and visual question answering. In CVPR, 2018. * [2] I. Armeni, Z.-Y. He, J. Gwak, A. R. Zamir, M. Fischer, J. Malik, and S. Savarese. 3d scene graph: A structure for unified semantics, 3d space, and camera. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 5664–5673, 2019. * [3] H. Ben-Younes, R. Cadene, N. Thome, and M. Cord. Block: Bilinear superdiagonal fusion for visual question answering and visual relationship detection. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 33, pages 8102–8109, 2019. * [4] L. Gao, B. Wang, and W. Wang. Image captioning with scene-graph based semantic concepts. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pages 225–229, 2018. * [5] S. Ghosh, G. Burachas, A. Ray, and A. Ziskind. Generating natural language explanations for visual question answering using scene graphs and visual attention. arXiv preprint arXiv:1902.05715, 2019. * [6] J. Gu, S. Joty, J. Cai, H. Zhao, X. Yang, and G. Wang. Unpaired image captioning via scene graph alignments. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 10323–10332, 2019. * [7] J. Ji, R. Krishna, L. Fei-Fei, and J. C. Niebles. Action genome: Actions as composition of spatio-temporal scene graphs, 2019. * [8] J. Johnson, A. Gupta, and L. Fei-Fei. Image generation from scene graphs. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1219–1228, 2018. * [9] J. Johnson, R. Krishna, M. Stark, L.-J. Li, D. Shamma, M. Bernstein, and L. Fei-Fei. Image retrieval using scene graphs. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015. * [10] I. Krasin, T. Duerig, N. Alldrin, V. Ferrari, S. Abu-El-Haija, A. Kuznetsova, H. Rom, J. Uijlings, S. Popov, S. Kamali, M. Malloci, J. Pont-Tuset, A. Veit, S. Belongie, V. Gomes, A. Gupta, C. Sun, G. Chechik, D. Cai, Z. Feng, D. Narayanan, and K. Murphy. Openimages: A public dataset for large-scale multi-label and multi-class image classification. Dataset available from https://storage.googleapis.com/openimages/web/index.html, 2017. * [11] R. Krishna, Y. Zhu, O. Groth, J. Johnson, K. Hata, J. Kravitz, S. Chen, Y. Kalantidis, L.-J. Li, D. A. Shamma, M. Bernstein, and L. Fei-Fei. Visual genome: Connecting language and vision using crowdsourced dense image annotations. 2016\. * [12] Y. Li, W. Ouyang, B. Zhou, K. Wang, and X. Wang. Scene graph generation from objects, phrases and region captions. 2017 IEEE International Conference on Computer Vision (ICCV), Oct 2017. * [13] F. Massa and R. Girshick. maskrcnn-benchmark: Fast, modular reference implementation of Instance Segmentation and Object Detection algorithms in PyTorch. https://github.com/facebookresearch/maskrcnn-benchmark, 2018. Accessed: [Insert date here]. * [14] T. Sylvain, P. Zhang, Y. Bengio, R. D. Hjelm, and S. Sharma. Object-centric image generation from layouts, 2020. * [15] K. Tang. A scene graph generation codebase in pytorch, 2020. https://github.com/KaihuaTang/Scene-Graph-Benchmark.pytorch. * [16] K. Tang, H. Zhang, B. Wu, W. Luo, and W. Liu. Learning to compose dynamic tree structures for visual contexts. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 6619–6628, 2019. * [17] S. Wang, R. Wang, Z. Yao, S. Shan, and X. Chen. Cross-modal scene graph matching for relationship-aware image-text retrieval. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pages 1508–1517, 2020. * [18] D. Xu, Y. Zhu, C. B. Choy, and L. Fei-Fei. Scene graph generation by iterative message passing. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017. * [19] J. Yang, J. Lu, S. Lee, D. Batra, and D. Parikh. Graph r-cnn for scene graph generation. Lecture Notes in Computer Science, page 690–706, 2018. * [20] X. Yang, K. Tang, H. Zhang, and J. Cai. Auto-encoding scene graphs for image captioning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10685–10694, 2019. * [21] R. Zellers, M. Yatskar, S. Thomson, and Y. Choi. Neural motifs: Scene graph parsing with global context. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Jun 2018. * [22] J. Zhang, K. J. Shih, A. Elgammal, A. Tao, and B. Catanzaro. Graphical contrastive losses for scene graph parsing, 2019. * [23] P. Zhang, X. Li, X. Hu, J. Yang, L. Zhang, L. Wang, Y. Choi, and J. Gao. Vinvl: Making visual representations matter in vision-language models. arXiv preprint arXiv:2101.00529, 2021.
arxiv-papers
2021-07-27T05:10:09
2024-09-04T03:07:20.618666
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Xiaotian Han, Jianwei Yang, Houdong Hu, Lei Zhang, Jianfeng Gao,\n Pengchuan Zhang", "submitter": "Xiaotian Han", "url": "https://arxiv.org/abs/2107.12604" }
2107.12605
††thanks: [email protected]††thanks: [email protected]††thanks: [email protected] # Similar Scale-invariant Behaviors between Soft Gamma-ray Repeaters and An Extreme Epoch from FRB 121102 Jun-Jie Wei Purple Mountain Observatory, Chinese Academy of Sciences, Nanjing 210023, China School of Astronomy and Space Sciences, University of Science and Technology of China, Hefei 230026, China Xue-Feng Wu Purple Mountain Observatory, Chinese Academy of Sciences, Nanjing 210023, China School of Astronomy and Space Sciences, University of Science and Technology of China, Hefei 230026, China Zi-Gao Dai School of Astronomy and Space Sciences, University of Science and Technology of China, Hefei 230026, China School of Astronomy and Space Science, Nanjing University, Nanjing 210023, China Fa-Yin Wang School of Astronomy and Space Science, Nanjing University, Nanjing 210023, China Pei Wang CAS Key Laboratory of FAST, NAOC, Chinese Academy of Sciences, Beijing 100101, China Di Li CAS Key Laboratory of FAST, NAOC, Chinese Academy of Sciences, Beijing 100101, China University of Chinese Academy of Sciences, Beijing 100049, China NAOC-UKZN Computational Astrophysics Centre, University of KwaZulu-Natal, Durban 4000, South Africa Bing Zhang Department of Physics and Astronomy, University of Nevada, Las Vegas, Las Vegas, NV 89154, USA ###### Abstract In this work, we study the statistical properties of soft gamma-/hard X-ray bursts from the soft gamma-ray repeater (SGR) 1806–20 and SGR J1935+2154 and of radio bursts from the repeating fast radio burst (FRB) 121102. For SGRs, we show that the probability density functions for the differences of fluences, fluxes, and durations at different times have fat tails with a $q$-Gaussian form. The $q$ values in the $q$-Gaussian distributions are approximately steady and independent of the temporal interval scale adopted, implying a scale-invariant structure of SGRs. These features indicate that SGR bursts may be governed by a self-organizing criticality (SOC) process. The recent discovery of a Galactic FRB associated with a hard X-ray burst from the Galactic magnetar SGR J1935+2154 has established the magnetar origin of at least some FRBs. Very recently, 1652 independent bursts from the repeating FRB 121102 have been detected by the Five-hundred-meter Aperture Spherical radio Telescope (FAST). Here we also investigate the scale-invariant structure of FRB 121102 based on the latest observation of FAST, and show that FRB 121102 and SGRs share similar statistical properties. Scale invariance in both FRB 121102 and SGRs can be well explained within the same physical framework of fractal-diffusive SOC systems. Magnetars, Soft gamma-ray repeaters, Radio transient sources, Radio bursts ## I Introduction Self-organized criticality (SOC) Bak et al. (1987); Aschwanden et al. (2016) has been found in dynamical behaviors of astrophysics systems. We here examine two types of transient phenomena, namely, soft gamma-ray repeaters (SGRs) and fast radio bursts (FRBs), which have been shown to be associated with each other in at least one case (Zhang, 2020). Magnetars are highly magnetized neutron stars that exhibit dramatic variability over a broad range of timescales Duncan and Thompson (1992); Kouveliotou et al. (1998) (see also Kaspi and Beloborodov (2017) for a review). Many magnetars were first observed as SGRs, i.e., sources of repeated bursts of soft gamma-/hard X-rays, with typical durations of $\sim 0.1-1$ s and peak luminosities of $\sim 10^{39}-10^{41}$ erg $\rm s^{-1}$. Three several-minute-long giant flares with peak luminosities up to $\sim 10^{44}-10^{47}$ erg $\rm s^{-1}$ have also been observed from three different SGRs (Hurley et al., 1999; Palmer et al., 2005). Both bursts and flares are believed to be powered by the dissipation and decay of the ultrastrong magnetic fields, either through neutron star crustquakes (Thompson and Duncan, 1995) or magnetic reconnection (Lyutikov, 2003). Several works have found that the energy distribution of SGR bursts can be well fitted by a power-law function Cheng et al. (1996); Göǧüş et al. (1999, 2000); Cheng et al. (2020). Power-law size distributions of extreme events can be explained by SOC systems. The SOC subsystems will self-organize, owing to some driving force, to a critical state, at which a small local disturbance can produce an avalanche-like chain reaction of any size within the system (Bak et al., 1987). The fundamental property of all SOC systems have in common is the emergence of scale-free power-law size distributions (Aschwanden, 2011, 2012, 2015; Wang and Dai, 2013). SGRs, sharing statistical properties in terms of the distributions of energy and waiting time with earthquakes, have been regarded as SOC systems (Cheng et al., 1996). The earthquake-like behavior also suggests that the energies of SGRs originate from starquakes of magnetars (Duncan and Thompson, 1992; Thompson and Duncan, 1995). Besides the power-law size distribution, another hallmark of SOC systems is the scale invariance of the avalanche size differences (Caruso et al., 2007; Wang et al., 2015). Caruso et al. Caruso et al. (2007) showed that the probability density functions (PDFs) for the earthquake energy differences at different times have fat tails with a $q$-Gaussian form, which could be well explained by introducing a small-world topology on the Olami-Feder-Christensen (OFC) model (Olami et al., 1992). In physics, the OFC model is one of the most popular models displaying SOC. The $q$-Gaussian distribution was then suggested as an important character for describing the presence of criticality (Caruso et al., 2007). Moreover, the form of the PDF does not depend on the time interval adopted for the earthquake energy difference, i.e., the $q$ values in $q$-Gaussian distributions keep nearly constant for different scale intervals, which indicates that there is a scale-invariant structure in the energy differences of earthquakes (Caruso et al., 2007; Wang et al., 2015). Subsequently, Chang et al. Chang et al. (2017) studied 384 X-ray bursts observed in three active episodes of SGR J1550–5418 and found that this SGR shows similar scale-invariant behaviors with earthquakes, i.e., the PDFs of the differences of fluences, peak fluxes, and durations exhibit a common $q$-Gaussian distribution at different scale intervals, supporting the idea that SGRs are powered by crustquakes of magnetars. FRBs are intense millisecond-duration bursts of radio waves occurring in the universe (Lorimer et al., 2007; Petroff et al., 2019; Cordes and Chatterjee, 2019). So far, more than 600 FRBs have been reported, and over two dozens of them have been seen to repeat Spitler et al. (2016); CHIME/FRB Collaboration et al. (2019). Although rapid developments have been made in the FRB research field, the physical origin of FRBs remains mysterious (Platts et al., 2019; Zhang, 2020; Xiao et al., 2021). Magnetars have been proposed as the likely engine to power repeating FRBs (Popov and Postnov, 2010; Katz, 2016; Metzger et al., 2017; Wang and Yu, 2017; Beloborodov, 2017; Kumar et al., 2017; Yang and Zhang, 2018; Cheng et al., 2020; Wang et al., 2020). On 2020 April 28, one FRB-like event was independently detected by the Canadian Hydrogen Intensity Mapping Experiment (CHIME/FRB Collaboration et al., 2020) and the Survey for Transient Astronomical Radio Emission 2 (Bochenek et al., 2020) in association with a hard X-ray burst from the Galactic magnetar SGR J1935+2154 during its active phase (Li et al., 2021a; Ridnaia et al., 2021; Tavani et al., 2021). This discovery strongly supports that magnetar engines can produce at least some extragalactic FRBs. Recently, by analyzing 93 bursts from the repeating FRB 121102 by the observation of the Green Bank Telescope at 4–8 GHz (Zhang et al., 2018), Lin & Sang Lin and Sang (2020) found that FRB 121102 has the property of scale invariance similar to that of SGR J1550–5418. During an extreme episode of bursts, FRB 121102 produced 1652 detectable events within a time-span of 62 days (Li et al., 2021b). The peak burst rate reached 117 hr-1. Such a range of cadence facilitate further investigation into the SOC structures of this source. Another key feature of this burst set from FRB 121102 is the bimodal energy distribution of the burst rate. Among the 16 known SGRs (12 confirmed and 4 candidates) Olausen and Kaspi (2014), SGR J1550–5418 is the only source to date that has been used to investigate the scale-invariant property (Chang et al., 2017). So it is interesting to know whether other SGRs (e.g., SGR 1806–20 and SGR J1935+2154) share the same property. The magnetar research group at Sabancı University presented their systematic temporal and broad-band spectral analysis of over 1,500 bursts from SGR J1550–5418, SGR 1900+14, and SGR 1806–20 observed with the Rossi X-ray Timing Explorer (RXTE) Kırmızıbayrak et al. (2017). In these public data, SGR 1806–20 has the largest burst sample (924 bursts), which will be used in our following analysis. Additionally, since SGR J1935+2154 is the first source that has been reported to power a Galactic FRB (CHIME/FRB Collaboration et al., 2020; Bochenek et al., 2020), we will also investigate the physical connection between SGR J1935+2154 and repeating FRBs. In this paper, we investigate the scale-invariant behaviors of SGR 1806–20, SGR J1935+2154, and FRB 121102. For SGRs, the PDFs of the differences of fluences (or total counts), peak fluxes (or peak counts), and durations at different time scales are shown in Section II. These PDFs can be well fitted by a $q$-Gaussian function, and the functional form does not depend on the scale interval adopted. In Section III, we compare the PDFs between SGRs and repeating FRB 121102. The evidence that may shed light on the bimodal burst energy distribution of FRB 121102 is discussed in Section IV. Lastly, a brief summary and discussion are given in Section V. ## II Scale-invariance in SGRs ### II.1 Data The magnetar research group at Sabancı University has constructed an online database of magnetar bursts detected by the RXTE between 1996 and 2011, which can be visited at http://magnetars.sabanciuniv.edu. This database contains 924 bursts from SGR 1806–20, representing the largest sample for a single observation. The trigger time, total counts, peak counts, and duration of each burst are available in the database. For SGR J1935+2154, the bursts observed by the Gamma-ray Burst Monitor onboard the Fermi satellite during the source’s six active episodes from 2014 to 2020 are used (Lin et al., 2020a, b). The number of bursts is 260. The available information for each burst include trigger time, fluence, and duration, but not peak flux. Note that the adopted durations of all bursts from both SGR 1806–20 and SGR J1935+2154 were determined by Bayesian block algorithm. We estimate the waiting time between two adjacent bursts through $\Delta t=t_{i+1}-t_{i}$, where $t_{i+1}$ and $t_{i}$ are the trigger times of the $(i+1)$-th and $i$-th bursts, respectively. As both SGR 1806–20 and SGR J1935+2154 consist of several isolated epochs, we discard the waiting time between the last burst of a certain epoch and the first burst of the next epoch. Table 1: The mean values of $q$ in the $q$-Gaussian distribution for earthquakes, SGRs, and FRB 121102 Phenomena | Energy range (erg) | Number | $q$-fluence (energy) | $q$-flux | $q$-duration | References ---|---|---|---|---|---|--- earthquakes | | 400,000 | $1.75\pm 0.15$ | – | – | Caruso et al. (2007) SGR J1550–5418 | | 384 | $2.41\pm 0.29$ | $2.40\pm 0.30$ | $2.06\pm 0.23$ | Chang et al. (2017) SGR 1806–20 | | 924 | $2.72\pm 0.05$ | $2.65\pm 0.05$ | $2.48\pm 0.05$ | This work SGR J1935+2154 | | 260 | $2.78\pm 0.12$ | – | $2.28\pm 0.15$ | This work FRB 121102 | Overall bursts | 1652 | $2.51\pm 0.03$ | $2.50\pm 0.03$ | $1.42\pm 0.04$ | This work | with $4\times 10^{36}<E<8\times 10^{39}$ | | | | | FRB 121102 | Low-energy bursts | 1253 | $1.63\pm 0.09$ | $1.81\pm 0.05$ | $1.39\pm 0.06$ | This work | with $4\times 10^{36}<E\leq 2\times 10^{38}$ | | | | | | High-energy bursts | 399 | $2.21\pm 0.10$ | $2.34\pm 0.09$ | $1.50\pm 0.16$ | This work | with $2\times 10^{38}<E<8\times 10^{39}$ | | | | | Figure 1: Scale-invariant structure of SGR 1806–20. PDFs of the differences of total counts (upper-left panel), peak counts (upper-right panel), and durations (lower-left panel) for $n=1$ (red diamonds), $n=50$ (green circles), and $n=100$ (blue triangles), and the best-fitting $q$-Gaussian distributions (solid lines). Lower-right panel: the best-fitting $q$ values in the $q$-Gaussian distribution as a function of $n$. Figure 2: Scale-invariant structure of SGR J1935+2154. PDFs of the differences of fluences (left panel) and durations (middle panel) for $n=1$ (red diamonds), $n=50$ (green circles), and $n=100$ (blue triangles), and the best- fitting $q$-Gaussian distributions (solid lines). Right panel: the best- fitting $q$ values in the $q$-Gaussian distribution as a function of $n$. ### II.2 PDFs of the Avalanche Size Differences We are now in position to use the data of SGR 1806–20 and SGR J1935+2154 to investigate the PDFs of the avalanche size differences. The difference between two avalanche sizes is given by $X_{n}=S_{i+n}-S_{i}\;,$ (1) where $S_{i}$ is the size (fluence, peak flux, duration, or waiting time) of the $i$-th burst in temporal order and $n$ (an integer) is the temporal interval scale. In practice, $X_{n}$ is normalized to $x_{n}=\frac{X_{n}}{\sigma_{X_{n}}}\;,$ (2) where $\sigma_{X_{n}}$ is the standard deviation of $X_{n}$. We are interest in the statistical distribution of $x_{n}$. Figure 1 shows the statistical results of SGR 1806–20. In this plot, we display the PDFs of the differences of total counts (upper-left panel), peak counts (upper-right panel), and durations (lower-left panel) for $n=1$ (diamonds), $n=50$ (circles), and $n=100$ (triangles). Following Chang et al. (2017), the data are binned based on the Freedman-Diaconis rule (Freedman and Diaconis, 1981). One can see from Figure 1 that these PDFs $P(x_{n})$ have a sharp peak and fat tails, which are different from Gaussian behaviors. The sharp peak means that small size differences are most likely to happen, while the fat tails suggest that there are rare but relatively large size differences. The large fluctuations presented in the tails are caused by the incompleteness given from the lack sampling of small magnitude events at the global scale (Caruso et al., 2007). Additionally, the data points in Figure 1 are almost independent of the temporal interval scale $n$ adopted for the avalanche size difference, indicating a common form of $P(x_{n})$. Here we use the Tsallis $q$-Gaussian function (Tsallis, 1988; Tsallis et al., 1998) $f(x_{n})=\alpha\left[1-\left(1-q\right)x_{n}^{2}/\beta\right]^{\frac{1}{1-q}}$ (3) to fit $P(x_{n})$, where $\alpha$, $\beta$, and $q$ are free parameters. When $q\rightarrow 1$, the $q$-Gaussian distribution reduces to the Gaussian distribution with mean zero and standard deviation $\sigma=\sqrt{\beta/2}$. Thus, $q\neq 1$ denotes a departure from Gaussian statistics. The best-fitting parameters ($\alpha$, $\beta$, and $q$) are obtained by minimizing the $\chi^{2}$ statistics, $\chi^{2}=\sum_{i}\frac{\left[f(x_{n,i})-P(x_{n,i})\right]^{2}}{\sigma_{P,i}^{2}}\;,$ (4) where $\sigma_{P,i}=\sqrt{N_{{\rm bin},i}}/N_{\rm tot}$ is the uncertainty of the data point,111For clarity, the uncertainties of the data points are not presented in the figure. with $N_{{\rm bin},i}$ is the event number in the $i$-th bin and $N_{\rm tot}$ is the total number of $x_{n}$. We use the python implementation, emcee (Foreman-Mackey et al., 2013), to apply the Markov Chain Monte Carlo method to derive the best-fitting values and their corresponding uncertainties for these parameters. In Figure 1, the red, green, and blue smooth curves correspond to the best-fitting results for $n=1$, $n=50$, and $n=100$, respectively. We may see that the PDFs of the differences of total counts, peak counts, and durations are well fitted by the $q$-Gaussian function, and that the three curves in each panel overlap almost completely. However, the PDF of the waiting time differences can not be well fitted by $q$-Gaussian (see also Ref. Chang et al. (2017)), so we do not exhibit it in the figure. The waiting time shows different behaviors, which may be due to the discontinuous observations of the telescope. Furthermore, we compute the PDFs of the differences of total counts, peak counts, and durations at different scale intervals $1\leq n\leq 100$, and fit the PDFs with the $q$-Gaussian function. In the lower-right panel of Figure 1, we plot the best-fitting $q$ values as a function of $n$. We find that the $q$ values are approximately invariant for different scale intervals $n$. The property of the independence of $q$ values on $n$ is referred to as scale invariance. The mean values of $q$ for total counts, peak counts, and duration are $2.72\pm 0.05$, $2.65\pm 0.05$, and $2.48\pm 0.05$, respectively, which are summarized in Table 1. Here the uncertainty denotes the standard deviation of $q$. Interestingly, the $q$ values we find here are close to the values derived from SGR J1550–5418 (Chang et al., 2017), which indicates that there is a common scale-invariant property in SGRs. Similar results can be obtained for the data of SGR J1935+2154, see Figure 2. The $q$ values for this data also keep approximately steady for different scale intervals $n$. The mean values of $q$ for fluence and duration are $2.78\pm 0.12$ and $2.28\pm 0.14$, respectively. As shown in Table 1, these values are well consistent with those of SGR J1550–5418 (Chang et al., 2017) and SGR 1806–20, supporting a common scale-invariant structure of SGRs again. ## III Comparison with FRB 121102 Owing to the association between FRB 200428 and an X-ray burst from the Galactic magnetar SGR J1935+2154 (CHIME/FRB Collaboration et al., 2020; Bochenek et al., 2020; Li et al., 2021a; Ridnaia et al., 2021; Tavani et al., 2021), it is natural to consider whether radio bursts of repeating FRBs have a similar scale-invariant behavior. In this section, we compare the PDFs between SGRs and repeating FRBs. Recently, Li et al. Li et al. (2021b) reported the detection of 1652 independent bursts in 59.5 hours spanning 62 days using the Five-hundred-meter Aperture Spherical radio Telescope (FAST) Nan et al. (2011); Li et al. (2018) at 1.05-1.45 GHz. Such a uniform sample prevent complex selection effects, which can be introduced by different instruments and different frequency bands used in observations. Here we focus on the PDFs for the differences of energies, fluxes, and durations at different time scales. For a fixed $n$, we fit the PDF with the $q$-Gaussian function and extract the best-fitting $q$ value. Then we vary $n$ and derive the $q$ values as a function of $n$. Figure 3: Scale-invariant structure of FRB 121102. PDFs of the differences of energies (upper-left panel), fluxes (upper-right panel) and durations (lower- left panel) for $n=1$ (red diamonds), $n=50$ (green circles), and $n=100$ (blue triangles), and the best-fitting $q$-Gaussian distributions (solid lines). Lower-right panel: the best-fitting $q$ values in the $q$-Gaussian distribution as a function of $n$. Figure 3 exhibits some examples of the fits for the sample of FRB 121102. In this figure, we show the PDFs of the differences of energies (upper-left panel), fluxes (upper-right panel), and durations (lower-left panel) for $n=1$ (diamonds), $n=50$ (circles), and $n=100$ (triangles). The solid curves stand for the best-fitting results. One can see that the PDFs can be well fitted by the $q$-Gaussian function, in good agreement with the results of Lin and Sang (2020). Similar to the scenario of SGRs, we also find that the $q$-Gaussian function gives a poor fit to the PDF of the FRB waiting time differences, which is then not shown in the figure (see also Ref. Lin and Sang (2020)). To better represent the scale-invariant property in FRB 121102, in the lower- right panel of Figure 3 we plot the best-fitting $q$ values as a function of the temporal interval scale $n$. We confirm that the $q$ values are almost stable and independent of $n$. This implies that there are similar scale- invariant properties among earthquakes, SGRs, and FRBs. We also list the average $q$ values of energy ($2.51\pm 0.03$), flux ($2.50\pm 0.03$), and duration ($1.42\pm 0.04$) for FRB 121102 in Table 1. We emphasize that the $q$-Gaussian distribution is a generalization of the standard Gaussian distribution and it reduces to a Gaussian distribution when $q\rightarrow 1$. Since the average $q$ value of duration is relatively small (closing to $1$), the peak of the PDF in the lower-left panel of Figure 3 is no longer very sharp as other PDFs. ## IV Evidence of a bimodal burst energy distribution of FRB 121102 The burst energy distribution of FRB 121102 can be adequately described as bimodal (Li et al., 2021b). At the low energy end ($\sim E<2\times 10^{38}$ erg), a log-normal function can describe the distribution reasonably well. While the distribution at the high energy end ($\sim E>2\times 10^{38}$ erg) can be well fitted by a generalized Cauchy function. It is interesting to investigate whether low-energy bursts and high-energy bursts of FRB 121102 have a similar scale-invariant behavior. We divide the overall 1652 bursts into two components, i.e., 1253 low-energy bursts with $E\leq 2\times 10^{38}$ erg and 399 high-energy bursts with $E>2\times 10^{38}$ erg. Then the scale-invariant structure of the two components are investigated, respectively. As shown in Table 1, the average $q$ values of energy, peak flux, and duration for the low-energy component are $q_{E}=1.63\pm 0.09$, $q_{P}=1.81\pm 0.05$, and $q_{T}=1.39\pm 0.06$. The average $q$ values for the high-energy component are $q_{E}=2.21\pm 0.10$, $q_{P}=2.34\pm 0.09$, and $q_{T}=1.50\pm 0.16$. Interestingly, the average $q$ value obtained from the PDFs of the energy differences of low-energy bursts is compatible, within the standard deviations, to that one found from earthquakes ($q=1.75\pm 0.15$) Caruso et al. (2007). Consistent with theoretical models of FRBs based on magnetar Popov and Postnov (2010); Lyubarsky (2014); Beloborodov (2017); Metzger et al. (2019), the earthquake-like behavior here may indicate that the low-energy bursts of FRB 121102 could originate from starquakes of a magnetar. More interestingly, the average $q$ values of energy, peak flux, and duration for the high-energy component of FRB 121102 are roughly consistent with those of SGRs. We next show that these $q$ values can be well understood within the same statistical framework of a SOC system. For a fractal-diffusive avalanche model, quantitative values for the size distributions of SOC parameters (length scales $L$, durations $T$, peak fluxes $P$, and fluences or energies $E$) are derived from first principles, using the scale-free probability conjecture, $N(L)dL\propto L^{-S}dL$, for three Euclidean dimensions $S=1$, 2, and 3. The analytical model predicts the indices of size distributions for $E$, $T$, and $P$ as (Aschwanden, 2012, 2014) $\displaystyle\alpha_{E}$ $\displaystyle=$ $\displaystyle 1+(S-1)/(D_{S}+2)$ $\displaystyle\alpha_{T}$ $\displaystyle=$ $\displaystyle(1+S)/2\;,$ (5) $\displaystyle\alpha_{P}$ $\displaystyle=$ $\displaystyle 2-1/S$ where $D_{S}\approx(1+S)/2$ is the mean fractal dimension. As mentioned above, Caruso et al. Caruso et al. (2007) presented an analysis method to explain SOC behavior in the limited number of earthquakes by making use of the return distributions (i.e., distributions of the avalanche size differences at different times). They obtained the first strong evidence that the return distributions appear to have the shape of $q$-Gaussians, standard distributions arising naturally in nonextensive statistical mechanics (Tsallis, 1988; Tsallis et al., 1998). Under the assumption that there is no correlation between the sizes of two events, an exact relation between the index $\alpha$ of the avalanche size distribution and the $q$ values of the appropriate $q$-Gaussian has been obtained as (Caruso et al., 2007; Celikoglu et al., 2010) $q=\frac{\alpha+2}{\alpha}\;,$ (6) which is important because it makes the $q$ parameter determined a priori from one of the well-known indices of the system. In the framework of the fractal-diffusive SOC model, we obtain the theoretical $q$ values, i.e., $q_{E}\approx 2.33$, $q_{P}\approx 2.20$, and $q_{T}=2.0$, according to Equations (IV) and (6) by taking the three-dimensional Euclidean space $S=3$. The observed $q$ values of SGR J1550–5418, SGR 1806–20, and SGR J1935+2154 at $1\sigma$ confidence level are in the range of $q_{E}\approx 2.12-2.9$, $q_{P}\approx 2.37-2.70$, and $q_{T}\approx 1.83-2.53$, which agree well with the predictions of the fractal-diffusive SOC model. We also note that the derived $q_{E}$ and $q_{P}$ of the high-energy component of FRB 121102 ($q_{E}=2.21\pm 0.10$ and $q_{P}=2.34\pm 0.09$) are in good agreement with the predictions of the fractal-diffusive SOC model, and the derived $q_{T}$ ($1.50\pm 0.16$) is also roughly consistent with the model prediction at $3.1\sigma$ confidence level. Therefore, SGRs and high-energy bursts of FRB 121102 share similar scale-invariant behavior, suggesting that they can be explained within the same statistical framework of fractal-diffusive SOC systems with the spatial dimension $S=3$. The observed durations of the repeating bursts of FRB 121102 are directly used for the analysis of scale invariance. As is well known, the observed pulse duration of FRB is generally broadened by the instrumental and astrophysical sources (Cordes and McLaughlin, 2003). The instrumental pulse broadening includes the sampling time-scale and the intrachannel dispersion smearing. The temporal resolution can not be better than the sampling time-scale, which broadens the pulse. The smearing is caused by intrachannel dispersion. The astrophysical pulse broadening is the scattering process of the radio emission in inhomogeneous plasma. Therefore, the observed duration does not directly represent the intrinsic duration. The intrinsic durations of the repeating bursts, in principle, should be used for our purpose. In practice, it is difficult to separate the intrinsic duration from the broadening components. But note that the distribution of the observed duration differences at different time intervals is studied in this work. Pulse broadening caused by smearing and scattering can be approximately deducted from subtracting two observed durations. That is, the difference between two observed durations can be approximated as the difference between two intrinsic ones. ## V Summary and Discussion Previous studies have shown that the PDFs for the earthquake energy differences at different time intervals have fat tails with a $q$-Gaussian shape (Caruso et al., 2007; Wang et al., 2015). Another remarkable feature is that the $q$ values in the $q$-Gaussian distributions are approximately equal and independent of the temporal interval scale adopted, indicating a scale- invariant structure in the energy differences of earthquakes. These statistical features can be well explained within a dissipative SOC scenario taking into account long-range interactions (Caruso et al., 2007). That is, scale invariance is an important character representing the system approaching to a critical state. Recently, Chang et al. Chang et al. (2017) found that SGR J1550–5418 has the property of scale invariance similar to that of earthquakes. However, it is unclear whether other SGRs share the same scale- invariant structure as SGR J1550–5418 and earthquakes. In this work, we present statistics of soft gamma-/hard X-ray bursts from SGR 1806–20 and SGR J1935+2154. We find that the two SGRs share earthquake-like behaviors in terms of the PDFs of the fluence differences, consistent with the results of Chang et al. (2017). The PDFs of the fluence differences can be well fitted by a $q$-Gaussian function and the $q$ values keep nearly constant for different scale intervals. The earthquake-like behaviors support that there is a common scale-invariant structure in SGRs and that systems responsible for SGR bursts are in an SOC state. Moreover, we show that the burst fluxes and durations of the SGRs share similar scale-invariant behaviors with fluences, i.e., the PDFs of the differences of fluxes and durations at different time intervals also well follow $q$-Gaussian distributions. Given the association between an FRB-like event and an X-ray burst from the Galactic magnetar SGR J1935+2154, we also investigate the scale-invariant structure of the repeating FRB 121102. For FRB 121102, we show that the PDFs of the differences of energies, fluxes, and durations also exhibit $q$-Gaussian distributions, with steady $q$ values independent of the time scale. These properties are very similar to those of earthquakes and SGRs, and thus all can be attributed to a SOC process. Due to the fact that the burst energy distribution of FRB 121102 is bimodal, we also investigate the scale- invariant behaviors of low-energy bursts and high-energy bursts of FRB 121102. We find that the $q_{E}$, $q_{P}$, and $q_{T}$ values of low-energy bursts are different from those of high-energy bursts, which indicate that the low-energy component and the high-energy component may have different physical origins. Interestingly, the average $q$ value obtained from the PDFs of the energy differences of low-energy bursts is close to the $q$ value found from earthquakes. This implies that there may be some similarities between the energy origins of low-energy bursts of FRB 121102 and earthquakes. More interestingly, the average $q$ values of energy, peak flux, and duration for the high-energy component of FRB 121102 are roughly consistent with those of SGRs. These $q$ values can be well explained within the same statistical framework of fractal-diffusive SOC systems with the spatial dimension $S=3$. In the future, much more repeating bursts of FRBs will be detected. The physical connection between repeating FRBs and SGRs can be further investigated. ###### Acknowledgements. This work is partially supported by the National Natural Science Foundation of China (grant Nos. 11988101, 11725314, U1831122, 12041306, U1831207), the Youth Innovation Promotion Association (2017366), the Key Research Program of Frontier Sciences (grant No. ZDBS-LY-7014) of Chinese Academy of Sciences, and the Major Science and Technology Project of Qinghai Province (2019-ZJ-A10). ZGD was supported by the National Key Research and Development Program of China (grant No. 2017YFA0402600), the National SKA Program of China (grant No. 2020SKA0120300), and the National Natural Science Foundation of China (grant No. 11833003). ## References * Bak et al. (1987) P. Bak, C. Tang, and K. Wiesenfeld, Phys. Rev. Lett. 59, 381 (1987). * Aschwanden et al. (2016) M. J. Aschwanden, N. B. Crosby, M. Dimitropoulou, M. K. Georgoulis, S. Hergarten, J. McAteer, A. V. Milovanov, S. Mineshige, L. Morales, N. Nishizuka, et al., Space Sci. Rev. 198, 47 (2016), eprint 1403.6528. * Zhang (2020) B. Zhang, Nature (London) 587, 45 (2020), eprint 2011.03500. * Duncan and Thompson (1992) R. C. Duncan and C. Thompson, Astrophys. J. Lett. 392, L9 (1992). * Kouveliotou et al. (1998) C. Kouveliotou, S. Dieters, T. Strohmayer, J. van Paradijs, G. J. Fishman, C. A. Meegan, K. Hurley, J. Kommers, I. Smith, D. Frail, et al., Nature (London) 393, 235 (1998). * Kaspi and Beloborodov (2017) V. M. Kaspi and A. M. Beloborodov, Ann. Rev. Astron. Astrophys. 55, 261 (2017), eprint 1703.00068. * Hurley et al. (1999) K. Hurley, T. Cline, E. Mazets, S. Barthelmy, P. Butterworth, F. Marshall, D. Palmer, R. Aptekar, S. Golenetskii, V. Il’Inskii, et al., Nature (London) 397, 41 (1999), eprint astro-ph/9811443. * Palmer et al. (2005) D. M. Palmer, S. Barthelmy, N. Gehrels, R. M. Kippen, T. Cayton, C. Kouveliotou, D. Eichler, R. A. M. J. Wijers, P. M. Woods, J. Granot, et al., Nature (London) 434, 1107 (2005), eprint astro-ph/0503030. * Thompson and Duncan (1995) C. Thompson and R. C. Duncan, Mon. Not. R. Astron. Soc. 275, 255 (1995). * Lyutikov (2003) M. Lyutikov, Mon. Not. R. Astron. Soc. 346, 540 (2003), eprint astro-ph/0303384. * Cheng et al. (1996) B. Cheng, R. I. Epstein, R. A. Guyer, and A. C. Young, Nature (London) 382, 518 (1996). * Göǧüş et al. (1999) E. Göǧüş, P. M. Woods, C. Kouveliotou, J. van Paradijs, M. S. Briggs, R. C. Duncan, and C. Thompson, Astrophys. J. Lett. 526, L93 (1999), eprint astro-ph/9910062. * Göǧüş et al. (2000) E. Göǧüş, P. M. Woods, C. Kouveliotou, J. van Paradijs, M. S. Briggs, R. C. Duncan, and C. Thompson, Astrophys. J. Lett. 532, L121 (2000), eprint astro-ph/0002181. * Cheng et al. (2020) Y. Cheng, G. Q. Zhang, and F. Y. Wang, Mon. Not. R. Astron. Soc. 491, 1498 (2020), eprint 1910.14201. * Aschwanden (2011) M. J. Aschwanden, _Self-Organized Criticality in Astrophysics_ (2011). * Aschwanden (2012) M. J. Aschwanden, Astron. & Astrophys. 539, A2 (2012), eprint 1112.4859. * Aschwanden (2015) M. J. Aschwanden, Astrophys. J. 814, 19 (2015), eprint 1510.01987. * Wang and Dai (2013) F. Y. Wang and Z. G. Dai, Nature Physics 9, 465 (2013), eprint 1308.1253. * Caruso et al. (2007) F. Caruso, A. Pluchino, V. Latora, S. Vinciguerra, and A. Rapisarda, Phys. Rev. E 75, 055101 (2007), eprint cond-mat/0606118. * Wang et al. (2015) P. Wang, Z. Chang, H. Wang, and H. Lu, European Physical Journal B 88, 206 (2015). * Olami et al. (1992) Z. Olami, H. J. S. Feder, and K. Christensen, Phys. Rev. Lett. 68, 1244 (1992). * Chang et al. (2017) Z. Chang, H.-N. Lin, Y. Sang, and P. Wang, Chinese Physics C 41, 065104 (2017), eprint 1702.05842. * Lorimer et al. (2007) D. R. Lorimer, M. Bailes, M. A. McLaughlin, D. J. Narkevic, and F. Crawford, Science 318, 777 (2007), eprint 0709.4301. * Petroff et al. (2019) E. Petroff, J. W. T. Hessels, and D. R. Lorimer, Astron. Astrophys. Rev. 27, 4 (2019), eprint 1904.07947. * Cordes and Chatterjee (2019) J. M. Cordes and S. Chatterjee, Ann. Rev. Astron. Astrophys. 57, 417 (2019), eprint 1906.05878. * Spitler et al. (2016) L. G. Spitler, P. Scholz, J. W. T. Hessels, S. Bogdanov, A. Brazier, F. Camilo, S. Chatterjee, J. M. Cordes, F. Crawford, J. Deneva, et al., Nature (London) 531, 202 (2016), eprint 1603.00581. * CHIME/FRB Collaboration et al. (2019) CHIME/FRB Collaboration, B. C. Andersen, K. Bandura, M. Bhardwaj, P. Boubel, M. M. Boyce, P. J. Boyle, C. Brar, T. Cassanelli, P. Chawla, et al., Astrophys. J. Lett. 885, L24 (2019), eprint 1908.03507. * Platts et al. (2019) E. Platts, A. Weltman, A. Walters, S. P. Tendulkar, J. E. B. Gordin, and S. Kandhai, Physics Reports 821, 1 (2019), eprint 1810.05836. * Xiao et al. (2021) D. Xiao, F. Wang, and Z. Dai, Science China Physics, Mechanics, and Astronomy 64, 249501 (2021), eprint 2101.04907. * Popov and Postnov (2010) S. B. Popov and K. A. Postnov, in _Evolution of Cosmic Objects through their Physical Activity_ , edited by H. A. Harutyunian, A. M. Mickaelian, and Y. Terzian (2010), pp. 129–132, eprint 0710.2006. * Katz (2016) J. I. Katz, Astrophys. J. 826, 226 (2016), eprint 1512.04503. * Metzger et al. (2017) B. D. Metzger, E. Berger, and B. Margalit, Astrophys. J. 841, 14 (2017), eprint 1701.02370. * Wang and Yu (2017) F. Y. Wang and H. Yu, JCAP 2017, 023 (2017), eprint 1604.08676. * Beloborodov (2017) A. M. Beloborodov, Astrophys. J. Lett. 843, L26 (2017), eprint 1702.08644. * Kumar et al. (2017) P. Kumar, W. Lu, and M. Bhattacharya, Mon. Not. R. Astron. Soc. 468, 2726 (2017), eprint 1703.06139. * Yang and Zhang (2018) Y.-P. Yang and B. Zhang, Astrophys. J. 868, 31 (2018), eprint 1712.02702. * Wang et al. (2020) F. Y. Wang, Y. Y. Wang, Y.-P. Yang, Y. W. Yu, Z. Y. Zuo, and Z. G. Dai, Astrophys. J. 891, 72 (2020), eprint 2002.03507. * CHIME/FRB Collaboration et al. (2020) CHIME/FRB Collaboration, B. C. Andersen, K. M. Bandura, M. Bhardwaj, A. Bij, M. M. Boyce, P. J. Boyle, C. Brar, T. Cassanelli, P. Chawla, et al., Nature (London) 587, 54 (2020), eprint 2005.10324. * Bochenek et al. (2020) C. D. Bochenek, V. Ravi, K. V. Belov, G. Hallinan, J. Kocz, S. R. Kulkarni, and D. L. McKenna, Nature (London) 587, 59 (2020), eprint 2005.10828. * Li et al. (2021a) C. K. Li, L. Lin, S. L. Xiong, M. Y. Ge, X. B. Li, T. P. Li, F. J. Lu, S. N. Zhang, Y. L. Tuo, Y. Nang, et al., Nature Astronomy 5, 378 (2021a), eprint 2005.11071. * Ridnaia et al. (2021) A. Ridnaia, D. Svinkin, D. Frederiks, A. Bykov, S. Popov, R. Aptekar, S. Golenetskii, A. Lysenko, A. Tsvetkova, M. Ulanov, et al., Nature Astronomy 5, 372 (2021), eprint 2005.11178. * Tavani et al. (2021) M. Tavani, C. Casentini, A. Ursi, F. Verrecchia, A. Addis, L. A. Antonelli, A. Argan, G. Barbiellini, L. Baroncelli, G. Bernardi, et al., Nature Astronomy 5, 401 (2021), eprint 2005.12164. * Zhang et al. (2018) Y. G. Zhang, V. Gajjar, G. Foster, A. Siemion, J. Cordes, C. Law, and Y. Wang, Astrophys. J. 866, 149 (2018), eprint 1809.03043. * Lin and Sang (2020) H.-N. Lin and Y. Sang, Mon. Not. R. Astron. Soc. 491, 2156 (2020), eprint 1912.01191. * Li et al. (2021b) D. Li, P. Wang, W. W. Zhu, B. Zhang, X. X. Zhang, R. Duan, Y. K. Zhang, Y. Feng, N. Y. Tang, S. Chatterjee, et al., arXiv e-prints arXiv:2107.08205 (2021b), eprint 2107.08205. * Olausen and Kaspi (2014) S. A. Olausen and V. M. Kaspi, Astrophys. J. Suppl. Ser. 212, 6 (2014), eprint 1309.4167. * Kırmızıbayrak et al. (2017) D. Kırmızıbayrak, S. Şaşmaz Muş, Y. Kaneko, and E. Göğüş, Astrophys. J. Suppl. Ser. 232, 17 (2017), eprint 1708.08067. * Lin et al. (2020a) L. Lin, E. Göğüş, O. J. Roberts, C. Kouveliotou, Y. Kaneko, A. J. van der Horst, and G. Younes, Astrophys. J. 893, 156 (2020a), eprint 2003.10582. * Lin et al. (2020b) L. Lin, E. Göğüş, O. J. Roberts, M. G. Baring, C. Kouveliotou, Y. Kaneko, A. J. van der Horst, and G. Younes, Astrophys. J. Lett. 902, L43 (2020b), eprint 2010.02767. * Freedman and Diaconis (1981) D. Freedman and P. Diaconis, Probability Theory and Related Fields 57, 453 (1981). * Tsallis (1988) C. Tsallis, Journal of Statistical Physics 52, 479 (1988). * Tsallis et al. (1998) C. Tsallis, R. Mendes, and A. R. Plastino, Physica A Statistical Mechanics and its Applications 261, 534 (1998). * Foreman-Mackey et al. (2013) D. Foreman-Mackey, D. W. Hogg, D. Lang, and J. Goodman, Pub. Astro. Soc. Pacific 125, 306 (2013), eprint 1202.3665. * Nan et al. (2011) R. Nan, D. Li, C. Jin, Q. Wang, L. Zhu, W. Zhu, H. Zhang, Y. Yue, and L. Qian, International Journal of Modern Physics D 20, 989 (2011), eprint 1105.3794. * Li et al. (2018) D. Li, P. Wang, L. Qian, M. Krco, P. Jiang, Y. Yue, C. Jin, Y. Zhu, Z. Pan, R. Nan, et al., IEEE Microwave Magazine 19, 112 (2018), eprint 1802.03709. * Lyubarsky (2014) Y. Lyubarsky, Mon. Not. R. Astron. Soc. 442, L9 (2014), eprint 1401.6674. * Metzger et al. (2019) B. D. Metzger, B. Margalit, and L. Sironi, Mon. Not. R. Astron. Soc. 485, 4091 (2019), eprint 1902.01866. * Aschwanden (2014) M. J. Aschwanden, Astrophys. J. 782, 54 (2014), eprint 1310.4191. * Celikoglu et al. (2010) A. Celikoglu, U. Tirnakli, and S. M. D. Queirós, Phys. Rev. E 82, 021124 (2010), eprint 1003.0361. * Cordes and McLaughlin (2003) J. M. Cordes and M. A. McLaughlin, Astrophys. J. 596, 1142 (2003), eprint astro-ph/0304364.
arxiv-papers
2021-07-27T05:15:37
2024-09-04T03:07:20.630844
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jun-Jie Wei, Xue-Feng Wu, Zi-Gao Dai, Fa-Yin Wang, Pei Wang, Di Li,\n Bing Zhang", "submitter": "Jun-Jie Wei Dr.", "url": "https://arxiv.org/abs/2107.12605" }
2107.12608
# Variational theory for the resonant $T$-curvature equation Cheikh Birahim NDIAYE Department of Mathematics Howard University Annex 3, Graduate School of Arts and Sciences, # 217 DC 20059 Washington, USA 11footnotetext: E-mail addresses: [email protected] The author was partially supported by NSF grant DMS–2000164. Abstract We study the resonant prescribed $T$-curvature problem on a compact $4$-dimensional Riemannian manifold with boundary. We derive sharp energy and gradient estimates of the associated Euler-Lagrange functional to characterize the critical points at infinity of the associated variational problem under a non-degeneracy on a naturally associated Hamiltonian function. Using this, we derive a Morse type lemma around the critical points at infinity. Using the Morse lemma at infinity, we prove new existence results of Morse theoretical type. Combining the Morse lemma at infinity and the Liouville version of the Barycenter technique of Bahri-Coron[13] developed in [46], we prove new existence results under a topological hypothesis on the boundary of the underlying manifold, and the entry and exit sets at infinity. Key Words: $T$-curvature, $Q$-curvature, Morse Theory, Critical points at infinity, Barycenter Technique. AMS subject classification: 53C21, 35C60, 58J60, 55N10. ## 1 Introduction and statement of the results On a four-dimensional compact Riemannian manifolds with boundary $(\overline{M},g)$, there exists a fourth-order operator $P_{g}$ called Paneitz operator discovered by Paneitz[49] and an associated curvature quantity $Q_{g}$ called $Q$-curvature introduced by Branson-Oersted[14]. The Paneitz operator $P_{g}$ and the $Q$-curvature $Q_{g}$ are defined in terms of the Ricci tensor $Ric_{g}$ and the scalar curvature $R_{g}$ of $(\overline{M},g)$ by $P^{4}_{g}=\Delta_{g}^{2}-div_{g}\left((\frac{2}{3}R_{g}g-2Ric_{g})\nabla_{g}\right);\;\;\;\;\;\;\;Q_{g}=-\frac{1}{12}(\Delta_{g}R_{g}-R_{g}^{2}+3|Ric_{g}|^{2}),$ where $div_{g}$ is the divergence and $\nabla_{g}$ is the covariant derivative of with respect to $g$. On the other hand, Chang-Qing[23] have discovered an operator $P^{3}_{g}$ which is associated to the boundary $\partial M$ of $\overline{M}$ and a curvature quantity $T_{g}$ naturally associated to $P^{3}_{g}$. They are defined by the formulas $P^{3}_{g}=\frac{1}{2}\frac{\partial{\Delta_{g}}}{\partial n_{g}}+\Delta_{\hat{g}}\frac{\partial}{\partial n_{g}}-2H_{g}\Delta_{\hat{g}}+L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})+\nabla_{\hat{g}}H_{g}.\nabla_{\hat{g}}+(F_{g}-\frac{R_{g}}{3})\frac{\partial}{\partial n_{g}}.$ $T_{g}=-\frac{1}{12}\frac{\partial R_{g}}{\partial n_{g}}+\frac{1}{2}R_{g}H_{g}-<G_{g},L_{g}>+3H_{g}^{3}-\frac{1}{3}tr_{g}(L_{g}^{3})-\Delta_{\hat{g}}H_{g},$ where $\hat{g}$ is the metric induced by $g$ on $\partial M$, $\frac{\partial}{\partial n_{g}}$ is the inward Neuman operator on $\partial M$ with respect to $g$, $L_{g}$ is the second fundamental form of $\partial M$ with respect to $g$, $H_{g}$ is the mean curvature of $\partial M$ with respect to $g$, $R^{k}_{g,ijl}$ is the Riemann curvature tensor of $(\overline{M},g)$, $R_{g,ijkl}=g_{mi}R^{m}_{g,jkl}$ ($g_{ij}$ are the entries of the metric $g$), $F_{g}=R^{a}_{g,nan}$ (with $n$ denoting the index corresponding to the normal direction in local coordinates) and $<G_{g},L_{g}>=\hat{g}^{ac}\hat{g}^{bd}R_{g,anbn}L_{g,cd}$. Moreover, the notation $L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})$, means $L_{g}(\nabla_{\hat{g}},\nabla_{\hat{g}})(u)=\nabla_{\hat{g}}^{a}(L_{g,ab}\nabla_{\hat{g}}^{b}u)$. We point out that in all those notations above $i,j,k,l=1,\cdots 4$ and $a,b,c,d=1,\cdots 3$, and Einstein summation convention is used for repeated indices. As the Laplace-Beltrami operator and the Neumann operator are conformally covariant, we have that $P^{4}_{g}$ is conformally covariant of bidegree $(0,4)$ and $P^{3}_{g}$ of bidegree $(0,3)$. Furthermore, as they govern the transformation laws of the Gauss curvature and the geodesic curvature on compact surfaces with boundary, the couple $(P^{4}_{g},P^{3}_{g})$ does the same for $(Q_{g},T_{g})$ on a compact four-dimensional Riemannian manifold with boundary $(\overline{M},g)$. In fact, under a conformal change of metric $g_{u}=e^{2u}g$, we have (1) $\left\\{\begin{split}P^{4}_{g_{u}}=e^{-4u}P^{4}_{g},\\\ P^{3}_{g_{u}}=e^{-3u}P^{3}_{g},\end{split}\right.\qquad\mbox{and}\qquad\left\\{\begin{split}P^{4}_{g}u+2Q_{g}=2Q_{g_{u}}e^{4u}\;\;\text{in }\;\;M,\\\ P^{3}_{g}u+T_{g}=T_{g_{u}}e^{3u}\;\;\text{on}\;\;\partial M.\end{split}\right.$ Apart from this analogy, we have also an extension of the Gauss-Bonnet identity $\eqref{eq:gbc}$ which is known as the Gauss-Bonnet-Chern formula (2) $\int_{M}(Q_{g}+\frac{|W_{g}|^{2}}{8})dV_{g}+\oint_{\partial M}(T_{g}+Z_{g})dS_{g}=4\pi^{2}\chi(\overline{M})$ where $W_{g}$ denote the Weyl tensor of $(\overline{M},g)$ and $Z_{g}$ is given by the following formula $Z_{g}=R_{g}H_{g}-3H_{g}Ric_{g,nn}+\hat{g}^{ac}\hat{g}^{bd}R_{g,anbn}L_{g,cd}-\hat{g}^{ac}\hat{g}^{bd}R_{g,acbc}L_{g,cd}+6H_{g}^{3}-3H_{g}|L_{g}|^{2}+tr_{g}(L_{g}^{3}),$ with $tr_{g}$ denoting the trace with respect to the metric induced on $\partial M$ by $g$ (namely $\hat{g}$) and $\chi(\overline{M})$ the Euler- Poincaré characteristic of $\overline{M}$. Concerning the quantity $Z_{g}$, we have that it vanishes when the boundary is totally geodesic and $\oint_{\partial M}Z_{g}dV_{g}$ is always conformally invariant, see [23]. Thus, setting (3) $\kappa_{(P^{4},P^{3})}:=\kappa_{(P^{4},P^{3})}[g]:=\int_{M}Q_{g}dV_{g}+\oint_{\partial M}T_{g}dS_{g}$ we have that thanks to $\eqref{eq:gbc}$, and to the fact that $|W_{g}|^{2}dV_{g}$ is pointwise conformally invariant, $\kappa_{(P^{4},P^{3})}$ is a conformal invariant (which justifies the notation used above). We remark that $4\pi^{2}$ is the the total integral of the $(Q,T)$-curvature of the standard four-dimensional Euclidean unit ball $\mathbb{B}^{4}.$ As was asked in [2], a natural question is whether every compact four- dimensional Riemannian manifold with boundary $(\overline{M},g)$ carries a conformal metric $g_{u}$ for which the corresponding $Q$-curvature $Q_{g_{u}}$ is zero, the corresponding $T$-curvature $T_{g_{u}}$ is a prescribed function and such that $(\overline{M},g_{u})$ has minimal boundary. Thanks to $\eqref{eq:law}$, this problem is equivalent to finding a smooth solution to the following BVP: $\left\\{\begin{split}P^{4}_{g}u+2Q_{g}&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g}u+T_{g}&=Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\ -\frac{\partial u}{\partial n_{g}}+H_{g}u&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ where $K:\partial M\longrightarrow\mathbb{R}_{+}$ is a positive smooth function on $\partial M$. Since we are interested to find a metric in the conformal class of $g$, then we can assume that $H_{g}=0$, since this can be always obtained through a conformal transformation of the background metric. Thus, we are lead to solve the following BVP with Neumann homogeneous boundary condition: (4) $\left\\{\begin{split}P^{4}_{g}u+2Q_{g}&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g}u+T_{g}&=Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial u}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ Defining $\mathcal{H}_{\frac{\partial}{\partial n}}$ as $\mathcal{H}_{\frac{\partial}{\partial n}}=\Big{\\{}u\in W^{2,2}(M):\;\;\;\frac{\partial u}{\partial n_{g}}=0\;\;\;\text{on}\;\;\partial M\Big{\\}},$ where $W^{2,2}(M)$ denotes the space of functions on $M$ which are square integrable together with their first and second derivatives, and $\mathbb{P}^{4,3}_{g}(u,v)=\left<P^{4}u,u\right>_{L^{2}(M)}+2\left<P^{3}_{g}u,u\right>_{L^{2}(\partial M)},\;\;\;\;u,v\in\mathcal{H}_{\frac{\partial}{\partial n}},$ we have integration by part implies (5) $\begin{split}\mathbb{P}^{4,3}_{g}(u,v)=\int_{M}\left(\Delta_{g}u\Delta_{g}v+\frac{2}{3}R_{g}\nabla_{g}u\cdot\nabla_{g}v\right)dV_{g}-2\int_{M}Ric_{g}(\nabla_{g}u,\nabla_{g}v)dV_{g}\\\ -2\oint_{\partial M}L_{g}(\nabla_{\hat{g}}u,\nabla_{\hat{g}}v)dS_{g},\;\;\;u,v\in\mathcal{H}_{\frac{\partial}{\partial n}}\end{split}$ and is clearly a bilinear form on $\mathcal{H}_{\frac{\partial}{\partial n}}$. We set (6) $\ker\mathbb{P}^{4,3}_{g}:=\\{u\in\mathcal{H}_{\frac{\partial}{\partial n}}:\;\;\;\mathbb{P}^{4,3}_{g}(u,v)=0,\;\;\forall v\in\mathcal{H}_{\frac{\partial}{\partial n}}\\}$ On the other hand, standard regularity theory implies that smooth solutions to (4) can be found by looking at critical points of the geometric functional $\begin{split}\mathcal{E}_{g}(u)=\mathbb{P}^{4,3}_{g}(u,u)+4\int_{M}Q_{g}udV_{g}+4\oint_{\partial M}T_{g}udS_{g}-\frac{4}{3}\kappa_{(P^{4},P^{3})}\log\oint_{\partial M}Ke^{3u}dS_{g},\;\;\;u\in\mathcal{H}_{\frac{\partial}{\partial n}}.\end{split}$ As a Liouville type problem, the analytic features of equation (4) and of the associated Euler-Lagrange functional $\mathcal{E}_{g}$ depend strongly on the conformal invariant $\kappa_{(P^{4},P^{3})}$ . Indeed, depending on whether $\kappa_{(P^{4},P^{3})}$ is a positive integer multiple of $4\pi^{2}$ or not, the noncompactness of equation (4) and the way of finding critical points of $\mathcal{E}_{g}$ changes drastically. As far as existence questions are concerned, we have that problem (4) has been solved in a work of Chang- Qing[24] under the assumption that $\ker\;\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ , $\mathbb{P}^{4,3}_{g}$ is non- negative and $\kappa_{(P^{4},\;P^{3})}<4\pi^{2}$. In [44], we show existence of solutions for (4) under the assumption $\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}\notin 4\pi^{2}\mathbb{N}^{*}$. As a Liouviile type problem, the assumption $\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},P^{3})}\notin 4\pi^{2}\mathbb{N}^{*}$ will be referred to as nonresonant case. This terminology is motivated by the fact that in that situation the set of solutions to some perturbations of equation (7) (including it) is compact. Naturally, we call resonant case when $\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}\in 4\pi^{2}\mathbb{N}^{*}$. With these terminologies, we have that the works of Chang-Qing[24] and our work in [44] answer affirmatively the question raised above in the nonresonant case. However, for the resonant case, there are no known existence results to the best of our knowledge. In this work, beside existence results for (4), we are interested in a complete variational theory for the boundary value problem (4) in the resonant case, namely when $\ker\mathbb{P}^{4,3}_{g}\simeq\mathbb{R}$ and $\kappa_{(P^{4},P^{3})}=4\pi^{2}k$ for some $k\in\mathbb{N}^{*}$. To present the main results of the paper, we need to set first some notation and make some definitions. We define the Hamiltonian function (at infinity) $\mathcal{F}_{K}:(\partial M)^{k}\setminus F_{k}(\partial M)\longrightarrow\mathbb{R}$ by $\mathcal{F}_{K}((a_{1},\cdots,a_{k})):=\sum_{i=1}^{k}\left(H(a_{i},a_{i})+\sum_{j=1,\;j\neq i}^{k}G(a_{i},\;a_{j})+\frac{2}{3}\log(K(a_{i}))\right)$ where where $F_{k}(\partial M)$ denotes the fat Diagonal of $(\partial M)^{k}$, namely $F_{k}(\partial M):=\\{A:=(a_{1},\cdots,a_{k})\in(\partial M)^{k}:\;\;\text{there exists}\;\;i\neq j\;\,\text{with}\;\,a_{i}=a_{j}\\},$ $G$ is the Green’s function defined by (45) , and $H$ is its regular defined as in (47). Furthermore, we define (7) $Crit(\mathcal{F}_{K}):=\\{A\in(\partial M)^{k}\setminus F_{k}(\partial M),\;\;A\;\;\;\text{critical point of}\;\;\mathcal{F}_{K}\\}.$ Moreover, for $A=(a_{1},\cdots,a_{k})\in(\partial M)^{k}\setminus F_{k}(\partial M)$, and $i=1\cdots k$, we set (8) $\mathcal{F}^{A}_{i}(x):=e^{3(H(a_{i},x)+\sum_{j+1,\;j\neq i}^{k}G(a_{j},x))+\frac{1}{3}\log(K(x))},$ and define (9) $\mathcal{L}_{K}(A):=-\sum_{i=1}^{k}(\mathcal{F}^{A}_{i})^{\frac{1}{2}}L_{\hat{g}}((\mathcal{F}^{A}_{i})^{\frac{1}{6}})(a_{i}),$ where $L_{\hat{g}}:=-\Delta_{\hat{g}}+\frac{1}{8}R_{\hat{g}}$ is the conformal Laplacian associated to $\hat{g}$. We also set (10) $\mathcal{F}_{\infty}:=\\{A\in Crit(\mathcal{F}_{K}):\>\;\mathcal{L}_{K}(A)<0\\},$ (11) $i_{\infty}(A):=4k-1-Morse(A,\;\mathcal{F}_{K}),$ and define (12) $m_{i}^{k}:=card\\{A\in Crit(\mathcal{F}_{K}):\;i_{\infty}(A)=i\\},\;\;i=0,\cdots,4k-1,$ where $Morse(\mathcal{F}_{K},A)$ denotes the Morse index of $\mathcal{F}_{K}$ at $A$. We point out that for $k\geq 2$, $m_{i}^{k}=0$ for $0\leq i\leq k-2$. For $k\geq 2$, we use the notation $B_{k-1}(\partial M)$ to denote the set of formal barycenters of order $k-1$ of $\partial M$, namely (13) $B_{k-1}(\partial M):=\\{\sum_{i=1}^{k-1}\alpha_{i}\delta_{a_{i}},\;\;a_{i}\in\partial M,\;\;\alpha_{i}\geq 0,i=1,\cdots,k-1,\;\,\sum_{i=1}^{k-1}\alpha_{i}=1\\}.$ Furthermore, we define (14) $c^{k-1}_{p}=dim\;H_{p}(B_{k-1}(\partial M)),\;\;p=1,\cdots 4k-5,$ where $H_{p}(B_{k-1}(\partial M)$ denotes the $p$-th homology group of $B_{k-1}(\partial M)$ with $\mathbb{Z}_{2}$ coefficients. Finally, we say (15) $(ND)\;\;\;\text{holds if }\;\;\mathcal{F}_{K}\;\text{is a Morse function and for every}\;\;A\in Crit(\mathcal{F}_{K}),\;\;\mathcal{L}_{K}(A)\neq 0.$ Now, we are ready to state our existence results of Morse theoretical type starting with the critical case, namely when $k=1$. ###### Theorem 1.1. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and the system (16) $\begin{cases}m^{1}_{0}=1+x_{0},\\\ m^{1}_{i}=x_{i}+x_{i-1},\;&i=1,\cdots,3,\\\ 0=x_{3}\\\ x_{i}\geq 0,\;\;&i=0,\cdots,3\end{cases}$ has no solutions, then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. The system (16) not having a solution traduces the violation of a strong Morse type inequalities (SMTI) for the critical points at infinity of $\mathcal{E}_{g}$. Since (SMTI) imply Poincare-Hopf type formulas, then we have Theorem 1.1 implies the following Poincare-Hopf index type result. ###### Corollary 1.2. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and (17) $\sum_{A\in\mathcal{F}_{\infty}}(-1)^{i_{\infty}(A)}\neq 1,$ then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$ The formula (17) says that the Euler number of the space of variations is different from the total contribution of the the true critical points at infinity and is of global character. Localizing the arguments of Corollary 1.2 in the case of the presence of a jump in the Morse index of the critical points of the Hamiltonian function $\mathcal{F}_{K}$, we have the following extension of Corollary 1.2. ###### Theorem 1.3. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and $\kappa_{(P^{4},\;P^{3})}=4\pi^{2}$ and $K$ be a smooth positive function on $\partial M$ satisfying the non degeneracy condition $(ND)$. Assuming that there exists a positive integer $1\leq l\leq 3$ such that $\begin{split}\sum_{A\in\mathcal{F}_{\infty},\;i_{\infty}(A)\leq l-1}&(-1)^{i_{\infty}(A)}\neq 1\\\ &\text{and}\\\ \forall A\in\mathcal{F}_{\infty},\;\;&\quad i_{\infty}(A)\neq l,\end{split}$ then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. In the supercritical case, i.e $k\geq 2$, the Euler-Lagrange functional $\mathcal{E}_{g}$ is not bounded from below, and taking into account the topological contribution of very large negative sublevels of $\mathcal{E}_{g}$, we have the following analogue of Theorem 1.1. ###### Theorem 1.4. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and the following system (18) $\begin{cases}0=x_{0},\\\ m^{k}_{1}=x_{1},\\\ m_{i}^{k}=c^{k-1}_{i-1}+x_{i}+k_{i-1},\;&i=2,\cdots,4k-4,\\\ m_{i}^{k}=x_{i}+x_{i-1},\;&i=4k-3,\cdots,4k-1,\\\ 0=x_{4k-1},\\\ x_{i}\geq 0,\;\;&i=0,\cdots,4k-1,\end{cases}$ has no solutions, then $\;K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. ###### Remark 1.5. The presence of the number $c^{k-1}_{i-1}=dimH_{i-1}(B_{i-1}(\partial M))$ in (18) account for the contribution of the topology of very negative sublevels of $\mathcal{E}_{g}$. The relation between the topology of very negative sublevels of the Euler-Lagrange functional of Liouville type problems and the space of formal barycenters was first observed by Djadli-Malchiodi[29]. As in the critical case, we have that Theorem 1.4 implies the following Poincaré-Hopf index type criterion for existence. ###### Corollary 1.6. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and (19) $\sum_{A\in\mathcal{F}_{\infty}}(-1)^{i_{\infty}(A)}\neq\frac{1}{(k-1)!}\Pi_{i=1}^{k-1}(i-\chi(\partial M)),$ then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. As in the critical case, we have that a localization of the arguments of Corollary 1.6 implies the following jumping index type result. ###### Theorem 1.7. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$, and let $K$ be a smooth positive function on $\partial M$ satisfying the non degeneracy condition (ND). Assuming that there exists a positive integer $1\leq l\leq 4k-1$ and $A^{l}\in\mathcal{F}_{\infty}$ with $i_{\infty}(A^{l})\leq l-1$ such that $\begin{split}\sum_{A\in\mathcal{F}_{\infty},\;i_{\infty}(A)\leq l-1}(-1)^{i_{\infty}(A)}&\neq\frac{1}{(k-1)!}\Pi_{j=1}^{k-1}(j-\chi(\partial M))\\\ &\text{and}\\\ \forall A\in\mathcal{F}_{\infty},\;\;&\qquad i_{\infty}(A)\neq l,\end{split}$ then $K$ is the $T$-curvature of a Riemannian metric on $\overline{M}$ conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. The Morse theoretical results stated above depend only the Morse Lemma at infinity around true critical points at infinity (see Lemma 3.24) which justify the condition $\mathcal{L}_{K}<0$ in the definition of $\mathcal{F}_{\infty}$. However, our existence result of algebraic topological type are based on the Morse lemma at infinity around all critical points at infinity. Thus, to state our existence result of algebraic topological type, we need first to introduce the neighborhood of potential critical points at infinity of $\mathcal{E}_{g}$. In order to do that, we first fix $\nu$ to be a positive and small real number, $\Lambda$ to be a large positive constant, and $R$ to be a large positive constant too. Next, for $\epsilon$ small and positive, and $\Theta\geq 0$, we denote by $V(k,\epsilon,\Theta)$ the $(k,\epsilon,\Theta)$-neighborhood of potential critical points at infinity, namely (20) $\begin{split}&V(k,\epsilon,\Theta):=\\{u\in\mathcal{H}_{\frac{\partial}{\partial n}}:\exists\;a_{1},\cdots,a_{k}\in\partial M,\alpha_{1},\cdots,\alpha_{k}>0,\;\;\lambda_{1},\cdots,\lambda_{k}>0,\beta_{1},\cdots,\beta_{\bar{k}}\in\mathbb{R},\\\ &\;\;||u-\overline{u}_{(Q,T)}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})||_{\mathbb{P}^{4,3}}<\epsilon,\;\;\sum_{i=1}^{k}\alpha_{i}=k\;\;\;\alpha_{i}\geq 1-\nu,\\\ &\;\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\;\;\frac{2}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\frac{\Lambda}{2},i,j=1,\cdots,k,\;|\beta_{r}|\leq\Theta,\;r=1,\cdots,\bar{k},\\\ &\;\;\text{and}\;\;\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R\;\;\text{for}\;i\neq j\\},\end{split}$ where $\overline{C}$ is as in (39), the $\varphi_{a_{i},\lambda_{i}}$’s are as in (43), $\bar{k}$ is as in (29), the $v_{r}$’s are defined as in (30), the $\overline{(v_{r})}_{(Q,t)}$’s are as in (27), and $||\cdot||_{\mathbb{P}^{4,3}}$ is defined as in (33). As observed by Chen-Lin [26] for Liouville type problems, the minimization at infinity of Bahri-Coron [13] for Yamabe type problems has the following analogue for our problem. For $\Theta\geq 0$, there exists $\epsilon_{0}=\epsilon_{0}(\Theta)$ small and positive such that $\forall\;0<\epsilon\leq\epsilon_{0}$, we have (21) $\forall u\in V(k,\epsilon,\Theta),\text{the minimization problem }\\\ \min_{B_{\epsilon}^{\Theta}}||u-\overline{u}_{(Q,T)}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})||_{\mathbb{P}^{4,3}}$ has a unique solution, up to permutations, where $B_{\epsilon}^{\Theta}$ is defined as follows (22) $\begin{split}B_{\epsilon}^{\Theta}:=&\\{(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in\mathbb{R}^{k}_{+}\times(\partial M)^{k}\times\mathbb{R}_{+}^{k}\times\mathbb{R}^{\bar{k}}:\sum_{i=1}^{k}\alpha_{i}=k,\;\alpha_{i}\geq 1-\nu,\;\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\\\ &\;|\beta_{r}|\leq\Theta,r=1,\cdots,\bar{k},\;\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R,i\neq j,i,j=1,\cdots,k\\}.\end{split}$ The selection map $s_{k}$ is defined by $s_{k}:V(k,\epsilon,\Theta)\longrightarrow(\partial M)^{k}/\sigma_{k}$ as follows (23) $s_{k}(u):=A,\;\;u\in V(k,\epsilon,\Theta),\;\,\text{and}\,\;A\;\;\text{is given by}\;\,\eqref{eq:mini},$ We denote the critical points at infinity of $\mathcal{E}_{g}$ by $z^{\infty}$ and use the notation $M_{\infty}(z^{\infty})$ for their Morse indices at infinity, $W_{u}(z^{\infty})$ for their unstable manifolds and $W_{s}(z^{\infty})$ for their stable manifolds, where $z$ is the corresponding critical point of $\mathcal{F}_{K}$. Furthermore, we denote by $x^{\infty}$ the ”true” ones, namely $\mathcal{L}_{K}(x)<0$ and the $y^{\infty}$ the ”false” ones, namely $\mathcal{L}_{K}(y)>0$. Moreover, we define $S$ to be the following invariant set (24) $S:=\cup_{M_{\infty}(z_{1}^{\infty}),\;M_{\infty}(z_{2}^{\infty})\geq 4k-4+\bar{k}}\;W_{u}(z_{1}^{\infty})\cap W_{s}(z_{2}^{\infty}).$ We also define $S^{\infty}$ to be the part of $S$ at infinity, namely (25) $S^{\infty}:=\cup_{M_{\infty}(z_{1}^{\infty}),\;M_{\infty}(z_{2}^{\infty})\geq 4k-4+\bar{k}}\;W_{u}^{\infty}(z_{1}^{\infty})\cap W_{s}(z_{2}^{\infty}),$ where $W_{u}^{–\infty}(z_{1}^{\infty})$ denotes the restriction of $W_{u}(z_{1}^{\infty})$ at infinity. Furthermore, we denote by $S^{\infty}_{-}$ the exit set from $S^{\infty}$ starting from a false critical point at infinity $y^{\infty}$. Similarly, we denote by $S^{\infty}_{+}$ the entry set to $S^{\infty}$ after having exited $S^{\infty}$ through a set contained in $S^{\infty}_{-}$ and entering into $S^{\infty}$ through a true critical point at infinity $x^{\infty}$. Finally to state the result of algebraic topological type resulting from the Liouville version of the Barycenter technique of Bahri- Coron developed in [46], we need the existence of (26) $0\neq O^{*}_{\partial M}\in H^{3}(\partial M).$ Indeed, we prove: ###### Theorem 1.8. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $H_{g}=0$, $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$, and $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and either there is no $x^{\infty}$ with $M_{\infty}(x^{\infty})=4k-4+\bar{k}$ or $s_{k}^{*}(O^{*}_{\partial M})\neq 0$ in $H^{3}(S^{\infty})$ and $s_{k}^{*}(O^{*}_{M})=0$ in $H^{3}(S_{+}^{\infty}\cup S_{-}^{\infty})$, then $K$ is the $T$-curvature of a Riemannian metric conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature on $\partial M$. As in [46], Theorem 1.8 implies the following collorary. ###### Corollary 1.9. Let $(\overline{M},\;g)$ be a compact $4$-dimensional Riemannian manifold with boundary $\partial M$ and interior $M$ such that $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 2$. Assuming that $K$ is a smooth positive function on $\partial M$ such that $(ND)$ holds and that every critical point $x$ of $\mathcal{F}_{K}$ of Morse index $0$ or $1$ satisfies $\mathcal{L}_{K}(x)<0$, then $K$ is the $T$-curvature of a Riemannian metric conformally related to $g$ with zero $Q$-curvature in $M$ and zero mean curvature $\partial M$. . ## 2 Notation and preliminaries In the following, for a Riemmanian metric $\bar{g}$ on $\partial M$ and $p\in\partial M$ , we will use the notation $B^{\bar{g}}_{p}(r)$ to denote the geodesic ball with respect to $\bar{g}$ of radius $r$ and center $p$. We also denote by $d_{\bar{g}}(x,y)$ the geodesic distance with respect to $\bar{g}$ between two points $x$ and $y$ of $\partial M$, $exp_{x}^{\bar{g}}$ the exponential map with respect to $\bar{g}$ at $x\in\partial M$. $inj_{\bar{g}}(\partial M)$ stands for the injectivity radius of $(\partial M,\bar{g})$, $dV_{\bar{g}}$ denotes the Riemannian measure associated to the metric $\bar{g}$. Furthermore, we recall that $\nabla_{\bar{g}}$, $\Delta_{\bar{g}}$, $R_{\bar{g}}$ will denote respectively the covariant derivative, the Laplace-Beltrami operator, the scalar curvature and Ricci curvature with respect to $\bar{g}$. For simplicity, we will use the notation $B_{p}(r)$ to denote $B^{g}_{p}(r)$, namely $B_{p}(r)=B^{\hat{g}}_{p}(r)$. $(\partial M)^{2}$ stands for the cartesian product $\partial M\times\partial M$, while $Diag(\partial M)$ is the diagonal of $(\partial M)^{2}$. Similarly, for a Riemmanian metric $\tilde{g}$ on $\overline{M}$ , we will use the notation $B^{\tilde{g},+}_{p}(r)$ to denote the half geodesic ball with respect to $\tilde{g}$ of radius $r$ and center $p\in\partial M$. We also denote by $d_{\tilde{g}}(x,y)$ the geodesic distance with respect to $\tilde{g}$ between two points $x$ and $y$ of $\overline{M}$, $exp_{x}^{\tilde{g}}$ the exponential map with respect to $\tilde{g}$ at $x\in\partial M$. $inj_{\tilde{g}}(\overline{M})$ stands for the injectivity radius of $(\overline{M},g)$, $dV_{\tilde{g}}$ denotes the Riemannian measure associated to the metric $g$, and $dS_{\tilde{g}}$ the Riemannian measure associated to $\hat{\tilde{g}}:=\tilde{g}|_{\partial M}$, namely $dS_{\tilde{g}}=dV_{\hat{\tilde{g}}}$. Furthermore, we recall that $\nabla_{\tilde{g}}$, $\Delta_{\tilde{g}}$, $R_{\tilde{g}}$ will denote respectively the covariant derivative, the Laplace-Beltrami operator, the scalar curvature and Ricci curvature with respect to $g$. For simplicity, we will use the notation $B^{+}_{p}(r)$ to denote $B^{g,+}_{p}(r)$, namely $B_{p}^{+}(r)=B^{g,+}_{p}(r)$, $p\in\partial M$ For $1\leq p\leq\infty$ and $k\in\mathbb{N}$, $\theta\in]0,1[$, $L^{p}(M)$, $W^{k,p}(M)$, $C^{k}(\overline{M})$, and $C^{k,\theta}(\overline{M})$ stand respectively for the standard Lebesgue space, Sobolev space, $k$-continuously differentiable space and $k$-continuously differential space of Hölder exponent $\beta$, all with respect $g$. Similarly, $1\leq p\leq\infty$ and $k\in\mathbb{N}$, $\theta\in]0,1[$, $L^{p}(\partial M)$, $W^{k,p}(\partial M)$, $C^{k}(\partial M)$, and $C^{k,\theta}(\partial M)$ stand respectively for the standard Lebesgue space, Sobolev space, $k$-continuously differentiable space and $k$-continuously differential space of Hölder exponent $\beta$, all with respect $\hat{g}$. Given a function $u\in L^{1}(M)\cap L^{1}(\partial M)$, $\bar{u}_{\partial M}$ and $\overline{u}_{(Q,T)}$ are defined by $\bar{u}_{\partial M}=\frac{\oint_{\partial M}u(x)dS_{g}}{Vol_{g}(\partial M)},$ with $Vol_{g}(\partial M)=\oint_{\partial M}dS_{g}$ and (27) $\overline{u}_{(Q,T)}=\frac{1}{4k\pi^{2}}\left(\int_{M}Q_{g}udV_{g}+\oint_{\partial M}T_{g}udS_{g}\right).$ Given a generic Riemannian metric $\bar{g}$ on $\partial M$ and a function $F(x,y)$ defined on a open subset of $(\partial M)^{2}$ which is symmetric and with $F(\cdot,\cdot)\in C^{2}$ with respect to $\bar{g}$, we define $\frac{\partial F(a,a)}{\partial a}:=\frac{\partial F(x,a)}{\partial x}|_{x=a}=\frac{\partial F(a,y)}{\partial y}|_{y=a}=$, and $\Delta_{\bar{g}}F(a_{1},a_{2}):=\Delta_{\bar{g},x}F(x,a_{2})|_{x=a_{1}}=\Delta_{\bar{g},y}F(a_{2},y)|_{y=a_{1}}.$ For $\epsilon>0$ and small, $\lambda\in\mathbb{R}_{+}$, $\lambda\geq\frac{1}{\epsilon}$, and $a\in\partial M$, $O_{\lambda,\epsilon}(1)$ stands for quantities bounded uniformly in $\lambda$, and $\epsilon$, and $O_{a,\epsilon}(1)$ stands for quantities bounded uniformly in $a$ and $\epsilon$. For $l\in\mathbb{N}^{*}$, $O_{l}(1)$ stands for quantities bounded uniformly in $l$ and $o_{l}(1)$ stands for quantities which tends to $0$ as $l\rightarrow+\infty$. For $\epsilon$ positive and small, $a\in\partial M$ and $\lambda\in\mathbb{R}_{+}$ large, $\lambda\geq\frac{1}{\epsilon}$, $O_{a,\lambda,\epsilon}(1)$ stands for quantities bounded uniformly in $a$, $\lambda$, and $\epsilon$. For $\epsilon$ positive and small, $p\in\mathbb{N}^{*}$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$, $\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$, and $A:=(a_{1},\cdots,a_{p})\in M^{p}$ (where $(\mathbb{R}_{+})^{p}$ and $(\partial M)^{p}$ denotes respectively the cartesian product of $p$ copies of $\mathbb{R}_{+}$ and $\partial M$), $O_{A,\bar{\lambda},\epsilon}(1)$ stands for quantities bounded uniformly in $A$, $\bar{\lambda}$, and $\epsilon$. Similarly for $\epsilon$ positive and small, $p\in\mathbb{N}^{*}$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$, $\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$, $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{p})\in\mathbb{R}^{p}$, $\alpha_{i}$ close to $1$ for $i=1,\cdots,p$, and $A:=(a_{1},\cdots,a_{p})\in(\partial M)^{p}$ (where $\mathbb{R}^{p}$ denotes the cartesian product of $p$ copies of $\mathbb{R}$, $O_{\bar{\alpha},A,\bar{\lambda},\epsilon}(1)$ will mean quantities bounded from above and below independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$, and $\epsilon$. For $x\in\mathbb{R}$, we will use the notation $O(x)$ to mean $|x|O(1)$ where $O(1)$ will be specified in all the contexts where it is used. Large positive constants are usually denoted by $C$ and the value of $C$ is allowed to vary from formula to formula and also within the same line. Similarly small positive constants are also denoted by $c$ and their value may varies from formula to formula and also within the same line. We say $\mu\in\mathbb{R}$ is an eigenvalue of the $P_{g}^{4}$ to $P^{3}_{g}$ operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$ if there exists $0\neq v\in W^{2,2}(M)$ such that (28) $\left\\{\begin{split}P^{4}_{g}v&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g}v&=\mu v\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial v}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ By abuse of notation, we call $v$ in (28) an eigenfunction associated to $\mu$. We call $\bar{k}$ the number of negative eigenvalues (counted with multiplicity) of the $P_{g}^{4}$ to $P^{3}_{g}$ operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$. We point out that $\bar{k}$ can be zero, but it is always finite. If $\bar{k}\geq 1$, then we will denote by $E_{-}\subset\mathcal{H}_{\frac{\partial}{\partial n}}$ the direct sum of the eigenspaces corresponding to the negative eigenvalues of the $P_{g}^{4}$ to $P^{3}_{g}$ operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$ . The dimension of $E_{-}$ is of course $\bar{k}$, i.e (29) $\bar{k}=\dim E_{-}.$ On the other hand, we have the existence of a basis of eigenfunctions $v_{1},\cdots,v_{\bar{k}}$ of $E_{-}$ satisfying (30) $\left\\{\begin{split}P^{4}_{g}v_{r}&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g}v_{r}&=\mu_{r}v_{r}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial v_{r}}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ (31) $\mu_{1}\leq\mu_{2}\leq\cdots\leq\mu_{\bar{k}}<0<\mu_{\bar{k}+1}\leq\cdots,$ where $\mu_{r}$’s are the eigenvalues of the operator $P_{g}^{4}$ to $P^{3}_{g}$ on $\mathcal{H}_{\frac{\partial}{\partial n}}$ counted with multiplicity. We define $\mathbb{P}^{4,3}_{g,+}$ by (32) $\mathbb{P}^{4,3}_{g,+}(u,v)=\mathbb{P}^{4,3}_{g}(u,v)-2\sum_{r=1}^{\bar{k}}\mu_{r}\left(\oint_{\partial M}uv_{r}dS_{g}\right)\left(\oint_{\partial M}vv_{r}dS_{g}\right).$ $\mathbb{P}^{4,3}_{g,+}$ is obtained by just reversing the sign of the negative eigenvalue of $\mathbb{P}^{4,3}_{g}$. We set also (33) $||u||_{\mathbb{P}^{4,3}}:=\sqrt{\mathbb{P}^{4,3}_{g,+}(u,u)},\;\;\;\text{and}\;\;\;\left<u,v\right>_{\mathbb{P}^{4,3}}=P^{4,3}_{g,+}(u,v),$ where $\mathbb{P}^{4,3}_{g,+}$ is defined as in (32). We can choose $v_{1},\cdots,v_{\bar{k}}$ so that they constitute a $\left<\cdot,\cdot\right>_{\mathbb{P}^{4,3}}$-orthonormal basis fo $E_{-}$. We denote by $\nabla^{\mathbb{P}^{4,3}}$ the gradient with respect to $\left<\cdot,\cdot\right>_{\mathbb{P}^{4,3}}$. For $t>0$, we define the following perturbed functional (34) $(\mathcal{E}_{g})_{t}(u):=\mathbb{P}^{4,3}(u,u)+4t\int_{M}Q_{g}udV_{g}+4t\oint_{\partial M}T_{g}udS_{g}-\frac{4}{3}t\kappa_{(P^{4},P^{3})}\log\oint_{M}Ke^{3u}dS_{g},\;\;u\in\mathcal{H}_{\frac{\partial}{\partial n}}.$ $\bar{B}^{\bar{k}}_{r}$ will stand for the closed ball of center $0$ and radius $r$ in $\mathbb{R}^{\bar{k}}$. $\mathbb{S}^{\bar{k}-1}$ will denote the boundary of $\bar{B}^{\bar{k}}_{1}$. Given a set $X$, we define $\widetilde{X\times\bar{B}^{\bar{k}}_{1}}$ to be the cartesian product $X\times\bar{B}^{\bar{k}}_{1}$ where the tilde means that $X\times\partial B^{\bar{k}}_{1}$ is identified with $\partial B_{1}^{\bar{k}}$. In the sequel also, $(\mathcal{E}_{g})^{c}$ with $c\in\mathbb{R}$ will stand for $(\mathcal{E}_{g})^{c}:=\\{u\in\mathcal{H}_{\frac{\partial}{\partial n}}:\;\;\mathcal{E}_{g}(u)\leq c\\}$. For $X$ a topological space, $H_{*}(X)$ will denote the singular homology of $X$, $H^{*}(X)$ for the cohomology, and $\chi(X)$ the Euler characteristic of $X$, all with $\mathbb{Z}_{2}$ coefficients. As above, in the general case, namely $\bar{k}\geq 0$, for $\epsilon$ small and positive, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})\in\mathbb{R}^{\bar{k}}$ with $\beta_{i}$ close to $0$, $i=1,\cdots,\bar{k}$) (where $\mathbb{R}^{\bar{k}}$ is the empty set when $\bar{k}=0$), $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{p})\in(\mathbb{R}_{+})^{p}$, $\lambda_{i}\geq\frac{1}{\epsilon}$ for $i=1,\cdots,p$, $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{p})\in\mathbb{R}^{p}$, $\alpha_{i}$ close to $1$ for $i=1,\cdots,p$, and $A:=(a_{1},\cdots,a_{p})\in(\partial M)^{p}$, $p\in\mathbb{N}^{*}$, $w\in\mathcal{H}_{\frac{\partial}{\partial n}}$ with $||w||_{\mathbb{P}^{4,3}}$ small, $O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}(1)$ will stand quantities bounded independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$, $\bar{\beta}$, and $\epsilon$, and $O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},w,\epsilon}(1)$ will stand quantities bounded independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$, $\bar{\beta}$, $w$ and $\epsilon$. For point $b\in\mathbb{R}^{3}$ and $\lambda$ a positive real number, we define $\delta_{b,\lambda}$ by (35) $\delta_{b,\lambda}(y):=\log\left(\frac{2\lambda}{1+\lambda^{2}|y-b|^{2}}\right),\;\;\;\;\;\;y\in\mathbb{R}^{3}.$ The functions $\delta_{b,\lambda}$ verify the following equation (36) $(-\Delta_{\mathbb{R}^{3}})^{\frac{3}{2}}\delta_{b,\lambda}=2e^{3\delta_{b,\lambda}}\;\;\;\text{in}\;\;\;\mathbb{R}^{3}.$ Using the existence of conformal Fermi coordinates, we have that, for $a\in\partial M$ there exists a function $u_{a}\in C^{\infty}(\overline{M})$ such that (37) $g_{a}=e^{2u_{a}}g\;\;\text{verifies}\;\;detg_{a}(x)=1+O(d_{g_{a}}(x,a)^{m})\;\;\text{for}\;\;\;x\in B^{g_{a},+}_{a}(\varrho_{a}).$ with $0<\varrho_{a}<\frac{inj_{g_{a}}(\overline{M})}{10}$. Moreover, we can take the families of functions $u_{a}$, $g_{a}$ and $\varrho_{a}$ such that (38) $\text{the maps}\;\;\;a\longrightarrow u_{a},\;g_{a}\;\;\text{are}\;\;C^{1}\;\;\;\text{and}\;\;\;\;\varrho_{a}\geq\varrho_{0}>0,$ for some small positive $\varrho_{0}$ satisfying $\varrho_{0}<\inf\\{\frac{inj_{g}(M)}{10},\frac{inj_{\hat{g}}(\partial M)}{10}\\}$, and (39) $\begin{split}&||u_{a}||_{C^{4}(\overline{M})}=O_{a}(1),\;\;\frac{1}{\overline{C}^{2}}g\leq g_{a}\leq\overline{C}^{2}g,\\\ \;&u_{a}(x)=O_{a}(d^{2}_{\hat{g}_{a}}(a,x))=O_{a}(d_{\hat{g}}^{2}(a,x))\;\;\text{for}\;\;x\in\;\;B_{a}^{\hat{g}_{a}}(\varrho_{0})\supset B_{a}(\frac{\varrho_{0}}{2\overline{C}}),\;\;\text{and}\\\ &u_{a}(a)=0,\;\;\;R_{\hat{g}_{a}}(a)=0,\;\;\;\frac{\partial u_{a}}{\partial n_{g}}(a)=0,\end{split}$ for some large positive constant $\overline{C}$ independent of $a$. For $a\in\partial M$, and $r>0$, we set (40) $exp_{a}^{a}:=exp_{a}^{\hat{g}_{a}}\;\;\;\;\text{and}\;\;\;B_{a}^{a}(r):=B_{a}^{\hat{g}_{a}}(r).$ Now, for $0<\varrho<\min\\{\frac{inj_{g}(\partial M)}{4},\frac{\varrho_{0}}{4}\\}$ where $\varrho_{0}$ is as in (38), we define a smooth cut-off function satisfying the following properties: (41) $\begin{cases}\chi_{\varrho}(t)=t\;\;&\text{ for }\;\;t\in[0,\varrho],\\\ \chi_{\varrho}(t)=2\varrho\;\;&\text{ for }\;\;t\geq 2\varrho,\\\ \chi_{\varrho}(t)\in[\varrho,2\varrho]\;\;\;&\text{ for }\;\;t\in[\varrho,2\varrho].\end{cases}$ Using the cut-off function $\chi_{\varrho}$, we define for $a\in\partial M$ and $\lambda\in\mathbb{R}_{+}$ the function $\hat{\delta}_{a,\lambda}$ as follows (42) $\hat{\delta}_{a,\lambda}(x):=\log\left(\frac{2\lambda}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(x,a))}\right).$ For every $a\in\partial M$ and $\lambda\in\mathbb{R}_{+}$, we define $\varphi_{a,\lambda}$ to be the unique the solution of (43) $\begin{cases}P^{4}_{g}\varphi_{a,\lambda}+\frac{2}{k}Q_{g}=0\;\;\;\text{in}\;\;\;M,\\\ P_{g}^{3}\varphi_{a,\lambda}\,+\,\frac{1}{k}T_{g}\,=4\pi^{2}\,\frac{e^{3(\hat{\delta}_{a,\lambda}\,+\,u_{a})}}{\oint_{M}e^{3(\hat{\delta}_{a,\lambda}\,+\,u_{a})}dS_{g}}\;\;\mbox{ in }\;\;\partial M,\\\ \frac{\partial\varphi_{a,\lambda}}{n}=0,\\\ (\phi_{a,\lambda})_{(Q,T)}=0.\end{cases}$ Next, let $S(a,x)$ ; $(a,x)\in\partial M\times\overline{M}$ be defined by (44) $\begin{cases}P_{g}^{4}S(a,\cdot)+\frac{2}{k}Q_{g}(\cdot)=0\;\;\text{in}\;\;M,\\\ P^{3}_{g}S(a,\cdot)+\frac{1}{k}T_{g}(\cdot)=4\pi^{2}\delta_{a}(\cdot),\;\;\text{on}\;\;\partial M,\\\ \frac{\partial S(a,\cdot)}{\partial n}=0\;\;\;\text{on}\;\;\partial M,\\\ \int_{M}S(a,x)Q_{g}(x)dV_{g}(x)=0.\end{cases}$ Then (45) $G(a,\cdot)=S(a,\cdot)|_{\partial M}.$ is a Green’s function of the $P^{4}_{g}+\frac{2}{k}Q_{g}(\cdot)$ to $P^{3}_{g}+\frac{1}{k}T_{g}(\cdot)$ operator on $\mathcal{H}_{\frac{\partial}{\partial n}}$. Thus, we have the integral representation: $\forall u\in\mathcal{H}_{\frac{\partial}{\partial n}}$ such that $P^{4}_{g}u+\frac{2}{k}Q_{g}=0$, (46) $u(x)-\overline{u}_{(Q,T)}=\frac{1}{4\pi^{2}}\oint_{\partial M}G(x,y)P_{g}^{3}u(y),\;\;\;x\in\partial M.$ Moreover, $G$ decomposes as follows (47) $G(a,x)=\log\left(\frac{1}{\chi_{\varrho}^{2}(d_{{\hat{g}}_{a}}(a,x))}\right)+H(a,x),$ where $H$ is the regular par of $G$. Furthermore, we have (48) $G\in C^{\infty}((\partial M)^{2}-Diag(\partial M)),\;\;\;\;\text{and}\;\;\;H\in C^{3,\beta}((\partial M)^{2})\;\;\;\forall\beta\in(0,1).$ B symmetry of $H$, we have (49) $\frac{\partial\mathcal{F}(a_{1},\cdots,a_{k})}{\partial a_{i}}=\frac{2}{3}\frac{\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})},\;\;\;i=1,\cdots,k.$ Next, setting (50) $l_{K}(A):=\sum_{i=1}^{k}\left(\frac{\Delta_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})}{(\mathcal{F}^{A}_{i}(a_{i}))^{\frac{1}{3}}}-\frac{3}{4}R_{\hat{g}}(a_{i})(\mathcal{F}^{A}_{i}(a_{i}))^{\frac{2}{3}}\right),$ we have (51) $l_{K}(A)=6\mathcal{L}_{K}(A),\;\;\forall A\in Crit(\mathcal{F}_{K}).$ For $k\geq 2$, we denote by $B_{k}(\partial M)$ the set of formal barycenters of $\partial M$ of order $k$, namely (52) $B_{k}(\partial M):=\\{\sum_{i=1}^{k}\alpha_{i}\delta_{a_{i}},a_{i}\in\partial M,\alpha_{i}\geq 0,i=1,\cdots,k,\;\,\sum_{i=1}^{k}\alpha_{i}=k\\},$ Finally, we set (53) $A_{k,\bar{k}}:=\widetilde{B_{k}(\partial M)\times\bar{B}^{\bar{k}}_{1}},$ and (54) $A_{k-1,\bar{k}}:=\widetilde{B_{k-1}(\partial M)\times\bar{B}^{\bar{k}}_{1}}.$ ## 3 Blow-up analysis and critical points at infinity This section deals with the blowup analysis of sequences of vanishing viscosity solutions of the type (55) $\left\\{\begin{split}P^{4}_{g}u_{l}+2t_{l}Q_{g}&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g}u_{l}+t_{l}T_{g}&=t_{l}Ke^{3u}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial u_{l}}{\partial n_{g}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ with $t_{l}\rightarrow 1$ under the assumption $\ker\mathbb{P}_{g}^{4,3}\simeq\mathbb{R}$ and $\kappa_{(P^{4},P^{3})}=4k\pi^{2}$ with $k\geq 1$ and their use to characterize the critical points at infinity of $\mathcal{E}_{g}$. ### 3.1 Blow-up analysis The local behaviour of blowing up sequences of solutions of (55) is understood. In fact, in [44], we prove the following lemma. ###### Lemma 3.1. Assuming that $(u_{l})$ is a blowing up sequence of solutions to (55), then up to a subsequence, there exists $k$ converging sequence of points $(x_{i,l})_{l\in\mathbb{N}},x_{i,l}\in\partial M$ with limits $x_{i}\in\partial M$, $i=1,\cdots,k$, $k$ sequences $(\mu_{i,l})_{l\in\mathbb{N}}\;\;i=1,\cdots,k$ of positive real numbers converging to $0$ such that the following hold: a) $\frac{d_{\hat{g}}(x_{i,l},x_{j,l})}{\mu_{i,l}}\longrightarrow+\infty\;\;\;\;i\neq j\;\;i,j=1,\cdots,k\;\;\;\;\;and\;\;\;\;t_{l}K(x_{i,l})\mu_{i.l}^{3}e^{3u_{l}(x_{i,l})}e^{-3\log 2}=2.$ b) $v_{i,l}(x)=u_{l}(exp^{g}_{x_{i,l}}(\mu_{i,l}x))-u_{l}(x_{i,l})+\log 2\longrightarrow V_{0}(x)\;\;\;\;in\;\;\;C^{4}_{loc}(\mathbb{R}^{4}_{+}),$ $V_{0}|_{\mathbb{R}^{3}}(x):=\log\left(\frac{2}{1+|x|^{2}}\right).$ c) $\text{There exists}\;\;C>0\;\;\text{such that}\;\;\inf_{i=1,\cdots,k}d_{\hat{g}}(x_{i,l},x)^{3}e^{3u_{l}(x)}\leq C\;\;\;\;\forall x\in\partial M,\;\;\forall l\in\mathbb{N}.$ d) $\begin{split}t_{l}Ke^{3u_{l}}dS_{g}\rightarrow 4\pi^{2}\sum_{i=1}^{k}\delta_{x_{i}}\;\;\;\text{in the sense of measure},\;\;\;\text{and}\\\ \lim_{l\rightarrow+\infty}\oint_{\partial M}t_{l}Ke^{3u_{l}}dS_{g}=4\pi^{2}k.\end{split}$ e) $u_{l}-\overline{(u_{l})}_{Q,T}\rightarrow\sum_{i=1}^{k}G(x_{i},\cdot)\;\;\;\text{in}\;\;\;C^{3}_{loc}(\partial M-\\{x_{1},\cdots,x_{k}\\}),\;\;\;\;\overline{(u_{l})}_{Q,T}\rightarrow-\infty.$ As a Liouville type problem, the following Harnack type inequality is sufficient to get the global description of blowing up sequences of solutions needed to describe the critical points at infinity of $\mathcal{E}_{g}$. ###### Proposition 3.2. Assuming that $u_{l}$ is a blowing up sequence of solutions to (55), then Lemma 3.1 holds, and keeping the notations in Lemma 3.1, we have that the points $x_{i,l}$ are uniformly isolated, namely there exists $0<\eta_{k}<\frac{\varrho_{0}}{10}$ (where $\varrho_{0}$ is as in (38)) such that for $l$ large eneough, there holds (56) $d_{\hat{g}}(x_{i,l},x_{j,l})\geq 4\overline{C}\eta_{k},\;\;\;\forall i\neq j=1,\cdots,k.$ Moreover, the scaling parameters $\lambda_{i,l}:=\mu_{i,l}^{-1}$ are comparable, namely there exists a large positive constant $\Lambda_{0}$ such that (57) $\Lambda_{0}^{-1}\lambda_{j,l}\leq\lambda_{i,l}\leq\Lambda_{0}\lambda_{j,l},\;\;\forall\;i,j$ Furthermore, we have that the following estimate around the blow up points holds (58) $u_{l}(y)+\frac{1}{3}\log\frac{t_{t}K_{l}(x_{i,l})}{2}=\log\frac{2\lambda_{i,l}}{1+\lambda_{i,l}^{2}(d_{\hat{g}_{x_{i,l}}}(y,x_{i,l}))^{2}}+O(d_{\hat{g}}(y,x_{i,l})),\;\;\;\;\forall\;y\in\;B^{\hat{g}}_{x_{i,l}}(\eta).$ To prove Proposition 3.2, as it is standard for Louiville type problems, one starts with the uniform isolation of blowing-up points. Indeed, we have ###### Lemma 3.3. Assuming that $(u_{l})_{l\in\mathbb{N}}$ is a bubbling sequence of solutions to BVP (55), then keeping the notations in Lemma 3.1, we have that the points $x_{i,l}$ are uniformly isolated, namely there exists $0<\eta_{k}<\frac{\varrho_{0}}{10}$ (where $\varrho_{0}$ is as in (38)) such that for $l$ large eneough, there holds (59) $d_{\hat{g}}(x_{i,l},x_{j,l})\geq 4\overline{C}\eta_{k},\;\;\;\forall i\neq j=1,\cdots,k.$ Proof. The proof use the integral method of Step 4 in [42] and hence we will be skectchy in many arguments. As in [42], we first fix $\frac{1}{3}<\nu<\frac{2}{3}$, and for $i=1,\cdots,k$, we set $\bar{u}_{i,l}(r)=Vol_{\hat{g}}(\partial B_{x_{i}}(r))^{-1}\int_{\partial B_{x_{i}}(r)}u_{l}(x)d\sigma_{\hat{g}}(x),\;\;\;\forall\;0\leq r<inj_{\hat{g}}(\partial M),$ and $\psi_{i,l}(r)=r^{4\nu}exp(4\bar{u}_{i,l}(r)),\;\;\;\forall\;0\leq r<inj_{g}(\partial M).$ Furthermore, as in [42], we define $r_{i,l}$ as follows (60) $r_{i,l}:=\sup\\{R_{\nu}\mu_{i,l}\leq r\leq\frac{R_{i,l}}{2}\;\;\text{such that}\;\;\psi_{i,l}^{{}^{\prime}}(r)<0\;\;\text{in}\;[R_{\nu}\mu_{i,l},r[\\};$ where $R_{i,l}:=\min_{j\neq i}d_{\hat{g}}(x_{i,l},x_{j,l})$. Thus, by continuity and the definition of $r_{i,l}$, we have that (61) $\psi_{i,l}^{{}^{\prime}}(r_{i,l})=0$ Now, as in [42], to prove (59), it suffices to show that $r_{i,l}$ is bounded below by a positive constant in dependent of $l$. Thus, we assume by contradiction that (up to a subsequence) $r_{i,l}\rightarrow 0$ as $l\rightarrow+\infty$ and look for a contradiction. In order to do that, we use the integral representation formula (46) and argue as in Step 4 of [42] to derive the following estimate $\psi^{{}^{\prime}}_{i,l}(r_{i,l})\leq(r_{i,l})^{3\nu-1}exp(\bar{u}_{i,l}(r_{i,l}))\left(3\nu-2C+o_{l}(1)+O_{l}(r_{i,l})\right).$ with $C>1$. So from $\frac{1}{3}<\nu<\frac{2}{3}$, $C>1$ and $r_{i,l}\longrightarrow 0$ as $l\rightarrow+\infty$, we deduce that for $l$ large enough, there holds (62) $\psi_{i,l}^{{}^{\prime}}(r_{i,l})<0.$ Thus, (61) and (62) lead to a contradiction, thereby concluding the proof of (59). Hence, the proof of the Lemma is complete. The next step to derive Proposition 3.2 is to establish its weak $O(1)$ -version. ###### Lemma 3.4. Assuming that $(u_{l})_{l\in\mathbb{N}}$ is a bubbling sequence of solutions to BVP (55), then keeping the notations in Lemma 3.1 and Lemma 3.3, we have that for $l$ large enough, there holds (63) $u_{l}(x)+\frac{1}{3}\log\frac{t_{l}K(x_{i})}{2}=\log\frac{2\lambda_{i,l}}{1+\lambda_{i,l}^{2}(d_{\hat{g}_{x_{i}}}(x,x_{i}))^{2}}+O(1),\;\;\;\;\forall\;x\in\;B^{x_{i}}_{x_{i}}(\eta_{k}),$ up to choosing $\eta_{k}$ smaller than in Lemma 3.3. ###### Remark 3.5. We point out that the comparability of the scaling parameters $\lambda_{i,l}$’s follows directly from Lemma 3.4. Proof. We are going to use the method of [47], hence we will be sketchy in many arguments. Like in [47], thanks to Lemma 3.3, we will focus only on one blow-up point and called it $x\in\partial M$. Thus, we are in the situation where there exists a sequence $x_{l}\in\partial M$ such that $x_{l}\rightarrow x$ with $x_{l}$ local maximum point for $u_{l}$ on $\partial M$ and $u_{l}(x_{l})\rightarrow+\infty$. Now, we recall $g_{x}=e^{2u_{x}}g$ and choose $\eta_{1}$ such that $20\eta_{1}<\min\\{inj_{g}(\partial M),\varrho_{0},\varrho_{k},d\\}$ with $4d\leq r_{i,l}$ where $r_{i,l}$ is as in the proof of Lemma 3.3. Next, we let $\hat{w}_{x}$ be the unique solution of the following boundary value problem (64) $\left\\{\begin{split}P^{4}_{g_{x}}\hat{w}_{x}&=P^{4}_{\hat{g}}u_{x}\;\;&\text{in}\;\;M,\\\ P^{3}_{g_{x}}\hat{w}_{x}&=P^{3}_{\hat{g}}u_{x}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial\hat{w}_{x}}{\partial n_{g_{x}}}&=0\;\;&\text{on}\;\;\partial M,\\\ \overline{\hat{w}}_{(Q,T)}&=0.\end{split}\right.$ Using standard elliptic regularity theory and (39), we derive (65) $\hat{w}(y)=O(d_{g}(y,x))\;\;\;\text{in}\;\;\;\;B_{x}^{g_{x},+}(2\eta_{1}).$ On the other hand, using the conformal covariance properties of the Paneitz operator and of the Chang-Qing one, see (1), we have that $\hat{u}_{l}:=u_{l}-\hat{w}_{x}$ satisfies $\left\\{\begin{split}P^{4}_{g_{x}}\hat{u}_{l}+2\hat{Q}_{l}&=0\;\;&\text{in}\;\;M,\\\ P^{3}_{g_{x}}\hat{u}_{l}+\hat{T}_{l}&=t_{l}Ke^{3\hat{u}_{l}}\;\;&\text{on}\;\;\partial M,\\\ \frac{\partial\hat{u}_{l}}{\partial n_{g_{x}}}&=0\;\;&\text{on}\;\;\partial M.\end{split}\right.$ with $\hat{Q}_{l}=t_{l}e^{-4\hat{w}}Q_{g}+\frac{1}{2}P^{4}_{\hat{g}}\hat{w}\;\;\;\text{and}\;\;\;\hat{T}_{l}=t_{l}e^{-3\hat{w}}T_{g}+P^{3}_{\hat{g}}\hat{w}.$ Next, as in [47], we are going to establish the classical sup+inf-estimate for $\hat{u}_{l}$ , since thanks (65) all terms coming from $\hat{w}_{x}$ can be absorbed on the right hand side of (63). Now, we are going to rescale the functions $\hat{u}_{l}$ around the points $x$. In order to do that, we define $\varphi_{l}:B^{\mathbb{R}^{3}}_{0}(2\eta_{1}\mu_{l}^{-1})\longrightarrow B^{\hat{g}_{x}}_{x}(2\eta_{1})$ by the formula $\varphi_{l}(z):=\mu_{l}z$ and $\mu_{l}$ is the corresponding scaling parameter given by Lemma 3.1. Furthermore, as in [47], we define the following rescaling of $\hat{u}_{l}$ $v_{l}:=\hat{u_{l}}\circ\varphi_{l}+\log\mu_{l}+\frac{1}{3}\log\frac{t_{l}K(x)}{2}.$ Using the Green’s representation formula for and the method of the method of [47], we get (66) $v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(\frac{\eta_{1}}{\mu_{l}})-B^{\mathbb{R}^{3}}_{0}(-\log\mu_{l}).$ Now, we are going to show that the estimate (66) holds also in $\bar{B}^{\mathbb{R}^{3}}_{0}(-\log\mu_{l})$. To do so, we use Lemma 3.1and the same arguments as in [47] to deduce (67) $v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(-\log\mu_{l}).$ Now, combining (66) and (67), we obtain (68) $v_{l}(z)+2\log|z|=O(1),\;\;\text{for}\;\;\;z\in\bar{B}^{\mathbb{R}^{3}}_{0}(\frac{\eta_{1}}{\mu_{l}}).$ Thus scaling back, namely using $y=\mu_{l}z$ and the definition of $v_{l}$, we obtain the desired $O(1)$-estimate. Hence the proof of the Lemma is complete. Proof of formula (58) of Proposition 3.2 We are going to use the method of [47], hence we will be sketchy in many arguments. Now, let $V_{0}$ be the unique solution of the following conformally invariant integral equation $V_{0}(z)=\frac{1}{2\pi^{2}}\int_{\mathbb{R}^{3}}\log\frac{|y|}{|z-y|}e^{3V_{0}(y)}dy+\log 2,\;\;\;V_{0}(0)=\log 2,\nabla V_{0}(0)=0.$ Next, we set $w_{l}(z)=v_{l}(z)-V_{0}(z)$ for $z\in B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$, and use Lemma 3.4 to infer that (69) $|w_{l}|\leq C\;\;\;\,\text{in}\;\;\;\;B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$ On the other hand, it is easy to see that to achieve our goal, it is sufficient to show (70) $|w_{l}|\leq C\mu_{l}|z|\,\,\,\,\text{in}\,\,\,\,B^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1}).$ To show (70), we first set $\Lambda_{l}:=\max_{z\in\Omega_{l}}\frac{|w_{l}(z)|}{\mu_{l}(1+|z|)}$ with $\Omega_{l}=\overline{B}^{\mathbb{R}^{3}}_{0}(\eta_{1}\mu_{l}^{-1})$ We remark that to show (70), it is equivalent to prove that $\Lambda_{l}$ is bounded. Now, let us suppose that $\Lambda_{l}\rightarrow+\infty$ as $l\rightarrow+\infty$, and look for a contradiction. To do so, we will use the method of [47]. For this, we first choose a sequence of points $z_{l}\in\Omega_{l}$ such that $\Lambda_{l}=\frac{|w_{l}(z_{l})|}{\mu_{l}(1+|z_{l}|)}$. Next, up to a subsequence, we have that either $z_{l}\rightarrow z^{*}$ as $l\rightarrow+\infty$ (with $z^{*}\in\mathbb{R}^{3}$) or $|z_{l}|\rightarrow+\infty$ as $l\rightarrow+\infty$. Now, we make the following definition $\bar{w}_{l}(z):=\frac{w_{l}(z)}{\Lambda_{l}\mu_{l}(1+|z_{l}|)},$ and have (71) $|\bar{w}_{l}(z)|\leq\left(\frac{1+|z|}{1+|z_{l}|}\right),$ and (72) $|\bar{w}_{l}(z_{l})|=1.$ Now, we consider the case where the points $z_{l}$ escape to infinity. Case 1 : $|z_{l}|\rightarrow+\infty$ In this case, using the integral representation (46) with respect to $g_{x}$ and the method of [47], we obtain $\bar{w}_{l}(z_{l})=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z_{l}-\xi|}\left(\frac{O(1)(1+|\xi|)^{-5}}{(1+|z_{l}|)}+\frac{O(1)(1+|\xi|)^{-5}}{\Lambda_{l}(1+|z_{l}|)}\right)d\xi+o(1).$ Now, using the fact that $|z_{l}|\rightarrow+\infty$ as $l\rightarrow+\infty$, one can easily check that $\bar{w}_{l}(z_{l})=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z_{l}-\xi|}\left(\frac{O(1)(1+|\xi|)^{-5}}{(1+|z_{l}|)}+\frac{O(1)(1+|\xi|)^{-5}}{\Lambda_{l}(1+|z_{l}|)}\right)d\xi=o(1).$ Hence, we reach a contradiction to (72). Now, we are going to show that, when the points $z_{l}\rightarrow z^{*}$ as $l\rightarrow+\infty$, we reach a contradiction as well. Case 2: $z_{l}\rightarrow z^{*}$ In this case, using the assumption $z_{l}\longrightarrow z^{*}$, the Green’s representation formula, and the method of [47], we obtain that up to a subsequence (73) $\bar{w}_{l}\rightarrow w\;\;\;\text{in}\;\;C^{1}_{loc}(\mathbb{R}^{3})\;\;\;\text{as}\;\;\;l\rightarrow+\infty,\;\;\>\ $ and (74) $\begin{split}\bar{w}_{l}(z)=\frac{1}{2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z-\xi|}\frac{K\circ\varphi_{l}(\xi)}{K\circ\varphi_{l}(0)}e^{3\vartheta_{l}(\xi)}\bar{w}(\xi)d\xi+\frac{1}{\Lambda_{l}\mu_{l}(1+|z_{l}|)2\pi^{2}}\int_{\Omega_{l}}\log\frac{|\xi|}{|z-\xi|}O(\mu_{l}(1+|\xi|)^{-5})d\xi\\\ +\frac{O(1)+O(|z|)}{\Lambda_{l}(1+|z_{l}|)},\end{split}$ where $e^{3\theta_{l}}:=\int_{0}^{1}e^{3(sv_{l}+(1-s)V_{0})}ds$. Thus, appealing to (73) and (74), we infer that $w$ satisfies (75) $w(z)=\frac{1}{2\pi^{2}}\int_{\mathbb{R}^{3}}\log\frac{|\xi|}{|z-\xi|}e^{3V_{0}(\xi)}w(\xi)d\xi$ Now, using (71), we have that $w$ satisfies the following asymptotics (76) $|w(z)|\leq C(1+|z|).$ On the other hand, from the definition of $v_{l}$, it is easy to see that (77) $w(0)=0,\;\;\;\text{and}\;\;\;\;\nabla w(0)=0.$ So, using (75)-(77), and observing that Lemma 3.7 in [47] holds for dimension $3$, , we obtain $w=0.$ However, from (72), we infer that $w$ satisfies also (78) $|w(z^{*})|=1$ So we reach a contradiction in the second case also. Hence the proof of the lemma is complete. Because of the lack of understanding of the blowing PS-sequences for Louiville type problems, the role of the PS-sequences can be replaced by the vanishing viscosity solutions of the type of (55) via the following Bahri-Lucia’s deformation lemma. ###### Lemma 3.6. Assuming that $a,\;b\in\mathbb{R}$ such that $a<b$ and there is no critical values of $\mathcal{E}_{g}$ in $[a,b]$, then there are two possibilities 1) Either $(\mathcal{E}_{g})^{a}\;\text{is a deformation retract of}\;\;(\mathcal{E}_{g})^{b}.$ 2) Or there exists a sequence $t_{l}\rightarrow 1$ as $l\rightarrow+\infty$ and a sequence of critical point $u_{l}$ of $(\mathcal{E}_{g})_{t_{l}}$ verifying $a\leq\mathcal{E}_{g}(u_{l})\leq b$ for all $l\in\mathbb{N}^{*}$, where $(\mathcal{E}_{g})_{t_{l}}$ is as in (34) with $t$ replaced by $t_{l}$. On the other hand, setting (79) $\begin{split}V_{R}(k,\epsilon,\eta):=\\{u\in\mathcal{H}_{\frac{\partial}{\partial n}}:\;\;\exists a_{1},\cdots,a_{k}\in\partial M,\;\;\lambda_{1},\cdots,\lambda_{k}>0,\;\;||u-\overline{u}_{Q,T}-\sum_{i=1}^{k}\varphi_{a_{i},\lambda_{i}}||_{\mathbb{P}^{4,3}}=\\\ O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\;\;\;\lambda_{i}\geq\frac{1}{\epsilon},\;\;\frac{2}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\frac{\Lambda}{2},\;\;\text{and}\;\;d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta\;\;\text{for}\;i\neq j\\},\end{split}$ where $\overline{C}$ is as in (39), $L$ as in (20), , $O(1):=O_{A,\bar{\lambda},u,\epsilon}(1)$ meaning bounded uniformly in $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $A:=(a_{1},\cdots,a_{k})$, $u$, $\epsilon$, we have as in [47] that Proposition 3.2 implies the following one. ###### Lemma 3.7. Let $\epsilon$ and $\eta$ be small positive real numbers with $0<2\eta<\varrho$ where $\varrho$ is as in (41). Assuming that $u_{l}$ is a sequence of blowing up critical point of $(\mathcal{E}_{g})_{t_{l}}$ with $\overline{(u_{l})}_{Q,T}=0,l\in\mathbb{N}$ and $t_{l}\rightarrow 1$ as $l\rightarrow+\infty$ , then there exists $l_{\epsilon,\eta}$ a large positive integer such that for every $l\geq l_{\epsilon,\eta}$, we have $u_{l}\in V_{R}(k,\epsilon,\eta)$, and for the definition of $V_{R}(k,\epsilon,\eta)$, see (79). Finally, as in [47], we have that Lemma 3.6 and Lemma 3.7 implies the following one. ###### Lemma 3.8. Assuming that $\epsilon$ and $\eta$ are small positive real numbers with $0<2\eta<\varrho$, then for $a,b\in\mathbb{R}$ such that $a<b$, we have that if there is no critical values of $\mathcal{E}_{g}$ in $[a,b]$, then there are two possibilities 1) Either $(\mathcal{E}_{g})^{a}\;\text{is a deformation retract of}\;\;(\mathcal{E}_{g})^{b}.$ 2) Or there exists a sequence $t_{l}\rightarrow 1$ as $l\rightarrow+\infty$ and a sequence of critical point $u_{l}$ of $(\mathcal{E}_{g})_{t_{l}}$ (for its definition see (34)) verifying $a\leq\mathcal{E}_{g}(u_{l})\leq b$ for all $l\in\mathbb{N}^{*}$ and $l_{\epsilon,\eta}$ a large positive integer such that $u_{l}\in V_{R}(k,\epsilon,\eta)$ for all $l\geq l_{\epsilon,\eta}$, and for the definition of $V_{R}(k,\epsilon,\eta)$, see (79). ### 3.2 Energy and gradient estimates at infinity In this subsection, we present energy and gradient estimates needed to characterize the critical points at infinity of $\mathcal{E}_{g}$. We start with a parametrization of infinity. Indeed, as a Liouville type problem, we have that for $\eta$ a small positive real number with $0<2\eta<\varrho$, there exists $\epsilon_{0}=\epsilon_{0}(\eta)>0$ such that $\forall\;0<\epsilon\leq\epsilon_{0}$, we have (80) $\forall u\in V_{R}(k,\epsilon,\eta),\\\ \text{the minimization problem }\min_{B_{\epsilon,\eta}}||u-\overline{u}_{Q,T}-\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}-\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})||_{\mathbb{P}^{4,3}}$ has a unique solution, up to permutations, where $B_{\epsilon,\eta}$ is defined as follows (81) $\begin{split}{B_{\epsilon,\eta}:=\\{(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in\mathbb{R}^{k}\times(\partial M)^{k}\times(0,+\infty)^{k}\times\mathbb{R}^{\bar{k}}}:|\alpha_{i}-1|\leq\epsilon,\lambda_{i}\geq\frac{1}{\epsilon},i=1,\cdots,k,\\\ d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta,i\neq j,|\beta_{r}|\leq R,r=1,\cdots,\bar{k}\\}.\end{split}$ Moreover, using the solution of (80), we have that every $u\in V_{R}(k,\epsilon,\eta)$ can be written as (82) $u-\overline{u}_{Q,T}=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})+w,$ where $w$ verifies the following orthogonality conditions (83) $\begin{split}\overline{w}_{Q,T}=\left\langle\varphi_{a_{i},\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial a_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,i=1,\cdots,k,\\\ r=1,\cdots,\bar{k}\end{split}$ and the estimate (84) $||w||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right),$ where here $O\left(1\right):=O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},w,\epsilon}\left(1\right)$. Furthermore, the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ and the negativity parameter $\beta_{r}$ in (82) verify also (85) $\begin{split}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta,\;i\neq j=1,\cdots,k,\frac{1}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\Lambda\;\;i,j=1,\cdots,k,\;\;\lambda_{i}\geq\frac{1}{\epsilon},\;\;\text{and}\\\ \;\;\;\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}|\alpha_{i}-1|\sqrt{\log\lambda_{i}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\end{split}$ with still $O\left(1\right)$ as in (84). Because of the translation invariant property of $\mathcal{E}_{g}$ and the parametrization (82), to derive energy estimate in $V_{R}(k,\epsilon,\eta)$ we start with the following lemma. ###### Lemma 3.9. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in M$ concentration points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have $\begin{split}&\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=^{1}}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})\right)=C^{k}_{0}-8\pi^{2}\mathcal{F}_{K}(a_{1},\dots,a_{k})+2\sum_{r=1}^{\bar{k}}\mu_{r}\beta_{r}^{2}\\\ &+\sum_{i=1}^{k}(\alpha_{i}-1)^{2}\left[16\pi^{2}\log\lambda_{i}+8\pi^{2}H(a_{i},a_{i})+C^{k}_{1}\right]\\\ &+8\pi^{2}\sum_{i=1}^{k}(\alpha_{i}-1)\left[\sum_{r=1}^{\bar{k}}2\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})(a_{i})+\sum_{j=1,j\neq i}^{k}(\alpha_{j}-1)G(a_{i},a_{j})\right]\\\ &-\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\ &+\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{\tilde{\tau}_{i}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\ &+\frac{16\pi^{2}}{3}\sum_{i=1}^{k}\log(1-\tilde{\tau}_{i})+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{3}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda^{3}_{i}}\right),\end{split}$ where $O\left(1\right)$ means here $O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$ with $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$ and for $i=1,\cdots,k$, $\tilde{\tau}_{i}:=1-\frac{k\tilde{\gamma}_{i}}{\Gamma},\;\;\;\;\Gamma:=\sum_{i=1}^{k}\tilde{\gamma}_{i},\;\;\;\tilde{\gamma}_{i}:=\tilde{c}_{i}\lambda_{i}^{6\alpha_{i}-3}\mathcal{F}^{A}_{i}(a_{i})\mathcal{G}_{i}(a_{i}),$ with $\tilde{c}_{i}:=\int_{\mathbb{R}^{3}}\frac{1}{(1+|y|^{2})^{3\alpha_{i}}}dy$ $\begin{split}\mathcal{G}_{i}(a_{i}):=e^{3((\alpha_{i}-1)H(a_{i},a_{i})+\sum_{j=1,j\neq i}^{k}(\alpha_{j}-1)G(a_{j},a_{i}))}e^{\frac{3}{2}\sum_{j=1,j\neq i}^{k}\frac{\alpha_{j}}{\lambda_{j}^{2}}\Delta_{g_{a_{j}}}G(a_{j},a_{i})}e^{\frac{3}{2}\frac{\alpha_{i}}{\lambda_{i}^{2}}\Delta_{g_{a_{i}}}H(a_{i},a_{i})}\\\ \times e^{3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}(a_{i})},\end{split}$ $C_{0}^{k}$ is a real number depending only on $k$, $C_{1}^{k}$ is a real number and $c^{1}$ is a positive real number and for the meaning of $O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$. Proof. The proof is the same as the one Lemma 4.1 in [1] replacing Lemma 10.1- Lemma 10.4 in [1] by Lemma 5.1-Lemma 5.4. Concerning the gradient estimates of $\mathcal{E}_{g}$ in $V_{R}(k,\epsilon,\eta)$, we have in the directions of the scaling parameters : ###### Lemma 3.10. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration points, $\alpha_{i}$ masses , $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$) and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have that for every $r=1,\cdots,k$, there holds $\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q,T})\right),\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}=16\pi^{2}\alpha_{j}\tau_{j}\\\ &-\frac{c^{2}8\pi^{2}}{3\lambda_{j}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{j}}}\mathcal{F}^{A}_{j}(a_{j})}{\mathcal{F}^{A}_{j}(a_{j})}-\frac{3}{4}R_{\hat{g}}(a_{j})\right)-\frac{16\pi^{2}}{\lambda_{j}^{2}}\tau_{j}\Delta_{\hat{g}_{a_{j}}}H(a_{j},a_{j})\\\ &-\frac{16\pi^{2}}{\lambda_{j}^{2}}\sum_{i=1,i\neq j}^{k}\tau_{i}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})+\frac{c^{2}8\pi^{2}}{\lambda_{j}^{2}}\tau_{j}\left(\frac{\Delta_{\hat{g}_{a_{j}}}\mathcal{F}^{A}_{j}(a_{j})}{\mathcal{F}^{A}_{j}(a_{j})}-\frac{3}{4}R_{\hat{g}}(a_{j})\right)\\\ &+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{3}}\right),\end{split}$ where $A:=(a_{1},\cdots,a_{k})$, $O\left(1\right)$ is as in Lemma 3.9, $c^{2}$ is a positive real number, and for $i=1,\cdots,k$, $\tau_{i}:=1-\frac{k\tilde{\gamma}_{i}}{D},\;\;\;\;\;D:=\oint_{\partial M}K(x)e^{3(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}(x)+\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}(x))}dS_{g}(x),$ with $\tilde{\gamma}_{i}$ as in Lemma 3.9. Proof. The proof is the same as the one Lemma 5.1 in [1] replacing Lemma 10.1- Lemma 10.4 in [1] by Lemma 5.1-Lemma 5.4. As in [1], Lemma 3.10 implies the following corollary. ###### Corollary 3.11. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have $\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\sum_{i=1}^{k}\frac{\lambda_{i}}{\alpha_{i}}\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}}\right\rangle_{\mathbb{P}^{4,3}}=\\\ &\sum_{i=1}^{k}\frac{c^{3}8\pi^{2}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\ &+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum^{k}_{i=1}\tau^{3}_{i}+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{3}}\right),\end{split}$ where $A:=(a_{1},\cdots,a_{k})$, $O\left(1\right)$ as as in Lemma 3.9, $c^{3}$ is a positive real number, and for $i=1,\cdots,k$, $\tau_{i}$ is as in Lemma 3.10. Proof. The proof uses the strategy of the proof of Corollary 5.2 in [1] replacing Lemma 5.1 in [1] by its counterpart Lemma 3.10. For the gradient estimate in the directions of mass concentrations, we have: ###### Lemma 3.12. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have that for every $j=1,\cdots,k$, there holds $\begin{split}&\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\varphi_{a_{j},\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}=\\\ &\left(2\log\lambda_{j}+H(a_{j},a_{j})-C_{2}\right)\frac{1}{\alpha_{j}}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right\rangle_{\mathbb{P}^{4,3}}\\\ &+\sum_{i=1,i\neq j}^{k}G(a_{j},a_{i})\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\lambda_{i}\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}}\right\rangle_{\mathbb{P}^{4,3}}\\\ &+32\pi^{2}(\alpha_{j}-1)\log\lambda_{j}+O\left(\log\lambda_{j}\left(\sum_{i=1}^{k}\frac{|\alpha_{i}-1|}{\log\lambda_{i}}+(\sum_{r=1}^{\bar{k}}|\beta_{r}|)(\sum_{i=1}^{k}\frac{1}{\log\lambda_{i}})+\sum_{i=1}^{k}\frac{1}{\lambda^{2}_{i}}\right)\right),\end{split}$ where $O\left(1\right)$ as as in Lemma 3.9 and $C_{2}$ is a real number. Proof. It follows from the same arguments as in Lemma 5.3 in [1]. Concerning the gradient estimate in the directions of points of concentrations, we have: ###### Lemma 3.13. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$), and $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have that for every $j=1,\cdots,k$, there holds $\begin{split}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),\frac{1}{\lambda_{j}}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial a_{j}}\right\rangle_{\mathbb{P}^{4,3}}&=-\frac{c^{2}32\pi^{2}}{\lambda_{j}}\frac{\nabla_{\hat{g}}\mathcal{F}_{j}^{A}(a_{j})}{\mathcal{F}_{j}^{A}(a_{j})}\\\ &+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{2}\right)\\\ &+O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{2}+\sum_{i=1}^{k}\tau_{i}^{2}\right),\end{split}$ where $A:=(a_{1},\cdots,a_{k})$, $O(1)$ is as in Lemma 3.9, $c^{2}$ is as in Lemma 3.10 and for $i=1,\cdots,k$, $\tau_{i}$ is as in Lemma 3.10. Proof. The proof is the same as the one of Lemma 5.4 in [1]. Concerning the gradient estimate in the directions of the negativity parameters, we have: ###### Lemma 3.14. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then for $a_{i}\in\partial M$ concentration points, $\alpha_{i}$ masses, $\lambda_{i}$ concentration parameters ($i=1,\cdots,k$), ad $\beta_{r}$ negativity parameters ($r=1,\cdots,\bar{k}$) satisfying (85), we have that for every $l=1,\cdots,\bar{k}$, there holds $\begin{split}\left\langle\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right),v_{l}-\overline{(v_{l})}_{Q,T}\right\rangle_{\mathbb{P}^{4,3}}=&4\mu_{l}\beta_{l}+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|\right)\\\ &+O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\end{split}$ where $O(1)\;$ is as in Lemma 3.9 and for $i=1,\cdots,k$, $\tau_{i}$ is as in Lemma 3.10 Proof. It follows from the same arguments as in the proof of Lemma 5.5 in [1]. ### 3.3 Finite-dimensional reduction In this subsection, we complete the energy estimate of $\mathcal{E}_{g}$ on $V_{R}(k,\epsilon,\eta)$ via Lyapunov finite dimensional type reduction and second variation arguments. First of all, we have: ###### Proposition 3.15. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80) and $u=\overline{u}_{Q,T}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in V_{R}(k,\epsilon,\eta)$ with $w$, the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$), and the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) verifying (83)-(85), then we have (86) $\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\right)-f(w)+Q(w)+o(||w||_{\mathbb{P}^{4,3}}^{2}),$ where (87) $f(w):=16\pi^{2}\frac{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}wdS_{g}}{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}},$ and (88) $Q(w):=||w||_{\mathbb{P}^{4,3}}^{2}-24\pi^{2}\frac{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}w^{2}dS_{g}}{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}}.$ Moreover, setting (89) $\begin{split}E_{a_{i},\lambda_{i}}:=\\{w\in\mathcal{H}_{\frac{\partial}{\partial n}}:\;\;\langle\varphi_{a_{i},\lambda_{i}},w\rangle_{\mathbb{P}^{4,3}}=\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\rangle_{\mathbb{P}^{4,3}}=\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial a_{i}},w\rangle_{\mathbb{P}^{4,3}}=0,\\\ \,\overline{w}_{(Q,T)}=\langle v_{r},w\rangle_{\mathbb{P}^{4,3}}=0,\;r=1,\cdots,\bar{k},\,\;\text{and}\;\;||w||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}}\right)\\},\end{split}$ and (90) $A:=(a_{1},\cdots,a_{k}),\;\;\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k}),\;\;E_{A,\bar{\lambda}}:=\cap_{i=1}^{k}E_{a_{i},\lambda_{i}},$ we have that, the quadratic form $Q$ is positive definite in $E_{A,\bar{\lambda}}$. Furthermore, the linear part $f$ verifies that, for every $w\in E_{A,\bar{\lambda}}$, there holds (91) $f(w)=O\left[||w||_{\mathbb{P}^{4,3}}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right)\right].$ where here $o(1)=o_{\bar{\alpha},A,\bar{\beta},\bar{\lambda},w,\epsilon}(1)$ and $O\left(1\right):=O_{\bar{\alpha},A,\bar{\beta},\bar{\lambda},w,\epsilon}\left(1\right)$. As in [1], to prove Proposition 3.15, we will need the following three coming lemmas. We start with the following one: ###### Lemma 3.16. Assuming the assumptions of Proposition 3.15 and $\gamma\in(0,1)$ small, then for every $q\geq 1$, there holds the following estimates (92) $\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{3+\gamma})\right),$ (93) $\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\hat{\delta}_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{\gamma})\right),$ (94) $\oint_{\partial M}e^{3\hat{\delta}_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}d_{\hat{g}_{a_{i}}}(a_{i},\cdot)|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}\frac{1}{\lambda_{i}^{1-\gamma}}\right),\;\;i=1,\cdots,k,$ (95) $\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}e^{3\theta_{w}w}|w|^{q}=O\left(||w||_{\mathbb{P}^{4,3}}^{q}(\sum_{i=1}^{k}\lambda_{i}^{3+\gamma})\right),$ where $\theta_{w}\in[0,1]$, and (96) $\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}\left(e^{3w}-1-3w-\frac{9}{2}w^{2}\right)dV_{g}=o\left(||w||_{\mathbb{P}^{4,3}}^{2}(\sum_{i=1}^{k}\lambda_{i}^{3})\right).$ where here $o(1)$ and $O\left(1\right)$ are as in Proposition 3.15. Proof. The proof is the same as the one of Lemma 6.2 in [1] replacing Lemma 10.1 by its counterpart Lemma 5.1. Still as in [1], the second lemma that we need for the proof of Proposition 3.15 read as follows: ###### Lemma 3.17. Assuming the assumptions of Proposition 3.15, then there holds the following estimate (97) $\begin{split}&\frac{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}wdS_{g}}{\oint_{\partial M}Ke^{3\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+3\sum_{r=1}^{\bar{k}}\beta_{r}v_{r}}dS_{g}}=\\\ &O\left(||w||_{\mathbb{P}^{4,3}}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right)\right).\end{split}$ Proof. If follows from the same arguments as in the proof of Lemma 6.3 in [1] replacing Lemma 10.1 by its counterpart Lemma 5.1. Finally, as in [1], the third and last lemma that we need for the proof of Proposition 3.15 is the following one. ###### Lemma 3.18. Assuming the assumptions of Proposition 3.15, then for every $i=1,\cdots,k$, there holds (98) $\tau_{i}=O\left(\sum_{j=1}^{k}\frac{1}{\lambda_{j}}\right).$ Proof. The proof is the same as the one Lemma 6.4 in [1] replacing Lemma 5.1 by Lemma 3.10. Proof of Proposition 3.15 It follows from the same arguments as in the proof of Lemma 6.1 in [1] replacing Lemma 6.2-Lemma 6.4 in [1] by Lemma 3.16-lemma 3.18 and Lemma 10.1 in [1] by Lemma 5.1. Furthermore, Lemma 10.6 and Lemma 10.7 in [1] are replaced by Lemma 5.9 and Lemma 5.10. Now, as in [1], we have that Proposition 3.15 implies the following direct corollaries. ###### Corollary 3.19. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80) and $u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})$ with the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), then there exists a unique $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in E_{A,\bar{\lambda}}$ such that (99) $\mathcal{E}_{g}\left(u+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)=\min_{w\in E_{A,\bar{\lambda}},u+w\in V_{R}(k,\epsilon,\eta)}\mathcal{E}_{g}(u+w),$ where $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$ and $\bar{\beta}:=(\beta_{1},\cdots,\beta_{k})$. Furthermore, $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\longrightarrow\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in C^{1}$ and satisfies the following estimate (100) $\frac{1}{C}||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}^{2}\leq|f\left(\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)|\leq C||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}^{2},$ for some large positive constant $C$ independent of $\bar{\alpha}$, $A$, $\bar{\lambda}$, and $\bar{\beta}$, hence (101) $||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||_{\mathbb{P}^{4,3}}=O\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|\log\lambda_{i}+\sum_{r=1}^{\bar{k}}|\beta_{r}|+\sum_{i=1}^{k}\frac{\log\lambda_{i}}{\lambda_{i}^{2}}\right).$ ###### Corollary 3.20. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), and $u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})$ with the concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85), then there exists an open neighborhood $U$ of $(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ (with $\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$, $A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$, $\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and $\bar{\beta}^{0}:=(\beta_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) such that for every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the $\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with $\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in V_{R}(k,\epsilon,\eta)$, we have the existence of a change of variable (102) $w\longrightarrow V$ from a neighborhood of $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ to a neighborhood of $0$ such that (103) $\begin{split}&\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\right)=\\\ &\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right)\\\ &+\frac{1}{2}\partial^{2}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})\right)(V,V),\end{split}$ Thus, as in [1], with this new variable, it is easy to see that in $V_{R}(k,\epsilon,\eta)$ we have a splitting of the variables $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ and $V$, namely that one can decrease the Euler-Lagrange functional $\mathcal{E}_{g}$ in the variable $V$ without touching the variable $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ by considering just the flow (104) $\frac{dV}{dt}=-V.$ So, as in [1], and for the same reasons, to develop a Morse theory for $\mathcal{E}_{g}$ is equivalent to do one for the functional (105) $\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta}):=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\right),$ where $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A=(a_{1},\cdots,a_{k})$, $\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k})$ and $\bar{\beta}=\beta_{1},\cdots,\beta_{\bar{k}}$ with the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), and $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in Corollary 3.19. Finally, we have the following energy estimate of $\mathcal{E}_{g}$ on $V_{R}(k,\epsilon,\eta)$ . ###### Lemma 3.21. Under the assumptions of Proposition 3.15, $\forall u=\overline{u}_{(Q,T)}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in V_{R}(k,\epsilon,\eta)$, we have $\begin{split}&\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=^{1}}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\right)=C^{k}_{0}-8\pi^{2}\mathcal{F}_{K}(a_{1},\dots,a_{k})+2\sum_{r=1}^{\bar{k}}\mu_{r}\beta_{r}^{2}\\\ &+\sum_{i=1}^{k}(\alpha_{i}-1)^{2}\left[16\pi^{2}\log\lambda_{i}+8\pi^{2}H(a_{i},a_{i})+C^{k}_{1}\right]-\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\ &+\frac{1}{2}\partial^{2}\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})\right)(V,V)\\\ &+8\pi^{2}\sum_{i=1}^{k}(\alpha_{i}-1)\left[\sum_{r=1}^{\bar{k}}2\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)(a_{i})-\sum_{j=1,j\neq i}^{k}(\alpha_{j}-1)G(a_{i},a_{j})\right]\\\ &+\frac{c^{1}8\pi^{2}}{9}\sum_{i=1}^{k}\frac{\tilde{\tau}_{i}}{\lambda_{i}^{2}}\left(\frac{\Delta_{\hat{g}_{a_{i}}}\mathcal{F}^{A}_{i}(a_{i})}{\mathcal{F}^{A}_{i}(a_{i})}-\frac{3}{4}R_{\hat{g}}(a_{i})\right)\\\ &+\frac{16\pi^{2}}{3}\sum_{i=1}^{k}\log(1-\tilde{\tau}_{i})+O\left(\sum_{i=1}^{k}|\alpha_{i}-1|^{3}+\sum_{r=1}^{\bar{k}}|\beta_{r}|^{3}+\sum_{i=1}^{k}\frac{1}{\lambda^{3}_{i}}+||\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})||^{2}_{\mathbb{P}^{4,3}}\right),\end{split}$ where $O\left(1\right)$ means here $O_{\bar{\alpha},A,\bar{\lambda},\bar{\beta},\epsilon}\left(1\right)$ with $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$ and for $i=1,\cdots,k$, $\tilde{\tau}_{i}$ is as in Lemma 3.9. where $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in Corollary 3.19. Proof. It follows directly from Lemma 3.9, formula (103) and Proposition 3.15. ### 3.4 Morse lemma at infinity In this subsection, we derive a Morse Lemma at infinity for $\mathcal{E}_{g}$. As in [1], in order to do that, we first construct a pseudo-gradient for $\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$, where $\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is defined as in (105) exploiting the gradient estimates derived previously. Indeed, we have: ###### Proposition 3.22. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), and $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), then there exists a pseudogradient $\mathcal{W}_{g}$ of $\bar{\mathcal{E}_{g}}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ such that 1) For every $u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})\in V_{R}(k,\epsilon,\eta)$ with the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), there holds (106) $\large\left\langle-\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}(u),\;\mathcal{W}_{g}\large\right\rangle_{\mathbb{P}^{4,3}}\geq c\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{r=1}^{\bar{k}}|\beta_{r}|)\right),$ and for every $u:=\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}\lambda(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in V_{R}(k,\epsilon,\eta)$ with the concentration points $a_{i}$, the masses $\alpha_{i}$, the concentrating parameters $\lambda_{i}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), and $\bar{w}(\bar{\alpha},A,\bar{\lambda},\bar{\beta})$ is as in (99), there holds (107) $\left\langle-\nabla^{\mathbb{P}^{4,3}}\mathcal{E}_{g}(u+\bar{w}),\;\mathcal{W}_{g}+\frac{\partial\bar{w}}{\partial(\bar{\alpha},A,\bar{\lambda},\bar{\beta})}\right\rangle_{{}_{\mathbb{P}^{4,3}}}\geq c\left(\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}+\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{r=1}^{\bar{k}}|\beta_{r}|\right),$ where $c$ is a small positive constant independent of $A:=(a_{1},\cdots,a_{k})$, $\bar{\alpha}=(\alpha_{1},\cdots,\alpha_{k})$, $\bar{\lambda}=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}=(\beta_{1},\cdots,\beta_{\bar{k}})$ and $\epsilon$. 2) $\mathcal{W}_{g}$ is a $||\cdot||_{\mathbb{P}^{4,3}}$-bounded vector field and is compactifying outside the region where $A$ is very close to a critical point $B$ of $\mathcal{F}_{K}$ satisfying $\mathcal{L}_{K}(B)<0$. Proof. It follows from the same arguments as in the proof of Proposition 8.1 in [1] replacing formulas (52)-(54), Lemma 5.1, Corollary 5.2 and Lemma 5.3-Lemma 5.5 in [1] with (49)-(51), Lemma 3.10, Corollary 3.11 and Lemma 3.12-Lemma 3.14. Furthermore, Lemma 4.1, Lemma 7.1, and Lemma 10.5 in [1] are replaced by Lemma 3.9, Lemma 3.15 and Lemma 5.5 Now, as in [1], we have that Proposition 3.22 implies the following characterization of the critical points at infinity of $\mathcal{E}_{g}$. ###### Corollary 3.23. 1) The critical points at infinity of $\mathcal{E}_{g}$ correspond to the ”configurations” $\alpha_{i}=1$, $\lambda_{i}=+\infty$, $\tau_{i}=0$ $i=1,\cdots,k$, $\beta_{r}=0$, $r=1,\cdots,\bar{k}$, $A$ is a critical point of $\mathcal{F}_{K}$ and $V=0$, and we denote them by $z^{\infty}$ with $z$ being the corresponding critical point of $\mathcal{F}_{K}$ . 2) The “true” critical points at infinity of $\mathcal{E}_{g}$ are the $z^{\infty}$ satisfying $\mathcal{L}_{K}(z)<0$ and we denote them by $x^{\infty}$ with $x$ being the corresponding critical point of $\mathcal{F}_{K}$. 3) The “false” critical points at infinity of $\mathcal{E}_{g}$ are the $z^{\infty}$ satisfying $\mathcal{L}_{K}(z)>0$ and we denote them by $y^{\infty}$ with $y$ being the corresponding critical point of $\mathcal{F}_{K}$. 4) The $\mathcal{E}_{g}$-energy of a critical point at infinity $z^{\infty}$ denoted by $\mathcal{J}_{g}(z^{\infty})$ is given by (108) $\mathcal{J}_{g}(z^{\infty})=C_{0}^{k}-8\pi^{2}\mathcal{F}_{K}(z_{1},\dots,z_{k})$ where $z=(z_{1},\cdots,z_{k})$ and $C_{0}^{k}$ is as in Lemma 3.9. Proof. Point 1)- Point 3) follow from (51), Lemma 3.8, the discussions right after (103), and Proposition 3.22, while Point 4) follows from Point 1) combined with (101) and Lemma 3.21. Finally, we are going to conclude this subsection by establishing an analogue of the classical Morse lemma for both “true” and “false” critical points at infinity. In order to do that, we first remark that, as in [1], the arguments of Proposition 3.22 implies that $V_{-}:=\\{u\in V_{R}(k,\epsilon,\eta):\;l_{K}(A)<0,\;\forall r\in\\{1,\cdots,\bar{k}\\}\,\,\;\,|\beta_{r}|\leq 2\tilde{C}_{0}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\;\;\forall\;i\in\\{1,\cdots,k\\}\;\,\;|\tau_{i}|\leq 2\frac{\hat{C}_{0}}{\lambda_{i}^{2}},\;\;\text{and}\;\;\;\forall i\in\\{1,\cdots,k\\}\;\;\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}\leq 4\frac{C_{0}}{\lambda_{i}^{2}}\;\\}$ and $V_{+}:=\\{u\in V_{R}(k,\epsilon,\eta):l_{K}(A)>0,\forall r\in\\{1,\cdots,\bar{k}\\}\,\,\;\,|\beta_{r}|\leq 2\tilde{C}_{0}\left(\sum_{i=1}^{k}\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}(a_{i})|}{\lambda_{i}}+\sum_{i=1}^{k}|\alpha_{i}-1|+\sum_{i=1}^{k}|\tau_{i}|+\sum_{i=1}^{k}\frac{1}{\lambda_{i}^{2}}\right),\\\ \;\;\forall\;i\in\\{1,\cdots,k\\}\;\,\;|\tau_{i}|\leq 2\frac{\hat{C}_{0}}{\lambda_{i}^{2}},\;\;\text{and}\;\;\;\forall i\in\\{1,\cdots,k\\}\;\;\frac{|\nabla_{\hat{g}}\mathcal{F}^{A}_{i}(a_{i})|}{\lambda_{i}}\leq 4\frac{C_{0}}{\lambda_{i}^{2}}\;\\}$ (where $\tilde{C}_{0}$, $\hat{C}_{0}$ and $C_{0}$ are large positive constants) are respectively a neighborhood of the “true” and “false” critical points at infinity of the variational problem. Hence, as in [1], (101), Corollary3.20, Lemma 3.21 and classical Morse lemma imply the following Morse type lemma for a “true” critical point at infinity. ###### Lemma 3.24. (Morse lemma at infinity near a “true” one) Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80) and $u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}((\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0}))\in V_{-}(k,\epsilon,\eta)$ (where $\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$, $A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$, $\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and $\bar{\beta}^{0}:=(a_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) with the concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85) and furthermore $A^{0}\in Crit(\mathcal{F}_{K})$, then there exists an open neighborhood $U$ of $(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ such that for every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the $\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with $u=\overline{u}_{(Q,T)}\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)})+w\in V_{-}(k,\epsilon,\eta)$, we have the existence of a change of variable (109) $\begin{split}&\alpha_{i}\longrightarrow s_{i},i=1,\cdots,k,\\\ &A\longrightarrow\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})\\\ &\lambda_{1}\longrightarrow\theta_{1},\\\ &\tau_{i}\longrightarrow\theta_{i},i=2,\cdots,k,\\\ &\beta_{r}\longrightarrow\tilde{\beta}_{r}\\\ &V\longrightarrow\tilde{V},\end{split}$ such that (110) $\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)+w\right)=-|\tilde{A}_{-}|^{2}+|\tilde{A}_{+}|^{2}+\sum_{i=1}^{k}s_{i}^{2}-\sum_{r=1}^{\bar{k}}\tilde{\beta}_{r}^{2}+\theta_{1}^{2}-\sum_{i=2}^{k}\theta_{i}^{2}+||\tilde{V}||^{2}$ where $\tilde{A}=(\tilde{A}_{-},\;\tilde{A}_{+})$ is the Morse variable of the map $\mathcal{J}_{g}:(\partial M)^{k}\setminus F((\partial M)^{k})\longrightarrow\mathbb{R}$ which is defined by the right hand side of (108). Hence a “true“critical point at infinity $x^{\infty}$ of $\mathcal{E}_{g}$ has Morse index at infinity $\mathcal{M}_{\infty}(x^{\infty})=i_{\infty}(x)+\bar{k}$. Similarly, and for the same reasons as above, we have the following analogue of the classical Morse lemma for a ”false“ critical point at infinity. ###### Lemma 3.25. (Morse lemma at infinity near a “false” one) Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80) and $u_{0}:=\sum_{i=1}^{k}\alpha_{i}^{0}\varphi_{a_{i}^{0},\lambda_{i}^{0}}+\sum_{r=1}^{\bar{k}}\beta_{r}^{0}(v_{r}-\overline{(v_{r})}_{(Q,T)})+\bar{w}((\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0}))\in V_{+}(k,\epsilon,\eta)$ (where $\bar{\alpha}^{0}:=(\alpha^{0}_{1},\cdots,\alpha^{0}_{k})$, $A^{0}:=(a_{1}^{0},\cdots,a^{0}_{k})$, $\bar{\lambda}:=(\lambda_{1}^{0},\cdots,\lambda_{k}^{0})$ and $\bar{\beta}^{0}:=(a_{1}^{0},\cdots,\beta_{\bar{k}}^{0})$) with the concentration points $a_{i}^{0}$, the masses $\alpha_{i}^{0}$, the concentrating parameters $\lambda_{i}^{0}$ ($i=1,\cdots,k$) and the negativity parameters $\beta_{r}^{0}$ ($r=1,\cdots,\bar{k}$) satisfying (85) and furthermore $A^{0}\in Crit(\mathcal{F}_{K})$, then there exists an open neighborhood $U$ of $(\bar{\alpha}^{0},A^{0},\bar{\lambda}^{0},\bar{\beta}^{0})$ such that for every $(\bar{\alpha},A,\bar{\lambda},\bar{\beta})\in U$ with $\bar{\alpha}:=(\alpha_{1},\cdots,\alpha_{k})$, $A:=(a_{1},\cdots,a_{k})$, $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$, $\bar{\beta}:=(\beta_{1},\cdots,\beta_{\bar{k}})$, and the $a_{i}$, the $\alpha_{i}$, the $\lambda_{i}$ ($i=1,\cdots,k$) and the $\beta_{r}$ ($r=1,\cdots,\bar{k}$) satisfying (85), and $w$ satisfying (85) with $u=\overline{u}_{(Q,T)}+\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{k}}\beta_{r}(v_{r}-\overline{(v_{r})}_{Q^{n}})+w\in V_{+}(k,\epsilon,\eta)$, we have the existence of a change of variable (111) $\begin{split}&\alpha_{i}\longrightarrow s_{i},i=1,\cdots,k,\\\ &A\longrightarrow\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})\\\ &\lambda_{1}\longrightarrow\theta_{1},\\\ &\tau_{i}\longrightarrow\theta_{i},i=2,\cdots,k,\\\ &\beta_{r}\longrightarrow\tilde{\beta}_{r}\\\ &V\longrightarrow\tilde{V},\end{split}$ such that (112) $\mathcal{E}_{g}(u)=\mathcal{E}_{g}\left(\sum_{i=1}^{k}\alpha_{i}\varphi_{a_{i},\lambda_{i}}+\sum_{r=1}^{\bar{m}}\beta_{r}\left(v_{r}-\overline{(v_{r})}_{(Q,T)}\right)+w\right)=-|\tilde{A}_{-}|^{2}+|\tilde{A}_{+}|^{2}+\sum_{i=1}^{k}s_{i}^{2}-\sum_{r=1}^{\bar{k}}\tilde{\beta}_{r}^{2}-\sum_{i=1}^{k}\theta_{i}^{2}+||\tilde{V}||^{2},$ where $\tilde{A}=(\tilde{A}_{-},\tilde{A}_{+})$ is the Morse variable of the map $\mathcal{J}_{g}:(\partial M)^{k}\setminus F((\partial M)^{k})\longrightarrow\mathbb{R}$ which is defined by the right hand side of (108). Hence a “false“critical point at infinity $y^{\infty}$ of $\mathcal{E}_{g}$ has Morse index at infinity $M_{\infty}(y^{\infty})=i_{\infty}(y)+1+\bar{k}$. ## 4 Proof of existence theorems In this section, we show how the Morse lemma at infinity implies the main existence results via strong Morse type inequalities or Barycenter technique of Bahri-Coron. ### 4.1 Topology of vey high and negative sublevels of $\mathcal{E}_{g}$ We study the topology of very high sublevels of $\mathcal{E}_{g}$ and its every negative ones. We start with the very high sublevels of $\mathcal{E}_{g}$ and first derive the following Lemma. ###### Lemma 4.1. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), then there exists $\hat{C}_{0}^{k}:=\hat{C}^{k}_{0}(\eta)$ such that for every $0<\epsilon\leq\epsilon_{0}$ where $\epsilon_{0}$ is as in (80), there holds $V(k,\epsilon,\eta)\subset(\mathcal{E}_{g})^{\hat{C}_{0}^{k}}-(\mathcal{E}_{g})^{-\hat{C}_{0}^{k}}.$ Proof. It follows directly from (82)-(85), Proposition 3.15, Lemma 3.18, and Lemma 3.21. Next, combining Proposition 3.7 and the latter lemma, we have the following corollary. ###### Corollary 4.2. There exists a large positive constant $\hat{C}_{1}^{k}$ such that $Crit(\mathcal{E}_{g})\subset(\mathcal{E}_{g})^{\hat{C}_{1}^{k}}-(\mathcal{E}_{g})^{-\hat{C}_{1}^{k}}.$ Proof. It follows, via a contradiction argument, from the the fact that $\mathcal{E}_{g}$ is invariant by translation by constants, Proposition 3.7, and Lemma 4.1. Now, we are ready to characterize the topology of very high sublevels of $\mathcal{E}_{g}$. Indeed, as in [1] and for the same reasons, we have that Lemma 3.8, Lemma 4.1 and Corollary 4.2 imply the following one which describes the topology of very high sublevels of the Euler-Lagrange functional $\mathcal{E}_{g}$. ###### Lemma 4.3. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), then there exists a large positive constant $L^{k}:=L^{k}(\eta)$ with $L^{k}>2\max\\{\hat{C}_{0}^{k},\hat{C}_{1}^{k}\\}$ such that for every $L\geq L^{k}$, we have that $(\mathcal{E}_{g})^{L}$ is a deformation retract of $\mathcal{H}_{\frac{\partial}{\partial n}}$, and hence it has the homology of a point, where $\hat{C}^{k}_{0}$ is as in Lemma 4.1 and $\hat{C}^{k}_{1}$ is as in Lemma 4.2. Next, we turn to the study of the topology of very negative sublevels of $\mathcal{E}_{g}$ when $k\geq 2$ or $\bar{k}\geq 1$. Indeed, as in [1] and for the same reasons, we have that the well-know topology of very negative sublevels in the nonresont case (see [44]), Proposition 3.7, Lemma 4.1 and Corollary 4.2 imply the following lemma which gives the homotopy type of the very negative sublevels of the Euler-Lagrange functional $\mathcal{E}_{g}$. ###### Lemma 4.4. Assuming that $k\geq 2$ or $\bar{k}\geq 1$, and $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), then there exists a large positive constant $L_{k,\bar{k}}:=L_{k,\bar{k}}(\eta)$ with $L_{k,\bar{k}}>2\max\\{\hat{C}_{0}^{k},\hat{C}_{1}^{k}\\}$ such that for every $L\geq L_{k,\bar{k}}$, we have that $(\mathcal{E}_{g})^{-L}$ has the same homotopy type as $B_{k-1}(\partial M)$ if $k\geq 2$ and $\bar{k}=0$, as $A_{k-1,\bar{k}}$ if $k\geq 2$ and $\bar{k}\geq 1$ and as $S^{\bar{k}-1}$ if $k=1$ and $\bar{k}\geq 1$, where $\hat{C}^{k}_{0}$ is as in Lemma 4.1 and $\hat{C}^{k}_{1}$ as in Lemma 4.2 . However, as in [46], to prove Theorem 1.8, we need a further information about the topology of very negative sublevels of $\mathcal{E}_{g}$. In order to derive that, we first make some definitions. For $p\in\mathbb{N}^{*}$ and $\lambda>0$, we define $f_{p}(\lambda):B_{p}(\partial M)\longrightarrow\mathcal{H}_{\frac{\partial}{\partial n}}$ as follows (113) $f_{p}(\lambda)(\sum_{i=1}^{p}\alpha_{i}\delta_{a_{i}}):=\sum_{i=1}^{p}\alpha_{i}\varphi_{a_{i},\lambda},\;\;\;\;\sigma=\sum_{i=1}^{p}\alpha_{i}\delta_{a_{i}}\in B_{p}(\partial M),$ with the $\varphi_{a_{i},\lambda}$’s defined by (43). Furthermore, when $\bar{k}\geq 1$, for $\Theta>0$, we define (114) $\Psi_{p,\bar{k}}(\lambda,\Theta):A_{p,\bar{k}}\longrightarrow\mathcal{H}_{\frac{\partial}{\partial n}}$ as follows (115) $\Psi_{p,\bar{k}}(\lambda,\theta)(\sigma,s):=\begin{cases}\varphi_{s}+f_{p}(\lambda)(\sigma)\;\;\;&\text{for}\;\;|s|\leq\frac{1}{4},\;\;\;\sigma\in B_{p}(\partial M),\\\ \varphi_{s}+f_{p}(2\lambda-1+4(1-\lambda)|s|)(\sigma)\;\;\;&\text{for}\;\;\frac{1}{4}\leq|s|\leq\frac{1}{2},\;\;\;\sigma\in B_{p}(\partial M),\\\ \varphi_{s}+2(1-f_{p}(1)(\sigma))|s|+2f_{p}(1)-1\;\;\;&\text{for}\;\;\;|s|\geq\frac{1}{2},\;\;\;\sigma\in B_{p}(\partial M),\end{cases}$ where $\varphi_{s}$ is defined by the following formula (116) $\varphi_{s}=\Theta\sum_{r=1}^{\bar{k}}s_{r}(v_{r}-\overline{(v_{r})}_{(Q,T)}),$ with $s=(s_{1},\cdots,s_{\bar{k}})$. As in [46], concerning the $f_{p}(\lambda)$’s, we have the following estimates. ###### Lemma 4.5. Assuming that $p\in\mathbb{N}^{*}$, then we have 1) If $p<k$, then for every $L>0$, there exists $\lambda^{L}_{p}>0$ such that for all $\lambda\geq\lambda^{L}_{p}$, we have $f_{p}(\lambda)(B_{p}(\partial M))\subset(\mathcal{E}_{g})^{-L}.$ 2) If $p=k$, then there exist $\hat{C}_{k}>0$ and $\lambda_{k}>0$ such that for all $\lambda\geq\lambda_{k}$, we have $f_{k}(\lambda)(B_{k}(\partial M))\subset(\mathcal{E}_{g})^{\hat{C}_{k}}.$ 3) There exists $\hat{C}^{k}>0$ such that up to taking $\;\epsilon_{0}$ smaller, where $\epsilon_{0}$ is given by (80), we have that for every $0<\epsilon\leq\epsilon_{0}$, there holds $V(k,\epsilon)\subset(\mathcal{E}_{g})^{\hat{C}^{k}}.$ Proof. It follows from the same arguments as in the proof of Lemma 3.1 in [46] by using Lemma 5.1, Lemma 5.3 and Lemma 5.6-Lemma 5.8. Still, as in [46], we have the following estimates for the $\Psi_{p}(\lambda,\Theta)$’s when $\bar{k}\geq 1$. ###### Lemma 4.6. Assuming that $p\in\mathbb{N}^{*}$, then we have 1) If $1\leq p<k$, then for every $L>0$, there exists $\lambda^{L}_{p,\bar{k}}>0$ and $\Theta_{p,\bar{k}}^{L}>0$ such that for all $\lambda\geq\lambda^{L}_{p,\bar{k}}$, we have $\Psi_{p,\bar{k}}(\lambda,\Theta_{p,\bar{k}}^{L})(A_{p,\bar{k}})\subset(\mathcal{E}_{g})^{-L}.$ 2) If $p=k$ and $\Theta>0$, then there exists $C_{k,\bar{k}}^{\Theta}>0$, $\lambda_{k,\bar{k}}^{\Theta}>0$, such that for every $\lambda\geq\lambda^{\Theta}_{k,\bar{k}}$, we have $\Psi_{k,\bar{k}}(\lambda,\Theta)(A_{k,\bar{k}})\subset(\mathcal{E}_{g})^{C_{k,\bar{k}}^{\Theta}}.$ 3) If $\Theta>0$ , then there exists $C^{k,\bar{k}}_{\Theta}>0$ such that up to taking $\epsilon_{0}$ smaller, where $\epsilon_{0}$ is given by (80), we have that for every $0<\epsilon\leq\epsilon_{0}$, there holds $V(k,\epsilon,\Theta)\subset(\mathcal{E}_{g})^{C^{k,\bar{k}}_{\Theta}}.$ Proof. It follows from the same arguments as in the proof of Lemma 4.1 in [46] by using Lemma 4.5. On the other hand, as in [46], Lemma 4.4 and Lemma 4.5 imply the following one: ###### Lemma 4.7. Assuming that $k\geq 2$, $\bar{k}=0$, and $L\geq L_{k.0}$, then there exists $\lambda^{L}_{k-1}$ such that for all ;$\lambda\geq\lambda^{L}_{k-1}$, we have $f_{k-1}(\lambda):B_{k-1}(\partial M)\longrightarrow(\mathcal{E}_{g})^{-L}$ is well defined and induces an isomorphism in homology. Furthermore, still as in [46], we have also that Lemma 4.4 and Lemma 4.5 imply the following one: ###### Lemma 4.8. Assuming that $k\geq 2$, $\bar{k}\geq 1$, $L\geq L_{k,,\bar{k}}$, then there exists $\lambda^{L}_{k-1,\bar{k}}>0$ and $\Theta_{k-1,\bar{k}}^{L}>0$ such that for all $\lambda\geq\lambda^{L}_{k-1,\bar{k}}$, we have $\Psi_{k-1,\bar{k}}(\lambda,\Theta_{k-1,\bar{k}}^{L}):A_{k-1,\bar{k}}\longrightarrow(\mathcal{E}_{g})^{-L}$ is well defined and induces an isomorphism in homology. ### 4.2 Morse theoretical type results Proof of Theorem 1.1-Theorem 1.7 The proof is the same as the one of Theorem 1.1-Theorem 1.6 in [1] by using Lemma 3.8, Proposition 3.22, Corollary 3.23, Lemma 3.24, Lemma 4.1, Corollary 4.2, Lemma 4.3, and Lemma 4.4 combined with the works of Bahri-Rabinowitz[12], Karell-Karoui[34] and Malchiodi[39]. ### 4.3 Algebraic topological type results In order to carry the algebraic topological argument for existence, as in [46], we need the following lemma. ###### Lemma 4.9. Assuming that $(ND)$ holds, $s_{k}^{*}(O^{*}_{\partial M})\neq 0$ in $H^{3}(S^{\infty})$ and $s_{k}^{*}(O^{*}_{\partial M})=0$ in $H^{3}(S_{+}^{\infty}\cup S_{-}^{\infty})$, then there exists $0\neq\tilde{O}^{*}_{\partial M}\in H^{3}(S)$ such that $i^{*}(\tilde{O}^{*}_{\partial M})=s_{k}^{*}(O^{*}_{\partial M}),$ where $i:S^{\infty}\longrightarrow S$ is the canonical injection. Proof. It follows from the same arguments as in the proof of Lemma 3.6 in [46] by using the analysis of Section 3. Proof of Theorem 1.8 The proof is the same as the one Theorem in [46] by using the algebraic topological tools (52)-(54), characterization of the critical points at infinity of $\mathcal{E}_{g}$ established in Section 3, and Lemma 4.9. ## 5 Appendix ###### Lemma 5.1. Assuming that $\epsilon$ is positive and small, $a\in\partial M$ and $\lambda\geq\frac{1}{\epsilon}$, then 1) $\varphi_{a,\lambda}(\cdot)=\hat{\delta}_{a,\lambda}(\cdot)+\log\frac{\lambda}{2}+H(a,\cdot)+\frac{1}{2\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\;\text{on}\;\;\;\partial M$ 2) $\lambda\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial\lambda}=\frac{2}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(a,\cdot))}-\frac{1}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\;\text{on}\;\;\;\partial M,$ 3) $\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial a}=\frac{\chi_{\varrho}(d_{\hat{g}_{a}}(a,\cdot))\chi_{\varrho}^{{}^{\prime}}((d_{\hat{g}_{a}}(a,\cdot))}{d_{\hat{g}_{a}}(a,\cdot)}\frac{2\lambda exp_{a}^{-1}(\cdot)}{1+\lambda^{2}\chi_{\varrho}^{2}(d_{\hat{g}_{a}}(a,\cdot))}+\frac{1}{\lambda}\frac{\partial H(a,\cdot)}{\partial a}+O\left(\frac{1}{\lambda^{3}}\right);\;\;\text{on}\;\;\;\partial M,$ where $O(1)$ means $O_{a,\lambda,\epsilon}(1)$ and for it meaning see Section 2. ###### Lemma 5.2. Assuming that $\epsilon$ is small and d positive, $a\in M$, $\lambda\geq\frac{1}{\epsilon}$, and $0<2\eta<\varrho$ with $\varrho$ as in (41), then there holds $\varphi_{a,\lambda}(\cdot)=G(a,\cdot)+\frac{1}{2\lambda^{2}}\Delta_{\hat{g}_{a}}G(a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial M\setminus B^{a}_{a}(\eta),$ $\lambda\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial\lambda}=-\frac{1}{\lambda^{2}}\Delta_{\hat{g}_{a}}G_{(}a,\cdot)+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial M\setminus B^{a}_{a}(\eta),$ and $\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}(\cdot)}{\partial a}=\frac{1}{\lambda}\frac{\partial G(a,\cdot)}{\partial a}+O\left(\frac{1}{\lambda^{3}}\right)\;\;\text{on}\;\;\;\partial M\setminus B^{a}_{a}(\eta),$ where $O(1)$ means $O_{a,\lambda,\epsilon}(1)$ and for it meaning see Section 2. ###### Lemma 5.3. Assuming that $\epsilon$ is small and positive, $a\in\partial M$ and $\lambda\geq\frac{1}{\epsilon}$, then there holds $\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\varphi_{a,\lambda}\right)=16\pi^{2}\log\lambda-8\pi^{2}C_{0}+8\pi^{2}H(a,a)+\frac{8\pi^{2}}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,a)+O\left(\frac{1}{\lambda^{3}}\right),$ $\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\lambda\frac{\varphi_{a,\lambda}}{\partial\lambda}\right)=8\pi^{2}-\frac{8\pi^{2}}{\lambda^{2}}\Delta_{\hat{g}_{a}}H(a,a)+O\left(\frac{1}{\lambda^{3}}\right),$ $\mathbb{P}_{g}^{4,3}\left(\varphi_{a,\lambda},\;\frac{1}{\lambda}\frac{\varphi_{a,\lambda}}{\partial a}\right)=\frac{8\pi^{2}}{\lambda}\frac{\partial H(a,a)}{\partial a}+O\left(\frac{1}{\lambda^{3}}\right),$ where $C_{0}$ is a positive constant depending only on $n$, $O(1)$ means $O_{a,\lambda,\epsilon}(1)$ and for its meaning see Section 2. ###### Lemma 5.4. Assuming that $\epsilon$ is small and positive $a_{i},a_{j}\in\partial M$, $d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta$, $0<2\eta<\varrho$, $\frac{1}{\Lambda}\leq\frac{\lambda_{i}}{\lambda_{j}}\leq\Lambda$, and $\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$, $\overline{C}$ as in (39), and $\varrho$ as in (41), then there hold $\begin{split}\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\varphi_{a_{j},\lambda_{j}}\right)=&8\pi^{2}G(a_{j},a_{i})+\frac{4\pi^{2}}{\lambda_{i}^{2}}\Delta_{\hat{g}_{a_{i}}}G(a_{i},a_{j})+\frac{4\pi^{2}}{\lambda_{j}^{2}}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})\\\ &+O\left(\frac{1}{\lambda^{3}_{i}}+\frac{1}{\lambda_{j}^{3}}\right),\end{split}$ $\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\lambda_{j}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial\lambda_{j}}\right)=-\frac{8\pi^{2}}{\lambda_{j}^{2}}\Delta_{\hat{g}_{a_{j}}}G(a_{j},a_{i})+O\left(\frac{1}{\lambda^{3}_{j}}\right),$ and $\mathbb{P}_{g}^{4,3}\left(\varphi_{a_{i},\lambda_{i}},\;\frac{1}{\lambda_{j}}\frac{\partial\varphi_{a_{j},\lambda_{j}}}{\partial a_{j}}\right)=\frac{8\pi^{2}}{\lambda_{j}}\frac{\partial G(a_{j},a_{i})}{\partial a_{j}}+O\left(\frac{1}{\lambda^{3}_{j}}\right),$ where $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$ with $A=(a_{i},a_{j})$ and $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the meaning of $O_{A,\bar{\lambda},\epsilon}(1)$, see Section 2. ###### Lemma 5.5. Assuming that $\epsilon>0$ is very small, we have that for $a\in\partial M$, $\lambda\geq\frac{1}{\epsilon}$, there holds (117) $||\lambda\frac{\partial\varphi_{a,\lambda}}{\partial\lambda}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$ (118) $||\frac{1}{\lambda}\frac{\partial\varphi_{a,\lambda}}{\partial a}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$ and (119) $||\frac{1}{\sqrt{\log\lambda}}\varphi_{a,\lambda}||_{\mathbb{P}^{4,3}}=\tilde{O}(1),$ where here $\tilde{O}(1)$ means bounded by positive constants form below and above independent of $\epsilon$, $a$, and $\lambda$. ###### Lemma 5.6. 1) If $\epsilon$ is small and positive, $a\in\partial M$, $p\in\mathbb{N}^{*}$, and $\lambda\geq\frac{1}{\epsilon}$ , then there holds (120) $C^{-1}\lambda^{6p-3}\leq\oint_{\partial M}e^{3p\varphi_{a,\lambda}}dS_{g}\leq C\lambda^{6p-3},$ where $C$ is independent of $a$, $\lambda$, and $\epsilon$. 2) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$, $\lambda\geq\frac{1}{\epsilon}$ and $\lambda d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then we have (121) $\mathbb{P}_{g}^{4,3}(\varphi_{a_{i},\lambda},\;\varphi_{a_{j},\lambda})\,\leq\,8\pi^{2}G(a_{i},a_{j})\,+\,O(1),$ where $O(1)$ means here $O_{A,\lambda,\epsilon}(1)$ with $A=(a_{i},a_{j})$, and for the meaning of $O_{A,\lambda,\epsilon}(1)$, see Section 2. 3) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$, $\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$, $\frac{1}{\Lambda}\leq\frac{\Lambda_{i}}{\lambda_{j}}\leq\Lambda$ and $\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then we have (122) $\mathbb{P}_{g}^{4,3}(\varphi_{a_{i},\lambda},\;\varphi_{a_{j},\lambda})\,\leq\,8\pi^{2}G(a_{i},a_{j})\,+\,O(1),$ where $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$ with $A=(a_{i},a_{j})$ and $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the meaning of $O_{A,\bar{\lambda},\epsilon}(1)$, see Section 2. ###### Lemma 5.7. Let $p\in\mathbb{N}^{*}$, $\hat{R}$ be a large positive constant, $\epsilon$ be a small positive number, $\alpha_{i}\geq 0$, $i=1,\cdots,p$, $\sum_{i=1}^{p}\alpha_{i}=k$, $\lambda\geq\frac{1}{\epsilon}$ and $u=\sum_{i=1}^{p}\alpha_{i}\varphi_{a_{i},\lambda}$. Assuming that there exist two positive integer $i,j\in\\{1,\cdots,p\\}$ with $i\neq j$ such that $\lambda d_{\hat{g}}(a_{i},a_{j})\leq\frac{\hat{R}}{4\overline{C}}$, where $\overline{C}$ is as in (39), then we have (123) $\mathcal{E}_{g}(u)\,\leq\mathcal{E}_{g}(v)\,+\,O(\log\hat{R}),$ with $v:=\sum_{k\leq p,k\neq i,j}\alpha_{k}\varphi_{a_{k},\lambda}\,+(\alpha_{i}+\alpha_{j})\varphi_{a_{i},\lambda}.$ where here $O(1)$ stand for $O_{{\bar{\alpha}},A,\lambda,\epsilon}(1)$, with ${\bar{\alpha}}=(\alpha_{1},\cdots,\alpha_{p})$ and $A=(a_{1},\cdots,a_{p})$, and for the meaning of $O_{{\bar{\alpha}},A,\lambda,\epsilon}(1)$, we refer the reader to Section 2. ###### Lemma 5.8. 1) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$, $\lambda\geq\frac{1}{\epsilon}$ and $\lambda d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then $\varphi_{a_{j},\lambda}(\cdot)=G(a_{j},\cdot)+O(1)\;\;\;\text{in}\;\;B^{a_{i}}_{a_{i}}(\frac{R}{\lambda}),$ where here $O(1)$ means here $O_{A,\lambda,\epsilon}(1)$, with $A=(a_{i},a_{j})$, and for the meaning of $O_{A,\lambda,\epsilon}(1)$, see Section 2. 2) If $\epsilon$ is positive and small, $a_{i},a_{j}\in\partial M$, $\lambda_{i},\lambda_{j}\geq\frac{1}{\epsilon}$, $\frac{1}{\Lambda}\leq\frac{\Lambda_{i}}{\lambda_{j}}\leq\Lambda$, and $\lambda_{i}d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}R$, then $\varphi_{a_{j},\lambda_{j}}(\cdot)=G(a_{j},\cdot)+O(1)\;\;\;\text{in}\;\;B^{a_{i}}_{a_{i}}(\frac{R}{\lambda_{i}}),$ where here $O(1)$ means here $O_{A,\bar{\lambda},\epsilon}(1)$, with $A=(a_{i},a_{j})$, $\bar{\lambda}=(\lambda_{i},\lambda_{j})$ and for the meaning of $O_{A,\lambda,\epsilon}(1)$, see Section 2. ###### Lemma 5.9. There exists $\Gamma_{0}$ and $\tilde{\Lambda}_{0}$ two large positive constant such that for every $a\in\partial M$, $\lambda\geq\tilde{\Lambda}_{0}$, and $w\in F_{a,\lambda}:=\\{w\in\mathcal{H}_{\frac{\partial}{\partial n}},\overline{w}_{(Q,T)}=\left\langle\varphi_{a,\lambda},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,\;r=1\cdots,\bar{k}\\}$, we have (124) $\oint_{\partial M}e^{3\hat{\delta}_{a,\lambda}}w^{2}dV_{g_{a}}\leq\Gamma_{0}||w||^{2}_{\mathbb{P}^{4,3}}.$ ###### Lemma 5.10. Assuming that $\eta$ is a small positive real number with $0<2\eta<\varrho$ where $\varrho$ is as in (41), then there exists a small positive constant $c_{0}:=c_{0}(\eta)$ and $\Lambda_{0}:=\Lambda_{0}(\eta)$ such that for every $a_{i}\in\partial M$ concentrations points with $d_{\hat{g}}(a_{i},a_{j})\geq 4\overline{C}\eta$ where $\bar{C}$ is as in (39), for every $\lambda_{i}>0$ concentrations parameters satisfying $\lambda_{i}\geq\Lambda_{0}$, with $i=1,\cdots,k$, and for every $w\in E_{A,\bar{\lambda}}^{*}=\cap_{i=1}^{k}E^{*}_{a_{i},\lambda_{i}}$ with $A:=(a_{1},\cdots,a_{k}$), $\bar{\lambda}:=(\lambda_{1},\cdots,\lambda_{k})$ and $E^{*}_{a_{i},\lambda_{i}}=\\{w\in\mathcal{H}_{\frac{\partial}{\partial n}}:\;\;\left\langle\varphi_{a_{i},\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial\lambda_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\left\langle\frac{\partial\varphi_{a_{i},\lambda_{i}}}{\partial a_{i}},w\right\rangle_{\mathbb{P}^{4,3}}=\overline{w}_{(Q,T)}=\left\langle v_{r},w\right\rangle_{\mathbb{P}^{4,3}}=0,\;r=1\cdots,\bar{k}=0\\}$, there holds (125) $||w||^{2}_{\mathbb{P}^{4,3}}-6\sum_{i=1}^{k}\oint_{\partial M}e^{3\hat{\delta}_{a_{i},\lambda_{i}}}w^{2}dS_{g_{a_{i}}}\geq c_{0}||w||^{2}_{\mathbb{P}^{4,3}}.$ ## References * [1] Ahmedou M., Ndiaye C. B Morse theory and the resonant $Q$-curvature problem, Preprint: arxiv:.1409.7919. * [2] Ahmedou, M., Kallel S., Ndiaye, C. B., The resonant boundary Q-curvature problem and boundary-weighted barycenters. Preprint: arXiv:1604.03745. * [3] Aubin T., Some nonlinear problems in Riemannian geometry, Springer Monographs in Mathematics, Springer-Verlag, Berlin 1998. * [4] Aubin T, Bahri A., Methods of algebraic topology for the problem of prescribed scalar curvature. J. Math. Pures Appl. (9) 76 (1997), no. 6, 525-549. * [5] Aubin T., Bahri A., A topological hypothesis for the problem of prescribed scalar curvature. J. Math. Pures Appl. (9) 76 (1997), no. 10, 843-850. * [6] Bahri A., Critical points at infinity in some variational problems, Research Notes in Mathematics, 182, Longman-Pitman, London, 1989. * [7] Bahri A., Un problème variationel sans compacité dans la géométrie de contact, Comptes Rendus Mathématique Académie des Sciences, Paris, Série I 299 (1984) 754-760. * [8] Bahri A., Pseudo-orbits of Contact Forms, Pitman Research Notes in Mathematics Series, 173. Longman Scientific & Technical, Harlow, 1988. * [9] Bahri A., An invariant for Yamabe-type flows with applications to scalar-curvature problems in high dimension. A celebration of John F. Nash, Jr. Duke Math. J. 81 (1996), no. 2, 323-466. * [10] Bahri A., Brezis H., Equations elliptiques non linéaires sur des variétés avec exposant de Sobolev critique. C. R. Acad. Sci. Paris Sér. I Math. 307 (1988), no. 11, 573–576. * [11] Bahri A., Coron J.M., On a nonlinear elliptic equation involving the critical Sobolev exponent: the effect of the topology of the domain, Comm. Pure Appl. Math. 41-3 (1988), 253-294. * [12] Bahri A., and Rabinowitz P., Periodic solutions of Hamiltonian systems of $3$-body, Ann. Inst. Poincaré, Anal. non linéaire 8(1991), 561-649. * [13] Bahri, A., Coron, J.M., On a nonlinear elliptic equation involving the critical Sobolev exponent: the effect of the topology of the domain, Comm. Pure Appl. Math. 41-3 (1988),-294. * [14] Branson T.P., Oersted., Explicit functional determinants in four dimensions, Proc. Amer. Math. Soc 113-3(1991), 669-682. * [15] Bredon G.E., Topology and geometry, Graduate Texts in Mathematics, 139, 1997. cand., 57-2 (1995), 293-345. * [16] Brendle S., Curvature flows on surfaces with boundary, Math. Ann. 324 (2002), no. 3, 491-519. * [17] Brendle S., A family of curvature flows on surfaces with boundary, Math. Z. 241, 829-869 (2002). * [18] Brendle S., A generalization of the Yamabe flow for manifolds with boundary. Asian J. Math. 6 (2002), no. 4, 625–644. * [19] Brendle S., Convergence of the Yamabe flow for arbitrary initial energy, J. Diff. Geom. 69 (2005),217-278. * [20] Brendle S., Chen S. Z., An existence theorem for the Yamabe problem on manifolds with boundary. J. Eur. Math. Soc. (JEMS) 16 (2014), no. 5, 991-1016. * [21] Catino G., Ndiaye C. B., Integral pinching results for manifolds with boundary, Ann. Sc. Norm. Super. Pisa Cl. Sci. 9 (2010), 785-813. * [22] Chang S.Y.A., Qing J.,., Yang P.C.,Compactification of a class of conformally flat $4$-manifold, Invent. Math. 142-1(2000), 65-93. * [23] Chang S.Y.A., Qing J.,The Zeta Functional Determinants on manifolds with boundary 1. The Formula, Journal of Functional Analysis 147, 327-362 (1997) * [24] Chang S.Y.A., Qing J.,The Zeta Functional Determinants on manifolds with boundary II. Extremal Metrics and Compactness of Isospectral Set, Journal of Functional Analysis 147, 363-399 (1997) * [25] Chang S.Y.A., Qing J.,., Yang P.C.,On the Chern-Gauss-Bonnet integral for conformal metrics on ${\bf R}^{4}$, Duke Math. J.03-3(2000),523-544. * [26] Chen C. C., Lin C. S, Topological degree for a mean field equation on Riemann surfaces, Comm. Pure, Appl. Math, 56-12 (2003), 1667-1727. * [27] Chen, S.S., Conformal deformation on manifolds with boundary, Geom. Funct. Anal. 19 (2009), no. 4, 1029–1064. * [28] Dold A., Algebraic topology, Lectures on algebraic topology. Reprint of the 1972 edition. Classics in Mathematics. Springer-Verlag, Berlin, 1995. xii+377 pp. ISBN: 3-540-58660-1 55-02 (01A75). * [29] Djadli Z., Malchiodi A., Existence of conformal metrics with constant $Q$-curvature, Ann. of Math. (2) 168 (2008), no. 3, 813–858. * [30] Druet O., Robert F., Bubbling phenomena for fourth-order four-dimensional PDEs with exponential growth, Proc. Amer. Math. Soc 134(2006) no. 3, 897-908. * [31] Escobar J.F., The Yamabe problem on manifolds with boundary, Journal Differential Geometry 35 (1992) no.1, 21-84. * [32] Gilbar D., Trudinger N., Elliptic Partial Differential Equations of Second Order, 2nd edition, Springr-Verlag, 1983. * [33] Günther M., Conformal normal coordinates, Ann. Global. Anal. Geom. 11 (1993), 173-184. * [34] Kallel S., Karoui R., Symmetric joins and weighted barycenters, Advanced Nonlinear Studies, 11(2011), 117–143. * [35] Lee J., Parker T., The Yamabe problem, Bull. A.M.S. 17 (1987),37-81. * [36] Lin C. S., Wei J., Sharp estimates for bubbling solutions of a fourth order mean field equation, Ann. Sc. Norm. Super. Pisa Cl. Sci. (5) 6 (2007), no. 4, 599-630. * [37] Lucia M., A deformation lemma with an application to a mean field equation. Topol. Methods Nonlinear Anal. 30 (2007), no. 1, 113–138. * [38] Lucia M., Orák J., A minimax theorem in the presence of unbounded Palais-Smale sequences, Israel J. Math. 172 (2009). * [39] Malchiodi A., Morse theory and a scalar field equation on compact surfaces, Adv. Diff. Eq., 13 (2008), 1109-1129. * [40] Malchiodi A., Compactness of solutions to some geometric fourth-order equations, J. Reine Angew. Math. 594 (2006), 137–174. * [41] Marques F. C., Existence results for the Yamabe problem on manifolds with boundary, Indiana Univ. Math. J. (2005), 1599-1620. * [42] Ndiaye C. B., Constant $Q$-curvature metrics in arbitrary dimension, J. Funct. Anal. 251 (2007), no. 1, 1–58. 53. * [43] Ndiaye C.B., Conformal metrics with constant $Q$-curvature for manifolds with boundary, Comm. Anal. Geom. 16 (2008), no. 5, 1049–1124. * [44] Ndiaye C.B., Constant $T$-curvature conformal metric on 4-manifolds with boundary, Pacific J. Math. 240 (2009), no. 1, 151-184. * [45] Ndiaye C. B., $Q$-curvature flow on manifolds with boundary, Math. Z. 269 (2011), 83-114. . * [46] Ndiaye C. B., Algebraic topological methods for the supercritical Q-curvature problem. Adv. Math, 277, 277, pp 56–99, 2015. * [47] Ndiaye C. B., Topological methods for the resonant Q-curvature problem in arbitrary even dimension, Journal of Geometry and Physics, Volume 140, June 2019, Pages 178-213. * [48] Ndiaye C. B., Xiao J, An upper bound of the total $Q$-curvature and its isoperimetric deficit for higher-dimensional conformal Euclidean metrics, Calc. Var. Partial Differential Equations, 38, no. 1-2, 1–27, 2010. * [49] Paneitz S., A quartic conformally covariant differential operator for arbitrary pseudo-Riemannian manifolds, preprint, 1983. * [50] Osgood B., Phillips R., Sarnak P., Extremal of determinants of Laplacians. J. Funct. Anal, 80, 148-211 (1988). * [51] Weinstein G., Zhang L., The profile of bubbling solutions of a class of fourth order geometric equations on 4-manifolds, J. Funct. Anal. 257 (2009), no. 12, 3895–3929
arxiv-papers
2021-07-27T05:23:40
2024-09-04T03:07:20.644387
{ "license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/", "authors": "Cheikh Birahim Ndiaye", "submitter": "Cheikh Birahim Ndiaye", "url": "https://arxiv.org/abs/2107.12608" }
2107.12611
# Balancing Asymmetric Dark Matter with Baryon Asymmetry by Sphaleron Transitions***Presented at the 1st Electronic Conference on Universe, 22–28 February 2021; Available online: https://ecu2021.sciforum.net/. Arnab Chaudhuria†††e-mail: [email protected], Maxim Yu. Khlopovb‡‡‡e-mail: [email protected], a Novosibirsk State University Pirogova ul., 2, 630090 Novosibirsk, Russia b Institute of Physics, Southern Federal University Stachki 194 Rostov on Don 344090, Russia and Université de Paris, CNRS, Astroparticule et Cosmologie, F-75013 Paris, France and National Research Nuclear University "MEPHI", Moscow 115409, Russia ###### Abstract The effect of the electroweak sphaleron transition in balance between baryon excess and and the excess of stable quarks of 4th generation is studied in this paper. Considering the non-violation of $SU(2)$ symmetry and the conservation of electroweak and new charges and quantum numbers of the new family, it makes possible sphaleron transitions between baryons, leptons and 4th family of leptons and quarks. In this paper, we have tried to established a possible definite relationship between the value and sign of the 4th family excess relative to baryon asymmetry. If $U$-type quarks are the lightest quarks of the 4th family and sphaleron transitions provide excessive $\bar{U}$ antiquarks, asymmetric dark matter in the form of dark atom bound state of ($\bar{U}\bar{U}\bar{U}$) with primordial He nuclei is balanced with baryon asymmetry. ## 1 Introduction SPHALERON (or electroweak sphaleron) [1] and [2] is a static (time- independent) solution to the electroweak field equations of the Standard Model of the particle physics. It is involved in certain hypothetical processes that violate baryon and lepton numbers. Such process cannot be represented by perturbative methods (like Feynman Diagrams) and hence termed as non perturbative. It is possible for a sphaleron to convert baryons into antileptons and antibaryons to leptons and thus violate the baryon number. If the density of the sphaleron at some point high enough, they could wipe out any net excess of baryons or anti-baryons. Sphalerons are also associated with saddle points. It can be interpreted as the peak energy configuration. It is shown in [3, 4] that because of this anomaly transition between vacua are associated with a violation of Baryon (and lepton) numbers. Even though a baryon excess can be created at the time of electroweak symmetry breaking, it is preserved if the process happened through first order phase transition. In second order phase transition, sphalerons can wipe out the entire asymmetry created but in first order, only the asymmetry created in the unbroken phase is wiped out. The cosmological dark matter may contain dark atoms, in which new stable charged particles are bound by ordinary Coulomb interaction, see [5, 6, 7, 8, 9]. Many models can exists in which heave $-2$ charged stable species are predicted: 1\. AC-leptons, predicted in the extension of standard model, based on the approach of almost-commutative geometry, see [10, Author2(year), 11, 12]. 2\. Technileptons and anti-technibaryons in the framework of walking technicolor models (WTC), see [13, 14, 15, 16, 17, 18]. 3\. and, finally, stable ”heavy quark clusters” ($\bar{U}\bar{U}\bar{U}$) formed by anti-U quark of 4th generation, see [19, 20, 21]. All these models also predict corresponding +2 charge particles. If these positively charged particles remain free in the early Universe, they can recombine with ordinary electrons in anomalous helium, which is strongly constrained in the terrestrial matter. Therefore cosmological scenario should provide a mechanism, which suppresses anomalous helium. There are two ways this can be done: 1\. The abundance of anomalous helium in the Galaxy may be significant, but in the terrestrial matter there exists a recombination mechanism suppressing this abundance below experimental upper limits. The existence of a new strict U(1) gauge symmetry, causing new Coulomb like long range interaction between charged dark matter particles, is crucial for this mechanism. Therefore the existence of dark radiation in the form of hidden photons is inevitable in this approach. 2\. Free positively charged particles are already suppressed in the early Universe and the abundance of anomalous helium in the Galaxy is negligible. Dark matter production and the detailed study of sphaleron transition due to walking technicolor model has already been conducted, see [17]. In this paper, we consider 4th generation of particle family with a stable quark and neutrino family and study the sphaleron transition during electroweak phase transition. We consider the simplest model which is charge neutral and all the particles are stable. We also consider the simplest second order phase tranistion. Other complicated process such as annihilation of unstable particles and first order phase tranistion are beyond the scope of this paper. ## 2 Calculations and Discussions The main scope of our current activity is to deduce the relationship between baryon excess and excess of stable fermions of 4th family. We can take for definiteness that 4th neutrino and U-quark of 4th family are stable and establish the relationship between their excess and excess of baryons and leptons by sphaleron transitions. The aim is to find conditions at which observed baryon excess corresponds to such an excess of $\bar{U}$ that explains observed dark matter by $(\bar{U}\bar{U}\bar{U})He$ atoms. Three elementary particle frames are established and we are interested in the frame of a heavy quark and a heavy neutrino (neutrino with half the mass of Z boson). A Dark matter model can be proposed which can arise from this model if the baryon asymmetric universe with normal baryon also contains stable antiquarks $\bar{U}$ of 4th generation. Owing to the $\bar{{U}}$ excess only $-2$ charge or neutral hadrons are present in the universe and ${}^{4}He$ after it is formed in Big Bang nucleosynthesis completely screens $Q^{--}$ charged hadrons in composite $[^{4}HeQ^{--}]$ “atoms”. These neutral primordial nuclear interacting objects saturate the modern DM density and play an important role of the non-trivial form of the strongly interacting dark matter. In the given scenario with electric charge $q=2/3$, the direct experimental lower limit for stable $U$-type quark is $m_{U}>220$ GeV. The stronger lower limit can be estimated as $m_{U}g_{\star\epsilon}1$ TeV from search for R-hadrons, which have similar features as single $U$ ($\bar{U}$) hadrons. Due to the large chromo-Coulomb binding energy bound states for both particles and antiparticles are formed (both doublets and triplets). Even though accelerator physics excludes the formation of these bound states but they can be formed in the early universe and strongly influence the evolution of the 4th generation hadrons. In the early universe an antibaryon asymmetry for the 4th generation of quarks can be generated so that it might form a certain fraction of dark matter. It might correspond to the modern dark matter density. If $\epsilon(<1)$ is the fraction of dark matter then from observational data we have $\Omega_{B}+\epsilon(1+\Omega_{DM})\approx 0.3$ which leads to $\epsilon\approx(0.3-\Omega_{B})/\Omega_{DM}$. Introducing entropy density $s$ such that $r_{b}=n_{B}/s$ and $r_{\bar{U}}=n_{\bar{U}}/s$ it is obtained that $r_{b}\sim 8*10^{-11}$ and $r_{\bar{U}}$ corresponds to the ${\bar{U}}$ excess and is a function of $\epsilon$. A new point to note: If new stable species belong to non-trivial representation of electroweak $SU(2)$ group, sphaleron transition at high temperature can provide a relationship between baryon asymmetry and excess of ‘-2 charged’ stable species. If 4th family follows from string phenomenology, we have new charge associated with 4th family fermions (which follows from rank 6 of E6 group, embedding symmetry of the Standard model with rank 4) and this charge F should be used instead of technibaryon number TB and technilepton number L’. In principle there should be evidently only one conserved number F for the 4th family, however, it may be easier to have analogy with WTC and assume two numbers FB (for 4th quark) and L’ for (4th neutrino). Detailed calculations of WTC have been done in [11, 17] and most of the terminology are kept same as the above mentioned papers. At some energy scale higher than the electroweak one, we assume the existence of a mechanism leading to a 4th asymmetry in the Universe. Given that the 4th and baryon number have a very similar nature such an asymmetry is very plausible and can have a common origin. The asymmetry generated by 4th generation above electroweak phase transition can be destroyed by quantum anomalies. However, baryon, lepton and 4th number are not conserved even though their differences are conserved. This fact allows for a nonzero asymmetry to survive. The processes leading to such a violation are termed “sphaleron” processes and at the present time are negligible. However these processes were active during the time the Universe had a temperature above or at the scale of the electroweak symmetry breaking. At some points when as the Universe expands and its temperature falls the quantum number violation ceases the effect. The relation among the particles emerging from the process (SM + 4th generation): $3(\mu_{u_{L}}+\mu_{d_{L}})+\mu+\mu_{U_{L}}+\mu_{D_{L}}+\mu_{L^{\prime}}=0$ (1) $\mu$ is chemical potential summed over all standard model leptons and $\mu_{L^{\prime}}$ is the new generation leptons (and neutrinos). $\mu_{U_{L}}$ and $\mu_{D_{L}}$ are the chemical potential for the 4th generation quarks. For detailed calculations and breakdown of each parameter, see [17]. The number density follows, for fermions and bosons, respectively, the general expression: $n=g_{*}T^{3}\frac{\mu}{T}f(\frac{m}{T})$ (2) and $n=g_{*}T^{3}\frac{\mu}{T}g(\frac{m}{T})$ (3) where $f$ and $g$ are hyperbolic functions and $g_{*}$ is the effective degrees of freedom. They are given by: $f(z)=\frac{1}{4\pi^{2}}\int_{0}^{\infty}x^{2}cosh^{-2}\left(\frac{1}{2}\sqrt{z^{2}+x^{2}}\right)dx$ (4) and $g(z)=\frac{1}{4\pi^{2}}\int_{0}^{\infty}x^{2}sinh^{-2}\left(\frac{1}{2}\sqrt{z^{2}+x^{2}}\right)dx$ (5) The Baryon number density is defined as the following: $B=\frac{n_{B}-n_{\bar{B}}}{gT^{2}/6}$ (6) This normalization is used thorough out and since in the end the ratio is of interest, this normalization cancels out. Defining the parameter $\sigma$, respectively, for fermions and bosons: $\sigma=6f\frac{m}{T^{*}}$ (7) and $\sigma=6g\frac{m}{T^{*}}$ (8) where $T^{*}$ is the phase transition temperature and is given by the following expression: $T^{*}=\frac{2M_{W}(T^{*})}{\alpha_{W}ln(M_{pl}/T^{*})}B(\frac{\lambda}{\alpha_{W}})$ (9) where $M_{W}$ is the mass of W-boson, $M_{pl}$ is the Planck mass and $\lambda$ is the self-coupling. The function $B$ is derived from experiment and takes the value from 1.5 to 2.7. The new generation charge is calculated to be: $FB=\frac{2}{3}(\sigma_{U_{L}}\mu_{U_{L}}+\sigma_{U_{L}}\mu_{D_{L}}+\sigma_{D_{L}}\mu_{D_{L}}).$ (10) where $FB$ corresponds to the anti-U ($\bar{U}$) excess. The standard model baryonic charge and leptonic charges are given by the following expression: $B=\left[(2+\sigma_{t})(\mu_{uL}+\mu_{uR})+3(\mu_{dL}+\mu_{dR})\right]$ (11) and $L=4\mu+6\mu_{W}$ (12) where in Equation (11) the factor 3 of the down-type quarks is the number of families. For the new lepton family, originating from 4th generation, we have: $L^{\prime}=2(\sigma_{\nu^{\prime}}+\sigma_{U_{L}})\mu_{\nu^{\prime}L}+2\sigma_{U_{L}}\mu_{W}+(\sigma_{\nu^{\prime}}-\sigma_{U_{L}})\mu_{0}$ (13) where $\nu^{\prime}$ is the new family of neutrinos originating from the extension of standard model and $\mu_{0}$ is the chemical potential from the Higgs sector in standard model. In a second order phase transition we expect the violating processes to persist below the phase transition and the equilibrium conditions are imposed after the phase transition. If the phase diagram as function of temperature and density of the 4th generation would be known a specific order of the electroweak phase transition would be used. The ratio of the number densities of 4th generation to the baryons is determined by: $\frac{\Omega_{FB}}{\Omega_{B}}=\frac{3}{2}\frac{FB}{B}\frac{m_{FB}}{m_{p}}$ (14) For second order phase transition, the electrical neutrality and zero chemical potential of the Higgs. The ratio of the number density of number density of the 4th generation to the baryon number density can be expressed as a function of $L/B$ and $L^{\prime}/B$. In the limiting case, we get: $-\frac{FB}{B}=\frac{\sigma_{U_{L}}}{3(18+\sigma_{\nu^{\prime}})}\left[(17+\sigma_{\nu^{\prime}})+\frac{(21+\sigma_{\nu^{\prime}})}{3}\frac{L}{B}+\frac{2}{3}\frac{9+5\sigma_{\nu^{\prime}}}{\sigma_{\nu^{\prime}}}\frac{L^{\prime}}{B}\right].$ (15) Hence a possible relationship between the baryon excess and the excess of $\bar{U}$ has been established in the framework of second order electroweak phase transition. ## 3 Conclusions It is clear from Equation (15) that a definite relationship between the value and sign of 4th generation family excess relative to the baryon asymmetry due to electroweak phase transition and possible sphaleron production has been established. Dark matter candidates in the form of bounded dark atom can emerge from this model due to the excess of $\bar{U}$ within primordial He nuclei. We have considered only the lightest and most stable particles and also took into account only the second order phase transition. The situation can change more drastically if unstable particle and first order phase transition were taken into account but those scenarios are beyond the scope of this paper. ## 4 Author Contribution Article by A.C. and M.K. The authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript. ## 5 Funding The work of A.C. is funded by RSF Grant 19-42-02004. The research by M.K. was financially supported by Southern Federal University, 2020 Project VnGr/2020-03-IF. ## 6 Conflict of Interest There has been no conflict of interest among the authors of this paper. ## References * [1] Manton, N.S. Topology in the Weinberg-Salam Theory. Phys. Rev. D 2019, 28, 1983. [CrossRef] * [2] Klinkhamer, F.R.; Manton, N.S. A saddle-point solution in the Weinberg-Salam theory. Phys. Rev. D 1984, 30, 2212–2220. [CrossRef] * [3] Hooft, G.T. Symmetry breaking through bell-jackiw anomalies. Phys. Rev. Lett. 1976, 37, 8–11. [CrossRef] * [4] Hooft, G.T. Computation of the quantum effects due to a four-dimensional pseudoparticle. Phys. Rev. D 1976, _14_ , 3432–3450. [CrossRef] * [5] Khlopov, M.Y.; Mayorov, A.G.; Soldatov, E.Y. Puzzles of Dark Matter in the Light of Dark Atoms. J. Phys. Conf. Ser. 2011, 309, 012013. [CrossRef] * [6] Khlopov, M.Y.; Mayorov, A.G.; Soldatov, E.Y. Probes for constituents of composite dark matter. Bled Work. Phys. 2010, 11, 73. * [7] Khlopov, M.Y. Physics of dark matter in the light of dark atoms. Mod. Phys. Lett. A 2011, 26, 2823. [CrossRef] * [8] Khlopov, M.Y. Fundamental particle structure in the cosmological dark matter. Int. J. Mod. Phys. A 2013, 28, 1330042. [CrossRef] * [9] Belostky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Probes for 4th generation constituents of dark atoms in Higgs boson studies at the LHC. Gravit. Cosmol. 2012, 18, 127. [CrossRef] * [10] Fargion, D.; Khlopov, M.; Stephan, C.A. Dark matter with invisible light from heavy double charged leptons of almost-commutative geometry? Class. Quantum Grav. 2006, 23, 7305. * [Author2(year)] Connes, A. Noncommutative Geometry; Academic Press: London, UK; San Diego, CA, USA, 1994. * [11] Khlopov, M.Y.; Kouvaris, C. Strong interactive massive particles from a strong coupled theory. Phys. Rev. D 2008, 77, 065002. [CrossRef] * [12] Sannino, F.; Tuominen, K. Orientifold theory dynamics and symmetry breaking. Phys. Rev. D 2005, 71, 051901. [CrossRef] * [13] Hong, D.K.; Hsu, S.D.H.; Sannino, F. Composite Higgs from higher representations. Phys. Lett. B 2004, 597, 89. [CrossRef] * [14] Dietrich, D.D.; Sannino, F.; Tuominen, K. Light composite Higgs boson from higher representations versus electroweak precision measurements: Predictions for CERN LHC. Phys. Rev. D 2005, 72, 055001. [CrossRef] * [15] Dietrich, D.D.; Sannino, F.; Tuominen, K. Light composite Higgs and precision electroweak measurements on the Z resonance: An update. Phys. Rev. D 2006, 73, 037701. [CrossRef] * [16] Gudnason, S.B.; Kouvaris, C.; Sannino, F. Towards working technicolor: Effective theories and dark matter. Phys. Rev. D 2006, 73, 115003. [CrossRef] * [17] Gudnason, S.B.; Kouvaris, C.; Sannino, F. Dark matter from new technicolor theories. Phys. Rev. D 2006 74, 095008. [CrossRef] * [18] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Stable quarks of the 4th family? In The Physics of Quarks: New Research. Horizons in World Physics; Watson, N.L., Grant, T.M., Eds.; NOVA Publishers: Hauppauge, NY, USA, 2009; Volume 265, pp. 19–47. * [19] Khlopov, M.Y. Composite dark matter from the fourth generation. JETP Lett. 2006, 83, 1. [CrossRef] * [20] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Stable matter of 4th generation: Hidden in the Universe and close to detection? _arXiv_ 2006, arXiv:astro-ph/0602261. * [21] Belotsky, K.M.; Khlopov, M.Y.; Shibaev, K.I. Composite Dark Matter and its Charged Constituents. Gravitat. Cosmol. 2006, 12, 1–7. [CrossRef]
arxiv-papers
2021-07-27T05:47:56
2024-09-04T03:07:20.668928
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Arnab Chaudhuri and Maxim Yu. Khlopov", "submitter": "Arnab Chaudhuri", "url": "https://arxiv.org/abs/2107.12611" }
2107.12613
Iterative Reed–Muller Decoding Marvin Geiselhart^*, Ahmed Elkelesh^*, Moustafa Ebada^*, Sebastian Cammerer^† and Stephan ten Brink^* An extended version of this paper is available [1]. ^*Institute of Telecommunications, Pfaffenwaldring 47, University of Stuttgart, 70569 Stuttgart, Germany ^†NVIDIA, Fasanenstraße 81, 10623 Berlin, Germany ECCerror-correcting code HDDhard decision decoding SDDsoft decision decoding MLmaximum likelihood GPUgraphical processing unit BPbelief propagation BPLbelief propagation list LDPClow-density parity-check HDPChigh density parity check BERbit error rate BPSKbinary phase shift keying AWGNadditive white Gaussian noise MSEmean squared error LLRLog-likelihood ratio LUTlook-up table MAPmaximum a posteriori NEnormalized error BLERblock error rate PEprocessing elements SCLsuccessive cancellation list SCsuccessive cancellation SCANsoft cancellation BI-DMCBinary Input Discrete Memoryless Channel CRCcyclic redundancy check CA-SCLCRC-aided successive cancellation list BECBinary Erasure Channel BSCBinary Symmetric Channel PSCLpartitioned successive cancellation list 3GPP3rd Generation Partnership Project eMBBenhanced Mobile Broadband PCCparity-check concatenated CA-polar codesCRC-aided polar codes CNcheck node VNvariable node GenAlgGenetic Algorithm AIArtificial Intelligence MCMonte Carlo CSIChannel State Information PSCLpartitioned successive cancellation list OSDordered statistic decoding MWPC-BPminimum-weight parity-check BP FFGForney-style factor graph MBBPmultiple-bases belief propagation NBPneural belief propagation URLLCultra-reliable low-latency communications DMCdiscrete memoryless channel MSBmost significant bit LSBleast significant bit RPArecursive projection-aggregation SGDstochastic gradient descent Reed–Muller (RM) codes are known for their good ML performance in the short block-length regime. Despite being one of the oldest classes of channel codes, finding a low complexity soft-input decoding scheme is still an open problem. In this work, we present a belief propagation (BP) decoding architecture for RM codes based on their rich automorphism group. The decoding algorithm can be seen as a generalization of multiple-bases belief propagation (MBBP) using polar BP as constituent decoders. We provide extensive error-rate performance simulations and compare our results to existing decoding schemes. We report a near-ML performance for the RM(3,7)-code (e.g., $0.05$ dB away from the ML bound at BLER of $10^{-4}$) at a competitive computational cost. To the best of our knowledge, our proposed decoder achieves the best performance of all iterative RM decoders presented thus far. § INTRODUCTION The current trend of URLLC applications has urged the need for efficient short length coding schemes in combination with the availability of efficient decoders. Besides many other coding schemes, this has lead to the revival of one of the oldest error-correcting codes, namely RM codes [2, 3] – potentially also due to some existent similarities between RM codes and the newly developed family of polar codes [4, 5]. On the one hand, RM codes, as an example of algebraic codes, are known to be capacity-achieving over the BEC for a given rate [6, 7]. Moreover, and practically even more relevant, they enjoy an impressive error-rate performance under ML decoding, which also holds in the short length regime. To this extent, several decoding algorithms have been developed in the course of RM decoding. On the other hand, to the best of our knowledge, there is still a lack of practical decoders that are characterized by near-ML performance and feasible decoding complexity/latency. Block diagram of automorphism ensemble decoding. We focus on the case where $ M $ constituent BP decoders are used. The usage of SC and SCL as constituent decoders is presented in the extended version of this paper [1]. RM decoders can be grouped into two main categories, iterative and non-iterative decoders which we will shortly revisit in the following. In the literature, the best known decoder for RM codes over an AWGN channel is Dumer’s recursive list decoding algorithm [8], which is now known under the name SCL decoding [9], and a variant using permutations. Recently, a RPA decoding algorithm for RM codes was proposed in [10], which can be viewed as a weighted BP decoder over a redundant factor graph [11], making use of the symmetry of the RM codes (i.e., its large automorphism group). RM codes under RPA decoding were shown to outperform the error-rate performance of CRC-aided polar codes under SCL decoding. A more general usage of the rich automorphism group of RM codes to aid the decoding process is reported in [5], along with the decoding of RM codes using a redundant parity-check matrix proposed earlier in [12]. In this work, for the sake of comparison, we consider the following iterative decoders: multiple-bases belief propagationMBBP (MBBP) decoding [13], minimum weight parity-check belief propagationMWPC-BP (MWPC-BP) decoding [14], neural belief propagationNBP (NBP) decoding [15], pruned neural belief propagation (pruned-NBP) decoding [16]. The inherent parallel nature of iterative decoders allows high throughput implementations. Besides, their SISO nature makes them suitable for iterative detection and decoding. In this paper, we propose a new iterative decoding scheme, extending and generalizing some of the previously mentioned decoding algorithms. To the best of our knowledge, our proposed decoding algorithm achieves the best practical iterative decoding performance of the RM(3,7)-code presented thus far ($0.05$ dB away from the ML bound at BLER of $10^{-4}$). Fig. <ref> shows an abstract view of our proposed decoding algorithm. § PRELIMINARIES §.§ Reed–Muller Codes We interpret each message of an RM($ r $,$ m $) code as a multi-linear polynomial $ u(\zv) $ in $ m $ binary variables $ z_j $ (with $j\in\{0,\cdots,m-1\}$) and maximum degree $ r $, over the finite field $ \FF_2 $. To obtain the codeword $ \xv $, the message polynomial is evaluated at all points in the space $ \FF_2^m $, resulting in $ N = 2^m $ codeword bits [2, 3]. §.§ Automorphism Group The automorphism group (or permutation group) $ \operatorname{Aut}(\mathcal{C}) $ of a code $ \mathcal{C} $ is the set of permutations $ \pi $ of the codeword bit indices that map $ \mathcal{C} $ onto itself, i.e. \begin{equation} \pi(\xv) \in \mathcal{C} \quad \forall \xv \in \mathcal{C} \quad \forall \pi \in \operatorname{Aut}(\mathcal{C}), \end{equation} where $ \pi(\xv) $ results in the vector $ \xv' $ with $ x_i' = x_{\pi(i)} $. In other words, every codeword is mapped to another (not necessarily different) codeword of the same code. The automorphism group of RM codes is well known as the general affine group GA($ m $) over the field $ \FF_2 $[17].[In this paper, we only consider the field $ \FF_2 $ and hence, we omit the size of the field in the notation, i.e., we write GA($ m $) instead of GA($ m,2 $).] GA($ m $) is the group of all affine bijections over $ \FF_2^m $, i.e., pairs $ (\Am, \bv) $ defining the mapping $ \zv' = \Am \zv + \bv $, with a non-singular matrix $ \Am \in \FF_2^{m\times m}$ and an arbitrary vector $ \bv \in \FF_2^{m\times 1} $. The vectors $ \zv$, $\zv' \in \FF_2^{m\times 1} $ are the binary representations of the code bit positions $ i $ and $ \pi(i) $, respectively, i.e., $ i = \sum_{j=0}^{m-1}{z_j \cdot 2^j} $. An important subgroup of GA($ m $) is the set of stage-shuffle permutations $ \Pi(m) $, corresponding to the special case where $ \Am $ is a permutation matrix and $ \bv=\zerov $. §.§ Iterative RM Decoding In this section, we briefly revise the different iterative decoding techniques which can be used for RM codes. §.§.§ Naïve Belief Propagation Decoding BP decoding can be performed over the Tanner graph of a code's parity-check matrix. However, for high-density parity-check codes like RM codes, the performance of this decoder is usually poor due to the numerous short cycles in the graph. §.§.§ Belief Propagation Decoding over Forney-style Factor Graph Rather than on a Tanner graph, BP decoding can also be performed over a FFG, constructed from check and variable nodes of degree three [18]. Fig. <ref> shows the FFG of the RM(1,3)-code. As the frozen nodes always contribute the same LLR (i.e., a priori LLR of $ +\infty $) to the equations, the FFG can be reduced as shown on the right in Fig. <ref>, by removing edges of constant value. This potentially reduces the number of performed arithmetic operations per iteration while preserving the same performance [18]. In this work, whenever the BP decoding is used over the FFG, we use the reduced version. Forney-style factor graph (FFG) of the RM(1,3)-code (left) and the reduced FFG (right). Note that the dashed lines indicate variables to be computed only in the right-to-left message update. §.§.§ Minimum Weight Parity-Check Belief Propagation Decoding Minimum weight parity-check belief propagationMWPC-BP (MWPC-BP) decoding introduced in [14] is based on the concept of iterative decoding over an overcomplete parity-check matrix. An online algorithm tailored to the noisy received sequence $ \yv $ is used to construct the overcomplete parity-check matrix only based on minimum weight parity-checks. §.§.§ Neural Belief Propagation Decoding Neural belief propagationNBP (NBP) decoding as introduced in [15] treats the unrolled Tanner graph of the code as a neural network (NN), while assigning trainable weights to all of its edges leading to a soft Tanner graph. These trainable weights are optimized via SGD methods. §.§.§ Pruned Neural Belief Propagation Decoding Pruned neural belief propagation (pruned-NBP) decoding [16] combines the idea of MWPC-BP together with NBP. To get started, a redundant parity-check matrix containing (all or some of) the minimum weight parity-checks is constructed. During the offline training phase, all edges connected to a check node are assigned a single trainable weight and the least contributing check nodes are pruned (i.e., removed) from the graph. The authors of [16] refer to this decoder as $ D_1 $. An enhanced version, decoder $ D_3 $, is the result of assigning trainable weights per edge at the expense of larger memory requirements to save all weights per edges. Furthermore, a pruned NBP decoder without any weights is introduced as $ D_2 $, however with the expense of a significant degradation in error-rate performance. § AUTOMORPHISM ENSEMBLE DECODING Ensemble decoding uses multiple constituent decoders (i.e., a decoder ensemble of size $ M $) to generate a set of codeword estimates and selects one of these codewords, using a predefined metric, as the decoder output. Typically, a least-squares metric is used, as this corresponds to the ML decision for the AWGN channel. Hence, this method is also called ML-in-the-list. This can be formulated as \begin{equation} \label{eq:mlinthelist} \hat{\xv} = \argmin_{\hat{\xv}_j, j \in \LP 1, \dots, M\RP} \left\Vert \hat{\xv}_j - \yv \right\Vert^2 = \argmax_{\hat{\xv}_j, j \in \LP 1, \dots, M\RP} \sum_{i=0}^{N-1} \hat{x}_{j,i} \cdot y_i, \end{equation} where $ \hat{x}_{j,i} \in \LP \pm 1 \RP$, $\hat{\xv}_j$ is the estimated codeword from decoder $j$ for the received vector $ \yv $ and $\hat{\xv}$ is the final codeword estimate of the ensemble. MBBP is a well-known example for ensemble decoding that uses $ M $ BP decoders, each based on a different random parity-check matrix [13]. Another instance of ensemble decoding is BPL decoding of polar codes, where the stages of the FFG are randomly permuted for each constituent decoder [19]. In this work, we propose automorphism ensemble BP decoding (Aut-$M$-BP) for RM codes. The main idea is to make use of the already existent polar BP decoder. Furthermore, we use the RM code symmetry in the decoding algorithm itself, as permuting a valid RM codeword with a permutation from the code's automorphism group results in another valid RM codeword. An abstract view of our proposed Aut-$M$-BP decoding algorithm is shown in Fig. <ref>. The input to the decoder is the received noisy codeword $\yv$. We randomly sample $M$ different permutations from the RM automorphism group, where each permutation is denoted by $\pi_j$, with $j$ being the decoder index and $j \in \{1,2,\cdots,M\}$. The $\yv$-vector is interleaved (i.e., permuted) with the $M$ different permutations $\pi_j$ leading to $M$ permuted noisy codewords $\yv'_j$, where $j \in \{1,2,\cdots,M\}$. Now we decode every $\yv'_j$-vector independently using BP, whose output is the interleaved estimated codeword $\hat{\xv}'_j$. A de-interleaving phase is applied to all $M$ interleaved estimated codewords $\hat{\xv}'_j$ and, thus, we have $M$ codeword estimates $\hat{\xv}_j$. Let $ \operatorname{BP}(\cdot) $ denote the BP decoding function that maps $ \yv'_j $ to $ \hat{\xv}_j' $. Then we can write the interleaved decoding as \begin{equation}\label{eq:aut_dec} \hat{\xv}_j = \pi^{-1}_j\left(\operatorname{BP}\left(\pi_j(\yv)\right)\right). \end{equation} Similar to MBBP and BPL decoding, our proposed decoding algorithm uses the ML-in-the-list picking rule according to Eq. (<ref>) to choose the most likely codeword from the list to get the final decoder output $\hat{\xv}$. As the decoders are linear, their decoding behavior is only dependent on the noise induced by the channel, and not the choice of the transmitted codeword. Therefore, decoding using automorphisms according to Eq. (<ref>) corresponds to permuting the noise. It is reasonable to conclude that suboptimal (i.e., not ML) decoders may react differently to noise realizations in different permutations, which is exactly the property that automorphism ensemble decoding seeks to exploit. Our proposed algorithm can be therefore seen as a natural generalization of the BPL decoder [19]: We still use $M$ parallel independent BP decoders. However, we use a more general set of permutations. It was shown in [20] that the stage-shuffling of the FFG is equivalent to a bit-interleaving operation while keeping the factor graph unchanged; these permutations correspond to the automorphism subgroup $ \Pi(m) $. In contrast, we use permutations from the whole RM code automorphism group $ \operatorname{GA}(m) $ (rather than only $\Pi(m)$, which is used in BPL decoding as proposed in [19]). It is worth mentioning that the usage of a BP decoder as a constituent decoder has some similarities when compared to automorphism group decoding of BCH and Golay codes for the BEC [21] and for the AWGN channel [22]. Automorphism group decoding is based on permuting the received sequence exploiting automorphisms of the code while applying an iterative message passing algorithm. BLER comparison between non SGD-optimized iterative decoders, recursive list decoding and our proposed Aut-BP decoding scheme for the RM(3,7)-code over the BI-AWGN channel. § RESULTS Regarding practical applications, both error-rate performance and the computational complexity of the decoding scheme have to be considered. We compare the described decoding schemes for the RM(3,7)-code with $ N=128 $ and $ k=64 $. In the following, we specify the parameters of some of the compared decoders for reproducibility: * MWPC-BP utilizes 5% of the minimum-weight parity-checks, as reported in [14]. * MBBP operates over $ M=60 $ randomly generated parity-check matrices with 6 iterations each. * Neural-BP uses all 94488 minimum-weight parity-checks over 6 iterations. * The pruned neural-BP employs on average 3% of the minimum-weight parity-checks over a total of 6 iterations. We consider the three variants of this decoder as introduced in [16], with tied weights ($ D_1 $), no weights ($ D_2 $) and free weights ($ D_3 $). * For our proposed Aut-BP, we show results for both $ M=8 $ and $ M=32 $ randomly chosen permutations from the full automorphism group. Here, up to $ N_\mathrm{it,max} = 200 $ iterations are performed with, however, an early stopping condition (i.e., when $ \hat{\xv}=\hat{\uv}\Gm $) employed to reduce the average total number of iterations. Furthermore, the FFG have been reduced from 1792 to 1334 box-plus and addition operations per full iteration by removing operations with constant results, as presented in Section <ref>. §.§ Error-Rate Performance BLER comparison between SGD-optimized (NN-based) iterative decoders and Aut-BP for the RM(3,7)-code over the BI-AWGN channel. All neural-BP decoders use $ N_\mathrm{it} = 6 $ iterations. In Fig. <ref> and Fig. <ref>, we showcase the error-rate performance of the described decoding schemes for the RM(3,7)-code over the AWGN channel using BPSK mapping. Furthermore, we show the ML performance of the code as provided by [23]. As no data beyond an SNR of 3.5 dB is available, the ML performance is estimated using order-4 OSD. Fig. <ref> compares the non-SGD-optimized iterative decoders with Aut-BP and ML. One can observe that the naïve BP decoding suffers from a very poor performance for RM codes, compared to BP decoding over FFG. Moreover, using multiple $ \Hm $-matrices in MBBP leads to a significant enhancement in performance. All of the previous methods are outperformed by both Aut-8-BP and MWPC-BP, with similar performance. However, in the high SNR regime, Aut-8-BP beats MWPC-BP by 0.2 dB. Aut-32-BP even closes the gap to ML to less than 0.05 dB at a BLER of $ 10^{-4} $. We further observe the gains of sampling from $ \operatorname{GA}(m) $ in Aut-BP compared to $ \Pi(m) $, as used in BPL decoding. We can see that for all ensemble sizes $ M $, sampling from $ \operatorname{GA}(m) $ consistently outperforms $ \Pi(m) $ by up to 0.3 dB. This confirms the sub-optimality of restricting the automorphisms to a small subgroup. Moreover, Aut-32-BP can even outperform SCL [9] with list size $L=32$ (i.e., SCL-32) and its permutation variant DS-32 [8] in the high SNR regime. Fig. <ref> compares the SGD-optimized (NN-based) decoders with Aut-BP and ML. Here, the neural-BP decoder is much closer to the ML bound, and the pruned variant with free weights $ D_3 $ outperforms NBP, which uses all overcomplete parity-checks. The pruned NBP $ D_2 $ decoder without weights suffers from a significant performance degradation. Over the whole SNR range, $ D_1 $ and $ D_3 $ are outperformed by Aut-32-BP. Furthermore, it can be seen that using only $ M=8 $ parallel BP decoders (i.e., Aut-8-BP) results in a small performance degradation of less than 0.2 dB over the whole SNR range, offering an attractive trade-off for lower complexity. Simulation results for the RM(4,8)-code are presented in [1]. §.§ Iterative Decoding Complexity Complexity comparison of different iterative decoders using basic operations weighted according to Table <ref> (e.g., weight for multiplication = 3) to reach a target BLER of $ 10^{-4} $; RM(3,7)-code; BI-AWGN channel. For the RM(3,7)-code, we compare the complexity of the iterative decoding algorithms with error-rate performance close to ML by counting the number of computing operations required to decode one RM codeword. The first column of Table <ref> gives the list of the operations we use.[Note that these operations differ from the ETSI basic operations, as we are more interested in hardware than in software implementations.] Furthermore, as non-trivial multiplication is significantly more complex than the other considered operations, we introduce a weighting factor for multiplication $ w_\mathrm{mul}=3 $ (equivalent to the number of full-adders in a 4+1 bit fixed-point implementation) to make the comparison more fair. For all decoders, we assume that the box-plus operation is implemented as \begin{align} L_1 \boxplus L_2 &= \sgn(L_1) \cdot \sgn(L_2) \cdot \min(|L_1|,|L_2|) \nonumber \\ &\quad+ f_{+}(|L_1+L_2|) - f_{+}(|L_1-L_2|), \end{align} where $ f_{+}(|x|) = \log\LB1+\exp(-|x|)\RB$ is a correction term that can be well-approximated by a short LUT. Furthermore, CN are assumed to be efficiently implemented using the box-minus operator as \begin{equation} L_{j\to i} = \bigboxplus_{i' \neq i} L_{i'\to j} = \LB \bigboxplus_{i'} L_{i'\to j} \RB \boxminus L_{i\to j}, \end{equation} with $ L_1 \boxminus L_2 = \sgn(L_2) \cdot L_1 + f_{-}(|L_1+L_2|) - f_{-}(|L_1-L_2|) $ and $ f_{-}(|x|) = \log(1-\exp(-|x|)) $ which is again implemented as a LUT as proposed in [24]. The remaining columns of Table <ref> list the number of operations of each type required for the basic building blocks of the described iterative decoding algorithms, namely box-plus evaluations, CN and VN updates, the ML-in-the-list decision and the stopping condition that is used in BPL decoding. Neural-BP, the pruned neural-BP and MWPC-BP decoding use non-trivial multiplications with the corresponding weights before the VN evaluations. Basic operations and their usage in iterative decoding. aFor BP with weights (MWPC-BP, NBP, D1, D3). Operation Weight 2-input $ \boxplus $ CN (deg. $ D $) VN (deg. $ D $) ML out of $ M $ FFG BP Stopping $ \sgn(x)\cdot\sgn(y)$ 1 1 $ D-1 $ 0 0 $ m \cdot N/2 + 2N-1 $ $ \sgn(x)\cdot y$ 1 1 $ 2D-1 $ 0 $ MN $ 0 $ \min(|x|,|y|) $ 1 1 $ D-1 $ 0 0 0 $ \max(x,y) $ 1 0 0 0 $ M-1 $ 0 $ f_{\pm}(|x|) $ (LUT) 1 2 $ 4D-2 $ 0 0 0 $ x+y $, $ x-y $ 1 4 $ 8D-4 $ $ 2D $ $ M(N-1) $ 0 $ x\cdot y $ 3 0 0 [$ D+1 $]a 0 0 Weighted total - 9 $ 16D-9 $ $ 2D $ [$ +3D+3 $]a $ 2MN-1 $ $ m \cdot N/2 + 2N-1 $ Fig. <ref> shows the total number of weighted operations to decode one codeword of the RM(3,7)-code. We can see that out of all methods, neural-BP using the full overcomplete $ \Hm $-matrix has the highest complexity. The corresponding pruned decoders $ D_1 $ and $ D_3 $ result in approximately 3% of that complexity. MWPC-BP is computationally more expensive, as it uses more parity-check equations and more iterations are required to achieve a good error-rate performance. It has to be noted, however, that we only list the complexity of iterative decoding, not of (adaptively) obtaining the parity-check equations. Hence, the overall complexity of MWPC-BP is higher than the presented number. MBBP has roughly half the complexity of MWPC-BP, while Aut-32-BP without stopping condition has twice the complexity of MWPC-BP. However, when a ($ \Gm $-matrix-based) stopping condition is used, the average number of iterations of Aut-BP is significantly reduced. To illustrate this, we measure the average required number of iterations until convergence for both $ M=8 $ and $ M=32 $ with respect to the SNR of the AWGN channel, while $ N_\mathrm{it,max} = 200$. At an SNR of 3.65 dB, corresponding to the BLER of $ 10^{-4} $, each decoder of the Aut-32-BP ensemble requires an average of 4.55 iterations, making Aut-BP the least complex decoder of the compared algorithms (see Fig. <ref>), without losing any error-rate performance. Aut-8-BP requires an SNR of 3.84 dB to reach this BLER performance, however, reducing the complexity again by a factor of 4, using only 3.96 iterations on average. Note that even though the ML-in-the-list decision can be only made after all constituent decoders are terminated, terminated decoders can already start decoding the next received vector (e.g., in a super-scalar implementation). It is also worth noting here that the approaches proposed in [16] can also profit from early stopping. However, the effect is less significant since the majority of check node evaluations are performed in the first two iterations. Moreover, the regular structure of the FFG may result in more preferable implementations of Aut-BP compared to the random memory access patterns observed in conventional iterative decoders. § CONCLUSION In this work, we propose an automorphism-based iterative decoding algorithm for RM codes. We present near-ML error-rate performance for the RM(3,7)-code operating only $0.05$ dB away from the ML bound at BLER of $10^{-4}$. Furthermore, we report a decoder complexity comparison for the RM(3,7)-code from an operation level perspective. To the best of our knowledge, our proposed iterative Aut-BP decoders using the RM code automorphism group as permutations are the best iterative decoders reported in literature thus far in terms of error-rate performance. [1] M. Geiselhart, A. Elkelesh, M. Ebada, S. Cammerer, and S. ten Brink, “Automorphism Ensemble Decoding of Reed–Muller Codes,” IEEE Trans. Commun., 2021. [2] D. E. Muller, “Application of Boolean Algebra to Switching Circuit Design and to Error Detection,” Transactions of the I.R.E. Professional Group on Electronic Computers, vol. EC-3, no. 3, pp. 6–12, 1954. [3] I. Reed, “A class of multiple-error-correcting codes and the decoding scheme,” Transactions of the IRE Professional Group on Information Theory, vol. 4, no. 4, pp. 38–49, Sep. 1954. [4] E. Arıkan, “Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels,” IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051–3073, Jul. 2009. [5] N. Stolte, “Rekursive Codes mit der Plotkin-Konstruktion und ihre Decodierung,” Ph.D. dissertation, Technische Universität Darmstadt, Jan. 2002. [Online]. Available: [6] E. Abbe, A. Shpilka, and A. Wigderson, “Reed–Muller Codes for Random Erasures and Errors,” IEEE Trans. Inf. Theory, vol. 61, no. 10, pp. 5229–5252, 2015. [7] S. Kudekar, S. Kumar, M. Mondelli, H. D. Pfister, E. Şaşoǧlu, and R. Urbanke, “Reed–Muller Codes Achieve Capacity on Erasure Channels,” IEEE Trans. Inf. Theory, vol. 63, no. 7, pp. 4298–4316, 2017. [8] I. Dumer and K. Shabunov, “Soft-Decision Decoding of Reed-Muller Codes: Recursive Lists,” IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 1260–1266, Mar. 2006. [9] I. Tal and A. Vardy, “List Decoding of Polar Codes,” IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2213–2226, May 2015. [10] M. Ye and E. Abbe, “Recursive projection-aggregation decoding of Reed-Muller codes,” IEEE Trans. Inf. Theory, pp. 1–1, 2020. [11] M. Lian, C. Häger, and H. D. Pfister, “Decoding Reed–Muller Codes Using Redundant Code Constraints,” in IEEE Inter. Symp. Inf. Theory (ISIT), Jun. 2020. [12] M. Bossert and F. Hergert, “Hard- and Soft-Decision Decoding Beyond the Half Minimum Distance—An Algorithm for Linear Codes,” IEEE Trans. Inf. Theory, vol. 32, no. 5, pp. 709–714, 1986. [13] T. Hehn, J. B. Huber, S. Laendner, and O. Milenkovic, “Multiple-Bases Belief-Propagation for Decoding of Short Block Codes,” in IEEE Inter. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 311–315. [14] E. Santi, C. Häger, and H. D. Pfister, “Decoding Reed-Muller Codes Using Minimum-Weight Parity Checks,” in IEEE Inter. Symp. Inf. Theory (ISIT), Jun. 2018, pp. 1296–1300. [15] E. Nachmani, E. Marciano, L. Lugosch, W. J. Gross, D. Burshtein, and Y. Be’ery, “Deep Learning Methods for Improved Decoding of Linear Codes,” IEEE J. Sel. Topics Sig. Process., vol. 12, no. 1, pp. 119–131, Feb. 2018. [16] A. Buchberger, C. Häger, H. D. Pfister, L. Schmalen, and A. G. i Amat, “Pruning Neural Belief Propagation Decoders,” in IEEE Inter. Symp. Inf. Theory (ISIT), Jun. 2020. [17] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, ser. North-Holland Mathematical Library.1em plus 0.5em minus 0.4emNorth-Holland Pub. Co., 1977, no. 16. [18] G. D. Forney, “Codes on Graphs: Normal Realizations,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 520–548, Feb. 2001. [19] A. Elkelesh, M. Ebada, S. Cammerer, and S. ten Brink, “Belief Propagation List Decoding of Polar Codes,” IEEE Commun. Lett., vol. 22, no. 8, pp. 1536–1539, Aug. 2018. [20] N. Doan, S. A. Hashemi, M. Mondelli, and W. J. Gross, “On the Decoding of Polar Codes on Permuted Factor Graphs,” in IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018. [21] T. Hehn, O. Milenkovic, S. Laendner, and J. B. Huber, “Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes,” IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5308–5331, [22] I. Dimnik and Y. Be'ery, “Improved Random Redundant Iterative HDPC Decoding,” IEEE Trans. Commun., vol. 57, no. 7, pp. 1982–1985, Jul. [23] M. Helmling, S. Scholl, F. Gensheimer, T. Dietz, K. Kraft, S. Ruzika, and N. Wehn, “Database of Channel Codes and ML Simulation Results,” <www.uni-kl.de/channel-codes>, 2019. [24] T. Clevorn and P. Vary, “The box-minus operator and its application to low-complexity belief propagation decoding,” in IEEE 61st Veh. Technol. Conf., vol. 1, May 2005, pp. 687–691.
arxiv-papers
2021-07-27T05:56:31
2024-09-04T03:07:20.678508
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Marvin Geiselhart, Ahmed Elkelesh, Moustafa Ebada, Sebastian Cammerer\n and Stephan ten Brink", "submitter": "Marvin Geiselhart", "url": "https://arxiv.org/abs/2107.12613" }
2107.12616
# Observation of ballistic upstream modes at fractional quantum Hall edges of graphene Ravi Kumar1111equally contributed Saurabh Kumar Srivastav1222equally contributed Christian Spånslätt2,3,4 K. Watanabe5 T. Taniguchi5 Yuval Gefen6 Alexander D. Mirlin3,4,7,8 and Anindya [email protected] Department of Physics, Indian Institute of Science, Bangalore, 560012, India. Department of Microtechnology and Nanoscience (MC2),Chalmers University of Technology, S-412 96 Göteborg, Sweden. Institute for Quantum Materials and Technologies, Karlsruhe Institute of Technology, 76021 Karlsruhe, Germany. Institut für Theorie der Kondensierten Materie, Karlsruhe Institute of Technology, 76128 Karlsruhe, Germany. National Institute of Material Science, 1-1 Namiki, Tsukuba 305-0044, Japan. Department of Condensed Matter Physics, Weizmann Institute of Science, Rehovot 76100, Israel. Petersburg Nuclear Physics Institute, 188300 St. Petersburg, Russia. L. D. Landau Institute for Theoretical Physics RAS, 119334 Moscow, Russia. The structure of edge modes at the boundary of quantum Hall (QH) phases forms the basis for understanding low energy transport properties. In particular, the presence of “upstream” modes, moving against the direction of charge current flow, is critical for the emergence of renormalized modes with exotic quantum statistics. Detection of excess noise at the edge is a smoking gun for the presence of upstream modes. Here we report on noise measurements at the edges of fractional QH (FQH) phases realized in dual graphite-gated bilayer graphene devices. A noiseless dc current is injected at one of the edge contacts, and the noise generated at contacts at $L=4\,\mu$m or $10\,\mu$m away along the upstream direction is studied. For integer and particle-like FQH states, no detectable noise is measured. By contrast, for “hole-conjugate” FQH states, we detect a strong noise proportional to the injected current, unambiguously proving the existence of upstream modes. The noise magnitude remaining independent of length together with a remarkable agreement with our theoretical analysis demonstrates the ballistic nature of upstream energy transport, quite distinct from the diffusive propagation reported earlier in GaAs-based systems. Our investigation opens the door to the study of upstream transport in more complex geometries and in edges of non-Abelian phases in graphene. Introduction: Transport in integer quantum Hall (QH) states occurs through one-dimensional edge modes located at the edge of the sample with downstream chirality dictated by the magnetic field (Fig. 1a). This is also true for particle-like fractional quantum Hall (FQH) states [1, 2]. By contrast, so called “hole-conjugate” FQH states ($i+1/2<\nu<i+1$ with filling factor $\nu$ and $i$=0,1,2,..) are expected to host counter-propagating chiral edge modes moving respectively along the downstream and upstream directions. A paradigmatic example is the $\nu=2/3$ bulk state. MacDonald and Johnson [3, 4] proposed that the edge supports two counter-propagating modes: a downstream mode, $\nu=1$, and an upstream $\nu=1/3$ mode (Fig. 1b). The existence of upstream modes is of fundamental importance and crucially affects transport properties including electrical and thermal transport [5, 6], noise, and particle interferometry [7, 8]. There has been an extensive effort over recent years to detect experimentally upstream modes and their properties in GaAs/AlGaAs quantum well based 2DEG. Two questions then come to mind. The first is whether the upstream modes can be detected by measuring the electrical conductance. Indeed, for the hole- conjugate $\nu=2/3$ state, and for distances much smaller than the charge equilibration length, the two-terminal electric conductance $G$ is expected [9] to be $4/3\frac{e^{2}}{h}$ (instead of $2/3\frac{e^{2}}{h}$), confirming the counter propagating character of edge modes. This value was indeed measured, but only on engineered edges at interfaces between two FQH states [10]. In experiments on a conventional edge (the boundary of a $\nu=2/3$ FQH state), $G=2/3\frac{e^{2}}{h}$ is found to be robust and essentially equal to the filling factor $\nu=2/3$, implying that charge propagates only downstream direction; one cannot tell anything about the presence or absence of upstream modes [9, 11, 12]. The second question is whether the upstream mode can be detected by measuring the thermal conductance. Thermal transport on an edge may be qualitatively different from charge transport [9, 11]. Even if charge propagates only downstream, energy may propagate upstream. Measurements of thermal conductance $G_{Q}$ at $\nu=2/3$ and related fillings yielded results fully consistent with the theory expected from hole-conjugated character of these states with upstream modes [13, 14, 15, 16]. Still, measurements of $G_{Q}$ do not prove unambiguously the existence of upstream modes. Ideally, for $\nu=2/3$, hole-conjugate state with counter-propagating 1 and 1/3 modes is favored by particle-hole symmetry, which is however only approximate in any realistic situation. Note, however, that an edge with two co-propagating $\nu=1/3$ modes is a fully legitimate candidate [2, 1] too. Such a model would be consistent not only with measured electrical conductance $G=2/3\frac{e^{2}}{h}$ but also with the thermal conductance measurements reported in Ref. [15]. On a broader scope, several alternative approaches attempting to establish the presence of upstream current of heat at edges of a variety of FQH states in GaAs/AlGaAs structures were employed in Refs. [17, 18, 19, 20, 21]. Those studies used structures involving quantum point contacts or quantum dots. It is also worth noting that candidates to the non- Abelian $\nu=5/2$ state possess different number of upstream modes, and intensive current efforts aim at understanding which of them is actually realized in experiment [14, 22, 23, 24, 25, 26, 27]. Figure 1: Edge profile, Device schematic, Hot spot, Noise spot, and QH response. (a) and (b) show the density profile at the edge of a sample with co-propagating and counter-propagating edge structures for $\nu=2$ and for hole-conjugate $\nu=2/3$ states, respectively. x is a coordinate across the edge. Downstream modes are red, while upstream modes are black. (c) Schematic of device and measurement setup, where the device is set into $\nu=2/3$ FQH state. A noiseless dc current is injected at contact C and terminates into cold ground (CG) contact D. The upstream mode carry the heat from the hot spot near the contact C and create the noise spot at the contact B, which is measured at a frequency of $\sim$770 kHz using a LCR resonance circuit followed by amplifier chain and spectrum analyzer. (d) Transverse Hall resistance ($R_{xy}$) and longitudinal resistance ($R_{xx}$) of the device-1 at $10$ T. The emergence of the two-dimensional graphene platform opened up a new era in the study of FQH physics [28, 29], with different Landau level structure (as compared with traditional GaAs heterostructures), new fractions, and enriched family of quantum-Hall states due to an interplay of spin, orbital, and valley degrees of freedom [30, 31, 32, 33, 34, 35]. Furthermore, graphene features an unprecedented sharp confining potential and is thus expected to exhibit bulk- edge correspondence without additional complex edge reconstruction [36, 37]. Also, in view of the sharp edge, one expects strong interaction between the edge modes in graphene, which may give access to regimes that are difficult to reach in GaAs structures. Remarkably, for graphene or graphene-based hybrid structures, no direct evidence for the presence of upstream modes has so far been reported. Here, we, for the first time, report a smoking gun signature of upstream modes for hole-conjugate FQH states in graphene and identify their nature, employing noise spectroscopy, which is a purely electrical tool. The essence of our approach is as follows [38]. When a bias is applied to a FQH edge segment, the Joule heat is dissipated at the “hot spots” as shown in Fig. 1c. In the presence of upstream modes, heat is transported upstream to the so- called noise spot (Fig. 1c), where the heat partitions the charge current and thereby generates noise. We have carried out electrical conductance together with noise measurements at integer QH states, electron-like state $\nu=1/3$ and hole-conjugate states $\nu=2/3$ and $\nu=3/5$, realized in a dual graphite-gated hexagonal-boron- nitride (hBN)-encapsulated high-mobility bilayer graphene (BLG) devices in a cryo-free dilution fridge at base temperature of $\sim 20$ mK (electron temperature $\sim 28$ mK). For $\nu=1/3$ state and integer QH states, we do not detect any excess noise along the upstream direction. This is expected, because the corresponding edge states do not host upstream modes. By contrast, for $\nu=2/3$ and $\nu=3/5$ FQH states, a finite noise is detected which increases with increasing injected current. At the same time, the averaged current in upstream direction is zero. Thus, noise detection unambiguously demonstrates that upstream modes exist for the hole-conjugate FQH states in graphene and only carry heat energy. Moreover, the magnitude of the noise remains constant for two different lengths $L=10\,\mu$m and $4\,\mu$m between the current injecting contact and noise detection point in the same device. Moreover, our experimentally measured noise magnitude matches remarkably well with our theoretical analysis. This conclusively demonstrates the ballistic nature of upstream modes, implying the absence of thermal equilibration on the length scales employed in the experiment. Figure 2: Noise data (a) and (b) show the noise detection scheme of the device-1 while the current is injected at contact C and contact A, respectively. (c) Differential bias response of $\nu=2/3$ state, where a 100 pA AC signal on top of the DC bias current is injected at contact C and the voltages are measured at contact C ($V_{C}$) and B ($V_{B}$) using Lock-In amplifier. (d) Noise measured along the upstream direction for longer length ($10\,\mu$m) as shown in Fig. 2a for $\nu=1$ (brown circles), $\nu=1/3$ (olive circles) and $\nu=2/3$ (blue circles). The magenta open circles are the measured noise along the upstream direction for shorter length ($4\,\mu$m) by reversing the magnetic field (opposite chirality), and injecting current at contact A and measured noise at contact B (see SM,S4). The solid black line is the theoretically calculated noise. (e) Noise measured along the downstream direction for $\nu=2/3$ for the scheme shown in Fig. 2b. Experiment: We turn now to a more detailed exposition of our results from two devices. The device schematic and noise measurement set-up is shown in Fig. 1c. The device fabrication details are mentioned in the method section and Supplementary Material (SM, S1). First, we perform electrical conductance measurements at a fixed magnetic field of $10$ T using standard lock-in amplifier. The electron density is tuned by the back graphite gate, keeping the top graphite gate fixed at zero voltage. The measured transverse Hall resistance ($R_{xy}$) and longitudinal resistance ($R_{xx}$) of device-1 are shown in Fig. 1d for $\nu\leq 1$. Clear plateaus in $R_{xy}$ are developed for $\nu=1$, $\nu=2/3$, and $\nu=1/3$, accompanied with zeroes in $R_{xx}$ at the same gate voltage. Similarly, for $\nu=1$, $\nu=2/3$, $\nu=3/5$ and $\nu=1/3$ for device-2, see SM (S7). Next, we perform noise measurements at $\nu=2/3$, $\nu=1/3$, and integer QH states for two different lengths $L=10\,\mu$m and $4\,\mu$m of device-1. The Measurement scheme for $L=10\,\mu$m is shown in Fig. 2a, where the device is set into $\nu=2/3$ QH state with $d$ and $u$ representing counter-propagating downstream and upstream eigenmodes. The measurement scheme for shorter length $L=4\,\mu$m is obtained in the same device by changing the chirality (see SM, S4). Before the noise measurements, we perform two crucial checks: bias-dependent response of the $\nu=2/3$ FQH state and chirality of charge transport. For this, a 100 pA AC signal is injected on top of the DC bias current at contact C, keeping contact D at ground, and the AC voltage at contacts C and B is measured. The voltage at contact C, shown as $V_{C}$ in Fig. 2c, remains flat as a function of the DC bias current, which means the conductance of the $\nu=2/3$ state does not change with the bias current. This kind of response, implying that there is no transport through the bulk (via states above the bulk gap), is a prerequisite check for the noise measurements. This is in full consistency with the value of the gap of $\nu=2/3$ at 10 T, which is around 5 K as determined from the activation plot of $R_{xx}$ (see SM, S6), i.e., well above our largest bias voltage. Further, no detectable voltage is measured at contact B (shown as $V_{B}$ in Fig. 2c), which demonstrates that the charge propagates downstream only. Similar results are obtained for the shorter length ($4\,\mu$m) (see SM, S4). Thus, if our $\nu=2/3$ edge hosts counter-propagating modes (which is demonstrated below), the charge equilibration length is much smaller than the size of our device. To unambiguously demonstrate the existence of upstream mode, a noiseless dc current is injected at contact C, and noise $S_{I}$ is measured at contact B along the upstream direction. For the noise measurement, a LCR resonant circuit with resonance frequency of $\sim$770 kHz is utilized together with an amplifier chain and a spectrum analyzer (see methods and SM(S1)) [39, 40, 41, 42]. In the absence of an upstream mode, the energy cannot flow from the hot spot near C to the noise spot near B, see Fig. 2a, so that no noise is expected. This is precisely what is observed for $\nu=1$ and $\nu=1/3$ states, see Fig. 2d. At the same time, it is shown in Fig. 2d that for the $\nu=2/3$ state there is a strong noise which increases almost linearly with current. This is quite striking as at contact B the time-averaged current is zero. This clearly demonstrates that the $\nu=2/3$ edge hosts an upstream mode that leads to an upstream propagation of energy, even though the charge propagates downstream only. The mechanism of the noise generation is as follows [38]. The heat propagating upstream from the hot spot near C reaches the noise spot near B, inducing there creation of particle-hole pairs propagating in opposite directions. If the particle (or hole) is absorbed at contact B, while the hole (or, respectively, particle) flows downstream, there will be a voltage fluctuation at B detected by our noise measurement scheme. Similarly, the noise along the upstream direction is detected for $\nu=2/3$ and $\nu=3/5$ of device-2 as shown in SM(S7). To verify that the heat propagates from the hot spot to the noise spot entirely via the edge, we have measured the noise in an alternative configuration. In this setting, a noiseless dc current is injected at contact A, while the contact C is electrically floating as shown in Fig. 2b. In this situation, in order to induce the noise, the heat would have to propagate upstream from the hot spot near D to the noise spot near B. However, this path is “cut” by the metallic contact C held at the base temperature. Thus, the only way for the heat to propagate is via the bulk. As shown in Fig. 2e, no detectable noise is measured at contact B, which rules out any sizeable bulk conduction of heat in our device. Figure 3: Temperature dependence of the noise. (a) Noise along the upstream direction at $\nu=2/3$ for different bath temperatures. (b) Noise value at $I_{S}=1$ nA plotted against temperature for $4\,\mu$m (red circles) and $10\,\mu$m (blue circles) lengths. To inspect the length dependence of the noise, we have also studied it for $L=4\,\mu$m of the same device-1 (see SM, S4). The data are shown in Fig. 2d. It can be seen that the noise amplitude is nearly identical for $L=10\,\mu$m and $4\,\mu$m. This is striking since it shows that the heat propagates upstream ballistically and without losses along the $\nu=2/3$ edge, from the hot spot to the noise spot. There are two distinct mechanisms that could suppress the heat propagation and thus the noise: (i) thermal equilibration between the counter-propagating modes [9, 11, 43, 38] and (ii) dissipation of energy from the edge to other degrees of freedom, including phonons, photons, and Coulomb-coupled localized states [44, 45, 46]. Our results show that none of these mechanisms is operative at $T\sim 20$ mK on the length scale of $L=10\,\mu$m. The absence of thermal equilibration on the edge is in a striking contrast with the very efficient electric equilibration emphasized above. Up to now, all the data were at $T\sim 20$ mK. Now, we explore the effect of temperature. Figure 3a shows the evolution of the $\nu=2/3$ noise at $L=4\,\mu$m with increasing $T$. In Fig. 3b we display the temperature dependence of the noise for $L=4\,\mu$m and $L=10\,\mu$m at $1nA$ current. It is seen that the noise remains constant and equal for both lengths up to $T=50$ mK. For higher temperature, the noise decays with $T$, and the decay is substantially faster for the larger $L$. This decay can be attributed to one of two mechanisms mentioned above: thermal equilibration within the edge (which would imply a crossover from ballistic to diffusive regime of heat flow) or loss of heat to the bulk. Further work is needed to understand which of them is dominant. Our experiments thus clearly indicate that at low temperatures, $T\leq 50$ mK, the upstream heat transport is ballistic and lossless. To support this conclusion, we have calculated theoretically the expected noise $S_{I}$ on the $\nu=2/3$ edge in this regime. The theory extends that of Refs. [43, 38] to the ballistic (rather than diffusive) regime of heat transport corresponding to vanishing thermal equilibration. In this regime, the backscattering of heat takes place only at interfaces with the contact regions [9, 16]. We assumed the bias voltage $V=(3h/2e^{2})I_{SD}$ to be much larger than $T$, which is well fulfilled for our typical current $I_{SD}\sim 1nA$. The result (see method section and SM (S9) for detail) $S_{I}=0.146\,eI_{SD}$ (1) is shown in Fig. 2d and is an excellent agreement with the experimental data, thus giving a further strong support to our interpretation of the experiment. Discussion: Our measurements of noise present an unambiguous demonstration of the presence of an upstream mode in $\nu=2/3$ and $\nu=3/5$ FQH edges in graphene. This mode is responsible for the upstream heat transport that is at the heart of the noise generation mechanism. Remarkably, the noise is temperature-independent for $T\leq 50$ mK and remains the same for $L=4\,\mu$m and $L=10\,\mu$m, demonstrating the ballistic and lossless character of heat transport. The ballistic heat transport implies the absence of thermal equilibration on the edge, in contrast to full charge equilibration revealed by electric conductance measurements. This is entirely consistent with the data of Ref. [15] on thermal conductance in graphene. There, a dramatic difference between the charge and heat equilibration lengths was explained by the vicinity of a system to a strong-interaction fixed point, where the bare modes of the $\nu=2/3$ edge are renormalized into a charge and a neutral mode. Very recently, absence of thermal equilibration (notwithstanding very efficient electric equilibration) was also reported for GaAs samples [16]. ## References * [1] Beenakker, C. Edge channels for the fractional quantum hall effect. _Physical review letters_ 64, 216 (1990). * [2] Wen, X.-G. Chiral luttinger liquid and the edge excitations in the fractional quantum hall states. _Physical Review B_ 41, 12838 (1990). * [3] MacDonald, A. H. Edge states in the fractional-quantum-hall-effect regime. _Phys. Rev. Lett._ 64, 220–223 (1990). * [4] Johnson, M. & MacDonald, A. Composite edges in the $\nu$= 2/3 fractional quantum hall effect. _Physical Review Letters_ 67, 2060 (1991). * [5] Altimiras, C. _et al._ Chargeless heat transport in the fractional quantum hall regime. _Physical review letters_ 109, 026803 (2012). * [6] Jezouin, S. _et al._ Quantum limit of heat flow across a single electronic channel. _Science_ 342, 601–604 (2013). * [7] Ji, Y. _et al._ An electronic mach–zehnder interferometer. _Nature_ 422, 415–418 (2003). * [8] Nakamura, J. _et al._ Aharonov–bohm interference of fractional quantum hall edge modes. _Nature Physics_ 15, 563–569 (2019). * [9] Protopopov, I., Gefen, Y. & Mirlin, A. Transport in a disordered $\nu$= 2/ 3 fractional quantum hall junction. _Annals of Physics_ 385, 287–327 (2017). * [10] Cohen, Y. _et al._ Synthesizing a $\nu$=2/3 fractional quantum hall effect edge state from counter-propagating $\nu$=1 and $\nu$=1/3 states. _Nature Communications_ 10, 1920 (2019). * [11] Nosiglia, C., Park, J., Rosenow, B. & Gefen, Y. Incoherent transport on the $\nu$= 2/3 quantum hall edge. _Physical Review B_ 98, 115408 (2018). * [12] Spånslätt, C., Gefen, Y., Gornyi, I. & Polyakov, D. Contacts, equilibration, and interactions in fractional quantum hall edge transport. _arXiv preprint arXiv:2105.04013_ (2021). * [13] Banerjee, M. _et al._ Observed quantization of anyonic heat flow. _Nature_ 545, 75–79 (2017). * [14] Banerjee, M. _et al._ Observation of half-integer thermal hall conductance. _Nature_ 559, 205–210 (2018). * [15] Srivastav, S. K. _et al._ Vanishing thermal equilibration for hole-conjugate fractional quantum hall states in graphene. _Physical Review Letters_ 126, 216803 (2021). * [16] Melcer, R. A. _et al._ Absent thermal equilibration on fractional quantum hall edges over macroscopic scale. _arXiv preprint arXiv:2106.12486_ (2021). * [17] Bid, A. _et al._ Observation of neutral modes in the fractional quantum hall regime. _Nature_ 466, 585–590 (2010). * [18] Dolev, M. _et al._ Characterizing neutral modes of fractional states in the second landau level. _Phys. Rev. Lett._ 107, 036805 (2011). * [19] Gross, Y., Dolev, M., Heiblum, M., Umansky, V. & Mahalu, D. Upstream neutral modes in the fractional quantum hall effect regime: Heat waves or coherent dipoles. _Phys. Rev. Lett._ 108, 226801 (2012). * [20] Venkatachalam, V., Hart, S., Pfeiffer, L., West, K. & Yacoby, A. Local thermometry of neutral modes on the quantum hall edge. _Nature Physics_ 8, 676–681 (2012). * [21] Gurman, I., Sabo, R., Heiblum, M., Umansky, V. & Mahalu, D. Extracting net current from an upstream neutral mode in the fractional quantum hall regime. _Nature Communications_ 3, 1289 (2012). * [22] Ma, K. K. & Feldman, D. Partial equilibration of integer and fractional edge channels in the thermal quantum hall effect. _Physical Review B_ 99, 085309 (2019). * [23] Asasi, H. & Mulligan, M. Partial equilibration of anti-pfaffian edge modes at $\nu$= 5/2. _Physical Review B_ 102, 205104 (2020). * [24] Simon, S. H. & Rosenow, B. Partial equilibration of the anti-pfaffian edge due to majorana disorder. _Physical review letters_ 124, 126801 (2020). * [25] Park, J., Spånslätt, C., Gefen, Y. & Mirlin, A. D. Noise on the non-abelian $\nu$= 5/2 fractional quantum hall edge. _Physical review letters_ 125, 157702 (2020). * [26] Dutta, B. _et al._ Novel method distinguishing between competing topological orders. _arXiv preprint arXiv:2101.01419_ (2021). * [27] Yutushui, M., Stern, A. & Mross, D. F. Identifying the $\nu$= 5/2 topological order through charge transport measurements. _arXiv preprint arXiv:2106.07667_ (2021). * [28] Li, J. _et al._ Even-denominator fractional quantum hall states in bilayer graphene. _Science_ 358, 648–652 (2017). * [29] Kim, Y. _et al._ Even denominator fractional quantum hall states in higher landau levels of graphene. _Nature Physics_ 15, 154–158 (2019). * [30] Yang, K., Sarma, S. D. & MacDonald, A. Collective modes and skyrmion excitations in graphene s u (4) quantum hall ferromagnets. _Physical Review B_ 74, 075423 (2006). * [31] Sodemann, I. & MacDonald, A. H. Broken su (4) symmetry and the fractional quantum hall effect in graphene. _Physical review letters_ 112, 126804 (2014). * [32] Kharitonov, M. Phase diagram for the $\nu$= 0 quantum hall state in monolayer graphene. _Physical Review B_ 85, 155439 (2012). * [33] Weitz, R. T., Allen, M., Feldman, B., Martin, J. & Yacoby, A. Broken-symmetry states in doubly gated suspended bilayer graphene. _Science_ 330, 812–816 (2010). * [34] Young, A. F. _et al._ Spin and valley quantum hall ferromagnetism in graphene. _Nature Physics_ 8, 550–556 (2012). * [35] Kumar, C., Srivastav, S. K. & Das, A. Equilibration of quantum hall edges in symmetry-broken bilayer graphene. _Physical Review B_ 98, 155421 (2018). * [36] Li, G., Luican-Mayer, A., Abanin, D., Levitov, L. & Andrei, E. Y. Evolution of landau levels into edge states in graphene. _Nature communications_ 4, 1–7 (2013). * [37] Hu, Z.-X., Bhatt, R. N., Wan, X. & Yang, K. Realizing universal edge properties in graphene fractional quantum hall liquids. _Physical review letters_ 107, 236806 (2011). * [38] Spånslätt, C., Park, J., Gefen, Y. & Mirlin, A. D. Topological classification of shot noise on fractional quantum hall edges. _Physical review letters_ 123, 137701 (2019). * [39] Srivastav, S. K. _et al._ Universal quantized thermal conductance in graphene. _Science advances_ 5, eaaw5798 (2019). * [40] Sahu, M. R. _et al._ Enhanced shot noise at bilayer graphene–superconductor junction. _Physical Review B_ 100, 235414 (2019). * [41] Paul, A. K. _et al._ Interplay of filling fraction and coherence in symmetry broken graphene pn junction. _Communications Physics_ 3, 1–7 (2020). * [42] Sahu, M. R. _et al._ Quantized conductance with non-zero shot noise as a signature of andreev edge state. _arXiv preprint arXiv:2105.13070_ (2021). * [43] Park, J., Mirlin, A. D., Rosenow, B. & Gefen, Y. Noise on complex quantum hall edges: Chiral anomaly and heat diffusion. _Phys. Rev. B_ 99, 161302 (2019). * [44] Schmidt, D., Schoelkopf, R. & Cleland, A. Photon-mediated thermal relaxation of electrons in nanostructures. _Physical review letters_ 93, 045901 (2004). * [45] Gutman, D. B. _et al._ Energy transport in the anderson insulator. _Phys. Rev. B_ 93, 245427 (2016). * [46] Rosenblatt, A. _et al._ Energy relaxation in edge modes in the quantum hall effect. _Physical Review Letters_ 125, 256803 (2020). * [47] Purdie, D. _et al._ Cleaning interfaces in layered materials heterostructures. _Nature communications_ 9, 1–12 (2018). * [48] Pizzocchero, F. _et al._ The hot pick-up technique for batch assembly of van der waals heterostructures. _Nature communications_ 7, 1–10 (2016). * [49] Kim, Y., Herlinger, P., Taniguchi, T., Watanabe, K. & Smet, J. H. Reliable postprocessing improvement of van der waals heterostructures. _ACS nano_ 13, 14182–14190 (2019). * [50] Kane, C., Fisher, M. P. & Polchinski, J. Randomness at the edge: Theory of quantum hall transport at filling $\nu$= 2/3. _Physical review letters_ 72, 4129 (1994). ## 1 Methods ### 1.1 Device fabrication and measurement scheme: For making encapsulated devices, we used standard dry transfer pick-up technique [47, 48]. Fabrication of these heterostructures involved mechanical exfoliation of hBN and graphite crystals on oxidized silicon wafer using the widely used scotch-tape technique. BLG and graphite flakes were exfoliated from natural graphite crystals. Suitable flakes were identified under the optical microscope. The thickness of top and bottom graphite were $\sim 5\,$nm and $\sim 20\,$nm, respectively, and the thickness of of the top and bottom hBN flakes were of the order of $\sim 20\,$nm. The smaller distance between graphite gate and BLG layer ($\sim 20\,$nm thick bottom hBN) was similar range to the magnetic length scale of our experiment at $10$T, implying a sharp confining potential at the physical edge of BLG. Details of the fabrication procedure are in SM(S1). The BLG channel area of the stack was microscopically ironed using an AFM (atomic force microscopy) tip in contact mode [49], to remove any atomic level strain or ripples or small bubbles from the channel area, which can arise due to stacking process. After this, for making contacts we used electron beam lithography (EBL). After EBL, reactive ion etching (mixture of CHF3 and O2 gas) was used to define the edge contact. Then, thermal deposition of Cr/Pd/Au (4/12/60 nm) was done in a evaporator chamber having base pressure of $\sim$ $1-2\times 10^{-7}$ mbar. The optical image of the two measured devices are shown in SM(S1). The schematic of the device and measurement set-up are shown in Fig. 1(c). All the measurements are done in a cryo-free dilution refrigerator having base temperature of $\sim 20$mK. The electrical conductance was measured using standard Lock-in technique. For $R_{xy}$, an ac current is injected at contact C (Fig. 1c), contact A is kept at ground, and we measure the potential difference across the contacts D and B. For $R_{xx}$, we inject current at C, contact D is kept at ground, and we measure the potential difference across the contacts A and B. The resistance value of $R_{xy}$ for $\nu=2/3$ is $\approx 39k\Omega=(3/2)h/e^{2}$, implying full charge equilibration among the counter-propagating eigenmodes. Under no charge equilibration, one would get very different value of the resistance according to Landauer-Buttiker formalism, see SM(S8) for detail. The noise is measured employing noise thermometry based on LCR resonant circuit at resonance frequency of $\sim 770$kHz and amplified by home made preamplifier at 4K followed by room temperature amplifier, and finally measured by a spectrum analyzer. The details of the noise measurement technique is mentioned in the SM(S1). ### 1.2 Theoretical calculation of noise: We assume the regime of strong charge equilibration along the edge segment, i.e., $L\gg l^{C}_{\rm eq}$, where $l^{C}_{\rm eq}$ is the charge equilibration length. Then, the dc noise $S$ generated due to inter-mode tunneling along this segment is given by $\displaystyle S$ $\displaystyle=\frac{2e^{2}}{hl^{C}_{\rm eq}}\frac{\nu_{-}}{\nu_{+}}(\nu_{+}-\nu_{-})\int_{0}^{L}dx\;\Lambda(x)e^{-\frac{2x}{l^{C}_{\rm eq}}}.$ Here, $h$ is the Planck constant, and $\nu_{+}$ and $\nu_{-}$ are the total filling factors associated with the downstream and upstream edge modes, respectively, with the bulk filling factor $\nu=\nu_{+}-\nu_{-}$. The exponential factor in the integral is a result of chiral charge transport, $\nu_{+}\neq\nu_{-}$, and implies that the dominant noise contribution comes from the noise spot—a region of size $\sim l^{C}_{\rm eq}$ near the contact that is located on the upstream side of the segment (the voltage probe where the noise is measured). The noise kernel $\Lambda(x)$ is calculated by assuming a thermally non- equilibrated regime. In this case, $\Lambda$ becomes $x$-independent within the edge segment, so that the $x$-integral is straightforwardly calculated, yielding for the $\nu=2/3$ edge the noise $\displaystyle S_{2/3}=\frac{2e^{2}}{9h}\Lambda(V,\Delta)\,,$ where the dependence of $\Lambda$ on the bias voltage $V$ and the interaction between edge modes (parameter $\Delta$) is noted. We take $\Delta\approx 1$, which corresponds to the strong-interaction fixed point [50], at which the heat equilibration length is much larger than the charge equilibration length [15], as observed experimentally. To determine the dependence of $\Lambda$ on the voltage, we first calculate effective temperatures of the downstream and upstream modes on the edge. They are found from the system of energy balance equations that include the Joule heating at the hot spot as well as a partial reflection of heat at interfaces between the interacting segment of the edge and the contact region. The contacts are modelled in terms of non-interacting 1 and 1/3 modes (see SM,S9). For $\Delta=1$, the corresponding reflection coefficient is $\mathcal{R}=1/3$. The resulting temperatures of the modes are $\displaystyle k_{B}T_{+}=0.13eV\,,\qquad\qquad k_{B}T_{-}=0.23eV\,.$ The noise kernel $\Lambda$ is now calculated by using the Green’s function formalism for the chiral Luttinger liquid and the Keldysh technique. Expressing the result in terms of the bias current $I_{SD}=(2e^{2}/3h)V$, we come to the final result given by Eq. (1) of the manuscript. An analogous calculation for $\nu=3/5$ edge yields $S_{I}=0.138\,eI_{SD}$, which is in a very good agreement with experiment too (see SM,S9). ## 2 Acknowledgements C.S., Y.G., and A.D.M. acknowledge support by DFG Grants MI 658/10-1 and MI 658/10-2, and by the German-Israeli Foundation Grant No. I-1505-303.10/2019. Y.G. acknowledges support by the Helmholtz International Fellow Award, and by DFG RO 2247/11-1, and CRC 183 (project C01), and the Minerva Foundation. C.S. further acknowledges funding from the Excellence Initiative Nano at Chalmers University of Technology. K.W. and T.T. acknowledge support from the Elemental Strategy Initiative conducted by the MEXT, Japan and the CREST (JPMJCR15F3), JST. A.D. thanks the Department of Science and Technology (DST), India for financial support (DSTO-2051) and acknowledges the Swarnajayanti Fellowship of the DST/SJF/PSA-03/2018-19. R.K. and S.K.S acknowledge Inspire fellowship, DST and Prime Minister’s Research Fellowship (PMRF), Ministry of Education (MOE), for financial support, respectively. ## 3 Author contributions R.K. and S.K.S. contributed to device fabrication, data acquisition and analysis. A.D. contributed in conceiving the idea and designing the experiment, data interpretation and analysis. K.W and T.T synthesized the hBN single crystals. C.S., A.D.M. and Y.G. contributed in development of theory, data interpretation, and all the authors contributed in writing the manuscript. See pages - of Suplementary_Information.pdf
arxiv-papers
2021-07-27T06:09:52
2024-09-04T03:07:20.690367
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Ravi Kumar, Saurabh Kumar Srivastav, Christian Sp{\\aa}nsl\\\"att, K.\n Watanabe, T. Taniguchi, Yuval Gefen, Alexander D. Mirlin, and Anindya Das", "submitter": "Ravi Kumar", "url": "https://arxiv.org/abs/2107.12616" }
2107.12617
# VIPose: Real-time Visual-Inertial 6D Object Pose Tracking Rundong Ge and Giuseppe Loianno The authors are with the New York University, Tandon School of Engineering, Brooklyn, NY 11201, USA. email: {rundong.ge, loiannog}@nyu.edu.This work was supported by Qualcomm Research, the Technology Innovation Institute, Nokia, NYU Wireless, and the young researchers program ”Rita Levi di Montalcini” 2017 grant PGR17W9W4N. ###### Abstract Estimating the 6D pose of objects is beneficial for robotics tasks such as transportation, autonomous navigation, manipulation as well as in scenarios beyond robotics like virtual and augmented reality. With respect to single image pose estimation, pose tracking takes into account the temporal information across multiple frames to overcome possible detection inconsistencies and to improve the pose estimation efficiency. In this work, we introduce a novel Deep Neural Network (DNN) called VIPose, that combines inertial and camera data to address the object pose tracking problem in real- time. The key contribution is the design of a novel DNN architecture which fuses visual and inertial features to predict the objects’ relative 6D pose between consecutive image frames. The overall 6D pose is then estimated by consecutively combining relative poses. Our approach shows remarkable pose estimation results for heavily occluded objects that are well known to be very challenging to handle by existing state-of-the-art solutions. The effectiveness of the proposed approach is validated on a new dataset called VIYCB with RGB image, IMU data, and accurate 6D pose annotations created by employing an automated labeling technique. The approach presents accuracy performances comparable to state-of-the-art techniques, but with the additional benefit of being real-time. ## I Introduction Tracking the 6D pose of objects from RGB image sequences, (i.e., estimating 3D translation and rotation of objects with respect to the camera in each frame), is an important task in various robotics applications. This can boost robots’ navigation performances in various outdoor and indoor settings to solve complex tasks such as inspection, mapping, and search and rescue. It can also be used in object manipulation tasks for planning and grasping, aerial cinematography to track moving targets as well as in scenarios beyond robotics such as Virtual Reality (VR) and Augmented Reality (AR). Estimating the 6D pose of objects from a single RGB image has been extensively studied. Traditional methods match objects’ keypoints across images and 3D object models [1, 2, 3]. Recently deep learning-based methods have significantly improved the accuracy and robustness of pose estimation [4, 5, 6, 7, 8, 9, 10, 11]. Several single image pose estimation methods are real- time ($30$ Hz) whereas the accuracy is limited [5, 11]. Furthermore, these methods ignore the temporal and spatial information across consecutive image frames and strictly focus on single-view pose estimation. This may lead to inconsistent pose estimations across consecutive frames. Figure 1: Visual-Inertial 6D object pose tracking (top). Speed-accuracy benchmark on our VIYCB dataset with respect to state-of-the-art solutions (bottom). Recent RGB-based 6D object pose tracking methods achieved good tracking performances [9, 12]. However, these methods are not robust to severe occlusions, which enforce the re-initialization of the pose tracking process each time this event occurs. Re-initialization is usually performed by an accurate 6D pose estimation method, which is computationally expensive. Therefore, the speed of these approaches is quite limited and prevents their application in real-time scenarios. To overcome the aforementioned drawbacks, we propose a novel DNN architecture, which combines Inertial Measurement Unit (IMU) data with camera images. The IMU has been widely used in the robotics field for localization and navigation. Recent research [13, 14] show that IMU data can be processed by a trained DNN to predict the velocity, which can be leveraged to resolve the camera localization problem. Therefore, the IMU sensor can provide useful information on the camera motion. In our case, we exploit this information to achieve accurate object pose tracking even under severe occlusions. In addition, the joint learning process on images and IMU data leads to an efficient representation that enables robust real-time pose tracking. Figure 2: Pose Tracking Workflow. At time t, the camera provides the image observation $I_{t}$. The 3D model of the object and the pose estimation of last time $\bm{\xi}_{t-1}$ are used to render $I_{t-1}^{R}$. $I_{t}$ and $I_{t-1}^{R}$ are both cropped by an enlarged bounding box (illustrated in Fig. 3) and resized to half of original resolution. The IMU buffer provides the recent $K$ IMU measurements. The pre-processed image pair and the IMU sequence are fed into the VIPose network to predict the relative pose $\Delta\bm{\xi}_{t}$ which is combined with $\bm{\xi}_{t-1}$ to obtain the object pose estimation $\bm{\xi}_{t}$ at this frame. This work presents multiple contributions. First, we propose the first object pose tracking method that fuses camera and IMU data to address the challenge of pose tracking of objects in complex scenes that include objects’ occlusions. Second, our approach speeds up the pose tracking problem by leveraging IMU data and inferring the overall pose by propagating and combining relative pose estimation across consecutive frames. Finally, we experimentally validate our approach on collected dataset including RGB images and IMU data that is generally not available in existing datasets. To overcome the well-known difficult task of generating 6D pose annotations, an automated labeling technique is also introduced to collect enough training and testing data thus significantly reducing manually labeling effort. Experimental results show that the proposed approach achieves a comparable result with respect to existing state-of-the-art solutions, while running significantly faster and achieving real-time performance (i.e $50.2$ Hz). The paper is organized as follows. In Section II, we review related work on 6D pose estimation and tracking, as well as learning techniques for localization based on IMU data. Section III introduces the proposed tracking pipeline and the VIPose network. Section IV presents extensive experimental results on our VIYCB dataset. Section V concludes the work and presents future directions. ## II Related Work 6D Pose Estimation: Traditionally, the 6D pose of an object in a single image is estimated with template matching methods, where feature points in an image are matched with the corresponding 3D model feature points. The 6D object pose can then be estimated by solving 2D-3D correspondences of these local features using the PnP algorithm [1]. Recently, deep learning-based methods have surged in popularity. SSD-6D [4] extends the SSD object detector to 6D pose estimation by adding a viewpoint classification branch. [5] adopts the YOLO network to detect 3D bounding box corners of objects in images and recover the 6D pose by again solving a PnP problem. PoseCNN [8] proposes an end-to-end framework to perform semantic segmentation and predict 3D rotation and translation. Conversely, DeepIM [9] adopts the FlowNetSimple network [15] to refine the estimation of single image 6D pose detection methods by iteratively predicting the relative pose from the rendered previous pose to the current image observation until the iterative pose increment is small enough. Generally, adopting 6D pose estimation methods to estimate 6D pose for each frame in videos ignores temporal information which can be useful to improve the speed and accuracy of the pose estimation process without performing estimation at each frame. 6D Pose Tracking: Our work is closely related to recent advances in RGB-based 6D object pose tracking. PWP3D [16] proposes to track the object pose by optimizing the projected contour of the 3D model of the object. [17] further improves [16] with a novel optimization scheme and GPU parallelization. Then [18] proposes to improve pose tracking using a temporally local color histogram. Recently, [19] adopts a deep neural network to predict the pose difference between consecutive frames. PoseRBPF [12] proposes a Rao- Blackwellized particle filter approach for 6D pose tracking, which decouples 3D rotation and 3D translation and takes the uncertainty and object symmetry into account, achieving state-of-the-art performances on the YCB Video Dataset. DeepIM [9] can be extended to perform pose tracking by predicting the relative transformation between two consecutive frames. However, these methods are still not robust to severe occlusions and re-initialization is required when the tracking is lost. [20] proposes a novel network for 6D pose tracking on RGB-D data. It disentangles feature encoding to reduce the domain gap in simulation and reality and only uses synthetic data for training. This method performs well on RGB-D data whereas in our work we focus on the more challenging scenarios where only RGB images are available without the depth information. Data-driven IMU Localization: Traditionally, IMU data can be processed by some filter-based approach for localization. In recent years, deep learning methods have been applied to regress localization information directly from IMU data. VINet [21] proposes the first end-to-end system for visual-inertial odometry, which adopts an LSTM [22] network to process IMU input across image frames and a FlowNet network to process image pairs. The visual-inertial fusion is obtained by concatenating the IMU and visual feature vectors. IONet [23] proposes an LSTM network to predict relative displacement in 2D and concatenates the predictions to infer the position relying only on the IMU input. RoNIN [13] rotates the IMU data into a gravity-aligned frame and predicts the average 2D velocity over a sequence of IMU data employing a 1D ResNet network. TLIO [14] adopts 1D ResNet network as well, but to regress 3D displacements and corresponding uncertainties with a tightly-coupled Extended Kalman Filter framework for state estimation. Our work closely relates to the aforementioned works on IMU data using 1D ResNet, but we focus on object pose and tracking problems and not on camera localization. ## III Approach The goal of the pose tracking problem is to estimate the 6D pose of the object with respect to the camera frame $\bm{\xi}_{t}\in SE(3)$ at time $t,\leavevmode\nobreak\ t\in\\{1,2,\cdots,N\\}$ given * • A 3D CAD model of the object * • The initial pose of the object $\bm{\xi}_{0}\in SE(3)$ which can be obtained by any 6D pose estimation methods * • A sequence of RGB images $I_{j},\leavevmode\nobreak\ j\in\\{0,1,\cdots,N\\}$ * • A sequence of IMU data $G_{k},\leavevmode\nobreak\ k\in\\{0,1,\cdots,M\\}$, where $G_{k}$ is a $6$ dimension vector consisting of the acceleration and angular velocity measurements along the three Cartesian axes of the IMU frame In this section, we first provide a general overview of the pose tracking workflow that includes a pre-processing stage of raw image and IMU input prior to their use by the VIPose DNN. We describe afterward our novel VIPose DNN that infers the relative pose between consecutive frames by combining two consecutive images and a sequence of IMU data. The final object pose is then obtained by combining the relative transformations across consecutive frames. ### III-A Pose Tracking Workflow The pose workflow of our pipeline at time $t$ is illustrated in Fig. 2. The camera provides the image observation $I_{t}$ and the IMU gives the acceleration and angular velocity. The image pre-processing is achieved in three main steps: rendering, cropping, and resizing and it is followed by an IMU pre-processing step. #### III-A1 Rendering First, we render an RGB image $I_{t-1}^{R}$ as the reference image of the last frame using the 3D model of the object and the estimated 6D pose of the last frame $\bm{\xi}_{t-1}$ to provide the target object to track. The rendering process extracts the object information from the cluttered scene. It is performed by placing the 3D model of the object at the center of a scene with a black background and projecting an RGB image at the viewpoint defined by the pose $\bm{\xi}_{t-1}$, as illustrated in Fig. 3. #### III-A2 Cropping Due to the small object size in the raw image, it can be difficult to extract useful features for matching across frames. Inspired by [9], we address this issue by using an enlarged bounding box (white box) as illustrated in Fig. 3 to crop both the rendered image $I_{t-1}^{R}$ and the image observation $I_{t}$. To obtain such bounding box, we first estimate the size of the object in the rendered image using the 2D projection of the $8$ corners of the corresponding 3D object model $p_{i},\leavevmode\nobreak\ i\in{1,2,\cdots,8}$ as depicted with yellow points in Fig. 3 $\displaystyle x_{\text{size }}$ $\displaystyle=\max_{i}\left(p_{{i}_{x}}\right)-\min_{i}\left(p_{{i}_{x}}\right)$ $\displaystyle y_{\text{size }}$ $\displaystyle=\max_{i}\left(p_{{i}_{y}}\right)-\min_{i}\left(p_{{i}_{y}}\right)$ The enlarged bounding box is centered at the 2D projection of the center of the 3D model (depicted with the green point in Fig. 3) and keep the same aspect ratio of the input image. The height $h$ and width $w$ of the enlarged bounding box are obtained as $\displaystyle h$ $\displaystyle=\lambda\cdot\max\left(x_{\text{size }}/r,y_{\text{size }}\right)$ $\displaystyle w$ $\displaystyle=\lambda\cdot\max\left(x_{\text{size }},y_{\text{size }}\cdot r\right)$ where $r$ is the aspect ratio of the original image and $\lambda$ denotes the expand ratio to ensure the box contains the object in both the rendered image and the new image. Figure 3: Visualization of Rendering and Cropping. The object is rendered using the 3D model of the object and estimated 6D pose. The 2D projection of the center and the 8 corners of the 3D model are illustrated as a green point and yellow points, respectively. The red box defines the size of the rendered object $x_{size}$ and $y_{size}$. The white box represents the enlarged bounding box which is centered at the green point with width $w$ and height $h$. #### III-A3 Resizing Subsequently, we resize the cropped image pair to obtain more details. The cropped image pair is resized to a fixed resolution which is half of the original image size to reduce computation in the network. At the training stage, this enables a larger batch size for faster convergence of the training process. At the testing stage, this significantly reduces the running time of the system without compromising the accuracy. The resized image pair is used as the visual input to the network. Figure 4: VIPose Network Architecture. The blue blocks represent the FlowNetC- based visual branch that produces the visual feature. The green block represents the 1D ResNet-based inertial branch that produces the inertial feature. The visual and inertial feature are fused by concatenating two feature vectors and provide a multi-modal feature for relative pose estimation. The orange blocks represent the output branch that directly regresses the relative pose between the two consecutive frames. #### III-A4 IMU pre-processing After the image pair is pre-processed, we pre-process the IMU data as the inertial input to the network. An IMU buffer is designed as a queue that stores the most recent $K$ IMU measurements. The choice of $K$ can vary according to the frequency of the IMU input and the speed of the camera for different applications. When the new image observation arrives, the overall data in the IMU buffer is employed as input to the network and is represented by a $K\times 6$ tensor. The IMU sequence is rotated to a heading-agnostic coordinate frame from the IMU frame using ground-truth orientation directly from the device similar to [13]. The heading-agnostic coordinate frame is defined as a coordinate frame whose Z-axis is aligned with gravity and is consistent through the sequence. The pre-processed image pair and IMU sequence are fed into the VIPose network to predict the relative object pose $\Delta\bm{\xi}_{t}\in SE(3)$ between the images $I_{t-1}^{R}$ and $I_{t}$. Then the 6D pose of the object in current image $\bm{\xi}_{t}$ is obtained as $\bm{\xi}_{t}=\Delta\bm{\xi}_{t}\otimes\bm{\xi}_{t-1}$, where $\otimes$ is matrix multiplication operation. The tracking process is repeated until the 6D pose of the last image is obtained. In general, at time $t$, it is helpful to use the rendered image $I_{t-1}^{R}$ instead of the image observation $I_{t-1}$ as the reference image of the last frame for pose tracking. To further clarify this aspect, if the estimated object pose $\bm{\xi}_{t-1}$ is inaccurate, there is a mismatch between the object pose $\bm{\xi}_{t-1}$ and the corresponding object observation in the image $I_{t-1}$ since the pose $\bm{\xi}_{t-1}$ is affected by estimation drift. Conversely, the rendered image $I_{t-1}^{R}$ is a completely new image generated using the estimated object pose $\bm{\xi}_{t-1}$ and it does not suffer from the aforementioned observation issue. Therefore, estimating the relative pose between $I_{t-1}^{R}$ and $I_{t}$ is agnostic to the pose drift and contributes to reducing the global object pose estimation drift. ### III-B VIPose Network The proposed network architecture is illustrated in Fig. 4. The network consists of a visual branch that takes as input the processed image pair $I_{t-1}^{R}$ and $I_{t}$, an inertial branch that extracts features from the IMU sequence, and an output branch that predicts the relative pose $\Delta\bm{\xi}_{t}$. The visual branch (the blue block in Fig. 4), is based on FlowNet-C network [15] to extract visual features from the input image pair and we only adopt the convolutional layers of the original FlowNet-C network. The network is pre-trained to predict the optical flow between a pair of images. The representation of optical flow is considered useful for relative pose estimation as proved in [9]. The first $3$ convolution layers extract low- level features from the two input images separately and produce two feature maps for the correlation layer that is responsible to compute the patch-wise similarity and therefore find the correspondence between the image pair. Then the last $6$ convolutional layers extract high-level features and reduce the size of the feature map. The feature map output of the last convolution layer is flattened to the visual feature vector for later feature fusion. The inertial branch (the green block in Fig. 4) instead adopts the 1D version of the standard ResNet-18 network [24] and takes as input the IMU sequence, which is the $K\times 6$ tensor from the IMU buffer as previously specified. Inspired by [13], we employ a 1D ResNet which is pre-trained to predict the average 2D velocity given a sequence of IMU inputs. This has shown to have better performances with respect to other network architectures including LSTM [22] and Temporal Convolution Network [25]. The inertial branch initializes with pre-trained weights from [13]. Similarly, the output of the last 1D Convolution layer is flattened to the inertial feature vector. The visual feature and inertial feature are fused by concatenating the two feature vectors, which provide a multi-modal feature for regressing the relative transformation. The inertial feature provides useful information on camera motion for inferring the relative pose when the visual information of the target object is limited like for severe occlusions cases. The output branch (the orange block in Fig. 4) is a multi-layer perceptron that takes as input the fused feature vector and outputs the relative pose between the two frames. It contains two fully-connected layers with $256$ dimensions, followed by two separate fully-connected layers for predicting the rotation and translation, respectively. The representation of the relative pose is crucial to the performance of the network. We adopt the se(3) representation in [20], where $\mathbf{v}=\left[\mathbf{t},\mathbf{w}\right]^{\top}\in se(3)$, such that its pseudo-exponential mapping lies in $SE(3)$ $\Delta\bm{\bm{\xi}}=\text{pseudo- exp}(\mathbf{v})=\left[\begin{array}[]{ll}\mathbf{R}&\mathbf{t}\\\ \mathbf{0}^{\top}&1\end{array}\right]\in SE(3),$ (1) where $\mathbf{R}=\mathbf{I}_{3\times 3}+\frac{\left[\mathbf{w}\right]_{\times}}{|\mathbf{w}|}\sin(|\mathbf{w}|)+\frac{\left[\mathbf{w}\right]_{\times}^{2}}{|\mathbf{w}|^{2}}\left(1-\cos\left(|\mathbf{w}|\right)\right),$ and $[\mathbf{w}]_{\times}$ is the skew-symmetric matrix. The last two output layers are used to directly regress $\mathbf{w}$ and $\mathbf{t}$ and the prediction is then used to compute the relative pose $\Delta\bm{\xi}$. The network is trained end-to-end considering the following $L_{2}$ loss $\mathcal{L}=\lambda_{1}\cdot\left\|\mathbf{w}-\mathbf{w}_{gt}\right\|_{2}+\lambda_{2}\cdot\left\|\mathbf{t}-\mathbf{t}_{gt}\right\|_{2},$ (2) where $\lambda_{1},\lambda_{2}$ is the loss weight for rotation and translation, and $w_{gt},t_{gt}$ denote the ground-truth relative pose. ## IV Experimental Results In this section, we first introduce the VIYCB dataset and the automatic labeling technique. We describe afterward the training procedure and implementation details. We present the evaluation metrics and result on the VIYCB dataset lastly. ### IV-A Dataset Figure 5: Left is the 5 YCB objects used in our dataset. Right is the quadrotor with the camera and IMU (hardware synchronized) for collecting the raw data. The grey markers on the objects and the quadrotor are used by the Vicon motion capture system for localization. To train and validate our method, we collect a video dataset named VIYCB dataset with RGB images, IMU data, and accurate 6D pose annotations. The dataset collection is conducted in the new indoor testbed $10\times 5\times 4\leavevmode\nobreak\ $\mathrm{m}^{3}$$ at the ARPL lab at New York University. Fig. 5 shows the objects and the quadrotor equipped with a Qualcomm® SnapdragonTM board [26] that we employed to collect the dataset. We use this device because the IMU and camera sensors are hardware synchronized. The objects in our experiment are $5$ of the YCB objects [27] which are widely accessible and cover different colors, shapes, scales, and object symmetries. We adopt an automatic labeling technique leveraging a Vicon111www.vicon.com motion capture system to obtain the 6D pose annotation of all objects in each frame and save the effort of manually annotating the 6D pose of the objects. The Vicon system outputs the position and orientation of the objects and the camera in the Vicon world frame at $100\leavevmode\nobreak\ $\mathrm{H}\mathrm{z}$$. The ground-truth 6D pose annotation is then obtained by transforming the 6D pose of the objects in the world frame to the camera frame. For each video, the 5 objects are placed closely in different arrangements which creates severe occlusions and even complete occlusions. The data is collected by moving around the objects with a handheld quadrotor. The RGB images ($480\times 640$ resolution) are recorded at around $25$ Hz, whereas the IMU sensor data is collected at $200$ Hz. The IMU orientation of the quadrotor is also recorded at $200$ Hz, similar to [13]. Generally, $8533$ images are used in training and $3142$ keyframes are used for evaluation. | PoseRBPF 50 | PoseRBPF 100 | DeepIM | VIPose (Ours) ---|---|---|---|--- Objects | ADD | ADD-S | ADD | ADD-S | ADD | ADD-S | ADD | ADD-S 003_cracker_box | 65.99 | 82.39 | 66.85 | 83.10 | 77.48 | 87.62 | 75.66 | 86.84 004_sugar_box | 62.29 | 81.04 | 63.19 | 82.05 | 78.92 | 88.22 | 74.46 | 86.27 005_tomato_soup_can | 55.10 | 78.64 | 56.36 | 80.04 | 76.22 | 87.07 | 71.54 | 82.79 006_mustard_bottle | 56.93 | 76.02 | 57.55 | 78.09 | 75.23 | 85.89 | 70.87 | 82.12 051_large_clamp | 44.42 | 66.18 | 45.22 | 67.60 | 62.37 | 79.51 | 59.68 | 78.07 ALL | 56.95 | 76.85 | 57.83 | 78.20 | 74.04 | 85.66 | 70.44 | 83.22 Speed (fps) | 21.9 | 12.3 | 8.7 | 50.2 Re-init (times) | 25 | 22 | 18 | 9 Table I: Result on VIYCB dataset. ADD and ADD-S are short for AUC (Area Under Curve) of ADD and ADD-S. Figure 6: Qualitative Result of VIPose. The first row and the second row illustrate pose tracking of two objects, 003_cracker_box and 004_sugar_box, under severe occlusions. The target object is rendered in the scene using the estimated 6D pose of our method. This demonstrates the robustness of the proposed approach on handling the occlusion challenge. ### IV-B Architecture Implementation Details For network training, we adopt a two-step training strategy. We first train the visual branch only. Subsequently, we jointly train the visual, the inertial, and the output branches. The visual branch takes a pre-processed image pair as input, which contains a real image $I_{t}$ and a rendered image $I_{t-1}^{R}$. The training data consists of image pairs from collected data and synthetic data. For an image $I_{t}$ and corresponding ground-truth pose $\bm{\xi}_{t}$ in collected data, an image pair is generated by rendering a image $I_{t-1}^{R}$ with the ground- truth pose of the last frame $\bm{\xi}_{t-1}$, cropping both $I_{t-1}^{R}$ and $I_{t}$ with the enlarged bounding box introduced in Section III, and resizing the cropped image pair to $240\times 320$. In addition, we can generate synthetic image pairs to build a more diverse training dataset that covers a wider range of relative pose distributions. Instead of using ground-truth pose of last frame $\bm{\xi}_{t-1}$, we randomly sample a relative pose $\Delta\bm{\xi}_{t}^{*}$ and compute the object pose in the last frame $\bm{\xi}_{t-1}^{*}$ which is used to render $I_{t-1}^{R*}$. The image pair $I_{t-1}^{R*}$ and $I_{t}$ are then cropped and resized as described above. The sampled relative pose $\Delta\bm{\xi}_{t}^{*}$ consists of a rotation part and a translation part. The rotation is obtained considering three Euler angles sampled from a Gaussian distribution $\mathcal{N}\sim\left(0,10^{2}\right)$. For the translation part, each of the three components is sampled as well from a Gaussian distribution $\mathcal{N}\sim\left(0,0.02^{2}\right)$. We only train the visual branch and we leverage a pseudo output branch to train the visual branch to adapt the change in the the dimension of the first fully-connected layer of the output branch. Each training batch consists of image pairs from both collected data ($1/8$) and synthetic data ($7/8$) and the batch size is set to 64. The visual branch and the pseudo output branch are trained using an SGD optimizer for $30$ epochs with an initial learning rate of $0.001$. A cosine annealing scheduler reduces the learning rate after each epoch, to $0.0001$ at the end. Subsequently, we jointly train the visual branch, the inertial branch, and the output branch. The training data in this step is only the image pairs from collected data with corresponding IMU sequence due to the absence of IMU sequence in the synthetic data. The length of the IMU buffer $K$ is set to $200$ for both training and testing, which means it contains all IMU data within the last second. The ground-truth orientation is used to rotate the IMU data to the heading-agnostic coordinate frame from the IMU frame in both training and testing following [13]. The pseudo output branch is replaced with a new output branch with randomly initialized weights and bias. The network is trained using an SGD optimizer for another $20$ epochs with an initial learning rate of $0.0001$ for both the visual and the inertial branch and $0.001$ for the output branch. Similarly, a cosine annealing scheduler reduces the learning rate after each epoch, to $0.00001$ and $0.0001$ at the end, respectively. To avoid the over-fitting issue during training, we adopt data augmentation strategies including random HSV shift, Gaussian noise, and Gaussian blur on the real image $I_{t}$ in each image pair in both training steps. The expand ratio $\lambda$ is fixed to $1.4$ in the cropping step. The loss weight $\lambda_{1}$ and $\lambda_{2}$ is always set to $1$. A seperate model is trained for each object. The rendering process is implemented in OpenGL. All network training and testing are performed on an NVIDIA RTX 2080 Ti GPU. ### IV-C Evaluation For pose estimation evaluation, We adopt the ADD [3] and ADD-S [8] metrics ADD $\displaystyle=\frac{1}{m}\sum_{\mathbf{x}\in\mathcal{M}}\left\|(\mathbf{R}\mathbf{x}+\mathbf{T})-(\tilde{\mathbf{R}}\mathbf{x}+\tilde{\mathbf{T}})\right\|,$ ADD-S $\displaystyle=\frac{1}{m}\sum_{\mathbf{x}_{1}\in\mathcal{M}}\min_{\mathbf{x}_{2}\in\mathcal{M}}\left\|\left(\mathbf{R}\mathbf{x}_{1}+\mathbf{T}\right)-\left(\tilde{\mathbf{R}}\mathbf{x}_{2}+\tilde{\mathbf{T}}\right)\right\|,$ where $\mathcal{M}$ represents the points of the 3D object model, $m$ denotes the number of the points $\mathcal{M}$, $(\mathbf{R},\mathbf{T})$ and $(\tilde{\mathbf{R}},\tilde{\mathbf{T}})$ denote the rotation and translation of ground-truth pose and estimated pose, respectively. The ADD metric computes the average distance between the transformed 3D points using ground-truth pose and estimated pose, respectively. The ADD-S metric is specifically designed for symmetric objects where the average distance is computed by closest point distance. The estimated pose is considered correct when the result of ADD or ADD-S is smaller than a given threshold. We compute the AUC (Area Under Curve) of ADD and ADD-S results where the threshold varies for the average distance and the maximum threshold is set to $10$ cm. ### IV-D Results on VIYCB Dataset Table I shows the pose tracking results on the VIYCB dataset. The proposed approach is compared with other state-of-the-art RGB-based object pose tracking methods including DeepIM [9] and PoseRBPF [12]. All compared methods use the ground-truth pose for initialization at start. VIPose and DeepIM are re-initialized with ground-truth pose when the average relative pose prediction in the last $10$ frames is larger than a threshold, specifically its rotation greater than $10$ degrees or its translation greater than $1$ cm. PoseRBPF with $50$ particles and $100$ particles are evaluated for comparison. PoseRBPF utilizes the ground-truth pose to initialize its detection center and motion prior. It is re-initialized when the target object is heavily occluded, which is detected when the maximum similarity between the feature embedding and the codebooks among all particles is lower than a pre-defined threshold ($0.6$ in the presented case). Since the objects in our dataset are the subset of the YCB video dataset, we use the pretrained models of DeepIM and PoseRBPF to perform pose tracking on our VIYCB dataset for evaluation. In the experiment, for each object, we run each method to track the 6D pose of the object in all testing videos and we evaluate the aforementioned metrics on the keyframes. We also compare the speed of these methods using their average computation time for each frame. To evaluate the robustness of these methods, we compare the frequency of re-initialization operations in all testing videos and average it for each object class since most re-initialization operations are caused by heavy occlusions. Results in Table I show that the proposed method performs consistently better than PoseRBPF with $50$ particles and $100$ particles on all $5$ objects in terms of accuracy and speed. The accuracy of VIPose is comparable to the DeepIM approach, while our approach is substantially faster and runs at $50.2$ Hz compared to $8.7$ Hz of DeepIM. This indicates that VIPose is more suitable for real-time applications. The speed-accuracy trade-off is presented in Fig. 1. In terms of robustness to occlusions, VIPose only requires re-initialization every $349$ frames when the target object is completely occluded. PoseRBPF with $50$ and $100$ particles requires re-initialization more frequently for every $126$ frames and $143$ frames, whereas DeepIM on average every $174$ frames. This indicates that the proposed method is more robust to occlusion than previous methods and proves the effectiveness of the inertial feature in the pose tracking task. ## V Conclusion In this work, we proposed the first real-time RGB-based 6D pose tracking approach called VIPose DNN that combines inertial and camera information The results show that our method has comparable performance with respect to existing approaches while being real-time and robust to heavy occlusions. Furthermore, it provides remarkable pose estimation results for heavily occluded objects. Future works will consider how to extend this network to the multi-objects pose tracking task. Moreover, we would also like to investigate the use of adaptive feature fusion to better combine inertial and camera information in different scenarios to increase pose tracking accuracy and robustness to different testing scenarios without sacrificing the real-time capabilities of our approach. ## References * [1] A. Collet, M. Martinez, and S. S. Srinivasa, “The moped framework: Object recognition and pose estimation for manipulation,” _The international journal of robotics research_ , vol. 30, no. 10, pp. 1284–1306, 2011. * [2] S. Hinterstoisser, C. Cagniart, S. Ilic, P. Sturm, N. Navab, P. Fua, and V. Lepetit, “Gradient response maps for real-time detection of textureless objects,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 34, no. 5, pp. 876–888, 2011. * [3] S. Hinterstoisser, V. Lepetit, S. Ilic, S. Holzer, G. Bradski, K. Konolige, and N. Navab, “Model based training, detection and pose estimation of texture-less 3d objects in heavily cluttered scenes,” in _Asian conference on computer vision_. Springer, 2012, pp. 548–562. * [4] W. Kehl, F. Manhardt, F. Tombari, S. Ilic, and N. Navab, “Ssd-6d: Making rgb-based 3d detection and 6d pose estimation great again,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 1521–1529. * [5] B. Tekin, S. N. Sinha, and P. Fua, “Real-time seamless single shot 6d object pose prediction,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 292–301. * [6] A. Zeng, K.-T. Yu, S. Song, D. Suo, E. Walker, A. Rodriguez, and J. Xiao, “Multi-view self-supervised deep learning for 6d pose estimation in the amazon picking challenge,” in _2017 IEEE international conference on robotics and automation (ICRA)_. IEEE, 2017, pp. 1386–1383. * [7] G. Pavlakos, X. Zhou, A. Chan, K. G. Derpanis, and K. Daniilidis, “6-dof object pose from semantic keypoints,” in _2017 IEEE international conference on robotics and automation (ICRA)_. IEEE, 2017, pp. 2011–2018. * [8] Y. Xiang, T. Schmidt, V. Narayanan, and D. Fox, “Posecnn: A convolutional neural network for 6d object pose estimation in cluttered scenes,” 2018. * [9] Y. Li, G. Wang, X. Ji, Y. Xiang, and D. Fox, “Deepim: Deep iterative matching for 6d pose estimation,” _International Journal of Computer Vision_ , vol. 128, no. 3, pp. 657–678, 2020. * [10] S. Peng, Y. Liu, Q. Huang, X. Zhou, and H. Bao, “Pvnet: Pixel-wise voting network for 6dof pose estimation,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 4561–4570. * [11] Z. Li, G. Wang, and X. Ji, “Cdpn: Coordinates-based disentangled pose network for real-time rgb-based 6-dof object pose estimation,” in _Proceedings of the IEEE/CVF International Conference on Computer Vision_ , 2019, pp. 7678–7687. * [12] X. Deng, A. Mousavian, Y. Xiang, F. Xia, T. Bretl, and D. Fox, “Poserbpf: A rao-blackwellized particle filter for 6d object pose tracking,” _IEEE Transactions on Robotics (T-RO)_ , 2021. * [13] S. Herath, H. Yan, and Y. Furukawa, “Ronin: Robust neural inertial navigation in the wild: Benchmark, evaluations, & new methods,” in _2020 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 2020, pp. 3146–3152. * [14] W. Liu, D. Caruso, E. Ilg, J. Dong, A. I. Mourikis, K. Daniilidis, V. Kumar, and J. Engel, “Tlio: Tight learned inertial odometry,” _IEEE Robotics and Automation Letters_ , vol. 5, no. 4, pp. 5653–5660, 2020. * [15] A. Dosovitskiy, P. Fischer, E. Ilg, P. Hausser, C. Hazirbas, V. Golkov, P. Van Der Smagt, D. Cremers, and T. Brox, “Flownet: Learning optical flow with convolutional networks,” in _Proceedings of the IEEE international conference on computer vision_ , 2015, pp. 2758–2766. * [16] V. A. Prisacariu and I. D. Reid, “Pwp3d: Real-time segmentation and tracking of 3d objects,” _International journal of computer vision_ , vol. 98, no. 3, pp. 335–354, 2012. * [17] H. Tjaden, U. Schwanecke, and E. Schömer, “Real-time monocular segmentation and pose tracking of multiple objects,” in _European conference on computer vision_. Springer, 2016, pp. 423–438. * [18] H. Tjaden, U. Schwanecke, and E. Schomer, “Real-time monocular pose estimation of 3d objects using temporally consistent local color histograms,” in _Proceedings of the IEEE International Conference on Computer Vision_ , 2017, pp. 124–132. * [19] F. Manhardt, W. Kehl, N. Navab, and F. Tombari, “Deep model-based 6d pose refinement in rgb,” in _Proceedings of the European Conference on Computer Vision (ECCV)_ , 2018, pp. 800–815. * [20] B. Wen, C. Mitash, B. Ren, and K. Bekris, “se (3)-tracknet: Data-driven 6d pose tracking by calibrating image residuals in synthetic domains,” in _IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2020. * [21] R. Clark, S. Wang, H. Wen, A. Markham, and N. Trigoni, “Vinet: Visual-inertial odometry as a sequence-to-sequence learning problem,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 31, no. 1, 2017. * [22] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” _Neural computation_ , vol. 9, no. 8, pp. 1735–1780, 1997. * [23] C. Chen, X. Lu, A. Markham, and N. Trigoni, “Ionet: Learning to cure the curse of drift in inertial odometry,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 32, no. 1, 2018. * [24] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 770–778. * [25] S. Bai, J. Z. Kolter, and V. Koltun, “An empirical evaluation of generic convolutional and recurrent networks for sequence modeling,” _arXiv preprint arXiv:1803.01271_ , 2018. * [26] G. Loianno, C. Brunner, G. McGrath, and V. Kumar, “Estimation, control, and planning for aggressive flight with a small quadrotor with a single camera and imu,” _IEEE Robotics and Automation Letters_ , vol. 2, no. 2, pp. 404–411, April 2017. * [27] B. Calli, A. Singh, A. Walsman, S. Srinivasa, P. Abbeel, and A. M. Dollar, “The ycb object and model set: Towards common benchmarks for manipulation research,” in _2015 international conference on advanced robotics (ICAR)_. IEEE, 2015, pp. 510–517.
arxiv-papers
2021-07-27T06:10:23
2024-09-04T03:07:20.702099
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Rundong Ge, Giuseppe Loianno", "submitter": "Rundong Ge", "url": "https://arxiv.org/abs/2107.12617" }
2107.12623
# Anomalous distribution of particles in the presence of a fluctuating magnetic field Shrabani Mondal Department of Chemistry, University of Massachusetts Boston, Boston, MA 02125 L. R. Rahul Biswas Department of Chemistry, Visva-Bharati, Santiniketan, India, 731235 Bidhan Chandra Bag bidhanchandra.bag@visva- bharati.ac.in Department of Chemistry, Visva-Bharati, Santiniketan, India, 731235 ###### Abstract It seems to us that a stochastic system must be a nonlinear one to observe the phenomenon, noise induced transition. But in the present paper, we have demonstrated that the phenomenon may be observed even in a linear stochastic process where both deterministic and stochastic parts are linear functions of the relevant phase space variables. The shape of the stationary distribution of particles (which are confined in a harmonic potential) may change on increasing the strength of the applied fluctuating magnetic field. The probability density may vary non monotonically with an increase in the coordinate of a Brownian particle. Thus the distribution of particles may deviate strongly from the Boltzmann one and it is a unique signature of the fluctuating magnetic field. Then we are motivated strongly to study the distribution of particles in a nonlinear stochastic system where the Brownian particles are confined in a bi-stable potential energy field in the presence of the fluctuating magnetic field. With a relatively large strength of the fluctuating field, the distribution of particles may be a strange one where many islands may appear which are not expected from the given potential energy field. It may offer an explanation to describe the phenomenon, the reduction of the current in a semiconductor in the presence of a time dependent magnetic field. ###### pacs: 05.40.Jc,05.20.-y,89.70.Cf ## I Introduction Our common believe is that noise is a phenomenon which induces disorder. But there are situations where it plays a constructive role such as stochastic resonance [1, 2, 3, 4], coherence resonance [5], resonant activation [1, 6, 7, 8, 9, 10], Brownian ratchets [11, 12, 13, 14, 15], aggregation of Brownian particles [16, 17, 18, 19], noise-induced pattern formation [20, 21, 22], noise induced transitions [23, 24, 25, 26, 27, 28, 29], noise induced non equilibrium phase transitions [30, 31, 32, 33, 34], synchronization [35, 36] etc. In the present paper we address an issue related to the noise-induced transition. It has been considered in may contexts [23, 24, 25, 26, 27, 28, 29, 37, 38]. A noise-induced transition occurs if the stationary probability distribution (SPD) of the state variable is changed qualitatively as the noise intensity exceeds a critical value. The genetic model [24] and Hongler’s model [25] are relevant examples demonstrating this phenomenon. The relevant Langevin equation of motion for this kind of noise induced transition may be read as [26] $\dot{x}=f(x)+g_{1}(x)\zeta_{1}+g_{2}(x)\zeta_{2}$ (1) where $x$ corresponds to the coordinate of a Brownian particle which is driven by two noises, $\zeta_{1}$ and $\zeta_{2}$, respectively. In Refs. [26, 27], it has been shown that for a simple case where $g_{2}(x)=1$ and $g_{1}(x)$ is nonlinear function, $g_{1}(x)=b\frac{x^{4}}{1+x^{4}},b>0$ then the correlation between the two white noises may induce transition for $f(x)=-ax,a>0$ or $f(x)=-ax^{3}$. The multiplicative noise induces position dependent diffusion as well as drift terms. The potential energy function due to $f(x)$ may modify at the steady state with additional fixed point(s) by virtue of the multiplicative noise. Thus the multiplicative noise may induce transition in a non linear system [28]. Further modification of the potential energy, as well as the transition, may happen due to the cross correlation induced drift term [26, 27]. Thus for $g_{1}(x)=g_{2}(x)=1$, noise induced transition is not possible. It is apparent in the above examples that the multiplicative noise term (with the nonlinear function of coordinate) as well as modification of the potential energy function having new fixed point(s) is a necessary condition for the noise induced transition. But the multiplicative noise (with a linear function of coordinate) may induce transition in the nonlinear system without introducing new fixed points in the effective potential energy function at the steady state [29]. This transition is controlled by diffusion. Thus the necessary and sufficient condition to have the noise induced transition seems to us that the total system (deterministic plus stochastic) must be a nonlinear one [23, 24, 25, 26, 27, 28, 29, 37, 38]. A similar conclusion may be drawn for another related phenomenon, noise induced non equilibrium phase transition [30, 31, 32, 33, 34]. Then one may be surprised to know that the present study demonstrates the noise induced transition for the case where the total system is a line one. The stationary distribution of particles in the harmonic force field is a uni-modal one at relatively low strength of a fluctuating magnetic field (FMF). On further increase in the strength of the field, an island may appear (having center at the origin) which is surrounded by a shallow well. It is evident from the cross section (having tri-modal) of the particle distribution in two dimension space. The cross section becomes bi-modal at a relatively large strength of the field. At this condition, the island disappears. Keeping in mind the strange behavior of the particle distribution in a linear stochastic process we have studied a stochastic non linear system where a Brownian particle is confined in a bi- stable potential energy field in the presence of a fluctuating magnetic field. At low strength of the FMF the distribution of particles in space is Boltzmann type corresponding to the bi-stable potential energy field. On further increase in the strength of the field, an island may appear having a center at the unstable fixed point. It may be extended having $S$-shape (such that it avoids the stable fixed points) as the strength grows. At the same time, two more additional islands may appear which are located diagonally opposite to the $S$-shape island. This strange pattern may be more complex at the relatively large strength of the fluctuating magnetic field. Before leaving this section we would mention that in recent past the magnetic field has been considered in different contexts such as barrier crossing dynamics [10, 39, 40, 41, 42, 43, 44, 45, 46], non Markovian dynamics of a Brwonian particle in the presence of a magnetic field [44, 10, 46, 47, 48, 49, 50, 51], stochastic thermodynamics [52, 53], nonlinear dynamics [54] and others [55, 58, 59, 60]. The present study may be helpful to understand as well as control the conductivity of electrolytic materials. In the recent past, the study on ion conducting electrolytic materials is a very important area in physics and chemistry being driven by an ever-increasing demand for portable electronic devices. The materials have potential applications in a diverse range of all-solid-state devices, such as rechargeable lithium batteries, flexible electrochromic displays, and smart windows [61, 62, 63]. The properties of the electrolytes are tuned by varying chemical composition to a large extent and hence are adapted to the specific needs [64, 65]. High ionic conductivity is needed for optimizing the glassy electrolytes in various applications. It would be very interesting if one can tune the ionic conductivity according to specific need by a physical method. One may investigate the issue in the presence of the Lorentz force. Although a time independent magnetic field can not activate the particle to cross the barrier it may modulate the frequency of the dynamics. It is to be noted here that a time dependent magnetic field may introduce an induced electric field to activate the particle. Another way is the direct application of an electric field which may be helpful in the case when a very high rate of barrier crossing is necessary. In the very recent Refs. [39, 40, 41, 42, 43, 44, 45, 10, 46] it has been shown that the conductivity of an electrolytic material can be tuned by an applied magnetic field. Electron tunneling in quantum wire in the presence of a magnetic field has been studied in Ref. [39]. Tunneling ionization of impurity centers in semiconductors was investigated [40] in the presence of a magnetic field. The effect of a magnetic field on the electron transport of GaAs quantum wire was studied very recently [41] in the presence of an electric field. Based on the magneto-tunneling spectroscopy a noninvasive and nondestructive probe has been used to produce two-dimensional spatial images of the probability density of an electron confined in a self- assembled semiconductor quantum dot [42]. The technique exploits the effect of the classical Lorentz force on the motion of a tunneling electron. In this experiment extremum behavior is observed in the variation of the tunneling current with the magnetic field strength. A similar kind of behavior also has been reported in Refs. [43, 45] in the variation of the barrier crossing rate constant as a function of the strength of the time independent magnetic field (TIMF). This optimum behavior has been observed at a low damping regime [43, 45]. However, in Refs. [44, 46] it has been shown that one may tune the barrier crossing rate by virtue of fluctuating magnetic field. It is to be noted here that the current in the semiconductor may become small for a given amplitude of the oscillating magnetic field. This observation has been explained based on the phenomenon, dynamical localization. This phenomenon has been of growing interest [66] because of its very relevance in the response of the electron transport in mesoscopic systems to external fields [67]. In this context, the present study may be a very relevant one. Based on it one can account for the reduction of the current in the semiconductor. The formation of islands may reduce the conductivity of electrolytes in the presence of a time dependent magnetic field. The outline of the paper is as follows: In Sec. II we have presented the model. The distribution of charged particles in space for a linear system is demonstrated in Sec.III. In the next section, we have demonstrated the distribution of charged particles in space for a non linear system. The paper is concluded in Sec. IV. ## II The model In the present study, we have considered that a Brownian particle experiences a fluctuating magnetic field (B) along $z$-direction, i.e., $\textbf{B}=(0,0,B(t))$. $B(t)$ can be expressed as $B(t)=B_{0}+B_{f}(t)\;\;.$ (2) Here $B_{f}(t)$ is the fluctuating part of the $B(t)$. It may be due to the fluctuation of the current in the electrical magnet. Then the Langevin equations of motion with this field can be written as [10, 46, 68] $m\dot{u_{x}}=-\frac{\partial V(x,y)}{\partial x}-\gamma_{0}mu_{x}+(\Omega_{0}+\eta(t))mu_{y}+\frac{\dot{\eta}my}{2}+f_{x}(t)$ (3) and $m\dot{u_{y}}=-\frac{\partial V(x,y)}{y}-\gamma_{0}mu_{y}-(\Omega_{0}+\eta(t))mu_{x}-\frac{\dot{\eta}mx}{2}+f_{y}(t)$ (4) The above equations are corresponding to the motion in the $x-y$ plane. Here $u_{x}$ and $u_{y}$ are the components of velocity of the Brownian particle with mass, $m$. $-\frac{\partial V(x,y)}{x}$ and $-\frac{\partial V(x,y)}{y}$ in the above equations are the components of conservative force field which is derived from the potential energy, $V(x,y)$. $\gamma_{0}$ measures the strength of damping force due to thermal bath. The components of random force which is originated from the thermal bath are given by $f_{x}$ and $f_{y}$ corresponding to the motion along $x$ and $y$ directions, respectively. These are white Gaussian thermal noises, i.e., $\langle f_{x}(t)\rangle=\langle f_{y}(t)\rangle=0$ (5) and $\displaystyle\langle f_{x}(t)f_{x}(t^{\prime})\rangle=\langle f_{y}(t)f_{y}(t^{\prime})\rangle=2m\gamma_{0}k_{B}T\delta(t-t^{\prime})\;\;.$ (6) Here $k_{B}$ is the Boltzmann’s constant and $T$ is the temperature of the thermal bath. We now consider force from the magnetic field. $\Omega_{0}$ and $\eta(t)$ which are associated with the magnetic force correspond to the constant and random parts of the cyclotron frequency ($\Omega$, i.e, $\Omega=\Omega_{0}+\eta\;\;,$ (7) where $\Omega_{0}=\frac{qB_{0}}{m}$ (8) and $\eta(t)=\frac{qB_{f}(t)}{m}\;\;.$ (9) However, $\dot{\eta}$ in the force terms is due to the induced electric field, and it is the time derivative of $\eta(t)$. To avoid any confusion, we would mention here that the effect of the magnetic field due to the induced electric field may be insignificant compared to the applied magnetic field. A detailed discussion regarding this one may find in Ref. [68]. However, the time evolution of the fluctuating magnetic field is assumed to be as $\dot{\eta}=-\frac{\eta}{\tau}+\frac{\sqrt{D}}{\tau}\zeta(t)\;\;.$ (10) $D$, in the above equation, measures the strength of the fluctuating magnetic field and $\tau$ is the correlation time. $\zeta(t)$ in Eq. (10) corresponds to a white Gaussian noise having variance two. The two-time correlation function of the fluctuating field is given by $\langle\eta(t)\eta(t^{\prime})\rangle=\frac{D}{\tau}e^{\frac{-|t-t^{\prime}|}{\tau}}\;\;,$ (11) Thus $\eta(t)$ is the Ornstein-Uhlenbeck noise. In general it has been considered in the literature [4, 7, 8, 9, 10, 19, 29, 35, 36, 46, 48, 69, 70] to capture the essential feature of non-Markovian dynamics. We now consider the motion for the different choices for the potential energy function. In the following sections, we will explore the choices. ## III Noise induced transition in a linear stochastic system: a unique signature of the fluctuating magnetic field In this section, we consider that the Brownian motion is confined in the two dimensional harmonic potentials with the angular frequency $\omega$ and it can be read as $V(x,y)=\omega^{2}m(x^{2}+y^{2})/2\;\;\;.$ (12) Using Eqs. (10-12) into the Eqs. (3-4) we have $\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+(\Omega_{0}+\eta(t))u_{y}-\frac{\eta y}{2\tau}+\frac{\sqrt{D}y}{2\tau}\zeta(t)+f_{x}(t)$ (13) and $\dot{u_{y}}=-\omega^{2}y-\gamma_{0}u_{y}-(\Omega_{0}+\eta(t))u_{x}+\frac{\eta x}{2\tau}+\frac{\sqrt{D}x}{2\tau}\zeta(t)+f_{y}(t)\;\;\;.$ (14) In the Eqs.(13-14) we have used $m=1$. We will follow this in the rest of the part also. However, the fluctuating magnetic field induces an unusual type multiplicative noise. It is multiplied by velocity and coordinate, respectively. In the usual multiplicative noise driven process [26, 27, 28, 29], the noise is multiplied with the coordinate along which the Brownian particle experiences a random force. However, the above equations can be decoupled following Ref. [10] as follows $\displaystyle\dot{u_{x}}$ $\displaystyle=$ $\displaystyle-c^{\prime}(t)x-\gamma^{\prime}(t)u_{x}+(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(e^{-Kt}\alpha_{1}(t))-\Omega_{0}\frac{d}{dt}(L^{-1}u_{x})$ (15) $\displaystyle-$ $\displaystyle\Omega_{f}(t)\frac{d}{dt}(L^{-1}u_{x})-(L^{-1}u_{x})\frac{d}{dt}\Omega_{f}(t)-\frac{\dot{\eta}(t)}{2m}\frac{d}{dt}(L^{-1}x)-\frac{(L^{-1}x)}{2m}\frac{d}{dt}\dot{\eta}(t)$ $\displaystyle+$ $\displaystyle\frac{d}{dt}(\frac{L^{-1}f_{y}(t)}{m})]+\frac{\dot{\eta}}{2m}[e^{-Kt}\alpha_{1}(t)-\Omega_{0}L^{-1}u_{x}-\Omega_{f}(t)L^{-1}u_{x}$ $\displaystyle-$ $\displaystyle\frac{\dot{\eta}}{2m}L^{-1}x+\frac{L^{-1}f_{y}(t)}{m}]+\frac{f_{x}(t)}{m}$ and $\displaystyle\dot{u_{y}}$ $\displaystyle=$ $\displaystyle-c^{\prime}(t)y-\gamma^{\prime}(t)u_{y}-(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(e^{-Kt}\alpha_{1}(t))+\Omega_{0}\frac{d}{dt}(L^{-1}u_{y})$ (16) $\displaystyle+$ $\displaystyle\Omega_{f}(t)\frac{d}{dt}(L^{-1}u_{y})+(L^{-1}u_{y})\frac{d}{dt}\Omega_{f}(t)+\frac{\dot{\eta}(t)}{2m}\frac{d}{dt}(L^{-1}y)+\frac{(L^{-1}y)}{2m}\frac{d}{dt}\dot{\eta}(t)$ $\displaystyle+$ $\displaystyle\frac{d}{dt}(\frac{L^{-1}f_{x}(t)}{m})]-\frac{\dot{\eta}}{2m}[e^{-Kt}\alpha_{1}(t)+\Omega_{0}L^{-1}u_{y}+\Omega_{f}(t)L^{-1}u_{y}$ $\displaystyle+$ $\displaystyle\frac{\dot{\eta}}{2m}L^{-1}y+\frac{L^{-1}f_{x}(t)}{m}]+\frac{f_{y}(t)}{m}$ where $e^{-Kt}\alpha_{1}(t)$ [10] is the solution of the Eq.(13) at the limit, $\eta(t)=0$, $f_{y}(t)=0$, $D=0$ and $\Omega_{0}=0.0$. The other quantities are defined as $L=\frac{d^{2}}{dt^{2}}+\gamma_{0}\frac{d}{dt}+\omega^{2}\;\;\;,$ (17) $K=\frac{\gamma_{0}}{2}\;\;\;\;\;,$ (18) with $c^{\prime}(t)=\omega^{2}+\frac{\dot{\eta}}{4m^{2}}L^{-1}\dot{\eta}+\frac{(\Omega_{0}+\Omega_{f}(t))}{2m}\frac{d}{dt}(L^{-1}\dot{\eta})\;\;\;,$ (19) and $\displaystyle\gamma^{\prime}(t)=\gamma_{0}+\frac{\dot{\eta}}{2m}L^{-1}\Omega_{f}(t)+(\Omega_{0}+\Omega_{f}(t))[\frac{d}{dt}(L^{-1}\Omega_{f}(t))+(L^{-1}\Omega_{f}(t))\frac{d}{dt}+\frac{L^{-1}\dot{\eta}(t)}{2m}]\;\;\;.$ (20) Figure 1: Demonstration of distribution of charged particles in space for a linear system for the parameter set, $\omega^{2}=2,\Omega_{0}=7.0$, $\tau=0.2,\gamma=0.1$ and $k_{B}T=0.025$. (a) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $D=0.04$. (b) Its cross section along $x=0$. (c) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $D=0.057$(d) Its cross section along $x=0$. (e) Plot of reduce distribution function ($P(x,y)$ vs coordinate $D=0.0575$ (f) Its cross section along $x=0$. (Units are arbitrary) It is difficult to solve both the coupled and the decoupled equations even for the linear system. It is also difficult to write the Fokker-Planck equation in the phase space. Therefore we are restricted to study the present problem numerically. We have solved the Eqs.(13-14) using the Heun’s method [71]. It is a stochastic version of the Euler method which reduces to the second order Runge-Kutta method in the absence of noise. Details as well reliability of the method are described in Refs. [46], and [10], respectively. Based on this method we have calculated stationary reduced distribution function, $P(x,y)$ for different cases and demonstrated in Fig.1. It shows that with an increase in strength of the fluctuating magnetic field the probability distribution function may be folded in space even (as shown in panel (c)) for the linear system. The cross section at $x=0$ of the distribution of particles in space is plotted in panel (d) which explicitly demonstrates the non monotonic change in the distribution of particles in space. The panel (e) is also an interesting one where the distribution function is exhibited at a relatively large strength of the fluctuating magnetic field. Here a shallow basin with a minimum at the origin appears which is surrounded by an island. This is explicit in panel (f) which is the cross section of the panel (e) at $x=0$. Of course one may expect a transition from panel (c) to (e) on further increase in strength of the fluctuating magnetic field. If the noise strength is appreciable large then the distribution function seems to be not a smooth and continuous one which may correspond to a composed of bound and unbound motions. However, to check whether the panels like (c) and (e) are the unique signatures of the fluctuating field or not we consider dynamics with the following equations of motion, $\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+\eta y+f_{x}(t)$ (21) and $\dot{u_{y}}=-\omega^{2}y-\gamma_{0}u_{y}+\eta x+f_{y}(t)\;\;\;.$ (22) Figure 2: (a) Demonstration of distribution of particles for the linear system with equations of motion (21-22) in space for the parameter set, $\omega^{2}=2.0$, $\tau=0.2,\gamma=0.1$, $D=0.1$ and $k_{B}T=0.1$. (b) Demonstration of distribution of particles for the linear system with equation of motion (23) in space for the same parameter set. (Units are arbitrary) For this dynamics the distribution of particle in space has been shown in panel (a) of Fig.2. It shows that the probability of finding the Brownian particle decreases monotonically with an increase in distance from the origin. We now consider another case with the following equation of motion $\dot{u_{x}}=-\omega^{2}x-\gamma_{0}u_{x}+\eta x+f_{x}(t)$ (23) The probability of particle for this case also decreases monotonically with an increase in distance from the origin as shown in panel (b) of Fig.2. Thus Fig.1 and Fig.2 clearly suggest that the non monotonic change of distribution of charged particles in space for the linear stochastic system is a unique signature of the fluctuating magnetic field. ### III.1 Understanding about the non monotonic change of distribution of particles in a harmonic potential well Panels (c) and (e) in Fig.1 clearly imply that the distribution of particles at stationary steady state in the presence of a fluctuating magnetic field may be drastically different from the Boltzmann type. To understand this one may invoke a recent Ref.[29]. Here, the relevant equation of motion is $\dot{x}=f(x)+x\eta(t))/\gamma+f_{x}(t)\;\;\;.$ (24) The stationary distribution function for this system can be read as [29] $\rho(x)=N\phi(x)\exp[-\frac{V_{x}(x)}{D_{T}}]\;\;\;,$ (25) where $\phi(x)=\frac{A(x)^{2}}{(Dx^{2}+D_{T})}\;\;\;,$ (26) and $V_{x}(x)=-\int_{0}^{x}\frac{(f(x^{\prime})A(x^{\prime})+Dx^{\prime})A(x^{\prime})-A^{\prime}(x^{\prime})(Dq^{\prime 2}+D_{T})}{A(q^{\prime})(\frac{Dq^{\prime 2}}{D_{T}}+1)}dq^{\prime}\;\;\;.$ (27) with $A(x)=1-\tau[f^{\prime}(x)-f(x)/x]\;\;.$ (28) $f(x)=-\frac{1}{\gamma}\frac{dV(x)}{dx}\;\;.$ (29) and $D_{T}=k_{B}T/\gamma\;\;.$ (30) $\phi(x)$ and $V_{x}(x)$ are interpreted in Ref. [29] as the inverse of position dependent diffusion coefficient and the re-normalized potential energy function, respectively. Making use of the equation, $\frac{d\rho(x)}{dx}=0$ which defines the location of the extrema of $\rho(x)$, in the form $A^{\prime}(x)[Dx^{2}+D_{T}]-xDA(x)+f(x)A(x)^{2}=0\;\;.$ (31) where $A^{\prime}(x)=\frac{dA(x)}{dx}$. Similarly one may define the location of the extrema of the re-normalized potential energy field, $V_{x}(x)$, in the form $A(x)[Dx+f(x)A(x)]-A^{\prime}(x)[Dx^{2}+D_{T}]=0\;\;.$ (32) Now one may check easily that for a harmonic potential energy field, $V(x)=\omega^{2}x^{2}/2$, $\rho(x)$ is a uni modal one with a maximum at $x=0$ and the re-normalized potential energy field (RNPEF) mimics $V(x)$. Thus in the presence of a harmonic force field, the multiplicative noise which is a linear function of coordinate can not introduce an additional fixed point into the RNPEF. Since the noise induced drift term is a linear one, it may modulate the harmonic frequency of the renormalized potential energy field but can not create a new fixed point. For further check one may consider a bi stable potential energy field, $V(x)=ax^{4}-bx^{2}$. $a,b$ are constants which determine the location of the extrema of the field. Then from Eqs.(31-32) we have $128\frac{a^{3}\tau^{2}}{\gamma^{2}}x^{7}+32\frac{a\tau}{\gamma}(a-2\frac{ab\tau}{\gamma})x^{5}++2a(a-8\frac{b\tau}{\gamma}+6\tau D)x^{3}+(8a\tau D_{T}-b+D)x=0\;\;.$ (33) and $128\frac{a^{3}\tau^{2}}{\gamma^{2}}x^{7}+32\frac{a\tau}{\gamma}(a-2\frac{ab\tau}{\gamma})x^{5}++2a(a-8\frac{b\tau}{\gamma}+4\tau D)x^{3}+(8a\tau D_{T}-b)x=0\;\;.$ (34) Figure 3: (a) Plot of the reduced distribution function ($\rho(x)$) vs coordinate for the parameter set $a=0.25$; $b=0.5$; and (1) $k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=10.0$ (2) $k_{B}T=0.01,\gamma=0.5,D=2.5,\tau=1.5$. (3) $k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=1.0$ (4) $k_{B}T=0.01,\gamma=1.0,D=1.0,\tau=1.0$ (5) $k_{B}T=0.01,\gamma=1.0,D=2.5,\tau=1.5$ (6) $k_{B}T=0.1,\gamma=1.0,D=2.5,\tau=1.5$. (b) Plot of $\rho$ vs coordinate corresponding to panel (a). (c,d) Plot of the renormalized potential energy function $(V_{x}(x))$ vs coordinate corresponding to panel (a). (Units are arbitrary) $x=0$ is a common root for both cases. It is difficult to determine other roots of the above equations. Then to make the presentation self-sufficient we demonstrate the distribution function and the related quantities in Fig.3. Thus five real roots may be possible corresponding to locations of extrema of the distribution function for a given parameter set. But for the same parameter set three extrema appear for the re-normalized potential energy field as like as $V(x)$. Thus again it is proved that the multiplicative noise which is a linear function of coordinate can not introduce additional fixed points into the RNPEF. It is to be noted here that the locations of extrema which are near by to the origin for the distribution function have no correspondence with the renormalized potential energy field. In other words, the locations of extrema which are far away from the origin of the distribution function have correspondence with the RNPEF. These can be read approximately from Eqs.(33-34) as $x_{\pm}\simeq\pm\sqrt{\frac{b}{2a}-\frac{\gamma}{4a\tau}}\;\;.$ (35) Thus the noise induced transition is controlled by the position dependent diffusion. The unexpected maximum at the origin for the distribution function may be due to the very weak diffusion at this region. The apparent unstable motion in between stable and unstable fixed points of the potential energy field is a balance like situation where the force from the potential energy favors to find the particle but the position dependent diffusion opposes it. Then from the above discussion, it is apparent that the fluctuating magnetic field induced transition in a linear stochastic system seems to be due to an implicit dynamics. Since the terms in equations of motion with multiplicative noises are linear function of phase space variables then the drift terms which are introduced by these can not create new fixed points in the re-normalized potential energy field. It may be irrespective of the nature of the multiplicative noises. For further details one may go through Ref. [29]. Another point is to be noted here that if the magnetic field is a time independent one ($\eta(t)=0$) then the stationary distribution of particles is a Boltzmann one[52, 43, 44] i.e. $\rho(x,y,u_{x},u_{y})=Ne^{-\frac{E}{k_{B}T}}$. Here $N$ is the normalization constant and $E(=\frac{mu_{x}^{2}+mu_{y}^{2}+mu_{x}^{2}+m\omega^{2}(x^{2}+y^{2})}{2})$ corresponds to the total mechanical energy. $E$ is a constant of motion in the absence of the thermal bath and the time dependent magnetic field since the magnetic force due to the time independent magnetic field does not work. If this system is coupled with the thermal bath then the stationary state is an equilibrium one with Boltzmann distribution function. We now consider the other case. Based on the equation of motion (13-14) in the absence of thermal bath the rate of change of energy ($E$) of the system with time can be read as $\dot{E}=\frac{\dot{\eta}m}{2}(y\dot{x}-x\dot{y})$ (36) Thus the energy of this system is not a constant of motion due to the induced electric field. Therefore on coupling this system with the thermal bath, the stationary state may be a steady state one with the non Boltzmann type distribution function. In other words, the random force due to the fluctuating magnetic field is not related to the damping strength and therefore the stationary state must be a steady state one. As a signature of that the stationary distribution function may depend on the strength of both the time independent and the dependent parts of the magnetic field. The effect of the time dependent part is already explicitly shown in Fig.1. We are now in a position to explore the relevant implicit dynamics (if any). Fig.2 implies that the time independent part of the applied magnetic field has an important role for the manifestation of the unique signature. Then we demonstrate the fate of panels (c) and (e) in Fig.1 at a relatively low value of $\Omega_{0}$ in Fig.4. On the other hand, If the strength of the time independent magnetic field is appreciable large then the distribution function seems to be not a smooth and continuous one as happens in the case of fluctuating magnetic field. However, to know the probable reason which is related to the present context we consider the following equations of motion $\dot{u}_{x}=-\omega^{2}x+\Omega_{0}u_{y}$ (37) and $\dot{u}_{y}=-\omega^{2}y-\Omega_{0}u_{x}\;\;\;.$ (38) The above coupled equations of motion can be solved using the transformation, $\xi=x+iy$[56, 57]. Then we have $\ddot{\xi}=-\omega^{2}\xi-2\beta\dot{\xi}\;\;\;,$ (39) where $\beta=i\Omega_{0}/2$. This leads to have the solution of the above equation as $\xi(t)=\xi(0)e^{-\beta t}cos(\sqrt{\omega^{2}-\beta^{2}}t)\;\;\;.$ (40) Decomposing it time dependence of $x(t)$ and $y(t)$ can be read as $\displaystyle x(t)$ $\displaystyle=$ $\displaystyle\frac{x(0)}{2}[cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t+cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]$ (41) $\displaystyle+$ $\displaystyle\frac{y(0)}{2}[sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t-sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]\;\;\;$ and $\displaystyle y(t)$ $\displaystyle=$ $\displaystyle\frac{y(0)}{2}[cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t+cos(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2)t]$ (42) $\displaystyle-$ $\displaystyle\frac{x(0)}{2}[sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2)t-sin(\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0})/2)t]\;\;\;.$ Figure 4: Demonstration of distribution of charged particles in space for a linear system for the parameter set, $\tau=0.2,\gamma=0.1$ and $k_{B}T=0.025$. (a, b) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $\omega^{2}=2$. (c,d) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $\Omega_{0}=7.0$. (Units are arbitrary) Now one can check easily that the above relations reduce to the expected results i.e., the simple harmonic motion at the limit $\Omega_{0}=0.0$. But in the presence of a magnetic field $x(t)$ as well as $y(t)$ are composed of two vibrational modes with angular frequencies, $\omega_{1}=\sqrt{\omega^{2}+\Omega_{0}^{2}/4}+\Omega_{0}/2$ and $\omega_{2}=\sqrt{\omega^{2}+\Omega_{0}^{2}/4}-\Omega_{0}/2$ respectively. Thus if the field strength is sufficiently large such that the harmonic force seems to be very weak then the high frequency mode approaches a cyclotron motion and the other one may behave as like a free particle one. Both the modes may be important to appear the noise induced transition in a linear stochastic system. The low frequency mode makes the induced electric field significant at relatively large strength of the fluctuating magnetic field. Then the motion at steady state seems to be like cyclotron one as implied by the high frequency mode. It might be apparent in panel (e) of Fig.1. In other words, if the fluctuating magnetic as well as induced electric fields are weak then the stationary distribution of particles may be close to the equilibrium one with a maximum at the origin (as shown in panel (a) of Fig.1) corresponding to a stable fixed point. An interim situation may be like panel (c) in the same figure. This explanation implies that at relatively low strength of the time independent magnetic field or high frequency of the harmonic oscillator, the distribution of particles may be like the Boltzmann type. Thus Fig.4 might be the justification of the explanation. At the same time one may not expect the noise induced transition for dynamics which are described by Eqs. (21-22) and (23), respectively. Thus the noise induced transition in a linear stochastic system may be a unique signature of the magnetic field. Figure 5: Demonstration of distribution of charged particles in space for a linear system for the parameter set, $\omega^{2}=2,\Omega_{0}=7.0$ and $k_{B}T=0.025$. (a,b) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $\tau=0.2$. (c,d) Plot of reduce distribution function ($P(x,y)$ vs coordinate for $\gamma=0.1$. (Units are arbitrary) ### III.2 Effect of the damping strength and the correlation time on the distribution of particles Since the stationary state in the presence of a fluctuating magnetic field is a steady state one then the distribution of particles may depend on the damping strength and the correlation time of the fluctuating magnetic field. The fate of the panels (c) and (e) in Fig.1 at a relatively higher damping strength or correlation time has been demonstrated in Fig.5. It implies that if the energy dissipation dominates over the work done by the induced electric field then the cyclotron like motion may not sustain at the steady state and the distribution may be closed to an equilibrium one. A similar situation may appear even for a low damping strength provided the variance of the fluctuating magnetic field becomes small at a relatively large correlation of the noise. Thus Fig.5 corroborates the explanation as given in the previous subsection. Figure 6: Demonstration of distribution of charged particles in space for a linear system for the parameter set, $\tau=0.2,\gamma=0.1,\omega^{2}=2$ and $\Omega_{0}=7.0$. (Units are arbitrary) ### III.3 Effect of temperature on the distribution of particles In Fig.6 we have demonstrated how the distribution of particles may depend on the temperature in the presence of a fluctuating magnetic field. At relatively low temperature, panels (c) and (e) in Fig.1 may be like panels (a) and (b) in Fig.6, respectively. Then it is apparent that under this circumstance the induced electric field may not be significant to survive cyclotron like motion at steady state and the distribution of particles may be close to Boltzmann type. A similar situation may appear as shown in panels (c) and (d) of Fig.6 even at relatively high temperature provided the fluctuating magnetic field is very weak. Thus the magnetic field plays an important role in the noise induced transition in a linear stochastic system. Figure 7: Demonstration of distribution of charged particles in space for the non linear system for the parameter set, $a=0.25,b=0.5$, $\tau=0.2,\gamma=0.1,\omega^{2}=2$, $k_{B}T=0.025$ and $\Omega_{0}=7.0$. (Units are arbitrary) Figure 8: Demonstration of distribution of charged particles in space for the linear system for the parameter set, $a=0.25,b=0.5$, $\tau=0.2,\omega^{2}=2,D=0.04$, $k_{B}T=0.025$ and $\gamma=0.1$. (Units are arbitrary) ## IV Fluctuating magnetic field induced islands formation in a non linear system The noise induced transition in a linear stochastic system strongly motivate us to consider a nonlinear system such as the Brownian motion in two dimensional bi-stable potential energy field. The potential energy field is given by $V(x,y)=ax^{4}-bx^{2}+\omega^{2}y^{2}/2\;\;\;,$ (43) Then the equation for the $x$ component of the motion can be read as $\dot{u_{x}}=-4ax^{3}+2bx-\gamma u_{x}+(\Omega_{0}+\eta(t))u_{y}-\frac{\eta y}{2\tau}+\frac{\sqrt{D}y}{2\tau}\zeta(t)+f_{x}(t)\;\;\;.$ (44) Solving the above equation along with Eqs.(10, 14) we have determined the reduced distribution functions, $P(x,y)$ at the stationary state and plotted in Fig.7. Panel (a) in this figure shows that the distribution of particles in space is closed to the Boltzmann like if the strength of the time dependent magnetic field is relatively very weak. At this condition the system is near to the equilibrium condition $(\eta(t)=0)$. However, panel (b) is an interesting which shows that on further increase in strength of the field, a maximum may appear at the unstable fixed point ($x=0$, $y=0$). It has a similarity with the curves (3, 5, and 6) in panel (a) of Fig.3. Thus panel (a) in Fig.7 is an example of diffusion controlled noise induced transition. On further increase in strength of the fluctuating field the distribution of particles may become more complex as shown in other panels of Fig.7. It is to be noted that one may find a similar kind of distribution of particles (as shown in Fig.8) on changing the strength of the time independent magnetic field in the presence of fluctuating field at a given strength. From these figures, one may notice the following points. First, islands may be formed nearby the fixed points. The probability at the stable fixed points may be less compared to the lands as like as the harmonic oscillator. Second, the shape of the islands may be different for the non linear system. It is apparent in panels (c, d, e, and f) of Fig.7 and panel (b, c, d, e, f, and g) of Fig.8 that time dependent magnetic field induced symmetry reduction may be significant for the nonlinear system. The equations of motion are not remain in variant for changing the phase space variables $x,y,u_{x},u_{y}$ and $\eta$ to $-x,-y,-u_{x},-u_{y}$ and $-\eta$. Another reason may be the interplay among the cyclotron like motions around the stable and unstable fixed points, respectively. This is apparent in Figs. 7 and 8 through the nature of transition among the different kind of distribution functions. Figure 9: Demonstration of distribution of charged particles in space for the linear system for the parameter set, $a=0.25,b=0.5$, $\omega^{2}=2$, $D=0.04$ and $\Omega=7.0$. (a, b, c) $gamma=0.1$ (d, e, f) $\tau=0.2$. (Units are arbitrary) We now consider the influence of the correlation time of the fluctuating magnetic field on the distribution of charged particles in space. In this context, we demonstrate the distribution function for different $\tau$ in panels (a), (b), and (c) of Fig.9. It shows that new islands are formed with a decrease in the correlation time. The variance of the fluctuating magnetic field is enhanced for the decrease of $\tau$ and as a result of that the induced electric field becomes more significant to introduce new islands as explained above. Thus these panels are consistent with Fig.7. Similarly, the noise induced transition may depend on the damping strength as shown in panels (d), (e), and (f) of Fig.9. Here it is apparent that the effectiveness of the induced electric field may be more significant (for a given strength of the fluctuating magnetic field) as the energy dissipation becomes weak. Another important point is to be noted here that even for a small change in correlation time of the fluctuating magnetic field or damping strength new islands may be formed. It may be around the unstable fixed point or near the stable fixed point. These observations imply that the change in the structure of the distribution is not due to modification of the potential energy field. In other words, the noise induced is due to the interplay between the potential energy field and the cyclotron like motion. ## V Conclusion We have studied the distribution of particles in space in the presence of a fluctuating magnetic field. The field introduces an unusual type of multiplicative noise terms which are linear functions of coordinate and velocity, respectively. The dynamics with these terms offers a versatile structure of the distribution function. Our investigation includes the following major points. (i) In the presence of a harmonic force field, the distribution function may be folded around the origin with either a maximum or minimum at the origin at relatively high strength of both time dependent and independent fields. These sharp contrast behaviors of a linear stochastic system are due to unique signature of the fluctuating magnetic field. (ii) If the potential energy field is a non linear one then new islands like regions are formed in the distribution of charged particles in space with an increase in the strength of the fluctuating magnetic field. The land may be formed near the stable fixed points instead of folding of the distribution function in space around the stable fixed points as happens in the linear system. (iii) At the relatively large strength of the fluctuating field, the distribution of particles may be a strange one where many islands may appear which are not expected from the given potential energy field. It may offer an explanation to describe the phenomenon, the reduction of the current in a semiconductor in the presence of a time dependent magnetic field. (iv) The reduction of the symmetry of the system due to time dependent magnetic field may be significant for the nonlinear system. (v) The structure of the distribution function may depend strongly on damping strength and the correlation time of fluctuating magnetic field. Then it is apparent that the change of the shape of the distribution function is not due to the modification of the potential energy function with new fixed points. (vi) If the strength of the fluctuating magnetic field is appreciable large then the shape of the distribution may depend on the temperature. Acknowledgment L.R.R.B. acknowledges financial support from DST-INSPIRE from the Department of Science and Technology, Government of India. ## References * [1] L. Gammaitoni, P. Hänggi, P. Jung, and F. Marchesoni, Rev. Mod. Phys. 70, 223 (1998). * [2] T. Wellens, V. Shatokhin, and A. Buchleitner, Rep. Prog. Phys. 67, 45 (2003). * [3] S. Rajasekar and M. A. F. Sanjuan, Nonlinear Resonances, Springer Series in Synergetics (Springer, Cham, 2016). * [4] S. Mondal, J. Das, B. C. Bag, and F. Marchesoni, Phys. Rev. E 98, 012120 (2018). * [5] A. S. Pikovksy and J. Kurths, Phys. Rev. Lett. 78, 775 (1997). * [6] C. R. Doering and J. C. Gadoua, Phys. Rev. Lett. 69, 2318 (1992). * [7] P. Majee, G. Goswami, and B. C. Bag, Chem. Phys. Lett. 416, 256 (2005). * [8] B. C. Bag and C. -K. Hu, Phys. Rev. E 73, 061107 (2006); B. C. Bag and C. -K. Hu, Phys. Rev. E 75, 042101 (2007). * [9] S. Ray, D. Mondal, and B. C. Bag, J. Chem. Phys. 140, 204105 (2014). * [10] S. Mondal, S. Das, A. Baura, and B. C. Bag, J. Chem. Phys. 141, 224101 (2014). * [11] F. Marchesoni, Phys. Lett. A 237, 126 (1998). * [12] P. Reimann, Phys. Rep. 361, 57 (2002). * [13] G. Goswami, P. Majee, P. K. Ghosh, and B. C. Bag, Physica A 375, 429 (2007). * [14] B. C. Bag and C. -K. Hu, J. Stat. Mech. (2009) P02003. * [15] D. Cubero and F. Renzoni, Brownian Ratchets: From Statistical Physics to Bio and Nanomotors (Cambridge University Press, Cambridge, 2016). * [16] F. Cecconi, G. Gonnella, and G. P. Saracco, Phys. Rev. E 75, 031111 (2007). * [17] P. K. Ghosh, M. K. Sen, and B. C. Bag, Phys. Rev. E 78, 051103 (2008). * [18] M. K. Sen, S. Ray, A. Baura, and B. C. Bag, Chem. Phys. Lett. 559, 117 (2013). * [19] S. Mondal, M. K. Sen, A. Baura, and B. C. Bag, Physica A 445, 128 (2016). * [20] J. M. R. Parrondo, C. Van den Broeck, J. Buceta, and F. J. dela Rubia, Physica A 224, 153 (1996). * [21] S. S. Riaz, S. Dutta, S. Kar, and D. S. Ray, Eur. Phys. J. B 47, 255 (2005). * [22] D. Das and D. S. Ray, Phys. Rev. E 87, 062924 (2013). * [23] W. Horsthemke and R. Lefever, Noise-Induced Transitions: Theory and Applications in Physics, Chemistry, and Biology, Springer Series in Synergetics, Vol. 15 (Springer, Berlin, 1984). * [24] L. Arnold, W. Horsthemke, and R. Lefever, Z. Phys. B 29, 367 (1978). * [25] M. -O. Hongler, Helv. Phys. Acta 52, 280 (1979). * [26] S. I. Denisov, A. N. Vitrenko, and W. Horsthemke, Phys. Rev. E 68, 046132 (2003). * [27] A. N. Vitrenko, arXiv:1612.03442v1 * [28] P. Landa and A. Zaikin, Phys. Rev. E 54, 3535 (1996). * [29] S. Mondal and B. C. Bag, Phys. Rev. E 91 042145 (2015). * [30] J. Smythe, F. Moss, and P. V. E. McClintock, Phys. Rev. Lett, 51, 1062 (1983). * [31] C. Van den Broeck, J. M. R. Parrondo, and R. Toral, Phys. Rev. Lett, 73, 3395 (1995). * [32] A. A. Zaikin, J. Garcıá-Ojalvo, and L. Schimansky-Geier, Phys. Rev. E 60, R6275 (1999). * [33] P. S. Landa, A. A. Zaikin, V. G. Ushakov, and J. Kurths, Phys. Rev. E 61, 4809 (2000). * [34] A. I. Olemskoi, D. O. Kharchenko, and I. A. Knyaz, Phys. Rev. E 71, 041101 (2005). * [35] B. C. Bag, K. G. Petrosyan, and C. -K. Hu, Phys. Rev. E 76, 056210 (2007). * [36] S. Ray, M. K. Sen, A. Baura, and B. C. Bag, Eur. Phys. J. B 85, 306 (2012). * [37] V. V. Semenov, A. B. Neiman, T. E. Vadivasova and V. S. Anishchenko, Phys. Rev. E 93, 052210 (2016). * [38] V. V. Semenov, Phys. Rev. E 95, 052205 (2017). * [39] K. Amemiya, J. Phys. Soc. Jpn. 72, 135 (2003). * [40] A. S. Moskalenkoa, S. D. Ganicheva, V. I. Pereĺ, and I.N. Yassievicha, Physica B 273-274, 1007 (1999); V. I. Pereĺ and I.N. Yassievich, JETP Letts. 68, 804 (1998); A. S. Moskalenko, V. I. Pereĺ, and I. N. Yassievich, JETP 90, 217 (2000). * [41] N. Telang and S. Bandyopadhyay, Appl. Phys. Letts. 66, 1623 (1995). * [42] E. E. Vdovin, A. Levin, A. Patanè, L. Eaves, P. C. Main, Y.N. Khanin, Y.V.Dubrovskii, M. Henini and G. Hill, Science 290, 122 (2000). * [43] A. Baura, M. K. Sen, and B. C. Bag, Phys. Chem. Chem. Phys. 13, 9445 (2011). * [44] A. Baura, M. K. Sen, and B. C. Bag, Chem. Phys. 417, 30 (2013). * [45] A. Baura, S. Ray, and B. C. Bag, J. Chem. Phys. 138, 44110 (2013). * [46] S. Mondal, A. Baura, S. Das, and B. C. Bag, Physica A 502, 58 (2018). * [47] F. N. C. Paraan, M. P. Solon, and J. P. Esguerra, Phys. Rev. E 77, 022101 (2008). * [48] A. Baura, M. K. Sen, and B. C. Bag, Eur. Phys. J. B 75, 267 (2010); A. Baura, S. Ray, M. K. Sen, and B. C. Bag, J. Appl. Phys. 113, 124905 (2013). * [49] J. C. Hidalgo-Gonzalez, J. I. Jiménez-Aquino, and M. Romero-Bastida, Physica A 462, 1128 (2016). * [50] J. Das, S. Mondal, and B. C. Bag, J. Chem. Phys. 147, 164102 (2017); J. Das and B. C. Bag, Phys. Rev. E 103, 046101 (2021); J. Das, M. Biswas, and B. C. Bag, arXiv:2011.09771. * [51] J. C. Hidalgo-Gonzalez and J. I. Jimenez-Aquino, Phys.Rev. E 100, 062102 (2019). * [52] A. Baura, M. K. Sen, and B. C. Bag, Phys. Rev. E 82, 041102 (2010). * [53] P. S. Pal, S. Rana, A. Saha, and A. M. Jayannavar, Phys. Rev. E 90, 022143 (2014). * [54] S. Ray, A. Baura, and B. C. Bag, Chaos 23, 043121 (2013). * [55] M. L. Mittal, Y. S. Prahalad, and D. G. Thirtha, J. Phys. A: Math. Gen. 13, 1095 (1980); A. M. Jayannavar and M. Sahoo, Phys. Rev. E 75, 032102 (2007); D. Roy and N. Kumar, Phys. Rev. E 78, 052102 (2008). * [56] J. I. Jiménez-Aquino and R. M. Velasco and F. J. Uribe, Phys. Rev. E 77, 051105 (2008). * [57] L. D. Landau and E. M. Lifshitz, The Classical Theory of Fields (Third Revised English Edition, Pergamon Press Ltd., Oxford, 1971). * [58] S. E. Savelév and F. Marchesoni, Phys. Rev. E 90, 062117 (2014). * [59] T. Chen, X. B. Wang and T. Yu, Phys. Rev. E 90, 022101 (2014); S. Ray, M. Rano, and B. C. Bag, J. Chem. Phys. 142, 154122 (2015). * [60] A. K. Ram and B. Dasgupta, Physics of Plasmas 17, 122104 (2010 ); V. Gelfreich, V. Rom-Kedar, K. Shah, and D. Turaev, Phys. Rev. Letts. 106, 074101 (2011). * [61] B. (ed.) Scrosati, Applications of Electroactive Polymers (Chapman & Hall, London, 1993). * [62] P. G. Bruce, Solid State Electrochemistry (Cambridge Univ. Press, Cambridge, 1995); F. M. Gray, Polymer Electrolytes (RSC Materials Monographs, The Royal Society of Chemistry, Cambridge, 1997). * [63] J. -M. Tarascon and M. Armand, Nature 414, 359 (2001). * [64] C. A. Angell, C. Liu, and E. Sanchez, Nature (London) 137, 362 (1993). * [65] A. M. Christie, S. J. Lilley, E. Staunton, Y. G. Andreev, and P. G. Bruce, Nature (London) 433, 50 (2005). * [66] F. Grossmann, T. Dittrich, P. Jung, and P. Hänggi, Phys. Rev. Lett. 67, 516 (1991); S. Q. Duan, Z. G.Wang, B. Y. Wu, and X. G. Zhao, Phys. Lett. A 320, 63 (2003); S. Q. Duan and X. G. Zhao, Phys. Rev. B 69, 035305 (2004); C. E. Creffield and G. Platero, ibid. 69, 165312 (2004); Y. W. Xie, S. Q. Duan, and X. G. Zhao, Phys. Lett. A 369, 230 (2007). * [67] S. Kohler, J. Lehamann, and P. Hänggi, Phys. Rep. 406, 379 (2005); G. Platero and R. Aguado, ibid. 395, 1 (2004); T. Fujisawa and S. Tarucha, Superlattices Microstruct. 21, 247 (1997); W. G. van der Wiel, S. De Franceschi, J. M. Elzerman, T. Fujisawa, S. Tarucha, and L. P. Kouwenhoven, Rev. Mod. Phys. 75, 1 (2003). * [68] S. Mondal, M. Biswas, and B. C. Bag, arXiv:2101.00861. * [69] P. Hänggi, F. Marchesoni and P. Grigolini, Z. Phys. B 56, 333 (1984). * [70] S. Okuyama and D. W. Oxtoby, J. Chem. Phys. 84, 5830 (1986); B. C. Bag, J. Chem. Phys., 119, 4988 (2003); A. Baura, M. K. Sen, G. Goswami, and B. C. Bag, J. Chem. Phys. 134, 044126 (2011); S. Ray and B. C. Bag, Phys. Rev. E 90, 032103 (2014); S. Ray and B. C. Bag, Phys. Rev. E 92, 052121 (2015). * [71] R. Toral, Eds. P. Garrido and J. Marro Computational Physics, Lecture Notes in Physics vol 448 (Springer-Verlag, Berlin,1995).
arxiv-papers
2021-07-27T06:43:32
2024-09-04T03:07:20.715368
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Shrabani Mondal, L. R. Rahul Biswas, Mousumi Biswas, and Bidhan\n Chandra Bag", "submitter": "Shrabani Mondal", "url": "https://arxiv.org/abs/2107.12623" }
2107.12624
# Three characterizations of strict coherence on infinite-valued events Tommaso Flaminio IIIA - CSIC Campus de la Universidad Autònoma de Barcelona s/n, 08193 Bellaterra, Spain [email protected] ###### Abstract. This paper builds on a recent article co-authored by the present author, H. Hosni and F. Montagna. It is meant to contribute to the logical foundations of probability theory on many-valued events and, specifically, to a deeper understanding of the notion of strict coherence. In particular, we will make use of geometrical, measure-theoretical and logical methods to provide three characterizations of strict coherence on formulas of infinite-valued Łukasiewicz logic. Keywords. De Finetti’s coherence; strict coherence; faithful states; MV- algebras; Łukasiewicz logic. ## 1\. Introduction and motivation. In a collection of seminal contributions starting with [5] and culminating in [6], de Finetti grounded subjective probability theory on an ideal betting game between two players, a bookmaker and a gambler, who wager money on the occurrence of certain events $e_{1},\ldots,e_{k}$. For each event $e_{i}$, gambler’s payoffs are $1$ in case $e_{i}$ occurs, and $0$ otherwise. The probability of an event $e_{i}$ is defined, by de Finetti, as the fair selling price fixed by the bookmaker for it. Conforming to a standard notation, bookmaker’s prices for the events $e_{1},\ldots,e_{k}$ will be referred to as betting odds and an assignment $\beta:\\{e_{1},\ldots,e_{k}\\}\to[0,1]$ of betting odds $\beta(e_{i})=\beta_{i}$ will be called a book. De Finetti had no particular inclination towards identifying events in a precise logical ground [9]. However, in order for his main result to be stated in precise mathematical terms, they will be understood, for the moment, as elements of a finitely generated free boolean algebra and hence coded by boolean formulas. Now, de Finetti’s result reads as follows: let us fix finitely many events $e_{1},\ldots,e_{k}$ and a book $\beta$ on them. A gambler must choose stakes $\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$, one for each event, and pay to the bookmaker the amount $\sigma_{i}\cdot\beta_{i}$ for each $e_{i}$. When a (classical propositional) valuation $w$ determines $e_{i}$, the gambler gains $\sigma_{i}$ if $w(e_{i})=1$ and $0$ otherwise. The book $\beta$ is said to be coherent if there is no choice of stakes $\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$ such that for every valuation $w$ () $\sum_{i=1}^{k}\sigma_{i}\cdot\beta_{i}-\sum_{i=1}^{k}\sigma_{i}\cdot w(e_{i})=\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w(e_{i}))<0.$ The left hand side of () captures the bookmaker’s payoff, or balance, relative to the book $\beta$ under the valuation $w$. Note that a stake $\sigma_{i}$ may be negative. Following tradition, money transfers are so oriented that “positive” means “gambler-to-bookmaker”. Therefore, if $\sigma_{i}<0$, the bookmaker is forced to swap his role with the gambler: he has to pay $-\sigma_{i}\cdot\beta(e_{i})$ to the gambler in hopes of winning $-\sigma_{i}$ in case $e_{i}$ occurs. De Finetti’s Dutch-Book theorem characterizes coherent books as follows: a book $\beta$ on events $e_{1},\ldots,e_{k}$ pertaining to a boolean algebra ${\bf A}$ is coherent iff it extends to a finitely additive probability $P$ of ${\bf A}$, [5]. Along with the assumptions which regulate de Finetti’s coherence criterion, condition () above effectively forces the bookmaker to set _fair prices_ for gambling on events $e_{1},\ldots,e_{k}$. In other words, upon regarding each event $e_{i}$ as a $\\{0,1\\}$-valued random variable, de Finetti’s Dutch-Book theorem amounts to saying that coherent assessments are those with null expectation. For, if the bookmaker publishes a book with positive expectation (for him) a logically infallible gambler will choose negative stakes and inflict a sure loss on him, that is to say, a sure financial loss whatever the outcome of events. Although coherence guards the bookmaker against the possibility of sure loss, at the same time it may bar him from making a profit. To illustrate the idea, consider an event $e$ which is neither noncontradictory nor sure and the coherent book $\beta(e)=0$. If the gambler bets $1$ on $e$, then her balance is as follows: she pays $1\cdot 0=0$ and gets back $0$ if $w(e)=0$ and $1$ if $w(e)=1$. Hence, the bookmaker never wins and possibly loses. This rather odd feature of coherence was questioned in the mid 1950’s first by Shimony [32] and then by Kemeny [16]. These authors studied a refinement of de Finetti’s coherence that nowadays goes under the name of strict coherence (see [11]). Intuitively, a choice of prices is strictly coherent if every possibility of loss, for the bookmaker, is paired by a possibility of gain. Precisely, a book $\beta$ is strictly coherent if, for each choice of stakes $\sigma_{1},\ldots,\sigma_{k}\in\mathbb{R}$, the existence of a valuation $w$ such that $\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w(e_{i}))<0$ implies the existence of another one $w^{\prime}$ for which $\sum_{i=1}^{k}\sigma_{i}(\beta_{i}-w^{\prime}(e_{i}))>0$. Interest in the condition of strict coherence was prompted by Carnap’s analysis of what he called “regular” probability functions in [1] (see also [31, Chapter 10]) and which we will term as Carnap probabilities. Those functions arise from the axiomatization of finitely additive probabilities by strengthening the usual normalization axiom in the right-to-left direction: $1$ (respectively, $0$) is assigned only to tautologies (respectively, contradictions). In other words, a probability function $P$ is Carnap, if it is normalized, finitely additive and it satisfies $P(e)\neq 0$ for every noncontradictory event $e$. In [11] the authors characterized strictly coherent books on boolean events in terms of their extendability to Carnap probabilities111Carnap probabilities are the same as Carnap-regular probabilities of [11]. In the present paper we adopt this simplified notation in order to avoid any misleading interpretation of the adjective “regular” which has indeed different meanings if referred to probability functions or to Borel measures which will be discussed in Section 4.. Several authors proposed generalizations of de Finetti’s coherence criterion and his Dutch-Book theorem to events not pertaining to boolean logic. Paris in [30] extended the classical Dutch-Book theorem to several non-classical propositional logics including the modal logics K, T, S4, S5 and certain paraconsistent logics as well. In [34], Weatherson considered the case of events pertaining to intuitionistic logic and in [26], Mundici extended de Finetti’s criterion to the case of infinite-valued Łukasiewicz logic and MV- algebras [3, 27]. In the MV-algebraic realm valuations are $[0,1]$-valued and hence they correspond to homomorphisms into the standard MV-algebra defined on the unit interval $[0,1]$. De Finetti’s coherence criterion immediately translates to the MV-setting with no extra conditions and the main result of [26] (see also [19]) is a de Finetti-like theorem which characterizes coherent books on Łukasiewicz events as those which are extendible to states, i.e., $[0,1]$-valued normalized and finitely additive maps of an MV-algebra. From the perspective of reasoning about uncertainty, the interest in Łukasiewicz events is twofold: on the one hand these events capture properties of the world which are better described as gradual rather than yes-or-no; on the other hand, they also mimic bounded random variables. Indeed, any Łukasiewicz event $e$ may be regarded as a $[0,1]$-valued continuous function $f_{e}$ on a compact Hausdorff space (see [3, Theorem 9.1.5] and Section 2) and any state of $e$ coincides with the expected value of $f_{e}$ ([17, 29], [10, Remark 2.8] and Section 4). Therefore, up to renormalization, Mundici’s generalization of de Finetti’s theorem [26, Theorem 2.1] implies the Dutch- Book theorem for books on bounded continuous random variables. For events pertaining to the restricted class of finite-dimensional MV- algebras, in [11, Theorem 6.4] the authors proved a de Finetti-like theorem for strictly coherent books in terms of their extendability to faithful states, i.e., states which satisfy $s(a)\neq 0$ for all $a\neq 0$. Nevertheless, extending [11, Theorem 6.4] to more general classes of MV- algebras is delicate because, as a consequence of seminal results by Mundici [25, Proposition 3.2], Kelley [15], and Gaifman [13], an MV-algebra may not have a faithful state. In this paper we will investigate strictly coherent books on Łukasiewicz events, i.e., elements of a finitely generated free MV-algebra. Our results sensibly extend the results of [11]. In particular, we will provide three characterizations of strict coherence by adopting geometrical, measure- theoretical and logical methods. In more details: Geometrical approach: the functional representation of $n$-generated free MV- algebras in terms of $n$-variable, piecewise-linear continuous functions (see [3, Theorem 9.1.5] and [23]) implies that the set of all coherent books on a finite set $\Phi$ of Łukasiewicz events forms a convex polyhedron $\mathscr{D}_{\Phi}$ of $\mathbb{R}^{k}$. The main result of Section 3 shows that strictly coherent books on $\Phi$ form a subset of $\mathbb{R}^{k}$ which coincides with the relative interior of $\mathscr{D}_{\Phi}$. Measure-theoretical approach: faithful states are the MV-algebraic analog of Carnap probabilities on a boolean algebra. In Section 4 we will first give an integral representation theorem for faithful states on finitely generated free MV-algebras and then we will characterize strictly coherent books on Łukasiewicz events as those which extend to a faithful state. Logical approach: the relation among free MV-algebras, rational polyhedra and deducibility in propositional Łukasiewicz logic, will enable us to characterize the notions of coherence and strict coherence within propositional Łukasiewicz logic (see Section 5). In our opinion this result is interesting because it shows that propositional Łukasiewicz logic is capable to capture foundational aspects of probability theory on infinite-valued events. In the next section we will introduce necessary preliminaries about MV- algebras and rational polyhedra. ## 2\. Preliminaries. The algebraic framework of this paper is that of MV-algebras (see [3, 27]), i.e., the Lindenbaum algebras of Łukasiewicz infinite-valued logic [3, Definition 4.3.1]. A typical example of an MV-algebra is the standard algebra $[0,1]_{MV}=([0,1],\oplus,\neg,0)$ where $x\oplus y=\min\\{1,x+y\\}$ and $\neg x=1-x$. Further operations, together with their standard interpretation, are defined in $[0,1]_{MV}$ as follows: $x\odot y=\neg(\neg x\oplus\neg y)=\max\\{0,x+y-1\\}$, $x\to y=\neg x\oplus y=\min\\{1,1-x+y\\}$, $x\wedge y=x\odot(x\to y)=\min\\{x,y\\}$, $x\vee y=\neg(\neg x\wedge\neg y)=\max\\{x,y\\}$, $1=\neg 0$. This structure generates the class of MV- algebras both as a variety and as quasi-variety [2]. Another relevant example of an MV-algebra is given by the free $n$-generated MV-algebra ${\bf F}_{n}$. By a standard universal algebraic argument, ${\bf F}_{n}$ is the MV-algebra of functions $f:[0,1]^{n}\to[0,1]$ generated by the projection maps [3, Proposition 3.1.4] and whose operations $\odot,\oplus,\to,\wedge,\vee$ and $\neg$ are defined via the pointwise application of those in $[0,1]_{MV}$. By McNaughton theorem, up to isomorphism, ${\bf F}_{n}$ coincides with the MV-algebra of $n$-variable McNaughton functions: maps from $[0,1]^{n}$ to $[0,1]$ which are continuous, piecewise linear, with finitely many pieces, and such that each piece has integer coefficients (cf. [3, Theorem 9.1.5] and [23]). For each $f\in{\bf F}_{n}$, the oneset of $f$ is $\\{x\in[0,1]^{n}\mid f(x)=1\\}$ and the zeroset of $f$ is $\\{x\in[0,1]^{n}\mid f(x)=0\\}$. The free $n$-generated MV-algebra is, up to isomorphism, the Lindenbaum algebra of Łukasiewicz logic $\L$ in a language with $n$ propositional variables and $[0,1]$-valuations of $\L$ are exactly the homomorphisms of ${\bf F}_{n}$ to $[0,1]_{MV}$. Furthermore, every $x\in[0,1]^{n}$ determines the homomorphism $h_{x}:f\in{\bf F}_{n}\mapsto f(x)\in[0,1]_{MV}$. ###### Proposition 2.1 ([26, Lemma 3.1]). For each finite $n$, homomorphisms of ${\bf F}_{n}$ to $[0,1]_{MV}$, $[0,1]$-valued valuations of Łukasiewicz logic on $n$ variables and points of the $n$-cube $[0,1]^{n}$ are in one-one correspondence. For every closed subset $C$ of $[0,1]^{n}$, let $I_{C}$ be the subset of ${\bf F}_{n}$ of those functions whose zeroset contains $C$. Then, $I_{C}$ is an ideal of ${\bf F}_{n}$ and the quotient ${\bf F}_{n}/I_{C}$ is the MV-algebra whose universe coincides with the set given by the restrictions to $C$ of the functions of ${\bf F}_{n}$ (see [3, Proposition 3.4.5]). In particular, when $C$ has $k$ elements, the quotient MV-algebra ${\bf F}_{n}/I_{C}$ is isomorphic to the product algebra $[0,1]_{MV}^{k}$, [4]. The finite powers of $[0,1]_{MV}$ — called locally weakly finite MV-algebras in [4]— are called, in this paper, finite-dimensional. ### 2.1. Rational polyhedra, regular complexes and McNaughton functions. In this section we will prepare the necessary results concerning rational and regular complexes (see [8]) and their relation with finitely generated free MV-algebras. We invite the reader to consult [18, 27, 28] for background. Let $k=1,2,\ldots$. By a (rational) convex polyhedron (or (rational) polytope) of $\mathbb{R}^{k}$ we mean the convex hull of finitely many points of $\mathbb{R}^{k}$ ($\mathbb{Q}^{k}$ respectively); a (rational) polyhedron is a finite union of (rational) convex polyhedra. Given any polytope $\mathscr{P}$, we respectively denote by $\mathsf{ext}\;\mathscr{P}$, $\mathsf{ri}\;\mathscr{P}$, $\mathsf{rb}\;\mathscr{P}$ the set of its extremal points, its relative interior and its relative boundary. Since each polytope $\mathscr{P}$ is closed, $\mathscr{P}=\mathsf{ri}\;\mathscr{P}\cup\mathsf{rb}\;\mathscr{P}$. Further, for all vectors $x,y\in\mathbb{R}^{k}$, we denote $x\cdot y$ their scalar product and by $|x|$ the norm of $x$. ###### Lemma 2.2. For each polytope $\mathscr{P}$ of $\mathbb{R}^{k}$, the following conditions hold: 1. (1) For every $e\in\mathsf{rb}\;\mathscr{P}$, there exists $\sigma\in\mathbb{R}^{k}$ such that, for all $\gamma\in\mathscr{P}$, $\sigma\cdot e\leq\sigma\cdot\gamma$; 2. (2) Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Then, there exists $\sigma\in\mathbb{R}^{k}$ such that the sets $\mathscr{P}_{\sigma}^{+}=\\{\gamma\in\mathscr{P}\mid\gamma\cdot\sigma<\beta\cdot\sigma\\}$ and $\mathscr{P}_{\sigma}^{-}=\\{\gamma\in\mathscr{P}\mid\gamma\cdot\sigma>\beta\cdot\sigma\\}$ are nonempty; 3. (3) Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Then there exist $\sigma\in\mathbb{R}^{k}$, $e_{1},e_{2}\in\mathsf{ext}\;\mathscr{P}$ such that $e_{1}\in\mathscr{P}_{\sigma}^{+}$ and $e_{2}\in\mathscr{P}_{\sigma}^{-}$; 4. (4) $\gamma\in\mathsf{ri}\;\mathscr{P}$ iff there exists a map $\lambda:\mathsf{ext}\;\mathscr{P}\to[0,1]$ such that $\sum_{e\in\mathsf{ext}\;\mathscr{P}}\lambda(e)=1$, $\lambda(e)>0$ for all $e\in\mathsf{ext}\;\mathscr{P}$ and $\gamma=\sum_{e\in\mathsf{ext}\;\mathscr{P}}\lambda(e)\cdot e$. Before proving the lemma, recall that any hyperplane $H$ of $\mathbb{R}^{k}$ separates the space in two half spaces denoted $H^{+}$ and $H^{-}$. The above claims (2) and (3) state that, if $\beta$ is a point in the relative interior of a polytope $\mathscr{P}$, then there exists a hyperplane $H$ passing through $\beta$ such that, respectively: both $H^{+}\cap\mathscr{P}$ and $H^{-}\cap\mathscr{P}$ are nonempty; each $H^{+}\cap\mathscr{P}$ and $H^{-}\cap\mathscr{P}$ contains an extremal point of $\mathscr{P}$. ###### Proof. (1) is the well-known supporting hyperplane theorem, see [22, Theorem 14]. (2) Let $\beta\in\mathsf{ri}\;\mathscr{P}$. Let $\Sigma$ be a sphere of radius $r$ and centered at $\beta$ and contained in $\mathsf{ri}\;\mathscr{P}$. The existence of $\Sigma$ is ensured by definition of relative interior [8, Chapter I, Definition 1.8]. Let $\sigma$ be a vector of origin $\beta$. Suppose $\sigma$ is not orthogonal to the affine hull of $\mathscr{P}$ and also $0<|\sigma|<r$. Trivially, $(\sigma-\beta)\cdot\sigma<\beta\cdot\sigma<(\sigma+\beta)\cdot\sigma$. Upon noting that $\sigma-\beta,\sigma+\beta\in\Sigma$, our claim is settled. (3) By way of contradiction, assume that for no $e\in\mathsf{ext}\;\mathscr{P}$, $e\cdot\sigma<\beta\cdot\sigma$. Equivalently, for all $e\in\mathsf{ext}\;\mathscr{P}$, () $e\cdot\sigma\geq\beta\cdot\sigma.$ Since $\mathscr{P}^{+}$ is nonempty, in view of (2), let $\tau\in\mathscr{P}\cap\mathscr{P}^{+}$, i.e., () $\tau\cdot\sigma<\beta\cdot\sigma.$ If $\tau\in\mathsf{ext}\;\mathscr{P}$ the claim is settled. Assume that $\tau\not\in\mathsf{ext}\;\mathscr{P}=\\{e_{1},\ldots,e_{l}\\}$. Then there are $\lambda_{1},\ldots,\lambda_{l}\in[0,1]$ such that $\sum_{i}\lambda_{i}=1$ and $\tau=\sum_{i}\lambda_{i}\cdot e_{i}$. From () it follows that $e_{i}\cdot\sigma\geq\beta\cdot\sigma$, and hence $\sum\lambda_{i}e_{i}\cdot\sigma\geq\beta\cdot\sigma$, that is, $\tau\cdot\sigma\geq\beta\geq\sigma$, which contradicts (). (4) See [11, Lemma 6.1 (1)]. ∎ Let $k=1,2,\ldots$ and let $x=\langle n_{1}/d_{1},\ldots,n_{k}/d_{k}\rangle$ be a rational vector in $\mathbb{R}^{k}$ with $n_{i}$ and $d_{i}$ relatively prime for all $i=1,\ldots,k$. Denote by ${\rm den}(x)$ the least common multiple of $d_{1},\ldots,d_{k}$. The homogeneous correspondent of $x$ is the vector $\left\langle\frac{n_{1}}{d_{1}}\cdot{\rm den}(x),\ldots,\frac{n_{k}}{d_{k}}\cdot{\rm den}(x),{\rm den}(x)\right\rangle\in\mathbb{Z}^{k+1}.$ Let $k=1,2,\ldots$ and $m=0,1,\ldots,k$. A rational $m$-simplex $\mathsf{co}(x_{1},\ldots,x_{m})\subseteq\mathbb{R}^{k}$ is said to be regular if the set of the homogeneous correspondents of $x_{1},\ldots,x_{m}$ is part of a basis of the abelian group $\mathbb{Z}^{m+1}$ [8, Chapter V, Definition 1.10]. A regular complex $\Delta$ is a simplicial complex all of whose simplexes are regular222Recall that a simplicial complex $\Delta$ is a nonempty finite set of simplexes such that: the face of each simplex in $\Delta$ belongs to $\Delta$ and for each pair of simplexes $T_{1},T_{2}\in\Delta$ their intersection is either empty, or it coincides with a common face of $T_{1}$ and $T_{2}$.. Unless otherwise specified, all regular simplexes in this paper are over the $n$-cube $[0,1]^{n}$ (i.e., their faces constitute a unimodular triangulations of $[0,1]^{n}$, in the terminology of [26]). Thus, we will say that $\Delta$ is a regular complex of $[0,1]^{n}$ without danger of confusion. From the regularity of $\Delta$ it follows that $\Delta$ is rational. We will denote by $V(\Delta)$ the finite set of rational vertices of $\Delta$, i.e., the union of the set of the vertices of the simplexes in $\Delta$. Let $\Phi$ be a finite subset of the free $n$-generated MV-algebra ${\bf F}_{n}$. Up to isomorphism, we can (and we will, throughout this paper) think of $\Phi$ as a finite set of $n$-variable McNaughton functions. Further, if not otherwise specified, we will assume that $\Phi$ has $k$ elements, denoted $f_{1},\ldots,f_{k}$. Following [26, §3], for any $\Phi$, there exists a regular complex $\Delta$ of $[0,1]^{n}$ which linearizes $\Phi$ in the sense that each $f_{i}$ is linear over each simplex of $\Delta$. ###### Example 2.3. Let us fix $n=2$ and consider $\Phi=\\{x,y,x\oplus y\\}$. Consider the regular complexes $\Delta_{1}$ and $\Delta_{2}$ of Figure 1 and whose vertices are $v^{1}_{1}=\langle 0,0\rangle$, $v^{1}_{2}=\langle 0,1\rangle$, $v^{1}_{3}=\langle 1,0\rangle$, $v^{1}_{4}=\langle 1,1\rangle$, $v^{1}_{5}=\langle 1/2,1/2\rangle$ for $\Delta_{1}$ and $v^{2}_{1}=\langle 0,0\rangle$, $v^{2}_{2}=\langle 0,1\rangle$, $v^{2}_{3}=\langle 1,0\rangle$, $v^{2}_{4}=\langle 1,1\rangle$, $v^{2}_{5}=\langle 1/2,1/2\rangle$, $v_{6}^{2}=\langle 1/3,1/3\rangle$, $v_{7}^{2}=\langle 1/2,0\rangle$, $v_{8}^{2}=\langle 0,1/2\rangle$ for $\Delta_{2}$. Then $\Delta_{1}$ is union of four maximal simplexes, while $\Delta_{2}$ is union of eight simplexes, see Figure 1 Both $\Delta_{1}$ and $\Delta_{2}$ linearize $\Phi$. Indeed, for each regular simplex $T$ of $\Delta_{1}$ and each simplex $T^{\prime}$ of $\Delta_{2}$, the restriction of each function $f\in\Phi$ to $T$ and $T^{\prime}$ is linear. $v_{1}^{1}$$v_{3}^{1}$$v_{4}^{1}$$v_{2}^{1}$$v_{5}^{1}$ $v_{1}^{2}$$v_{3}^{2}$$v_{4}^{2}$$v_{2}^{2}$$v_{5}^{2}$$v_{6}^{2}$$v_{7}^{2}$$v_{8}^{2}$ Figure 1. The two regular complexes $\Delta_{1}$ (on the left) and $\Delta_{2}$ (on the right) of the square $[0,1]^{2}$. Every function $x,y$ and $x\oplus y$ is linear over each simplex of $\Delta_{1}$ and $\Delta_{2}$. $\Box$ Let $\Delta$ be a regular complex of $[0,1]^{n}$, and let $v_{i}$ be one of its vertices. The normalized Schauder hat at $v_{i}$ (over $\Delta$) is the uniquely determined continuous function $\hat{h}_{i}:[0,1]^{n}\to[0,1]$ which is linear over each simplex of $\Delta$ and which attains the value $1$ at $v_{i}$ and $0$ at all other vertices of $\Delta$. The regularity of $\Delta$ ensures that each linear piece of each $\hat{h}_{i}$ has integer coefficients and hence $\hat{h}_{i}\in{\bf F}_{n}$. By definition of normalized Schauder hat, $\Delta$ linearizes each $\hat{h}_{i}$. Further, the following result holds: ###### Lemma 2.4. Let $\Phi$ be a finite subset of ${\bf F}_{n}$, let $\Delta$ be a regular complex linearizing $\Phi$ and let $v_{1},\ldots,v_{t}$ be the vertices of $\Delta$. Then: 1. (1) For each $i\neq j$, $\hat{h}_{i}\odot\hat{h}_{j}=0$; 2. (2) $\bigoplus_{i=1}^{t}\hat{h}_{i}=1$; 3. (3) For each $f\in\Phi$, $f=\bigoplus_{i=1}^{t}f(v_{t})\cdot\hat{h}_{t}$; 4. (4) Let $v_{i_{1}},\ldots,v_{i_{l}}\in V(\Delta)$, and let $\mathscr{P}=\mathsf{co}(v_{i_{1}},\ldots,v_{i_{l}})$. Then the function $p=\bigoplus_{v_{j}\in\Delta\cap\mathscr{P}}\hat{h}_{j}$ is a McNaughton function whose oneset is $\mathscr{P}$. ###### Proof. (1) (2) and (3) have been proved in [26, Lemma 3.4 (ii), (iii), (iv) and (v)]. Let next prove (4). First of all, $p=\bigoplus_{v\in\Delta\cap\mathscr{P}}\hat{h}_{v}$ is a McNaughton function by definition. Further, for every vertex $v\in\Delta\cap\mathscr{P}$, $p(v)=1$ by definition of normalized Schauder hat. If $x\in\mathscr{P}\setminus V(\Delta)$, let $\Sigma$ be a simplex of $\Delta$ which contains $x$. The claim follows, since each $\hat{h}_{j}$ is linear on $\Sigma$. ∎ ## 3\. A geometric characterization of strict coherence. By Proposition 2.1, if $\Phi=\\{f_{1},\ldots,f_{k}\\}$ is a finite subset of ${\bf F}_{n}$ and $\beta$ a book on $\Phi$, we can rephrase the definitions of coherence and strict coherence for $\beta$ as follows: 1. (1) $\beta$ is coherent if for every $\sigma\in\mathbb{R}^{k}$, there exists $x\in[0,1]^{n}$ such that $\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle\geq 0$. 2. (2) $\beta$ is strictly coherent if for every $\sigma\in\mathbb{R}^{k}$, the existence of $x\in[0,1]^{n}$ such that $\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle<0$, implies the existence of another $x^{\prime}\in[0,1]^{n}$ such that $\sigma\cdot\langle f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle>0$. Notice that a book $\beta$ is coherent and not strictly coherent iff for any vector $\sigma\in\mathbb{R}^{k}$, one has that for all $x\in[0,1]^{n}$, $\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle\leq 0$ and for some $x^{\prime}\in[0,1]^{n}$, $\sigma\cdot\langle f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle=0$. Throughout we will adopt the following notation: $\mathscr{D}_{\Phi}=\\{\beta:\Phi\to[0,1]\mid\beta\mbox{ is coherent}\\}.$ For any $X\subseteq[0,1]^{n}$, $\mathscr{C}_{\Phi}(X)$ will denote the topological closure of the convex hull of all points of $\mathbb{R}^{k}$ of the form $\langle f_{1}(x),\ldots,f_{k}(x)\rangle$ for $\varphi_{i}\in\Phi$ and $x\in X$. In symbols, $\mathscr{C}_{\Phi}(X)=\mathsf{cl}\;\mathsf{co}\\{\langle f_{1}(x),\ldots,f_{k}(x)\rangle\mid\varphi_{i}\in\Phi,x\in X\\}.$ Whenever $X$ is finite, $\mathscr{C}_{\Phi}(X)=\mathsf{co}\\{\langle f_{1}(x),\ldots,f_{k}(x)\rangle\mid\varphi_{i}\in\Phi,x\in X\\}$, which is a convex polytope. For the sake of readability, we will write $\mathscr{C}_{\Phi}$ instead of $\mathscr{C}_{\Phi}([0,1]^{n})$. For every finite $\Phi$, Mundici’s extension of de Finetti’s theorem to Łukasiewicz logic (see [26, Theorem 2.1]) shows that $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}$. ###### Lemma 3.1. [26, Corollary 5.4] For any book $\beta:\Phi\to[0,1]$ the following conditions are equivalent: 1. (1) $\beta$ is coherent; 2. (2) There exists a finite $X\subset[0,1]^{n}$ such that, for each $f_{i}\in\Phi$, $\beta(f_{i})\in\mathscr{C}_{\Phi}(X)$; 3. (3) There exists a finite $X\subset[0,1]^{n}$ with $|X|\leq n+1$ such that, for each $f_{i}\in\Phi$, $\beta(f_{i})\in\mathscr{C}_{\Phi}(X)$; 4. (4) For each regular complex $\Delta$ of $[0,1]^{n}$ linearizing $\Phi$, $\beta(f_{i})\in\mathscr{C}_{\Phi}(V(\Delta))$. The next corollary is an immediate consequence of Lemma 3.1. ###### Corollary 3.2. Let $\Phi$ be a finite set of Łukasiewicz formulas. Then, for every regular complex $\Delta$ which linearizes $\Phi$, $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(V(\Delta)).$ Thus, the coherence of a book $\beta$ on $\Phi$ does not depend on the particular regular complex $\Delta$ chosen to linearize $\Phi$. Moreover, since for each $\Delta$, $V(\Delta)$ is finite, $\mathscr{C}_{\Phi}(V(\Delta))$ is a polytope coinciding with $\mathscr{D}_{\Phi}$. Therefore, by the Krein-Milman theorem [8, Theorem 1.2], $\mathscr{C}_{\Phi}(V(\Delta))$ is the convex hull of the set of extremal points of $\mathscr{D}_{\Phi}$, i.e., for every $\Delta$, $\mathscr{C}_{\Phi}(V(\Delta))=\mathsf{co}\;\mathsf{ext}\;\mathscr{D}_{\Phi}.$ The following example clarifies the claim made in Corollary 3.2. ###### Example 3.3. Let $\Phi=\\{x,y,x\oplus y\\}$ together with the regular complexes $\Delta_{1}$ and $\Delta_{2}$ of Example 2.3. Each of the five vertices $v^{1}_{i}$ of $\Delta_{1}$ determines a point $p_{i}=\langle f_{1}(v^{1}_{i}),f_{2}(v^{1}_{i}),f_{3}(v^{1}_{i})\rangle\in\mathbb{R}^{3}$ (where $f_{1}(x,y)=x,f_{2}(x,y)=y$ and $f_{3}(x,y)=x\oplus y$) and $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(\\{v^{1}_{1},\ldots,v^{1}_{5}\\})=\mathsf{co}(\\{p_{1},\ldots,p_{5}\\}).$ In particular: $p_{1}=\langle 0,0,0\rangle$, $p_{2}=\langle 0,1,1\rangle$, $p_{3}=\langle 1,0,1\rangle$, $p_{4}=\langle 1,1,1\rangle$ and $p_{5}=\langle 1/2,1/2,1\rangle$. Similarly, for $\Delta_{2}$, $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(\\{v^{2}_{1},\ldots,v^{2}_{8}\\})=\mathsf{co}(\\{q_{1},\ldots,q_{8}\\}),$ where: $q_{1}=p_{1}=\langle 0,0,0\rangle$, $q_{2}=p_{2}=\langle 0,1,1\rangle$, $q_{3}=p_{3}=\langle 1,0,1\rangle$, $q_{4}=p_{4}=\langle 1,1,1\rangle$, $q_{5}=p_{5}=\langle 1/2,1/2,1\rangle$, $q_{6}=\langle 1/3,1/3,2/3\rangle$, $q_{7}=\langle 1/2,0,1/2\rangle$ and $q_{8}=\langle 0,1/2,1/2\rangle$. $p_{1}$$p_{3}$$p_{4}$$p_{2}$$p_{5}$$p_{5}$$q_{6}$$q_{7}$$q_{8}$ $p_{1}$$p_{3}$$p_{4}$$p_{2}$$p_{5}$$q_{6}$$q_{7}$$q_{8}$ Figure 2. The convex polytope $\mathscr{D}_{\Phi}$ (in two perspectives) for $\Phi=\\{x,y,x\oplus y\\}$, and its extremal points $p_{1},p_{2},p_{3}$ and $p_{4}$. Since both $\Delta_{1}$ and $\Delta_{2}$ linearize $\Phi$, $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}(V(\Delta_{1}))=\mathscr{C}_{\Phi}(V(\Delta_{2}))$ (see Figure 2) and $\mathsf{ext}\;\mathscr{C}_{\Phi}(V(\Delta_{1}))=\mathsf{ext}\;\mathscr{C}_{\Phi}(V(\Delta_{2}))=\mathsf{ext}\;\mathscr{D}_{\Phi}=\\{p_{1},p_{2},p_{3},p_{4}\\}.$ $\Box$ Let us write: $\mathscr{K}_{\Phi}=\\{\beta:\Phi\to[0,1]\mid\beta\mbox{ is strictly coherent}\\}.$ The following theorem, which is the main result of this section, provides us with a geometric characterization of strict coherence for books on formulas of Łukasiewicz logic. ###### Theorem 3.4. Let $\Phi$ be a finite subset of ${\bf F}_{n}$. Then $\mathscr{K}_{\Phi}=\mathsf{ri}\;\mathscr{D}_{\Phi}.$ ###### Proof. Since $\mathscr{D}_{\Phi}=\mathscr{C}_{\Phi}$, we will prove the equivalent claim: $\mathscr{K}_{\Phi}=\mathsf{ri}\;\mathscr{C}_{\Phi}$. Trivially, $\mathscr{K}_{\Phi}\subseteq\mathscr{C}_{\Phi}$. Let us show that $\mathscr{K}_{\Phi}\subseteq\mathsf{ri}\;\mathscr{C}_{\Phi}$. Since $\mathscr{C}_{\Phi}$ is closed, $\mathscr{C}_{\Phi}=\mathsf{ri}\;\mathscr{C}_{\Phi}\cup\mathsf{rb}\;\mathscr{C}_{\Phi}$ and $\mathsf{ri}\;\mathscr{C}_{\Phi}\cap\mathsf{rb}\;\mathscr{C}_{\Phi}=\emptyset$. Assume (absurdum hypothesis) that $\beta\in\mathscr{K}_{\Phi}\cap\mathsf{rb}\;\mathscr{C}_{\Phi}$. By Lemma 2.2 (1) there exists $\sigma\in\mathbb{R}^{k}$ such that for all $\gamma\in\mathscr{C}_{\Phi}$, $\sigma\cdot\beta\leq\sigma\cdot\gamma.$ Thus, for all $x\in[0,1]^{n}$, $\sigma\cdot\beta\leq\sigma\cdot\langle f_{1}(x),\ldots,f_{k}(x)\rangle\leq 0.$ Therefore, $\beta$ is coherent but not strictly coherent. This contradicts our hypothesis. Thus, $\mathscr{K}_{\Phi}\subseteq\mathsf{ri}\;\mathscr{C}_{\Phi}$. In order to prove the converse inclusion, assume that $\beta\in\mathsf{ri}\;\mathscr{C}_{\Phi}$ and let $\sigma\in\mathbb{R}^{k}$ satisfy Lemma 2.2 (2). Then $(\mathscr{C}_{\Phi})_{\sigma}^{+}=\\{\gamma\in\mathscr{C}_{\Phi}\mid\gamma\cdot\sigma<\beta\cdot\sigma\\}$ and $(\mathscr{C}_{\Phi})_{\sigma}^{-}=\\{\gamma\in\mathscr{C}_{\Phi}\mid\gamma\cdot\sigma>\beta\cdot\sigma\\},$ are nonempty. Moreover, by Lemma 2.2 (3), both $(\mathscr{C}_{\Phi})_{\sigma}^{+}$ and $(\mathscr{C}_{\Phi})_{\sigma}^{-}$ contain an extremal point of $\mathscr{C}_{\Phi}$. Therefore, there are $x,x^{\prime}\in[0,1]^{n}$ such that $\langle f_{1}(x),\ldots,f_{k}(x)\rangle\cdot\sigma<\beta\cdot\sigma$ and $\langle f_{1}(x^{\prime}),\ldots,f_{k}(x^{\prime})\rangle\cdot\sigma>\beta\cdot\sigma$, that is, $\beta$ is strictly coherent. ∎ ###### Corollary 3.5. Let $\Phi$ and $\beta$ be as above. Then the following conditions are equivalent: 1. (1) $\beta$ is strictly coherent; 2. (2) For each regular complex $\Delta$ which linearizes $\Phi$, there is $\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v_{i}\in V(\Delta)}\lambda(v_{i})=1$, for all $v_{i}\in V(\Delta)$, $\lambda(v_{i})>0$ and $\beta(f_{j})=\sum_{v_{i}\in V(\Delta)}\lambda(v_{i})\cdot f_{j}(v_{i})$; 3. (3) There exists a map $\lambda:\mathsf{ext}\;\mathscr{D}_{\Phi}\to[0,1]$ such that $\sum_{e\in\mathsf{ext}\;\mathscr{D}_{\Phi}}\lambda(e)=1$, for all $e\in\mathsf{ext}\;\mathscr{D}_{\Phi}$, $\lambda(e)>0$ and $\beta(\varphi_{i})=\sum_{e\in\mathsf{ext}\;\mathscr{D}_{\Phi}}\lambda(e)\cdot f_{i}(e)$. Further, the set $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ of rational-valued strictly coherent books on $\Phi$ is decidable. ###### Proof. The equivalence between (1), (2) and (3) follows from Theorem 3.4, Corollary 3.2 and Lemma 2.2 (4). To conclude the proof we will prove the decidability of the set $\mathscr{K}_{\Phi}^{\mathbb{Q}}$. To this purpose, given $\Phi$, the problem of determining a regular complex $\Delta$ which linearizes all McNaughton functions $f_{i}\in\Phi$, is computable by a Turing machine (see [26, Theorem 7.1, Claim 3]). Therefore, by (2), $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ is decidable iff the following bounded mixed integer programming problem (see [14]) with unknowns $\lambda(v_{i})$ for all $v_{i}\in V(\Delta)$, has a solution in $[0,1]\cap\mathbb{Q}$: $(S_{\mathscr{K}_{\Phi}})=\left\\{\begin{array}[]{l}\lambda(v_{i})>0,\\\ \sum_{v_{i}}\lambda(v_{i})=1,\\\ \sum_{v_{i}}\lambda(v_{i})\cdot f_{\varphi}(v_{i})=\beta(\varphi).\end{array}\right.$ Thus the decidability of $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ follows from [14, Proposition 2]. ∎ ## 4\. Strict coherence, infinite-valued events and faithful states. Generalizing de Finetti’s theorem, a book on Łukasiewicz events is coherent iff it can be extended to a state in the sense of the following definition. ###### Definition 4.1 ([25]). A state of an MV-algebra ${\bf A}$ is a map $s:A\to[0,1]$ satisfying the following conditions: * $(s1)$ Normalization: $s(1)=1$, * $(s2)$ Additivity: $s(a\oplus b)=s(a)+s(b)$, for all $a,b\in A$ such that $a\odot b=0$. A state $s$ is said to be faithful if $s(a)\neq 0$ for all $a\neq 0$. Kroupa and Panti independently proved that for every state $s$ of an MV- algebra ${\bf A}$ there exists a unique regular Borel, and hence $\sigma$-additive, probability measure $\mu_{s}$ on the space of maximal ideals with the hull-kernel topology of ${\bf A}$ such that $s$ is the integral with respect to $\mu_{s}$ (see [17], [29] and [27, §10]). In particular, for $n$-generated free MV-algebras, the Kroupa-Panti theorem shows that for every state $s$ of ${\bf F}_{n}$ there exists a unique regular Borel probability measure $\mu_{s}$ on $[0,1]^{n}$ such that for each $f\in{\bf F}_{n}$, () $s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}.$ The correspondence between states of ${\bf F}_{n}$ and regular Borel probability measures on $[0,1]^{n}$ is one-one. The next result, which to the best of our knowledge is new, represents faithful states of ${\bf F}_{n}$ in a similar manner. Following [33], we say that a regular Borel measure $\mu$ of $[0,1]^{n}$ is strictly positive if for every nonempty open $O\subseteq[0,1]^{n}$, $\mu(O)>0$. ###### Proposition 4.2. For any state $s$ of ${\bf F}_{n}$ the following conditions are equivalent: 1. (1) $s$ is a faithful state; 2. (2) There exists a unique strictly positive, regular probability Borel measure $\mu_{s}$ such that for every $f\in{\bf F}_{n}$, $s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}.$ The correspondence between faithful states of ${\bf F}_{n}$ and strictly positive, regular probability Borel measures of $[0,1]^{n}$ is one-one. ###### Proof. For every state $s$ of ${\bf F}_{n}$, let $\mu_{s}$ be the unique regular probability Borel measure of $[0,1]^{n}$ such that for every $f\in{\bf F}_{n}$, $s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}$ as in the Kroupa-Panti theorem. $(1)\Rightarrow(2)$. Assume that $O$ is a nonempty open set in the product topology of $[0,1]^{n}$, and $\mu_{s}(O)=0$. Let $K_{O}$ be any nonempty compact subset of $O$ and assume, without loss of generality, that $K_{O}$ is a rational polyhedron. By [27, Corollary 2.10], there exists $f\in{\bf F}_{n}$ such that $K_{O}$ is the oneset of $f$. Since $K_{O}$ is contained in $O$, by [18, Lemma 2.2 (i)] there exists $n\in\mathbb{N}$ such that, for all $x\in[0,1]^{n}$, the $n$-fold $\odot$-product $f^{n}=f\odot\ldots\odot f$, satisfies $f^{n}(x)=1$ if $x\in K_{O}$ and $f^{n}(x)=0$ for all $x\not\in O$. Therefore, $f^{n}\neq 0$ and $s(f^{n})=\int_{[0,1]^{n}}f^{n}\;{\rm d}\mu_{s}=0$ whence $s$ is not faithful. $(2)\Rightarrow(1)$. Assume that $s$ is not faithful and in particular, let $f\in{\bf F}_{n}$ be such that $f\neq 0$ and $s(f)=0$. Since $f$ is continuous and not constantly $0$, its support ${\rm supp}(f)=\\{x\in[0,1]^{n}\mid f(x)>0\\}$ is nonempty and open. Thus, $0=s(f)=\int_{[0,1]^{n}}f\;{\rm d}\mu_{s}=\int_{{\rm supp}(f)}f\;{\rm d}\mu_{s},$ whence $\mu_{s}({\rm supp}(f))=0$. ∎ ###### Remark 4.3. From Proposition 4.2 it follows that if ${\bf A}={\bf F}_{n}/I_{C}$ is a finite-dimensional MV-algebra, there is a one-one correspondence between faithful states of ${\bf A}$, strictly positive distributions on the points $c_{1},\ldots,c_{t}$ of $C$, and points in the relative interior of the simplex $\Sigma_{\Delta}=\left\\{\langle\lambda_{1},\ldots,\lambda_{t}\rangle\in\mathbb{R}^{t}\mid\sum_{i=1}^{t}\lambda_{i}=1\right\\}$ (see [11, Remark 6.3]). Every finitely generated free boolean algebra ${\bf A}$ is, in particular, a finite-dimensional MV-algebra and every faithful state $s$ of ${\bf A}$ is a Carnap probability (recall Section 1). Therefore, Proposition 4.2 specializes on boolean events as follows: for every $n=1,2,\ldots$, a finitely additive probability $P$ of the $n$-generated free boolean algebra ${\bf A}$ is Carnap iff there exists a unique strictly positive distribution $\mu_{P}$ on $\\{0,1\\}^{n}$ such that for every $f\in A$, $P(f)=\sum_{x\in\\{0,1\\}^{n}}\mu_{P}(x)\cdot f(x).$ In [11], the authors characterized strictly coherent books on finite subsets of a finite-dimensional MV-algebra ${\bf A}$ (recall Section 2) as those books that can be extended to a faithful state of ${\bf A}$. In this section, we will provide two measure-theoretical characterizations of strict coherence for books on ${\bf F}_{n}$. The first one (Theorem 4.6) involves states satisfying a local version of faithfulness which depends both on $\Phi$ and on the fixed regular complex linearizing its functions; the second one (Theorem 4.8) is given in terms of faithful states of ${\bf F}_{n}$. ###### Definition 4.4. Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\Delta$ be a regular complex which linearizes $\Phi$. Then $s$ is said to be $\Delta$-faithful provided that $s(\hat{h}_{v})>0$ for all $v\in V(\Delta)$. The next lemma collects some useful properties of states and $\Delta$-faithful states. ###### Lemma 4.5. For each regular complex $\Delta$ of $[0,1]^{n}$ with vertices $V(\Delta)=\\{v_{1},\ldots,v_{t}\\}$, the following conditions hold: 1. (1) For each map $\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v\in V(\Delta)}\lambda(v)=1$, the map $s_{\lambda}:{\bf F}_{n}\to[0,1]$ defined as () $s_{\lambda}(f)=\sum_{v\in V(\Delta)}f(v)\cdot\lambda(v).$ is a state of ${\bf F}_{n}$. 2. (2) The set of $\Delta$-faithful states of ${\bf F}_{n}$ is in one-one correspondence with the set of faithful states of ${\bf F}_{n}/I_{V(\Delta)}$ and hence is in one-one correspondence with the relative interior of the simplex $\Sigma_{\Delta}=\left\\{\langle\lambda_{1},\ldots,\lambda_{t}\rangle\in\mathbb{R}^{t}\mid\sum_{i=1}^{t}\lambda_{i}=1\right\\}.$ ###### Proof. (1). Every state of ${\bf F}_{n}$ belongs to the closure of the convex hull of the homomorphisms of ${\bf F}_{n}$ to $[0,1]_{MV}$ (see [25, Theorem 2.5] and [12, Theorem 4.1.1]). Thus the claim follows immediately from Proposition 2.1 (2). The claim easily follows from Proposition 4.2, Remark 4.3 and the definition of $\Delta$-faithfulness. ∎ The next theorem yields a characterization of strictly coherent books in terms of $\Delta$-faithful states. ###### Theorem 4.6. Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on $\Phi$. Then the following conditions are equivalent: 1. (1) $\beta$ is strictly coherent; 2. (2) There exists a regular complex $\Delta$ which linearizes $\Phi$ and a $\Delta$-faithful state $s$ which extends $\beta$; 3. (3) For every regular complex $\Delta$ which linearizes $\Phi$, there exists a $\Delta$-faithful state $s$ of ${\bf F}_{n}$ which extends $\beta$. ###### Proof. $(1)\Rightarrow(3)$. Let $\beta$ be strictly coherent. From Corollary 3.5 (3), for every regular complex $\Delta$ linearizing $\Phi$, there exists a map $\lambda:V(\Delta)\to[0,1]$ such that $\sum_{v\in V(\Delta)}\lambda(v)=1$, $\lambda(v)>0$ for all $v\in V(\Delta)$ and for every $f_{j}\in\Phi$, () $\beta(f_{j})=\sum_{v\in V(\Delta)}f_{j}(v)\cdot\lambda(v).$ Let $s_{\lambda}$ be the state of ${\bf F}_{n}$ defined in (). First of all notice that, directly from () and (), $s_{\lambda}$ extends $\beta$. Furthermore, for every vertex $v\in V(\Delta)$, the normalized Schauder hat $\hat{h}_{v}$ takes value $1$ on $v$ and $0$ on any $v^{\prime}\neq v$. Thus, $s_{\lambda}(\hat{h}_{v})=\sum_{v^{\prime}\in V(\Delta)}\hat{h}_{v}(v^{\prime})\cdot\lambda(v^{\prime})=\lambda(v)$ and hence $s_{\lambda}(\hat{h}_{v})>0$. Therefore $s_{\lambda}$ is a $\Delta$-faithful state of ${\bf F}_{n}$ which extends $\beta$. $(3)\Rightarrow(1)$. Now assume that (3) holds and define $\lambda:V(\Delta)\to[0,1]$ by $\lambda(v)=s(\hat{h}_{v}).$ From Lemma 2.4, $\sum_{v\in V(\Delta)}\lambda(v)=\sum_{v\in V(\Delta)}s(\hat{h}_{v})=s\left(\bigoplus_{v\in V(\Delta)}\hat{h}_{v}\right)=s(1)=1.$ Since $s$ is $\Delta$-faithful, $\lambda(v)>0$ for each $v\in V(\Delta)$. Further, for all $f_{i}\in\Phi$, $\beta(f_{i})=s(f_{i})=\sum_{v\in V(\Delta)}\lambda_{v}\cdot f_{i}(v)$. Thus, $\beta$ is strictly coherent by Corollary 3.5 ($(2)\Rightarrow(1)$). Finally, $(3)\Rightarrow(2)$ is trivial and $(2)\Rightarrow(3)$ follows from $(1)\Leftrightarrow(3)$ above, Corollary 3.2 and Theorem 3.4 ∎ Lemma 4.5 (2) shows that for each regular complex $\Delta$ which linearizes $\Phi$, $\Delta$-faithful states of ${\bf F}_{n}$ are in one-one correspondence with faithful states of ${\bf F}_{n}/I_{V(\Delta)}$. In particular, for every $\Delta$-faithful state $s$ of ${\bf F}_{n}$, let $s_{\Delta}$ be the unique faithful state of ${\bf F}_{n}/I_{V(\Delta)}$ such that: for every $f\in{\bf F}_{n}$, let $f_{\Delta}$ to be the restriction of $f$ to $V(\Delta)$ and $s_{\Delta}(f_{\Delta})=\sum_{v\in V(\Delta)}s(\hat{h}_{v})\cdot f_{\Delta}(v).$ Thus, if $f\in\Phi$, $s_{\Delta}(f_{\Delta})=s(f)$. We then have: ###### Corollary 4.7. Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on $\Phi$. Then the following conditions are equivalent: 1. (1) $\beta$ is strictly coherent; 2. (2) There exists a regular complex $\Delta$ which linearizes $\Phi$ and a faithful state $s_{\Delta}$ of ${\bf F}_{n}/I_{V(\Delta)}$ such that, for all $f\in\Phi$, $\beta(f)=s_{\Delta}(f_{\Delta})$; 3. (3) For every regular complex $\Delta$ which linearizes $\Phi$, there exists a faithful state $s_{\Delta}$ of ${\bf F}_{n}/I_{V(\Delta)}$ such that, for all $f\in\Phi$, $\beta(f)=s_{\Delta}(f_{\Delta})$. The following construction is used in the next result which characterizes strictly coherent books in terms of faithful states: let $\beta$ be a strictly coherent book on a finite subset $\Phi$ of ${\bf F}_{n}$, fix an enumeration $g_{1},g_{2},\ldots$ of ${\bf F}_{n}\setminus\\{\Phi,0,1\\}$ and consider the following inductive construction: * ($S_{1}$) Put $\Phi_{1}=\Phi\cup\\{g_{1}\\}$. Each regular complex $\Delta_{1}$ linearizing $\Phi_{1}$ also linearizes $\Phi$. Since $\beta$ is strictly coherent, Theorem 4.6 yields a $\Delta_{1}$-faithful state $s_{1}$ which extends $\beta$. It follows that the extended book $\beta_{1}=\beta\cup\\{g_{1}\mapsto s_{1}(g_{1})\\}$ is strictly coherent because $s_{1}$ extends it. Further, $0<s_{1}(g_{1})<1$. * ($S_{2}$) Consider $\Phi_{2}=\Phi_{1}\cup\\{g_{2}\\}$ and fix $\Delta_{2}$ that linearizes $\Phi_{2}$ and a $\Delta_{2}$-faithful state $s_{2}$ which extends $\beta_{1}$. Again, $0<s_{2}(g_{2})<1$ and $\beta_{2}=\beta_{1}\cup\\{g_{2}\mapsto s_{2}(g_{2})\\}$ is strictly coherent by Theorem 4.6. Further, $s_{2}(e)=s_{1}(e)$ for all $e\in\Phi_{1}$. * ($S_{i+1}$) At step $i+1$, arguing by induction, construct a regular complex $\Delta_{i+1}$ which linearizes $\Phi_{i}\cup\\{g_{i+1}\\}=\Phi\cup\\{g_{1},\ldots,g_{i+1}\\}$, a state $s_{i+1}$ of ${\bf F}_{n}$ which is $\Delta_{i+1}$-faithful and a strictly coherent book $\beta_{i+1}=\beta_{i}\cup\\{g_{i+1}\mapsto s_{i+1}(g_{i+1})\\}$. For each $n$, the state $s_{n}$ agrees with $s_{n-1}$ over $\Phi_{n-1}$. Thus, for all $n_{0}$ and for all $n>n_{0}$, $s_{n}(g_{n_{0}})$ always attains the same value. In particular, for all $n,m\in\mathbb{N}$, $s_{n}(f)=s_{m}(f)$ for all $f\in\Phi$. ###### Theorem 4.8. Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a book on $\Phi$. Then the following conditions are equivalent: 1. (1) $\beta$ is strictly coherent; 2. (2) $\beta$ extends to a faithful state of ${\bf F}_{n}$. ###### Proof. The direction $(2)\Rightarrow(1)$ is trivial. Thus, let $\beta$ be strictly coherent and fix an enumeration $g_{1},g_{2},\ldots$ of ${\bf F}_{n}\setminus\\{\Phi,0,1\\}$. The construction above determines subsets $\Phi=\Phi_{0}\subseteq\Phi_{1}\subseteq\Phi_{2}\subseteq\ldots$ of ${\bf F}_{n}$ and a sequence $\\{s_{i}\\}_{i\geq 1}$ of states of ${\bf F}_{n}$ such that: * (i) Each $s_{i}$ is a $\Delta_{i}$-faithful state of ${\bf F}_{n}$; * (ii) For all $n>m$, $s_{m}(e)=s_{n}(e)$ for all $e\in\Phi_{m}$. By construction of the $\Phi_{i}$’s, for every $f\in{\bf F}_{n}$ there exists an $m\geq 0$ such that $f\in\Phi_{m}$ and hence, by (ii), $s_{m}(f)=s_{n}(f)$ for all $n>m$. Therefore, $\\{s_{i}(f)\\}_{i\geq 0}$ is a Cauchy sequence. This gives that $\\{s_{i}\\}_{i\geq 0}$ is pointwise convergent. Define $s:{\bf F}_{n}\to[0,1]$ as follows: for each $f\in{\bf F}_{n}$, $s(f)=\lim_{i\to\infty}s_{i}(f).$ Let us prove that $s$ is a state. Clearly $s(1)=1$. If $a\oplus b=0$ then, for all $i\geq 0$, $s_{i}(a\oplus b)=s_{i}(a)+s_{i}(b)$ and by the continuity of $+$, $s(a\oplus b)=\lim_{i\to\infty}s_{i}(a\oplus b)=\lim_{i\to\infty}s_{i}(a)+s_{i}(b)=\lim_{i\to\infty}s_{i}(a)+\lim_{i\to\infty}s_{i}(b)=s(a)+s(b)$. By construction, $s$ extends $\beta$ since so does each $s_{n}$. There remains to be proved that $s$ is faithful. We will provide two proofs of this fact. (Proof 1). By [11, Theorem 5.2] $s$ is faithful iff for each finite subset $\Psi$ of ${\bf F}_{n}$ the restriction of $s$ to $\Psi$ is strictly coherent. Recalling the above construction, let $i_{0}$ be the minimum index such that $\Psi\subseteq\Phi_{i_{0}}$. Thus, the restriction of $s$ to $\Psi$ coincides with the restriction of $s_{i_{0}}$ to $\Psi$ and the restriction of $s_{i_{0}}$ to $\Phi_{i_{0}}$ is strictly coherent. The claim immediately follows because strict coherence is preserved for books contained in a strictly coherent one. (Proof 2). Let $1>f>0$. If $f\in\Phi$ there is nothing to prove. Conversely, assume that $f=g_{i}$ for some $i$. Therefore, for all $j\geq i$, $s_{j}(f)=\alpha>0$. Thus, $s(f)=\lim_{i\to\infty}s_{i}(f)=\alpha>0$ and the claim is settled. ∎ ## 5\. Coherence, strict coherence and provability in Łukasiewicz logic. Propositional Łukasiewicz logic ($\L$ in symbols) is the logical calculus having MV-algebras as its equivalent algebraic semantics. Formulas of Łukasiewicz logic will be denoted by lower case Greek letter and $\L(m)$ will stand for the set of formulas in a language with $m$ propositional variables. A complete axiomatization of $\L$ can be found in [3, Definition 4.3.1]. A formula $\varphi$ is said to be a theorem, in symbols $\vdash\varphi$, if $\varphi$ can be deduced from the axioms of $\L$ and by its unique rule of modus ponens. A theory $\Theta$ is a deductively closed set of formulas. A theory $\Theta$ of $\L(m)$ is said to be finitely axiomatizable if for some (necessarily satisfiable) formula $\theta\in\L(m)$, $\Theta$ is the smallest theory of $\L(m)$ which contains $\theta$. By Proposition 2.1, valuations of the Łukasiewicz language $\L(m)$ are in one- one correspondence with homomorphisms of ${\bf F}_{m}$ to $[0,1]_{MV}$ as well as with points of the $m$-cube $[0,1]^{m}$. Thus, a formula $\varphi\in\L(m)$ is a tautology if $h(\varphi)=1$ for all homomorphisms $h:{\bf F}_{m}\to[0,1]_{MV}$ iff the oneset of $f_{\varphi}$ coincides with $[0,1]^{m}$, where $f_{\varphi}$ is the unique McNaughton function determined by $\varphi$ [24]. For every $\mathscr{X}\subseteq[0,1]^{m}$ and theory $\Theta$ we write ${\rm Th}(\mathscr{X})=\\{\psi\in\L(m)\mid(\forall x\in\mathscr{X})\;f_{\psi}(x)=1\\}$ and ${\rm Mod}(\Theta)=\\{x\in[0,1]^{m}\mid(\forall\psi\in\Theta)\;f_{\psi}(x)=1\\}.$ Given two (not necessarily finitely axiomatizable) theories $\Theta_{1}$ and $\Theta_{2}$, we write $\Theta_{1}\models\Theta_{2}$, if ${\rm Mod}(\Theta_{1})\subseteq{\rm Mod}(\Theta_{2})$. Following [27, Definition 3.9], two rational polyhedra $\mathscr{P}$ and $\mathscr{Q}$ of $[0,1]^{m}$ are said to be $\mathbb{Z}$-homeomorphic (in symbols, $\mathscr{P}\cong_{\mathbb{Z}}\mathscr{Q}$) if there exists a homeomorphism $\eta:\mathscr{P}\to\mathscr{Q}$ such that both $\eta$ and $\eta^{-1}$, as maps from $\mathbb{R}^{m}\to\mathbb{R}^{m}$ are $\mathbb{Z}$-maps, i.e., $\eta$ and $\eta^{-1}$ are piecewise linear with integer coefficients. ###### Lemma 5.1 ([27, Theorem 3.20]). For every $m=1,2,\ldots$, the pair $({\rm Th},{\rm Mod})$ establishes a Galois connection between rational polyhedra of $[0,1]^{m}$ and finitely axiomatizable theories of $\L(m)$. In particular: 1. (1) For every finitely axiomatizable theory $\Theta$ of $\L(m)$, there exists a unique rational polyhedron $\mathscr{P}_{\Theta}$ of $[0,1]^{m}$ such that ${\rm Mod}({\rm Th}(\Theta))\cong_{\mathbb{Z}}\mathscr{P}_{\Theta}$. 2. (2) For each rational polyhedron $\mathscr{P}$ of $[0,1]^{m}$ there exists a unique finitely axiomatizable theory $\Theta_{\mathscr{P}}$ such that ${\rm Mod}({\rm Th}(\Theta_{\mathscr{P}}))\cong_{\mathbb{Z}}\mathscr{P}$. 3. (3) For $\mathscr{P}_{1}$ and $\mathscr{P}_{2}$ rational polyhedra, $\mathscr{P}_{1}\subseteq\mathscr{P}_{2}$ iff ${\rm Mod}(\Theta_{\mathscr{P}_{1}})\subseteq{\rm Mod}(\Theta_{\mathscr{P}_{2}})$ iff $\Theta_{\mathscr{P}_{1}}\models\Theta_{\mathscr{P}_{2}}$. In the rest of this section we will adopt the notation used in Lemma 5.1 above with the following exception: if $x\in([0,1]\cap\mathbb{Q})^{m}$, we denote by $\Theta_{x}$ the finitely axiomatizable theory $\Theta_{\\{x\\}}$. Let $\Phi$ be a subset of ${\bf F}_{n}$ of finite cardinality $k$ and let $\beta$ be a rational-valued book on $\Phi$. As noted at the beginning of Section 3, $\\{\beta\\}$, $\mathscr{C}_{\Phi}$ and $\mathsf{rb}\;\mathscr{C}_{\Phi}$ are rational polyhedra of $[0,1]^{k}$. By Lemma 5.1, $\Theta_{\beta}$, $\Theta_{\mathscr{C}_{\Phi}}$ and $\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$ are finitely axiomatizable. The following lemma provides a first characterization of coherence and strict coherence in terms of deducibility. ###### Lemma 5.2. Let $\Phi$ be a finite subset of ${\bf F}_{n}$ and let $\beta$ be a rational- valued book on $\Phi$. Thus the following conditions hold: 1. (1) $\beta$ is coherent iff $\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$. 2. (2) $\beta$ is strictly coherent iff $\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ and $\Theta_{\beta}\not\models\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$. ###### Proof. (1) follows from [26, Theorem 2.1], Lemma 5.1 and the definition of $\models$. Indeed, $\beta$ is coherent iff $\beta\in\mathscr{C}_{\Phi}$ iff $\\{\beta\\}\subseteq\mathscr{C}_{\Phi}$. As for (2), Theorem 3.4 shows that $\beta$ is strictly coherent iff $\beta\in\mathsf{ri}\mathscr{C}_{\Phi}=\mathscr{C}_{\Phi}\setminus\mathsf{rb}\;\mathscr{C}_{\Theta}$ iff $\beta\in\mathscr{C}_{\Phi}$ and $\beta\not\in\mathsf{rb}\;\mathscr{C}_{\Theta}$ iff $\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ (by (1) above) and $\\{\beta\\}\not\subseteq\mathsf{rb}\;\mathscr{C}_{\Theta}$. By Lemma 5.1 (3) this condition is equivalent to $\Theta_{\beta}\not\models\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$. ∎ To characterize coherence and strict coherence in terms of provability in Łukasiewicz logic, we prepare. ###### Proposition 5.3. There exists an effective procedure $\Pi$ to compute, for each rational polytope $\mathscr{P}$ of $[0,1]^{k}$, a formula $\Pi_{\mathscr{P}}$ which axiomatizes $\Theta_{\mathscr{P}}$. ###### Proof. First, compute a regular complex $\Delta$ supporting $\mathscr{P}$ (see [7, Chapter 6.2.2. and Theorem 6.5]). Notice that, $\mathsf{ext}\;\mathscr{P}\subseteq V(\Delta)$ and let $\hat{h}_{1},\ldots,\hat{h}_{q}$ be the normalized Schauder hats at the vertices $v_{1},\ldots,v_{q}$ of $\Delta$. For $j=1,\ldots,q$ let $\Pi_{j}$ be the Łukasiewicz formulas computed from $\hat{h}_{j}$ (see [24]). Let further, $\Pi_{\mathscr{P}}=\bigoplus_{j=1}^{q}\Pi_{j}.$ Since each $\hat{h}_{j}$ is a member of $\L(k)$, $\Pi_{\mathscr{P}}$ belongs to $\L(k)$. There remains to be proved that $\Pi_{\mathscr{P}}$ axiomatizes $\Theta_{\mathscr{P}}$. To this purpose, let us prove that $x\in\mathscr{P}$ iff $h_{x}(\Pi_{\mathscr{P}})=1$. As a matter of fact, by Lemma 2.4 (3) the oneset of the McNaughton function $\Pi_{\mathscr{P}}$ is $\mathscr{P}$. Thus the claim is settled. ∎ ###### Corollary 5.4. There exists an effective procedure $\Pi$ which computes, for each $\Phi=\\{f_{1},\ldots,f_{k}\\}\subseteq{\bf F}_{n}$ and for each $\beta\in[0,1]^{k}$, formulas $\Pi_{\Phi}$, $\Pi_{(\mathsf{rb}\;\Phi)}$ and $\Pi_{\beta}$ of $\L(k)$ which respectively axiomatize $\Theta_{\mathscr{C}_{\Phi}}$, $\Theta_{(\mathsf{rb}\;\mathscr{C}_{\Phi})}$ and $\Theta_{\beta}$. ###### Proof. As the reader will recall from Section 3, $\mathscr{C}_{\Phi}$ is a polytope. Thus, $\mathscr{C}_{\Phi}$, $\\{\beta\\}$ are rational polytopes of $[0,1]^{k}$, whence $\Pi_{\Phi}$ and $\Pi_{\beta}$ are computed as in Proposition 5.3. As for $\Pi_{(\mathsf{rb}\;\Phi)}$, $\mathsf{rb}\;\mathscr{C}_{\Phi}$ is not convex. However, it can be realized as the finite union of the faces $F_{1},\ldots,F_{l}$ of $\mathscr{C}_{\Phi}$. Each face $F_{i}$ is a rational polytope, whence Proposition 5.3 yields Łukasiewicz formulas $\Pi_{1},\ldots,\Pi_{l}$ such that $x\in F_{i}$ iff $h_{x}(\Pi_{i})=1$. Thus, let $\Pi_{(\mathsf{rb}\;\Phi)}=\bigvee_{i=1}^{l}\Pi_{i}.$ Finally, $x\in\mathsf{rb}\;\mathscr{C}_{\Phi}$ iff exists $i=1,\ldots,n$ such that $x\in F_{i}$ iff $h_{x}(F_{i})=1$ iff $h_{x}(\Pi_{(\mathsf{rb}\;\Phi)})=1$. ∎ In the light of the above corollary, we may write $\Pi_{\Phi}$, $\Pi_{(\mathsf{rb}\;\Phi)}$ and $\Pi_{\beta}$ without danger of confusion. In the following characterization, for every Łukasiewicz formula $\psi$, we write $\psi^{n}$ for $\psi\odot\ldots\odot\psi$ ($n$-times). ###### Theorem 5.5. Let $\Phi$ be a finite set of ${\bf F}_{n}$ and let $\beta$ be a book on $\Phi$. Then the following conditions hold: 1. (1) $\beta$ is coherent iff there exists a non-zero $n\in\mathbb{N}$ such that $\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$. 2. (2) $\beta$ is strictly coherent iff there exists a non-zero $n\in\mathbb{N}$ such that $\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$ and for all non-zero $n\in\mathbb{N}$, $\not\vdash(\Pi_{\beta})^{n}\to\Pi_{(\mathsf{rb}\;\Phi)}$. ###### Proof. Both claims follow from Lemma 5.2, Corollary 5.4, the completeness theorem of Łukasiewicz calculus and Łukasiewicz deduction theorem stating that $\varphi\vdash\psi$ iff there exists a non-zero $n\in\mathbb{N}$ such that $\vdash\varphi^{n}\to\psi$ (see [3, §4]). We will prove (1) since the proof of (2) is essentially the same. By Lemma 5.2, $\beta$ is coherent iff $\Theta_{\beta}\models\Theta_{\mathscr{C}_{\Phi}}$ iff (from Lemma 5.4) $\Pi_{\beta}\models\Pi_{\Phi}$. The completeness theorem of Łukasiewicz calculus shows that $\Pi_{\beta}\models\Pi_{\Phi}$ iff $\Pi_{\beta}\vdash\Pi_{\Phi}$ iff $\vdash(\Pi_{\beta})^{n}\to\Pi_{\Phi}$ for some $n>0$. ∎ ## 6\. Conclusion In this paper we have presented geometrical, measure-theoretical and logical characterizations for the strict coherence of books on Łukasiewicz infinite- valued events. Our first result shows that, for any finite subset $\Phi$ of a finitely generated free MV-algebra ${\bf A}$, the set of all strictly coherent books on $\Phi$ coincides with the relative interior of the polytope of all coherent ones; the second characterization is a de Finetti-like theorem: a book on $\Phi$ is strictly coherent if and only if it extends to a faithful state of ${\bf A}$. Finally, our last theorem gives a characterization of coherence and strict coherence in terms of the provability relation of propositional Łukasiewicz logic. We believe that this last result is interesting both from the logical and philosophical perspective as it may shed a light on an intuitive reading of propositional Łukasiewicz logic. Specifically, it is of particular interest to put forward a comparison between the role of Łukasiewicz logic prompted by Theorem 5.5 in theories of uncertain reasoning and the semantics proposed in [20]. There, the author, investigating the problem of artificial precision in theories of vagueness based on real numbers as degrees of truth, presents Łukasiewicz logic as a suitable formal system to handle vague predicates333The author wishes to thank Eduardo Barrio for pointing out this to him.. In our future work we will mainly focus on extending the results of this paper to more general algebraic structures. Particularly promising seems to be the class of finitely presented MV-algebras (see [21] and [27, Theorem 6.3]). Further, we will address the problem of determining an NP-algorithm to check strict coherence for Łukasiewicz events. The solution of this problem would immediately yield that for each finite set $\Phi$ of Łukasiewicz events, $\mathscr{K}_{\Phi}^{\mathbb{Q}}$ is NP-complete (see [11, §7]). Acknowledgement. The author is grateful to the two referees for their careful reading and valuable comments. He is also much indebted to Lluis Godo, Hykel Hosni and Daniele Mundici for several conversations on the subject of this paper. The author acknowledges partial support by the Spanish Ramón y Cajal research program RYC-2016-19799; the Spanish FEDER/MINECO project TIN2015- 71799-C2-1-P and the SYSMICS project (EU H2020-MSCA-RISE-2015, Project 689176). ## References * [1] R. Carnap, The Logical Foundations of Probability, University of Chicago Press, Chicago, 1950. * [2] C.C. Chang, Algebraic analysis of many-valued logics. Trans. Amer. Math. Soc. 88, 467–490, 1958. * [3] R. Cignoli, I. M. L. D’Ottaviano, D. Mundici, Algebraic Foundations of Many-valued Reasoning, Trends in Logic Vol 8, Kluwer, Dordrecht, 2000. * [4] R. Cignoli, V. Marra, Stone duality for real-valued multisets. Forum Mathematicum 24(6): 1317–1331, 2012. * [5] B. de Finetti, Sul significato soggettivo della probabilità, Fundamenta Mathematicae 17: 298–329, 1931. Translated into English as “On the subjective meaning of probability”, in: Paola Monari and Daniela Cocchi (Eds.), Probabilità e Induzione, Clueb, Bologna, pp. 291–321, 1993. * [6] B. de Finetti, Theory of Probability, Vol.1, Wiley, New York, 1974. * [7] F. P. Desiderata, M. I. Shamos, Computational Geometry – An Introduction. Springer-Verlag, Berlin Heidelberg, New York, 1985 * [8] G. Ewald, Combinatorial Convexity and Algebraic Geometry. Springer-Verlag New York, 1996. * [9] T. Flaminio, L. Godo, H. Hosni, On the logical structure of de Finetti’s notion of event. Journal of Applied Logic 12(3): 279–30, 2014. * [10] T. Flaminio, H. Hosni, S. Lapenta, Convex MV-algebras: Many-valued logics meet decision theory. Studia Logica 106(5): 913–945, 2018. * [11] T. Flaminio, H. Hosni, F. Montagna, Strict Coherence on Many-Valued Events. The Journal of Symbolic Logic 83(1): 55–69, 2018. * [12] T. Flaminio, T. Kroupa, States of MV-algebras. Chapter XVII of Handbook of Mathematical Fuzzy Logic - volume 3, C. Fermüller, P. Cintula and C. Noguera (Eds.), Studies in Logic, Mathematical Logic and Foundations, vol. 58, College Publications, London, 2015. * [13] H. Gaifman, Concerning measures on Boolean algebras. Pacific Journal of Mathematics 14(1): 61–73, 1964. * [14] R. Hähnle, Many-valued logic and mixed integer programming. Annals of Mathematics and Artificial Intelligence 12(3-4): 231–263, 1994. * [15] J. L. Kelley, Measures on Boolean Algebras. Pacific Journal of Mathematics 9(4): 1165–1177, 1959. * [16] J. G. Kemeny, Fair bets and inductive probabilities. The Journal of Symbolic Logic 20(3): 263–273, 1955. * [17] T. Kroupa, Every state on semisimple MV-algebra is integral. Fuzzy Sets and Systems 157 (20): 2771–2787, 2006. * [18] T. Kroupa, States in Łukasiewicz logic corresponds to probabilities of rational polyhedra. International Journal of Approximate Reasoning 53: 435–446, 2012. * [19] J. Kühr, D. Mundici, De Finetti theorem and Borel states in $[0,1]$-valued algebraic logic. International Journal of Approximate Reasoning 46 (3): 605–616, 2007. * [20] V. Marra, The Problem of Artificial Precision in Theories of Vagueness: A Note on the Rôle of Maximal Consistency. Erkenntnis 79(5): 1015–1026, 2014. * [21] V. Marra, L. Spada, Duality, projectivity and unification in Łukasiewicz logic and MV-algebras. Annals of Pure and Applied logic 164(3): 192–210, 2013. * [22] P. McMullen, G. C. Shephard, Convex Polytopes and the Upper Bound Conjecture, London Mathematical Society Lecture Note Series 3, Cambridge University Press, London-New York, 1971. * [23] R. McNaughton, A Theorem about Infinite-valued Sentential Logic. The Journal of Symbolic Logic 16: 1–13, 1951. * [24] D. Mundici, A constructive proof of McNaughton’s theorem in infinite-valued logic. The Journal of Symbolic Logic 58(2): 596–602, 1994. * [25] D. Mundici, Averaging the truth-value in Łukasiewicz logic. Studia Logica 55(1): 113–127, 1995. * [26] D. Mundici, Bookmaking over infinite-valued events. International Journal of Approximate Reasoning 43(3): 223–240, 2006. * [27] D. Mundici, Advanced Łukasiewicz calculus and MV-algebras. Trends in Logic 35, Springer, 2011. * [28] D. Mundici, Finite axiomatizability in Łukasiewicz logic. Annals of Pure and Applied Logic 162: 1035–1047, 2011. * [29] G. Panti, Invariant measures on free MV-algebras. Communications in Algebra 36(8): 2849–2861, 2009. * [30] J. Paris, A note on the Dutch Book method. Proceedings of the Second International Symposium on Imprecise Probabilities and their Applications (G. De Cooman, T. Fine, and T. Seidenfeld, editors), ISIPTA 2001, Shaker Publishing Company, Ithaca, NY, USA, pp. 301–306, 2001. * [31] J. B. Paris, A. Vencovska, Pure Inductive Logic, Cambridge University Press, Cambridge, UK, 2015. * [32] A. Shimony, Coherence and the axioms of confirmation. The Journal of Symbolic Logic 20(1): 1–28, 1955. * [33] S. Todorcevic, Topics in Topology. Lecture notes in mathematics, Springer, 1997. * [34] B. Weatherson, From Classical to Intuitionistic Probability. Notre Dame Journal of Formal Logic 44(2): 111–123, 2003.
arxiv-papers
2021-07-27T06:47:08
2024-09-04T03:07:20.729055
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Tommaso Flaminio", "submitter": "Tommaso Flaminio", "url": "https://arxiv.org/abs/2107.12624" }
2107.12626
# Unsupervised Deep Anomaly Detection for Multi-Sensor Time-Series Signals Yuxin Zhang, Yiqiang Chen, Jindong Wang, and Zhiwen Pan, Y. Zhang is with Global Energy Interconnection Development and Cooperation Organization, Xicheng District, Beijing, China, and Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China. E-mail: [email protected]. Y. Chen and Z. Pan are with Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China. Y. Chen is also with Peng cheng Laboratory (PCL). E-mail: {yqchen, pzw}@ict.ac.cn (Corresponding author: Yiqiang Chen). J. Wang is with Microsoft Research Asia, Beijing, China, also correspondence. E-mail: [email protected]. Manuscript received April 19, 2005; revised August 26, 2015. ###### Abstract Nowadays, multi-sensor technologies are applied in many fields, e.g., Health Care (HC), Human Activity Recognition (HAR), and Industrial Control System (ICS). These sensors can generate a substantial amount of multivariate time- series data. Unsupervised anomaly detection on multi-sensor time-series data has been proven critical in machine learning researches. The key challenge is to discover generalized normal patterns by capturing spatial-temporal correlation in multi-sensor data. Beyond this challenge, the noisy data is often intertwined with the training data, which is likely to mislead the model by making it hard to distinguish between the normal, abnormal, and noisy data. Few of previous researches can jointly address these two challenges. In this paper, we propose a novel deep learning-based anomaly detection algorithm called Deep Convolutional Autoencoding Memory network (CAE-M). We first build a Deep Convolutional Autoencoder to characterize spatial dependence of multi- sensor data with a Maximum Mean Discrepancy (MMD) to better distinguish between the noisy, normal, and abnormal data. Then, we construct a Memory Network consisting of linear (Autoregressive Model) and non-linear predictions (Bidirectional LSTM with Attention) to capture temporal dependence from time- series data. Finally, CAE-M jointly optimizes these two subnetworks. We empirically compare the proposed approach with several state-of-the-art anomaly detection methods on HAR and HC datasets. Experimental results demonstrate that our proposed model outperforms these existing methods. ###### Index Terms: Unsupervised anomaly detection, Multi-sensor time series, Convolutional autoencoder, Attention based BiLSTM. ## 1 Introduction Anomaly detection has been one of the core research areas in machine learning for decades, with wide applications such as cyber-intrusion detection [1], medical care [2], sensor networks [3], video anomaly detection [4] and so on. Anomaly detection seems to be a simple two-category classification, i.e., we can learn to classify the normal or abnormal data. However, it is also faced with the following challenges. First, training data is highly imbalanced since the anomalies are often extremely rare in a dataset compared to the normal instances. Standard classifiers try to maximize accuracy in classification, so it often falls into the trap of overlapping problem, which means that the model classifies the overlapping region as belonging to the majority class while assuming the minority class as noise. Second, there is no easy way for users to manually label each training data, especially the anomalies. In many cases, it is prohibitively hard to represent all types of anomalous behaviors. Due to above challenges, there is a growing trend to use unsupervised learning approaches for anomaly detection compared with semi-supervised and supervised learning approaches since unsupervised methods can handle the imbalanced and unlabeled data in a more principled way [5, 6, 7, 8, 9]. Nowadays, the prevalence of sensors in machine learning and pervasive computing research areas such as Health Care (HC) [10, 11] and Human Activity Recognition (HAR) [12, 13] generate a substantial amount of multivariate time- series data. These learning algorithms based on multi-sensor time-series signals give priority to dealing with spatial-temporal correlation of multi- sensor data. Many approaches for spatial-temporal dependency amongst multiple sensors [14, 15, 16] have been studied. It seems intuitive to apply previous unsupervised anomaly detection methods on multi-sensor time-series data. Unfortunately, there are still several challenges. First, anomaly detection in spatial-temporal domain becomes more complicated due to the temporal component in time-series data. Conventional anomaly detection techniques such as PCA [17], k-means [18], OCSVM [19] and Autoencoder [20] are unable to deal with multivariate time-series signals since they cannot simultaneously capture the spatial and temporal dependencies. Second, these reconstruction-based models such as Convolutional AutoEncoders (CAEs) [21] and Denoising AutoEncoders (DAEs) [22] are usually used for anomaly detection. It is generally assumed that the compression of anomalous samples is different from that on normal samples, and the reconstruction error becomes higher for these anomalous samples. In reality, being influenced by the high complexity of model and the noise of data, the reconstruction error for the abnormal input could also be fit so well by the training model [23, 24]. That is, the model is robust to noise and anomalies. Third, in order to reduce the dimensionality of multi-sensor data and detect anomalies, two-step approaches are widely adopted. As for the drawback of some works [25, 26], the joint performance of two baseline models can easily get stuck in local optima, since two models are trained separately. In order to solve the above three challenges, this paper presents a novel unsupervised deep learning based anomaly detection approach for multi-sensor time-series data called Deep Convolutional Autoencoding Memory network (CAE-M). The CAE-M network composes of two main sub-networks: characterization network and memory network. Specifically, we employ deep convolutional autoencoder as feature extraction module, with attention-based Bidirectional LSTMs and Autoregressive model as forecasting module. By simultaneously minimizing reconstruction error and prediction error, the CAE-M model can be jointly optimized. During the training phase, the CAE-M model is trained to explicitly describe the normal pattern of multi-sensor time-series data. During the detection phase, the CAE-M model calculate the compound objective function for each captured testing data. Through combining these errors as a composite anomaly score, a fine-grained anomaly detection decision can be made. To summarize, the main contributions of this paper are four-fold: 1) The proposed composite model is designed to characterize complex spatial- temporal patterns by concurrently performing the reconstruction and prediction analysis. In reconstruction analysis, we build Deep Convolutional Autoencoder to fuse and extract low-dimensional spatial features from multi-sensor signals. In prediction analysis, we build Attention-based Bidirectional LSTM to capture complex temporal dependencies. Moreover, we incorporate Auto- regressive linear model in parallel to improve the robust and adapt for different use cases and domains. 2) To reduce the influence of noisy data, we improve Deep Convolutional Autoencoder with a Maximum Mean Discrepancy (MMD) penalty. MMD is used to encourage the distribution of the low-dimensional representation to approximate some target distribution. It aims to make the distribution of noisy data close to the distribution of normal training data, thereby reducing the risk of overfitting. Experiments demonstrate that it is effective to enhance the robustness and generalization ability of our method. 3) The CAE-M is an end-to-end learning model that two sub-networks can co- optimize by a compound objective function with weight coefficients. This single-stage approach can not only streamline the learning procedure for anomaly detection, but also avoid the model getting stuck in local minimum through joint optimization. 4) Experiments on three multi-sensor time-series datasets demonstrate that CAE-M model has superior performance over state-of-the-art techniques. In order to further verify the effect of our proposed model, fine-grained analysis, effectiveness evaluation, parameter sensitivity analysis and convergence analysis show that all the components of CAE-M together leads to the robust performance on all datasets. The rest of the paper is organized as follows. Section 2 provides an overview of existing methods for anomaly detection. Our proposed methodology and detailed framework is described in Section 3. Performance evaluation and analysis of experiment is followed in Section 4. Finally, Section 5 concludes the paper and sketches directions for possible future work. ## 2 Related Work Anomaly detection has been studied for decades. Based on whether the labels are used in the training process, they are grouped into supervised, semi- supervised and unsupervised anomaly detection. Our main focus is the unsupervised setting. In this section, we demonstrate various types of existing approaches for unsupervised anomaly detection, which can be categorized into traditional anomaly detection and deep anomaly detection. ### 2.1 Traditional anomaly detection Conventional methods can be divided into three categories. 1) Reconstruction- based methods are proposed to represent and reconstruct accurately normal data by a model, for example, PCA [17], Kernel PCA [27, 28] and Robust PCA [29]. Specifically, RPCA is used to identify a low rank representation including random noise and outliers by using a convex relaxation of the rank operator; 2) Clustering analysis is used for anomaly detection, such as Gaussian Mixture Models (GMM) [30], k-means [18] and Kernel Density Estimator (KDE) [31]. They cluster different data samples and find anomalies via a predefined outlierness score; 3) the methods of one-class learning model are also widely used for anomaly detection. For instance, One-Class Support Vector Machine (OCSVM) [19] and Support Vector Data Description (SVDD) [32] seek to learn a discriminative hypersphere surrounding the normal samples and then classify new data as normal or abnormal. It is notable that these conventional methods for anomaly detection are designed for static data. To capture the temporal dependencies appropriately, Autoregression (AR) [33], Autoregressive Moving Average (ARMA) [34] and Autoregressive Integrated Moving Average (ARIMA) model [35] are widely used. These models represent time series that are generated by passing the input through a linear or nonlinear filter which produces the output at any time using the previous output values. Once we have the forecast, we can use it to detect anomalies and compare with groundtruth. Nevertheless, AR model and its variants are rarely used in multi-sensor multivariate time series due to their high computational cost. ### 2.2 Deep anomaly detection In deep learning-based anomaly detection, the reconstruction models, forecasting models as well as composite models will be discussed. #### 2.2.1 Reconstruction models The reconstruction model focuses on reducing the expected reconstruction error by different methods. For instance, Autoencoders [20] are often utilized for anomaly detection by learning to reconstruct a given input. The model is trained exclusively on normal data. Once it is not able to reconstruct the input with equal quality compared to the reconstruction of normal data, the input sequence is treated as anomalous data. LSTM Encoder-Decoder model [36] is proposed to learn temporal representation of the input time series by LSTM networks and use reconstruction error to detect anomalies. Despite its effectiveness, LSTM does not take spatial correlation into consideration. Convolutional Autoencoders (CAEs) [21] are an important method of video anomaly detection, which are able of capturing the 2D image structure since the weights are shared among all locations in the input image. Furthermore, since Convolutional long short-term memory (ConvLSTM) can model spatial- temporal correlations by using convolutional layers instead of fully connected layers, some researchers [15, 37] add ConvLSTM layers to autoencoder, which better encodes the change of appearance for normal data. Variational Autoenocders (VAEs) are a special form of autoencoder that models the relationship between two random variables, latent variable $z$ and visible variable $x$. A prior for $z$ is usually multivariate unit Gaussian $\mathcal{N}(0,I)$. For anomaly detection, authors [38] define the reconstruction probability that is the average probability of the original data generating from the distribution. Data points with high reconstruction probability is classified as anomalies, vice versa. Others like Denoising AutoEncoders (DAEs) [22], Deep Belief Networks (DBNs) [39] and Robust Deep Autoencoder (RDA) [40] have also been reported good performance for anomaly detection. #### 2.2.2 Forecasting models The forecasting model can also be used for anomaly detection. It aims to predict one or more continuous values, e.g. forecasting the current output values $x_{t}$ for the past $p$ values $[x_{t-p},...,x_{t-2},x_{t-1}]$. RNN and LSTM is the standard model for sequence prediction. In the work [41, 42], authors perform anomaly detection by using RNN-based forecasting models to predict values for the next time period and minimize the mean squared error (MSE) between predicted and future values. Recently, there have also been attempted to perform anomaly detection using other feed-forward networks. For instance, Shalyga et al. [43] develop Neural Network (NN) based forecasting approach to early anomaly detection. Kravchik and Shabtai [44] apply different variants of convolutional and recurrent networks to perform forecasting model. And the results show that 1D convolutional networks obtain the best accuracy for anomaly detection in industrial control systems. In another work [45], Lai et al. propose a forecasting model, which uses CNN and RNN, namely LSTNet, to extract short-term local dependency pattern and long-term pattern for multivariate time series, and incorporates Linear SVR model in the LSTNet model. Besides, other efforts have been performed in [46] using GAN-based anomaly detection. The model adopts U-Net as generator to predict next frame in video and leverages the adversarial training to discriminate whether the prediction is real or fake, thus abnormal events can be easily identified by comparing the prediction and ground truth. #### 2.2.3 Composite models Besides single model, composite model for unsupervised anomaly detection has gained a lot attention recently. Zong et al. [23] utilize a deep autoencoder to generate a low-dimensional representation and reconstruction error, which is further fed into a Gaussian Mixture Model to model density distribution of multi-dimensional feature. However, they cannot consider the spatial-temporal dependency for multivariate time series data. Different from this work, the Composite LSTM model [47] uses single encoder LSTM and multiple decoder LSTMs to perform different tasks such as reconstructing the input sequence and predicting the future sequence. In [48], the authors use ConvLSTM model as a unit within the composite LSTM model following a branch for reconstruction and another for prediction. This type of composite model is currently used to extract features from video data for the tasks of action recognition. Similarly, authors in [49] propose Spatial-Temporal AutoEncoder (STAE) for video anomaly detection, which utilizes 3D convolutional architecture to capture the spatial-temporal changes. The architecture of the network is an encoder followed by two branches of decoder for reconstructing past sequence and predicting future sequence respectively. As mentioned above, unsupervised anomaly detection techniques have still many deficiencies. For traditional anomaly detection, it is hard to learn representations of spatial-temporal patterns in multi-sensor time-series signals. For a reconstruction model, a single task could make the model suffer from the tendency to store information only about the inputs that are memorized by the AE. And for the forecasting model, this task could suffer from only storing the last few values that are most important for predicting the future [47, 48]. Hence, their performance will be limited since model only learn trivial representations. For composite model, these researchers design their models for different purposes. Zong et al. [23] could solve problem that the model is robust to noise and anomalies through performing density estimation in a low-dimensional space. Zhao et al. [49] could consider the spatial-temporal dependency through 3D convolutional reconstructing and forecasting architectures. However, few studies could address these issues simultaneously. Different from these works, our research makes the following contributions: 1) The proposed model is designed to characterize complex spatial-temporal dependencies, thus discovering generalized pattern of multi-sensor data; 2) Adding a Maximum Mean Discrepancy (MMD) penalty could avoid the model generalizing so well for noisy data and anomalies; 3) Combining Attention- based Bidirectional LSTM (BiLSTM) and traditional Auto-regressive linear model could boost the model’s performance from different time scale; 4) The composite baseline model is generated based on end-to-end training which means all the components within the model are jointly trained with compound objective function. Besides, some learning algorithms based on time-series data have been studied for decades. [50] propose Unsupervised Salient Subsequence Learning to extract subsequence as new representations of the time series data. Due to the internally sequential relationship, many neural network-based models can be applied to time series in an unsupervised learning manner. For example, some 1D-CNN models [51, 52] have been proposed to solve time series tasks with a very simple structure and the sota performance. Moreover, the multiple time series signal usually has some kinds of co-relations, [53] propose a method to learn the relation graph on multiple time series. Some anomaly detection based on multiple time series applications are available for wastewater treatment [54], for ICU [55], and for sensors [56]. Figure 1: The overview of the proposed CAE-M model. ## 3 The Proposed Method ### 3.1 Notation In a multi-sensor time series anomaly detection problem, we are given a dataset generated by $n$ sensors ($n>1$). Without loss of generality, we assume each sensor generates $m$ signals (e.g., an accelerometer often generates 3-axis signals). Denote $\mathcal{S}$ the signal set, we have $N=|\mathcal{S}|=nm$ signals in total. For each signal $x_{i}\in\mathcal{S}$, $x_{i}\in\mathbb{R}^{t_{i}\times 1}$, where $t_{i}$ denotes the length of signal $x_{i}$. Note that even each sensor signal may have different length, we are often interested in their intersections, i.e., all sensors are having the same length $T$, i.e., $X=(x_{1},\cdots,x_{N})^{T}\in\mathbb{R}^{N\times T}$ denotes an input sample containing all sensors. ###### Definition 1 (Unsupervised anomaly detection). It is non-trivial to formally define an anomaly. In this paper, we are interested in detecting anomalies in a classification problem. Let $\mathcal{Y}=\\{1,2,\cdots,K\\}$ be the classification label set, and $K$ the total number of classes, then the dataset $\mathcal{D}=(X_{i},y_{i})^{N}_{i=1}$. Eventually, our goal is to detect whether an input sample $X_{a}$ belongs to one of the $K$ predefined classes with a high confidence. If not, then we call $X_{a}$ an anomaly. Note that in this paper, we are dealing with an unsupervised anomaly detection problem, where the labels are unseen during training, which is more obviously challenging. ### 3.2 Overview There are some existing works [19, 21, 25] attempting to resolve the unsupervised anomaly detection problem. Unfortunately, they may face several critical challenges. First, conventional anomaly detection techniques such as PCA [17], k-means [18] and OCSVM [19] are unable to capture the temporal dependencies appropriately because they cannot deliver temporal memory states. Second, since the normal samples might contain noise and anomalies, using deep anomaly detection approaches such as standard Autoencoders [21, 20] is likely to affect the generalization capability. Third, the multi-stage approaches, i.e., feature extraction and predictive model building are separated [25, 26], can easily get stuck in local optima. In this paper, we present a novel approach called Convolutional Autoencoding Memory network (CAE-M) to tackle the above challenges. Figure 1 gives an overview of the proposed method. In a nutshell, CAE-M is built upon a convolutional autoencoder, which is then fed into a predictive network. Concretely, we encode the spatial information in multi-sensor time-series signals into the low-dimensional representation via Deep Convolutional Autoencoder (CAE). In order to reduce the effect of noisy data, some existing works have tried to add Memory module [24] or Gaussian Mixture Model (GMM) [23]. In our proposed method, we simplify these modules into penalty item, which called Maximum Mean Discrepancy (MMD) penalty. Adding a MMD term can encourage the distribution of training data to approximate the same distribution such as Gaussian distribution, thus reducing the risk of overfitting caused by noise and anomalies in training data [23]. And then we feed the representation and reconstruction error to the subsequent prediction network based on Bidirectional LSTM (Bi-LSTM) with Attention mechanism and Auto-regressive model (AR) which could predict future feature values by modeling the temporal information. Through the composite model, the spatial- temporal dependencies of multi-sensor time-series signals can be captured. Finally, we propose a compound objective function with weight coefficients to guide end-to-end training. For normal data, the reconstructed value generated by data coding is similar to the original input sequence and the predicted value is similar to the future value of time series, while the reconstructed value and the predicted value generated by abnormal data change greatly. Therefore, in inference process, we can detect anomalies precisely by computing the loss function in composite model. ### 3.3 Characterization Network In the characterization network, we perform representative learning by fusing multivariate signals in multiple sensors. The low-dimensional representation contains two components: (1) the features which are abstracted from the multivariate signals; (2) the reconstruction error over the distance metrics such as Euclidean distance and Minkowski distance. To avoid the autoencoder generalizing so well for abnormal inputs, optimization function combines reconstruction loss by measuring how close the reconstructed input is to the original input and the regularization term by measuring the similarity between the two distributions (i.e., the distribution of low-dimensional features and Gaussian distribution). #### 3.3.1 Deep feature extraction We employ a deep convolutional autoencoder to learn the low-dimensional features. Specifically, given $N$ time series with length $T$, we pack into a matrix $x\in\mathbb{R}^{N\times T}$ with multi-sensor time-series data. The matrix is then fed to deep convolutional autoencoder (CAE). The CAE model is composed of two parts, an encoder and a decoder as in Eq. (1) and Eq. (2). Assuming that $x^{\prime}$ denotes the reconstruction of the same shape as $x$, the model is to compute low-dimensional representation $z_{f}$, as follows: $\displaystyle z_{f}=Encode(x),$ (1) $\displaystyle x^{\prime}=Decode(z_{f}).$ (2) The encoder in Eq. (1) maps an input matrix $x$ to a hidden representation $z_{f}$ by many convolutional and pooling layers. Each convolutional layer will be followed by a max-pooling layer to reduce the dimensions of the layers. A max-pooling layer pools features by taking the maximum value for each patch of the feature maps and produce the output feature map with reduced size according to the size of pooling kernel. The decoder in Eq. (2) maps the hidden representation $z_{f}$ back to the original input space as a reconstruction. In particular, a decoding operation needs to convert from a narrow representation to a wide reconstructed matrix, therefore the transposed convolution layers are used to increase the width and height of the layers. They work almost exactly the same as convolutional layers, but in reverse. The difference between the original input vector $x$ and the reconstruction $x^{\prime}$ is called the reconstruction error $z_{r}$. The error typically used in the autoencoder is Mean Squared Error (MSE), which measures how close the reconstructed input $x^{\prime}$ is to the original input $x$, as follows in Eq. (3). $L_{MSE}=\lVert x-x^{\prime}\lVert^{2}_{2},$ (3) where $\lVert\cdot\lVert^{2}_{2}$ is the $\textit{l}_{2}$-norm. #### 3.3.2 Handling noisy data To reduce the influence of noisy data, we need to observe the changes in low- dimensional features and the changes of distribution over the samples in a more granular way, thus distinguishing between normal and abnormal data obviously. Inspired by [23], in order to avoid the autoencoder generalizing so well for noisy data and abnormal data, we hope to detect ”lurking” anomalies that reside in low-density areas in the reduced low-dimensional space. Our proposed method is conceptually similar to Gaussian Mixture Model (GMM) as target distributions. The loss function is complemented by MMD as a regularization term that encourages the distribution of the low-dimensional representation to be similar to a target distribution. It aims to make the distribution of noisy data close to the distribution of normal training data, thereby reducing the risk of overfitting. Specifically, Maximum Mean Discrepancy (MMD) [57] is a distance-measure between the samples of the distributions. Given the latent representation $z_{a}=\\{z_{f}^{(1)},...,z_{f}^{(h)}\\}\in\mathbb{R}^{h\times d}$, where $d$ is a latent space (usually $d<N\times T$) and $h$ denotes all of the time steps at one iteration. For CAE with MMD penalty, the Gaussian distribution $P_{z}$ in reproduction kernel Hilbert space $\mathcal{H}$ is chosen as the target distribution. We compute the Kernel MMD as the follows: $\displaystyle L_{MMD}(Z,P_{z})=||\frac{1}{h}\sum_{i=1}^{h}\phi(z_{f}^{(i)})-\frac{1}{h}\sum_{i=1}^{h}\phi(z^{(i)})||^{2}_{\mathcal{H}}.$ (4) Here we have the distribution $Z$ of the low-dimensional representation $z_{f}^{(i)}$ and the target distribution $z^{(i)}\sim P_{z}$ over a set $\mathcal{X}$. The MMD is defined by a feature map $\phi:\mathcal{X}\rightarrow\mathcal{H}$ where $\mathcal{H}$ is a reproducing kernel Hilbert space (RKHS). During the training process, we could apply the kernel trick to compute the MMD. And it turns out that many kernels, including the Gaussian kernel, lead to the MMD being zero if and only the distributions are identical. Letting $k(x,y)=\left\langle\phi(x),\phi(y)\right\rangle_{\mathcal{H}}$, we yield an alternative characterization of the MMD as follows: $\displaystyle L_{MMD}(Z,P_{z})=$ $\displaystyle||\frac{1}{h^{2}}\sum_{i\neq j}k(z_{f}^{(i)},z_{f}^{(j)})+\frac{1}{h^{2}}\sum_{i\neq j}k(z^{(i)},z^{(j)})$ (5) $\displaystyle-\frac{2}{h^{2}}\sum_{i,j}k(z_{f}^{(i)},z^{(j)})||_{\mathcal{H}}.$ Here the kernel is defined as $k(u,v)=exp(-\frac{||u-v||^{2}}{2\sigma^{2}})$. The latent representation with Gaussian distribution $P_{z}$ is performed by sampling from $P_{z}$ and approximating by averaging the kernel $k(\cdot,\cdot)$ evaluated at all pairs of samples. Note that we usually do batch training for neural network training. It means that the model is trained using a subsample of data at one iteration. In this work, we need to compute the MMD over a set of $\mathcal{X}$ at one iteration, where the number of $\mathcal{X}$ is equal to $batchsize\times timestep$. That is, the latent representation is denoted as $z_{a}=\\{z_{f}^{(1)},...,z_{f}^{(l)}\\}\in\mathbb{R}^{l\times d}$, where $l=batchsize\times h$. ### 3.4 Memory Network To simultaneously capture the spatial and temporal dependencies, our proposed model is designed to characterize complex spatial-temporal patterns by concurrently performing the reconstruction analysis and prediction analysis. Considering the importance of temporal component in time series, we propose non-linear prediction and linear prediction to detect anomalies by comparing the future prediction and the next value appearance in the feature space. The characterization network generates feature representations, which include reconstruction error and reduced low-dimensional features learned by the CAE at $h$ time steps. Denote input features as $z_{h}$ for $h=1,...,H$: $\displaystyle z_{h}=[z_{f},z_{r}]_{h},\ h\in[1,H].$ (6) Our goal is to predict the current value $z_{h}$ for the past values $[z_{1},z_{2},...,z_{h-1}]$. The memory network combines non-linear function based predictor and linear function based predictor to tackle temporal dependency problem. #### 3.4.1 Non-linear prediction Non-linear predictor function has different types such as Recurrent neural networks (RNNs), Long Short-Term Memory (LSTM)[58] and Gated Recurrent Unit (GRU) [59]. Original RNNs fall short of learning long-term dependencies. In this work, we adopt a Bidirectional LSTM with attention mechanism [60] which could consider the whole/local context while calculating the relevant hidden states. Specifically, the Bidirectional LSTM (BiLSTM) runs the input in two ways, one LSTM from past to future and one LSTM from future to past. Different from unidirectional, the two hidden states combined are able in any point in time to preserve information from both past and future. A BiLSTM unit consists of four components: input gate $i_{h}$, forget gate $f_{h}$, output gate $o_{h}$ and cell activation vector $c_{h}$. The hidden state $y_{h}$ given input $z_{h}$ is computed as follows: $i_{h}=\sigma(W_{zi}z_{h}+W_{yi}y_{h-1}+W_{ci}c_{h-1}+b_{i}),$ (7) $f_{h}=\sigma(W_{zf}z_{h}+W_{yf}y_{h-1}+W_{cf}c_{h-1}+b_{f}),$ (8) $o_{h}=\sigma(W_{zo}z_{h}+W_{yo}y_{h-1}+W_{co}c_{h-1}+b_{o}),$ (9) $\widetilde{c_{h}}=tanh(W_{zc}z_{h}+W_{yc}h_{h-1}+W_{cc}c_{h-1}+b_{c}),$ (10) $c_{h}=f_{h}\otimes c_{h-1}+i_{h}\otimes\widetilde{c_{h}},$ (11) $y_{h}=o_{h}\otimes tanh(c_{h}),$ (12) $\hat{y}_{h}=[y^{1}_{h};y^{2}_{h}],$ (13) where $i_{h}$, $f_{h}$, $o_{h}$, $c_{h}$ represent the value of $i,f,o,c$ at the moment $h$ respectively, $W$ and $b$ denote the weight matrix and bias vector, $\sigma(\cdot)$ and $tanh(\cdot)$ are activation function, the operator $\otimes$ denotes element-wise multiplication, the current cell state $c_{h}$ consists of two components, namely previous memory $c_{h-1}$ and modulated new memory $\widetilde{c_{h}}$, the output $\hat{y}_{h}$ combines the forward $y^{1}_{h}$ and backward $y^{2}_{h}$ pass outputs. Note that the merge mode by which outputs of the forward and backward are combined has different types, e.g. sum, multiply, concatenate, average. In this work, we use the mode “sum” to obtain the output $\hat{y}_{h}$. Attention mechanism for processing sequential data that could focus on the features of the keywords to reduce the impact of non-key temporal context. Hence, we adopt temporal attention mechanism to produce a weight vector and merge raw features from each time step into a segment-level feature vector, by multiplying the weight vector. The work process of attention mechanism is following detailed. $M_{h}=tanh(W_{h}\hat{y}_{h}+b_{h}),$ (14) $E_{h}=\sigma(W_{a}M_{h}+b_{a}),$ (15) $A_{h}=softmax(E_{h}),$ (16) $Y_{h}=\sum_{h}A_{h}\ast\hat{y}_{h}.$ (17) Here $W$ and $b$ are represented as the weight and bias. A weighted sum of the $\hat{y}_{h}$ based on the weight $A_{h}$ is computed as the context representation $Y_{h}$. The context representation is considered as the predicted value of $z_{h}$ for temporal features $[z_{1},z_{2},...,z_{h-1}]$. #### 3.4.2 Linear prediction Autoregressive (AR) model is a regression model that uses the dependencies between an observation and a number if lagged observations. Non-linear Recurrent Networks are theoretically more expressive and powerful than AR models. In fact, AR models also yield good results in forecasting short term modeling. In specific real datasets, such infinite-horizon memory isn’t always effective. Therefore, we incorporate AR model in parallel to the non-linear memory network part. The AR model is formulated as follows: $\displaystyle\hat{z}_{h}=c\sum_{i=1}^{h-1}w_{h-i}+\sum_{i=1}^{h-1}w_{h-i}*z_{h-i},$ (18) where $w_{1},...,w_{h-1}$ are the weights of the AR model, $c$ is a constant, $\hat{z}_{h}$ represents the predicted value for past temporal value $[z_{1},z_{2},...,z_{h-1}]$. We implement this model using Dense layer of network to combine the weights and data. In the output layer, the prediction error is obtained by computing the difference between the output of predictor model and true value ${z_{h}}$. The final prediction error integrates the output of non-linear prediction model and linear prediction model. The following equation is written as: $\displaystyle L_{predict}=\sum_{h\in\Omega_{batch}}(\underbrace{||Y_{h}-z_{h}||^{2}_{F}}_{\text{Attention- based BiLSTM}}+\underbrace{||\hat{z}_{h}-z_{h}||^{2}_{F}}_{\text{Autoregressive}}),$ (19) where $\Omega_{batch}$ is a subsample of training data, $||\cdot||_{F}$ is the Frobenius norm. ### 3.5 Joint optimization As for multi-step approach, it can easily get stuck in local optima, since models are trained separately. Therefore, we propose an end-to-end hybrid model by minimizing compound objective function. The CAE-M objective has four components, MSE (reconstruction error) term, MMD (regularization) term, prediction error (non-linear forecasting task) term and prediction error (linear forecasting task) term. Given $X$ samples $\\{x_{1},x_{2},...,x_{D}\\},x_{i}\in\mathbb{R}^{N\times T}$, the objective function is constructed as: $\begin{split}J(\theta)&=L_{MSE}+\lambda_{1}\cdot L_{MMD}+\lambda_{2}\cdot L_{lp}+\lambda_{3}\cdot L_{np}\\\ &=\frac{1}{M}\sum_{i=1}^{M}L(x_{i},x^{\prime}_{i})+\lambda_{1}L_{MMD}(Z,P_{Z})\\\ &+\frac{1}{M}\sum_{i=1}^{M}[\lambda_{2}||Y_{h}^{(i)}-z_{h}^{(i)}||^{2}_{F}+\lambda_{3}||\hat{z}_{h}^{(i)}-z_{h}^{(i)}||^{2}_{F}],\end{split}$ (20) where $M$ is batch size used for training, $h$ is current time step, $\lambda_{1}$,$\lambda_{2}$ and $\lambda_{3}$ are the meta parameters controlling the importance of the loss function. Restating our goals more formally, we would like to: * • Minimize the reconstruction error in the characterization network, that is, minimize the error in reconstructing $x^{\prime}$ from $x$ at all time step $h$. We need to compute the average error at each time step of sample. The purpose is to obtain better low-dimensional representation for multi-sensor data. * • Minimize the MMD loss that encourages the distribution $Z$ of the low- dimensional representation to be similar to a target distribution $P_{z}$. It can make anomalies deviate from normal data in the reduced dimensions. * • Minimize the prediction error by integrating non-linear predictor and linear predictor. We split the set $\\{z_{1},z_{2},...,z_{h}\\}$ obtained by characterization network into the current value $z_{h}$ and the past values $[z_{1},z_{2},...,z_{h-1}]$. And then the predicted values $Y_{h}$ and $\hat{z}_{h}$ are obtained by minimizing prediction errors. The purpose is to accurately express the information of the next temporal slice using different predictor, thus updating low-dimensional feature and reconstruction error. * • $\lambda_{1}$, $\lambda_{2}$ and $\lambda_{3}$ are the meta parameters in CAE-M. In practice, $\lambda_{1}=e-04$, $\lambda_{2}=0.5$, and $\lambda_{3}=0.5$ usually achieve desirable results. Here MMD is complemented as a regularization term. The parameter selection is performed in Section 4.8.1. TABLE I: The detailed statistics of three datasets Dataset | Domain | Instances | Dimensions | Classes | Permissions ---|---|---|---|---|--- PAMAP2 [61] | Activity Recognition | 1,140,000 | 27 | 18 | Public CAP [62] | Sleep Stage Detection | 921,700,000 | 21 | 8 | Public Mental Fatigue Dataset [2] | Fatigue Detection | 1,458,648 | 4 | 2 | Private ### 3.6 Inference Given samples as training dataset ${X=\\{x_{1},x_{2},...,x_{D}\\}},x_{i}\in\mathbb{R}^{N\times T}$, we are able to compute the corresponding decision threshold ($\operatorname{THR}$): $\operatorname{THR}=\frac{1}{D}\sum_{i=1}^{D}\operatorname{Err}(x_{i})+\sqrt{\frac{1}{D}\sum_{i=1}^{D}{(\operatorname{Err}(x_{i})-\mu)^{2}}},$ (21) where we denote $\mathrm{Err}(x_{i})$ as the sum of loss function for $x_{i}$, and $\mu$ is the average value of $\mathrm{Err}(x_{i})$ for $i=1,...,D$. The setting is similar to the normal training distribution $\mathcal{N}(\mu,\sigma)$ following with 1 standard deviation $\sigma$ of the mean $\mu$. In inference process, the decision rule is that if $\mathrm{Err}(x_{i})>\mathrm{THR}$, the testing sample in a sequence can be predicted to be “abnormal”, otherwise “normal”. Algorithm 1 Training and Inference procedure of CAE-M Training process 0: Normal Dataset $X=\\{x_{1},x_{2},...,x_{D}\\}$, time steps $h$, batch size $M$ and hyperparameters $\lambda_{1},\lambda_{2},\lambda_{3}$. 0: Anomaly decision threshold THR and model parameter $w$. 1: Transform each sample $x\in\mathbb{R}^{N\times T}$ into $x\in\mathbb{R}^{h\times N\times t}$ in the time axis; 2: Randomly initialize parameter $w$; 3: while not converge do 4: Calculate low-dimensional representation $z_{f}$ and reconstruction error $z_{r}$ at each time step; // Eq. (1) (3) 5: Calculate MMD between $z_{a}$ and Gaussian distribution $P_{z}$; // Eq. (5) 6: Combine $z_{f}$ and $z_{r}$ into $z_{h}=[z_{f},z_{r}]_{h}$ for each sample; // Eq. (6) 7: Predict the current value $z_{h}$ for the past values $[z_{1},z_{2},...,z_{h-1}]$ by Attention-based BiLSTM and AR model; // Eq. (7-18) 8: Update $w$ by minimizing the compound objective function; // Eq. (20) 9: end while 10: Calculate the decision threshold THR by the training samples; // Eq.(21) 11: return Optimal $w$ and THR. Inference process 0: Normal and Anomalous dataset $X=\\{x_{1},x_{2},...,$ $x_{D}\\}$, threshold THR, model parameter $w$, hyperparameters $\lambda_{1}$, $\lambda_{2}$ and $\lambda_{3}$. 0: Label of all $x_{i}$. 1: for all $x_{i}$ do 2: Calculate the loss $Err(x_{i})=f(x_{i};w)$; //$f(\cdot)$ denotes CAE-M 3: if $Err(x_{i})>$ THR then 4: $x_{i}$ = “anomaly”; 5: else 6: $x_{i}$ = “normal”; 7: end if 8: end for 9: return Label of all $x_{i}$. The complete training and inference procedure of CAE-M is shown in Algorithm 1. ## 4 Experiments In this section, we conduct extensive experiments to evaluate the performance of our proposed CAE-M approach for anomaly detection on several real-world datasets. ### 4.1 Datasets We adopt two large publicly-available datasets and a private dataset: PAMAP2, CAP and Mental fatigue dataset. These datasets are exploiting multi-sensor time series for activity recognition, sleep state detection, and mental fatigue detection, respectively. Therefore, they are ideal testbeds for evaluating anomaly detection algorithms. PAMAP2 [61] dataset is a mobile dataset with respect to actions or activities from UCI repository, containing data of 18 different physical activities performed by 9 subjects wearing 3 inertial measurement units, e.g. accelerator, gyroscope and magnetometer. There are 18 activity categories in total. For experiments, we treat these classes with relatively smaller samples as the anomaly classes (including running, ascending stairs, descending stairs and rope jumping), while the rest categories are combined to form the normal classes. CAP Sleep Database [62], which stands for the Cyclic Alternating Pattern (CAP) database, is a clinical dataset from PhysioNet repository. It is characterized by periodic physiological signals occurring during wake, S1-S4 sleep stages and REM sleep. The waveforms include at least 3 EEG channels, 2 EOG channels, EMG signal, respiration signal and EKG signal. There are 16 healthy subjects and 92 patients in the database. The pathological recordings include the patients diagnosed with bruxism, insomnia, narcolepsy, nocturnal frontal lobe epilepsy, periodic leg movements, REM behavior disorder and sleep-disordered breathing. In this task, we extracted 7 valid channels of all the channels like ROC-LOC, C4-P4, C4-A1, F4-C4, P4-O2, ECG1-ECG2, EMG1-EMG2 etc. For detecting sleep apnea events, we chose healthy subjects as normal class and the patients with sleep-disordered breathing as anomaly class. Mental Fatigue Dataset [2] is a real world health-care dataset. Aiming to detect mental fatigue in the healthy group, we collected the physiological signals (e.g., GSR, HR, R-R intervals and skin temperature) using wearable device. There are 6 healthy young subjects participated in the mental fatigue experiments. In this task, non-fatigue data samples are labeled as normal class and fatigue data samples are labeled as anomaly class. Fatigue data accounts for a fifth of the total. The detailed information of the datasets is shown in TABLE I. ### 4.2 Baseline Methods In order to extensively evaluate the performance of the proposed CAE-M approach, we compare it with several traditional and deep anomaly detection methods: (1) KPCA (Kernel principal component analysis) [28], which is a non-linear extension of PCA commonly used for anomaly detection. (2) ABOD (Angle-based outlier detection) [63], which is a probabilistic model that well suited for high dimensional data. (3) OCSVM (One-class support vector machine) [64], which is the one-class learning method that classifies new data as similar or different to the training set. (4) HMM (Hidden Markov Model) [65] is a finite set of states, each of which is associated with a probability distribution. In a particular state an observation can be generated, according to the associated probability distribution. (5) CNN-LSTM [66], which is a forecasting model composed of convolutional and LSTM networks. It can obtain the forecast by estimating the current data, and detect anomalies on comparing the forecasting value with actuals. (6) LSTM-AE (LSTM based autoencoder) [36], which is an unsupervised detection technique used in time series that can induce a representation by learning an approximation of the identity function of data. (7) ConvLSTM-COMPOSITE [48], which utilizes a composite structure that is able to encoder the input, reconstruct it, and predict its near future. To simplify the name, “ConvLSTM-COMP” denotes ConvLSTM-COMPOSITE. We choose the “conditional” version to build a single model called ConvLSTM-AE by removing the forecasting decoder. (8) UODA (Unsupervised sequential outlier detection with deep architecture) [67], which utilizes autoencoders to capture the intrinsic difference between normal and abnormal samples, and then integrates the model to RNNs that perform fine-tuning to update the parameters in DAE. (9) MSCRED (Multi-scale convolutional recurrent encoder-decoder) [15], which is a reconstruction-based anomaly detection and diagnosis method. TABLE II: The mean precision, recall and F1 score of baselines and our proposed method, * p-value = 0.0077. Method | PAMAP2 | CAP dataset | Fatigue dataset ---|---|---|--- mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 KPCA | 0.7236 | 0.6579 | 0.6892 | 0.7603 | 0.5847 | 0.6611 | 0.5341 | 0.5014 | 0.5173 ABOD | 0.8653 | 0.9022 | 0.8834 | 0.7867 | 0.6365 | 0.7037 | 0.6679 | 0.6145 | 0.6401 OCSVM | 0.7600 | 0.7204 | 0.7397 | 0.9267 | 0.9259 | 0.9263 | 0.5605 | 0.5710 | 0.5290 HMM | 0.6950 | 0.6553 | 0.6745 | 0.8238 | 0.8078 | 0.8157 | 0.6066 | 0.6076 | 0.6071 CNN-LSTM | 0.6680 | 0.5392 | 0.5968 | 0.6159 | 0.5217 | 0.5649 | 0.5780 | 0.5042 | 0.5386 LSTM-AE | 0.8619 | 0.7997 | 0.8296 | 0.7147 | 0.6253 | 0.6671 | 0.7140 | 0.6820 | 0.6870 UODA | 0.8957 | 0.8513 | 0.8730 | 0.7557 | 0.5124 | 0.6107 | 0.8280 | 0.7770 | 0.8017 MSCRED | 0.6997 | 0.7301 | 0.7146 | 0.6410 | 0.5784 | 0.6081 | 0.8016 | 0.6802 | 0.7359 ConvLSTM-AE | 0.7359 | 0.7361 | 0.7360 | 0.8150 | 0.8194 | 0.8172 | 0.9010 | 0.9346 | 0.9175 ConvLSTM-COMP | 0.8844 | 0.8842 | 0.8843 | 0.8367 | 0.8377 | 0.8372 | 0.9373 | 0.9316 | 0.9344 CAE-M (Ours) | 0.9608 | 0.9670 | 0.9639 | 0.9939 | 0.9952 | 0.9961 | 0.9962 | 0.9959 | 0.9960 Improvement | 7.64% | 6.48% | 7.96% | 6.72% | 6.93% | 6.98% | 5.89% | 6.13% | 6.16% ### 4.3 Implementation details For traditional anomaly detection, we scale the sequential data into segments and extract the features from each segment. In PAMAP2 dataset, multiple sensors are worn on three different position (wrist, chest, ankle). Hence, we extract 324 features including time and frequency domain features. In CAP Sleep dataset, we first pass through the Hanning window low pass filter for removing the high frequency components of signals. And then we extract 91 features for EEG, EMG and ECG signals [68, 69, 70]; In Mental Fatigue dataset, we preprocess physiological signals by interpolation and filtering algorithm. Then we extract 23 features for Galvanic Skin Response (GSR), Heart Rate (HR), R-R intervals and skin temperature sensors [2]. For Deep Anomaly Detection (DAD) method, we filter multi-sensor signals and then pack these signals into matrix as input to construct the deep model. We reimplement these methods based on open-source repositories111https://pyod.readthedocs.io/en/stable/, https://github.com/7fantasysz/MSCRED or our own implementations. For KPCA, we employ Gaussian kernel with a bandwidth of 600, 500, 0.5, respectively for PAMAP2, CAP, and Mental Fatigue datasets. For ABOD, we use $k$ nearest neighbors to approximate the complexity reduction. For an observation, the variance of its weighted cosine scores to all neighbors could be viewed as the abnormal score. For OCSVM, we adopt PCA for OCSVM as a dimension reduction tool and employ the Gaussian kernel with a bandwidth of 0.1. For HMM, we build a Markov model after extracting features and calculate the anomaly probability from the state sequence generated by the model. For CNN-LSTM, we define a CNN- LSTM model in Keras by first defining 2D convolutional network as comprised of Conv2D and MaxPooling2D layers ordered into a stack of the required depth, wrapping them in a TimeDistributed layer and then defining the LSTM and output layers. For LSTM-AE, we use single-layer LSTM on both encoder and decoder in the task. For ConvLSTM-COMPOSITE, we choose ”conditional” version and adapt this technique to anomaly detection in multivariate time series. Here we also build a single model called ConvLSTM-AE by removing forecasting decoder. For UODA, we reimplement this algorithm by customizing the number of layers and hyper-parameters. For MSCRED, we first construct multi-scale matrices for multi-sensor data, and then fed it into MSCRED model and evaluate the performance. For our own CAE-M, we use library Hyperopt [71] to select the best hyper- parameters (i.e., time window, the number of neurons, learning rate, activation function, optimization criteria and iterations). The characterization network runs with $Conv2D$ $\rightarrow$ $Maxpooling$ $\rightarrow$ $Conv2D$ $\rightarrow$ $Maxpooling$ $\rightarrow$ $Conv2DTranspose$ $\rightarrow$ $Conv2DTranspose$ $\rightarrow$ $Conv2DTranspose$, i.e., Conv1-Conv5 with 32 kernels of size 4 $\times$ 4, 64 kernels of size 4 $\times$ 4, 64 kernels of size 4 $\times$ 4, 32 kernels of size 4 $\times$ 4, 1 kernels of size 4 $\times$ 4, and Maxpooling with size 2 $\times$ 2\. We use Rectified Linear Unit (ReLU) as the activation function of convolutional layers. The memory network contains non-linear prediction and linear prediction, where the non-linear network runs with $BiLSTM(512)$ $\rightarrow$ $Attention(h-1)$ $\rightarrow$ $Dropout(0.2)$ $\rightarrow$ $FC(1000,linear)$, and the linear network runs with $FC(1000,linear)$. The CAE-M model is trained in an end-to-end fashion using Keras [72]. The optimization algorithm is Adam and the batch size is set as 32. And we set parameters of compound objective function $\lambda_{1}=e-04$, $\lambda_{2}=0.5$ and $\lambda_{3}=0.5$. The time step $h$ usually gives desirable results as $h=5$ or $h=10$. Note that in addition to the complete CAE-M approach, we further evaluate its several variants as baselines to justify the effectiveness of each component: * • CAE-Mw/oPre. The CAE-M model removes the linear and non-linear prediction. That is, this variant only adopts the characterization network with reconstruction loss and MMD loss. (i.e., $\lambda_{1}=e-04,\lambda_{2}=0,\lambda_{3}=0$) * • CAE-Mw/oRec+MMD. The CAE-M model removes the reconstruction error and MMD. Different from CNN-LSTM model, the characterization network is still performed as the deep convolutional autoencoder. We put the latent representation without reconstruction error into the memory network. (i.e., $\lambda_{1}=0,\lambda_{2}=0.5,\lambda_{3}=0.5$) * • CAE-Mw/oATTENTION. The CAE-M model without Attention component is implemented. (i.e., $\lambda_{1}=e-04,\lambda_{2}=0.5,\lambda_{3}=0.5$) * • CAE-Mw/oAR. The CAE-M model without AR component is implemented. (i.e., $\lambda_{1}=e-04,\lambda_{2}=0.5,\lambda_{3}=0$) * • CAE-Mw/oMMD. The CAE-M model without MMD component is implemented. (i.e., $\lambda_{1}=0,\lambda_{2}=0.5,\lambda_{3}=0.5$) Note that anomaly detection problems are often with highly-imbalanced classes, hence accuracy is not suitable as the evaluation metric. In order to thoroughly evaluate the performance of our proposed method, we follow existing works [23, 73, 15] to adopt the mean precision, recall, and F1 score as the evaluation metrics. The mean precision means the average precision of normal and abnormal class. The same pattern goes for mean recall, F1 score. In the experiments, the train-validation-test sets are split by following existing works [15, 67]. Concretely speaking, for each dataset, we split normal samples into training, validation, and test with the ratio of $5:1:4$, where the training and validation set only contain normal samples and have no overlapping with testing set. The anomalous samples are only used in the testing set. The model selection criterion, i.e., hyperparameters, used for tuning is the validation error on the validation set. TABLE III: Detection performance in different sleep stages of baselines and our proposed method, *p-value = 0.0074. Method | WAKE | S1 | S2 | S3 | S4 | REM ---|---|---|---|---|---|--- mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 KPCA | 0.9162 | 0.8213 | 0.8662 | 0.8267 | 0.7598 | 0.7918 | 0.9257 | 0.9353 | 0.9305 | 0.9039 | 0.8689 | 0.8861 | 0.9402 | 0.9604 | 0.9502 | 0.9536 | 0.9614 | 0.9575 ABOD | 0.9872 | 0.8686 | 0.9242 | 0.9347 | 0.5522 | 0.6942 | 0.9389 | 0.6550 | 0.7716 | 0.8489 | 0.6184 | 0.7155 | 0.6749 | 0.6448 | 0.6595 | 0.5915 | 0.5909 | 0.5912 OCSVM | 0.9784 | 0.9492 | 0.9636 | 0.9655 | 0.9504 | 0.9579 | 0.9395 | 0.9448 | 0.9421 | 0.9714 | 0.9499 | 0.9605 | 0.8701 | 0.9488 | 0.9077 | 0.9784 | 0.9492 | 0.9636 HMM | 0.8417 | 0.8406 | 0.8411 | 0.8790 | 0.8856 | 0.8823 | 0.8967 | 0.8887 | 0.8927 | 0.6880 | 0.6747 | 0.6813 | 0.7279 | 0.7286 | 0.7282 | 0.8024 | 0.8649 | 0.8325 LSTM-AE | 0.6990 | 0.7178 | 0.7082 | 0.6517 | 0.6492 | 0.6504 | 0.7430 | 0.7331 | 0.7380 | 0.7689 | 0.7828 | 0.7758 | 0.7274 | 0.7569 | 0.7418 | 0.6590 | 0.6887 | 0.6735 UODA | 0.6159 | 0.6326 | 0.6241 | 0.6762 | 0.6762 | 0.6762 | 0.7290 | 0.5223 | 0.6086 | 0.5716 | 0.5766 | 0.5741 | 0.6626 | 0.8498 | 0.6807 | 0.5626 | 0.6116 | 0.5861 ConvLSTM- COMP | 0.9889 | 0.9772 | 0.9830 | 0.9755 | 0.9850 | 0.9864 | 0.9250 | 0.9127 | 0.9188 | 0.9401 | 0.9041 | 0.9217 | 0.8647 | 0.8866 | 0.9023 | 0.9675 | 0.9949 | 0.9810 CAE-M | 0.9974 | 0.9949 | 0.9961 | 0.9958 | 0.9950 | ß0.9954 | 0.9950 | 0.9950 | 0.9950 | 0.9294 | 0.8842 | 0.9063 | 0.9842 | 0.9950 | 0.9895 | 0.9681 | 0.9950 | 0.9813 ### 4.4 Results and Analysis As shown in TABLE II, we compare our proposed method with traditional and deep anomaly detection methods using the mean precision, recall and F1 score. We can see that our method outperforms most of the existing methods, which demonstrates the effectiveness of our method. From TABLE II, we can observe the following results. For the PAMAP2 dataset, the CAE-M achieves the highest precision and recall compared by 10 popular methods. Traditional methods perform differently on PAMAP2 dataset since they are limited by the feature extraction and feature selection methods. In deep learning method, CNN-LSTM has a lowest F1 score. This means that more constraints such as data preprocessing method and anomaly evaluation strategy need to be added for prediction-based anomaly detection. For LSTM-AE, MSCRED and ConvLSTM-AE, they both are reconstruction-based anomaly detection methods. Their performance is limited by the “noisy data” problem, resulting in reconstruction error for the abnormal input could be fit so well. For UODA, it performs reasonably well on the PAMAP2 dataset, but it is not end-to-end training, which is needed by pre-training denoising autoencoder (DAEs) and deep recurrent networks (RNNs), and then fine-tuning the UODA model composing of the DAE and RNN. For ConvLSTM-COMPOSITE model, it performs better than other baseline models. The model consists of a single encoder, two decoders of reconstruction branch and prediction branch. In fact, since its efficiency is influenced by reconstruction error and prediction error respectively, its performance could be limited by one of encoder-decoder models. For the CAP dataset, most of methods show a low F1 score. As CAP dataset contains different sleep stages of subjects, some methods are limited by high complexity of data. For OCSVM and HMM, they achieve better performance because of dimensionality reduction from 36 dimensions of PAMAP2 dataset to 7 dimensions. For MSCRED, due to batch size =1 for the training model in the open source code, the loss function couldn’t converge during training model and the training speed is slow. Our proposed method achieves about 7% improvement at F1 score, compared with the existing methods. For Fatigue dataset, it is difficult to label fatigue and non-fatigue data manually. Therefore, it may be a lot of noise or misclassification patterns in the data, so that most of methods fail to solve this problem. For UODA, MSCRED and ConvLSTM, they have ability to overcome noise and misclassification of training data. Our proposed method also solves this problem successfully and achieves at least 6% improvement at F1 score. Besides, in order to indicate significant differences from our proposed method and other baselines, we use Wilcoxon signed rank test[74] to analyze these results in TABLE II. We compute average p-value of CAE-M compared with other baselines. A p-value = 0.0077 indicates that the performance of our proposed method differs from other methods. This p-value is also computed in TABLE III. ### 4.5 Fine-grained Analysis In addition to the anomaly detection of different classes on each dataset, we conduct a fine-grained analysis to evaluate the performance of each method within each class. Considering intra-class diversity, we conduct a group of experiments to detect anomalies in different sleep stages. In fact, these physiological signals in different sleep stages have significant differences. We choose 4 traditional methods and 3 deep methods with good performance in global domain as comparison methods. As shown in TABLE III, we can observe that our architecture is most robust across same experiment settings. Several observations from these results are worth highlighting. For ABOD, the testing performance is unstable in local domain, which the highest F1 score is 0.92 in WAKE and the lowest F1 score is 0.59 in REM. For KPCA and ConvLSTM-COMPOSITE, the testing performance in local domain far exceeds the performance in global domain. This demonstrates that the two model can achieve better performance when intra-class data have similar distribution or regular pattern. For other methods, the testing performance is consistent in local and global domain. For our proposed method, the best testing performance can be achieved no matter in local domain or global domain. This study clearly justifies the superior representational capacity of our architecture to solve intra-class diversity. ### 4.6 Effectiveness Evaluation TABLE IV: The evaluation results on LOSO cross validation approach, including the best, the worst and the mean F1 score of 8 subjects. Method | Worst mF1 | Best mF1 | Mean mF1 ---|---|---|--- ABOD | 0.6093 | 0.8507 | 0.7706 ConvLSTM-COMP | 0.7033 | 0.9224 | 0.8493 UODA | 0.5938 | 0.9336 | 0.7984 CAE-M | 0.8009 | 0.9433 | 0.8616 #### 4.6.1 Leave One Subject Out In this section, we measure the generalization ability of models using Leave One Subject Out (LOSO). The fact is that when training and testing datasets contain the same subject, the model is likely to know more about the current subject which may be biased towards a new one. Therefore, LOSO could help to evaluate the generalization ability. We choose the PAMAP2 dataset to conduct subject-independent experiments which contain 8 subjects. As can be seen in Figure 2(a), we evaluate our proposed method and three methods with relatively high F1 score. By examining the results, one can easily notice that deep learning-based methods obtain better performance than traditional methods. However, complex models such as deep neural networks are prone to overfitting because of their flexibility in memorizing the idiosyncratic patterns in the training set, instead of generalizing to unseen data. (a) Leave One Subject Out Evaluation (b) Ablation Study Figure 2: Effectiveness evaluation using LOSO method and ablation study. TABLE IV shows the best, the worst and average performance among 8 subjects. We can observe that UODA and ConvLSTM-COMPOSITE model perform well in some specific subjects, but they fail to reduce the effects of overfitting to each test subject, even drop to 0.70 and 0.59 for some subjects. Compared to these methods, CAE-M can generalize well on testing subjects it hasn’t appeared before, which reach the average F1 score of 0.86. Besides, we perform an analysis of variance on repeated measures within subject 1 (corresponding to numbers in Figure 2(a)). As shown in TABLE V, we observe that CAE-M remains a more stable performance on repeated measurements. In summary, the above demonstrates that our model can be motivated to improve the generalization ability. TABLE V: The repeated measures analysis of variance on LOSO cross validation approach of one subject. Method | mPre | mRec | mF1 ---|---|---|--- ABOD | 0.6240$\pm$0.000 | 0.5946$\pm$0.000 | 0.6090$\pm$0.000 ConvLSTM-COMP | 0.8953$\pm$0.029 | 0.8081$\pm$0.038 | 0.8488$\pm$0.019 UODA | 0.8155$\pm$0.063 | 0.7464$\pm$0.027 | 0.7782$\pm$0.031 CAE-M | 0.9437$\pm$0.024 | 0.8191$\pm$0.003 | 0.8770$\pm$0.012 #### 4.6.2 Ablation Study TABLE VI: The mean precision, recall and F1 score from variants. ID | Method | PAMAP2 | CAP dataset | Fatigue dataset ---|---|---|---|--- mPre | mRec | mF1 | mPre | mRec | mF1 | mPre | mRec | mF1 1 | CAE-M${}_{\textit{w/o Pre}}$ | 0.8103 | 0.8023 | 0.8063 | 0.8299 | 0.8101 | 0.8199 | 0.6005 | 0.6096 | 0.6050 2 | CAE-M${}_{\textit{w/o Rec+MMD}}$ | 0.5693 | 0.5440 | 0.5563 | 0.8896 | 0.7784 | 0.8303 | 0.7050 | 0.6814 | 0.6930 3 | CAE-M${}_{\textit{w/o ATTENTION}}$ | 0.9151 | 0.9276 | 0.9213 | 0.9251 | 0.9291 | 0.9271 | 0.9605 | 0.9551 | 0.9578 4 | CAE-M${}_{\textit{w/o AR}}$ | 0.9060 | 0.8691 | 0.8872 | 0.9634 | 0.9381 | 0.9506 | 0.9046 | 0.9048 | 0.9047 5 | CAE-M${}_{\textit{w/o MMD}}$ | 0.9437 | 0.9550 | 0.9493 | 0.9293 | 0.9213 | 0.9253 | 0.9407 | 0.9288 | 0.9347 6 | CAE-M | 0.9608 | 0.9670 | 0.9639 | 0.9939 | 0.9952 | 0.9961 | 0.9962 | 0.9959 | 0.9960 The proposed CAE-M approach consists of several components such as CAE, MMD, Attention mechanism, BiLSTM and Auto-regressive. To demonstrate the effectiveness of each component, we conduct ablation studies in this section. The ablation study is shown in Figure 2(b). These ID numbers represent CAE-M without non-linear and linear prediction, CAE-M without reconstruction error and MMD, CAE-M without attention module, CAE-M without AR, CAE-M without MMD and CAE-M, respectively. The experimental results indicate that for the removal of different component above, there is corresponding performance drop at F1 score. We can observe that CAE-M model without prediction or reconstruction error achieves a low F1 score relatively. This demonstrates that our composite model is effective and necessary for anomaly detection in multi-sensor time-series data. Compared to original CAE-M model, removing the AR component (in CAE-M${}_{\textit{w/o AR}}$) from the full model causes significant performance drops on most of the datasets. This shows the critical role of the AR component in general. Moreover, attention and MMD components can also cause big performance rises on all the datasets. More details are shown in TABLE VI. Here, these ID numbers are corresponding to numbers in Figure 2(b). ### 4.7 Robustness to Noisy Data (a) mF1 (b) mPre (c) mRec Figure 3: Robustness to noisy data. In real-world applications, the collection of multi-sensor time-series data can be easily polluted with noise due to changes in the environment or the data collection devices. The noisy data bring critical challenges to the unsupervised anomaly detection methods. In this section, we evaluate the robustness of different methods to noisy data. We manually control the noisy data ratio in the training data. We inject Gaussian noise ($\mu$=0, $\sigma$=0.3) in a random selection of samples with a ratio varying between 1% to 30%. We compare the performance of three methods on PAMAP2 dataset: UODA, ConvLSTM-COMPOSITE, and CAE-M in Figure 3. These methods have good stability in the above experiments. As the noise increases, the performance of all methods decreases. For CAE-M, the F1 score, precision and recall have no significant decline. Among them, our model remains significantly superior to others, demonstrating its robustness to noisy data. ### 4.8 Further Analysis #### 4.8.1 Parameter Sensitivity Analysis In this section, we evaluate the parameter sensitivity of CAE-M model. It is worth noting that CAE-M achieves the best performance by adjusting weight coefficient of compound objective function. We apply control variate reduction technique [75] to empirically evaluate the sensitivity of parameter $\lambda_{1},\lambda_{2},\lambda_{3}$ with a wide range. The results are shown in Figure 4. As the value of MMD loss is greater than others, we select its weight coefficient within e-04 $\sim$ e-07 and other weight coefficients within [0.1, 0.5, 1, 5, 10, 50]. We adjust one of $\lambda$ while fixing the other respective $\lambda$ to keep the optimal value ($\lambda_{1}=e-04$, $\lambda_{2}=0.5$, and $\lambda_{3}=0.5$). When weight coefficient is increased, we observe that F1 score tends to decline. The optimal parameter is $\lambda_{1}=e-04$, $\lambda_{2}=0.5$, and $\lambda_{3}=0.5$. It can be seen that the performance of CAE-M stays robust within a wide range of parameter choice. (a) MMD loss (b) Bi-LSTM loss (c) Autoregressive loss Figure 4: Parameter sensitivity analysis of the proposed CAE-M approach. (a) PAMAP2 dataset (b) CAP dataset (c) Fatigue dataset Figure 5: Convergence analysis of the proposed CAE-M approach on different datasets. #### 4.8.2 Convergence Analysis Since CAE-M involves several components, it is natural to ask whether and how quickly it can converge. In this section, we analyze the convergence to answer this question. We extensively show the results of each component on three datasets in Figure 5. These results demonstrate that even if the proposed CAE-M approach involves several components, it could reach a steady performance within fewer than 40 iterations. Therefore, in real applications, CAE-M can be applied more easily with a fast and steady convergence performance. ## 5 Conclusion and Future Work In this paper, we introduced a Deep Convolutional Autoencoding Memory network named CAE-M to detect anomalies. The CAE-M model uses a composite framework to model generalized pattern of normal data by capturing spatial-temporal correlation in multi-sensor time-series data. We first build Deep Convolutional Autoencoder with a Maximum Mean Discrepancy (MMD) penalty to characterize multi-sensor time-series signals and reduce the risk of overfitting caused by noise and anomalies in training data. To better represent temporal dependency of sequential data, we use non-linear Bidirectional LSTM with Attention and linear Auto-regressive model for prediction. Extensive empirical studies on HAR and HC datasets demonstrate that CAE-M performs better than other baseline methods. In the future work, we will focus on the point-based fine-grained anomaly detection approach and further improve our method for multi-sensor data by designing proper sparse operations. ## Acknowledgment This work was supported by Key-Area Research and Development Program of Guangdong Province (No.2019B010109001), Science and Technology Service Network Initiative, Chinese Academy of Sciences (No. KFJ-STS-QYZD-2021-11-001), and Natural Science Foundation of China (No.61972383, No.61902377, No.61902379). ## References * [1] R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: A survey,” _arXiv preprint arXiv:1901.03407_ , 2019. * [2] Y. Zhang, Y. Chen, and Z. Pan, “A deep temporal model for mental fatigue detection,” in _2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)_. IEEE, 2018, pp. 1879–1884. * [3] J. E. Ball, D. T. Anderson, and C. S. Chan, “Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community,” _Journal of Applied Remote Sensing_ , vol. 11, no. 4, p. 042609, 2017. * [4] B. Kiran, D. Thomas, and R. Parakkal, “An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos,” _Journal of Imaging_ , vol. 4, no. 2, p. 36, 2018. * [5] A. Ramchandran and A. K. Sangaiah, “Unsupervised anomaly detection for high dimensional data—an exploratory analysis,” in _Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications_. Elsevier, 2018, pp. 233–251. * [6] G. Pang, C. Shen, L. Cao, and A. V. D. Hengel, “Deep learning for anomaly detection: A review,” _ACM Computing Surveys (CSUR)_ , vol. 54, no. 2, pp. 1–38, 2021. * [7] L. Ruff, J. R. Kauffmann, R. A. Vandermeulen, G. Montavon, W. Samek, M. Kloft, T. G. Dietterich, and K. Müller, “A unifying review of deep and shallow anomaly detection,” 2020. * [8] Y. Zhang, Y. Chen, and C. Gao, “Deep unsupervised multi-modal fusion network for detecting driver distraction,” _Neurocomputing_ , vol. 421, pp. 26–38, 2021. * [9] Y. Chen, J. Wang, M. Huang, and H. Yu, “Cross-position activity recognition with stratified transfer learning,” _Pervasive and Mobile Computing_ , vol. 57, pp. 1–13, 2019. * [10] Y. Chen, X. Qin, J. Wang, C. Yu, and W. Gao, “Fedhealth: A federated transfer learning framework for wearable healthcare,” _IEEE Intelligent Systems_ , vol. 35, no. 4, pp. 83–93, 2020. * [11] J. Wang, V. W. Zheng, Y. Chen, and M. Huang, “Deep transfer learning for cross-domain activity recognition,” in _proceedings of the 3rd International Conference on Crowd Science and Engineering_ , 2018, pp. 1–8. * [12] J. Wang, Y. Chen, S. Hao, X. Peng, and L. Hu, “Deep learning for sensor-based activity recognition: A survey,” _Pattern Recognition Letters_ , vol. 119, pp. 3–11, 2019. * [13] J. Wang, Y. Chen, L. Hu, X. Peng, and S. Y. Philip, “Stratified transfer learning for cross-domain activity recognition,” in _2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)_. IEEE, 2018, pp. 1–10. * [14] D. Li, D. Chen, B. Jin, L. Shi, J. Goh, and S.-K. Ng, “Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks,” in _International Conference on Artificial Neural Networks_. Springer, 2019, pp. 703–716. * [15] C. Zhang, D. Song, Y. Chen, X. Feng, C. Lumezanu, W. Cheng, J. Ni, B. Zong, H. Chen, and N. V. Chawla, “A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 33, 2019, pp. 1409–1416. * [16] V. Patraucean, A. Handa, and R. Cipolla, “Spatio-temporal video autoencoder with differentiable memory,” _arXiv preprint arXiv:1511.06309_ , 2015. * [17] R. Paffenroth, P. Du Toit, R. Nong, L. Scharf, A. P. Jayasumana, and V. Bandara, “Space-time signal processing for distributed pattern detection in sensor networks,” _IEEE Journal of Selected Topics in Signal Processing_ , vol. 7, no. 1, pp. 38–49, 2013. * [18] L. J. Latecki, A. Lazarevic, and D. Pokrajac, “Outlier detection with kernel density functions,” in _International Workshop on Machine Learning and Data Mining in Pattern Recognition_. Springer, 2007, pp. 61–75. * [19] B. Schölkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, “Estimating the support of a high-dimensional distribution,” _Neural computation_ , vol. 13, no. 7, pp. 1443–1471, 2001. * [20] M. Sakurada and T. Yairi, “Anomaly detection using autoencoders with nonlinear dimensionality reduction,” in _Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis_. ACM, 2014, p. 4. * [21] M. Hasan, J. Choi, J. Neumann, A. K. Roy-Chowdhury, and L. S. Davis, “Learning temporal regularity in video sequences,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 733–742. * [22] P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, “Extracting and composing robust features with denoising autoencoders,” in _Proceedings of the 25th international conference on Machine learning_. ACM, 2008, pp. 1096–1103. * [23] B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, and H. Chen, “Deep autoencoding gaussian mixture model for unsupervised anomaly detection,” 2018\. * [24] D. Gong, L. Liu, V. Le, B. Saha, M. R. Mansour, S. Venkatesh, and A. v. d. Hengel, “Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection,” _arXiv preprint arXiv:1904.02639_ , 2019. * [25] D. Li, D. Chen, J. Goh, and S.-k. Ng, “Anomaly detection with generative adversarial networks for multivariate time series,” _arXiv preprint arXiv:1809.04758_ , 2018. * [26] R. Aliakbarisani, A. Ghasemi, and S. F. Wu, “A data-driven metric learning-based scheme for unsupervised network anomaly detection,” _Computers & Electrical Engineering_, vol. 73, pp. 71–83, 2019. * [27] B. Schölkopf, A. Smola, and K.-R. Müller, “Nonlinear component analysis as a kernel eigenvalue problem,” _Neural computation_ , vol. 10, no. 5, pp. 1299–1319, 1998. * [28] H. Hoffmann, “Kernel pca for novelty detection,” _Pattern recognition_ , vol. 40, no. 3, pp. 863–874, 2007. * [29] R. Paffenroth, K. Kay, and L. Servi, “Robust pca for anomaly detection in cyber networks,” _arXiv preprint arXiv:1801.01571_ , 2018. * [30] R. Laxhammar, G. Falkman, and E. Sviestins, “Anomaly detection in sea traffic-a comparison of the gaussian mixture model and the kernel density estimator,” in _2009 12th International Conference on Information Fusion_. IEEE, 2009, pp. 756–763. * [31] J. Kim and C. D. Scott, “Robust kernel density estimation,” _Journal of Machine Learning Research_ , vol. 13, no. Sep, pp. 2529–2565, 2012. * [32] D. M. Tax and R. P. Duin, “Support vector data description,” _Machine learning_ , vol. 54, no. 1, pp. 45–66, 2004. * [33] N. Günnemann, S. Günnemann, and C. Faloutsos, “Robust multivariate autoregression for anomaly detection in dynamic product ratings,” in _Proceedings of the 23rd international conference on World wide web_. ACM, 2014, pp. 361–372. * [34] J. D. Hamilton, _Time series analysis_. Princeton university press Princeton, NJ, 1994, vol. 2. * [35] H. Z. Moayedi and M. Masnadi-Shirazi, “Arima model for network traffic prediction and anomaly detection,” in _2008 International Symposium on Information Technology_ , vol. 4. IEEE, 2008, pp. 1–6. * [36] P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, “Lstm-based encoder-decoder for multi-sensor anomaly detection,” _arXiv preprint arXiv:1607.00148_ , 2016. * [37] W. Luo, W. Liu, and S. Gao, “Remembering history with convolutional lstm for anomaly detection,” in _2017 IEEE International Conference on Multimedia and Expo (ICME)_. IEEE, 2017, pp. 439–444. * [38] J. An and S. Cho, “Variational autoencoder based anomaly detection using reconstruction probability,” _Special Lecture on IE_ , vol. 2, no. 1, 2015\. * [39] D. Wulsin, J. Blanco, R. Mani, and B. Litt, “Semi-supervised anomaly detection for eeg waveforms using deep belief nets,” in _2010 Ninth International Conference on Machine Learning and Applications_. IEEE, 2010, pp. 436–441. * [40] C. Zhou and R. C. Paffenroth, “Anomaly detection with robust deep autoencoders,” in _Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining_. ACM, 2017, pp. 665–674. * [41] P. Filonov, F. Kitashov, and A. Lavrentyev, “Rnn-based early cyber-attack detection for the tennessee eastman process,” _arXiv preprint arXiv:1709.02232_ , 2017. * [42] T. Ergen, A. H. Mirza, and S. S. Kozat, “Unsupervised and semi-supervised anomaly detection with lstm neural networks,” _arXiv preprint arXiv:1710.09207_ , 2017. * [43] D. Shalyga, P. Filonov, and A. Lavrentyev, “Anomaly detection for water treatment system based on neural network with automatic architecture optimization,” _arXiv preprint arXiv:1807.07282_ , 2018. * [44] M. Kravchik and A. Shabtai, “Detecting cyber attacks in industrial control systems using convolutional neural networks,” in _Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy_. ACM, 2018, pp. 72–83. * [45] G. Lai, W.-C. Chang, Y. Yang, and H. Liu, “Modeling long-and short-term temporal patterns with deep neural networks,” in _The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval_. ACM, 2018, pp. 95–104. * [46] W. Liu, W. Luo, D. Lian, and S. Gao, “Future frame prediction for anomaly detection–a new baseline,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 6536–6545. * [47] N. Srivastava, E. Mansimov, and R. Salakhudinov, “Unsupervised learning of video representations using lstms,” in _International conference on machine learning_ , 2015, pp. 843–852. * [48] J. R. Medel and A. Savakis, “Anomaly detection in video using predictive convolutional long short-term memory networks,” _arXiv preprint arXiv:1612.00390_ , 2016. * [49] Y. Zhao, B. Deng, C. Shen, Y. Liu, H. Lu, and X.-S. Hua, “Spatio-temporal autoencoder for video anomaly detection,” in _Proceedings of the 25th ACM international conference on Multimedia_. ACM, 2017, pp. 1933–1941. * [50] Q. Zhang, J. Wu, P. Zhang, G. Long, and C. Zhang, “Salient subsequence learning for time series clustering,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 41, no. 9, pp. 2193–2207, 2018. * [51] H. I. Fawaz, B. Lucas, G. Forestier, C. Pelletier, D. F. Schmidt, J. Weber, G. I. Webb, L. Idoumghar, P.-A. Muller, and F. Petitjean, “Inceptiontime: Finding alexnet for time series classification,” _Data Mining and Knowledge Discovery_ , vol. 34, no. 6, pp. 1936–1962, 2020. * [52] W. Tang, G. Long, L. Liu, T. Zhou, J. Jiang, and M. Blumenstein, “Rethinking 1d-cnn for time series classification: A stronger baseline,” _arXiv preprint arXiv:2002.10061_ , 2020. * [53] Z. Wu, S. Pan, G. Long, J. Jiang, X. Chang, and C. Zhang, “Connecting the dots: Multivariate time series forecasting with graph neural networks,” in _Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining_, 2020, pp. 753–763. * [54] B. Jun, “Fault detection using dynamic time warping (dtw) algorithm and discriminant analysis for swine wastewater treatment,” _Journal of hazardous materials_ , vol. 185, no. 1, pp. 262–268, 2011. * [55] W. Chen, S. Wang, G. Long, L. Yao, Q. Z. Sheng, and X. Li, “Dynamic illness severity prediction via multi-task rnns for intensive care unit,” in _2018 IEEE International Conference on Data Mining (ICDM)_. IEEE, 2018, pp. 917–922. * [56] X. Zhang, L. Yao, C. Huang, S. Wang, M. Tan, G. Long, and C. Wang, “Multi-modality sensor data classification with selective attention,” _arXiv preprint arXiv:1804.05493_ , 2018. * [57] A. Smola, A. Gretton, L. Song, and B. Schölkopf, “A hilbert space embedding for distributions,” in _International Conference on Algorithmic Learning Theory_. Springer, 2007, pp. 13–31. * [58] K. Greff, R. K. Srivastava, J. Koutník, B. R. Steunebrink, and J. Schmidhuber, “Lstm: A search space odyssey,” _IEEE transactions on neural networks and learning systems_ , vol. 28, no. 10, pp. 2222–2232, 2017. * [59] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” _arXiv preprint arXiv:1412.3555_ , 2014. * [60] G. Liu and J. Guo, “Bidirectional lstm with attention mechanism and convolutional layer for text classification,” _Neurocomputing_ , vol. 337, pp. 325–338, 2019. * [61] A. Reiss and D. Stricker, “Introducing a new benchmarked dataset for activity monitoring,” in _2012 16th International Symposium on Wearable Computers_. IEEE, 2012, pp. 108–109. * [62] M. G. Terzano, L. Parrino, A. Smerieri, R. Chervin, S. Chokroverty, C. Guilleminault, M. Hirshkowitz, M. Mahowald, H. Moldofsky, A. Rosa _et al._ , “Atlas, rules, and recording techniques for the scoring of cyclic alternating pattern (cap) in human sleep,” _Sleep medicine_ , vol. 3, no. 2, pp. 187–199, 2002. * [63] H.-P. Kriegel, M. Schubert, and A. Zimek, “Angle-based outlier detection in high-dimensional data,” in _Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining_. ACM, 2008, pp. 444–452. * [64] J. Ma and S. Perkins, “Time-series novelty detection using one-class support vector machines,” in _Proceedings of the International Joint Conference on Neural Networks, 2003._ , vol. 3. IEEE, 2003, pp. 1741–1745. * [65] S. S. Joshi and V. V. Phoha, “Investigating hidden markov models capabilities in anomaly detection,” in _Proceedings of the 43rd annual Southeast regional conference-Volume 1_. ACM, 2005, pp. 98–103. * [66] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell, “Long-term recurrent convolutional networks for visual recognition and description,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2015, pp. 2625–2634. * [67] W. Lu, Y. Cheng, C. Xiao, S. Chang, S. Huang, B. Liang, and T. Huang, “Unsupervised sequential outlier detection with deep architectures,” _IEEE transactions on image processing_ , vol. 26, no. 9, pp. 4321–4330, 2017\. * [68] D. P. Subha, P. K. Joseph, R. Acharya, and C. M. Lim, “Eeg signal analysis: a survey,” _Journal of medical systems_ , vol. 34, no. 2, pp. 195–212, 2010\. * [69] A. Phinyomark, C. Limsakul, and P. Phukpattaranont, “A novel feature extraction for robust emg pattern recognition,” _arXiv preprint arXiv:0912.3973_ , 2009. * [70] M. K. Gautama and V. K. Giri, “An overview of feature extraction techniques of ecg,” _American-Eurasian Journal of Scientific Research_ , vol. 12, no. 1, pp. 54–60, 2017. * [71] J. Bergstra, D. Yamins, and D. D. Cox, “Hyperopt: A python library for optimizing the hyperparameters of machine learning algorithms,” in _Proceedings of the 12th Python in science conference_. Citeseer, 2013, pp. 13–20. * [72] N. Ketkar, “Introduction to keras,” in _Deep learning with Python_. Springer, 2017, pp. 97–111. * [73] Y. Guo, W. Liao, Q. Wang, L. Yu, T. Ji, and P. Li, “Multidimensional time series anomaly detection: A gru-based gaussian mixture variational autoencoder approach,” in _Asian Conference on Machine Learning_ , 2018, pp. 97–112. * [74] D. Rey and M. Neuhäuser, “Wilcoxon-signed-rank test,” _Springer Berlin Heidelberg_. * [75] S. Kucherenko, B. Delpuech, B. Iooss, and S. Tarantola, “Application of the control variate technique to estimation of total sensitivity indices,” _Reliability Engineering & System Safety_, vol. 134, pp. 251–259, 2015\.
arxiv-papers
2021-07-27T06:48:20
2024-09-04T03:07:20.745130
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yuxin Zhang, Yiqiang Chen, Jindong Wang, Zhiwen Pan", "submitter": "Jindong Wang", "url": "https://arxiv.org/abs/2107.12626" }
2107.12628
# Energy-Based Open-World Uncertainty Modeling for Confidence Calibration Yezhen Wang1 Bo Li111footnotemark: 1 Tong Che211footnotemark: 1 Kaiyang Zhou3 Ziwei Liu3 Dongsheng Li1 1Microsoft Research Asia 2MILA 3S-Lab, Nanyang Technological University Equal contribution. Ordered by dice rolling. Correspondence to [email protected]. ###### Abstract Confidence calibration is of great importance to the reliability of decisions made by machine learning systems. However, discriminative classifiers based on deep neural networks are often criticized for producing overconfident predictions that fail to reflect the true correctness likelihood of classification accuracy. We argue that such an inability to model uncertainty is mainly caused by the closed-world nature in softmax: a model trained by the cross-entropy loss will be forced to classify input into one of $K$ pre- defined categories with high probability. To address this problem, we for the first time propose a novel $K$+1-way softmax formulation, which incorporates the modeling of open-world uncertainty as the extra dimension. To unify the learning of the original $K$-way classification task and the extra dimension that models uncertainty, we 1) propose a novel energy-based objective function, and moreover, 2) theoretically prove that optimizing such an objective essentially forces the extra dimension to capture the marginal data distribution. Extensive experiments show that our approach, Energy-based Open- World Softmax (EOW-Softmax), is superior to existing state-of-the-art methods in improving confidence calibration. ## 1 Introduction Given the considerable success achieved so far by deep neural networks (DNNs), one might be wondering if DNN-based systems can be readily deployed to solve real-world problems. On the one hand, DNNs can achieve high accuracy if trained with large-scale datasets [15]. But on the other hand, contemporary DNNs are often criticized for producing overconfident predictions [14], which fail to represent the true correctness likelihood of accuracy. This has raised concerns over safety and reliability for using machine learning systems in real-world scenarios. Having a confidence-calibrated system is critical. For instance, in healthcare applications, the intelligence system should produce low-confidence predictions when it is uncertain about the input—say they differ significantly from the training data—so the decision-making process can be transferred to human doctors for more accurate diagnosis and safer handling. Research on confidence calibration for DNNs has received increasing attention in recent years [14, 27, 19, 23, 27]. Since most classifiers are based on softmax, a common practice to improve calibration is to insert a temperature scaling parameter to the softmax function and adjust it in a validation set [14]. Besides, methods like Smoothing labels [36, 28], which essentially combines the one-hot ground-truth vector with a uniform distribution, has also been shown effective in improving calibration. Figure 1: Comparison between (a) the conventional softmax and (b) our proposed Energy-based Open-World softmax (EOW-Softmax). Our new formulation introduces an extra dimension to model uncertainty, which is supposed to produce high scores when the input deviates from the training data distribution. In this way, the original $K$ classification scores can be well calibrated. However, most existing confidence calibration methods have overlooked the underlying problem that causes neural network classifiers to generate overconfident predictions, i.e. the inability to model _uncertainty_ in output probabilities. We argue that the culprit for causing such a problem is the closed-world nature in softmax [2, 34]. This is easy to understand: during training the model is asked to classify input into one of $K$ pre-defined categories with high probability (due to the cross-entropy loss), and as such, the model has no choice but to assign one of the $K$ categories to any unseen data, likely with high probability as well. A potential countermeasure is to adopt a $K+1$-way formulation where the new category can represent uncertainty about the input data. In this way, the $K$ classification scores might be better regularized, and hence better calibrated. However, learning such a classifier is challenging as we do not have access to those data with the $K+1$-th label, thus lacking supervision to teach the network when to give low/high confidence. Furthermore, designing the extra dimension is a non-trivial task as it is directly linked to the formulation of the learning objective. It is also unclear how such a dimension should be constructed, e.g., to design it as another logit produced by the same network or an independent branch that regresses to uncertainty. In this paper, we propose _Energy-based Open-World Softmax_ (EOW-Softmax), a novel approach that introduces a $K+1$-way softmax based on energy functions [25]. Specifically, the neural network classifier is designed to produce $K+1$ logits, where the first $K$ dimensions encode the scores for the original $K$-way classification task, while the extra dimension aims to model open- world uncertainty. See Figure 1 for a comparison between a model based on the conventional softmax and that based on our EOW-Softmax. Besides, we resort to an energy-based $K+1$-way classification objective function to unify the learning of the $K$-way classification task and the uncertainty modeling. Further more, we theoretically justify that optimizing the proposed objective function essentially forces the summation of original $K$ softmax scores ($K+1$ scores in total) to be directly proportional to the marginal density $p(x)$, hence explaining why our EOW-Softmax helps calibrate a model’s confidence estimates. The contributions of this paper are summarized as follows. 1) First, we overcome the closed-world softmax problem by transforming the conventional $K$-way softmax to a novel $K+1$-way formulation, where the extra dimension is designed to model open-world uncertainty. 2) Second, a novel energy-based objective function is developed to unify the learning of the original $K$-way classification task and the uncertainty modeling. 3) A theoretical proof is further provided to explain why our learning objective can help the network capture uncertainty. 4) Finally, we conduct extensive experiments on standard benchmark datasets to demonstrate that our method can lead to a better calibrated model compared with other state-of-the-arts. ## 2 Related Works Confidence Calibration With the emergence of deep learning technologies and their wide successes, concerns over whether they are reliable to be deployed in practice have also arisen. This is because researchers have found that contemporary deep neural networks (DNNs) often produce overconfident predictions [14], even on input images that are totally unrecognizable to humans [32]. Many approaches for improving confidence calibration have been developed. A widely used method is temperature scaling [14, 27, 19], which inserts a scaling parameter to the softmax formulation (called ‘temperature’) and adjusts it in a validation set with a goal to ‘soften’ the softmax probabilities. Regularization methods, such as label smoothing [36] and Mixup [37], have also been demonstrated effective in improving calibration. In particular, label smoothing modifies the ground-truth labels by fusing them with a uniform distribution, essentially forcing neural networks to produce ‘more flattened’ probabilities; whereas Mixup is a data augmentation method that randomly mixes two instances at both the image and label space, with a byproduct effect of improving calibration. Bayesian methods have also been explored for calibration. For instance, Monte Carlo Dropout [7] applies dropout in both training and testing; Deep Ensembles [23] uses as prediction the output averaged over an ensemble of models. Adding adversarial perturbations to the input has been found effective in smoothing the output probabilities [23, 27]. In [26], a GAN model [11] is trained to generate out- of-distribution (OOD) data and the classifier is encouraged to produce low- confidence probabilities on these data. Such an idea has also been investigated in [16] where adversarial perturbations are utilized to synthesize OOD data. In [12], a Joint Energy-based Model (JEM) is proposed to improve calibration by learning the joint distribution based on energy functions [25]. A recent work [38] suggests that calibrating confidence across multiple domains is beneficial to OOD generalization [42]. Studies on why neural networks produce overconfident predictions have also been covered in the literature. In [16], the authors suggest that ReLU neural networks are essentially piecewise linear functions, thus explaining why OOD data can easily cause softmax classifiers to generate highly confident output. In [30], the authors identify that data variance and model curvature cause most generative models to assign high density to OOD data. The authors in [34] point out that the overconfidence issue is related to the closed-world assumption in softmax, and design a distance-based one-vs-all (OvA) classifier as the countermeasure. Two works related to ours are JEM [12] and the OvA classifier [34]. Compared with JEM, our approach is much easier to train because we only need to optimize a _single_ classification objective to achieve both discriminative classifier learning and generative modeling (see Sec. 3.3), while JEM has to simultaneously optimize two separate objectives. Moreover, JEM has ignored the closed-world softmax issue, which is addressed in this work with an augmented softmax. Compared with the OvA classifier, our approach is significantly different: we endow the classifier with the ability to model open-world uncertainty, which is attributed to the extra dimension in softmax learned via a novel energy-based objective function to capture the marginal data distribution; in contrast, the OvA classifier converts the $K$-way classification problem into multiple binary classification problems. Energy-Based Models (EBMs) have been widely used in the area of generative modeling [41, 8, 1, 4]. The basic idea in EBMs is to learn dependencies between variables (e.g., images and labels) represented using energy functions; and to assign low energies to correct configurations while give high energies to incorrect ones [25]. However, training EBMs, especially on high-dimensional data like images, has been notoriously hard due to sampling issues [21, 13]. A widely used sampler is Stochastic Gradient Langevin Dynamics (SGLD) [39], which injects noises to the parameter update and anneals the stepsize during the course of training. Following prior work [33, 6, 12], we also leverage SGLD to optimize our energy-based objective function. Figure 2: Model architecture of our approach _EOW-Softmax_. The extra dimension introduced in the augmented softmax (dashed) is learned using an energy-based function to model open-world uncertainty, such that it can assign high uncertainty scores to abnormal input far away from the training data distribution, which in turn lower the classifier’s confidence on the original $K$-way classification task. Note that the sampling in SGLD is performed on the latent (feature) space rather than the input (image) space. ## 3 Methodology According to [34], we argue that the culprit for causing the overconfidence problem in most neural network classifiers’ output is the closed-world nature in softmax. As a result, a model trained by the cross-entropy loss has to pick one of $K$ pre-defined categories with high confidence. To overcome this problem, we propose _Energy-based Open-World Softmax_ , or EOW-Softmax, to regularize the $K$-way classification scores in such a way that allows their confidence to be calibrated. The main idea in EOW-Softmax is to re-formulate the original $K$-way classification task as a novel $K$+1-way classification problem, where the extra dimension is designed to model _open-world uncertainty_. To learn such a $K$+1-way classifier in an end-to-end manner, we propose a novel energy-based objective function, which essentially forces the extra dimension to be negatively correlated to the marginal data distribution. In this way, the $K$ classification scores are automatically calibrated to be less confident over input fallen beyond the training data distribution. See Figure 2 for an overview of our model architecture. The rest of this section are organized as follows. In Sec. 3.1, we provide a brief background on energy-based models (EBMs), which are required by our approach to construct the objective function. In Sec. 3.2, we discuss in detail the design of EOW- Softmax. Sec. 3.3 gives a theoretical insight on why EOW-Softmax can help calibrate a model’s confidence estimates. ### 3.1 A Brief Background on EBMs The main building block in EBMs is an energy function $E_{\theta}:\mathbb{R}^{D}\to\mathbb{R}$ (parameterized by $\theta$), which aims to map a $D$-dimensional datapoint to a scalar.111When the input is an image, $D$ can be understood as the length of the flattened tensor. The learning is designed in such a way that $E_{\theta}$ can assign low energies to observed configurations of variables while give high energies to unobserved ones [25]. With $E_{\theta}$, any probability density $p(x)$ for $x\in\mathbb{R}^{D}$ in an EBM can be written as $p_{\theta}(x)=\frac{\exp(-E_{\theta}(x))}{Z(\theta)},$ (1) where $Z(\theta)=\int_{x}\exp(-E_{\theta}(x))$ denotes the normalizing constant, also known as the partition function. An EBM can be represented by using any function as long as the function can generate a single scalar given some input $x$. In this work, we assume $E_{\theta}$ is represented by a deep neural network. People usually adopt gradient estimation to optimize an EBMs [21, 13] and sample data from it by Markov Chain Monte Carlo (MCMC) methods [9, 10, 18, 39]. ### 3.2 Energy-Based Open-World Softmax Open-World Softmax As discussed before, conventional softmax-based classifiers lack the ability to model open-world uncertainty. To address this problem, we design a neural network classifier to output probabilities on $K+1$ categories (see Figure 2), with the $K$+1-th score representing open-world uncertainty—the network should be able to produce high uncertainty scores to abnormal input, which in turn can lower the confidence on the original $K$ categories’ prediction. Let $f_{\theta}:\mathbb{R}^{D}\to\mathbb{R}^{K+1}$ be our neural network model (excluding the softmax layer), which produces $K+1$ logits, and $f_{\theta}(x)[i]$ the $i$-th logit given input $x$, with $i\in\\{1,...,K,K+1\\}$. The output probabilities can then be obtained by passing these $K+1$ logits to a softmax normalization layer, i.e. $h_{\theta}(x)[i]=\frac{\exp(f_{\theta}(x)[i])}{\sum_{j=1}^{K+1}\exp(f_{\theta}(x)[j])},$ (2) where $h_{\theta}$ is the combination of the neural network $f_{\theta}$ and the softmax normalization layer. Energy-Based Learning Objective Now the question is how to design a learning objective that allows $h_{\theta}(x)[K+1]$ to encode uncertainty? Our idea here is to associate the score of $h_{\theta}(x)[K+1]$ to the marginal data distribution. Intuitively, when the input comes from within the training data distribution $p(x)$, the model is supposed to be confident in its decision, and therefore, $h_{\theta}(x)[K+1]$ should be low (conversely, $\sum_{i=1}^{K}h_{\theta}(x)[i]$ should be high). If the input deviates from the training data distribution, the model should become uncertain about whether its decision is correct. In this case, $h_{\theta}(x)[K+1]$ should be high to indicate a higher level of uncertainty, which naturally forces $\sum_{i=1}^{K}h_{\theta}(x)[i]$ to stay low (due to the softmax normalization). However, directly training $h_{\theta}(x)[K+1]$ to capture the marginal distribution $p(x)$ (i.e. generative modeling) is difficult [30]. Instead, we propose a novel learning objective with the help of EBMs [25]. First, we define our energy function as $E_{\theta}(x)=\log h_{\theta}(x)[K+1].$ (3) Then, our energy-based objective function is defined as $\min\limits_{\theta}\mathbb{E}_{p(x)}\bigg{[}-\log h_{\theta}(x)[y]\bigg{]}+\lambda\mathbb{E}_{p_{\bar{\theta}}(x)}\bigg{[}-\log h_{\theta}(x)[K+1]\bigg{]},$ (4) where $\lambda>0$ is a hyper-parameter; the first term is the maximum log- likelihood objective for the $K$-way classification task using the ground- truth label $y$; the second term can also be seen as maximum log-likelihood objective—for recognizing data sampled from $p_{\bar{\theta}}(x)$. Note that $p_{\bar{\theta}}(x)$ denotes the model distribution with frozen parameters of $p_{\theta}(x)$ of current iteration ($p_{\bar{\theta}}(x)$ will always be the same as $p_{\theta}(x)$ but without the gradient calculation of $\theta$ since parameter $\theta$ is frozen here and $\bar{\theta}$ should be regarded as a constant in each updates). We will show later in Sec. 3.3 that optimizing Eq. (4) can actually lead the summation of rest $K$ softmax scores of original classes to be directly proportional to the marginal density $p(x)$, which in turn can make the $K+1$-th softmax score be negatively correlated to $p(x)$. SGLD-Based Optimization We approximate the expectation in the second term in Eq. (4) using a sampler based on Stochastic Gradient Langevin Dynamics (SGLD) [39]. Specifically, the SGLD sampling process follows $z_{t+1}=z_{t}-\frac{\alpha}{2}\frac{\partial E_{\theta}(z_{t})}{\partial z_{t}}+\sqrt{\alpha}\epsilon,\quad\epsilon\sim\mathcal{N}(0,I),$ (5) where $t$ denotes the SGLD iteration, $\alpha$ the step-size, and $\epsilon$ a random noise sampled from a normal distribution. In practice, $\alpha$ is usually fixed as a constant. Most SGLD-based methods draw samples from the image space. This forces the information to flow through the entire neural network, which is computationally expensive. Inspired by [4], we choose to draw samples from the latent space (see Figure 2). Therefore, $z$ in Eq. (5) represents features rather than an image. Such a design significantly accelerates the training since the information only goes partially through the network model, which allows much deeper architectures such as ResNet-101 [15] to fit into limited resources. Moreover, the latent space is typically smoother than the image space [3], which facilitates the estimate of gradients. ### 3.3 Theoretical Insight In order to prove that our objective can force $h_{\theta}(x)[K+1]$ to be negatively correlated with $p(x)$, i.e. representing uncertainty, we tend to show that in theory, optimizing our objective in Eq. (4) is equivalent to minimize the KL divergence between $p(x)$ and another EBM-modeled distribution $q_{\theta}(x)$222It is worth noting that this $q_{\theta}(x)$ is not the modeled EBMs $p_{\theta}(x)$ in Sec. 3.2., where $q_{\theta}(x)$ is defined by energy function $E^{\prime}_{\theta}(x)=-\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i].$ (6) To this end, we introduce an extra objective $\min\limits_{\theta}\mathbb{E}_{p(x)}\bigg{[}-\log h_{\theta}(x)[y]\bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\bigg{]},$ (7) Similar to Eq. (4), here $\bar{\theta}$ means the parameters are frozen. We will show that optimizing Eq. (4) essentially optimize Eq. (7) and optimizing Eq. (7) is an equivalent of $\min D_{KL}(p(x)||q_{\theta}(x))$ in following Proposition 1 and Theorem 1, respectively. ###### Proposition 1. Given two EBMs $p_{\bar{\theta}}(x)$ and $q_{\bar{\theta}}(x)$ with energy functions defined in Eqs. (3) and (6) respectively, the optimization of Eq. (4) is actually equivalent to optimize a combination of one $K$-way classification objective and Eq. (7) with some suitable coefficient $\mu$. ###### Proof. Since the first optimization term in Eq. (7) is identical with Eq. (4) as well as the objective of maximum log-likelihood of $K$-way classification problems, we only need to consider the second terms in both equations and prove that they are equivalent to each other. Specifically, for the gradient of the second term of Eq. (7), we have333The equality between Eqs. (9) and (10) holds because $q_{\bar{\theta}}(x)=q_{\theta}(x)=\frac{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{Z^{\prime}(\theta)}$ and $\frac{\partial}{\partial\theta}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]=\frac{\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}$. $\displaystyle\frac{\partial}{\partial\theta}\ \mathbb{E}_{q_{\bar{\theta}}(x)}\Big{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Big{]}$ (8) $\displaystyle=\ $ $\displaystyle\int_{x}q_{\bar{\theta}}(x)\frac{\partial}{\partial\theta}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$ (9) $\displaystyle=\ $ $\displaystyle\int_{x}\frac{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{Z^{\prime}(\theta)}\cdot\frac{\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}{\sum\limits_{i=1}^{K}h_{\theta}(x)[i]}$ (10) $\displaystyle=\ $ $\displaystyle\frac{1}{Z^{\prime}(\theta)}\int_{x}\frac{\partial}{\partial\theta}\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$ (11) $\displaystyle=\ $ $\displaystyle-\frac{1}{Z^{\prime}(\theta)}\int_{x}\frac{\partial}{\partial\theta}h_{\theta}(x)[K+1]$ (12) $\displaystyle=\ $ $\displaystyle-\frac{Z(\theta)}{Z^{\prime}(\theta)}\int_{x}\frac{h_{\theta}(x)[K+1]}{Z(\theta)}\cdot\frac{\frac{\partial}{\partial\theta}h_{\theta}(x)[K+1]}{h_{\theta}(x)[K+1]}$ (13) $\displaystyle=\ $ $\displaystyle-\frac{Z(\theta)}{Z^{\prime}(\theta)}\int_{x}p_{\bar{\theta}}(x)\frac{\partial}{\partial\theta}\log h_{\theta}(x)[K+1],$ (14) where $Z^{\prime}(\theta)$ and $Z(\theta)$ represents the partition functions of $q_{\theta}(x)$ and $p_{\theta}(x)$ respectively. If we use $\mu$ to denote $\frac{Z(\theta)}{Z^{\prime}(\theta)}$, we can restate the Eq. (14) as $\mu\frac{\partial}{\partial\theta}\mathbb{E}_{p_{\bar{\theta}}(x)}\bigg{[}-\log h_{\theta}(x)[K+1]\bigg{]},$ which is exactly the gradient of Eq. (4)’s second term. As a result, the objective of Eq. (4) and of Eq. (7) are same under a suitable coefficient $\mu$ in each iteration. Further more, remembering that the first term of Eq. (4) is an equivalent of the objective of maximum log-likelihood of $K$-way classification problems, we consequently conclude that optimizing our objective of Eq. (4) essentially optimize Eq. (7) and a $K$-way classification objective. ∎ According to Proposition 1, we know that our learning objective of Eq. (4) can optimize the discriminative $K$-way classification objective and the generative modeling objective in a unified discriminative objective, which has never been explored in existing confidence calibration work. Moreover, if we can further prove that optimizing Eq. (7) is de facto an equivalent of minimizing the KL-divergence between $p(x)$ and the distribution $q_{\theta}(x)$, then our objective of Eq. (4) could minimize this KL- divergence either due to Proposition 1. To prove that, we need to recur to Lemma 1 based on [21], which shows how to efficiently compute the gradient of the KL divergence between the real distribution and an approximated distribution modeled via EBMs. ###### Lemma 1. Given a training dataset with data $\\{x\\}$ sampled from distribution $r(x)$, and an energy model distribution $r_{\phi}(x)$ parameterized by $\phi$ and associated to an energy function $E_{\phi}(x)$, the objective of minimizing $D_{KL}(r(x)||r_{\phi}(x))$ can be optimized by descending the following gradient w.r.t $\phi$, $\mathop{\mathbb{E}}\limits_{x^{+}\sim r(x)}\Bigg{[}\frac{\partial E_{\phi}(x^{+})}{\partial\phi}\Bigg{]}-\mathop{\mathbb{E}}\limits_{x^{-}\sim r_{\phi}(x)}\Bigg{[}\frac{\partial E_{\phi}(x^{-})}{\partial\phi}\Bigg{]}.$ (15) The proof can refer [21]. By descending the gradient in Eq. (15), the first term decreases the energy of samples $x^{+}$ drawn from the data distribution, while the second term increases the energy of samples $x^{-}$ drawn from the energy model distribution. Based on Lemma 1, we can introduce following theorem followed by a proof. ###### Theorem 1. Let $p(x)$ denote the training data distribution, and $q_{\theta}(x)$ the energy model distribution represented by the energy function $E^{\prime}_{\theta}(x)$ defined in Eq. (6), we can achieve minimization of $D_{KL}(p(x)||q_{\theta}(x))$ by optimizing Eq. (7). ###### Proof. According to Lemma 1, the KL divergence between $p(x)$ and $q_{\theta}(x)$ can be optimized by descending the gradient in Eq. (15). We can replace the need of computing expectation over the parameterized density $q_{\theta}(x)$ in Eq. (15) by fixing the parameters $\theta$, denoted by $q_{\bar{\theta}}(x)$ 444only the numerical value of Eq. (15) matters in optimization process.. As such, Eq. (15) is converted to $\mathbb{E}_{p(x)}\Bigg{[}\frac{\partial E^{\prime}_{\theta}(x)}{\partial\theta}\Bigg{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\frac{\partial E^{\prime}_{\theta}(x)}{\partial\theta}\Bigg{]}.$ (16) Now we can optimize $D_{KL}(p(x)||q_{\theta}(x))$ via an objective $\mathbb{E}_{p(x)}\Big{[}E^{\prime}_{\theta}(x)\Big{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Big{[}E^{\prime}_{\theta}(x)\Big{]}$ which holds a numerically same gradient with regard to $\theta$ as Eqs. (16) and (15). Then we have555the inequality holds because of the fact $\forall y\leq K,\ \ \sum\limits_{i=1}^{K}h_{\theta}(x)[i]\geq h_{\theta}(x)[y].$ $\displaystyle\mathbb{E}_{p(x)}\Bigg{[}E^{\prime}_{\theta}(x)\Bigg{]}-\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}E^{\prime}_{\theta}(x)\Bigg{]}$ (17) $\displaystyle=$ $\displaystyle\mathbb{E}_{p(x)}\Bigg{[}-\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}$ $\displaystyle\leq$ $\displaystyle\mathbb{E}_{p(x)}\Bigg{[}-\log h_{\theta}(x)[y]\Bigg{]}+\mathbb{E}_{q_{\bar{\theta}}(x)}\Bigg{[}\log\sum\limits_{i=1}^{K}h_{\theta}(x)[i]\Bigg{]}.$ Therefore, Eq. (7) is an upper bound of an equivalent variant of the KL- divergence between $p(x)$ and $q_{\theta}(x)$. ∎ Combing Proposition 1 and Theorem 1, we can conclude that our objective of Eq. (4) can minimize $D_{KL}(p(x)||q_{\theta}(x))$. Therefore, once our objective converged, we obtain $p(x)\simeq q_{\theta}(x)=\frac{\exp(-E^{\prime}_{\theta}(x))}{Z^{\prime}(\theta)}\propto\sum\limits_{i=1}^{K}h_{\theta}(x)[i]$, which result in the summation of $K$ softmax scores of original classes to be directly proportional to the marginal density $p(x)$ and in turn make the $K+1$-th softmax score be negatively correlated to $p(x)$. Table 1: Comparison between our approach EOW-Softmax and nine baselines on four benchmark datasets. It is clear that our approach generally leads to a better calibrated model than the baselines (lower ECE & NLL), while maintaining the accuracy. $\uparrow$: the higher the better. $\downarrow$: the lower the better. Method | MNIST (MLP) | CIFAR10 (VGG11) | CIFAR100 (ResNet50) | Tiny-ImageNet (ResNet50) ---|---|---|---|--- Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ | Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ Vanilla Training | 98.32 | 1.73 | 0.29 | 90.48 | 6.30 | 0.43 | 71.57 | 19.1 | 1.58 | 46.71 | 25.2 | 2.95 TrustScore [20] | 98.32 | 2.14 | 0.26 | 90.48 | 5.30 | 0.40 | 71.57 | 10.9 | 1.43 | 46.71 | 19.2 | 2.75 MC-Dropout [7] | 98.32 | 1.71 | 0.34 | 90.48 | 3.90 | 0.47 | 71.57 | 9.70 | 1.48 | 46.72 | 17.4 | 3.17 Label Smoothing [36] | 98.77 | 1.68 | 0.30 | 90.71 | 2.70 | 0.38 | 71.92 | 3.30 | 1.39 | 47.19 | 5.60 | 2.93 Mixup [37] | 98.83 | 1.74 | 0.24 | 90.59 | 3.30 | 0.37 | 71.85 | 2.90 | 1.44 | 46.89 | 6.80 | 2.66 JEM [12] | 97.23 | 1.56 | 0.21 | 90.36 | 3.30 | 0.34 | 70.28 | 2.46 | 1.31 | 45.97 | 5.42 | 2.47 OvA DM [34] | 96.67 | 1.78 | 0.27 | 89.56 | 3.55 | 0.37 | 70.11 | 3.58 | 1.40 | 45.55 | 4.22 | 2.50 Temperature Scaling [14] | 95.14 | 1.32 | 0.17 | 89.83 | 3.10 | 0.33 | 69.84 | 2.50 | 1.23 | 45.03 | 4.80 | 2.59 DBLE [40] | 98.69 | 0.97 | 0.12 | 90.92 | 1.50 | 0.29 | 71.03 | 1.10 | 1.09 | 46.45 | 3.60 | 2.38 EOW-Softmax (_ours_) | 98.91 | 0.88 | 0.15 | 90.24 | 1.57 | 0.25 | 71.33 | 1.08 | 1.03 | 46.97 | 3.45 | 2.22 Figure 3: Results on CIFAR-100-C. Each bar represents the mean ECE on 19 different corruptions, with the vertical line segment denoting the standard deviation. In general, EOW-Softmax achieves the lowest ECE under five different corruption levels. ## 4 Experiments ### 4.1 Experimental Setup Settings We adopt three settings to evaluate our approach. 1) _Confidence Calibration_ : This aims to evaluate the effectiveness of a method in improving confidence calibration. Following [40], we use four datasets: MNIST [24] (MLP), CIFAR-10 [22] (VGG11 [35]), CIFAR-100 [22] (ResNet50 [15]), and Tiny-ImageNet [5] (ResNet50). Network architectures used for these datasets are indicated in the parentheses. 2) _OOD Detection_ : A ResNet50 classifier is trained on CIFAR-100 and tested on the combination of CIFAR-100’s test split and an OOD dataset, i.e. CIFAR-10 and SVHN [31]. The goal for the classifier is to assign low confidence to as many OOD samples as possible. The accuracy is computed on predictions with confidence higher than a threshold. 3) _Robustness under Corruption_ : A classifier is trained on CIFAR-100. Its calibration performance is evaluated on CIFAR-100-C [17], where the images are perturbed by 19 different corruptions with five intensity levels. Baselines We compare our approach with nine baseline methods: MC-Dropout [7], Temperature Scaling [14], Mixup [37], Label Smoothing [36], TrustScore [20], JEM [12], DBLE [40], and OvA DM [34]. Evaluation Metrics Following prior work [14], we use two metrics to assess how well the confidence in a model’s predictions is calibrated, namely Expected Calibration Error (ECE) [29] and Negative Log-Likelihood (NLL). The lower the ECE/NLL, the better the calibration performance. Below we explain in detail how these two metrics are calculated. ECE approximates the expectation of the difference between accuracy and confidence (i.e. the likelihood on the predicted label $\hat{y}$), which can reflect how well the prediction confidence aligns with the true accuracy. Specifically, the confidence estimates made on all test samples are partitioned into $L$ equally spaced bins (following [14, 40, 34], $L=15$), and the difference between the average confidence and accuracy within each bin $I_{l}$ is calculated, $\displaystyle\text{ECE}=\sum\limits_{l=1}^{L}\frac{1}{N}|\sum\limits_{x\in I_{l}}p(\hat{y}|x)-\sum\limits_{x\in I_{l}}1(\hat{y}=y)|,$ (18) where $N$ denotes the total number of samples in the test set. NLL computes the average negative log-likelihood on all test samples, $\displaystyle\text{NLL}=-\frac{1}{N}\sum\limits_{m=1}^{N}\log p(\hat{y}_{m}|x_{m}).$ (19) Implementation Details We use the SGD optimizer with the learning rate of 1e-4, the momentum of 0.9, and the weight decay of 5e-4. The batch size is set to 64. The number of epochs is 200. The learning rate is decayed by 0.1 at the 100-th and 150-th epoch, respectively. For SGLD, we use a constant step size of 2 and a standard deviation of 1e-3 (see Eq (5)). The number of updates in each SGLD round is set to 100. To ensure that the results are convincing, we run each experiment 5 times with different random seeds and average their results. ### 4.2 Main Results Confidence Calibration We first evaluate the calibration performance on four standard datasets, namely MNIST, CIFAR-10/100 and Tiny-ImageNet. The results are shown in Table 1. In general, our approach EOW-Softmax obtains the best overall calibration performance on most datasets. Comparing with Vanilla Training, we observe that our EOW-Softmax achieves a similar test accuracy, while significantly improves the calibration performance in terms of ECE, especially on the three challenging datasets with natural images—6.30%$\to$1.57% on CIFAR-10, 19.1%$\to$1.08% on CIFAR-100, and 25.2%$\to$3.45% on Tiny-ImageNet. These results strongly suggest that our energy-based open-world uncertainty modeling has great potential for real- world applications as it shows a good balance between test accuracy and calibration performance. JEM and OvA DM are two related methods to ours. JEM is based on joint distribution modeling while OvA DM transforms the conventional softmax classifier to a distance-based one-vs-all classifier. The comparison with these two methods shows that our approach is clearly better in all metrics, which advocates our design of the $K$+1-way softmax for modeling open-world uncertainty. Compared with the top-performing baselines, i.e. Temperature Scaling and DBLE, our EOW-Softmax is highly competitive—it obtains the best ECE on all datasets except CIFAR-10 where the performance is only slightly worse than DBLE. Among these three methods, EOW-Softmax performs the best in maintaining the original test accuracy, whereas Temperature Scaling has to sacrifice the test accuracy in exchange for improvement on ECE. This is because for fair comparison (all methods only have access to the training set), Temperature Scaling has to separate a validation set out from the original training set for tuning its scaling parameter, which reduces the amount of training data. Table 2: Test accuracy on the combination of in-distribution and OOD test set using ResNet50 trained on CIFAR-100. OOD dataset | Method | Probability threshold ---|---|--- 0 | .25 | .5 | .75 CIFAR10 | Vanilla Training | 37.24 | 42.31 | 47.67 | 58.90 JEM [12] | 42.55 | 46.88 | 0.53 | 63.21 OvA DM [34] | 39.78 | 48.54 | 54.31 | 65.20 EOW-Softmax | 37.65 | 50.11 | 57.32 | 69.00 SVHN | Vanilla Training | 20.24 | 21.33 | 24.38 | 26.90 JEM [12] | 19.87 | 22.57 | 26.22 | 30.75 OvA DM [34] | 20.08 | 23.99 | 26.08 | 30.32 EOW-Softmax | 20.21 | 25.58 | 28.13 | 32.68 OOD Detection We follow [34] to simulate real-world scenarios by training a classifier on CIFAR-100 and testing on the combination of CIFAR-100’s test set and an OOD dataset (CIFAR-10/SVHN). The classifier is required to assign low confidence to OOD samples such that their predictions can be rejected by a pre-defined threshold. The results are reported in Table 2 where we compare our approach with JEM and OvA DM (as these two methods are most related to ours), as well as the vanilla training method. The probability threshold is linearly increased from 0 to 0.75. Only predictions with confidence higher than this threshold are kept. From the results, we observe that EOW-Softmax outperforms all baselines with clear margins in different thresholds (except 0). This indicates that a classifier trained with EOW-Softmax suffers much less from the overconfidence problem than the competitors, and is thus safer to be deployed in practical applications. Robustness under Corruption We also evaluate our approach on corrupted images, i.e. CIFAR-100-C, and compare with JEM and OVA DM. Specifically, there are five different intensities of corruption as defined in [17], each with 19 different corruption types. Under each intensity level of corruption, we test a model’s ECE on images of all corruption types, and report their average result and the standard deviation. The comparison is illustrated in Figure 3. Overall, EOW-Softmax performs favorably against JEM and OVA DM, as well as the vanilla training baseline. Though both EOW-Softmax and JEM are based on energy models for generative modeling, JEM clearly has a larger variation in performance among different corruption types. This is because JEM is more difficult to train—it optimizes the log-likelihood of distribution independently from the classifier learning. In contrast, the ‘generative modeling’ in EOW-Softmax is seamlessly integrated into the $K$+1-way classification task, which has a better training stability. ### 4.3 Ablation study Hyper-parameter Recall that $\lambda$ in Eq. (4) balances between the standard $K$-way classification loss and the energy-based loss for uncertainty modeling. We experiment with different values (1, 0.1, and 0.01) on CIFAR-10/100 to see the impact of this hyper-parameter. The results in Table 3 show that $\lambda=0.1$ leads to the best calibration performance (lowest ECE values) on both datasets. Where to Apply the SGLD Sampling? In our approach, SGLD sampling is applied to the latent feature space rather than the pixel space as in most EBMs. To justify this design, we experiment on CIFAR-100 with different variants of our approach where the SGLD sampling is applied to different positions, including the pixel space, stage-1, stage-2, and stage-3 (in the neural network). In addition to the test accuracy and the ECE, we also report the training speed (second per iteration) measured using a Tesla K80 GPU. Table 3 shows that applying the SGLD sampling to the pixel space incurs huge computation overhead, while shifting the sampling to the latent space significantly improves the training speed without sacrificing the calibration performance. Table 3: Ablation study on the impact of $\lambda$ in Eq. (4). Model | $\lambda$ | CIFAR10 ---|---|--- Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ VGG11 | 1 | 89.81 | 2.11 | 0.28 0.1 | 90.24 | 1.57 | 0.25 0.01 | 90.11 | 3.37 | 0.36 Model | $\lambda$ | CIFAR100 Acc% $\uparrow$ | ECE% $\downarrow$ | NLL $\downarrow$ ResNet50 | 1 | 70.26 | 1.33 | 1.24 0.1 | 71.33 | 1.08 | 1.03 0.01 | 71.51 | 2.31 | 1.31 Table 4: Ablation on where to apply the SGLD sampling. Position | Acc% $\uparrow$ | ECE% $\downarrow$ | Second/Iter $\downarrow$ ---|---|---|--- Pixel space | 73.94 | 1.89 | 25.15 Feature stage 1 | 73.21 | 2.09 | 10.31 Feature stage 2 | 73.48 | 1.73 | 5.21 Feature stage 3 | 73.05 | 2.17 | 2.37 ## 5 Conclusion This paper has addressed the closed-world problem in softmax that causes neural network classifiers to produce overconfident predictions by introducing an energy-based objective to model the open-world uncertainty. Acknowledgement. This study is supported by NTU NAP and Microsoft Research Lab Asia, and under the RIE2020 Industry Alignment Fund – Industry Collaboration Projects (IAF-ICP) Funding Initiative, as well as cash and in-kind contribution from the industry partner(s). ## References * [1] Michael Arbel, Liang Zhou, and Arthur Gretton. Generalized energy based models. In ICLR, 2021. * [2] Abhijit Bendale and Terrance E Boult. Towards open set deep networks. In CVPR, 2016. * [3] Yoshua Bengio, Grégoire Mesnil, Yann N. Dauphin, and Salah Rifai. Better mixing via deep representations. CoRR, abs/1207.4404, 2012. * [4] Tong Che, Ruixiang Zhang, Jascha Sohl-Dickstein, Hugo Larochelle, Liam Paull, Yuan Cao, and Yoshua Bengio. Your gan is secretly an energy-based model and you should use discriminator driven latent sampling. arXiv preprint arXiv:2003.06060, 2020. * [5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248–255. Ieee, 2009. * [6] Yilun Du and Igor Mordatch. Implicit generation and modeling with energy based models. In NeurIPS, 2019. * [7] Yarin Gal and Zoubin Ghahramani. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning, pages 1050–1059, 2016. * [8] Ruiqi Gao, Yang Song, Ben Poole, Ying Nian Wu, and Diederik P Kingma. Learning energy-based models by diffusion recovery likelihood. In ICLR, 2021. * [9] Charles J Geyer. Markov chain monte carlo maximum likelihood. 1991\. * [10] Charles J Geyer. Practical markov chain monte carlo. Statistical science, pages 473–483, 1992. * [11] Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial networks. In NeurIPS, 2014. * [12] Will Grathwohl, Kuan-Chieh Wang, Jörn-Henrik Jacobsen, David Duvenaud, Mohammad Norouzi, and Kevin Swersky. Your classifier is secretly an energy based model and you should treat it like one. arXiv preprint arXiv:1912.03263, 2019. * [13] Will Sussman Grathwohl, Jacob Jin Kelly, Milad Hashemi, Mohammad Norouzi, Kevin Swersky, and David Duvenaud. No {mcmc} for me: Amortized sampling for fast and stable training of energy-based models. In ICLR, 2021. * [14] Chuan Guo, Geoff Pleiss, Yu Sun, and Kilian Q Weinberger. On calibration of modern neural networks. In ICML, 2017. * [15] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016. * [16] Matthias Hein, Maksym Andriushchenko, and Julian Bitterwolf. Why relu networks yield high-confidence predictions far away from the training data and how to mitigate the problem. In CVPR, 2019. * [17] Dan Hendrycks and Thomas Dietterich. Benchmarking neural network robustness to common corruptions and perturbations. Proceedings of the International Conference on Learning Representations, 2019. * [18] Geoffrey E Hinton. Training products of experts by minimizing contrastive divergence. Neural computation, 14(8):1771–1800, 2002. * [19] Yen-Chang Hsu, Yilin Shen, Hongxia Jin, and Zsolt Kira. Generalized odin: Detecting out-of-distribution image without learning from out-of-distribution data. In CVPR, 2020. * [20] Heinrich Jiang, Been Kim, Melody Guan, and Maya Gupta. To trust or not to trust a classifier. In Advances in Neural Information Processing Systems, volume 31, 2018. * [21] Taesup Kim and Yoshua Bengio. Deep directed generative models with energy-based probability estimation. In ICLR-W, 2016. * [22] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009\. * [23] Balaji Lakshminarayanan, Alexander Pritzel, and Charles Blundell. Simple and scalable predictive uncertainty estimation using deep ensembles. In NeurIPS, 2017. * [24] Yann LeCun, Léon Bottou, Yoshua Bengio, Patrick Haffner, et al. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. * [25] Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and F Huang. A tutorial on energy-based learning. Predicting structured data, 1(0), 2006. * [26] Kimin Lee, Honglak Lee, Kibok Lee, and Jinwoo Shin. Training confidence-calibrated classifiers for detecting out-of-distribution samples. In ICLR, 2018. * [27] Shiyu Liang, Yixuan Li, and Rayadurgam Srikant. Enhancing the reliability of out-of-distribution image detection in neural networks. In ICLR, 2018. * [28] Rafael Müller, Simon Kornblith, and Geoffrey Hinton. When does label smoothing help? In NeurIPS, 2019. * [29] Mahdi Pakdaman Naeini, Gregory Cooper, and Milos Hauskrecht. Obtaining well calibrated probabilities using bayesian binning. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 29, 2015. * [30] Eric Nalisnick, Akihiro Matsukawa, Yee Whye Teh, Dilan Gorur, and Balaji Lakshminarayanan. Do deep generative models know what they don’t know? In ICLR, 2019. * [31] Yuval Netzer, Tao Wang, Adam Coates, Alessandro Bissacco, Bo Wu, and Andrew Y Ng. Reading digits in natural images with unsupervised feature learning. In NeurIPS-W, 2011. * [32] Anh Mai Nguyen, Jason Yosinski, and Jeff Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. CoRR, abs/1412.1897, 2014. * [33] Erik Nijkamp, Mitch Hill, Song-Chun Zhu, and Ying Nian Wu. Learning non-convergent non-persistent short-run mcmc toward energy-based model. arXiv preprint arXiv:1904.09770, 2019. * [34] Shreyas Padhy, Zachary Nado, Jie Ren, Jeremiah Liu, Jasper Snoek, and Balaji Lakshminarayanan. Revisiting one-vs-all classifiers for predictive uncertainty and out-of-distribution detection in neural networks. arXiv preprint arXiv:2007.05134, 2020. * [35] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. * [36] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2818–2826, 2016. * [37] Sunil Thulasidasan, Gopinath Chennupati, Jeff Bilmes, Tanmoy Bhattacharya, and Sarah Michalak. On mixup training: Improved calibration and predictive uncertainty for deep neural networks. arXiv preprint arXiv:1905.11001, 2019. * [38] Yoav Wald, Amir Feder, Daniel Greenfeld, and Uri Shalit. On calibration and out-of-domain generalization. arXiv preprint arXiv:2102.10395, 2021. * [39] Max Welling and Yee W Teh. Bayesian learning via stochastic gradient langevin dynamics. In ICML, 2011. * [40] Chen Xing, Sercan Arik, Zizhao Zhang, and Tomas Pfister. Distance-based learning from errors for confidence calibration. In ICLR, 2020. * [41] Junbo Zhao, Michael Mathieu, and Yann LeCun. Energy-based generative adversarial network. In ICLR, 2017. * [42] Kaiyang Zhou, Ziwei Liu, Yu Qiao, Tao Xiang, and Chen Change Loy. Domain generalization in vision: A survey. arXiv preprint arXiv:2103.02503, 2021.
arxiv-papers
2021-07-27T06:52:06
2024-09-04T03:07:20.761913
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yezhen Wang, Bo Li, Tong Che, Kaiyang Zhou, Ziwei Liu, Dongsheng Li", "submitter": "Bo Li", "url": "https://arxiv.org/abs/2107.12628" }
2107.12630
# Low-Complexity Improved-Throughput Generalised Spatial Modulation: Bit-to- Symbol Mapping, Detection and Performance Analysis Jiancheng An, Chao Xu, _Senior Member, IEEE_ , Yusha Liu, Lu Gan, and Lajos Hanzo, _Fellow, IEEE_ This work was supported in part by the China Scholarship Council. The work of L. Hanzo was supported in part by the Engineering and Physical Sciences Research Council projects EP/Noo4558/1, EP/PO34284/1, and COALESCE, in part by the Royal Society’s Global Challenges Research Fund Grant, and in part by the European Research Council’s Advanced Fellow Grant QuantCom.J. An and L. Gan are with the School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China. (E-mail: jiancheng$\\[email protected]; [email protected]).C. Xu, Y. Liu and L. Hanzo are with the School of Electronics and Computer Science, University of Southampton, SO17 1BJ, UK. (E-mail: [email protected]; [email protected]; [email protected]). ###### Abstract Low-complexity improved-throughput generalised spatial modulation (LCIT-GSM) is proposed. More explicitly, in GSM, extra information bits are conveyed implicitly by activating a fixed number $N_{a}$ out of $N_{t}$ transmit antennas (TAs) at a time. As a result, GSM has the advantage of a reduced number of radio-frequency (RF) chains and reduced inter-antenna interference (IAI) at the cost of a lower throughput than its multiplexing-oriented full-RF based counterparts. Variable-${N_{a}}$ GSM mitigates this throughput reduction by incorporating all possible TA activation patterns associated with a variable value $N_{a}$ ranging from $1$ to $N_{t}$ during a single channel- use, which maximises the throughput of GSM but suffers a high complexity of the mapping book design and demodulation. In order to mitigate the complexity, _first of all_ , we propose two efficient schemes for mapping the information bits to the TA activation patterns, which can be readily scaled to massive MIMO setups. _Secondly_ , in the absence of IAI, we derive a pair of low- complexity near-optimal detectors, one of them has a reduced search scope, while the other benefits from a decoupled single-stream based signal detection algorithm. _Finally_ , the performance of the proposed LCIT-GSM system is characterised by the error probability upper bound (UB). Our Monte Carlo based simulation results confirm the improved error performance of our proposed scheme, despite its reduced signal detection complexity. ###### Index Terms: Generalised spatial modulation, low-complexity improved-throughput generalised spatial modulation, maximum likelihood detection, bitwise spatial mapping, MIMO, antenna selection. ## I Introduction Spatial modulation (SM), constitutes a promising technique for the next- generation multiple-input multiple-output (MIMO) system, which has attracted substantial research interests [1, 2, 3]. The SM scheme strikes a flexible trade-off between conventional MIMO techniques including Alamouti’s space-time block code (STBC), and vertical Bell Laboratories layered space-time (V-BLAST) system [4, 5, 6], which aim for retaining a diversity gain and a multiplexing gain, respectively. More explicitly, for the SM scheme, the indices of the transmit antenna (TA) are exploited as an extra dimension for transmitting information besides the conventional amplitude-phase shift keying (APSK) such as phase-shift keying (PSK) and quadrature amplitude modulation (QAM) [7, 3, 8]. Owing to the fact that only a single TA is activated in SM-MIMO at any time instant, the inter-channel interference (ICI) and the inter-antenna interference (IAI) of conventional MIMO techniques are mitigated, which results in the simplified transceiver design and a reduced signal detection complexity [2, 3]. Specifically, the MIMO power consumption is effectively reduced by the SM philosophy, where only a single power amplifier is required [9, 10, 11]. As a further advance, the SM scheme can be flexibly configured for challenging communication scenarios, such as that of the downlink MIMO systems having a rank-deficient channel matrix [8]. Inspired by the aforementioned advantages, the space shift keying (SSK) concept was introduced in [12, 13] as a low-complexity implementation of SM, where only the TA indices convey information. As a further advance, the principle of SM has also been extended to the time domain, resulting in the space-time shift keying (STSK) [14, 15, 16, 17], to the frequency domain yielding the space-frequency shift keying (SFSK) [18] and to the time- frequency domain creating the space-time-frequency shift keying (STFSK) [19, 20] to exploit all three degrees of freedom. As a result, the generalised concept of index modulation (IM), has gained widespread interest in both academia and industry [21, 22, 23, 24]. Furthermore, in [25, 26] and [27], the IM philosophy was also extended to indoor optical wireless communication and molecular communication, where visible light and molecules are the medium of information transmission, respectively. Besides, both the analytical studies, numerical simulations, as well as real-world experiments have verified that SM-MIMOs have the inherent potential of outperforming many state-of-art MIMO schemes, provided that a sufficiently high number of TAs is available at the transmitter [28, 29]. TABLE I: The contribution of the proposed LCIT-GSM scheme compared with other GSM schemes. Contributions | LCIT-GSM | [30] | [31] | [32] | [33] | [34] | [35] | [27] | [36] | [37] | [38] ---|---|---|---|---|---|---|---|---|---|---|--- Flexibility in the number of TAs | ✓ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ Multiple active TAs | ✓ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ Multiple streams∗ | $\times$ | ✓ | $\times$ | ✓ | ✓ | ✓ | ✓ | $\times$ | $\times$ | ✓ | $\times$ Variable number of active TAs | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | ✓ | $\times$ | ✓ Bitwise spatial mapping | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | $\times$ | $\times$ | $\times$ Joint spatial and classic symbol alphabet | ✓ | ✓ | ✓ | $\times$ | ✓ | $\times$ | ✓ | $\times$ | $\times$ | ✓ | $\times$ Low-complexity detectors | ✓ | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | ✓ | $\times$ Improved upper bound | ✓ | $\times$ | ✓ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ | $\times$ * • [30]-2018: Single-RF and twin-RF SM for an arbitrary number of TAs; * • [31]-2016: Joint spatial and classic symbol alphabet for SM; * • [32]-2017: GSM aided mm-wave MIMO; * • [33]-2016: Diagonal precoding aided GSM; * • [34]-2019: Generalized quadrature spatial modulation; * • [35]-2019: Generic signal shaping methods for the multiple-stream GSM; * • [27]-2015: Depleted molecule shift keying; * • [36]-2015: Variable active antenna SM; * • [37]-2012: GSM with multiple active TAs; * • [38]-2017: Variable-$N_{a}$ GSM. ∗The LCIT-GSM scheme considered in this paper is a single-stream GSM scheme that improves the throughput by using more TA activation patterns in the spatial domain while inherits the advantage of IAI-free. We note that the LCIT-GSM scheme can also be combined with V-BLAST to improve throughput to a greater extent, which, however, results in a variable-length code with serious error propagation. In order to improve the throughput of single-RF SM and SSK schemes, generalised spatial modulation (GSM) was proposed in [39, 40], which activates several TAs simultaneously. Furthermore, conventional full-RF diversity- and multiplexing-oriented MIMO schemes have been combined with GSM [41, 37, 42, 43]. Specifically, in [41], the space-time block coding-spatial modulation (STBC-SM) concept was proposed, where GSM was combined with STBC in order to achieve a beneficial diversity gain at the cost of using a reduced number of RF chains. Similarly, a novel multiplexing-oriented GSM scheme was proposed in [37, 42, 43] that combines V-BLAST and GSM, where multiple TAs are activated simultaneously in order to transmit independently modulated symbols. This scheme imposed a reduced IAI compared to the full-RF V-BLAST scheme. Recently, a new transmission scheme termed as generalised quadrature spatial modulation (GQSM) was proposed in [34], which extends the GSM constellation to the in- phase and quadrature dimensions [44]. The QSM mapping of [44] has then been further improved in [45, 46, 47, 48] by increasing the system’s throughput and/or reducing the bit error probability (BEP). However, all the aforementioned GSM schemes – including the STBC-SM, SM+V-BLAST and GQSM – always employ a fixed number $N_{a}$ of TAs, which inevitably results in the well-known throughput limitation of the family of GSM schemes. In order to eliminate this throughput limitation, the variable-$N_{a}$ GSM (VGSM) concept was proposed for increasing the spatial constellation size by employing a variable number $N_{a}$ of activated TAs [36, 49, 50]. Figure 1: “Spider diagram" comparing several space-time transmission schemes. The hierarchy structure models ordered MIMO schemes in each category. From the outer to the inner, the gain of the corresponding term becomes smaller for a selected direction. Taking the throughput as an example, V-BLAST has the highest throughput, followed by GSM+V-BLAST, GSM, GSM+STBC, SM and STBC. Against this background, we propose a low-complexity improved-throughput generalised spatial modulation (LCIT-GSM) scheme, which is inspired by the novel bit-to-symbol mapping scheme of [27] in the context of molecular communication. In order to reflect on these issues, first of all, the trade- offs between the aforementioned state-of-the-art MIMO schemes are visualised by the spider diagram of Fig. 1. The rationale of Fig. 1 is that considering the throughput as an example, V-BLAST achieves the highest throughput, followed by GSM+V-BLAST, GSM, GSM+STBC and STBC. Therefore, there are five rings in Fig. 1, which represent the ordered position of the five main MIMO families in each category. As summarised in Fig. 1, owing to its fixed number of activated TAs, the GSM schemes generally suffer from a throughput loss. Furthermore, the features of the new LCIT-GSM scheme using the improved bitwise spatial mapping design of [27] are compared to the existing GSM schemes in Table I, where the specific terminologies of the systems referenced are listed below Table I for the readers’ convenience. More explicitly, the contributions of the paper are as follows: Figure 2: Schematic of the LCIT-GSM system model, where the number of activated TAs is a variable that carries source information. * • First of all, a LCIT-GSM scheme is proposed for improving the throughput by activating a variable number $N_{a}$ of activated TAs, while reducing the complexity of the mapping design. More specifically, we introduce three spatial mapping arrangements that incorporate all the legitimate TA activation patterns. The first two of them are motivated by the so-called depleted molecule shift keying (MoSK) scheme of [27]. In order to accommodate the special case of all-zeros in the bitstream that may result in no TA being activated and hence no modulated symbols being transmitted, we conceive specifically designed mapping arrangements for both SM and the classic APSK modulation. This is in contrast to the MoSK regime of [27], where the all-zero state of the nano-transmitter is directly exploited to convey information bits in the context of SSK-based molecular communication. Furthermore, a look-up table (LUT) based spatial mapping scheme similar to [36, 49] is also included in order to demonstrate the advantages of the proposed low-complexity detectors. * • Secondly, in the absence of IAI in the LCIT-GSM mapping, we propose a pair of low-complexity detectors based on the classical maximum likelihood detector (MLD). Explicitly, a two-step near-maximum likelihood detector (TMLD) is derived, which substantially reduces the size of the legitimate set to be searched. Furthermore, a decoupling based maximum likelihood detector (DMLD) is conceived for decoupling a two-dimensional joint search into a pair of one- dimensional single-stream based searches, while maintaining the optimal detection performance. * • Thirdly, based on the prior work of _Haas et al._ [51], we derive a tighter performance upper bound (UB) for the proposed LCIT-GSM system. Explicitly, the improved performance bound is composed of three parts, which respectively reflect the impacts of the LCIT-GSM scheme’s signal constellation diagram, spatial constellation diagram and their interactions. Finally, our Monte Carlo based simulation results confirm the improved spectral efficiency (SE), reduced signal detection complexity and the improved BEP performance of our proposed LCIT-GSM scheme compared to conventional GSM scheme [39] and VGSM scheme [36, 49]. The rest of this paper is structured as follows. Section II presents the improved LCIT-GSM system model and spatial mapping schemes. Following this, our detection algorithms are conceived in Section III. Section IV analyses the theoretical BEP and computational complexity of the LCIT-GSM system, while the BEP performance of our LCIT-GSM systems is presented in Section V. Finally, our conclusions are offered in Section VI. _Notation:_ We use upper (lower) bold face letters to indicate matrices (column vectors). ${\left(\cdot\right)^{T}}$, ${\left(\cdot\right)^{H}}$ and ${\left(\cdot\right)^{*}}$ represent the transpose, Hermitian transpose and conjugate, respectively. $E\left\\{\cdot\right\\}$ stands for the expected value. $\left\|\cdot\right\|$ is the Frobenius norm of a complex vector. $\otimes$ represents the Kronecker product. We denote the $N\times N$ identity matrix as ${{\bf{I}}_{N}}$. ${\bf{0}}$ and ${\bf{1}}$ denote an all-zero vector and an all-one vector, respectively, with appropriate dimensions. Furthermore, $\left\lfloor\cdot\right\rfloor$ and $\left\lfloor\cdot\right\rceil$ represent the floor and rounding operation, respectively. The $\log\left(\cdot\right)$ functions are base-2 by default. $C_{n}^{k}$ denotes the number of combinations of taking $k$ out of $n$. ${{\mathcal{M}}_{\gamma}}\left(t\right)=E\left\\{{\exp\left({-\gamma t}\right)}\right\\}$ is the moment generating function (MGF) of the random variable $\gamma$. $Q\left(x\right)=\frac{1}{\sqrt{2\pi}}{\int}_{x}^{+\infty}exp\left(\frac{-{t}^{2}}{2}\right)dt$ is the Q-function. $\angle\left(z\right)$ denotes the phase angle of a complex number $z$. $\Re\left(z\right)$ and $\Im\left(z\right)$ denote the real and imaginary part of a complex number $z$, respectively. ## II System Model ### II-A LCIT-GSM Transmission The LCIT-GSM system model is depicted in Fig. 2. The incoming data bits are first grouped into $m={m_{s}}+{m_{a}}$ bits. Following this, the grouped block of bits ${{\bf{b}}^{T}}$ is split into $m_{s}$ spatial bits ${\bf{b}}_{s}^{T}$ and $m_{a}$ APSK modulated symbol bits ${\bf{b}}_{a}^{T}$, i.e., ${{\bf{b}}^{T}}=\left[{\left.{{\bf{b}}_{s}^{T}}\right|{\bf{b}}_{a}^{T}}\right]$. The first $m_{s}$ spatial bits are assigned to select the TA activation pattern following the spatial mapping procedures, which will be detailed in Section II-B. We note that only a reduced number of TAs are activated at any time. The remaining $m_{a}$ bits are modulated using APSK, such as $M$-PSK or $M$-QAM, where the modulation order is given by $M={2^{{m_{a}}}}$. In contrast to the classic GSM, which activates a fixed number of TAs at each slot, the number of activated TAs in the LCIT-GSM scheme is variable [36, 49]. This constitutes the most distinguished benefit of the LCIT-GSM design, where the maximum throughput is pursued by utilizing all legitimate TA activation patterns. The total number $N_{m}$ of all legitimate TA activation patterns is given by: ${N_{m}}=\mathop{C_{{N_{t}}}^{0}}\limits_{----}+C_{{N_{t}}}^{1}+C_{{N_{t}}}^{2}+\cdots+C_{{N_{t}}}^{{N_{t}}}=2^{N_{t}},$ (1) where the underlined $C_{{N_{t}}}^{0}$ corresponds to the spatial bit sequence having all zeros. Figure 3: The number $m_{s}$ of spatial bits versus the number $N_{t}$ of TAs for SM, GSM, and LCIT-GSM, where we have a fixed number ${N_{a}}=2$ of activated TAs for GSM. However, it should be noted that the spatial bitstream with all zeros in LCIT- GSM, i.e., ${\bf{b}}_{s}^{T}={\bf{0}}$ cannot transmit an APSK symbol carrying $m_{a}$ bits, hence it must be avoided. This problem will be addressed in Section II-B. If the case corresponding to ${\bf{b}}_{s}^{T}={\bf{0}}$ is eliminated, only $\left({{N_{m}}-1}\right)$ TA activation patterns remain legitimate. Bearing in mind that the number of TA activation patterns that convey $m_{s}$ source bits must be a power of two, the maximum value of ${m_{s}}$ becomes111We note that $m_{s}$ is increased beyond the limit of (2) by the first of our spatial mapping schemes proposed in Section II-B, namely in DTAA-R, where we have $m_{s}=\log\left(2^{N_{t}}\right)=N_{t}$. The absence of the all-zero activation pattern is compensated by the transformation of the signal constellation, which ensures maintaining the maximum transmission rate combined with the low complexity of the direct bit-to-antenna mapping scheme. In this subsection, we assume that $\left({{N_{t}}-1}\right)$ spatial bits are conveyed. ${m_{s}}=\left\lfloor{\log\left({{N_{m}}-1}\right)}\right\rfloor=\left\lfloor{\log\left({2^{N_{t}}-1}\right)}\right\rfloor={N_{t}}-1.$ (2) In summary, the total number of source bits conveyed by the LCIT-GSM design is given by $m={m_{a}}+{m_{s}}=\log M+{N_{t}}-1,$ (3) which is evidently higher than that of GSM given by $\log M+\left\lfloor\log C_{{N_{t}}}^{{N_{a}}}\right\rfloor$, where $N_{a}$ is the number of RF chains. Fig. 3 compares the number $m_{s}$ of spatial bits versus the number $N_{t}$ of TAs, for using GSM and LCIT-GSM, where the case of SM is portrayed as a special case of GSM associated with ${N_{a}}=1$. It can be seen that when $m_{s}=4$ spatial bits are transmitted, $N_{t}=4$ is needed for LCIT-GSM. For the same throughput, the GSM scheme would require an increased value of $N_{t}=6$, while the SM scheme requires a further increased value of $N_{t}=16$, as demonstrated by Fig. 3. _Remark 1:_ We note that, first of all, the number of spatial bits in LCIT-GSM increases with the number of RF chains. By contrast, in GSM, the number of spatial bits decreases when $N_{a}$ is increased beyond $\left\lfloor\frac{N_{t}}{2}\right\rfloor$ [39]. Although we directly introduce LCIT-GSM as having $N_{t}$ RF chains, hence exhibiting the maximum throughput improvement, it must be mentioned that our system is also eminently suitable for a limited number of RF chains. Secondly, we note that the same APSK symbol is transmitted by all activated TAs in order to retain the IAI- free feature. Finally, similar to the GSM scheme’s combination with STBC and V-BLAST [52, 43], the proposed LCIT-GSM can also be combined with the classic MIMO schemes for the sake of striking further trade-offs between throughput, complexity and diversity, which is left for future work. In the LCIT-GSM system, the transmit signal is modelled by a ${N_{t}}\times 1$ column vector $\bf{x}$, which is transmitted over an ${N_{t}}\times{N_{r}}$ MIMO Rayleigh flat fading wireless channel, ${\bf{H}}=[{{{\bf{h}}_{1}}}\quad{{{\bf{h}}_{2}}}\quad\cdots\quad{{{\bf{h}}_{{N_{t}}}}}]$, where ${{\bf{h}}_{k^{\prime}}}$ is the $k^{\prime}$-th column of $\bf{H}$ that represents the channel vector of the link spanning from the $k^{\prime}$-th TA to all of $N_{r}$ receive antennas (RAs). The entries of ${\bf{H}}$ are generated by complex independent and identically distributed (i.i.d.) Gaussian random variables having zero-mean and unit-variance. Figure 4: (a) DTAA-R mapping scheme: The $i$-th spatial bit controls the on/off state of the $i$-th TA, where $1\leq i\leq 3$. For the special case of ’000’, all the three TAs are activated, while the $M$-PSK/QAM symbol is rotated according to (7) or (8); (b) DTAA-D mapping scheme: The $i$-th spatial bit controls the on/off state of the $i$-th TA, where $1\leq i\leq 3$. The 4-th TA is only activated when the spatial bitstream of ’000’ is encountered; (c) LUT mapping scheme: The combination book selects the active TAs based on the current spatial bitstream, which uses a mapping design similar to the VGSM of [36, 49]. Finally, the signal ${\bf{y}}$ received at any symbol instant is given by ${\bf{y}}={\bf{Hx}}+{\bf{n}}={{\bf{h}}_{{{\mathcal{S}}_{k}}}}s+{\bf{n}},$ (4) where $s\in M$-APSK is the modulated $M$-PSK/QAM symbol222We note that in the first of the proposed bit-to-symbol mapping schemes detailed in Section II-B, namely in DTAA-R, $s$ represents the rotated PSK/QAM symbol when the all-zero spatial bitstream is encountered., while $\mathcal{S}_{k}$ is the $k$-th TA activation combination associated with $k\in\left\\{{1,2,\cdots,{2^{N_{t}-1}}}\right\\}$. The mapping mechanism of $\left\\{{{\mathcal{S}_{1}},{\mathcal{S}_{2}},\cdots,{\mathcal{S}_{{2^{N_{t}-1}}}}}\right\\}$ will be detailed in Section II-B. Furthermore, the channel vector can be expressed as ${{\bf{h}}_{{\mathcal{S}_{k}}}}=\sum\limits_{k\in{\mathcal{S}_{k}}}{{{\bf{h}}_{k}}},$ (5) which is the summation of all channel vectors corresponding to the $k$-th TA activation patterns. Moreover, ${\bf{n}}$ in (4) is an AWGN vector associated with zero-mean and variance of $\sigma_{n}^{2}$ in each dimension at the receiver. ### II-B LCIT-GSM spatial mapping scheme In this subsection, we will introduce three spatial mapping arrangements for LCIT-GSM systems, which are: _1)_ direct TA activation relying on constellation rotation (DTAA-R), _2)_ direct TA activation relying on a dedicated TA (DTAA-D) and _3)_ LUT-based spatial mapping (LUT). More specifically, DTAA-R and DTAA-D are the improved schemes of the bitwise activation scheme of the MoSK [27], while LUT uses the same mapping design as VGSM of [36, 49], which we include in order to share the low-complexity detectors proposed in Section III. 1) DTAA-R: The motivation of the DTAA-R scheme is to establish a direct mapping between the spatial bits and the TA activation pattern, which does not require a large LUT. The simplest way of implementing this is to assign each spatial bit to independently control the on/off state of the TAs, as portrayed in Fig. 4 (a). Explicitly, the spatial bit-pattern ‘101’ activates the upper- and lower-most TAs and the ‘0’ bit in the fourth position of the box is BPSK- modulated onto both active TAs. The TA in the middle is deactivated. However, as mentioned before, when all spatial bits of $b_{s}$ are zeros, no TAs are activated to transmit the classic $M$-PSK/QAM symbol, which constitutes a challenge in our DTAA-R design. In order to solve this problem, we propose the following revised DTAA-R mapping rule: $\left\\{{\begin{array}[]{*{20}{l}}{{{\bf{b}}_{s}}^{T}\neq{\bf{0}}\Leftrightarrow{\bf{x}}={\bf{b}}_{s}\times s}\\\ {{{\bf{b}}_{s}}^{T}={\bf{0}}\Leftrightarrow{\bf{x}}={\bf{1}}\times T\left(s\right)},\end{array}}\right.$ (6) where ${\bf{1}}$ is a ${N_{t}}\times 1$ column vector of ones. In this way, all TAs are activated, when the spatial bits are all zeros. Moreover, owing to the fact that the TA activation pattern corresponding to $\mathbf{b}_{s}^{T}=\mathbf{0}$ becomes exactly the same as in the case of $\mathbf{b}_{s}^{T}=\mathbf{1}$, we propose to apply a transformation $T\left(\cdot\right)$ to the APSK constellation. More explicitly, for an $M$-PSK symbol, a simple phase rotation is applied to the APSK symbol, when all the TAs are activated for $\mathbf{b}_{s}^{T}=\mathbf{0}$, which can be expressed as: $T_{PSK}\left(s\right)={e^{j\frac{\pi}{M}}}\cdot s.$ (7) TABLE II: LCIT-GSM mapping table for DTAA-R, DTAA-D, LUT, respectively, where $\left({\cdot,\cdot}\right)$ indicates the indices of the active TAs, while $N_{t}=\left\\{3,4\right\\}$, $m_{s}=3$ and $m_{a}=1$ are assumed∗. Input Bits | DTAA-R with ${N_{t}}=3$ | DTAA-D with ${N_{t}}=4$ | LUT with ${N_{t}}=4$ ---|---|---|--- TA Activation Pattern | Symbol | TA Activation Pattern | Symbol | TA Activation Pattern | Symbol 0000 | (1,2,3) | _i_ | (4) | -1 | (1) | -1 0001 | (1,2,3) | _-i_ | (4) | 1 | (1) | 1 0010 | (3) | -1 | (3) | -1 | (2) | -1 0011 | (3) | 1 | (3) | 1 | (2) | 1 0100 | (2) | -1 | (2) | -1 | (3) | -1 0101 | (2) | 1 | (2) | 1 | (3) | 1 0110 | (2,3) | -1 | (2,3) | -1 | (4) | -1 0111 | (2,3) | 1 | (2,3) | 1 | (4) | 1 1000 | (1) | -1 | (1) | -1 | (1,2) | -1 1001 | (1) | 1 | (1) | 1 | (1,2) | 1 1010 | (1,3) | -1 | (1,3) | -1 | (3,4) | -1 1011 | (1,3) | 1 | (1,3) | 1 | (3,4) | 1 1100 | (1,2) | -1 | (1,2) | -1 | (1,3) | -1 1101 | (1,2) | 1 | (1,2) | 1 | (1,3) | 1 1110 | (1,2,3) | -1 | (1,2,3) | -1 | (2,4) | -1 1111 | (1,2,3) | 1 | (1,2,3) | 1 | (2,4) | 1 ∗Although we use a table here to describe the three mapping schemes, it is worth noting that the proposed mapping schemes of DTAA-R and DTAA-D can be readily extended to large-scale antenna arrays, which is challenging for LUT with the same design as [36, 49]. By contrast, when $M$-QAM is employed instead of $M$-PSK, the phase rotation of (7) no longer maximises the distance in the constellation. Instead, we propose the following transformation: ${T_{QAM}}\left(s\right)={e^{j\frac{\pi}{{{M_{n}}}}}}\cdot s,$ (8) where ${M_{n}}=\max\left\\{{count\left({\left|{{s_{i}}}\right|=\left|\chi\right|}\right)}\right\\}$ for $i\in[1,M]$, while $count\left(\cdot\right)$ represents the number of occurrences of the event in parentheses, with $\left|\chi\right|$ representing the set of magnitudes of all QAM constellation points. For example, when the normalised 16QAM constellation is adopted, we have $\left|\chi\right|=\left\\{\frac{1}{\sqrt{5}},1,\frac{3}{\sqrt{5}}\right\\}$, yielding $a_{1}=count\left(\left|s_{i}\right|=\frac{1}{\sqrt{5}}\right)=4$, $a_{2}=count\left(\left|s_{i}\right|=1\right)=8$ and $a_{3}=count\left(\left|s_{i}\right|=\frac{3}{\sqrt{5}}\right)=4$. Therefore, ${M_{n}}=8$ is obtained according to (8). Following the same philosophy, we have ${M_{n}}=12$ for 64QAM. We note that although the special case of the all-zero spatial bitstream is used for activating all TAs, other legitimate TA activation patterns that contain at least one activated TA can also be readily chosen for the special case in (6), provided that the modulated symbol for the chosen pattern is rotated according to (7) and (8). Again, the DTAA-R scheme is exemplified in Fig. 4 (a), where we have ${N_{t}}=3$ TAs and BPSK modulation. More explicitly, let us revisit Fig. 4 (a) a bit more formally, where the first $m_{s}=3$ bits are mapped to the TA activation pattern, while the remaining $m_{a}=1$ bit modulates a BPSK symbol. The full set of TA activation patterns is summarised in Table II. For example, the bit sequence of $\mathbf{b}^{T}=[1\quad 0\quad 1\quad|0]$ results in the TA activation pattern of $\left(1,3\right)$ and the BPSK symbol of $-1$, as seen in Table II, which results in the transmitted signal vector of $\mathbf{x}=[-1\quad 0\quad-1]^{T}$. Moreover, when the special case of the all-zero spatial bitstream is encounted, the bit sequence of $\mathbf{b}^{T}=[0\quad 0\quad 0\quad|1]$ is mapped to the TA activation pattern of $\left(1,2,3\right)$ and to the rotated BPSK symbol $-i$, as shown in Table II, which leads to the transmitted signal vector of $\mathbf{x}=[-i\quad-i\quad-i]^{T}$ in Fig. 4 (a). 2) DTAA-D: Instead of applying a phase rotation to the APSK constellation, in this section, we propose the DTAA-D mapping method, which assigns a dedicated TA to be uniquely turned on only for the all-zero spatial bitstream. As a result, the on/off states of the $\left(N_{t}-1\right)$ TAs are decided by the $\left(N_{t}-1\right)$ non-all-zero spatial bits of Fig. 4 (b) and of Table II without any ambiguity, hence eliminating the dependence of the DTAA-R scheme on the constellation rotation of (7) and (8). More explicitly, the DTAA-D mapping rule is defined by $\left\\{{\begin{array}[]{*{20}{l}}{{{\bf{b}}_{s}^{T}}\neq{\bf{0}}\Leftrightarrow{\bf{x}}={{\left[{\begin{array}[]{*{20}{c}}{{\bf{b}}_{s}^{T}}&0\end{array}}\right]}^{T}}\times s}\\\ {{{\bf{b}}_{s}^{T}}={\bf{0}}\Leftrightarrow{\bf{x}}={{\left[{\begin{array}[]{*{20}{c}}{{{\bf{0}}_{\left({{N_{t}}-1}\right)\times 1}^{T}}}&1\end{array}}\right]}^{T}}\times s}.\end{array}}\right.$ (9) Therefore, the last TA of Fig. 4 (b) is activated for the special case of ${\bf{b}}_{s}^{T}={\bf{0}}$. Again, the DTAA-D arrangement is exemplified in Fig. 4 (b), where the incoming data bits are also divided into two parts: a spatial bit sequence ${{\bf{b}}_{s}^{T}}$ and a data bit sequence ${{\bf{b}}_{a}^{T}}$. We note that ${N_{t}}=4$, $m_{s}=3$, and $m_{a}=1$ are assumed in Fig. 4 (b), and the corresponding TA activation patterns are also summarised in Table II. Specifically, based on Fig. 4 (b) and Table II, the information bit sequence of ${\bf{b}}^{T}=[1\quad 0\quad 1\quad|0]$ is transmitted as ${\bf{x}}={[{-1}\quad 0\quad{-1}\quad 0]^{T}}$. However, based on (9), the bit sequence of ${\bf{b}}^{T}=[0\quad 0\quad 0\quad|1]$ is mapped to $\mathbf{x}=[0\quad 0\quad 0\quad 1]^{T}$, as seen in Table II, which avoids the constellation rotation of $-i$ seen in the DTAA-R example. We will demonstrate in Section V that as the benefit of eliminating the DTAA-R scheme’s constellation rotation, the pairwise error probability is increased by the DTAA-D scheme. Nonetheless, we note that this arrangement does not compromise the LCIT-GSM throughput, since a total of $\left(N_{t}-1\right)$ spatial bits are transmitted by $N_{t}$ TAs, which is in line with (2). 3) LUT333We note that LUT uses the same mapping design as the VGSM of [36, 49], and we include it here in order to share the low complexity detectors proposed in Section III.: The DTAA-D arrangement is capable of achieving the full LCIT-GSM throughput without any constellation rotation, but unfortunately, the distance between the legitimate TA activation patterns has not been maximised. More explicitly, according to (1), there are a total of $\left(2^{N_{t}}-1\right)$ legitimate TA activation patterns, where the case of deactivating all TAs is eliminated. However, it can be seen in (2) that only $2^{N_{t}-1}$ TA activation patterns are needed. Against this background, the LUT arrangement is introduced to further optimize the DTAA-D scheme’s spatial constellation, but suffer from the high complexity of the mapping design [36, 49]. Specifically, for the case of $N_{t}=4$, there are a total of $2^{N_{t}}-1=15$ possible TA activation patterns, which is constituted by $C_{4}^{1}=4$, $C_{4}^{2}=6$, $C_{4}^{3}=4$ and $C_{4}^{4}=1$ according to (1). Nonetheless, only $2^{N_{t}-1}=8$ TA activation patterns are needed. Therefore, the first rule of LUT is to prioritize the TA activation patterns with smaller number $N_{a}$ of activated TAs. For example, the TA activation patterns that only activate a single TA out of $N_{t}=4$ result in the transmitted signal vectors of $\mathbf{x}^{T}=\left\\{\left[s,0,0,0\right],\left[0,s,0,0\right],\left[0,0,s,0\right],\left[0,0,0,s\right]\right\\}$, where the TA activation pattern always differs in the maximum possible number of 4 positions. Following this, for the TA activation patterns associated with the same $N_{a}$, the pairs that have the highest possible number of different activated TA positions are chosen. For example, after admitting the $C_{4}^{1}=4$ combinations associated with a single activated TA, we still need $2^{N_{t}-1}-C_{4}^{1}=4$ patterns out of the $C_{4}^{2}=6$ combinations associated with $N_{a}=2$ activated TAs. Hence, the TA activation pattern pairs of $\left(1,2\right)$ and $\left(3,4\right)$ are chosen, which always differ in the maximum possible number of 4 positions. Similarly, the pair of $\left(1,3\right)$ and $\left(2,4\right)$ are subsequently chosen. Although $\left(1,2\right)$ and $\left(1,3\right)$ now only differ in 3 activated TA positions, we have ensured that the maximally separated pairs are used. In summary, the LUT arrangement is exemplified in Fig. 4 (c) for the case of $N_{t}=4$, $m_{t}=3$ and $m_{a}=1$, where the list of TA activation patterns is also presented in Table II. The LUT mapping may be represented by ${{\bf{b}}_{s}^{T}}\Leftrightarrow{\bf{x}}=\mathrm{U}\left({{{\bf{b}}_{s}}}\right)\times s,$ (10) where $\mathrm{U}\left(\cdot\right)$ returns a column vector having entries of $0$ or $1$, and the above LUT mapping rules ensure that the binary vectors $\left\\{\mathrm{U}\left(\mathbf{b}_{s}\right)\right\\}_{\forall\mathbf{b}_{s}}$ have the maximum possible Hamming distance. ## III Signal Detection In this section, we proceed to devise low-complexity signal detectors for the LCIT-GSM receiver. We first consider the optimal MLD in Section III-A, followed by a pair of reduced-complexity detectors in Sections III-B and III-C, respectively. ### III-A Maximum Likelihood Detection From the detector’s perspective, let us represent the tentative transmitted signal vector as ${{\bf{x}}_{k,l}}$, where the subscript $k$ denotes the $k$-th TA activation pattern444Note that the subscript $k$ represents the $k$-th TA activation pattern, not the $k$-th TA in SM. The number of active TAs is variable and determined by the $k$-th TA activation pattern., while the subscript $l$ denotes the $l$-th $M$-PSK/QAM symbol. We assume that perfect channel knowledge is available for the receiver. As a result, the MLD finds the estimate of $\bf{x}$ by performing a full search over all legitimate indices $k$ and $l$ formulated as [53]: $\begin{split}\left[{\hat{k}_{MLD},\hat{l}_{MLD}}\right]&=\mathop{\arg\max}\limits_{k,l}{p_{\bf{y}}}\left({\left.{\bf{y}}\right|{{\bf{x}}_{k,l}},{\bf{H}}}\right)\\\ &=\mathop{\arg\min}\limits_{k,l}{\left\|{{\bf{y}}-{\bf{H}}{{\bf{x}}_{k,l}}}\right\|^{2}}\\\ &=\mathop{\arg\min}\limits_{k,l}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2},\end{split}$ (11) where the probability density function (PDF) of ${\bf{y}}$ conditioned on ${{{\bf{x}}_{k,l}}}$ and ${\bf{H}}$ is given by: ${p_{\bf{y}}}\left({\left.{\bf{y}}\right|{{\bf{x}}_{k,l}},{\bf{H}}}\right)=\frac{1}{{{{\left({\pi\sigma_{n}^{2}}\right)}^{{N_{r}}}}}}\exp\left({-\frac{{{{\left\|{{\bf{y}}-{\bf{H}}{{\bf{x}}_{k,l}}}\right\|}^{2}}}}{{\sigma_{n}^{2}}}}\right),$ (12) ${s_{l}}$ represents the $l$-th symbol of the constellation, and $\mathbf{g}_{k}$ is the $k$-th column of the equivalent $N\times{N_{r}}$ LCIT- GSM channel matrix $\mathbf{G}$ from the perspective of the APSK symbol, where we have $N={2^{{N_{t}}}}$ for DTAA-R and $N={2^{{N_{t}}-1}}$ for DTAA-D and LUT. In summary, the equivalent channel matrix $\mathbf{G}$ is defined as follows $\left\\{{\begin{array}[]{*{20}{l}}\mathbf{G}_{DTAA-R}=\begin{bmatrix}\mathbf{H}\mathbf{b}_{s,1}&\cdots&\mathbf{H}\mathbf{b}_{s,N-1}&\mathbf{H}\mathbf{1}e^{j\frac{\pi}{M_{n}}}\end{bmatrix}\\\ \mathbf{G}_{DTAA-D}=\begin{bmatrix}\mathbf{H}\begin{bmatrix}\mathbf{b}_{s,1}\\\ 0\par\end{bmatrix}&\cdots&\mathbf{H}\begin{bmatrix}\mathbf{b}_{s,N-1}\\\ 0\par\end{bmatrix}&\mathbf{H}\begin{bmatrix}\mathbf{0}\\\ 1\par\end{bmatrix}\end{bmatrix}\\\ \mathbf{G}_{LUT}=\begin{bmatrix}\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,0}\right)&\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,1}\right)&\cdots&\mathbf{H}\mathrm{U}\left(\mathbf{b}_{s,N-1}\right)\end{bmatrix},\end{array}}\right.$ (13) where $M_{n}=M$ for $M$-PSK, and ${\bf{b}}_{s,0}=\bf{0}$ denotes the spatial bitstream with all zeros, while ${\bf{b}}_{s,1},\cdots,{\bf{b}}_{s,N-1}$ denote the other spatial bitstreams. As a result, it can be readily seen from (11) that the LCIT-GSM system is now equivalent to an SM system with $N$ TAs, where all of the three mapping arrangements of DTAA-R, DTAA-D and LUT have the same detector structure. ### III-B Two-stage near-Maximum Likelihood Detection The MLD has to jointly search through $N$ TA activation patterns and $M$ symbols, hence its complexity order is given by $\mathcal{O}\left({MN}\right)$, which grows exponentially both with the number $N_{t}$ of TAs and number $m_{s}$ of modulated bits. In this section, we conceive the low-complexity two-stage near-MLD (TMLD) scheme, which is similar to the massive MIMO detector of [54] and to the sphere decoder of [55]. This two-stage TMLD first detects the modulated symbol index $l$ from the reduced search space as follows: ${\hat{l}}=\mathop{\arg\min}\limits_{l}\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{l}\right\|^{2}.$ (14) We note that the range of $k^{\prime}$ is given by $k^{\prime}\in\left\\{{1,2,\cdots,{N_{t}}}\right\\}$, which is reduced from $k\in\left\\{1,2,\cdots,N\right\\}$. Then, the TMLD relaxes the range of $l$ appropriately based on the estimated ${\hat{l}}$, which means several $l$ values can be selected based on (14), instead of a single ${\hat{l}}$, since a single one would unlikely to be the globally optimal one. Therefore, TMLD defines the reduced candidate set of $l$ using ${\hat{l}}$ in (14) as ${\chi_{TMLD}}=\left\\{{\left.l\right|\frac{\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{l}\right\|^{2}}{\left\|\mathbf{y}-\mathbf{h}_{k^{\prime}}s_{\hat{l}}\right\|^{2}}\leq c}\right\\},$ (15) where $c\geq 1$ is a constant that controls the size of the set ${\chi_{TMLD}}$. Following this, the second stage of TMLD is performed based on (11) as: $\left[{\hat{k}_{TMLD},\hat{l}_{TMLD}}\right]=\mathop{\arg\min}\limits_{k,l\in\chi_{TMLD}}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2}.$ (16) The MLD guarantees that the solution is optimal by searching through all the elements in the available set. By contrast, TMLD searches for $k$ and $l$ in a reduced region by relaxing the rough estimate of $l$, which is similar to the sphere decoding philosophy of [55, 56]. When $c$ is infinite, TMLD becomes equivalent to MLD. ### III-C Decoupling Based Maximum Likelihood Detection In this subsection, we propose the novel decoupling based MLD (DMLD), which firstly obtains the optimum modulation indices for all TA activation pattern candidates and then detects the optimal TA activation pattern with the aid of the demodulated $M$-APSK symbol. More explicitly, for each tentative TA combination index $k$, the LCIT-GSM detection in (11) can be simplified to $\begin{split}{\hat{l}_{k}}&=\mathop{\arg\min}\limits_{l}\left\\{{\left\|{\mathbf{g}}_{k}\right\|}^{2}{s}_{l}-2\Re\left\\{{s}_{l}^{*}{\mathbf{g}}_{k}^{H}\mathbf{y}\right\\}\right\\}\\\ &=\mathop{\arg\min}\limits_{l}\left\\{{\left|{s}_{l}-{p}_{k}\right|}^{2}-{\left|{p}_{k}\right|}^{2}\right\\}\\\ &=\mathop{\arg\min}\limits_{l}\left\\{{\left|{s}_{l}-{p}_{k}\right|}^{2}\right\\},\end{split}$ (17) where the demodulator’s decision variable is given by ${p}_{k}=\frac{{\mathbf{g}}_{k}^{H}\mathbf{y}}{{\left\|{\mathbf{g}}_{k}\right\|}^{2}}$. In this way, the optimum modulated symbol index $\hat{l}_{k}$ associated with all TA activation indices may be directly obtained by demapping $p_{k}$ to the closest constellation point, assuming that a regular APSK constellation is used. When $M$-PSK is employed, the demodulation of (17) may be performed by rounding the phase of the decision variable to the nearest $M$-PSK index as [57]555In DMLD, we estimate $s$ instead of its index, since $s$ can be directly obtained by the rounding operation. $\hat{s}_{k}=\exp\left\\{j\left[\frac{\pi}{2}\left\lfloor\left(\angle{p}_{k}-\phi_{0}\right)\frac{2}{\pi}\right\rceil+\phi_{0}\right]\right\\},$ (18) where $\phi_{0}$ is the phase of the first $M$-PSK symbol associated with all- zero bits. Similarly, as shown in [57, 58], the QAM constellation may be decoupled into two real-valued APSK signal sets as $s={s}_{I}+j{s}_{Q}$. Since ${s}_{I}$ and ${s}_{Q}$ are from orthogonal dimensions, we have $\hat{l}_{k}=\underset{l}{\arg\min}\left[\left(s_{I}-\Re\left(p_{k}\right)\right)^{2}+\left(s_{Q}-\Im\left(p_{k}\right)\right)^{2}\right],$ (19) which may be further decoupled into $\Re\left(\hat{s}_{k}\right)=\min\left[\max\left(2\left\lfloor\frac{\alpha\Re\left(p_{k}\right)+1}{2}\right\rceil-1,-M+1\right),M-1\right],$ (20) and $\Im\left(\hat{s}_{k}\right)=\min\left[\max\left(2\left\lfloor\frac{\alpha\Im\left(p_{k}\right)+1}{2}\right\rceil-1,-M+1\right),M-1\right].$ (21) We note that $\alpha=\sqrt{\frac{\sum_{m=0}^{\frac{\sqrt{M}}{2}-1}\left(\sqrt{M}-2m-1\right)^{2}}{\frac{\sqrt{M}}{4}}}$ is the normalization factor of the QAM constellation that yields $\hat{s}_{k}=\frac{1}{\alpha}\left[\Re\left(\hat{s}_{k}\right)+\Im\left(\hat{s}_{k}\right)\right]$ and ensures unity average symbol power [57, 58]. From (18), (20) and (21) we obtain the total number $N$ of demodulated symbols $S_{min}=\left\\{\hat{s}_{1},\hat{s}_{2},\cdots,\hat{s}_{N}\right\\}$ associated with the $N$ hypotheses, for all $1\leq k\leq N$. Thus, we have $\begin{split}\left[\hat{k}_{DMLD},\hat{s}_{DMLD}\right]&=\underset{k,s}{\arg\min}\left\|\mathbf{y}-\mathbf{g}_{k}s_{l}\right\|^{2}\\\ &=\underset{k}{\arg\min}\left\|\mathbf{y}-\mathbf{g}_{k}\hat{s}_{k}\right\|^{2}.\end{split}$ (22) Once ${\hat{k}_{DMLD}}$ is estimated, we have ${\hat{s}_{DMLD}}={\hat{s}_{{{\hat{k}}_{DMLD}}}}$, which is the ${\hat{k}_{DMLD}}$-th element of $S_{min}$. The DMLD’s complexity order does not grow with the number $M$ of modulation levels, which constitutes the most appealing advantages of the optimal LCIT- GSM detection, especially when employing high-order $M$-PSK/QAM schemes. More importantly, the DMLD of (17)-(22) substantially reduces the detection complexity without imposing any performance loss on the MLD of (11). ## IV Performance Analysis In this section, we present analytical results for characterising the error performance of the uncoded LCIT-GSM system, where the MLD is assumed to obtain the optimal reference bound666We note that the theoretical performance bounds are different for different detectors. Here we derive the ultimate theoretical bound for the MLD.. A tight UB on the BEP is derived. Additionally, we also analyze the computational complexity of the proposed LCIT-GSM detectors. ### IV-A Uncoded Performance #### IV-A1 Classic Union Bound First of all, the analytical performance of our LCIT-GSM system is evaluated using the well-known union bounding technique. The average BEP of LCIT-GSM is given by: $P_{b}\leq\frac{1}{MN}\sum_{k=1}^{N}\sum_{l=1}^{M}\sum_{\tilde{k}=1}^{N}\sum_{\tilde{l}=1}^{M}N\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right),$ (23) where $\mathbf{x}_{k,l}$ indicates the symbol $s_{l}$ transmitted using the $k$-th TA activation pattern, while $N\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$ is the number of bits in error between $\mathbf{x}_{k,l}$ and $\mathbf{x}_{\tilde{k},\tilde{l}}$, and $P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$ denotes the probability of deciding on $\mathbf{x}_{\tilde{k},\tilde{l}}$, given that $\mathbf{x}_{k,l}$ is transmitted. Following this, the probability $P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)$ can be computed by using (12) as follows $\begin{split}P\left(\mathbf{x}_{k,l}\rightarrow\mathbf{x}_{\tilde{k},\tilde{l}}\right)&=P\left(\left\|\mathbf{y}-{\bf{g}}_{k}s_{l}\right\|^{2}>\left\|\mathbf{y}-{\bf{g}}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}\right)\\\ &=Q\left(\sqrt{\frac{1}{2\sigma_{n}^{2}}\left\|{\bf{g}}_{k}s_{l}-{\bf{g}}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}}\right).\end{split}$ (24) According to Eq. (14-4-15) in [59], we obtain $\displaystyle{P_{b}}$ $\displaystyle\leq\frac{1}{{MN}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{}}}}$ $\displaystyle\quad\times N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)\mu_{\alpha}^{{N_{r}}}\sum\limits_{n=0}^{{N_{r}}-1}{C_{{N_{r}}-1+n}^{n}{{\left({1-{\mu_{\alpha}}}\right)}^{n}}},$ (25) with ${\mu_{\alpha}}=\mu\left(\sigma_{\alpha}^{2}\right)=\frac{1}{2}\left({1-\sqrt{\frac{{\sigma_{\alpha}^{2}}}{{1+\sigma_{\alpha}^{2}}}}}\right),$ (26) and $\sigma_{\alpha}^{2}=\frac{1}{4\sigma_{n}^{2}}\left({{{\left|{{s_{l}}}\right|}^{2}}+{{\left|{{s_{\tilde{l}}}}\right|}^{2}}}\right).$ (27) #### IV-A2 Improved Upper Bound The theoretical UB above is derived based on the conventional SM study of [59], which does not take into account the specific effects of the spatial constellation and symbol constellation. To avoid these limitations, an improved UB is proposed in [51]. In this subsection, we will derive our improved performance bound for LCIT-GSM based on the methodology of [51]. We firstly offer _Proposition 1_ that is conceived for the sake of improving the UB of our LCIT-GSM system, and then we further derive a simplified UB under Rayleigh flat fading from _Proposition 1_. _Proposition 1:_ The average BEP of LCIT-GSM can be tightly upper bounded as follows: ${P_{b}}\leq{P_{b,signal}}+{P_{b,spatial}}+{P_{b,joint}},$ (28) where ${P_{b,signal}}$, ${P_{b,spatial}}$, ${P_{b,joint}}$ are defined as $\left\\{{\begin{array}[]{*{20}{l}}{{P_{b,signal}}=\frac{{{{\log}}M}}{{{N}{{\log}}\left({M{N}}\right)}}\sum\limits_{k=1}^{{N}}{{P_{b,MOD}}\left(k\right)}}\\\ {{P_{b,spatial}}=\frac{{{{\log}}{N}}}{{M{{\log}}\left({M{N}}\right)}}\sum\limits_{l=1}^{M}{{P_{b,SSK}}\left(l\right)}}\\\ {{P_{b,joint}}=\frac{{\sum\limits_{k=1}^{{N}}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{{N}}{\sum\limits_{\tilde{l}=1}^{M}{N\left({\mathbf{x}_{k,l}\to{\mathbf{x}_{\tilde{k},\tilde{l}}},{s_{\tilde{l}}}}\right)\Upsilon\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)}}}}}}{{M{N}{{\log}}\left({M{N}}\right)}}},\end{array}}\right.$ (29) with $\left\\{{\begin{array}[]{*{20}{l}}{{P_{b,MOD}}\left(k\right)=\frac{{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{l}=1}^{M}{\left[{N\left({{s_{l}}\to{s_{\tilde{l}}}}\right){E_{{\mathbf{g}_{k}}}}\left\\{P\left(s_{l}=s_{\tilde{l}}\right)\right\\}}\right]}}}}{{M{{\log}}\left(M\right)}}}\\\ {{P_{b,SSK}}\left(l\right)=\frac{{\sum\limits_{k=1}^{{N}}{\sum\limits_{\tilde{k}=1}^{{N}}{N\left({\mathbf{b}_{s,k}\to{\mathbf{b}_{s,\tilde{k}}}}\right){\Psi_{l}}\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)}}}}{{{N}{{\log}}\left({{N}}\right)}}},\end{array}}\right.$ (30) where $\left\\{{\begin{array}[]{*{20}{l}}{{\Psi_{l}}\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)=\frac{1}{\pi}\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi 2}}\right.\kern-1.2pt}2}}{{{\mathcal{M}}_{\gamma\left({\mathbf{b}_{s,k},\mathbf{b}_{s,\tilde{k}}}\right)}}\left({\frac{{{\left|{{s_{l}}}\right|^{2}}}}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}}\right)d\theta}}\\\ {\Upsilon\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)=\frac{1}{\pi}\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi 2}}\right.\kern-1.2pt}2}}{{{\mathcal{M}}_{\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)}}\left({\frac{1}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}}\right)d\theta}},\end{array}}\right.$ (31) and $\left\\{{\begin{array}[]{*{20}{l}}\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)=\left\|\mathbf{g}_{k}-\mathbf{g}_{\tilde{k}}\right\|^{2}\\\ \gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)=\left\|\mathbf{g}_{k}s_{l}-\mathbf{g}_{\tilde{k}}s_{\tilde{l}}\right\|^{2}.\end{array}}\right.$ (32) _Proof:_ Please refer to Appendix A in [51]. As shown in (31), in order to obtain the ABEP upper bound described in (28), we have to derive the MGFs of $\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)$ and $\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)$. According to [49, 60], we know that $\begin{split}\gamma\left({{{\bf{b}}_{s,k}},{{\bf{b}}_{s,\tilde{k}}}}\right)&={\left\|{{{\bf{g}}_{k}}-{{\bf{g}}_{\tilde{k}}}}\right\|^{2}}={\left\|{{\bf{G}}\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}\right\|^{2}}\\\ &=\sum\limits_{n=1}^{{N_{r}}}{{{\bf{G}}_{n,:}}\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}{\bf{G}}_{n,:}^{H}}\\\ &={{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{T}}\left[{{{\bf{I}}_{N}}\otimes\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right]{{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{*}},\end{split}$ (33) and $\begin{split}\gamma\left({{{\bf{x}}_{k,l}},{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)&={\left\|{{{\bf{g}}_{k}}{s_{l}}-{{\bf{g}}_{\tilde{k}}}{s_{\tilde{l}}}}\right\|^{2}}={\left\|{{\bf{G}}\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}\right\|^{2}}\\\ &=\sum\limits_{n=1}^{{N_{r}}}{{{\bf{G}}_{n,:}}\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}{\bf{G}}_{n,:}^{H}}\\\ &={{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{T}}\left[{{{\bf{I}}_{N}}\otimes\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right]{{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}^{*}},\end{split}$ (34) where ${{{\bf{G}}_{n,:}}}$ represents the $n$-th row of ${\bf{G}}$, ${{\bf{e}}_{k}}$ is the ${N_{t}}\times 1$ unit vector with only the $k$-th entry is $1$, and ${\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}=vec\left({{{\bf{G}}^{T}}}\right)$ is a ${N_{r}}N\times 1$ vector obtained by the vectorization of ${{\bf{G}}^{T}}$. In this paper, we explicitly investigate the canonical i.i.d. Rayleigh fading scenarios. Nevertheless, the equivalent LCIT-GSM channels are correlated. Hence, the MGFs of $\gamma\left({\mathbf{b}_{s,k},{\mathbf{b}_{s,\tilde{k}}}}\right)$ and $\gamma\left({\mathbf{x}_{k,l},\mathbf{x}_{\tilde{k},\tilde{l}}}\right)$ can be derived in the same way as in [49, 60], which can be expressed as $\displaystyle{M_{\gamma\left({{{\bf{b}}_{s,k}},{{\bf{b}}_{s,\tilde{k}}}}\right)}}\left(t\right)$ $\displaystyle=\det\left[{{{\bf{I}}_{{N_{r}}N}}+t{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}\left({{{\bf{I}}_{N}}}\right.}\right.$ $\displaystyle\quad{\left.{\left.{\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$ (35) and $\displaystyle{M_{\gamma\left({{{\bf{x}}_{k,l}},{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}\left(t\right)$ $\displaystyle=\det\left[{{{\bf{I}}_{{N_{r}}N}}+t{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}\left({{{\bf{I}}_{N}}}\right.}\right.$ $\displaystyle\quad{\left.{\left.{\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$ (36) where $\det\left({\bf{S}}\right)$ denotes the determinant of matrix ${\bf{S}}$, ${{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}=\frac{{\rm{1}}}{{{N_{r}}}}{{\bf{I}}_{{N_{r}}}}\otimes E\left({{{\bf{G}}^{T}}{{\bf{G}}^{*}}}\right)$ is the covariance matrix of ${\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}$, depending on the specific spatial mapping scheme introduced in Section II-B. More specifically, the $\left({k,\tilde{k}}\right)$ element of ${{\bf{C}}_{{{\bf{G}}^{T}}}}=\frac{1}{{{N_{r}}}}E\left({{{\bf{G}}^{T}}{{\bf{G}}^{*}}}\right)$ is equal to $1$ when the $k$-th and $\tilde{k}$-th TA activation patterns share more than one activated TA, and $0$ for the rest. After substituting (IV-A2) and (IV-A2) into (29) $\sim$ (31), we arrive at $\displaystyle{P_{b,spatial}}$ $\displaystyle=\frac{1}{{\pi MN{{\log}}\left({MN}\right)}}\sum\limits_{l=1}^{M}{\sum\limits_{k=1}^{N}{\sum\limits_{\tilde{k}=1}^{N}{N\left({{{\bf{b}}_{s,k}}\to{{\bf{b}}_{s,\tilde{k}}}}\right)}}}$ $\displaystyle\times\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi 2}}\right.\kern-1.2pt}2}}{\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{{{{\left|{{s_{l}}}\right|}^{2}}}}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.}$ $\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}}d\theta$ $\displaystyle\leq\frac{1}{{2\pi MN{{\log}}\left({MN}\right)}}\sum\limits_{l=1}^{M}{\sum\limits_{k=1}^{N}{\sum\limits_{\tilde{k}=1}^{N}{N\left({{{\bf{b}}_{s,k}}\to{{\bf{b}}_{s,\tilde{k}}}}\right)}}}$ $\displaystyle\times\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{{{{\left|{{s_{l}}}\right|}^{2}}}}{{4\sigma_{n}^{2}}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.$ $\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right){{\left({{{\bf{e}}_{k}}-{{\bf{e}}_{\tilde{k}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$ (37) and $\displaystyle{P_{b,joint}}$ $\displaystyle=\frac{1}{{\pi MN{{\log}}\left({MN}\right)}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}}}$ $\displaystyle\times\int\limits_{0}^{{\pi\mathord{\left/{\vphantom{\pi 2}}\right.\kern-1.2pt}2}}{\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{1}{{4\sigma_{n}^{2}{{\sin}^{2}}\theta}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.}$ $\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}}d\theta$ $\displaystyle\leq\frac{1}{{2\pi MN{{\log}}\left({MN}\right)}}\sum\limits_{k=1}^{N}{\sum\limits_{l=1}^{M}{\sum\limits_{\tilde{k}=1}^{N}{\sum\limits_{\tilde{l}=1}^{M}{N\left({{{\bf{x}}_{k,l}}\to{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}}}}$ $\displaystyle\times\det\left[{{{\bf{I}}_{{N_{r}}N}}+\frac{1}{{4\sigma_{n}^{2}}}{{\bf{C}}_{{\bf{\mathord{\buildrel{\lower 3.0pt\hbox{$\scriptscriptstyle\smile$}}\over{g}}}}}}}\right.$ $\displaystyle\quad\times{\left.{\left({{{\bf{I}}_{N}}\otimes\left({\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right){{\left({{{\bf{x}}_{k,l}}-{{\bf{x}}_{\tilde{k},\tilde{l}}}}\right)}^{H}}}\right)}\right)}\right]^{-1}},$ (38) where the Chernoff bound is used for simplifying the numerical integrals [49]. On the other hand, ${P_{b,signal}}$ can also be further simplified to ${P_{b,signal}}=\frac{{{{\log}}M}}{{{{\log}}\left({MN}\right)}}P_{b,MOD}^{Rayleigh}.$ (39) TABLE III: Contrast between three detectors for LCIT-GSM system. | BER performance | Order of complexity | Computational complexity ---|---|---|--- MLD | optimal | ${\mathcal{O}}\left({MN}\right)$ | ${\delta_{MLD}}=6M{N_{r}}N$ TMLD | sub-optimal | ${\mathcal{O}}\left({N}\right)$, for a small $c$ and $M$ | ${\delta_{TMLD}}=6M{N_{r}}{N_{t}}+6\beta M{N_{r}}N$ DMLD | optimal | ${\mathcal{O}}\left({N}\right)$ | ${\delta_{DMLD}}=\left\\{{\begin{array}[]{*{20}{l}}{\left({6{N_{r}}+10}\right)N,}&{PSK}\\\ {\left({6{N_{r}}+12}\right)N,}&{QAM}\end{array}}\right.$ For PSK and QAM constellations, $P_{b,MOD}^{Rayleigh}$ can be expressed similarly to [61] as $P_{b,PSK}^{Rayleigh}\simeq\frac{{2\sum\limits_{k=1}^{\max\left({{M\mathord{\left/{\vphantom{M4}}\right.\kern-1.2pt}4},1}\right)}{R\left(\frac{{{{\sin}^{2}}{\frac{{\left({2k-1}\right)\pi}}{M}}}}{2\sigma_{n}^{2}}\right)}}}{{\max\left({{{\log}}M,2}\right)}},$ (40) and $P_{b,QAM}^{Rayleigh}=\frac{4}{{\sqrt{M}{{\log}}M}}\sum\limits_{l=1}^{\frac{1}{2}{{\log}}M}{\sum\limits_{k=0}^{\left({1-{2^{-l}}}\right)\sqrt{M}-1}{{S_{l,k}}}},$ (41) where ${S_{l,k}}={\left({-1}\right)^{\left\lfloor{\frac{{{2^{l-1}}k}}{{\sqrt{M}}}}\right\rfloor}}\left({{2^{l-1}}-\left\lfloor{\frac{{{2^{l-1}}k}}{{\sqrt{M}}}+\frac{1}{2}}\right\rfloor}\right)R\left({\frac{{3{{\left({2k+1}\right)}^{2}}}}{4\sigma_{n}^{2}\left(M-1\right)}}\right).$ (42) and $R\left(x\right)={\left({\mu\left(x\right)}\right)^{{N_{r}}}}\sum\limits_{{n_{r}}=0}^{{N_{r}}-1}{\left\\{{C_{{N_{r}}-1+{n_{r}}}^{{n_{r}}}{{\left({1-\mu\left(x\right)}\right)}^{{n_{r}}}}}\right\\}},$ (43) The formulas in (IV-A2), (IV-A2) and (39) provide useful insights into the performance of LCIT-GSM systems. For example, (IV-A2) shows that the bit mapping of the PSK/QAM constellation diagram plays an important role in ${P_{b,joint}}$. In particular, while conventional bit mappings based on the Euclidean distance of the signal constellations turn out to be optimal for minimising ${P_{b,signal}}$, additional constraints may be imposed onto the best choice of the signal constellation diagram and onto the related bit mapping for minimising ${P_{b,signal}}$ and ${P_{b,joint}}$ simultaneously. ### IV-B Complexity Analysis In this part, we compare the computational complexity of the detectors proposed for our LCIT-GSM scheme. The detection complexity is quantified in terms of the number of real-valued multiplications required. The complexity of GSM in [39] is given by ${\delta_{GSM}}=6M{N_{r}}{2^{\left\lfloor{{{\log}}C_{{N_{t}}}^{{N_{a}}}}\right\rfloor}}$. Similarly, for the proposed LCIT-GSM scheme, the detection complexity of the full-search based MLD of (11) is given by ${\delta_{MLD}}=6M{N_{r}}N.$ (44) When the near-optimal reduced-scope TMLD of (16) is used, the LCIT-GSM scheme’s complexity becomes ${\delta_{TMLD}}=6M{N_{r}}{N_{t}}+6\beta M{N_{r}}N,$ (45) where $\frac{1}{M}\leq\beta\leq 1$ is a parameter that increases with the constant $c$ of (15). More specifically, we have $\beta=\frac{1}{M}$ for $c=1$ and $\beta\to 1$ for $c\to\infty$, respectively. We note that as $c\to\infty$, the complexity of TMLD becomes higher than that of MLD, which is due to the fact that, for a large $c$, TMLD does not reduce the cardinality of the symbol constellation, but increases the complexity of the first step. However, in practice, a small $c$ is adequate for achieving near-ML performance at a low complexity. When the single-stream-based DMLD of (17)-(22) is invoked, the LCIT-GSM detection complexity encountered for a given $k$ consists of three parts: 1) the computation of ${p_{k}}$ in (17) requires $\left({6{N_{r}}+2}\right)$ real-valued multiplications [58]; 2) $2$ and $4$ real-valued multiplications are required for obtaining ${\hat{s}_{k}}$ in PSK and QAM, respectively; 3) $6$ real-valued multiplications are required for performing (22). Therefore, the LCIT-GSM detection complexity is reduced to ${\delta_{DMLD}}=\left\\{{\begin{array}[]{*{20}{l}}{\left({6{N_{r}}+10}\right)N,}&{PSK}\\\ {\left({6{N_{r}}+12}\right)N,}&{QAM}\end{array}}\right..$ (46) The complexity comparison of the three different detectors is summarized in Table III, where the order of complexity is defined as the number of optimization metric evaluations [58]. The numerical complexity comparisons are offered in Section V. We note that as previously shown by (3), the throughput of LCIT-GSM is higher than that of GSM. This implies that for the sake of achieving the same SE, LCIT-GSM requires less TAs than its conventional GSM counterpart. As a result, although the signal detection complexity of LCIT-GSM of (44)-(46) is generally higher than that of GSM, the proposed LCIT-GSM is still advantageous in terms of the overall energy efficiency, which may be regarded as the SE normalised by the hardware power consumption [3, 11, 22]. ## V Simulation Results In this section, the BEP performance of LCIT-GSM systems is investigated for different numbers of TA/RAs and using different modulation schemes. For the sake of clarity, the parameters used for generating the results in this section are detailed in the figures. Figure 5: ABEP of LCIT-GSM (QPSK, $N_{t}=4$) versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB are drawn with solid line and dash-dot line, respectively. Note that LUT uses the same mapping design as conventional VGSM of [36, 49]. Figure 6: ABEP of LCIT-GSM (16QAM, $N_{t}=4$) versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB are drawn with solid line and dash-dot line, respectively. Note that LUT uses the same mapping design as conventional VGSM of [36, 49]. Figs. 5 $\sim$ 8 contrast our simulations and theoretical derivations for the LCIT-GSM system in different scenarios, where the circle, square and cross patterns represent DTAA-R, DTAA-D, and LUT, respectively, while the dash-dot and solid lines represent the improved performance bound and the classic union bound, respectively. The MLD is adopted in Figs. 5 $\sim$ 8 for contrasting its performance to the corresponding theoretical BEP bound. In Figs. 5 and 6, the number of TAs is set to $N_{t}=4$. Although the three mapping arrangements only exhibit modest performance differences in Figs. 5 $\sim$ 8, the DTAA-R is shown to have a worse BEP than DTAA-D and LUT, since it transmits one more bit using the same number of TAs. Furthermore, as evidenced by Figs. 5 $\sim$ 8, the LUT performs the best. However, it is worth noting that compared to the simple DTAA-R/DTAA-D mapping, the LUT has to rely on a pre-defined LUT, which imposed a higher design complexity. Figure 7: ABEP of LCIT-GSM (QPSK, $N_{t}=6$) versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB are drawn with solid line and dash-dot line, respectively. Note that LUT uses the same mapping design as conventional VGSM of [36, 49]. Figure 8: ABEP of LCIT-GSM (16QAM, $N_{t}=6$) versus $E_{m}/N_{0}$ under our three types of spatial mapping rules, i.e., DTAA-R in (6), DTAA-D in (9) and LUT in (10). The classic UB and improved UB are drawn with solid line and dash-dot line, respectively. Note that LUT uses the same mapping design as conventional VGSM of [36, 49]. Figure 9: ABEP of LCIT-GSM (QPSK, $N_{t}=6$) versus $E_{m}/N_{0}$ for our three types of detectors. The LUT is used to illustrate the compatibility of the proposed low-complexity detectors with conventional VGSM of [36, 49]. Figure 10: ABEP of LCIT-GSM (16QAM, $N_{t}=6$) versus $E_{m}/N_{0}$ for our three types of detectors. The LUT is used to illustrate the compatibility of the proposed low-complexity detectors with conventional VGSM of [36, 49]. Moreover, it is demonstrated by Figs. 5 $\sim$ 8 that the improved theoretical bound is about 1.5dB tighter than the conventional bound. Figs. 7 and 8 depict the theoretical derivation and simulation results of using ${N_{t}}=6$ and QPSK/16QAM signalling. It can be seen in Figs. 7 and 8 that, once again, the improved performance bound has a 1.5dB performance improvement over the conventional performance bound. Furthermore, as the number of RAs increases, the performance advantage of LUT over DTAA-R/DTAA-D improves, and the UB also becomes tighter in Figs. 7 and 8, which once again verifies the reliability of our conclusion. Figure 11: The performance comparison between LCIT-GSM (QPSK) and GSM for different ${N_{a}}$. The LUT-LCIT-GSM with $N_{t}=5$ is used to maintain a overall rate of 6bpcu. Figure 12: The performance comparison between LCIT-GSM (QPSK) and GSM for different ${N_{a}}$. The LUT-LCIT-GSM with $N_{t}=6$ is used to maintain a overall rate of 7bpcu. Figs. 9 and 10 compare the performance of different detectors for our LCIT-GSM system having ${N_{t}}=6$. As discussed in Section IV-B, the TMLD exhibits a lower detection complexity, but it also imposes a performance loss compared to the MLD and DMLD, as confirmed by Figs. 9 and 10. We note that the constant $c$ of (15) is set to 1.5 in Figs. 9 and 10, which may be increased for the sake of improving the performance, but this would also result in a higher detection complexity according to (45). Moreover, Figs. 9 and 10 show that although TMLD performs similarly to MLD at low SNRs, the TMLD may exhibit an error floor. The error floor will move down upon increasing ${N_{r}}$ because the channels between different TAs tend to become more orthogonal for an increased number of RAs. More specifically, the index of the modulated symbol found in the first step becomes more accurate and hence supports the global optimality of the second step of local search. Fortunately, DMLD always maintains the same performance as MLD, which benefits from the fact that for a regular constellation, the rounding-based detector and the exhaustive search return the same result. The simulation results of 16QAM associated with ${N_{t}}=6$ are presented in Fig. 10, which leads to the same observations on TMLD as Fig. 10. Moreover, by comparing the performance of QPSK and 16QAM in Figs. 9 and 10, respectively, we can see that the performance of QPSK is always better than that of 16QAM. Figure 13: Complexity comparison of different detectors for LCIT-GSM with ${N_{r}}=6$, where DTAA-D and LUT are adopted. The BEP performance comparisons between GSM and LCIT-GSM are offered in Figs. 11 and 12. In Fig. 11, the number of TAs is set to $N_{t}=5$ and QPSK is used for LCIT-GSM. In order to maintain the overall throughput of 6bpcu, 16QAM and 8QAM are used for GSM with the fixed number of active TAs ${N_{a}}=1$ and ${N_{a}}=2$, respectively. It can be seen in Fig. 11 that LCIT-GSM outperforms GSM for ${N_{a}}=2$ by about 2dB for different numbers of RAs of $N_{r}=3$ and $N_{r}=7$. When GSM associated with ${N_{a}}=1$ is considered, a 4dB performance gain can be observed in Fig. 11. In Fig. 12, our performance comparisons between GSM and LCIT-GSM are portrayed for the case of $N_{t}=6$. The QPSK constellation is also adopted for LCIT-GSM, while 16QAM and 8QAM are used for GSM at ${N_{a}}=2$ and ${N_{a}}=3$, respectively, hence maintaining a overall rate of 7bpcu. The 2dB performance gain compared to GSM using ${N_{a}}=3$ can also be observed in Fig. 12 to verify the advantage of the proposed LCIT-GSM scheme. Finally, in Fig. 13, the computational complexity of different detectors is compared in terms of the number of real-valued multiplications, where we set $c=1$ and when the DTAA-D and LUT are adopted. As seen in Section IV-B, the complexity of MLD is prohibitive and increases exponentially with ${N_{t}}$, while our proposed detectors achieve lower complexity for all the scenarios considered. More specifically, the complexity of the TMLD is lower than that of the DMLD for a small constellation, and the complexity-difference will widen as the number of TAs increases. This is because the ratio of the DMLD’s complexity to $N$ is higher than that of TMLD, bearing in mind that $N={2^{{N_{t}}-1}}$ for DTAA-D and LUT. By contrast, for a moderate number of TAs, the DMLD is more competitive in conjunction with high-order modulation, which is due to the fact that the complexity of the DMLD does not increase with the constellation size $M$. In summary, the proposed low-complexity detectors strike an attractive BEP performance vs. detection complexity tradeoff and can be applied flexibly in various scenarios. Moreover, we emphasize that the DMLD is always optimal but it is only suitable for regular constellations, while the TMLD is suboptimal, but it can strike a flexible BEP performance vs. computational complexity trade-off by adjusting the constant $c$ in (15). ## VI Conclusions A novel LCIT-GSM scheme was proposed, which is capable of maximising the GSM throughput without imposing IAI while reducing the system complexity of the conventional VGSM of [36, 49]. In contrast to the conventional GSM that always invokes a fixed number $N_{a}$ of activated TAs, the proposed LCIT-GSM utilises all legitimate TA activation patterns, where $N_{a}$ becomes a variable that has to be recovered by the receiver. Nonetheless, in the absence of IAI, a low-complexity single-stream based detector may be invoked by the LCIT-GSM receiver. Both our theoretical derivation and our numerical simulation have confirmed that LCIT-GSM increases the overall SE logarithmically with the number of TAs. More specifically, for the LCIT-GSM mapping, the arrangements of DTAA-R, DTAA-D and LUT are conceived in order to facilitate a flexible MIMO deployment with special focus on the all-zero spatial beam stream. Furthermore, as for the LCIT-GSM signal detection, we have developed the low-complexity TMLD and DMLD schemes, where the former adopts the sphere decoding philosophy for the sake of striking a compelling performance vs complexity trade-off, while the latter is capable of achieving the ML performance at a single-stream detection complexity that does not grow with the number of modulation levels. Furthermore, an improved theoretical UB is derived for the proposed LCIT-GSM, which is confirmed by our Monte-Carlo- based simulation to be about 1.5dB tighter than the existing conventional solution. Finally, our simulation results demonstrate that the proposed LCIT- GSM scheme achieves improved performance over the conventional GSM and lower complexity than the VGSM. In this paper, three spatial mapping schemes are presented for exploiting the low complexity of the bitwise TA activation. We believe that the family of mapping schemes designed by formal optimization methods may achieve a better BEP at the cost of a moderate design complexity, which is left as a topic for our future research. ## References * [1] R. Mesleh, H. Haas, C. W. Ahn, and S. Yun, “Spatial modulation-a new low complexity spectral efficiency enhancing technique,” in _Proc. 1st. Int. Conf. Commun. Netw. China_. IEEE, 2006, pp. 1–5. * [2] R. Y. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun, “Spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 57, no. 4, pp. 2228–2241, 2008. * [3] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” _Proceedings of the IEEE_ , vol. 102, no. 1, pp. 56–103, 2013. * [4] G. J. Foschini, “Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas,” _Bell Labs Technical J._ , vol. 1, no. 2, pp. 41–59, 1996. * [5] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes from orthogonal designs,” _IEEE Trans. Inf. Theory_ , vol. 45, no. 5, pp. 1456–1467, 1999. * [6] L. Zheng and D. N. C. Tse, “Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels,” _IEEE Trans. Inf. Theory_ , vol. 49, no. 5, pp. 1073–1096, 2003. * [7] M. Di Renzo, H. Haas, and P. Grant, “Spatial modulation for multiple-antenna wireless systems: A survey,” _IEEE Commun. Mag._ , vol. 49, no. 12, pp. 182–191, 2011. * [8] P. Yang, M. Di Renzo, Y. Xiao, S. Li, and L. Hanzo, “Design guidelines for spatial modulation,” _IEEE Commun. Surveys Tuts._ , vol. 17, no. 1, pp. 6–26, 2014. * [9] S. Sugiura and L. Hanzo, “Single-RF spatial modulation requires single-carrier transmission: Frequency-domain turbo equalization for dispersive channels,” _IEEE Trans. Veh. Technol._ , vol. 64, no. 10, pp. 4870–4875, 2014. * [10] C. Masouros and L. Hanzo, “Constellation randomization achieves transmit diversity for single-RF spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 65, no. 10, pp. 8101–8111, 2015. * [11] C. Xu, N. Ishikawa, R. Rajashekar, S. Sugiura, R. G. Maunder, Z. Wang, L.-L. Yang, and L. Hanzo, “Sixty years of coherent versus non-coherent tradeoffs and the road from 5G to wireless futures,” _IEEE Access_ , vol. 7, pp. 178 246–178 299, 2019. * [12] J. Jeganathan, A. Ghrayeb, and L. Szczecinski, “Generalized space shift keying modulation for MIMO channels,” in _Proc. IEEE 19th Int. Symposium on Personal, Indoor and Mobile Radio Commun._ IEEE, 2008, pp. 1–5. * [13] J. Jeganathan, A. Ghrayeb, L. Szczecinski, and A. Ceron, “Space shift keying modulation for MIMO channels,” _IEEE Trans. Wireless Commun._ , vol. 8, no. 7, pp. 3692–3703, 2009. * [14] S. Sugiura, S. Chen, and L. Hanzo, “Coherent and differential space-time shift keying: A dispersion matrix approach,” _IEEE Trans. Commun._ , vol. 58, no. 11, pp. 3219–3230, 2010. * [15] C. Xu, P. Zhang, R. Rajashekar, N. Ishikawa, S. Sugiura, Z. Wang, and L. Hanzo, ““Near-perfect” finite-cardinality generalized space-time shift keying,” _IEEE J. Sel. Areas Commun._ , vol. 37, no. 9, pp. 2146–2164, 2019\. * [16] S. Sugiura, S. Chen, and L. Hanzo, “Generalized space-time shift keying designed for flexible diversity-, multiplexing-and complexity-tradeoffs,” _IEEE Trans. Wireless Commun._ , vol. 10, no. 4, pp. 1144–1153, 2011. * [17] C. Xu, T. Bai, J. Zhang, R. Maunder, S. Sugiura, Z. Wang, and L. Hanzo, “Constant-envelope space-time shift keying,” _IEEE J. Sel. Topics Signal Process._ , 2019. * [18] Z. Li and J. Zheng, “Space-frequency shift keying in rapidly time-varying MIMO OFDM channels,” in _Proc. IEEE 87th Veh. Technol. Conf. (VTC Spring)_. IEEE, 2018, pp. 1–5. * [19] H. A. Ngo, C. Xu, S. Sugiura, and L. Hanzo, “Space-time-frequency shift keying for dispersive channels,” _IEEE Signal Process. Lett._ , vol. 18, no. 3, pp. 177–180, 2011. * [20] H. A. Ngo and L. Hanzo, “Area spectral efficiency of soft-decision space–time–frequency shift-keying-aided slow-frequency-hopping multiple access,” _IEEE Trans. Veh. Technol._ , vol. 61, no. 3, pp. 1433–1439, 2012\. * [21] E. Basar, “Index modulation techniques for 5G wireless networks,” _IEEE Commun. Mag._ , vol. 54, no. 7, pp. 168–175, 2016. * [22] E. Basar, M. Wen, R. Mesleh, M. Di Renzo, Y. Xiao, and H. Haas, “Index modulation techniques for next-generation wireless networks,” _IEEE Access_ , vol. 5, pp. 16 693–16 746, 2017. * [23] S. Lu, I. A. Hemadeh, M. El-Hajjar, and L. Hanzo, “Compressed-sensing-aided space-time frequency index modulation,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 7, pp. 6259–6271, 2018. * [24] T. Mao, Q. Wang, Z. Wang, and S. Chen, “Novel index modulation techniques: A survey,” _IEEE Commun. Surveys Tuts._ , vol. 21, no. 1, pp. 315–348, 2018\. * [25] R. Mesleh, R. Mehmood, H. Elgala, and H. Haas, “Indoor MIMO optical wireless communication using spatial modulation,” in _Proc. IEEE Int. Conf. Commun._ IEEE, 2010, pp. 1–5. * [26] R. Mesleh, H. Elgala, and H. Haas, “Optical spatial modulation,” _J. Opt. Comm. Netw._ , vol. 3, no. 3, pp. 234–244, 2011. * [27] M. H. Kabir, S. R. Islam, and K. S. Kwak, “D-MoSK modulation in molecular communications,” _IEEE Trans. Nanobioscience_ , vol. 14, no. 6, pp. 680–683, 2015. * [28] N. Serafimovski, A. Younis, R. Mesleh, P. Chambers, M. Di Renzo, C.-X. Wang, P. M. Grant, M. A. Beach, and H. Haas, “Practical implementation of spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 62, no. 9, pp. 4511–4523, 2013. * [29] A. Younis, W. Thompson, M. Di Renzo, C.-X. Wang, M. A. Beach, H. Haas, and P. M. Grant, “Performance of spatial modulation using measured real-world channels,” in _Proc. IEEE 78th Veh. Technol. Conf. (VTC Fall)_. IEEE, 2013, pp. 1–5. * [30] L. Xiao, Y. Xiao, L. You, P. Yang, S. Li, and L. Hanzo, “Single-RF and Twin-RF spatial modulation for an arbitrary number of transmit antennas,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 7, pp. 6311–6324, 2018. * [31] P. S. Koundinya, K. Hari, and L. Hanzo, “Joint design of the spatial and of the classic symbol alphabet improves single-RF spatial modulation,” _IEEE Access_ , vol. 4, pp. 10 246–10 257, 2016. * [32] L. He, J. Wang, and J. Song, “Spatial modulation for more spatial multiplexing: RF-chain-limited generalized spatial modulation aided mm-wave MIMO with hybrid precoding,” _IEEE Trans. Commun._ , vol. 66, no. 3, pp. 986–998, 2017. * [33] Z. An, J. Wang, J. Wang, and J. Song, “Mutual information and error probability analysis on generalized spatial modulation system,” _IEEE Trans. Commun._ , vol. 65, no. 3, pp. 1044–1060, 2016. * [34] L. Xiao, P. Xiao, Y. Xiao, H. Haas, A. Mohamed, and L. Hanzo, “Compressive sensing assisted generalized quadrature spatial modulation for massive MIMO systems,” _IEEE Trans. Commun._ , 2019. * [35] S. Guo, H. Zhang, P. Zhang, S. Dang, L. Cong, and M.-S. Alouini, “Signal shaping for generalized spatial modulation and generalized quadrature spatial modulation,” _arXiv preprint arXiv:1901.09318_ , 2019. * [36] O. Osman, “Variable active antenna spatial modulation,” _IET Microwaves, Antennas & Propagation_, vol. 9, no. 15, pp. 1816–1824, 2015. * [37] J. Wang, S. Jia, and J. Song, “Generalised spatial modulation system with multiple active transmit antennas and low complexity detection scheme,” _IEEE Trans. Wireless Commun._ , vol. 11, no. 4, pp. 1605–1615, 2012. * [38] P. Liu, M. Di Renzo, and A. Springer, “Variable-${N_{u}}$ generalized spatial modulation for indoor los mmwave communication: Performance optimization and novel switching structure,” _IEEE Trans. Commun._ , vol. 65, no. 6, pp. 2625–2640, 2017. * [39] A. Younis, N. Serafimovski, R. Mesleh, and H. Haas, “Generalised spatial modulation,” in _2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers_. IEEE, 2010, pp. 1498–1502. * [40] J. Fu, C. Hou, W. Xiang, L. Yan, and Y. Hou, “Generalised spatial modulation with multiple active transmit antennas,” in _2010 IEEE Globecom Workshops_. IEEE, 2010, pp. 839–844. * [41] E. Basar, U. Aygolu, E. Panayirci, and H. V. Poor, “Space-time block coded spatial modulation,” _IEEE Trans. Commun._ , vol. 59, no. 3, pp. 823–832, 2010. * [42] T. Datta, H. S. Eshwaraiah, and A. Chockalingam, “Generalized space-and-frequency index modulation,” _IEEE Trans. Veh. Technol._ , vol. 65, no. 7, pp. 4911–4924, 2015. * [43] L. Xiao, Y. Xiao, C. Xu, X. Lei, P. Yang, S. Li, and L. Hanzo, “Compressed-sensing assisted spatial multiplexing aided spatial modulation,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 2, pp. 794–807, 2017. * [44] R. Mesleh, S. S. Ikki, and H. M. Aggoune, “Quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 64, no. 6, pp. 2738–2742, 2014. * [45] J. Li, M. Wen, X. Cheng, Y. Yan, S. Song, and M. H. Lee, “Generalized precoding-aided quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 66, no. 2, pp. 1881–1886, 2016. * [46] M. Mohaisen, “Increasing the minimum euclidean distance of the complex quadrature spatial modulation,” _IET Commun._ , vol. 12, no. 7, pp. 854–860, 2018. * [47] R. Mesleh, O. Hiari, A. Younis, and S. Alouneh, “Transmitter design and hardware considerations for different space modulation techniques,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 11, pp. 7512–7522, 2017. * [48] R. Mesleh, O. Hiari, and A. Younis, “Generalized space modulation techniques: Hardware design and considerations,” _Physical Commun._ , vol. 26, pp. 87–95, 2018. * [49] A. Younis, “Spatial modulation: Theory to practice,” _Ph.D. dissertation_ , Instit. Digit. Commun., School Eng., Univ. Edinburgh, Edinburgh, Scotland, 2014. * [50] R. Mesleh and A. Alhassi, _Space modulation techniques_. John Wiley & Sons, 2018. * [51] M. Di Renzo and H. Haas, “Bit error probability of SM-MIMO over generalized fading channels,” _IEEE Trans. Veh. Technol._ , vol. 61, no. 3, pp. 1124–1144, 2012. * [52] L. Xiao, P. Xiao, Y. Xiao, I. Hemadeh, A. Mohamed, and L. Hanzo, “Bayesian compressive sensing assisted space–time block coded quadrature spatial modulation,” _IEEE Trans. Veh. Technol._ , vol. 67, no. 10, pp. 10 044–10 048, 2018. * [53] J. Jeganathan, A. Ghrayeb, and L. Szczecinski, “Spatial modulation: Optimal detection and performance analysis.” _IEEE Commun. Lett._ , vol. 12, no. 8, pp. 545–547, 2008. * [54] J. Choi, J. Mo, and R. W. Heath, “Near maximum-likelihood detector and channel estimator for uplink multiuser massive MIMO systems with one-bit ADCs,” _IEEE Trans. Commun._ , vol. 64, no. 5, pp. 2005–2018, 2016. * [55] A. Younis, S. Sinanovic, M. Di Renzo, R. Mesleh, and H. Haas, “Generalised sphere decoding for spatial modulation,” _IEEE Trans. Commun._ , vol. 61, no. 7, pp. 2805–2815, 2013. * [56] A. Younis, M. Di Renzo, R. Mesleh, and H. Haas, “Sphere decoding for spatial modulation,” in _Proc. IEEE Int. Conf. Commun. (ICC)_. IEEE, 2011, pp. 1–6. * [57] C. Xu, S. Sugiura, S. X. Ng, P. Zhang, L. Wang, and L. Hanzo, “Two decades of MIMO design tradeoffs and reduced-complexity MIMO detection in near-capacity systems,” _IEEE Access_ , vol. 5, pp. 18 564–18 632, 2017\. * [58] R. Rajashekar, K. Hari, and L. Hanzo, “Reduced-complexity ML detection and capacity-optimized training for spatial modulation systems,” _IEEE Trans. Commun._ , vol. 62, no. 1, pp. 112–125, 2013. * [59] J. G. Proakis and M. Salehi, _Digital communications_. McGraw-hill New York, 2001, vol. 4. * [60] Y. Liu, L.-L. Yang, P. Xiao, H. Haas, and L. Hanzo, “Spatial modulated multicarrier sparse code-division multiple access,” _IEEE Trans. Wireless Commun._ , vol. 19, no. 1, pp. 610–623, 2019. * [61] M. K. Simon and M.-S. Alouini, _Digital communication over fading channels_. John Wiley & Sons, 2005, vol. 95.
arxiv-papers
2021-07-27T06:55:27
2024-09-04T03:07:20.781086
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jiancheng An, Chao Xu, Yusha Liu, Lu Gan, and Lajos Hanzo", "submitter": "Jiancheng An", "url": "https://arxiv.org/abs/2107.12630" }
2107.12631
# Learning to Estimate RIS-Aided mmWave Channels Jiguang He, Henk Wymeersch, Marco Di Renzo, and Markku Juntti J. He and M. Juntti are with Centre for Wireless Communications, FI-90014, University of Oulu, Finland. H. Wymeersch is with Department of Electrical Engineering, Chalmers University of Technology, Gothenburg, Sweden. M. Di Renzo is with Université Paris-Saclay, CNRS, CentraleSupélec, Laboratoire des Signaux et Systèmes, 3 Rue Joliot-Curie, 91192 Gif-sur-Yvette, France.This work is supported by Horizon 2020, European Union’s Framework Programme for Research and Innovation, under grant agreement no. 871464 (ARIADNE). This work is also partially supported by the Academy of Finland 6Genesis Flagship (grant 318927), as well as the H2020 RISE-6G project under grant agreement number 101017011. ###### Abstract Inspired by the remarkable learning and prediction performance of deep neural networks (DNNs), we apply one special type of DNN framework, known as model- driven deep unfolding neural network, to reconfigurable intelligent surface (RIS)-aided millimeter wave (mmWave) single-input multiple-output (SIMO) systems. We focus on uplink cascaded channel estimation, where known and fixed base station combining and RIS phase control matrices are considered for collecting observations. To boost the estimation performance and reduce the training overhead, the inherent channel sparsity of mmWave channels is leveraged in the deep unfolding method. It is verified that the proposed deep unfolding network architecture can outperform the least squares (LS) method with a relatively smaller training overhead and online computational complexity. ###### Index Terms: Deep unfolding, reconfigurable intelligent surface, cascaded channel estimation, deep neural network. ## I Introduction Reconfigurable intelligent surfaces (RISs) have recently been introduced for enhanced energy efficiency (EE), spectrum efficiency (SE), positioning accuracy, as well as network/physical-layer security [1, 2, 3, 4]. The RIS, either being passive, active, or a hybrid combination of the former two, is used to smartly control the radio propagation environment, by virtue of multi- function capabilities, e.g., reflection, refraction, diffraction, scattering, and even absorption [5]. In the literature, the RIS is commonly used as an intelligent reflector, which breaks the well-known law of reflection [6], to mitigate the blockage effect and expand the connectivity range, especially for millimeter wave (mmWave) and terahertz (THz) communications. However, the RIS is commonly assumed to be nearly-passive. That is, no power amplifiers and baseband processing units are available at the RIS. Besides, in order to compensate for the additional path loss in the reflection route via the RIS, a large number of RIS elements must be employed. These make the channel state information (CSI) acquisition difficult to tackle in practice, since the channel estimation (CE) can only be performed either at the base station (BS) or at the mobile station (MS). As RIS phase control and joint active and passive beamforming are sensitive to the CSI accuracy, the full potential of the RIS cannot be achieved when the CE is poorly performed. Therefore, accurate yet efficient CE methods for the two individual channels (i.e., the MS-RIS and RIS-BS channels) or the cascaded channel are of vital importance. In our previous works, we took advantage of the inherent channel sparsity and rank-deficiency features of the mmWave multiple-input multiple- output (MIMO) channels and we applied the iterative reweighted method and the atomic norm minimization (ANM) method for estimating the channel parameters of RIS-aided mmWave MIMO systems [7, 8]. In another recent work [9], sparse matrix factorization and matrix completion were exploited in a sequential manner to facilitate the CE process. These works fall into the category of conventional model-based approaches, which suit only for a small- or medium- sized RIS, BS, and MS. As the number of RIS elements and BS/MS antennas continues to grow (this is an inevitable trend at high frequency bands, e.g., mmWave and THz), more training overhead to obtain adequate CE performance, within the channel coherence time, via conventional model-based methods is required. Besides, the associated computational complexity will become inevitably high. These considerations motivate the application of data-driven or hybrid approaches for CE in RIS- aided communications [10]. In [11], a convolutional neural network (CNN) was considered for RIS CE in a multi-user scenario. Therein, however, each user needs to first estimate its own channel and then map the estimate to the corresponding ground truth channel, which naturally increases the computational complexity. Therefore, in the present paper, we resort to a model-driven deep unfolding approach, which has already been used in MIMO detection and sparse signal recovery [12, 13], for estimating the cascaded channel in RIS-aided mmWave single-input multiple-output (SIMO) systems. To the best of the authors’ knowledge, the concept of deep unfolding has not yet been considered for RIS CE. Deep unfolding mimics the operation of conventional (projected) gradient descent schemes, and it is capable of directly mapping the received pilot signals to the cascaded channel. Its computationally intensive training process can be executed offline and the online implementation/prediction phase only entails low-complexity calculations, e.g., matrix multiplications and additions, and element-wise operations. In this study, specifically, the rank- deficiency property of the cascaded channel is explicitly considered in the deep unfolding framework. It is verified that the deep unfolding scheme can outperform least squares (LS) estimation in terms of normalized mean square error (NMSE) with a smaller training overhead and a reduced online computational complexity. Notations: A bold lowercase letter ${\mathbf{a}}$ denotes a vector, and a bold capital letter ${\mathbf{A}}$ denotes a matrix. $(\cdot)^{\mathsf{T}}$ and $(\cdot)^{\mathsf{H}}$ denote the matrix or vector transpose and Hermitian transpose, respectively. $\mathrm{diag}({\mathbf{a}})$ denotes a square diagonal matrix with the entries of ${\mathbf{a}}$ on its diagonal, $\mathbb{E}[\cdot]$ is the expectation operator, $\mathbf{0}$ denotes the all- zero vector, ${\mathbf{I}}_{M}$ denotes the $M\times M$ identity matrix, and $j=\sqrt{-1}$. $\|\cdot\|_{\mathrm{F}}$ and $\|\cdot\|_{*}$ denote the Frobenius norm and nuclear norm of a matrix, respectively, and $\|\cdot\|_{2}$ denotes the Euclidean norm of a vector. ## II System Model Figure 1: A typical scenario for maintaining the connectivity by deploying an RIS in a mmWave SIMO network. We consider a nearly-passive RIS-aided mmWave SIMO network, where the MS communicates with the BS via the RIS, as shown in Fig. 1. The BS and RIS are equipped with multiple antennas and with nearly-passive scattering elements, respectively, while the MS is equipped with a single antenna. We further assume that the direct MS-BS channel is blocked.111When the direct MS-BS channel exists, we can estimate it by setting the RIS into an absorption mode. Then, we can estimate the cascaded channel by subtracting the direct MS-BS channel. The RIS-BS channel, which is denoted as ${\mathbf{H}}_{1}\in\mathbb{C}^{M\times N}$ with $M$ and $N$ being the number of antennas and scattering elements at the BS and RIS, respectively, can be written as ${\mathbf{H}}_{1}=\sum\limits_{i=1}^{L_{1}}g_{1,i}\boldsymbol{\alpha}(\phi_{1,i})\boldsymbol{\alpha}^{\mathsf{H}}(\theta_{1,i})={\mathbf{A}}(\boldsymbol{\phi}_{1})\mathrm{diag}({\mathbf{g}}_{1}){\mathbf{A}}^{\mathsf{H}}(\boldsymbol{\theta}_{1}),$ (1) where $L_{1}\ll\mathrm{min}\\{M,N\\}$ is the number of channel paths, including one line-of-sight (LoS) path (with $i=1$) and multiple non-line-of- sight (NLoS) paths (with $i>1$), and $g_{1,i}\in\mathbb{C},$ $\theta_{1,i}\in\mathbb{R}$, and $\phi_{1,i}\in\mathbb{R}$ denote the propagation path gain, the angle of departure (AoD), and the angle of arrival (AoA) associated with the $i$th propagation path. The array response vector $\boldsymbol{\alpha}(\phi_{1,i})\triangleq[1,\;\;e^{j\pi\sin(\phi_{1,i})},\ldots,e^{j(M-1)\pi\sin(\phi_{1,i})}]^{\mathsf{T}}\in\mathbb{C}^{M\times 1}$ is obtained by assuming half-wavelength inter-element spacing, and $\boldsymbol{\alpha}(\theta_{1,i})\in\mathbb{C}^{N\times 1}$ can be formulated in the same manner. We assume that $g_{1,1}\sim\mathcal{CN}(0,\sigma_{\text{LoS}}^{2})$, and define the vectors $\tilde{{\mathbf{g}}}_{1}\triangleq[g_{1,2},\ldots,g_{1,L_{1}}]^{\mathsf{T}}\sim\mathcal{CN}(\mathbf{0},\sigma_{\text{NLoS}}^{2}{\mathbf{I}}_{L_{1}-1})$, ${\mathbf{g}}_{1}\triangleq[g_{1,1},\tilde{{\mathbf{g}}}_{1}^{\mathsf{T}}]^{\mathsf{T}}$, $\boldsymbol{\phi}_{1}\triangleq[\phi_{1,1},\ldots,\phi_{1,L_{1}}]^{\mathsf{T}}$, $\boldsymbol{\theta}_{1}\triangleq[\theta_{1,1},\ldots,\theta_{1,L_{1}}]^{\mathsf{T}}$, ${\mathbf{A}}(\boldsymbol{\phi}_{1})\triangleq[\boldsymbol{\alpha}(\phi_{1,1}),\ldots,\boldsymbol{\alpha}(\phi_{1,L_{1}})]$, and ${\mathbf{A}}(\boldsymbol{\theta}_{1})\triangleq[\boldsymbol{\alpha}(\theta_{1,1}),\ldots,\boldsymbol{\alpha}(\theta_{1,L_{1}})]$. Similarly, the MS-RIS channel ${\mathbf{h}}_{2}\in\mathbb{C}^{N\times 1}$ can be written as ${\mathbf{h}}_{2}=\sum\limits_{i=1}^{L_{2}}g_{2,i}\boldsymbol{\alpha}(\phi_{2,i})={\mathbf{A}}(\boldsymbol{\phi}_{2}){\mathbf{g}}_{2}.$ (2) All the channel parameters in ${\mathbf{h}}_{2}$ are defined as those in ${\mathbf{H}}_{1}$. We also assume $g_{2,1}\sim\mathcal{CN}(0,\sigma_{\text{LoS}}^{2})$, $\tilde{{\mathbf{g}}}_{2}\triangleq[g_{2,2},\ldots,g_{2,L_{2}}]^{\mathsf{T}}\sim\mathcal{CN}(\mathbf{0},\sigma_{\text{NLoS}}^{2}{\mathbf{I}}_{L_{2}-1})$, and define ${\mathbf{g}}_{2}\triangleq[g_{2,1},\tilde{{\mathbf{g}}}_{2}^{\mathsf{T}}]^{\mathsf{T}}$ and ${\mathbf{A}}(\boldsymbol{\phi}_{2})\triangleq[\boldsymbol{\alpha}(\phi_{2,1}),\ldots,\boldsymbol{\alpha}(\phi_{2,L_{2}})]$ with $L_{2}\ll N$. The end-to-end uplink MS-RIS-BS channel (including the effect of the RIS) can be written as ${\mathbf{h}}={\mathbf{H}}_{1}\boldsymbol{\Omega}{\mathbf{h}}_{2}={\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2})\boldsymbol{\omega},$ (3) where $\boldsymbol{\Omega}=\mathrm{diag}(\boldsymbol{\omega})$ is the RIS phase control matrix, with $\boldsymbol{\omega}=[\omega_{1},\ldots,\omega_{N}]^{\mathsf{T}}$ and $|\omega_{i}|=1$ for $\forall i$ [1]. It is worth noting that an RIS may be composed of an array of amplifiers with increased power consumption and hardware complexity [14]. In this case, the unit-modulus constraint on each element $\omega_{i}$ can be relaxed. In the present paper, we are interested in low-cost and low-complexity implementations of RISs, we hence focus on RISs that can control only the phase response. In (3), ${\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2})$ is referred to as the cascaded channel. By knowing it, we can optimize the design of the RIS phase control matrix and BS beamforming/combining vector. Let us define it as ${\mathbf{H}}_{c}\in\mathbb{C}^{M\times N}$, i.e., ${\mathbf{H}}_{c}={\mathbf{H}}_{1}\mathrm{diag}({\mathbf{h}}_{2}).$ (4) Based on the considered assumptions, we have $\mathrm{rank}({\mathbf{H}}_{1})=L_{1}$ and $\mathrm{rank}(\mathrm{diag}({\mathbf{h}}_{2}))=N$. Thus $\mathrm{rank}({\mathbf{H}}_{c})\leq\mathrm{min}\\{\mathrm{rank}({\mathbf{H}}_{1}),\\\ \mathrm{rank}(\mathrm{diag}({\mathbf{h}}_{2}))\\}=L_{1}$. The inherent channel sparsity (represented by the rank deficiency of the cascaded channel) can be applied in order to enable an efficient yet accurate CE of (4). ## III Learning to Estimate In this section, we first introduce the channel sounding procedure, and then describe the optimization problem formulation for recovering the cascaded channel by using conventional (model-based) methods. Finally, we describe the model-driven deep unfolding method for estimating the rank-deficient cascaded channel. ### III-A Channel Sounding During the sounding process, pilot signals are sent from the MS to the BS via the RIS. A different RIS phase control matrix is considered for each channel use while the combining matrix at the BS is fixed. The received signal at channel use $k$, for $k=1,\ldots,K$, can be written as ${\mathbf{y}}[k]={\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{H}}_{1}\boldsymbol{\Omega}[k]{\mathbf{h}}_{2}s[k]+{\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{n}}[k],$ (5) where ${\mathbf{W}}[k]\in\mathbb{C}^{M\times N_{\text{W}}}$ is the combining matrix at the BS with $N_{\text{W}}$ denoting the number of columns,222We consider an analog combining matrix, which is a suitable choice for fulfilling the requirements of reduced-complexity hybrid precoding architectures commonly assumed for mmWave MIMO transceivers. When $N_{\text{W}}>N_{\text{RF}}$, with $N_{\text{RF}}$ being the number of radio frequency (RF) chains at the BS, we need $K\lceil N_{\text{W}}/N_{\text{RF}}\rceil$ channel uses to complete the sounding process. Otherwise, $K$ channel uses are sufficient. $s[k]$ is the pilot signal sent by the MS, and ${\mathbf{n}}[k]\sim\mathcal{CN}(0,\sigma^{2})$ is the additive white Gaussian noise (AWGN) at the BS. The received signal ${\mathbf{y}}[k]$ in (5) can be reformulated as ${\mathbf{y}}[k]={\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{H}}_{c}\boldsymbol{\omega}[k]s[k]+{\mathbf{W}}^{\mathsf{H}}[k]{\mathbf{n}}[k],$ (6) where $\boldsymbol{\Omega}[k]=\mathrm{diag}(\boldsymbol{\omega}[k])$. Without loss of generality, we assume $s[1]=s[K]=1$ and ${\mathbf{W}}[1]={\mathbf{W}}[K]={\mathbf{W}}$. The received signals ${\mathbf{Y}}=[{\mathbf{y}}[1],\ldots,{\mathbf{y}}[K]]$ can be rewritten as ${\mathbf{Y}}={\mathbf{W}}^{\mathsf{H}}{\mathbf{H}}_{c}\bar{\boldsymbol{\Omega}}+{\mathbf{W}}^{\mathsf{H}}{\mathbf{N}},$ (7) where $\bar{\boldsymbol{\Omega}}=[\boldsymbol{\omega}[1],\ldots,\boldsymbol{\omega}[K]]$ and ${\mathbf{N}}=[{\mathbf{n}}[1],\ldots,{\mathbf{n}}[K]]$. An additional vectorization step is considered for all the terms in (7), resulting in ${\mathbf{y}}=(\bar{\boldsymbol{\Omega}}^{\mathsf{T}}\otimes{\mathbf{W}}^{\mathsf{H}}){\mathbf{h}}_{c}+{\mathbf{n}},$ (8) where ${\mathbf{y}}=\mathrm{vec}({\mathbf{Y}}),{\mathbf{h}}_{c}=\mathrm{vec}({\mathbf{H}}_{c})$, and ${\mathbf{n}}=\mathrm{vec}({\mathbf{W}}^{\mathsf{H}}{\mathbf{N}})$. Based on the vectorized received signal ${\mathbf{y}}$, we need to estimate the vectorized cascaded channel ${\mathbf{h}}_{c}$. Let us define $\boldsymbol{\Psi}=\bar{\boldsymbol{\Omega}}^{\mathsf{T}}\otimes{\mathbf{W}}^{\mathsf{H}}$. Then, (7) can be simplified as ${\mathbf{y}}=\boldsymbol{\Psi}{\mathbf{h}}_{c}+{\mathbf{n}}$. Based on the obtained signal model, the objective of this paper is to extract ${\mathbf{h}}_{c}$ from the noisy received signal ${\mathbf{y}}$ by assuming that the matrix $\boldsymbol{\Psi}$ is known. This is accomplished by using the deep unfolding method, which is detailed next. ### III-B Optimization Problem Formulation In order to recover ${\mathbf{h}}_{c}$ from the noisy observation ${\mathbf{y}}$, we formulate the following regularized optimization problem $\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\mathrm{rank}({\mathbf{H}}_{c}),$ (9) which takes into consideration the rank deficiency of the cascaded channel ${\mathbf{H}}_{c}$ and the impact of noise [15]. The regularization parameter $\lambda>0$ is introduced to control the tradeoff between the data fitting and the rank of the cascaded channel. The optimization problem in (9) can be further reformulated as $\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{H}}_{c}\|_{*},$ (10) which is obtained by relaxing $\mathrm{rank}({\mathbf{H}}_{c})$ with its nuclear norm, i.e., $\|{\mathbf{H}}_{c}\|_{*}$. This is a convenient approach because $\mathrm{rank}({\mathbf{H}}_{c})$ is a noncovex function of ${\mathbf{H}}_{c}$. In addition, $\|{\mathbf{H}}_{c}\|_{\mathrm{F}}\leq\|{\mathbf{H}}_{c}\|_{*}\leq\sqrt{r}\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$ with $r\geq 1$. Notably, when $\mathrm{rank}({\mathbf{H}}_{c})=1$ (e.g., ${\mathbf{H}}_{1}$ has only the LoS path), we have $\|{\mathbf{H}}_{c}\|_{*}=\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$. Also, the singular values of ${\mathbf{H}}_{c}$ have a high probability to fulfill the following condition: $\sigma_{1}\gg\sigma_{2}>\cdots>\sigma_{L_{1}}$ with $\sigma_{i}$ being the $i$th largest singular value of ${\mathbf{H}}_{c}$, which results in $\|{\mathbf{H}}_{c}\|_{*}\approx\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$. Thus, we further replace $\mathrm{rank}({\mathbf{H}}_{c})$ in (10) with $\|{\mathbf{H}}_{c}\|_{\mathrm{F}}$, i.e., $\|{\mathbf{h}}_{c}\|_{2}$, which yields $\hat{{\mathbf{h}}}_{c}=\arg\min_{{\mathbf{h}}_{c}}\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{h}}_{c}\|_{2}.$ (11) To accurately solve this optimization problem, we need to carefully choose the regularization parameter $\lambda$. The optimal value of $\lambda$ is, however, difficult to obtain. As a reference, $\lambda$ is chosen equal to $4\sigma^{2}\sqrt{\frac{MN(M+N)\log(M+N)}{N_{\text{W}}K}}$ [15]. ### III-C Model-Driven Deep Unfolding Deep unfolding is a deep neural network framework that mimics the conventional gradient descent method. The difference lies in that deep unfolding is able to learn from a large amount of (synthetic) data with enhanced performance and reduced online implementation complexity and number of iterations. Typically, this is exemplified in a reduced number of layers in the deep unfolding network. When solving the optimization problem in (11) by using the (conventional) gradient descent method, we iteratively update ${\mathbf{h}}_{c}^{(i)}$, with $(i)$ denoting the iteration index, as follows ${\mathbf{h}}_{c}^{(i)}={\mathbf{h}}_{c}^{(i-1)}-\beta\nabla f({\mathbf{h}}_{c}^{(i-1)}),$ (12) where $0<\beta<1$ is the step size and $\nabla f({\mathbf{h}}_{c}^{(i-1)})$ is the gradient of $f({\mathbf{h}}_{c})=\|{\mathbf{y}}-\boldsymbol{\Psi}{\mathbf{h}}_{c}\|_{2}^{2}+\lambda\|{\mathbf{h}}_{c}\|_{2}$ evaluated at ${\mathbf{h}}_{c}^{(i-1)}$, which can be expressed as $\nabla f({\mathbf{h}}_{c}^{(i-1)})=(\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}-\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}})+\lambda{\mathbf{h}}_{c}^{(i-1)}/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2},$ (13) when $\lambda$ is fixed. The initial value, i.e, ${\mathbf{h}}_{c}^{(0)}$, can be set equal to the all-zero vector. In this case, the denominator $\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}$ in the last term of (13) needs to be modified as $\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}+\epsilon$ with $\epsilon>0$ when $i=1$. Substituting (13) into (12), we obtain ${\mathbf{h}}_{c}^{(i)}={\mathbf{h}}_{c}^{(i-1)}-\beta\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}+\beta\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}-\beta\lambda{\mathbf{h}}_{c}^{(i-1)}/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}.$ (14) The Gram matrix $\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}$, the compressed statistics $\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}$, and ${\mathbf{h}}_{c}^{(i-1)}$, are needed to apply the gradient descent algorithm. Therefore, these three terms constitute the input variables of the deep unfolding neural network model. To be specific, the $i$th layer of the deep unfolding model for mimicking the gradient descent iteration in (14) is introduced in Fig. 2. The accuracy and convergence speed of the channel estimate in (14) highly depends on the specific choice of the step size $\beta$ and the regularization parameter $\lambda$. In the considered deep unfolding model, these parameters are learnable parameters that are automatically determined during the data-driven training phase. To this end, we introduce three generalized learnable parameters $\delta_{1}^{(i)}\in[-1,\;0]$, $\delta_{2}^{(i)}\in[0,\;1]$, and $\delta_{3}^{(i)}\in[-1,\;0]$, for the $i$th layer of the deep unfolding model in Fig. 2. In (14), more specifically, $-\beta$ and $\beta$ in the second and third term are replaced by $\delta_{1}^{(i)}$ and $\delta_{2}^{(i)}$, respectively, and the product $-\beta\lambda/\|{\mathbf{h}}_{c}^{(i-1)}\|_{2}$ in the last term is enfolded in the learnable parameter $\delta_{3}^{(i)}$. As shown in Fig. 2, in order to further enhance the prediction capabilities of the deep unfolding network model, we serially concatenate the term ${\mathbf{h}}_{c}^{(i-1)}+\delta_{1}^{(i)}\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi}{\mathbf{h}}_{c}^{(i-1)}+\delta_{2}^{(i)}\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}+\delta_{3}^{(i)}{\mathbf{h}}_{c}^{(i-1)}$ with a learnable weight matrix ${\mathbf{M}}^{(i)}$, a bias vector ${\mathbf{b}}^{(i)}$, and a non-linear activation function. The complete deep unfolding network model is illustrated in Fig. 3 and it comprises $L$ layers from Fig. 2. In particular, the observations $\\{\boldsymbol{\Psi}^{\mathsf{H}}\boldsymbol{\Psi},\boldsymbol{\Psi}^{\mathsf{H}}{\mathbf{y}}\\}$ are input to all the layers of the deep unfolding network model. Figure 2: The $i$th layer of the deep unfolding network model for estimating the cascaded channel vector. Figure 3: Complete deep unfolding network model for channel estimation, which comprises $L$ layers from Fig. 2 ## IV Numerical Results In this section, we evaluate the performance of the proposed deep unfolding network model against two benchmark schemes: (i) the LS estimator and (ii) the direct solution of (10) by using the CVX toolbox. We evaluate the impact of the training overhead, the training SNR, the number of paths, and the angular parameter distribution. As far as the RIS phase control matrices as concerned, their diagonal elements are set equal to the column vectors of a discrete Fourier transform (DFT) matrix. A set of orthonormal vectors are considered for ${\mathbf{W}}$, e.g., the normalized column vectors from a DFT matrix. It is worth mentioning that we transform the data from the complex-valued domain to the real-valued domain before applying the deep unfolding network model. The channel ${\mathbf{h}}_{c}^{(0)}$ is set equal to the all-zero vector. In the first $L-1$ layers, we use relu activation functions, while no activation function is applied in the last layer. The loss function during the training phase is the NMSE between the output cascaded channel vector and the ground- truth cascaded channel vector. The Adam algorithm is used for training, whose learning rate is $0.001$ during the first $20$ epochs and it is halved in the remaining epochs, and the batch size is $64$. We use $1e5$ samples for training and $1e4$ samples for testing. The rest of the parameter setup is given in Table I. ### IV-A Impact of the Training Overhead Fig. 4 shows the NMSE for a $1\times 16$ SIMO system (i.e., $M=16$) by using the proposed deep unfolding approach as a function of the training overhead. During the training phase, the SNR is $\gamma=1/\sigma^{2}=20$ dB. From Fig. 4, we see that the proposed scheme with $K=24$ channel uses for training outperforms the LS estimator even if the latter uses a longer training phase with $K=32$. Also, as expected, the higher the training overhead is, the lower the NMSE of the proposed scheme is. It is worth noting that the proposed deep unfolding method outperforms the numerical solution of (10) by using CVX. This is attributed to the learning capability of the deep unfolded network through the learnable parameters introduced in Fig. 2. TABLE I: Parameter Setup. Parameter | Value ---|--- $L_{1}$ | $\\{1,2,3\\}$ $L_{2}$ | $\\{1,2,3\\}$ $\sigma_{\text{LoS}}^{2}$ | $1$ $\sigma_{\text{NLoS}}^{2}$ | $0.01$ $M$ | $16$ $N$ | $32$ $L$ | $15$ $\sin(\boldsymbol{\theta}_{1}),\sin(\boldsymbol{\phi}_{1}),\sin(\boldsymbol{\phi}_{2})$ | $\mathcal{U}[0,\;1]$ $K$ | $\\{24,28\\}$ $N_{\text{W}}$ | $8$ Figure 4: Impact of training overhead on estimating the cascaded channel for a $1\times 16$ SIMO system with $N=32$ and $L_{1}=L_{2}=1$. Deep unfolding vs. LS estimation and direct solution of (10). ### IV-B Impact of the Number of Paths In this subsection, we study the impact of the number of paths, which is increased from one to two and three. The SNR for training is $\gamma=20$ dB and $K=28$. The corresponding NMSE is shown in Fig. 5. When the number of paths increases, the rank of the cascaded channel increases accordingly. In this case, Fig. 5 shows that the NMSE increases as the number of paths increases. In other words, by keeping the training overhead fixed, the proposed deep unfolding method benefits from the sparsity of the channel, i.e., the number of paths is small. Figure 5: Impact of the number of paths on estimating the cascaded channel for a $1\times 16$ SIMO system with $N=32$. ### IV-C Impact of the Training SNR In this subsection, we study the impact of the training SNR on the estimation performance. Two SNR values, i.e., $\gamma=0$ dB, $\gamma=20$ dB, and an SNR that varies in the set $\gamma\in\\{0,5,10,15,20\\}$ dB are considered. The corresponding NMSE is shown in Fig. 6. We observe that the proposed deep unfolding method provides the best NMSE when it is trained at a high SNR except if the operating SNR during the test phase is too low. Figure 6: Impact of the training SNR on estimating the cascaded channel for a $1\times 16$ SIMO system with $N=32$. ### IV-D Impact of the Angular Parameter Distribution In this subsection, we evaluate the impact of the angular parameter distribution when estimating the cascaded channel. The corresponding NMSE is shown in Fig. 7. We observe that the NMSE decreases when the range of $\sin(\boldsymbol{\theta}_{1}),\sin(\boldsymbol{\phi}_{1}),\sin(\boldsymbol{\phi}_{2})$ decreases. In other words, the estimation accuracy of the proposed deep unfolding method increases when the individual channels are subject to a reduced variability. Figure 7: Impact of the angular parameter distribution on estimating the cascaded channel for a $1\times 16$ SIMO system with $N=32$. ## V Conclusions In this letter, we have introduced a deep unfolding model for efficiently estimating the end-to-end RIS channel in mmWave SIMO systems. With the aid of simulation results, we have shown that the proposed approach can outperform two benchmark schemes based on the LS method and a CVX-based numerical solution of the channel estimation problem. The impact of the number of paths, the training SNR, and the angular parameter distribution on the estimation accuracy has been investigated. In addition, the proposed deep unfolding network model has a low online prediction complexity, since it requires the computation of vector matrix multiplications and additions. On the other hand, the LS estimation methods usually require a matrix inversion. Possible generalizations of the present work include the channel estimation problem in RIS-aided multiuser MIMO systems, and the joint optimization of the active and passive beamforming at the BS and at the RIS, respectively. ## References * [1] Q. Wu and R. Zhang, “Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts,” _IEEE Trans. Commun._ , pp. 1–1, 2019. * [2] C. Liaskos, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. F. Akyildiz, “Using any surface to realize a new paradigm for wireless communications,” _Communications of the ACM_ , vol. 61, pp. 30–33, 2018. * [3] M. Di Renzo et al., “Smart radio environments empowered by reconfigurable AI meta-surfaces: an idea whose time has come,” _EURASIP J. Wireless Comm. and Networking_ , vol. 2019, p. 129, 2019. * [4] H. Wymeersch, J. He, B. Denis, A. Clemente, and M. Juntti, “Radio localization and mapping with reconfigurable intelligent surfaces: Challenges, opportunities, and research directions,” _IEEE Veh. Technol. Mag._ , vol. 15, no. 4, pp. 52–61, 2020. * [5] M. Di Renzo et al., “Smart radio environments empowered by reconfigurable intelligent surfaces: How it works, state of research, and the road ahead,” _IEEE J. Sel. Areas Commun._ , vol. 38, no. 11, pp. 2450–2525, 2020. * [6] E. Basar et al., “Wireless communications through reconfigurable intelligent surfaces,” _IEEE Access_ , vol. 7, pp. 116 753–116 773, 2019\. * [7] J. He, M. Leinonen, H. Wymeersch, and M. Juntti, “Channel estimation for RIS-aided mmWave MIMO channels,” in _proc. IEEE Global Communications Conference_ , 2020, pp. 1–6. * [8] J. He, H. Wymeersch, and M. Juntti, “Channel estimation for RIS-aided mmWave MIMO systems via atomic norm minimization,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2021. * [9] Z. He and X. Yuan, “Cascaded channel estimation for large intelligent metasurface assisted massive MIMO,” _IEEE Wireless Commun. Lett._ , vol. 9, no. 2, pp. 210–214, Feb 2020. * [10] A. Zappone, M. Di Renzo, and M. Debbah, “Wireless networks design in the era of deep learning: Model-based, AI-based, or both?” _IEEE Trans. Commun._ , vol. 67, no. 10, pp. 7331–7376, 2019. * [11] A. M. Elbir, A. Papazafeiropoulos, P. Kourtessis, and S. Chatzinotas, “Deep channel learning for large intelligent surfaces aided mm-wave massive MIMO systems,” _IEEE Wireless Commun. Lett._ , vol. 9, no. 9, pp. 1447–1451, 2020. * [12] N. Samuel, T. Diskin, and A. Wiesel, “Learning to detect,” _IEEE Trans. Signal Process._ , vol. 67, no. 10, pp. 2554–2564, 2019. * [13] K. Gregor and Y. LeCun, “Learning fast approximations of sparse coding,” in _proc. international conference on machine learning_ , 2010, pp. 399–406. * [14] N. Landsberg and E. Socher, “A low-power 28-nm CMOS FD-SOI reflection amplifier for an active F-band reflectarray,” _IEEE Transactions on Microwave Theory and Techniques_ , vol. 65, no. 10, pp. 3910–3921, 2017. * [15] Y. Chen and Y. Chi, “Harnessing structures in big data via guaranteed low-rank matrix estimation: Recent theory and fast algorithms via convex and nonconvex optimization,” _IEEE Signal Process. Mag._ , vol. 35, no. 4, pp. 14–31, 2018.
arxiv-papers
2021-07-27T06:57:56
2024-09-04T03:07:20.797251
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jiguang He and Henk Wymeersch and Marco Di Renzo and Markku Juntti", "submitter": "Jiguang He", "url": "https://arxiv.org/abs/2107.12631" }
2107.12636
# Exploring Sequence Feature Alignment for Domain Adaptive Detection Transformers Wen Wang1, Yang Cao1,2, Jing Zhang3, Fengxiang He4, Zheng-Jun Zha1 and Yonggang Wen5, Dacheng Tao4 1 University of Science and Technology of China 2 Institute of Artificial Intelligence, Hefei Comprehensive National Science Center 3 The University of Sydney, 4 JD Explore Academy, China, 5 Nanyang Technological University [email protected], forrest, [email protected], [email protected], hefengxiang, [email protected], [email protected] (2021) ###### Abstract. Detection transformers have recently shown promising object detection results and attracted increasing attention. However, how to develop effective domain adaptation techniques to improve its cross-domain performance remains unexplored and unclear. In this paper, we delve into this topic and empirically find that direct feature distribution alignment on the CNN backbone only brings limited improvements, as it does not guarantee domain- invariant sequence features in the transformer for prediction. To address this issue, we propose a novel Sequence Feature Alignment (SFA) method that is specially designed for the adaptation of detection transformers. Technically, SFA consists of a domain query-based feature alignment (DQFA) module and a token-wise feature alignment (TDA) module. In DQFA, a novel domain query is used to aggregate and align global context from the token sequence of both domains. DQFA reduces the domain discrepancy in global feature representations and object relations when deploying in the transformer encoder and decoder, respectively. Meanwhile, TDA aligns token features in the sequence from both domains, which reduces the domain gaps in local and instance-level feature representations in the transformer encoder and decoder, respectively. Besides, a novel bipartite matching consistency loss is proposed to enhance the feature discriminability for robust object detection. Experiments on three challenging benchmarks show that SFA outperforms state-of-the-art domain adaptive object detection methods. Code has been made available at: https://github.com/encounter1997/SFA. Object Detection, Detection Transformer, Domain Adaptation, Feature Alignment, Matching Consistency This work was done during Wen Wang’s internship at JD Explore Academy. Corresponding Author: Yang Cao, Jing Zhang ††journalyear: 2021††copyright: acmcopyright††conference: Proceedings of the 29th ACM International Conference on Multimedia; October 20–24, 2021; Virtual Event, China††booktitle: Proceedings of the 29th ACM International Conference on Multimedia (MM ’21), October 20–24, 2021, Virtual Event, China††price: 15.00††doi: 10.1145/3474085.3475317††isbn: 978-1-4503-8651-7/21/10††ccs: Theory of computation Machine learning theory††ccs: Computing methodologies Computer vision problems ## 1\. Introduction Figure 1. (a) Performance comparison between feature distribution alignment applied on the CNN backbone and transformer (denoted as DA-CNN and DA-Seq, respectively). Both methods are built on the Deformable DETR (Zhu et al., 2020) with a ResNet-50 backbone and evaluated on the Cityscapes (Cordts et al., 2016) to Foggy Cityscapes (Sakaridis et al., 2018) scenario. (b) T-SNE visualization of features extracted by DA-CNN. While the CNN features are well-align, the sequence feature extracted by transformer encoder and decoder can be easily separated by domain. pipeline Object Detection is one of the fundamental tasks in computer vision and is an essential and prepositive step for multimedia applications like captioning (Zha et al., 2019; Zhang et al., 2020), visual grounding (Liu et al., 2019), texture analysis (Zhai et al., 2019, 2020), person re-identification / person search (Zheng et al., 2020a, 2021, b), etc.. Tremendous progress has been made by CNN-based object detection methods in the last decade, e.g., Faster RCNN (Ren et al., 2016), SSD (Liu et al., 2016) and FCOS (Tian et al., 2019). However, they rely on heuristics like non-maximum suppression (NMS), and are not fully end-to-end. Recently, detection transformers, e.g., DETR (Carion et al., 2020) and Deformable DETR (Zhu et al., 2020), have attracted increasing attention due to their merits of fully end-to-end pipeline and promising performance. While effective, all these methods rely heavily on the labeled training data, and suffer significant performance drops when the test data and training data are sampled from different distributions, due to domain shifts. To tackle this problem, unsupervised domain adaptive object detection (DAOD) (Chen et al., 2018) attempts to train an object detector on the labeled source domain that can be generalized to the unlabeled target domain. Existing DAOD methods (Chen et al., 2018; Kim et al., 2019a; Hsu et al., 2020) have achieved significant progress in improving the cross-domain performance for specific object detection models, such as based on Faster RCNN, SSD, and FCOS. With the recent surge of detection transformers, it is natural to ask, can we empower them with such a capability to perform accurate object detection in cross- domain scenarios? A vanilla idea to solve this problem is to apply adversarial feature distribution alignment (Ganin et al., 2016) on features extracted by the CNN backbone (He and Zhang, 2019; Saito et al., 2019). As shown in Figure 1 (a), direct feature alignment on the CNN backbone (denoted as DA-CNN) does improve the detection transformer’s cross-domain performance, yet the improvement is limited. We argue that this is because the feature distribution alignment on the CNN backbone does not guarantee domain-invariant sequence features in the subsequent transformer, which are directly utilized for prediction. In Figure 1 (b), we visualize the distribution of features extracted by DA-CNN. While the source and target features extracted by the CNN backbone are well-aligned, the sequence features extracted by the transformer encoder can be separated by domain. Moreover, as the network goes deeper, the distribution gaps in the decoder feature become even more significant. As a result, the detection transformer obtains inferior performance based on the shifted sequence features. To tackle this problem, we propose a novel sequence feature alignment (SFA) method that is specially designed for the domain adaptation of detection transformers. SFA consists of a domain query-based feature alignment (DQFA) module and a token-wise feature alignment (TDA) module upon the transformer structure. Specifically, the DQFA utilizes a novel domain query to aggregate global context from the sequence for feature alignment. When applied to the transformer encoder and decoder, DQFA alleviates the domain gaps on global- level and object relations, respectively. Meanwhile, the TDA focus on feature alignment of each token in the sequence, it effectively closes domain gaps at local- and instance-level when applied to the encoder and decoder, respectively. Besides, a novel bipartite matching consistency loss is proposed to regularize the detection transformer and improve its discriminability for robust object detection. Experiments on three challenging benchmarks show that SFA significantly improves detection transformers’ cross-domain performance and outperforms existing DAOD methods built on various object detectors. The main contribution of this paper can be summarized as follows: * • We dedicate to improving detection transformers’ cross-domain performance, which is still unexplored and unclear. Empirically, we observe that direct feature distribution alignment on the CNN backbone only brings limited improvements, as it does not guarantee domain-invariant sequence features in the transformer for prediction. * • We propose Sequence Feature Alignment (SFA) that is specially designed for domain adaptation of detection transformers. It consists of a domain query- based feature alignment (DQFA) module and a token-wise feature alignment (TDA) module for aligning sequence features on a global- and local-level, respectively. Moreover, we provide technical insight on the explicit meanings of these modules when applied to the transformer encoder and decoder. * • A novel bipartite matching consistency loss is proposed to further regularize the sequence features and improve the discriminability of the detection transformers. * • Extensive experiments on three challenging domain adaptation scenarios, including weather adaptation, synthetic to real adaptation, and scene adaptation, verify the effectiveness of our method, where SFA outperforms existing DAOD methods and achieves state-of-the-art (SOTA) performance. ## 2\. Related work ### 2.1. Object Detection Object detection is one of the fundamental tasks in computer vision (Chen et al., 2020; Zhang and Tao, 2020). Representative deep learning-based object detectors can be roughly categorized as two-stage methods, e.g., Faster RCNN (Ren et al., 2016), and single-stage methods, e.g., YOLO (Redmon et al., 2016) and SSD (Liu et al., 2016). While the former ones generally show better performance, the latter ones are faster during inference. Although significant progress has been made, these object detectors are not fully end-to-end and heavily rely on hand-crafted components, such as anchor box generation and non-maximum suppression (NMS) post-processing. Recently, DETR (Carion et al., 2020) provides a simple and clean pipeline for object detection. It views object detection as a direct set prediction problem and explores transformer (Vaswani et al., 2017; Ding et al., 2020; Shen et al., 2021a, b) and bipartite matching for effective object detection. The success of DETR brought the recent surge of detection transformers. Deformable DETR (Zhu et al., 2020) proposes a novel deformable attention, which speeds up model training with learnable sparse sampling and improves model performance by integrating multi- scale features. UP-DETR (Dai et al., 2020) introduces a novel self-supervised pre-training scheme to improve the performance of DETR with faster convergence. #### 2.1.1. Formulation of Detection Transformers The detection transformer models generally consist of three parts: the CNN backbone for base feature extraction, the transformer for sequence feature modeling, and feed-forward network (FFN) for prediction. The CNN backbone extracts hierarchical feature representation ${\\{f^{l}\\}}_{l=1}^{L}$ from the input images, where $L$ is the number of feature levels and $f^{l}\in\mathbb{R}^{H^{l}\times W^{l}\times C^{l}}$ is the $l$-th feature map. Afterwards, the hierarchical features are flatten and embedded to form an one-dimensional sequence $f_{e}\in\mathbb{R}^{N\times C}$, whose length is $N=\sum_{l=1}^{L}H^{l}W^{l}$ and the dimension of feature embeddings is $C$. The input of the transformer is denoted as ${z}_{0}$, which is $f_{e}$ augmented with explicit embeddings such as positional embedding and level embedding (Zhu et al., 2020). The transformer consists of an encoder and a decoder. The encoder is a stack of $L_{enc}$ encoder layers. Each encoder layer $\text{EncLayer}_{\ell}$ takes previous layer’s output ${z}_{\ell-1}$ and the sample position reference ${p}_{\ell}$ as input and outputs the encoded sequence feature ${z}_{\ell}$ as follows, (1) ${z}_{\ell}=\text{EncLayer}_{\ell}\left({z}_{\ell-1},{p}_{\ell}\right),\quad\ell=1\ldots L_{enc}.$ Similarly, the decoder is a stack of $L_{dec}$ decoder layers. The input token sequence in the transformer decoder is initialized as $q_{0}$, each decoder layer $\text{DecLayer}_{\ell}$ takes the previous decoder layer’s output ${q}_{\ell-1}$, the sample position reference ${p}_{\ell}$, and the encoder output ${z}_{L_{enc}}$ as input and outputs the decoded sequence features as follows, (2) ${q}_{\ell}=\text{DecLayer}_{\ell}\left({q}_{\ell-1},{p}_{\ell-1},{z}_{L_{enc}}\right),\quad\ell=1\ldots L_{{dec}}.$ Detection transformers (Carion et al., 2020; Zhu et al., 2020) usually adopt deep supervision (Lee et al., 2015) to facilitate model training. Classification probability vectors and bounding boxes are predicted based on the output of each decoder layer by the FFN, and are used to compute the auxiliary loss on the source domain. We denote the supervised loss on the source domain as $\mathcal{L}_{{det}}$, which is defined in (Carion et al., 2020; Zhu et al., 2020). ### 2.2. Domain Adaptive Object Detection Domain adaptive object detection (DAOD) has been raised very recently for unconstrained scenes(Chen et al., 2018). DAF (Chen et al., 2018) adopts adversarial feature alignment (Ganin et al., 2016; ZHANG et al., 2019) at both image-level and instance-level. SWDA (Saito et al., 2019) adopts strong alignment on local features and weak alignment on global features from the CNN backbone. SCDA (Zhu et al., 2019) aligns region-level features across domains via grouping instances into regions. MTOR (Cai et al., 2019) integrates object relations into the measure of consistency cost between teacher and student modules for adaptation. Xu et al.(Xu et al., 2020b) explore image-level categorical regularization and categorical consistency regularization for robust detection across domains. GPA (Xu et al., 2020a) explores graph-induced prototype and class reweighted contrastive loss for effective feature alignment and adaptation. While these methods are built on the seminal Faster RCNN (Ren et al., 2016), Kim et al.(Kim et al., 2019a) propose an SSD-based domain adaptive object detector and explore effective self-training and adversarial background regularization for adaptation. Hsu et al.(Hsu et al., 2020) build an adaptive object detector base on FCOS. They estimating pixel- wise objectness and centerness and adopting center-aware feature alignment to close the domain gaps. Although significant progress has been made, most of these methods rely on specific model architecture, e.g., Faster RCNN, SSD, and FCOS, therefore cannot be directly applied to detection transformers. In this paper, we dedicate to improve detection transformers’ cross-domain performance, which is still unexplored and unclear. Figure 2. Diagram of our sequence feature alignment (SFA) for domain adaptive detection transformers. Domain query-based feature alignment and token-wise feature alignment tackles global and local domain gaps, respectively. Moreover, a bipartite matching consistency loss is proposed to improve the model’s discriminability. Here object queries with the same color are matched to the same ground-truth object, while object queries with the same shape come from the same decoder layer. model ## 3\. Methods This section introduces our Sequence Feature Alignment (SFA) for domain adaptive detection transformers. In unsupervised domain adaptation, the training data includes the labeled source images and the unlabeled target images. Our goal is to train an object detector on the training data that can generalize to the target domain. As described in Section 1, feature distribution alignment on the CNN backbone only brings limited improvements, as it does not guarantee domain-invariant sequence features in transformer, which are directly utilized for final prediction. To solve the problem, we explore effective distribution alignment on the sequence features in transformer. Specifically, domain query-based sequence feature alignment (Section 3.1) and token-wise sequence feature alignment (Section 3.2) equipped with a hierarchical domain adaptation strategy (Section 3.3) are proposed. Moreover, in Section 3.4, we explore bipartite matching consistency to constrain the sequence features, which further improve detection transformer’s discriminability on the target domain. The overall framework of our SFA is shown in Figure 2. We use Deformable DETR (Zhu et al., 2020) as the default detection framework, while our sequence feature alignment can also be applied to other detection transformer methods, e.g., DETR (Carion et al., 2020). ### 3.1. Domain Query-based Feature Alignment To obtain domain-invariant sequence features, we first propose the domain query-based feature alignment to align source and target features from a global perspective. Specifically, on the encoder side, a domain query embedding ${q}_{{d}}^{{enc}}$ is concatenated with the token sequence to form the input ${z}_{0}$ to transformer encoder, $i.e.$, (3) $\displaystyle{z}_{0}=\left[{q}_{{d}}^{{enc}};{f}_{e}^{1};{f}_{e}^{2};\cdots;{f}_{e}^{{N}}\right]+{E}_{{pos}}+{E}_{{level}},$ where ${E}_{{pos}}\in\mathbb{R}^{(N+1)\times C}$ is the positional embedding, ${E}_{{level}}\in\mathbb{R}^{(N+1)\times C}$ is the feature level embedding (Zhu et al., 2020). In the encoding process, the domain query aggregates domain-specific features from the whole sequence in an adaptive manner. It encodes the global context in input images and puts more concentration on tokens with significant domain gaps. We input this domain query into a domain discriminator $D_{{enc}_{{q}}}$ for feature alignment, $i.e.$, (4) $\mathcal{L}_{{enc}_{q}}^{\ell}=d\log{D}_{{enc}_{{q}}}\left({z}_{\ell}^{0}\right)+(1-d)\log\left(1-{D}_{{enc}_{{q}}}\left({z}_{\ell}^{0}\right)\right),$ where $\ell=1\ldots L_{{enc}}$ indexes layers in the encoder, $d$ is the domain label, which values 0 for source images and 1 for target images. Similarly, we concatenate a domain query ${q}_{{d}}^{{dec}}$ with the object queries to obtain the input sequence to the transformer decoder: (5) ${q}_{0}=\left[{q}_{{d}}^{{dec}};{q}^{1};{q}^{2};\cdots;{q}^{M}\right]+{E}_{{pos}}^{{}^{\prime}},\quad$ where ${E}_{{pos}}^{{}^{\prime}}\in\mathbb{R}^{\left({M}+1\right)\times C}$ is the positional embedding and ${q}^{i}$ is the $i$-th object query in the sequence. In the decoding process, the domain query fuses context features from each object query in the sequence, which explicitly models the object relations. We feed the domain query to domain discriminator ${D}_{{dec}_{{k}}}$ for feature alignment: (6) $\mathcal{L}_{dec_{q}}^{\ell}=d\log{D}_{{dec}_{{k}}}\left({q}_{\ell}^{0}\right)+(1-d)\log\left(1-{D}_{{dec}_{{q}}}\left({q}_{\ell}^{0}\right)\right),$ where $\ell=1\ldots L_{dec}$ indexes the layers in the transformer decoder. ##### Remarks. Although both encoder and decoder adopt the domain query to perform sequence feature alignment for reducing domain gaps, it should be noted that they have different implications. Specifically, since the sequence features in the encoder are derived from feature maps extracted by the CNN backbone, the domain query aggregates global features that reflect scene layout in images for alignment. While the sequence features in the decoder represent object instances, thus the domain query encodes object relationships for adaptation. Moreover, with the help of the attention mechanism and adversarial learning, the domain query-based feature alignment adaptively puts more effort on aligning features with significant domain gaps, while less effort on features with smaller ones. ### 3.2. Token-wise Feature Alignment The domain query-based global feature alignment can effectively close global domain gaps in scene layout and inter-object relationships, but it struggles to address the domain shift caused by local texture and style. To solve this problem, we propose token-wise sequence feature alignment and apply it to both encoder and decoder. Specifically, each token embedding in the encoder sequence are fed into a domain classifier ${D}_{{enc}_{{k}}}$ for adversarial feature alignment: (7) $\mathcal{L}_{enc_{k}}^{\ell}=-\frac{1}{N}\sum_{i=1}^{N}\left[d\log{D}_{{enc}_{{k}}}\left({z}_{\ell}^{i}\right)+(1-d)\log\left(1-{D}_{{enc}_{{k}}}\left({z}_{\ell}^{i}\right)\right)\right].$ Similarly, a domain discriminator $D_{\operatorname{dec}_{k}}$ is attached on the decoder side to align each token embedding in the decoder sequence, $i.e.$, (8) $\mathcal{L}_{dec_{k}}^{\ell}=-\frac{1}{M}\sum_{i=1}^{M}\left[d\log D_{{dec}_{k}}\left({q}_{\ell}^{i}\right)+(1-d)\log\left(1-D_{{dec}_{q}}\left({q}_{\ell}^{i}\right)\right)\right].$ ##### Remarks. Although both encoder and decoder adopt the token-wise sequence feature alignment, it should be noted that they have different implications. Specifically, since each token in the encoder sequence represents a local area of the image, the token-wise sequence feature alignment here alleviates domain gaps caused by local texture, appearance, etc.. By contrast, each token at the decoder side represents an individual object, therefore, the token-wise sequence feature alignment closes domain gaps at the instance level. It should be noted that the domain query-based feature alignment cannot be replaced by the token-wise feature alignment. Although tokens in transformer also aggregate global features to some extent, they are generated from small image patch (tokens in encoder sequence) or target at one specific object instance (tokens in decoder sequence), thus they inherently have the tendency to focus more on local content of the image (with more weight on themselves and their close neighbors during the attention process). By contrast, domain queries do not need to focus on local features or instances, thus can better aggregate global context and close domain gaps related to scene layout and inter-object relationships without bias. ### 3.3. Hierarchical Sequence Feature Alignment To achieve a more comprehensive feature alignment, we adopt hierarchical feature alignment to progressively align the source and target sequence features in a shallow to deep manner. The hierarchical feature alignment on sequences in the transformer encoder is described as: (9) $\mathcal{L}_{enc}=\sum_{l=1}^{L_{enc}}\left(\mathcal{L}_{enc_{k}}^{\ell}+\lambda_{enc_{q}}\mathcal{L}_{enc_{q}}^{\ell}\right),$ where $\lambda_{enc_{q}}$ is a hyperparameter to balance the query-based alignment loss and token-based alignment loss. It is set as 0.1 in our experiments. Similarly, the hierarchical feature alignment is applied on the sequence features in the transformer decoder, $i.e.$, (10) $\mathcal{L}_{dec}=\sum_{l=1}^{L_{dec}}\left(\mathcal{L}_{dec_{k}}^{\ell}+\lambda_{dec_{q}}\mathcal{L}_{dec_{q}}^{\ell}\right),$ where $\lambda_{dec_{q}}$ is a hyperparameter similar to $\lambda_{enc_{q}}$, and is also set as 0.1 in our experiments. For both encoder and decoder, 3-layer MLPs are adopted as the discriminators. Hierarchical feature alignment facilitates better alignment on the sequence features. ### 3.4. Bipartite Matching Consistency Detection transformers (Carion et al., 2020; Zhu et al., 2020) adopt deep supervision (Lee et al., 2015) for training. Auxiliary output are generated on each decoder layer. The auxiliary output on the $\ell$-th decoder layer is denoted as $\hat{y}_{\ell}$, which contains predictions for $M$ object instances. Prediction for each instance includes a class probability vector $\hat{c}_{\ell}^{i}$ and a bounding box prediction $\hat{b}_{\ell}^{i}$. The auxiliary output can be written as: (11) $\hat{y}_{\ell}=\left[\left(\hat{c}_{\ell}^{1},\hat{b}_{\ell}^{1}\right),\left(\hat{c}_{\ell}^{2},\hat{b}_{\ell}^{2}\right),\ldots,\left(\hat{c}_{\ell}^{M},\hat{b}_{\ell}^{M}\right)\right].$ Detection transformers view object detection as a set prediction problem, and use bipartite matching to make one-to-one correspondences between the model output and the ground-truth objects or background class $\varnothing$ in the image (Carion et al., 2020). Since no semantic label is available on the target domain, the object detector is prone to produce inaccurate matches between object queries and ground-truth objects on the target domain. To tackle this problem, we ensemble the outputs of different decoder layers and constrain the outputs of each decoder layer to produce consistent bipartite matching during training. The loss is defined as: (12) $\mathcal{L}_{{cons}}=\frac{1}{L_{{dec}}}\sum_{\ell=1}^{L_{{dec}}}\mathcal{L}_{{cons}}\left(\hat{y},\hat{y}_{\ell}\right),$ where $\hat{y}$ is the reference output obtained by averaging the predictions of all decoder layers, $\mathcal{L}_{\text{cons }}$ is the consistency loss that measures the bipartite matching consistency between two predictions. Specifically, it is the combination of JS-divergence between the classification outputs and the L1 distance between bounding box regression outputs, $i.e.$, (13) $\mathcal{L}_{{cons}}\left(\hat{y}_{\ell^{\prime}},\hat{y}_{\ell}\right)=\sum_{i=1}^{M}\left[\text{JSD}\left(\hat{c}_{\ell^{\prime}}^{i}\|\hat{c}_{\ell}^{i}\right)+\lambda_{\mathrm{L}1}\left\|\hat{b}_{\ell^{\prime}}^{i}-\hat{b}_{\ell}^{i}\right\|_{1}\right],$ where $\text{JSD}(\cdot\|\cdot)$ represents JS-divergence, $\lambda_{\mathrm{L}1}$ is a hyper-parameter to balance the two losses. In this way, we constrain the output of different decoder layers to be consistent and improve the detection transformer’s discriminability on the target domain. Table 1. Results of different methods for weather adaptation, $i.e.$, Cityscapes to Foggy Cityscapes. FRCNN and DefDETR are abbreviations for Faster RCNN and Deformable DETR, respectively. Method | Detector | person | rider | car | truck | bus | train | mcycle | bicycle | mAP ---|---|---|---|---|---|---|---|---|---|--- Faster RCNN (Source) | FRCNN | 26.9 | 38.2 | 35.6 | 18.3 | 32.4 | 9.6 | 25.8 | 28.6 | 26.9 DAF (Chen et al., 2018) | FRCNN | 29.2 | 40.4 | 43.4 | 19.7 | 38.3 | 28.5 | 23.7 | 32.7 | 32.0 DivMatch (Kim et al., 2019b) | FRCNN | 31.8 | 40.5 | 51.0 | 20.9 | 41.8 | 34.3 | 26.6 | 32.4 | 34.9 SWDA (Saito et al., 2019) | FRCNN | 31.8 | 44.3 | 48.9 | 21.0 | 43.8 | 28.0 | 28.9 | 35.8 | 35.3 SCDA (Zhu et al., 2019) | FRCNN | 33.8 | 42.1 | 52.1 | 26.8 | 42.5 | 26.5 | 29.2 | 34.5 | 35.9 MTOR (Cai et al., 2019) | FRCNN | 30.6 | 41.4 | 44.0 | 21.9 | 38.6 | 40.6 | 28.3 | 35.6 | 35.1 CR-DA (Xu et al., 2020b) | FRCNN | 30.0 | 41.2 | 46.1 | 22.5 | 43.2 | 27.9 | 27.8 | 34.7 | 34.2 CR-SW (Xu et al., 2020b) | FRCNN | 34.1 | 44.3 | 53.5 | 24.4 | 44.8 | 38.1 | 26.8 | 34.9 | 37.6 GPA (Xu et al., 2020a) | FRCNN | 32.9 | 46.7 | 54.1 | 24.7 | 45.7 | 41.1 | 32.4 | 38.7 | 39.5 FCOS (Source) | FCOS | 36.9 | 36.3 | 44.1 | 18.6 | 29.3 | 8.4 | 20.3 | 31.9 | 28.2 EPM (Hsu et al., 2020) | FCOS | 44.2 | 46.6 | 58.5 | 24.8 | 45.2 | 29.1 | 28.6 | 34.6 | 39.0 Deformable DETR (Source) | DefDETR | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5 SFA (Ours) | DefDETR | 46.5 | 48.6 | 62.6 | 25.1 | 46.2 | 29.4 | 28.3 | 44.0 | 41.3 ### 3.5. Total Loss To summarize, the final training objective of SFA is defined as: (14) $\displaystyle\min_{G}\max_{D}\mathcal{L}_{{det}}(G)-\lambda_{enc}\mathcal{L}_{enc}(G,D)$ $\displaystyle-\lambda_{dec}\mathcal{L}_{dec}(G,D)$ $\displaystyle+\lambda_{con}\mathcal{L}_{{cons}}(G),$ where $G$ is the object detector and $D$ denotes the domain discriminators. $\lambda_{dec}$, and $\lambda_{cons}$ are hyper-parameters that balance the loss terms. The min-max loss function is implemented by gradient reverse layers (Ganin et al., 2016).Our method is not restricted to specific detection transformer. Instead, it is widely applicable to the family of detection transformers, such as DETR (Carion et al., 2020) and Deformable DETR (Zhu et al., 2020). ## 4\. Theoretical Analysis This section theoretically analyses our method. The performance on the target domain is decomposed into three factors: (1) the expected error on the source domain; (2) the domain divergence between source and target; and (3) the error of the ideal joint hypothesis shared by both domains. The domain divergence can further be estimated via a generalization bound. ### 4.1. Domain Adaptation Analysis According to the theory of domain adaptation by Ben-David et al. (Ben-David et al., 2010), the expected error on the target samples, $R_{\mathcal{T}}(h)$, can be decomposed into three terms, as shown in the following theorem: ###### Theorem 4.1. Let $H$ be the hypothesis class. Given two domains $\mathcal{S}$ and $\mathcal{T}$, we have (15) $\displaystyle\begin{split}\forall h\in H,R_{\mathcal{T}}(h)&\leq R_{\mathcal{S}}(h)+\frac{1}{2}{d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})}+\lambda.\\\ \end{split}$ Here, $R_{\mathcal{T}}(h)$ is the error of hypothesis $h$ on the target domain, and $R_{\mathcal{S}}(h)$ is the corresponding error on the source domain. ${d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})}$ represents the domain divergence that is associated with the feature transferability, and $\lambda=\min_{h\in H}\left[R_{\mathcal{S}}(h)+R_{\mathcal{T}}(h)\right]$ is the error of joint ideal hypothesis that is associate with the feature discriminability. In Inequality 15, $R_{\mathcal{S}}$ is easily minimized by the supervised loss on source domain. Besides, our token-wise feature alignment minimizes the domain divergence $d_{\mathcal{H}\Delta\mathcal{H}}(\mathcal{S},\mathcal{T})$ and improves the feature transferability. In the meantime, domain-query feature alignment adaptively selects and aligns token features with significant domain gaps while maintaining discriminability for features with smaller domain shifts. Bipartite matching consistency loss ensembles predictions made by multiple decoder layers to obtain a more accurate result. These designs ensure the feature discriminability on the target domain and minimize $\lambda$. ### 4.2. Generalization Analysis Adversarial training is employed to help learn the mapping from the target domain to the source domain. The generalizability determines the performance of the mapping (Mohri et al., 2012; He and Tao, 2020). Denote the generating distributions of the existing data $\mu$ and the generating distribution of the generated data as $\nu$. Denote the empirical counterparts of $\mu$ and $\nu$ are $\hat{\mu}_{N}$ and $\nu_{N}$, where $N$ is the size of the training sample set. Suppose adversarial training is learning a generator $g\in\mathcal{G}$ and a discriminator $f\in\mathcal{F}$, where $\mathcal{G}$ and $\mathcal{F}$ are both the hypothesis classes. As described in Section 3.3, the discriminator is a three-layer MLP which is constituted by three fully connected layers and three nonlinear operations (nonlinearities), $(A_{1},\sigma_{1},A_{2},\sigma_{2},A_{3},\sigma_{3})$, where $A_{i}$ is a fully connected layer, and $\sigma_{i}$ is a nonlinearity (ReLU). Then we have the following theory. ###### Theorem 4.2 (Covering bound for the discriminator). Suppose the spectral norm of each weight matrix is bounded: $\|A_{i}\|_{\sigma}\leq s_{i}$. Also, suppose each weight matrix $A_{i}$ has a reference matrix $M_{i}$, which is satisfied that $\|A_{i}-M_{i}\|_{\sigma}\leq b_{i}$, $i=1,\ldots,3$. Then, the $\varepsilon$-covering number satisfies that $\displaystyle\log\mathcal{N}\left(\mathcal{F}|_{S},\varepsilon,\|\cdot\|_{2}\right)$ (16) $\displaystyle\leq$ $\displaystyle\frac{\log\left(2W^{2}\right)\|X\|_{2}^{2}}{\varepsilon^{2}}\left(\prod_{i=1}^{3}s_{i}\right)^{2}\sum_{i=1}^{3}\frac{b_{i}^{2}}{s_{i}^{2}},$ where $W$ is the largest dimension of the feature maps throughout the algorithm. This theorem is based on (Bartlett et al., 2017; He et al., 2020). A detailed proof is given in the Supplementary Material. Also, Zhang et al. (Zhang et al., 2018) suggests that the generalizability of a GAN (Goodfellow et al., 2014; Ganin et al., 2016) is determined by the hypothesis complexity of the discriminator. Following this insight, we employ simple discriminators to enhance the generalizability and further enhance the domain adaptation performance. Table 2. Results of different methods for synthetic to real adaptation, $i.e.$, Sim10k to Cityscapes. Methods | Detector | _car_ AP ---|---|--- Faster RCNN (Source) | FRCNN | 34.6 DAF (Chen et al., 2018) | FRCNN | 41.9 DivMatch (Kim et al., 2019b) | FRCNN | 43.9 SWDA (Saito et al., 2019) | FRCNN | 44.6 SCDA (Zhu et al., 2019) | FRCNN | 45.1 MTOR (Cai et al., 2019) | FRCNN | 46.6 CR-DA (Xu et al., 2020b) | FRCNN | 43.1 CR-SW (Xu et al., 2020b) | FRCNN | 46.2 GPA (Xu et al., 2020a) | FRCNN | 47.6 FCOS (Source) | FCOS | 42.5 EPM (Hsu et al., 2020) | FCOS | 47.3 Deformable DETR (Source) | DefDETR | 47.4 SFA (Ours) | DefDETR | 52.6 ## 5\. Experimental Results In this section, we evaluate the proposed SFA on three challenging domain adaptation scenarios. Ablation studies are performed to investigate the impact of each component in SFA. Finally, visualization and analysis are presented for better understanding. Table 3. Results of different methods for scene adaptation, $i.e.$, Cityscapes to BDD100k daytime subset. Methods | Detector | person | rider | car | truck | bus | mcycle | bicycle | mAP ---|---|---|---|---|---|---|---|---|--- Faster R-CNN (Source) | FRCNN | 28.8 | 25.4 | 44.1 | 17.9 | 16.1 | 13.9 | 22.4 | 24.1 DAF (Chen et al., 2018) | FRCNN | 28.9 | 27.4 | 44.2 | 19.1 | 18.0 | 14.2 | 22.4 | 24.9 SWDA (Saito et al., 2019) | FRCNN | 29.5 | 29.9 | 44.8 | 20.2 | 20.7 | 15.2 | 23.1 | 26.2 SCDA (Zhu et al., 2019) | FRCNN | 29.3 | 29.2 | 44.4 | 20.3 | 19.6 | 14.8 | 23.2 | 25.8 CR-DA (Xu et al., 2020b) | FRCNN | 30.8 | 29.0 | 44.8 | 20.5 | 19.8 | 14.1 | 22.8 | 26.0 CR-SW (Xu et al., 2020b) | FRCNN | 32.8 | 29.3 | 45.8 | 22.7 | 20.6 | 14.9 | 25.5 | 27.4 FCOS (Tian et al., 2019) (Source) | FCOS | 38.6 | 24.8 | 54.5 | 17.2 | 16.3 | 15.0 | 18.3 | 26.4 EPM (Hsu et al., 2020) | FCOS | 39.6 | 26.8 | 55.8 | 18.8 | 19.1 | 14.5 | 20.1 | 27.8 Deformable DETR (Source) | DefDETR | 38.9 | 26.7 | 55.2 | 15.7 | 19.7 | 10.8 | 16.2 | 26.2 SFA (Ours) | DefDETR | 40.2 | 27.6 | 57.5 | 19.1 | 23.4 | 15.4 | 19.2 | 28.9 Table 4. Ablation studies on the Cityscapes to Foggy Cityscapes scenario. CNN represents feature alignment on the CNN backbone. DQ, TW, BMC, and HR represent domain query-based feature alignment, token-wise feature alignment, bipartite matching consistency, and hierarchical feature alignment, respectively. Methods | CNN | DQ | TW | BMC | HR | person | rider | car | truck | bus | train | mcycle | bicycle | mAP ---|---|---|---|---|---|---|---|---|---|---|---|---|---|--- Deformable DETR (Source) | | | | | | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5 Proposed | $\checkmark$ | | | | | 43.8 | 45.6 | 55.5 | 18.2 | 38.7 | 8.4 | 28.1 | 43.3 | 35.2 | $\checkmark$ | | | | 45.1 | 46.8 | 61.3 | 21.6 | 36.6 | 9.5 | 30.6 | 40.4 | 36.5 | | $\checkmark$ | | | 45.6 | 47.6 | 60.7 | 23.6 | 41.3 | 15.5 | 26.2 | 41.1 | 37.7 | | | $\checkmark$ | | 38.0 | 39.3 | 45.6 | 16.5 | 28.4 | 6.0 | 24.5 | 37.5 | 29.5 | $\checkmark$ | $\checkmark$ | | | 45.7 | 47.6 | 61.6 | 23.7 | 43.8 | 16.4 | 28.2 | 43.3 | 38.8 | $\checkmark$ | $\checkmark$ | | $\checkmark$ | 46.0 | 46.7 | 62.4 | 24.1 | 45.6 | 22.1 | 27.6 | 43.9 | 39.8 $\checkmark$ | $\checkmark$ | $\checkmark$ | | $\checkmark$ | 46.3 | 48.2 | 62.2 | 22.1 | 43.4 | 24.3 | 29.9 | 43.1 | 39.9 SFA (Ours) | | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$ | 46.5 | 48.6 | 62.6 | 25.1 | 46.2 | 29.4 | 28.3 | 44.0 | 41.3 ### 5.1. Experimental Setup #### 5.1.1. Datasets Four public datasets are utilized in our experiments, including Cityscapes (Cordts et al., 2016), Foggy Cityscapes (Sakaridis et al., 2018), Sim10k (Johnson-Roberson et al., 2017), and BDD100k (Yu et al., 2018), which are detailed as follows. * • Cityscapes (Cordts et al., 2016) is collected from urban scenes, which contains 3,475 images with pixel-level annotation. Among them, 2,975 and 500 images are used for training and evaluation, respectively. Bounding box annotation of 8 different object categories can be obtained by taking the tightest rectangles of object masks. * • Foggy Cityscapes (Sakaridis et al., 2018) is obtained by applying the fog synthesis algorithm to Cityscapes, based on depth maps in the Cityscapes dataset. It inherited the annotations in Cityscapes and is suitable for the evaluation of weather adaptation. * • Sim10k (Johnson-Roberson et al., 2017) is generated by the Grand Theft Auto game engine, which contains 10,000 training images with 58,701 bounding box annotations for cars. It is suitable for the evaluation of synthetic to real adaptation. * • BDD100k (Yu et al., 2018) contains 100k images, including 70k training images and 10k validation images annotated with bounding boxes. Following (Xu et al., 2020b), we extract the _daytime_ subset of BDD100k for the evaluation of scene adaptation. The subset includes 36,728 training images and 5,258 validation images. Based on these datasets, we evaluate the proposed SFA on three domain adaptation scenarios: (1) Weather adaptation, $i.e.$, Cityscapes to Foggy Cityscapes, where the models are trained on cityscape and tested on foggy cityscape; (2) Synthetic to real adaptation, $i.e.$, Sim10k to Cityscapes, where the models are trained on Sim10k and tested on Cityscapes; and (3) Scene Adaptation, $i.e.$, Cityscapes to the daytime subset of BDD100k, where the models are trained on Cityscapes and tested on BDD100k daytime subset. Mean Average Precision (mAP) with a threshold of 0.5 is adopted as the evaluation metric, following (Chen et al., 2018). #### 5.1.2. Implementation Details By default, our method is built on Deformable DETR (Zhu et al., 2020). ImageNet (Deng et al., 2009) pre-trained ResNet-50 (He et al., 2016) is adopted as the backbone in all experiments. Following Deformable DETR, we train the network using the Adam optimizer (Kingma and Ba, 2015) for 50 epochs. The learning rate is initialized as $2\times 10^{-4}$ and decayed by 0.1 after 40 epochs. The batch size is set as 4 in all experiments. Both $\lambda_{enc}$ and $\lambda_{dec}$ are set as 1 for weather adaptation, and 0.01 for other domain adaptation scenarios. Similarly, $\lambda_{cons}$ is set as 1 for weather adaptation, and 0.1 for other scenarios. All our experiments are performed on NVIDIA Tesla V100 GPUs. To show the generality of our method, we also provide results of our method built on DETR (Carion et al., 2020), as shown in the Supplementary Material. ### 5.2. Comparisons with SOTA Methods #### 5.2.1. Weather Adaptation. The object detectors are often required to be applicable under various weather conditions. We use the Cityscape to Foggy Cityscape scenario to evaluate the model’s robustness to weather variations (Zhang and Tao, 2019). As shown in Table 1, SFA significantly improves Deformable DETR’s cross-domain performance, achieving a 12.8 absolute gain of mAP50. Moreover, it outperforms all previous domain adaptive object detection methods. #### 5.2.2. Synthetic to Real Adaptation. Training an object detector on synthetic images that can generalize to real- world images is fascinating, as it significantly reduces the labor of data collection and annotation. To this end, we evaluate our SFA on the synthetic to real adaptation scenario, as shown in Table 2. It can be seen that SFA improves the source-only Deformable DETR with an over 10% relative performance gain and outperforms all existing domain adaptive object detection methods. #### 5.2.3. Scene Adaptation. In real-world applications like autonomous driving, scene layouts frequently change (Lan et al., 2020). The performance of our SFA for scene adaptation is shown in Table 3. Following (Xu et al., 2020b), results on 7 common categories are reported. We can see that SFA outperforms the previous state-of-the-art. Moreover, a systematic improvement can be observed, where SFA improves Deformable DETR on all 7 categories over the source only model. Figure 3. Visualizations. (a) Qualitative results: From top to bottom are results on the scenarios of Cityscapes to Foggy Cityscapes, Sim10k to Cityscapes, and Cityscapes to BDD100k, respectively. (b) Visualization of feature distributions using T-SNE (Van der Maaten and Hinton, 2008). The blue circles denote the source features, while red circles represent target features. activation Figure 4. Visualization of domain queries from both transformer encoder and decoder sides, under the Cityscapes to Foggy Citysccapes scenario. activation ### 5.3. Ablation Studies To better understand our method, we conduct ablation studies by isolating each component in SFA, as shown in Table 4. We have the following observations: (1) both domain query-based feature alignment and token-wise feature alignment can alleviate the domain gaps and improve detection transformer’s cross-domain performance by 8.0 and 9.2 mAP, respectively; (2) domain query-based feature alignment and token-wise feature alignment are complementary to each other. Thereby, a combination of both brings further improvement; (3) the hierarchical feature alignment (HFA) is effective and brings a 1.0 mAP gain. Moreover, with HFA, the shallower sequence features near the CNN backbone is aligned. As a result, feature alignment on the CNN backbone can be safely removed without loss of performance; and (4) using the bipartite matching consistency loss alone can bring a 1.0 performance gain. Moreover, it is complementary with the alignment on sequence features, and further improves the model performance by 1.5 mAP. ### 5.4. Visualization and Analysis #### 5.4.1. Detection Results In Figure 3 (a), we show some visual results by Deformable DETR and our SFA, accompanied with the ground-truth. As can be seen, in all three scenarios, SFA improves the detection performance. It successfully mitigates the false positives generated by Deformanble DETR and detects challenging objects overlooked by Deformanble DETR. Interestingly, from the first row, we can see that SFA successfully detects the distant car that is not labeled in the ground-truth, which further indicates its generalizability to the target domain. #### 5.4.2. Visualization of Feature Distribution. We present the distribution of features extracted by the CNN backbone, the transformer encoder, and the transformer decoder. As shown in Figure 3 (b), both CNN and sequence features extracted by the source-only Deformable DETR can be easily separated by domain. By contrast, our SFA learns domain- invariant sequence features in both encoder and decoder. Interestingly, the features in the CNN backbone are also aligned in SFA, as the shallower sequence features near the CNN backbone can be aligned by hierarchical feature alignment. #### 5.4.3. Visualization of Domain Query. The domain query-based feature alignment utilizes a novel domain query to adaptively aggregate and align global context from the sequence feature in the encoder or decoder. It is natural to wonder where the domain query looks at and how much it values each sampling location. To obtain a better understanding of the domain query-based feature alignment, we visualize the sampling locations and attention weights for the domain query. In Figure 4 (a), it can be seen that the domain query in the encoder learns to attend to sampling locations with obvious domain gaps, i.e., the upper part of the target images with large scene depth dense fog. Moreover, it puts more weight on tokens with more significant domain shifts. A similar phenomenon can be seen on the decoder side, as shown in Figure 4(b), the domain query in the decoder put more attention on locations with significant domain gaps. The slight difference is that it focuses more on the foreground objects, e.g., the cars, riders, and bicycles, as the context sequence feature in the decoder models foreground objects. ## 6\. Conclusion In this paper, we focus on making the promising detection transformers domain adaptive. Based on the observation that the feature distribution alignment on CNN backbone does not guarantee domain-invariant features in transformer for prediction, we propose sequence feature alignment (SFA) for detection transformers. Domain query-based feature alignment (DQFA) and token-wise feature alignment (TDA) with explicit technical insights are adopted to close domain gaps at global and local scales, respectively. Moreover, a novel bipartite matching consistency loss is proposed to enhance the feature discriminability for robust object detection. Experimental results validate the effectiveness of our SFA. We hope our approach will serve as a solid baseline and help ease future research on developing domain adaptive detection transformers. ## Acknowledgement This work is supported by National Key R&D Program of China under Grant 2020AAA0105701, National Natural Science Foundation of China (NSFC) under Grants 61872327, 61806062, U19B2038, Major Special Science and Technology Project of Anhui (No. 012223665049), and the University Synergy Innovation Program of Anhui Province under Grants GXXT-2019-025. ## Appendix A More Implementation Details ### A.1. Implementation Details of DA-CNN In Figure 1 and Table 4, we presented the results of applying adversarial feature alignment (Ganin et al., 2016) on the CNN backbone of Deformable DETR (denoted as DA-CNN in Figure 1). Specifically, we apply hierarchical feature alignment on the CNN backbone, following (He and Zhang, 2019). Feature maps of stages $C_{3}$ through $C_{5}$ in ResNet-50 (He et al., 2016), plus one more feature map obtained via a $3\times 3$ stride $2$ convolution on the final $C_{5}$ stage are utilized for feature alignment. The sizes of the feature maps are reduced by the information invariant scale reduction modules (SRMs) in (He and Zhang, 2019) before seed into the domain discriminators. We also implemented feature alignment on the CNN backbone following SWDA (Saito et al., 2019). Specifically, strong local feature alignment on the feature map of stage $C_{2}$ and weak global feature alignment on the feature map of $C_{5}$ in ResNet-50 are adopted. We obtain a similar result of 35.5 mAP compared to hierarchical feature alignment in (He and Zhang, 2019). Thus, we only show DA-CNN implemented by hierarchical feature alignment in Figure 1, which is conceptually cleaner. ### A.2. Structure of Domain Discriminators As discussed in Section 4.2, simple discriminators can enhance the generalizability and further enhance the domain adaptation performance. Specifically, we simply adopt a 3-layer multilayer perceptron (MLP) structure, as shown in Table 5. All four discriminators, including $D_{enc_{q}}$, $D_{enc_{k}}$, $D_{dec_{q}}$, and $D_{dec_{k}}$, share the same structure. Besides, $D_{enc_{q}}$ and $D_{enc_{k}}$ share the same weights. Similarly, $D_{dec_{q}}$ and $D_{dec_{k}}$ share the weights. Domain discriminators for encoder and decoder are shared across different feature levels. Table 5. The architecture of the domain discriminators. Domain Discriminators --- Fully Connected $256\times 256$ ReLU Fully Connected $256\times 256$ ReLU Fully Connected $256\times 2$ Softmax ## Appendix B Detailed Theoretical Analysis ###### Proof of Theorem 4.2. We denote the spaces of the output functions $F_{(A_{1},\ldots,A_{i-1})}$ induced by the weight matrices $A_{i},i=1,\ldots,5$ by $\mathcal{H}_{i},i=1,\ldots,5$, respectively. Lemma A.7 in (Bartlett et al., 2017), suggests inequality, $\displaystyle\log\mathcal{N}(\mathcal{F}|S)$ $\displaystyle\leq$ $\displaystyle\log\left(\prod_{i=1}^{5}\sup_{\mathbf{A}_{i-1}\in\bm{\mathcal{B}}_{i-1}}\mathcal{N}_{i}\right)$ (17) $\displaystyle\leq$ $\displaystyle\sum_{i=1}^{5}\log\left(\sup_{\begin{subarray}{c}(A_{1},\ldots,A_{i-1})\\\ \forall j<i,A_{j}\in B_{j}\end{subarray}}\mathcal{N}\left(\left\\{A_{i}F_{(A_{1},\ldots,A_{i-1})}\right\\},\varepsilon_{i},\|\cdot\|_{2}\right)\right)~{}.$ We thus get the following inequality, (18) $\displaystyle\log\mathcal{N}(\mathcal{F}|S)\leq\sum_{i=1}^{5}\frac{b_{i}^{2}\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}}{\varepsilon_{i}^{2}}\log\left(2W^{2}\right)~{}.$ Meanwhile, $\displaystyle\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}=$ $\displaystyle\|\sigma_{i-1}(A_{i-1}F_{(A_{1},\ldots,A_{i-2})}(X))-\sigma_{i-1}(0)\|_{2}$ $\displaystyle\leq$ $\displaystyle\|\sigma_{i-1}\|\|A_{i-1}F_{(A_{1},\ldots,A_{i-2})}(X)-0\|_{2}$ $\displaystyle\leq$ $\displaystyle\rho_{i-1}\|A_{i-1}\|_{\sigma}\|F_{(A_{1},\ldots,A_{i-2})}(X)\|_{2}$ (19) $\displaystyle\leq$ $\displaystyle\rho_{i-1}s_{i-1}\|F_{(A_{1},\ldots,A_{i-2})}(X)\|_{2}.$ Therefore, (20) $\|F_{(A_{1},\ldots,A_{i-1})}(X)\|^{2}_{\sigma}\leq\|X\|^{2}\prod_{j=1}^{i-1}s_{i}^{2}\rho_{i}^{2}.$ Motivated by the proof given in (Bartlett et al., 2017), we suppose equations: (21) $\displaystyle\varepsilon_{i+1}=\rho_{i}s_{i+1}\varepsilon_{i}~{},$ (22) $\displaystyle\varepsilon_{5}=\rho_{1}\prod_{i=2}^{4}s_{i}\rho_{i}s_{5}\epsilon_{1}~{},$ (23) $\displaystyle\varepsilon=\rho_{1}\prod_{i=2}^{5}s_{i}\rho_{i}\epsilon_{1}~{}.$ Therefore, (24) $\varepsilon_{i}=\frac{\rho_{i}\prod_{j=1}^{i-1}s_{j}\rho_{j}}{\prod_{j=1}^{5}s_{j}\rho_{j}}\varepsilon~{}.$ Therefore, (25) $\log\mathcal{N}\left(\mathcal{F}|_{S},\varepsilon,\|\cdot\|_{2}\right)\leq\frac{\log\left(2W^{2}\right)\|X\|_{2}^{2}}{\varepsilon^{2}}\left(\prod_{i=1}^{5}s_{i}\rho_{i}\right)^{2}\sum_{i=1}^{5}\frac{b_{i}^{2}}{s_{i}^{2}}~{},$ which is exactly Equation 16 of Theorem 4.2. The proof is completed. ∎ Table 6. Sequence feature alignment built on DETR (Carion et al., 2020). DQ, TW, BMC, and HR represents domain query-based feature alignment, token-wise feature alignment, bipartite matching consistency, and hierarchical feature alignment, respectively. Methods | DQ | TW | BMC | HR | person | rider | car | truck | bus | train | mcycle | bicycle | mAP ---|---|---|---|---|---|---|---|---|---|---|---|---|--- DETR (Source) | | | | | 19.4 | 16.0 | 35.2 | 5.1 | 7.8 | 3.0 | 10.5 | 15.9 | 14.1 Proposed | $\checkmark$ | | | | 19.9 | 23.5 | 38.8 | 15.7 | 17.0 | 3.8 | 12.9 | 16.4 | 18.5 | $\checkmark$ | | | 18.3 | 24.4 | 41.8 | 14.7 | 22.4 | 5.6 | 9.3 | 17.0 | 19.2 | | $\checkmark$ | | 20.7 | 16.5 | 35.5 | 7.6 | 9.0 | 5.0 | 10.3 | 16.0 | 15.0 $\checkmark$ | $\checkmark$ | | | 20.8 | 24.5 | 42.0 | 13.0 | 20.3 | 12.9 | 12.7 | 17.7 | 20.5 $\checkmark$ | $\checkmark$ | | $\checkmark$ | 21.2 | 23.5 | 44.0 | 17.6 | 25.2 | 12.7 | 13.9 | 18.0 | 22.0 ## Appendix C DETR-based SFA To show the generalizability of our method, we also implement our Sequence Feature alignment (SFA) based on DETR (Carion et al., 2020). We note three key difference between the implementation of Deformable DETR-based SFA and DETR- based SFA: (1) hierarchical CNN feature representation of 4 different levels are token as input to the transformer in Deformable DETR, while DETR only uses one feature map at the $C_{5}$ stage in ResNet; (2) the deformable transformer adopts deformable attention mechanism for the self-attention in the encoder and the cross-attention in the decoder, while DETR adopts the attention mechanism in (Vaswani et al., 2017). Therefore, for Deformable DETR, the sample position reference ${p}_{\ell}$ in Equation 1 and Equation 2 are learnable sparse sample locations, while for DETR, ${p}_{\ell}$ simply enumerates all possible locations. ### C.1. Implementation Details We evaluate our DETR-based SFA on Cityscapes (Cordts et al., 2016) to Foggy Cityscapes (Sakaridis et al., 2018) scenarios. ImageNet (Deng et al., 2009) pre-trained ResNet-50 (He et al., 2016) is adopted as the backbone. Following DETR, we train the network using the Adam optimizer (Kingma and Ba, 2015) for 300 epochs. The learning rate is initialized as $10^{-4}$ for the transformer and $10^{-5}$ for the CNN backbone. Learning rates are decayed by a factor of 10 after 200 epochs. The batch size is set as 8 in all experiments. Both $\lambda_{enc}$ and $\lambda_{dec}$ are set as 0.01, $\lambda_{cons}$ is set as 0.1 for other scenarios. All our experiments are performed on NVIDIA Tesla V100 GPUs. ### C.2. Results and Analysis The detailed results are shown in Table 6. We observe a much worse baseline, we believe this is due to the deficit of transformer components in processing image feature maps. The attention modules are initialized to cast nearly uniform attention weights to all the pixels in the feature maps at initialization. As a result, more training data and training epochs are required for the attention weights to be learned to focus on sparse meaningful locations. Limited by the number of training images on the Cityscapes dataset (2,975) and a small batch size of 8, DETR shows inferior performance. However, as shown in Table 6, our SFA still brings a 9.1 improvement on mAP50 (a relative improvement of 64.5%) compared to the DETR baseline, which verifies the effectiveness of our method. Moreover, ablation studies are provided by isolating each component of SFA. From the results in Table 6, we have the following observations: (1) Similar to the results based on Deformable DETR, both domain query-based feature alignment and token-wise feature alignment can alleviate the domain gaps and improve the detection transformer’s cross-domain performance by 4.4 and 5.1 mAP, respectively; (2) domain query-based feature alignment and token-wise feature alignment are complementary to each other. Thereby, a combination of both brings further improvement; (3) the hierarchical feature alignment is effective and brings a 1.5 mAP gain; and (4) using the bipartite matching consistency constraint alone can bring a 0.9 performance gain. Moreover, it is complementary with the feature alignment on sequence features, and further improves the model performance by 1.2 mAP. To summarize, our SFA is widely applicable to the detection transformer family, e.g., DETR, Deformable DETR, and significantly improves their cross- domain performance. ## Appendix D More ablation studies As describe in Section 3, both domain-query based feature alignment and token- wise feature alignment can be applied on both encoder and decoder sides. To gain a more comprehensive understanding, we conduct detailed ablation studies on the domain query-based feature alignment and the token-wise feature alignment. Both feature alignment modules applied to the last encoder and decoder layers, without hierarchical feature alignment and bipartite matching consistency loss. The detailed results are shown in Table 7, we have the following observations: (1) both domain-query based feature alignment and token-wise feature alignment alleviate the domain gaps between source and target domains, either when they are being applied to the encoder or decoder side. Moreover, they are complementary to each other; (2) the token-wise feature alignment generally shows better performance compare to the domain-query based feature alignment. We assume this is because the domain-query only samples sparse locations for global feature alignment, while the token-wise feature alignment enumerates all possible locations, and enjoys a relatively more comprehensive feature alignment; (3) the feature alignment applied on the encoder side generally performs better it applied to the decoder side. We assume this is because the sequence in encoder side contains both foreground and background features, while the sequence on the decoder side concentrates on modeling the foreground objects. As a result, the feature alignment on the decoder side does not align background feature well, will the feature alignment on the encoder side enjoys a more comprehensive feature alignment. Table 7. Ablation studies on domain query-based feature alignment (DQFA) and token-wise feature alignment (TWFA), without hierarchical feature alignment or bipartite matching consistency loss. Experiments are conducted on the Cityscapes to Foggy Cityscapes Scenario. $\text{DQ}_{enc}$ and $\text{DQ}_{dec}$ indicate the DQFA applied to the last encoder and decoder layers, respectively. Similarly, $\text{TW}_{enc}$ and $\text{TW}_{dec}$ indicate the TWFA applied to the last encoder and decoder layers, respectively Methods | $\text{DQ}_{enc}$ | $\text{DQ}_{dec}$ | $\text{TW}_{enc}$ | $\text{TW}_{dec}$ | person | rider | car | truck | bus | train | mcycle | bicycle | mAP ---|---|---|---|---|---|---|---|---|---|---|---|---|--- Deformable DETR | | | | | 37.7 | 39.1 | 44.2 | 17.2 | 26.8 | 5.8 | 21.6 | 35.5 | 28.5 Proposed | $\checkmark$ | | | | 44.8 | 45.9 | 56.9 | 18.7 | 37.8 | 8.5 | 23.1 | 40.3 | 34.5 | $\checkmark$ | | | 42.8 | 43.5 | 54.5 | 13.4 | 37.9 | 8.2 | 28.6 | 40.5 | 33.7 | | $\checkmark$ | | 44.6 | 48.0 | 58.7 | 24.4 | 39.6 | 9.1 | 29.2 | 43.1 | 37.1 | | | $\checkmark$ | 44.9 | 48.1 | 60.3 | 16.2 | 38.0 | 10.7 | 29.0 | 40.9 | 36.1 $\checkmark$ | $\checkmark$ | | | 45.1 | 46.8 | 61.3 | 21.6 | 36.6 | 9.5 | 30.6 | 40.4 | 36.5 | | $\checkmark$ | $\checkmark$ | 45.6 | 47.6 | 60.7 | 23.6 | 41.3 | 15.5 | 26.2 | 41.1 | 37.7 $\checkmark$ | | $\checkmark$ | | 45.6 | 48.2 | 61.0 | 23.0 | 39.8 | 16.3 | 30.1 | 41.0 | 38.1 | $\checkmark$ | | $\checkmark$ | 46.3 | 47.6 | 61.5 | 18.8 | 42.2 | 15.7 | 26.9 | 41.7 | 37.6 ## Appendix E More qualitative results More qualitative results sampled from the Cityscapes to Foggy Cityscapes, Sim10k to Cityscapes, and Cityscapes to BDD100k adaptation are shown in Figure 5, 6 and 7, respectively. Detection results produced by the source-only Deformable DETR and our SFA, accompanied with the corresponding ground-truth are presented. As can be seen, in all three scenarios, SFA improves the detection performance. It successfully mitigates the false positives generated by Deformanble DETR and detects challenging objects overlooked by Deformanble DETR. Figure 5. More qualitative detection results on Cityscapes to Foggy Cityscapes scenario. activation Figure 6. More qualitative detection results on Sim10k to Cityscapes scenario. activation Figure 7. More qualitative detection results on Cityscapes to BDD100k scenario. activation ## References * (1) * Bartlett et al. (2017) Peter L Bartlett, Dylan J Foster, and Matus J Telgarsky. 2017\. Spectrally-normalized margin bounds for neural networks. In _Proc. NIPS_. 6240–6249. * Ben-David et al. (2010) Shai Ben-David, John Blitzer, Koby Crammer, Alex Kulesza, Fernando Pereira, and Jennifer Wortman Vaughan. 2010. A theory of learning from different domains. _Machine learning_ 79, 1 (2010), 151–175. * Cai et al. (2019) Qi Cai, Yingwei Pan, Chong-Wah Ngo, Xinmei Tian, Lingyu Duan, and Ting Yao. 2019\. Exploring object relation in mean teacher for cross-domain detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11457–11466. * Carion et al. (2020) Nicolas Carion, Francisco Massa, Gabriel Synnaeve, Nicolas Usunier, Alexander Kirillov, and Sergey Zagoruyko. 2020. End-to-end object detection with transformers. In _European Conference on Computer Vision_. Springer, 213–229. * Chen et al. (2018) Yuhua Chen, Wen Li, Christos Sakaridis, Dengxin Dai, and Luc Van Gool. 2018. Domain adaptive faster r-cnn for object detection in the wild. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 3339–3348. * Chen et al. (2020) Zhe Chen, Jing Zhang, and Dacheng Tao. 2020. Recursive context routing for object detection. _International Journal of Computer Vision_ (2020), 1–19. * Cordts et al. (2016) Marius Cordts, Mohamed Omran, Sebastian Ramos, Timo Rehfeld, Markus Enzweiler, Rodrigo Benenson, Uwe Franke, Stefan Roth, and Bernt Schiele. 2016. The cityscapes dataset for semantic urban scene understanding. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 3213–3223. * Dai et al. (2020) Zhigang Dai, Bolun Cai, Yugeng Lin, and Junying Chen. 2020\. UP-DETR: Unsupervised Pre-training for Object Detection with Transformers. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. * Deng et al. (2009) Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009\. Imagenet: A large-scale hierarchical image database. In _2009 IEEE conference on computer vision and pattern recognition_. IEEE, 248–255. * Ding et al. (2020) Liang Ding, Longyue Wang, and Dacheng Tao. 2020. Self-Attention with Cross-Lingual Position Representation. In _ACL_. * Ganin et al. (2016) Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, François Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-adversarial training of neural networks. _The journal of machine learning research_ 17, 1 (2016), 2096–2030. * Goodfellow et al. (2014) Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014\. Generative adversarial networks. (2014). * He et al. (2020) Fengxiang He, Tongliang Liu, and Dacheng Tao. 2020. Why resnet works? residuals generalize. _IEEE Transactions on Neural Networks and Learning Systems_ 31, 12 (2020), 5349–5362. * He and Tao (2020) Fengxiang He and Dacheng Tao. 2020. Recent advances in deep learning theory. _arXiv preprint arXiv:2012.10931_ (2020). * He et al. (2016) Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016\. Deep residual learning for image recognition. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 770–778. * He and Zhang (2019) Zhenwei He and Lei Zhang. 2019. Multi-adversarial faster-rcnn for unrestricted object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 6668–6677. * Hsu et al. (2020) Cheng-Chun Hsu, Yi-Hsuan Tsai, Yen-Yu Lin, and Ming-Hsuan Yang. 2020. Every Pixel Matters: Center-aware Feature Alignment for Domain Adaptive Object Detector. In _European Conference on Computer Vision_. Springer, 733–748. * Johnson-Roberson et al. (2017) Matthew Johnson-Roberson, Charles Barto, Rounak Mehta, Sharath Nittur Sridhar, Karl Rosaen, and Ram Vasudevan. 2017. Driving in the Matrix: Can virtual worlds replace human-generated annotations for real world tasks?. In _2017 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 746–753. * Kim et al. (2019a) Seunghyeon Kim, Jaehoon Choi, Taekyung Kim, and Changick Kim. 2019a. Self-training and adversarial background regularization for unsupervised domain adaptive one-stage object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 6092–6101. * Kim et al. (2019b) Taekyung Kim, Minki Jeong, Seunghyeon Kim, Seokeon Choi, and Changick Kim. 2019b. Diversify and match: A domain adaptive representation learning paradigm for object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 12456–12465. * Kingma and Ba (2015) Diederik P Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In _International Conference on Learning and Representations_. * Lan et al. (2020) Meng Lan, Yipeng Zhang, Lefei Zhang, and Bo Du. 2020\. Global context based automatic road segmentation via dilated convolutional neural network. _Information Sciences_ 535 (2020), 156–171. * Lee et al. (2015) Chen-Yu Lee, Saining Xie, Patrick Gallagher, Zhengyou Zhang, and Zhuowen Tu. 2015. Deeply-supervised nets. In _Artificial intelligence and statistics_. PMLR, 562–570. * Liu et al. (2019) Daqing Liu, Hanwang Zhang, Feng Wu, and Zheng-Jun Zha. 2019\. Learning to assemble neural module tree networks for visual grounding. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 4673–4682. * Liu et al. (2016) Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. Ssd: Single shot multibox detector. In _European conference on computer vision_. Springer, 21–37. * Mohri et al. (2012) Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2012\. _Foundations of machine learning_. MIT press. * Redmon et al. (2016) Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You only look once: Unified, real-time object detection. In _Proceedings of the IEEE conference on computer vision and pattern recognition_. 779–788. * Ren et al. (2016) Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2016\. Faster R-CNN: towards real-time object detection with region proposal networks. _IEEE transactions on pattern analysis and machine intelligence_ 39, 6 (2016), 1137–1149. * Saito et al. (2019) Kuniaki Saito, Yoshitaka Ushiku, Tatsuya Harada, and Kate Saenko. 2019. Strong-weak distribution alignment for adaptive object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 6956–6965. * Sakaridis et al. (2018) Christos Sakaridis, Dengxin Dai, and Luc Van Gool. 2018\. Semantic foggy scene understanding with synthetic data. _International Journal of Computer Vision_ 126, 9 (2018), 973–992. * Shen et al. (2021a) Yongliang Shen, Xinyin Ma, Zeqi Tan, Shuai Zhang, Wen Wang, and Weiming Lu. 2021a. Locate and Label: A Two-stage Identifier for Nested Named Entity Recognition. In _ACL_. * Shen et al. (2021b) Yongliang Shen, Xinyin Ma, Yechun Tang, and Weiming Lu. 2021b. A Trigger-Sense Memory Flow Framework for Joint Entity and Relation Extraction. In _Proceedings of the Web Conference 2021_. 1704–1715. * Tian et al. (2019) Zhi Tian, Chunhua Shen, Hao Chen, and Tong He. 2019\. Fcos: Fully convolutional one-stage object detection. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 9627–9636. * Van der Maaten and Hinton (2008) Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. _Journal of machine learning research_ 9, 11 (2008). * Vaswani et al. (2017) Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017\. Attention is All you Need. In _Conference on Neural Information Processing Systems_. * Xu et al. (2020b) Chang-Dong Xu, Xing-Ran Zhao, Xin Jin, and Xiu-Shen Wei. 2020b. Exploring categorical regularization for domain adaptive object detection. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11724–11733. * Xu et al. (2020a) Minghao Xu, Hang Wang, Bingbing Ni, Qi Tian, and Wenjun Zhang. 2020a. Cross-domain detection via graph-induced prototype alignment. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 12355–12364. * Yu et al. (2018) Fisher Yu, Wenqi Xian, Yingying Chen, Fangchen Liu, Mike Liao, Vashisht Madhavan, and Trevor Darrell. 2018. Bdd100k: A diverse driving video database with scalable annotation tooling. _arXiv preprint arXiv:1805.04687_ 2, 5 (2018), 6\. * Zha et al. (2019) Zheng-Jun Zha, Daqing Liu, Hanwang Zhang, Yongdong Zhang, and Feng Wu. 2019. Context-aware visual policy network for fine-grained image captioning. _IEEE transactions on pattern analysis and machine intelligence_ (2019). * Zhai et al. (2020) Wei Zhai, Yang Cao, Zheng-Jun Zha, HaiYong Xie, and Feng Wu. 2020. Deep structure-revealed network for texture recognition. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 11010–11019. * Zhai et al. (2019) Wei Zhai, Yang Cao, Jing Zhang, and Zheng-Jun Zha. 2019\. Deep multiple-attribute-perceived network for real-world texture recognition. In _Proceedings of the IEEE/CVF International Conference on Computer Vision_. 3613–3622. * Zhang and Tao (2019) Jing Zhang and Dacheng Tao. 2019. FAMED-Net: A fast and accurate multi-scale end-to-end dehazing network. _IEEE Transactions on Image Processing_ 29 (2019), 72–84. * Zhang and Tao (2020) Jing Zhang and Dacheng Tao. 2020. Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things. _IEEE Internet of Things Journal_ 8, 10 (2020), 7789–7817. * Zhang et al. (2018) Pengchuan Zhang, Qiang Liu, Dengyong Zhou, Tao Xu, and Xiaodong He. 2018. On the Discrimination-Generalization Tradeoff in GANs. In _International Conference on Learning Representations_. * ZHANG et al. (2019) Qiming ZHANG, Jing Zhang, Wei Liu, and Dacheng Tao. 2019\. Category Anchor-Guided Unsupervised Domain Adaptation for Semantic Segmentation. _Advances in Neural Information Processing Systems_ 32 (2019), 435–445. * Zhang et al. (2020) Ziqi Zhang, Yaya Shi, Chunfeng Yuan, Bing Li, Peijin Wang, Weiming Hu, and Zheng-Jun Zha. 2020. Object relational graph with teacher-recommended learning for video captioning. In _Proceedings of the IEEE/CVF conference on computer vision and pattern recognition_. 13278–13288. * Zheng et al. (2020a) Kecheng Zheng, Cuiling Lan, Wenjun Zeng, Zhizheng Zhang, and Zheng-Jun Zha. 2020a. Exploiting Sample Uncertainty for Domain Adaptive Person Re-Identification. _arXiv preprint arXiv:2012.08733_ (2020). * Zheng et al. (2021) Kecheng Zheng, Wu Liu, Lingxiao He, Tao Mei, Jiebo Luo, and Zheng-Jun Zha. 2021\. Group-aware label transfer for domain adaptive person re-identification. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 5310–5319. * Zheng et al. (2020b) Kecheng Zheng, Wu Liu, Jiawei Liu, Zheng-Jun Zha, and Tao Mei. 2020b. Hierarchical Gumbel Attention Network for Text-based Person Search. In _Proceedings of the 28th ACM International Conference on Multimedia_. 3441–3449. * Zhu et al. (2019) Xinge Zhu, Jiangmiao Pang, Ceyuan Yang, Jianping Shi, and Dahua Lin. 2019. Adapting object detectors via selective cross-domain alignment. In _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_. 687–696. * Zhu et al. (2020) Xizhou Zhu, Weijie Su, Lewei Lu, Bin Li, Xiaogang Wang, and Jifeng Dai. 2020\. Deformable DETR: Deformable Transformers for End-to-End Object Detection. In _International Conference on Learning and Representations_.
arxiv-papers
2021-07-27T07:17:12
2024-09-04T03:07:20.809445
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Wen Wang, Yang Cao, Jing Zhang, Fengxiang He, Zheng-Jun Zha, Yonggang\n Wen, Dacheng Tao", "submitter": "Wen Wang", "url": "https://arxiv.org/abs/2107.12636" }
2107.12648
# Gradient Play in $n$-Cluster Games with Zero-Order Information Tatiana Tatarenko, Jan Zimmermann, Jürgen Adamy The authors are with Control Methods and Robotics Lab at the TU Darmstadt, Germany. ###### Abstract We study a distributed approach for seeking a Nash equilibrium in $n$-cluster games with strictly monotone mappings. Each player within each cluster has access to the current value of her own smooth local cost function estimated by a zero-order oracle at some query point. We assume the agents to be able to communicate with their neighbors in the same cluster over some undirected graph. The goal of the agents in the cluster is to minimize their collective cost. This cost depends, however, on actions of agents from other clusters. Thus, a game between the clusters is to be solved. We present a distributed gradient play algorithm for determining a Nash equilibrium in this game. The algorithm takes into account the communication settings and zero-order information under consideration. We prove almost sure convergence of this algorithm to a Nash equilibrium given appropriate estimations of the local cost functions’ gradients. ## I Introduction Distributed optimization and game theory provide powerful frameworks to deal with optimization problems arising in multi-agent systems. In generic distributed optimization problems, the cost functions of agents are distributed across the network, meaning that each agent has only partial information about the whole optimization problem which is to be solved. Game theoretic problems arise in such networks when the agents do not cooperate with each other and the cost functions of these non-cooperative agents are coupled by the decisions of all agents in the system. The applications of game theoretic and distributed optimization approaches include, for example, electricity markets, power systems, flow control problems and communication networks [11, 12, 6]. On the other hand, cooperation and competition coexists in many practical situations, such as cloud computing, hierarchical optimization in Smart Grid, and adversarial networks [3, 4, 8]. A body of recent work has been devoted to analysis of non-cooperative games and distributed optimization problems in terms of a single model called _$n$ -cluster games_ [16, 19, 17, 18, 20, 5]. In such $n$-cluster games, each cluster corresponds to a player whose goal is to minimize her own cost function. However, the clusters in this game are not the actual decision-makers as the optimization of the cluster’s objective is controlled by the agents belonging to the corresponding cluster. Each of such agents has her own local cost function, which is available only to this agent, but depends on the joint actions of agents in all clusters. The cluster’s objective, in turn, is the sum of the local cost functions of the agents within the cluster. Therefore, in such models, each agent intends to find a strategy to achieve a Nash equilibrium in the resulting $n$-cluster game, which is a stable state that minimizes the cluster’s cost functions in response to the actions of the agents from other clusters. Continuous time algorithms for the distributed Nash equilibria seeking problem in multi-cluster games were proposed in [19, 17, 18]. The paper [17] solves an unconstrained multi-cluster game by using gradient-based algorithms, whereas the works [18] and [19] propose a gradient-free algorithm, based on zero-order information, for seeking Nash and generalized Nash equilibria respectively. In discrete time domain, the work [5] presents a leader-follower based algorithm, which can solve unconstrained multi-cluster games in linear time. The authors in [20] extend this result to the case of leaderless architecture. Both papers [5, 20] prove linear convergence in games with strongly monotone mappings and first-order information, meaning that agents can calculate gradients of their cost functions and use this information to update their states. In contrast to that, the work [16] deals with a gradient-free approach to the cluster games. However, the gradient estimations are constructed in such a way that only convergence to a neighborhood of the equilibrium can be guaranteed. Moreover, these estimations are obtained by using two query points, for which an extra coordination between the agents is required. Motivated by relevancy of $n$-cluster game models in many engineering applications, we present a discrete time distributed procedure to seek Nash equilibria in $n$-cluster games with zero-order information. We consider settings, where agents can communicate with their direct neighbors within the corresponding cluster over some undirected graph. However, in many practical situations the agents do not know the functional form of their objectives and can only access the current values of their objective functions at some query point. Such situations arise, for example, in electricity markets with unknown price functions [15]. In such cases, the information structure is referred to as zero-order oracle. Our work focuses on zero-order oracle information settings and, thus, assumes agents to have no access to the analytical form of their cost functions and gradients. The agents instead construct their local query points and get the corresponding cost values from the oracle. Based on these values, the agents estimate their local gradients to be able to follow the step in the gradient play procedure. We formulate the sufficient conditions and provide some concrete example on how to estimate the gradients to guarantee the almost sure convergence of the resulting algorithm to Nash equilibria in $n$-cluster games with strictly monotone game mappings. To the best of our knowledge, we present the first algorithm solving $n$-cluster games with zero-order oracle and the corresponding one-point gradient estimations. The paper is organized as follows. In Section II we formulated the $n$-cluster game with undirected communication topology in each cluster and zero-order oracle information. Section III introduces the gradient play algorithm which is based on the one-point gradient estimations. The convergence result is presented in Section III as well. Section IV provides an example of query points and gradient estimations which guarantee convergence of the algorithm discussed in Section III. Section V presents some simulation results. Finally, Section VI concludes the paper. Notations. The set $\\{1,\ldots,n\\}$ is denoted by $[n]$. For any function $f:K\to{\mathbb{R}}$, $K\subseteq{\mathbb{R}}^{n}$, $\nabla_{i}f(x)=\frac{\partial f(x)}{\partial x_{i}}$ is the partial derivative taken in respect to the $i$th coordinate of the vector variable $x\in{\mathbb{R}}^{n}$. We consider real normed space $E$, which is the space of real vectors, i.e. $E={\mathbb{R}}^{n}$. We use $(u,v)$ to denote the inner product in $E$. We use $\|\cdot\|$ to denote the Euclidean norm induced by the standard dot product in $E$. Any mapping $g:E\to E$ is said to be _strictly monotone on $Q\subseteq E$_, if $(g(u)-g(v),u-v)>0$ for any $u,v\in Q$, where $u\neq v$. We use ${\mathbb{B}}_{r}(p)$ to denote the ball of the radius $r\geq 0$ and the center $p\in E$ and ${\mathbb{S}}$ to denote the unit sphere with the center in $0\in E$. We use ${\mathcal{P}_{{\Omega}}\left\\{{v}\right\\}}$ to denote the projection of $v\in E$ to a set ${\Omega}\subseteq E$. The mathematical expectation of a random value $\xi$ is denoted by ${\mathbb{E}}\\{\xi\\}$. We use the big-$O$ notation, that is, the function $f(x):{\mathbb{R}}\to{\mathbb{R}}$ is $O(g(x))$ as $x\to a$, $f(x)$ = $O(g(x))$ as $x\to a$, if $\lim_{x\to a}\frac{|f(x)|}{|g(x)|}\leq K$ for some positive constant $K$. ## II Nash Equilibrium Seeking ### II-A Problem Formulation We consider a non-cooperative game between $n$ clusters. Each cluster $i\in[n]$ itself consists of $n_{i}$ agents. Let $J^{j}_{i}$ and ${\Omega}^{j}_{i}\subseteq{\mathbb{R}}$111All results below are applicable for games with different dimensions $\\{d^{j}_{i}\\}$ of the action sets $\\{{\Omega}^{j}_{i}\\}$. The one-dimensional case is considered for the sake of notation simplicity. denote respectively the cost function and the feasible action set of the agent $j$ in the cluster $i$. We denote the joint action set of the agents in the cluster $i$ by ${\Omega}_{i}={\Omega}^{1}_{i}\times\ldots\times{\Omega}_{i}^{n_{i}}$. Each function $J^{j}_{i}(x_{i},x_{-i})$, $i\in[n]$, depends on $x_{i}=(x_{i}^{1},\ldots,x_{i}^{n_{i}})\in{\Omega}_{i}$, which represents the joint action of the agents within the cluster $i$, and $x_{-i}\in{\Omega}_{-i}={\Omega}_{1}\times\ldots\times{\Omega}_{i-1}\times{\Omega}_{i+1}\times{\Omega}_{n}$, denoting the joint action of the agents from all clusters except for the cluster $i$. The cooperative cost function in the cluster $i\in[n]$ is, thus, $J_{i}(x_{i},x_{-i})=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}J^{j}_{i}(x_{i},x_{-i})$. We assume that the agents within each cluster can interact over an undirected communication graph ${\mathcal{G}}_{i}([n_{i}],{\mathcal{A}}_{i})$. The set of nodes is the set of the agents $[n_{i}]$ and the set of undirected arcs ${\mathcal{A}}_{i}$ is such that $(k,j)\in{\mathcal{A}}_{i}$ if and only if $(j,k)\in{\mathcal{A}}_{i}$, i.e. there is a bidirectional communication link between $k$ to $j$, over which information in form of a message can be sent from the agent $k$ to the agent $j$ and vice versa in the cluster $i$. However, there is _no explicit communication between the clusters_. Instead, we consider the following _zero-order_ information structure in the system: No agent has access to the analytical form of any cost function, including its own. Each agent can only observe the value of its local cost function given any joint action of all agents in the system. Formally, given a joint action $x\in{\Omega}$, each agent $j\in[n_{i}]$, $i\in[n]$ receives the value $J^{j}_{i}(x)$ from a zero-order oracle. Especially, no agent has or receives any information about the gradient. Let us denote the game between the clusters introduced above by $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$. We make the following assumptions regarding the game $\Gamma$: ###### Assumption 1. The $n$-cluster game under consideration is _strictly convex_. Namely, for all $i\in[n]$, the set ${\Omega}_{i}$ is convex, the cost function $J_{i}(x_{i},x_{-i})$ is continuously differentiable in $x_{i}$ for each fixed $x_{-i}$. Moreover, the game mapping, which is defined as $\displaystyle{\mathbf{F}}(x)\triangleq\left[\nabla_{1}J_{1}(x_{1},x_{-1}),\ldots,\nabla_{n}J_{n}(x_{n},x_{-n})\right]^{T}$ (1) is _strictly monotone_ on ${\Omega}$. ###### Assumption 2. Each function $\nabla_{i}J_{i}^{j}(x_{i},x_{-i})$ is Lipschitz continuous on ${\Omega}$. ###### Assumption 3. The action sets ${\Omega}_{j}^{i}$, $j\in[n_{i}]$, $i\in[n]$, are compact. Moreover, for each $i$ there exists a so called safety ball ${\mathbb{B}}_{r}(p)\subseteq{\Omega}_{i}$ with $r_{i}>0$ and $p_{i}\in{\Omega}_{i}$222Existence of the safety ball is required to construct feasible points for costs’ gradient estimations in the zero-order settings under consideration (see [1]).. The assumptions above are standard in the literature on both game-theoretic and zero-order optimization [1]. Finally, we make the following assumption on the communication graph, which guarantees sufficient information ”mixing” in the network within each cluster. ###### Assumption 4. The underlying undirected communication graph ${\mathcal{G}}_{i}([n_{i}],{\mathcal{A}}_{i})$ is connected for all $i=1,\ldots,n$. The associated non-negative mixing matrix $W_{i}=[w^{i}_{kj}]\in{\mathbb{R}}^{n\times n}$ defines the weights on the undirected arcs such that $w^{i}_{kj}>0$ if and only if $(k,j)\in{\mathcal{A}}_{i}$ and $\sum_{k=1}^{n_{i}}w^{i}_{kj}=1$, $\forall k\in[n_{i}]$. One of the stable solutions in any game $\Gamma$ corresponds to a Nash equilibrium defined below. ###### Definition 1. A vector $x^{*}=[x_{1}^{*},x_{2}^{*},\cdots,x_{n}^{*}]^{T}\in{\Omega}$ is called a _Nash equilibrium_ if for any $i\in[n]$ and $x_{i}\in{\Omega}_{i}$ $J_{i}(x_{i}^{*},x_{-i}^{*})\leq J_{i}(x_{i},x_{-i}^{*}).$ In this work, we are interested in _distributed seeking of a Nash equilibrium_ in any game $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ with the information structure described above and for which Assumptions 1-4 hold. ### II-B Existence and Uniqueness of the Nash Equilibrium In this subsection, we demonstrate the existence of the Nash equilibrium for $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ under Assumptions 1 and 3. For this purpose we recall the results connecting Nash equilibria and solutions of variational inequalities from [9]. ###### Definition 2. Consider a set $Q\subseteq{\mathbb{R}}^{d}$ and a mapping $g$: $Q\to{\mathbb{R}}^{d}$. A _solution $SOL(Q,g)$ to the variational inequality problem_ $VI(Q,g)$ is a set of vectors $q^{*}\in Q$ such that $\langle g(q^{*}),q-q^{*}\rangle\geq 0$, for any $q\in Q$. The following theorem is the well-known result on the connection between Nash equilibria in games and solutions of a definite variational inequality (see Corollary 1.4.2 in [9]). ###### Theorem 1. Consider a non-cooperative game $\Gamma$. Suppose that the action sets of the players $\\{{\Omega}_{i}\\}$ are closed and convex, the cost functions $\\{J_{i}(x_{i},x_{-i})\\}$ are continuously differentiable and convex in $x_{i}$ for every fixed $x_{-i}$ on the interior of the joint action set ${\Omega}$. Then, some vector $x^{*}\in{\Omega}$ is a Nash equilibrium in $\Gamma$, if and only if $x^{*}\in SOL({\Omega},{\mathbf{F}})$, where ${\mathbf{F}}$ is the game mapping defined by (1). Next, we formulate the result guaranteeing existence and uniqueness of $SOL(Q,g)$ in the case of strictly monotone map $Q$ (see Corollary 2.2.5 and Proposition 2.3.3 in [9]). ###### Theorem 2. Given the $VI(Q,g)$, suppose that $Q$ is compact and the mapping $g$ is strictly monotone. Then, the solution $SOL(Q,g)$ exists and is a singleton. Taking into account Theorems 1 and 2, we obtain the following result. ###### Theorem 3. Let $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ be a game for which Assumptions 1 and 3 hold. Then, there exists the unique Nash equilibrium in $\Gamma$. Moreover, the Nash equilibrium in $\Gamma$ is the solution of $VI({\Omega},{\mathbf{F}})$, where ${\mathbf{F}}$ is the game mapping (see (1)). Thus, if Assumptions 1 and 3 hold, we can guarantee existence and uniqueness of the Nash equilibrium in the game $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ under consideration and use the corresponding variational inequality in the analysis of the optimization procedure presented below. ## III Main Results ### III-A Zero-order gradient play between clusters To deal with the zero-order information available to the agents and local state exchanges within the clusters, we assume each agent $j$ from the cluster $i$ maintains a _local variable_ $\displaystyle x^{(j)}_{i}=[x^{(j)1}_{i},\cdots,x^{(j)j-1}_{i},x^{j}_{i},x^{(j)i+1}_{i},\cdots,x^{(j)n_{i}}_{i}]^{T}\in{\Omega}_{i},$ (2) which is her estimation of the joint action $x_{i}=[x^{1}_{i},x^{2}_{i},\cdots,x^{n_{i}}_{i}]^{T}\in{\Omega}_{i}$ of the agents from her cluster $i$. Here, $x^{(j)k}_{i}\in{\Omega}^{j}_{i}$ is player $k$’s estimate of $x^{j}_{i}$ and $x^{(j)j}_{i}=x^{j}_{i}\in{\Omega}^{j}_{i}$ is the action of agent $j$ from cluster $i$. The goal of the agents within each cluster is to update their local variables in such a way that the joint action $x=(x_{1},\ldots,x_{n})\in{\Omega}$ with $x_{i}=(x^{1}_{i},\ldots,x^{n_{i}}_{i})\in{\Omega}_{i}$ converges to the Nash equilibrium in the game $\Gamma$ between the clusters as time runs. To let the agents achieve this goal, we aim to adapt the standard projected gradient play approach to the cluster game with the zero-order information. At this point we assume each agent $j\in[n_{i}]$, $i\in[n]$, based on its local estimation $x^{(j)}_{i}$, constructs a feasible query point $\hat{x}^{(j)}_{i}\in{\Omega}_{i}$ and sends it to the oracle. As a reply from the oracle, the agent receives the value $J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$. The vector $\hat{{\tilde{x}}}_{-i}$ here corresponds to the point obtained by some combination of the query vectors sent by the agents from the other clusters. Formally, $\displaystyle\hat{{\tilde{x}}}_{-i}=(\hat{x}^{(j_{1})}_{1},\ldots,\hat{x}^{(j_{i-1})}_{i-1},\hat{x}^{(j_{i+1})}_{i+1},\ldots,\hat{x}^{(j_{n})}_{n}),$ (3) where $j_{k}$ denotes some agent from the cluster $k\in[n]$, $k\neq i$. Further each agent $j\in[n_{i}]$, $i\in[n]$, uses the received value $J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$ to obtain the random estimation $d^{j}_{i}$ of her local cost’s gradient $\nabla_{i}J^{j}_{i}$ at the point $(x^{(j)}_{i},{\tilde{x}}_{-i})$, where $\displaystyle{\tilde{x}}_{-i}=(x^{(j_{1})}_{1},\ldots,x^{(j_{i-1})}_{i-1},x^{(j_{i+1})}_{i+1},\ldots,x^{(j_{n})}_{n})$ (4) corresponds to the local estimations of other agents (one for each cluster different from $i$) based on which query points are obtained. Thus, $d^{j}_{i}=d^{j}_{i}(J^{j}_{i}(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i}))\in{\mathbb{R}}^{n_{i}}$. As $d^{j}_{i}$ is an estimation of $\nabla_{i}J^{j}_{i}(x^{(j)}_{i},{\tilde{x}}_{-i})$, we represent this vector by the following decomposition: $\displaystyle d^{j}_{i}=\nabla_{i}J^{j}_{i}(x^{(j)}_{i},{\tilde{x}}_{-i})+e^{j}_{i},$ (5) where $e^{j}_{i}$ is a random vector reflecting inaccuracy of the obtained estimation, i.e. the estimation error vector. Note that for the joint query point $(\hat{x}^{(j)}_{i},\hat{{\tilde{x}}}_{-i})$ the oracle is free to choose any combination $\hat{{\tilde{x}}}_{-i}$ of the local queries defined in (3). Now we are ready to formulate the gradient play between the clusters. Starting with an arbitrary $x^{(j)}_{i}(0)\in{\Omega}_{i}$, each agent $j$ updates the local estimation vector $x^{(j)}_{i}$, $j\in[n_{i}]$, $i\in[n]$, as follows: $\displaystyle x^{(j)}_{i}(t+1)={\mathcal{P}_{{\Omega}_{i}}\left\\{{\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)-\alpha_{t}d^{j}_{i}(t)}\right\\}},$ (6) where the time-dependent parameter $\alpha_{t}>0$ corresponds to the step size. Let ${\mathcal{F}}_{t}$ be the $\sigma$-algebra generated by the estimations $\\{x^{(j)}_{i}(m)\\}_{m=0}^{t}$ up to time $t$, $j\in[n_{i}]$, $i\in[n]$. Let ${\bar{x}}_{i}(t)=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}x^{(j)}_{i}(t)$ be the running average of the agents’ estimations vectors within the cluster $i$. The following proposition describes the behavior of ${\bar{x}}_{i}(t)$ in the long run. ###### Proposition 1. Let Assumptions 3 and 4 hold and $x^{(j)}_{i}(t)$, $j\in[n_{i}]$, $i\in[n]$, be updated according to (6). Then for all $j\in[n_{i}]$, $i\in[n]$ 1. 1. if $\lim_{t\to\infty}\alpha_{t}=0$ and $\lim_{t\to\infty}\alpha_{t}\sqrt{{\mathbb{E}}\\{\|e^{j}_{i}(t)\|^{2}|{\mathcal{F}}_{t}\\}}=0$ almost surely, then $\lim_{t\to\infty}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|=0$ almost surely; 2. 2. if $\sum_{t=0}^{\infty}\alpha^{2}_{t}<\infty$ and $\sum_{t=0}^{\infty}\alpha^{2}_{t}{{\mathbb{E}}\\{\|e^{j}_{i}(t)\|^{2}|{\mathcal{F}}_{t}\\}}<\infty$ almost surely, then $\sum_{t=0}^{\infty}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|<\infty$. ###### Proof. Follows from Lemma 8 in [7]333The proof can be repeated up to (37) in [7]. The inequality (37) and the analysis afterward stay valid in terms of the conditional expectation ${\mathbb{E}}\\{\cdot|{\mathcal{F}}_{t}\\}$.. In view of the proposition above and to be able to analyze behavior of the algorithm by means of the running averages ${\bar{x}}_{i}(t)$, $i\in[n]$ we make the following assumption on the balance between the step size $\alpha_{t}$ and the error term $e^{j}_{i}(t)$. ###### Assumption 5. The step size $\alpha_{t}$ and the error term $e^{j}_{i}(t)$ are such that $\displaystyle\sum_{t=0}^{\infty}\alpha_{t}=\infty,\,\sum_{t=0}^{\infty}\alpha^{2}_{t}<\infty,$ $\displaystyle\sum_{t=0}^{\infty}\alpha_{t}{\mathbb{E}}\\{\|e^{j}_{i}((t))\||{\mathcal{F}}_{t}\\}<\infty\,\mbox{ almost surely},$ $\displaystyle\sum_{t=0}^{\infty}\alpha^{2}_{t}{\mathbb{E}}\\{\|e^{j}_{i}((t))\|^{2}|{\mathcal{F}}_{t}\\}<\infty\,\mbox{ almost surely}.$ In Section IV we shed light on how the gradients can be sampled to guarantee fulfillment of Assumption 5. With Proposition 1 in place, we are ready to prove the main result formulated in the theorem below. ###### Theorem 4. Let Assumptions 1-5 hold and $x^{(j)}_{i}(t)$, $j\in[n_{i}]$, $i\in[n]$, be updated according to (6). Then the joint action $x(t)=(x_{1}(t),\ldots,x_{n}(t))$ converges almost surely to the unique Nash equilibrium $x^{*}$ in the $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$, i.e. $\Pr\\{\lim_{t\to\infty}\|x(t)-x^{*}\|=0\\}=1$. ###### Proof. Let $x^{*}=(x_{1}^{*},\ldots,x_{n}^{*})$ be the unique Nash equilibrium in the game $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$, see Theorem 3. We proceed with estimating the distance between $x^{(j)}_{i}(t+1)$ and $x_{i}^{*}$. Let $v^{j}_{i}(t)=\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)$. As $x_{i}^{*}\in{\Omega}_{i}$, we can use the non-expansion of the projection operator to conclude that almost surely (a.s.)444In the following discussion the big-$O$ notation is defined under the limit $t\to\infty$ (see Notations). $\displaystyle\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\leq\|v^{j}_{i}(t)-\alpha_{t}d^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (7) $\displaystyle=\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (8) $\displaystyle\quad-2\alpha_{t}(d^{j}_{i}(t),v^{j}_{i}(t)-x_{i}^{*})+\alpha_{t}^{2}\|d^{j}_{i}(t)\|^{2}$ (9) $\displaystyle=\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (10) $\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (11) $\displaystyle\quad-2\alpha_{t}(e^{j}_{i}((t)),v^{j}_{i}(t)-x_{i}^{*})+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2}))$ (12) $\displaystyle\leq\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (13) $\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (14) $\displaystyle\quad+O(\alpha_{t}\|e^{j}_{i}((t))\|)+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2})),$ (15) where in the last equality we used (5), which implies that a.s. $\|d^{j}_{i}(t)\|^{2}\leq 2(\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|^{2}+\|e^{j}_{i}(t)\|^{2})$ and, thus, $\|d^{j}_{i}(t)\|^{2}=O(1+\|e^{j}_{i}(t)\|^{2})$ a.s. (see Assumptions 1 and 3), whereas in the last inequality we used the Cauchy–Schwarz inequality, implying $-(e^{j}_{i}((t)),v^{j}_{i}(t)-x_{i}^{*})\leq\|e^{j}_{i}((t))\|v^{j}_{i}(t)-x_{i}^{*}\|\,\mbox{a.s.},$ and Assumption 3 implying almost sure boundedness of $\|v^{j}_{i}(t)-x_{i}^{*}\|$. We focus now on the terms $\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ and $-2\alpha_{t}(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$. Due to Assumption 4, we have that a.s. $\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}=\|\sum_{l=1}^{n_{i}}w^{i}_{jl}x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}\leq\sum_{l=1}^{n_{i}}w^{i}_{jl}\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}.$ And, as $\sum_{j=1}^{n_{i}}w^{i}_{jl}=1$, we obtain that a.s. $\displaystyle\sum_{j=1}^{n_{i}}\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ $\displaystyle\leq\sum_{l=1}^{n_{i}}(\sum_{j=1}^{n_{i}}w^{i}_{jl})\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}$ (16) $\displaystyle=\sum_{l=1}^{n_{i}}\|x^{(l)}_{i}(t)-x_{i}^{*}\|^{2}.$ (17) Next, $\displaystyle(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),$ $\displaystyle{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (18) $\displaystyle=$ $\displaystyle(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (19) $\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$ (20) $\displaystyle+(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$ (21) $\displaystyle-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$ (22) $\displaystyle+(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}),$ (23) where $\bar{\tilde{x}}_{-i}(t)\in{\mathbb{R}}^{\sum_{k\neq i}n_{k}}$ is the joint running average of the agents’ local variable over all clusters except for the cluster $i$ (see more details in (4)). Thus, by applying the Cauchy–Schwarz inequality to (18), we get $\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (24) $\displaystyle\leq\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|$ (25) $\displaystyle\quad+\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))-\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t))\|$ (26) $\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\times\|{\bar{x}}_{i}(t)-x_{i}^{*}\|$ (27) $\displaystyle\quad-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}),\,\mbox{a.s.}.$ (28) Taking into account almost sure boundedness of $\|\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))\|$ and $\|{\bar{x}}_{i}(t)-x_{i}^{*}\|$ (see Assumptions 1 and 3) and Assumption 2, we conclude that $\displaystyle-(\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t)),v^{j}_{i}(t)-x_{i}^{*})$ (29) $\displaystyle\leq O(\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|)$ (30) $\displaystyle\quad+O(\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|+\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$ (31) $\displaystyle\quad-(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t),{\tilde{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*}).$ (32) Thus, we get from (7) $\displaystyle\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\leq\|v^{j}_{i}(t)-x_{i}^{*}\|^{2}$ (33) $\displaystyle\quad-2\alpha_{t}(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$ (34) $\displaystyle\quad+2\alpha_{t}O(\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|)$ (35) $\displaystyle\quad+2\alpha_{t}O(\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|+\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$ (36) $\displaystyle\quad+O(\alpha_{t}\|e^{j}_{i}((t))\|)+O(\alpha_{t}^{2}(1+\|e^{j}_{i}(t)\|^{2})),\,\mbox{a.s.}.$ (37) Analogously to (16) $\sum_{j=1}^{n_{i}}\|v^{j}_{i}(t)-{\bar{x}}_{i}(t)\|\leq\sum_{l=1}^{n_{i}}\||x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|.$ Therefore, by averaging both sides of (33) over $j=1,\ldots,n_{i}$ and taking the conditional expectation in respect to ${\mathcal{F}}_{t}$ (below we use the notation ${\mathbb{E}}\\{\cdot|{\mathcal{F}}_{t}\\}={\mathbb{E}}_{t}\\{\cdot\\}$), we obtain that a.s. $\displaystyle\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}{\mathbb{E}}_{t}\\{\|x^{(j)}_{i}(t+1)-x_{i}^{*}\|^{2}\\}\leq\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}$ (38) $\displaystyle\quad-2\alpha_{t}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}(\nabla_{i}J^{j}_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})$ (39) $\displaystyle\quad+O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)$ (40) $\displaystyle\quad+O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$ (41) $\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\left(O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\}+\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}))\right)$ (42) $\displaystyle=\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}$ (43) $\displaystyle\quad-2\alpha_{t}(\nabla_{i}J_{i}({\bar{x}}_{i}(t){\bar{x}}_{-i}(t)),{\bar{x}}_{i}(t)-x_{i}^{*})+h_{i}(t),$ (44) where $\displaystyle h_{i}(t)$ $\displaystyle=O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)$ $\displaystyle\quad+O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)$ $\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\})$ $\displaystyle\quad+\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\})).$ By taking into account Proposition 1 2) and the definition of ${\tilde{x}}_{-i}(t)$ (see (4)), we conclude that a.s. $\sum_{t=0}^{\infty}O\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}\|x^{(j)}_{i}(t)-{\bar{x}}_{i}(t)\|\right)<\infty,$ $\sum_{t=0}^{\infty}O(\alpha_{t}\|{\tilde{x}}_{-i}(t)-{\bar{x}}_{-i}(t)\|)<\infty.$ Moreover, due to Assumption 5, $\sum_{t=0}^{\infty}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}O(\alpha_{t}{\mathbb{E}}_{t}\\{\|e^{j}_{i}((t))\|\\}<\infty,$ $\sum_{t=0}^{\infty}\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\alpha_{t}^{2}(1+{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}))<\infty$ almost surely. Thus, $\displaystyle\sum_{t=0}^{\infty}h_{i}(t)<\infty\,\mbox{a.s. for all }i\in[n].$ (45) Next, let us introduce the vector $u(t)=(u_{1}(t),\ldots,u_{n}(t)),$ where $u_{i}=\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}\right)^{\frac{1}{2}}$. Therefore, summing (38) over $i\in[n]$ implies $\displaystyle{\mathbb{E}}_{t}\|u(t+1)\|^{2}\leq\|u(t)\|^{2}-2\alpha_{t}({\mathbf{F}}({\bar{x}}(t)),{\bar{x}}(t)-x^{*})$ (46) $\displaystyle\qquad\qquad\qquad\qquad\qquad+\sum_{i=1}^{n}h_{i}(t)$ (47) $\displaystyle\leq\|v(t)\|^{2}-2\alpha_{t}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})$ (48) $\displaystyle\qquad\qquad\qquad\qquad\qquad+\sum_{i=1}^{n}h_{i}(t),$ (49) where in the last inequality we used the fact that $x^{*}$ is the Nash equilibrium in $\Gamma(n,\\{J_{i}\\},\\{{\Omega}_{i}\\},\\{{\mathcal{G}}_{i}\\})$ and, thus, $({\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})\geq 0$ a.s. for all $t$ (see Theorem 1). Due to the strictly monotone mapping (see Assumption 1), which implies $({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})\geq 0,$ and (45), we can apply the Robbins and Siegmund result (see Theorem 5 in Appendix) to the inequality (46). With that, we conclude that $\|u(t)\|^{2}$ converges a.s. as $t\to\infty$ and $\sum_{t=1}^{\infty}\alpha_{t}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})<\infty\,\mbox{a.s.}$ Taking the inequality above and the fact that $\sum_{t=0}^{\infty}\alpha_{t}=\infty$ into account, we conclude that $\liminf_{t\to\infty}({\mathbf{F}}({\bar{x}}(t))-{\mathbf{F}}(x^{*}),{\bar{x}}(t)-x^{*})=0\,\mbox{a.s.},$ which together with strict monotonicity of ${\mathbf{F}}$ implies existence of the subsequence ${\bar{x}}(t_{m})$ such that $\lim_{m\to\infty}{\bar{x}}(t_{m})=x^{*}$ almost surely. From Proposition 1 it follows that $\lim_{m\to\infty}x^{(j)}_{i}(t_{m})=x^{*}$ a.s. for all $j\in[n_{i}]$, $i\in[n]$. Finally, by taking into account existence of the finite almost sure limit of $\|u(t)\|^{2}=\sum_{i=1}^{n}\left(\frac{1}{n_{i}}\sum_{j=1}^{n_{i}}\|x^{(j)}_{i}(t)-x_{i}^{*}\|^{2}\right)$ as $t\to\infty$, we conclude that $\Pr\\{\lim_{t\to\infty}\|x^{(j)}_{i}(t)-x_{i}^{*}\|=0\\}=1\,\mbox{for all }j\in[n_{i}],\,i\in[n],$ and, therefore, $\Pr\\{\lim_{t\to\infty}\|x_{i}(t)-x_{i}^{*}\|=0\\}=1\,\mbox{for all }i\in[n].$ ## IV Gradient Estimations In this section we present an approach to estimate the gradients of the agents’ cost functions in such a way that Assumption 5 is fulfilled. The idea is borrowed from the work [1] dealing with bandit learning in games. We assume the safety ball parameters $r_{i}$ and $p_{i}$ (see Assumption 3) are known for each agent from the cluster $i$. To obtain the estimation $d^{j}_{i}(t)$ based on the current estimation $x^{(j)}_{i}(t)$ and to follow the update in (6), each agent $j\in[n_{i}]$ in the cluster $i$, $i\in[n]$, takes the following steps at time $t$. The agent samples the vector $z^{j}_{i}(t)$ from the uniform distribution on the unit sphere ${\mathbb{S}}\subset{\mathbb{R}}^{n_{i}}$. The query direction is defined by $w^{(j)}_{i}(t)=z^{j}_{i}(t)-r_{i}^{-1}(x^{(j)}_{i}(t)-p_{i})$. Then, the query point at which the oracle calculates the local cost function value is $\displaystyle\hat{x}^{(j)}_{i}(t)$ $\displaystyle=x^{(j)}_{i}(t)+{\sigma}_{t}w^{(j)}_{i}(t)$ (50) $\displaystyle=(1-{\sigma}_{t}r_{i}^{-1})x^{(j)}_{i}(t)+{\sigma}_{t}(z^{j}_{i}+r_{i}^{-1}p),$ (51) where ${\sigma}_{t}$ is the query radius chosen such that ${\sigma}_{t}r_{i}^{-1}<1$. Note that, given $x^{(j)}_{i}(t)\in{\Omega}_{i}$, the query point $\hat{x}^{(j)}_{i}(t)$ above is feasible, i.e. $\hat{x}^{(j)}_{i}(t)\in{\Omega}_{i}$ (see [1] for more details). The gradient estimation itself is obtained as follows: $\displaystyle d^{j}_{i}(t)=\frac{n_{i}}{{\sigma}_{t}}J^{(j)}_{i}(\hat{x}^{(j)}_{i}(t),\hat{{\tilde{x}}}_{-i}(t))\cdot z^{j}_{i},$ (52) where $\hat{{\tilde{x}}}_{-i}(t)$ is defined as in (3). This vector is then used to follow the update in (6). As it has been proven in [1] (see, for example, (4.7) in [1]), $d^{j}_{i}(t)$, as constructed above, satisfies the following property: $\displaystyle d^{j}_{i}(t)=\nabla_{i}J^{j}_{i}(x^{(j)}_{i}(t),{\tilde{x}}_{-i}(t))+e^{j}_{i}(t),$ (53) $\displaystyle\mbox{where }\,{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|\\}=O({\sigma}_{t}),$ (54) $\displaystyle\qquad\quad{\mathbb{E}}_{t}\\{\|e^{j}_{i}(t)\|^{2}\\}=O\left(\frac{1}{{\sigma}^{2}_{t}}\right)$ (55) with ${\tilde{x}}_{-i}(t)$ defined as in (4). Thus, for fulfillment of Assumption 5 the step size parameter $\alpha_{t}$ and the query radius ${\sigma}_{t}$ must be balanced as follows: $\displaystyle\sum_{t=0}^{\infty}\alpha_{t}=\infty,\,\sum_{t=0}^{\infty}\alpha_{t}<\infty,$ $\displaystyle\sum_{t=0}^{\infty}\alpha_{t}{\sigma}_{t}<\infty,\sum_{t=0}^{\infty}\frac{\alpha^{2}_{t}}{{\sigma}_{t}^{2}}<\infty.$ One example of an appropriate choice is $\alpha_{t}=\frac{\alpha_{0}}{t^{a}}$, ${\sigma}_{t}=\frac{\sigma_{0}}{t^{b}}$ with $\displaystyle\frac{1}{2}<a\leq 1,\,b\geq 0,$ $\displaystyle a+b>1,\,2a-2b>1.$ One possible parameter set is $a=1$, $b=\frac{1}{3}$. ###### Remark 1. There exist other approaches to one-point gradient estimations. The most known one corresponds to the queries sampled from the Gaussian distribution (see [14, 2]). However, to guarantee feasibility in this case, the query points have to be projected onto the action sets. To be able to control the deviation term, that appears due to this projection, one needs to introduce an auxiliary time-dependent parameter to the projection step of the main procedure (see [13, 2]). Thus, introducing this parameter will somewhat complicate the analysis. That is why we leave the approach based on sampling from the Gaussian distribution beyond the scope of this paper. ## V Simulation Results In this section, we verify our theoretical analysis with a practical simulation in order to show that the states of the agent system converge to the Nash equilibrium, defined in Definition 1, when using the update equation (6) and the oracle gradient estimation of (52). As an example application, we chose a version of the well-known Cournot game. Consider the following setup: There are $n$ companies that compete against each other regarding the price of some specific product. Each company $i$ owns $n_{i}$ factories that produce said product. It is assumed that all factories produce the product with the same quality. The cost of factory $j$ belonging to cluster $i$ for producing the amount $x_{i}^{j}\in\mathbb{R}^{+}_{0}$ of the product is specific for this factory and defined by $C_{i}^{j}(x_{i}^{j})=a_{i}^{j}(x_{i}^{j})^{2}+b_{i}^{j}x_{i}^{j}+c_{i}^{j}.$ (56) Naturally, the amount of product produced cannot be negative. Furthermore, each company has lower and upper production limits. The former defines a lower bound $\underline{x}_{i}^{j}$, for which production is still cost efficient, while the latter defines a production facility dependent upper bound $\overline{x}_{i}^{j}$. Each company $i$ aggregates the product, produced in their $n_{i}$ factories, and sells it. In this version of the Cournot game, it is assumed that there exists only a single customer instance that buys all the aggregated product from all companies. The price that the customer pays per unit of product is dependent on the total supply by all companies and therefore defined as follows: $P(x)=P_{c}-\sum_{i=1}^{n}\sum_{j=1}^{n_{i}}x_{i}^{j},$ (57) where $P_{c}$ is a constant, which is chosen such that for any decision vector $\underline{x}\leq x\leq\overline{x}$ it holds that $P(x)>0$. With this price definition and assuming that the production costs for the factories belonging to the company is shared, each company $i$ aims to minimize its profit function, therefore solving the following optimization problem: $\min_{\underline{x}_{i}\leq x_{i}\leq\overline{x}_{i}}\sum_{j=1}^{n_{i}}C_{i}^{j}(x_{i}^{j})-x_{i}^{j}P(x_{i},x_{-i})=\min_{\underline{x}_{i}\leq x_{i}\leq\overline{x}_{i}}J_{i}(x_{i},x_{-i})$ (58) It can be seen that the companies’ profits are coupled by the customer’s price function, therefore a Nash equilibrium needs to be found, from which no company has any incentive to deviate. Relating to the $n$-cluster games described in this paper, the companies represent the clusters, while the factories correspond to the agents. It can be readily confirmed that the profit optimization problem in Equation (58) fulfils the Assumptions 1 \- 2. | Company $i=1$ | Company $i=2$ ---|---|--- $j$ | 1 | 2 | 3 | 4 | 1 | 2 | 3 | 4 $a_{i}^{j}$ | 5 | 8 | 4 | 5 | 3 | 7 | 9 | 2 $b_{i}^{j}$ | 10 | 11 | 9 | 12 | 10 | 11 | 12 | 9 $c_{i}^{j}$ | 1 | 3 | 2 | 5 | 3 | 2 | 3 | 1 $\underline{x}_{i}^{j}$ | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 $\overline{x}_{i}^{j}$ | 20 | 20 | 20 | 20 | 10 | 10 | 10 | 10 TABLE I: Parameters of agents in Cournot-Game. For our simulation, we choose a small setup consisting of two clusters, each containing four agents with parameters listed in Table I and cost coefficient $P_{c}=250$. The agents inside the cluster $i$ are connected by an undirected communication graph $G_{i}$ that fulfils Assumption 4. Over this graph, state information is shared inside the cluster $i$ such that an estimation of all agent’s states $x_{i}^{(j)}$ can be performed. The agents update their own gradient estimation according to equation (52), using the zero-order oracle information at the query point $\hat{x}_{i}^{j}$ defined in (50). The time- dependent, decreasing step-size $\alpha_{t}$ of the gradient update and the query radius $\sigma_{t}$ are chosen such that Assumption 5 is satisfied. Choosing a good set of parameters $\alpha_{0},\sigma_{0}>0$ and $a,b$ is crucial for the convergence speed of the algorithm. Even then, due to the fact that only zero-order information is available, convergence is slow. In Figure 1 the states, resulting from the application of the proposed algorithm to the scenario specified above, are plotted. The dashed line marks the true Nash Equilibrium $x^{*}$, while the two solid coloured lines distinguish between the states of company 1, i.e. $x_{1}$, and company 2, i.e. $x_{2}$, respectively. Because there are only four agents in each cluster, which are connected by an almost fully connected graph, the consensus dynamic of the agent system is almost negligible against the gradient estimation and update dynamic. It can be seen that the algorithm converges to a satisfactory vicinity of the Nash Equilibrium states after about $1\cdot 10^{5}$ Iterations at which the error norm between the agent’s states and the true Nash equilibrium $x^{*}$ measures $||x-x^{*}||_{2}$ = 0.40. While the constraints of company 2 are not touched, the true Nash Equilibrium for two firms of the second company lies at their maximum production limit 10. Figure 1: Convergence of the agent’s states towards the Nash equilibrium of the n-cluster game. Error norm after $1\times 10^{5}$ steps: $||x-x^{*}||_{2}=0.400$. ## VI Conclusion In this paper we presented the distributed gradient play algorithm for strictly convex $n$-cluster games with communication setups within each cluster and a zero-order oracle in the whole system. We prove the almost sure convergence of this procedure to the unique Nash equilibria given an appropriate estimations of the local agents’ gradients. The future work will be devoted to investigation of possible modifications which should enable a faster convergence rate. The following is a well-known result of Robbins and Siegmund on non-negative random variables [10]. ###### Theorem 5. Let $(\Omega,F,P)$ be a probability space and $F_{1}\subset F_{2}\subset\dots$ a sequence of sub-$\sigma$-algebras of $F$. Let $z_{t},b_{t},\xi_{t},$ and $\zeta_{t}$ be non-negative $F_{t}$-measurable random variables satisfying $\displaystyle{\mathbb{E}}(z_{t+1}|F_{t})\leq z_{t}(1+b_{t})+\xi_{t}-\zeta_{t}.$ Then, almost surely $\lim_{t\to\infty}z_{t}$ exists and is finite for the case in which $\\{\sum_{t=1}^{\infty}b_{t}<\infty,\;\sum_{t=1}^{\infty}\xi_{t}<\infty\\}$. Moreover, in this case, $\sum_{t=1}^{\infty}\zeta_{t}<\infty$ almost surely. ## References * [1] M. Bravo, D. Leslie, and P. Mertikopoulos. Bandit learning in concave n-person games. In Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS’18, page 5666–5676, Red Hook, NY, USA, 2018. Curran Associates Inc. * [2] A.D. Flaxman, A.T. Kalai, and H.B. McMahan. Online convex optimization in the bandit setting: Gradient descent without a gradient. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’05, pages 385–394, USA, 2005. Society for Industrial and Applied Mathematics. * [3] B. Gharesifard and J. Cortés. Distributed convergence to nash equilibria in two-network zero-sum games. Automatica, 49(6):1683–1692, 2013. * [4] M. Jarrah, M. Jaradat, Y. Jararweh, M. Al-Ayyoub, and A. Bousselham. A hierarchical optimization model for energy data flow in smart grid power systems. Information Systems, 53:190–200, 2015. * [5] M. Meng and X. Li. On the linear convergence of distributed nash equilibrium seeking for multi-cluster games under partial-decision information. arXiv preprint:2005.06923, 2020. * [6] A. Nedić and J. Liu. Distributed optimization for control. Annual Review of Control, Robotics, and Autonomous Systems, 1(1):77–103, 2018. * [7] A. Nedić, A. Ozdaglar, and P. A. Parrilo. Constrained consensus and optimization in multi-agent networks. IEEE Transactions on Automatic Control, 55(4):922–938, 2010. * [8] D. Niyato, A. V. Vasilakos, and Z. Kun. Resource and revenue sharing with coalition formation of cloud providers: Game theoretic approach. In 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pages 215–224, 2011. * [9] J.-S. Pang and F. Facchinei. Finite-dimensional variational inequalities and complementarity problems : vol. 1. Springer series in operations research. Springer, New York, Berlin, Heidelberg, 2003. * [10] H. Robbins and D. Siegmund. A convergence theorem for non negative almost supermartingales and some applications. In Herbert Robbins Selected Papers, pages 111–135. Springer, 1985\. * [11] W. Saad, H. Zhu, H. V. Poor, and T. Başar. Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications. IEEE Signal Processing Magazine, 29(5):86–105, 2012. * [12] G. Scutari, S. Barbarossa, and D. P. Palomar. Potential games: A framework for vector power control problems with coupled constraints. In 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, volume 4, pages 241–244, May 2006. * [13] M. Kamgarpour T. Tatarenko. Bandit online learning of nash equilibria in monotone games. arXiv preprint:2009.04258, 2020. * [14] T. Tatarenko and M. Kamgarpour. Learning nash equilibria in monotone games. In 2019 IEEE 58th Conference on Decision and Control (CDC), pages 3104–3109, 2019. * [15] A. C. Tellidou and A. G. Bakirtzis. Agent-based analysis of capacity withholding and tacit collusion in electricity markets. IEEE Transactions on Power Systems, 22(4):1735–1742, Nov 2007. * [16] G. Hu Y. Pang. Nash equilibrium seeking in n-coalition games via a gradient-free method. arXiv preprint:2008.12909, 2020. * [17] M. Ye, G. Hu, and F. L. Lewis. Nash equilibrium seeking for N-coalition noncooperative games. Automatica, 95:266–272, 2018. * [18] M. Ye, G. Hu, and S. Xu. An extremum seeking-based approach for Nash equilibrium seeking in N-cluster noncooperative games. Automatica, 114:108815, 2020. * [19] X. Zeng, J. Chen, S. Liang, and Y. Hong. Generalized Nash equilibrium seeking strategy for distributed nonsmooth multi-cluster game. Automatica, 103:20–26, 2019. * [20] J. Zimmermann, T. Tatarenko, V. Willert, and J. Adamy. Gradient-tracking over directed graphs for solving leaderless multi-cluster games. arXiv preprint:2102.09406, 2021.
arxiv-papers
2021-07-27T08:00:52
2024-09-04T03:07:20.830019
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Tatiana Tatarenko, Jan Zimmermann, J\\\"urgen Adamy", "submitter": "Jan Zimmermann", "url": "https://arxiv.org/abs/2107.12648" }
2107.12650
# Joint Power and User Grouping Optimization in Cell-Free Massive MIMO Systems Fengqian Guo, Hancheng Lu and Zhuojia Gu This work was supported by National Science Foundation of China under Grant 61771445, 61631017, 91538203.F. Guo, H. Lu and Z. Gu are with CAS Key Laboratory of Wireless-Optical Communications, University of Science and Technology of China, Hefei 230027, China. (Email: [email protected], [email protected], [email protected]). ###### Abstract To relieve the stress on channel estimation and decoding complexity in cell- free massive multiple-input multiple-output (MIMO) systems, user grouping problem is investigated in this paper, where access points (APs) based on time-division duplex (TDD) are considered to serve users on different time resources and the same frequency resource. In addition, when quality of service (QoS) requirements are considered, widely-used max-min power control is no longer applicable. We derive the minimum power constraints under diverse QoS requirements considering user grouping. Based on the analysis, we formulate the joint power and user grouping problem under QoS constraints, aiming at minimizing the total transmit power. A generalized benders decomposition (GBD) based algorithm is proposed, where the primal problem and master problem are solved iteratively to approach the optimal solution. Simulation results demonstrate that by user grouping, the number of users served in cell-free MIMO systems can be as much as the number of APs without increasing the complexity of channel estimation and decoding. Furthermore, with the proposed user grouping strategy, the power consumption can be reduced by 2-3 dB compared with the reference user grouping strategy, and by 7 dB compared with the total transmit power without grouping. ###### Index Terms: Cell-free systems, massive multiple-input multiple-output (MIMO), time- division duplex (TDD), user grouping, generalized benders decomposition(GBD) ## I Introduction The rapid growth of mobile traffic, especially high volume video traffic, leads to pressing need for high throughput in mobile networks[1]. To cope with such situation, massive multiple-input multiple-output (MIMO) emerges as a promising technique [2, 3, 4, 5]. In massive MIMO, massive antenna arrays are deployed to simultaneously serve many users on the same time-frequency resource, with which high spectral efficiency is achieved. By distributing numerous antennas in a wide area, the concept of cell-free massive MIMO [4, 6] has been proposed recently and attracted much attention from academic and industrial researchers. Essentially, cell free massive MIMO is an integration of massive MIMO and distributed MIMO, which is expected to exploit benefits of these two techniques. In cell free massive MIMO, many geographically located access points are equipped with single or a few antennas. They serve a much smaller number of users coherently on the same time-frequency resource, ensuring uniformly good quality of service (QoS) for all users. Consequently, cell boundaries are eliminated. Moreover, a central processing unit (CPU) is introduced to coordinate data transmission at different APs through high- capacity backhaul links connecting these APs. Compared with small-cell systems, existing studies have shown that cell-free massive MIMO systems can significantly improve per-user throughput. However, at the cost of much more backhaul overheads[4]. Many research attempts have been done to improve the performance of the cell- free massive MIMO systems. Among them, power control has been addressed, which is globally optimized by CPU to realize uniformly good services for all users in a wide area. The pioneer work on cell-free massive MIMO was done in [4], where max-min power control is performed to maximize the lowest user throughput. After that, the max-min power control problem is investigated under various scenarios[4, 7, 8, 9]. For conjugate beamforming and zero- forcing (ZF) precoding, low complexity power control algorithms based on the max-min criterion were developed in [7]. In [8], a max-min power control algorithm was proposed with consideration of transceiver hardware impairments. The authors in [9] studied the uplink max-min signal-to-interference-plus- noise ratio problem and obtained a globally optimum solution with an iterative algorithm. In the downlink cell-free massive MIMO systems, power control can be optimized to maximize the energy efficiency [10]. Furthermore, power control has also been jointly considered with load balancing [11], backhaul [12], fronthaul [13], etc. There still remain some deficiencies in research on cell-free massive MIMO. In order to implement beamforming in a hardware-friendly way or to eliminate co- channel interference by zero-forcing precoding, in general, the number of antennas in massive MIMO systems is assumed to be significantly larger than the number of users [14, 15]. Similarly, in cell-free massive MIMO systems, since each AP is assumed to be equipped with one or a few antennas, the number of served users is much smaller than the number of APs [16, 6]. To serve more users, much more APs should be deployed. Correspondingly, the hardware cost and system complexity will be significantly increased [7][8]. Furthermore, to ensure the accuracy of channel estimation, length of pilot sequence is usually assumed no less than the number of users[10, 17]. However, the number of samples in each coherence interval are limited. Hence, the length of data in each coherence interval will reduce as the number of users increase. Additionally, users have diverse QoS requirements. Requirement satisfaction is more important for users than fairness. In this case, widely-used max-min power control is no longer applicable. To address these issues, in this paper, we investigate the time-division duplex (TDD) based cell-free massive MIMO systems[13]. Users are divided into different groups according to their assigned time-slots, then channel estimation and decoding are applied within each group. By doing so, both pilot overheads and system complexity can be significantly reduced. In addition, we perform power allocation to satisfy the QoS requirements of users, instead of max-min power control. The main contributions are described as follows. * • In the downlink TDD based cell-free massive MIMO systems considering user grouping, we first introduce and analyze the main processes of uplink training and downlink payload data transmission. Then we derive the minimum power constraints under diverse QoS requirements after user grouping. Based on our analytical work and the transmission process with user grouping, we formulate the joint power allocation and user grouping problem with both conjugate and ZF beamforming under user QoS constraints, with the goal to minimize the total transmit power. * • We convert the problem into a form that can be handled by generalized benders decomposition (GBD) method. With GBD, we first decompose the problem into the primal problem (i.e., power allocation problem) and master problem (i.e., user grouping problem). Particularly, the user grouping problem is relaxed and then the relaxed problem is converted into a problem of searching for some special negative loops in a graph composed of users. * • Based on the GBD method, we propose an iterative algorithm , which is feasible for both conjugate and ZF beamforming, to approach the optimal solution to the converted joint power allocation and user grouping problem. In each iteration, the upper bound and lower bounds are obtained by solving the primal problem and the master problem, respectively. The gap between these two bounds is reduced iteratively. Therefore, the proposed iterative algorithm is provably convergent. Furthermore, to solve the master problem within polynomial time, a fast greedy suboptimal algorithm is proposed. Simulation results validate the convergence and optimality of the proposed algorithms, and demonstrate that by user grouping, the number of users served in cell-free MIMO systems can be as much as the number of APs without increasing the complexity of channel estimation and decoding. Furthermore, with the proposed user grouping strategy, the power consumption can be reduced by 2-3 dB compared with the random user grouping strategy, and by 7 dB compared with the total transmit power without grouping. The rest of this paper is organized as follows. In Section II, we give the model of the downlink cell-free massive MIMO systems, and formulate the joint optimization problem of power allocation and user grouping to minimize the total transmit power. In Section III, we decompose the problem into a power allocation problem and a user grouping problem. Problem analysis and solutions are also described. In Section IV, we relax and solve the master problem based on graph theory. The system performance is evaluated in Section V. Finally, we give the conclusion in Section VI. TABLE I: Main Notations Symbol | Description ---|--- $G$ | Number of groups $N$ | Number of users $M$ | Number of AP $p_{mn}$ | Power control coefficient of the transmit power that AP $m$ allocated to user $n$ $q_{mn}$ | $\sqrt{p_{mn}}$ $\gamma_{n}$ | Target SINR of user $n$ $\bm{x}$ | User grouping matrix $P_{t}$ | Total transmit power $\beta_{mn}$ | large-scale fading between AP $m$ and user $n$ _Notations:_ Vectors and sets are denoted by bold letters. $\lceil\cdot\rceil$ denotes the ceiling function. $\mathbf{A}^{H}$ and $\mathbf{A}^{*}$ denote the conjugate transpose and conjugate of $\mathbf{A}$, respectively. ## II Systems Model and Problem Formulation We consider a downlink TDD based cell-free massive MIMO system where $M$ single-antenna APs and $N$ single-antenna users are randomly located in a wide area as shown in Fig. 1. In the traditional cell-free massive MIMO system where all users sharing all coherence intervals or time-slots as shown in Fig. 1(a). To relieve the stress on channel estimation and decoding complexity, we divide users in groups according to their assigned time-slots. Users assigned the same time-slot form a group. The time-slots assigned to different groups are assumed to be orthogonal. In this paper, we assume that the number of users is greater than the number of groups. In Fig. 1(b), users are grouped into 3 groups and served on 3 orthogonal time-slots, respectively. Both channel estimation and decoding are performed within the group. There are two types of training, i.e., large-scale training and uplink training. The result of large-scale training is assumed to be accurate. The interval between two times of large-scale training is named as $\tau_{Lc}$, and the interval between two times of uplink training is named as $\tau_{c}$. Each $\tau_{Lc}$ is composed of one large-scale training phase and some time-slots, and each time-slot contains one coherence interval. In general, we assume that $\tau_{Lc}\gg\tau_{c}$ [13]. Figure 1: Illustration of Downlink Cell-Free Massive MIMO System. The channel between AP $m$ and user $k$ on time-slot $g$ is modeled as $h_{gmn}=\sqrt{\beta_{mn}}\varsigma_{gmn},~{}~{}~{}1\leq m\leq M,1\leq g\leq G,1\leq n\leq N$, where $\beta_{mn}$ and ${\varsigma}_{gmn}\sim\mathcal{C}\mathcal{N}(0,1)$ denote the large-scale fading and small-scale fading between AP $m$ and user $n$ on time-slot $g$, respectively. In the remainder of this paper, we assume that large-scale fading $\beta_{mn}$ is known to all APs and users. Considering that the channels in different time-slots do not completely independent with each other, in this paper, the large-scale fading is assumed to remain constant across all time-slots between two large-scale training. Some major notations are listed in Table I. After user grouping, cell-free massive MIMO transmission in each group within a coherence interval consists of three phases: uplink training, uplink payload data transmission and downlink payload data transmission as shown in Fig. 1. In this paper, we focus on the joint optimization of user grouping and power allocation in downlink cell-free massive MIMO system. Therefore, uplink training phase and downlink payload data transmission phase are introduced as follows. ### II-A Uplink Training $\displaystyle{\mathrm{SINR}_{n}^{MRT}}=\tfrac{\mathbb{E}[|Y_{us}|^{2}]}{\sigma^{2}+\mathbb{E}[|Y_{in}|^{2}+|Y_{ce}|^{2}+|Y_{lc}|^{2}]}=\tfrac{\mathbb{E}[|Y_{us}|^{2}]}{\sigma^{2}+\mathbb{E}[|Y_{in}|^{2}]+\mathbb{E}[|Y_{ce}|^{2}]+\mathbb{E}[|Y_{lc}|^{2}]}$ (1) $\displaystyle=$ $\displaystyle\tfrac{\left({\sum\limits_{{}^{m=1}}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\alpha_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}^{i=1}_{i\neq n}}^{N}x_{gi}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}\alpha_{gmn}\alpha_{gmi}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}_{i=1}}^{N}x_{gi}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}(\beta_{mn}-\alpha_{gmn})\alpha_{gmi}+\sum\limits_{{}_{g=1}}^{G}x_{gn}\sum\limits_{{}_{m=1}}^{M}{p_{mi}}\alpha_{gmn}^{2}}=\tfrac{\left({\sum\limits_{m=1}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\alpha_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}},~{}~{}~{},1\leq n\leq N.$ Instantaneous downlink channel state information (CSI) is needed at APs for beamforming in following downlink payload data transmission. So in the uplink training phase of this system, each user need to send pilot sequences simultaneously to APs for channel estimation on the same assigned time-slot. In this paper, the length of pilot sequence in group $g$ is $\tau_{g}$, which is the main overhead of downlink channel estimation at the users and increases linearly with the number of users in each group. To ensure the channel estimation accuracy, the length of pilot sequence is usually assumed no less than the number of users[10, 17]. Note that user grouping can effectively increase the number of symbols for data transmission. We assume that the length of coherence interval is $\tau_{c}$ and the length of pilot sequence in group $g$ is $\tau_{g}$. The effect of coherent time on the performance of the proposed system mainly includes two aspects. One is the number of symbols for data transmission in each time-slot, and the other one is the data rate of users. In detail, considering the case that the number of users sharing the same time-slot is settled, the length of pilot sequence in this time-slot will be settled. Then the longer the coherence time, the longer is the efficient time of each channel estimation result and the length of coherence interval. The length of coherence interval is the sum of the length of pilot sequence and the number of symbols for data transmission in each time-slot. So the number of symbols for data transmission in each time-slot increases with the coherence time. On the other hand, the longer coherent time, the longer is the proportion of the symbols for data transmission. In each group or time-slot, the length of pilot sequences required for channel estimation increases linearly with the number of users sharing the same time-frequency resource. Without user grouping, the number of symbols for data transmission within a coherent interval will be only $\tau_{c}-\sum_{g=1}^{G}\tau_{g}$. After user grouping, the number of users in each time slot will decrease, and hence the length of pilot sequences required for channel estimation in each coherence interval will also decrease. The number of symbols for data transmission within a coherent interval is $\tau_{c}-\tau_{g}$. In other words, the length of pilot sequence in each time-slot will be reduced by user grouping. For example: In a downlink TDD based cell-free massive MIMO system with $\tau_{c}=100$ and 50 users, the length of pilot sequences required for channel estimation in each coherence interval is 50, and the proportion of the symbols for data transmission in each coherence interval is $50/100=0.5$. If we assign these users into $5$ groups, the users sharing the same coherence interval will be $10$, then the length of pilot sequences required for channel estimation in each coherence interval is 10, and the proportion of the symbols for data transmission in each coherence interval will up to $(100-10)/100=0.9$, which means that more time slots is used for downlink payload data transmission. Furthermore, the fewer users sharing the same coherence interval, the less interference that users will suffer and the lower decoding difficulty for the receiver. We assume that the user grouping information (containing which group to access and the number of users in this group) has been acquired at each user. Let $\bm{\psi}_{gn}\in\mathbb{C}^{\tau_{g}}$ denote the pilot sequence of the user $n$ if user $n$ is assigned into group $g$ and satisfies $\|\bm{\psi}_{gn}\|^{2}=1$. Then with a given user grouping matrix $\bm{x}=[x_{gn}]_{1\leq g\leq G,1\leq n\leq N}$, where $x_{gn}$ is a 0-1 variable ($x_{gn}=1$ denotes that user $n$ is assigned into group $g$ and $x_{gn}=0$ denotes that user $n$ is not assigned into group $g$), the pilot signal that AP $m$ receives on time-slot $g$ is $\bm{y}^{p}_{mg}=$ $\sum_{n=1}^{N}x_{gn}\bm{\psi}_{gn}\sqrt{\rho_{r}\tau_{g}}h_{gmn}+{\mathfrak{n}^{g}_{m}}$, where $\rho_{r}$ is the power of pilot signal from users, and ${\mathfrak{n}^{g}_{m}}\sim(0,\sigma^{2})$ is the Additive White Gaussian Noise (AWGN) received at APs. Let $\hat{h}_{gmn}$ denote the minimum mean square error (MMSE) estimate of $h_{gmn}$. Assuming that user $n$ is assigned into group $g$, we have $\hat{h}_{gmn}$ $=\tfrac{\mathbb{E}[(\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg})^{*}h_{gmn}]}{\mathbb{E}[|\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg}|^{2}]}\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg}=\tfrac{\sqrt{\rho_{r}\tau_{g}}h_{gmn}}{\sigma^{2}+\rho_{r}\tau_{g}\beta_{gmn}}\bm{\psi}_{gn}^{H}\bm{y}^{p}_{mg},1\leq m\leq M,1\leq g\leq G,1\leq n\leq N.$ According to [7], its distribution is $\hat{h}_{gmn}\sim\mathcal{C}\mathcal{N}(0,\alpha_{gmn}),~{}~{}~{}1\leq m\leq M,1\leq g\leq G,1\leq n\leq N.$ (2) where $\alpha_{gmn}=\tfrac{\rho_{r}\tau_{g}\beta_{mn}^{2}}{\sigma^{2}+\rho_{r}\tau_{g}\beta_{mn}}$. In this paper, the length of pilot signal of users in group $g$, i.e., $\tau_{g}$, is equal to the number of users in group $g$. Then $\alpha_{gmn}$ can be rewritten as $\alpha_{gmn}=\tfrac{\rho_{r}\sum_{i=1}^{N}x_{gi}\beta_{mn}^{2}}{\sigma^{2}+\rho_{r}\sum_{i=1}^{N}x_{gi}\beta_{mn}},~{}~{}1\leq m\leq M,1\leq g\leq G,1\leq n\leq N.$ (3) Therefore, $\alpha_{gmn}$ is up to $\bm{x}$ and $\rho_{r}$ when large-scale fading is given. In addition, the distribution of channel estimation error is $h_{gmn}-\hat{h}_{gmn}\sim\mathcal{C}\mathcal{N}(0,\beta_{mn}-\alpha_{gmn}),~{}~{}1\leq m\leq M,1\leq g\leq G,1\leq n\leq N.$ (4) ### II-B Downlink Payload Data Transmission After uplink training, APs will send the results of channel estimation to CPU as Fig.1 shows. CPU calculates power control coefficients $p_{mn}$ (AP $m$ allocated to user $n$) and sends these coefficients to each AP. We w.l.o.g. assume that the users in group $g$ have been sorted and numbered by their channel gains. The index of user $n$ in its group is denoted by $\kappa_{n}$. Next we will introduce the conjugate beamforming (i.e., maximum-ratio transmission, MRT) and the ZF beamforming for precoding. First, we define the coefficients for beamforming as follows: $b_{gmn}=\\!\\!\left\\{\begin{array}[]{ll}\\!\\!\\!\\!\hat{h}^{*}_{gmn}&\text{MRT}\\\ \\!\\!\\!\\![\hat{\bm{H}}_{g}^{*}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}]_{m\kappa_{n}},~{}\\!&\text{ZF}\end{array}\right.,$ (5) where $\bm{H}_{g}$ denotes the $M\times\sum_{i=1}^{N}x_{gi}$ channel coefficient matrix, $[\bm{H}_{g}]_{m\kappa_{n}}=h_{gmn}$. It should be noted that, the real transmit power from AP $m$ to user $n$ is $p_{mn}|b_{gmn}|^{2}$, where $b_{gmn}$ is the beamforming coefficient and $p_{mn}$ is the power control coefficient. Although the value of $p_{mn}$ from different APs to each user are equal, the value of $b_{gmn}$ from different APs to each user are different. Therefore, the real transmit power from different APs to each user, i.e., $p_{mn}|b_{gmn}|^{2}$, are different. #### II-B1 Conjugate Beamforming The signal transmitted from each AP on time-slot $g$ after conjugate beamforming is given by ${t}_{gm}=\sum_{n=1}^{N}x_{gn}\sqrt{p_{mn}}{{b_{gmn}}}s_{n}$[18, 19, 20], where $p_{mn}$ denotes power control coefficient of transmit power that AP $m$ allocated to user $n$ , $s_{n}$ represents the transmitted symbol of user $n$. The signal received at user $n$, using MRT, is given by111Although the strict phase-synchronization and -calibration between APs are not needed for non- coherent receivers, the coherent joint transmission can achieve higher spectral efficiency than non-coherent joint transmission. In the system model of this paper, the pilot sequences is sent by users and received by APs. So the channel estimation is only available at APs and the users only knows the large-scale channel gain. With coherent joint transmission, the user don’t need to distinguish the signals from different APs. Based on the above considerations, the coherent joint transmission is adopted in this paper. $\displaystyle{y_{n}^{MRT}}=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}{t}_{gm}+\mathfrak{n}^{g}_{n}$ (6) $\displaystyle=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}\sum_{i=1}^{N}x_{gi}\sqrt{p_{mi}}{b_{gmi}}s_{i}+\mathfrak{n}^{g}_{n},~{}~{}~{}1\leq n\leq N.$ where ${\mathfrak{n}^{g}_{m}}\sim(0,\sigma^{2})$ is the AWGN received at users. For convenience, according to [7], we divide $y_{n}$ into five parts, including the desired signal of user $n$ $Y_{us}$, interference from the desired signals of the other users in the same group $Y_{in}$, the channel estimation error $Y_{ce}$, the lack of channel knowledge at user $Y_{lc}$ and noise $\mathfrak{n}^{g}_{n}$, and define the first four parts as follows. $\displaystyle Y_{ce}=$ $\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}\sum_{i=1}^{N}x_{gn}x_{gi}\sqrt{p_{mi}}(h_{gmn}-\hat{h}_{gmn}){\hat{h}_{gmi}^{*}}s_{i},$ $\displaystyle Y_{us}=$ $\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}\sqrt{p_{mn}}\mathbb{E}[|\hat{h}_{gmn}|^{2}]s_{n},$ $\displaystyle Y_{lc}=$ $\displaystyle\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}\sqrt{p_{mn}}(|\hat{h}_{gmn}|^{2}-\mathbb{E}[|\hat{h}_{gmn}|^{2}])s_{n},$ $\displaystyle Y_{in}=$ $\displaystyle sum_{g=1}^{G}\sum_{m=1}^{M}\sum_{{}^{i=1}_{i\neq n}}^{N}x_{gn}x_{gi}\sqrt{p_{mi}}\hat{h}_{gmn}{\hat{h}_{gmi}^{*}}s_{i}.$ Then (6) can be rewritten as ${y_{n}^{MRT}}=Y_{us}+Y_{in}+Y_{ce}+Y_{lc}+\mathfrak{n}^{g}_{n}$. As these five parts are mutually uncorrelated, the lower bound of SINR achievable to user $n$ is [7], where the time interval is the coherence time (a time slot), hence the noise in this expression is one $\sigma^{2}$. It should be noted that $\sum\limits_{g=1}^{G}x_{gn}=1$, for $\forall n$. Hence, the SINR of users in different groups will not affect with each other. Obviously, interference from the desired signals of the other users in the same group will be reduced as the number of users in each group decreases, and the complexity of decoding at the receiver will be relatively reduced. To satisfy the user QoS requirements, the achievable SINR of each user should be constrained by $\mathrm{SINR}_{n}^{MRT}\geq\gamma_{n},~{}~{}~{}1\leq n\leq N,1\leq g\leq G$ where $\gamma_{n}=2^{GR_{n}^{target}\frac{\tau_{c}}{\tau_{c}-\tau_{g}}}-1$ is the minimal SINR in the transmit time slot of user $n$ to achieve its target data rate $R_{n}^{target}$, and $\frac{\tau_{c}}{\tau_{c}-\tau_{g}}$ is the ratio of the length of data in each coherence interval after grouping and that of data in each coherence interval without grouping. #### II-B2 Zero-Forcing Precoder With zero-forcing precoder, the signal transmitted from each AP on time-slot $g$ is given by ${t}_{gm}=\sum_{n=1}^{N}x_{gn}\sqrt{p_{n}}b_{gmn}s_{n}$, where $p_{n}$ is the power allocation coefficient of user $n$ under the assumption of $p_{mn}=p_{n}$, for $\forall m$. The signal received at user $n$, using ZF, is given by $y^{ZF}_{n}=\sum_{g=1}^{G}\sum_{m=1}^{M}x_{gn}h_{gmn}{t}_{gm}+\mathfrak{n}^{g}_{n},~{}~{}~{}1\leq n\leq N.$ Since interference from the desired signals of the other users in the same group has been eliminated by zero-forcing precoder, the lower bound of SINR achievable to user $n$ is [21, 7, 22] $\mathrm{SINR}_{n}^{ZF}=\tfrac{p_{n}}{\sigma^{2}+\sum_{g=1}^{G}x_{gn}\sum_{i=1}^{N}x_{gi}p_{i}\eta_{ni}}$, where $\eta_{ni}$ is the $\kappa_{i}$-th element of the following vector:$\bm{\eta}_{n}=diag\\{\mathbb{E}((\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}\hat{\bm{H}}_{g}^{T}\mathbb{E}(\hat{\bm{h}}_{g\kappa_{n}}^{*}\hat{\bm{h}}_{g\kappa_{n}}^{T})\hat{\bm{H}}_{g}^{*}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1})\\}$, where $\hat{\bm{h}}_{g\kappa_{n}}^{T}=[\hat{{h}}_{g1n},\ldots\hat{{h}}_{gmn}\ldots\hat{{h}}_{gMn}]$, and $\mathbb{E}(\hat{\bm{h}}_{g\kappa_{n}}^{*}\hat{\bm{h}}_{g\kappa_{n}}^{T})$ is a diagonal matrix with $(\beta_{mn}-\alpha_{gmn})$ on its m-th diagonal element, which has been proved in [22]. The value of $\eta_{ni}$ can be obtained using exponential smoothing as stated in [7]. Exponential smoothing is a method to predict the future value of a variable by weighting its past values considering the change trend of its value. In this paper, the historical values of $\eta_{ni}$ can be obtained from previous channel estimation results, hence we can obtain the predicted value of $\eta_{ni}$ by weighting its historical values. We assume that the accurate and the estimated value of the current $\eta_{ni}$ is $\eta_{ni}^{t}$ and $\eta_{ni}^{(t)}$, respectively. and $\eta_{ni}^{t-1}$ and $\eta_{ni}^{(t-1)}$ denote the accurate and the estimated value of the $(t-1)$-th $\eta_{ni}$. Then $\eta_{ni}^{(t)}=w\eta_{ni}^{t-1}+(1-w)\eta_{ni}^{(t-1)}$, where $w$ is a constant between 0 and 1. To get a similar form of $\mathrm{SINR}_{n}^{MRT}$ in (1), $\mathrm{SINR}_{n}^{ZF}$ can be rewritten as: $\displaystyle\mathrm{SINR}_{n}^{ZF}=\tfrac{\left({\sum\limits_{m=1}^{M}\tfrac{1}{M}\sqrt{p_{mn}}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}\tfrac{1}{M}p_{mi}\eta_{ni}},~{}1\leq n\leq N\Bigg{|}p_{mn}=p_{n}.$ (7) ### II-C Problem Formulation According to (1) and (7), the values of $\mathrm{SINR}_{n}^{MRT}$ and $\mathrm{SINR}_{n}^{ZF}$ are up to the user grouping matrix $\bm{x}=[x_{gn}]_{1\leq g\leq G,1\leq n\leq N,}$, power allocation matrix $\bm{p}=[p_{mn}]_{1\leq m\leq M,1\leq n\leq N}$, and large-scale fading matrix $\bm{\beta}=[\beta_{mn}]_{1\leq m\leq M,1\leq n\leq N}$ (The value of $\alpha_{gmn}$ is up to $\bm{x}$ if $\rho_{\tau}$ and $\bm{\beta}$ are given as stated in subsection II-A). We try to optimize the user grouping and power allocation strategy to minimize the total transmit power with known large- scale fading under QoS constraints, i.e., target SINR. We formulate this joint power allocation and user grouping problem as $\mathcal{P}1$. $\displaystyle\mathcal{P}1:~{}\min_{\bm{x},\bm{p}}~{}~{}$ $\displaystyle P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}p_{mn}\sum\limits_{g=1}^{G}x_{gn}\varphi_{gmn}}$ (8a) s.t. $\displaystyle\tfrac{\left({\sum\limits_{m=1}^{M}\sqrt{p_{mn}}\sum\limits_{g=1}^{G}x_{gn}\vartheta_{gmn}}\right)^{2}}{\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\upsilon_{gmni}}\geq\gamma_{n},~{}~{}~{}1\leq n\leq N,$ (8b) $\displaystyle p_{mn}\geq 0,~{}~{}~{}~{}1\leq n\leq N,1\leq m\leq M,$ (8c) $\displaystyle\sum\limits_{g=1}^{G}x_{gn}=1,~{}~{}~{}x_{gn}\in\\{0,1\\},1\leq n\leq N,$ (8d) $\displaystyle p_{mn}=p_{m^{\prime}n},~{}~{}~{}1\leq m,M^{\prime}\leq M\Bigg{|}ZF$ (8e) $\displaystyle\text{(\ref{0000-1+1+1}),(\ref{sec:02B04+})-(\ref{sec:02B04+++})}.$ where (8d) means that each user should be assigned into only one group, (8e) exists when ZF beamforming is chosen. Like (5), some variables are defined as follows: $\varphi_{gmn}=\left\\{\begin{array}[]{ll}\alpha_{gmn}&\text{MRT}\\\ \text{$[diag\\{\mathbb{E}((\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1}\hat{\bm{h}}_{[gm]}^{*}\hat{\bm{h}}_{[gm]}^{T}(\hat{\bm{H}}_{g}^{T}\hat{\bm{H}}_{g}^{*})^{-1})\\}]_{\kappa_{n}}$}&\text{ZF}\end{array}\right.$ (9) ,where $\hat{\bm{h}}_{gm}$ is the m-th row of $\hat{\bm{H}}_{g}$. $\vartheta_{gmn}=\left\\{\begin{array}[]{ll}\alpha_{gmn}&\text{MRT}\\\ \tfrac{1}{\sqrt{M}},{}&\text{ZF}\end{array}\right.,$ (10) $\upsilon_{gmni}=\left\\{\begin{array}[]{ll}\beta_{mn}\alpha_{gmi}&\text{MRT}\\\ \tfrac{1}{\sqrt{M}}\eta_{ni},{}&\text{ZF}\end{array}\right.,$ (11) To solve this MINLP problem, we first define a $M\times N$ matrix $\bm{q}$$=[q_{mn}]_{1\leq m\leq M,1\leq n\leq N}$, where $q_{mn}=\sqrt{p_{mn}}$, and convert problem $\mathcal{P}1$ into problem $\mathcal{P}2$: $\displaystyle\mathcal{P}2:~{}\min_{\bm{x},\bm{q}}~{}~{}$ $\displaystyle P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x_{gn}\varphi_{gmn}},$ (12a) s.t. $\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$ $\displaystyle-$ $\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}\vartheta_{gmn}}}\leq 0,~{}~{}~{}1\leq n\leq N,$ (12b) $\displaystyle q_{mn}\geq 0,~{}~{}~{}~{}1\leq n\leq N,1\leq m\leq M,$ (12c) $\displaystyle q_{mn}=q_{m^{\prime}n},~{}~{}~{}1\leq m,M^{\prime}\leq M\Bigg{|}ZF$ (12d) $\displaystyle\text{(\ref{0000-1+1+1}),(\ref{sec:02B04+})-(\ref{sec:02B04+++}), (\ref{0003d})}.$ A key motivation of this conversion is to convert constraints (8b) into convex constraints (12b) with given user grouping matrix $\bm{x}$, which will be introduced in the next section. Problem $\mathcal{P}2$ is still hard to solve, we try to solve it with an iterative method based on GBD method [23, 24]. ## III Problem Analysis and Solutions We first decompose this problem into a primal problem: power allocation problem and a master problem: user grouping problem according to GBD method [23] [24]. Then according to the basic principle of GBD method, the MINLP problem can be solved by solving these two problems iteratively [25]. In each iteration, the upper bound and the lower bound of the problem can be updated, and the gap among the upper and lower bound is shrunk [26]. ### III-A Primal Problem: Power allocation problem Power allocation problem $\mathcal{S}^{(k)}$ is given by fixing the user grouping matrix to $\bm{x}^{(k)}$: $\displaystyle\mathcal{S}^{(k)}:~{}\min_{\bm{q}}~{}$ $\displaystyle P_{t}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\varphi^{(k)}_{gmn}}$ (13a) s.t. $\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon_{gmni}^{(k)}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$ $\displaystyle-$ $\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta_{gmn}^{(k)}}}\leq 0,~{}~{}1\leq n\leq N,$ (13b) $\displaystyle\text{(\ref{0000-1+1+1}),(\ref{0003+1c}),(\ref{sec:02B04+})-(\ref{sec:02B04+++}),(\ref{0003+1d})}.$ Since the objective function (13a) is convex, the SINR constraints (13b) are second order cone (SOC) constraints, the constraints (12c) and (12c) are linear and the other constraints are not related to the value of $\bm{q}$, problem $\mathcal{S}^{(k)}$ is a convex problem. Since problem $\mathcal{S}^{(k)}$ is a convex problem, we can solve it by the interior point method. In addition, problem $\mathcal{S}^{(k)}$ is given by fixing the user grouping matrix to $\bm{x}^{(k)}$. Hence, there are two cases about this problem, feasible and infeasible. These cases of problem $\mathcal{S}^{(k)}$ are discussed as follows: Feasible Case: We first define the partial Lagrangian function of problem $\mathcal{S}^{(k)}$ [27]: $\displaystyle\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}^{(k)})={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\varphi^{(k)}_{gmn}}$ (14) $\displaystyle+\sum\limits_{n=1}^{N}\lambda_{n}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$ $\displaystyle-\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\right),$ where the Lagrangian multipliers $\bm{\lambda}=[\lambda_{mn}]_{1\leq m\leq M,1\leq n\leq N}$ correspond to constraints (13b) and satisfy $\lambda_{mn}\geq 0$, $1\leq m\leq M,~{}1\leq n\leq N$. The dual problem of problem $\mathcal{S}^{(k)}$ can be obtained as stated in Lemma 1. ###### Lemma 1. Problem $\mathcal{S}^{(k)}$ is equivalent to its dual problem $\mathcal{D}_{S}^{(k)}$ as follows [28]. $\displaystyle\mathcal{D}_{S}^{(k)}:~{}\max_{\bm{\lambda}}~{}~{}$ $\displaystyle\inf_{\bm{q}}~{}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}^{(k)})$ (15a) s.t. $\displaystyle\lambda_{mn}\geq 0,~{}~{}~{}~{}1\leq m\leq M,~{}1\leq n\leq N,$ (15b) (3),(12c),(12d). ###### Proof. It is obvious that there exists a strictly feasible point for convex problem $\mathcal{S}^{(k)}$ (feasible case), thus Slater’s condition is satisfied [29] [30]. Hence, strong duality holds for problem $\mathcal{S}^{(k)}$ and its dual problem [31].∎ Infeasible Case: According to Lemma 1, we can get an upper bound of problem $\mathcal{P}2$. Then if problem $\mathcal{S}^{(k)}$ is infeasible, which means that constraint (13b) can not be satisfied no matter how we allocate power, we try to find the power allocation strategy that is close to constraint (13b). By relaxing constraint (13b) with a violation variable $\phi$, we can get the following problem $\mathcal{S}2^{(k)}$ as well as its dual problem $\mathcal{D}_{S2}^{(k)}$ [32]. In problem $\mathcal{S}2^{(k)}$, we try to minimize the gap between the left and right sides of (13b). $\displaystyle\mathcal{S}2^{(k)}:~{}\min_{\bm{q},\phi}~{}$ $\displaystyle\phi$ (16a) s.t. $\displaystyle\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}$ (16b) $\displaystyle-$ $\displaystyle{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\leq\phi,~{}~{}1\leq n\leq N,$ (16c) $\displaystyle\phi\geq 0,$ (16d) (3),(12c),(12d). We define the partial Lagrangian function of $\mathcal{S}2^{(k)}$ as follows: $\displaystyle\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x}^{(k)})$ $\displaystyle=\sum\limits_{n=1}^{N}\nu_{n}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{(k)}_{gn}\sum\limits_{i=1}^{N}x^{(k)}_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}\upsilon^{(k)}_{gmni}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$ (17) $\displaystyle-$ $\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x^{(k)}_{gn}\vartheta^{(k)}_{gmn}}}\right),$ where the Lagrangian multipliers $\bm{\nu}$ correspond to constraints $(\ref{0018b})$ and satisfy $\nu_{mn}\geq 0$, $1\leq m\leq M,~{}1\leq n\leq N$. Like problem $\mathcal{S}^{(k)}$, we can also get the optimal solutions $\bm{q}^{(k)}$ and the dual solutions $\bm{\nu}^{(k)}$ by the interior point method. In addition, Lemma 2 is obtained. ###### Lemma 2. Problem $\mathcal{S}2^{(k)}$ is equivalent to its dual problem $\mathcal{D}_{S2}^{(k)}$ as follows. $\displaystyle\mathcal{D}_{S2}^{(k)}:~{}\max_{\bm{\nu}}~{}~{}$ $\displaystyle\inf_{\bm{q},\phi}\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x}^{(k)})+\phi-\sum\limits_{n=1}^{N}\nu_{n}\phi$ (18a) s.t. $\displaystyle\nu_{mn}\geq 0,~{}~{}~{}~{}1\leq m\leq M,~{}1\leq n\leq N,$ (18b) (16d), (3), (12c),(12d). ###### Proof. Since the objective function (18a) is convex and all the constraints are linear, problem $\mathcal{S}2^{(k)}$ is convex. In addition, for any $\bm{q}\succ 0$ and any ${\phi}$ satisfies (16c), $\\{\bm{q},\phi\\}$ is feasible for convex problem $\mathcal{S}2^{(k)}$, thus Slater’s condition is satisfied. Hence, strong duality holds for problem $\mathcal{S}2^{(k)}$ and its dual problem.∎ ### III-B Master problem: User grouping problem We write the master user grouping problem $\mathcal{M}1$ as follows: $\displaystyle\mathcal{M}1:~{}\min_{\bm{x}}~{}~{}$ $\displaystyle\text{{f}}(\bm{x})$ s.t. $\displaystyle\bm{x}\in\\{\bm{x}\text{${}^{(k)}$}|\text{$\mathcal{S}^{(k)}$ is feasible}\\},~{}~{}~{}1\leq n\leq N,$ (19a) $\displaystyle\text{(\ref{0003d})}.$ where function f($\bm{x}$) returns the optimal value of problem $\mathcal{S}^{(k)}|_{\bm{x}^{(k)}=\bm{x}}$. In problem $\mathcal{M}1$, (19a) is not in the explicit form. Therefore, to apply GBD method, we convert the master problem $\mathcal{M}1$ into an explicit form in the following lemma. ###### Lemma 3. Problem $\mathcal{M}1$ is equivalent to the following problem $\mathcal{M}2$. $\displaystyle\mathcal{M}2:~{}\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t. $\displaystyle\min_{\bm{q}\succeq 0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x})\leq\xi,\forall\bm{\lambda}\succeq 0,$ (20a) $\displaystyle\min_{\bm{q}\succeq 0}\mathcal{L}^{\prime}(\bm{q},\bm{\nu},\bm{x})\leq 0,\forall\bm{\nu}\succeq 0:\sum_{n=1}^{N}\nu_{n}=1,$ (20b) $\displaystyle\text{(\ref{0003d}))}.$ ###### Proof. Since the constraints (13b) are convex, according to Theorem 2.2 in [33], the constraints (19a) are equivalent to (20b). Then according to Lemma 1, we have: $\displaystyle\text{{f}}(\bm{x})=\max_{\bm{\lambda\succeq 0}}~{}\min_{\bm{q}\succeq 0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x}).$ (21) Therefore, the following two problems are equivalent. $\displaystyle\min_{\bm{x}}~{}~{}$ $\displaystyle\text{{f}}(\bm{x})$ s.t. $\displaystyle\text{(\ref{0003d})}.$ and $\displaystyle\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t. $\displaystyle\min_{\bm{q}\succeq 0}\mathcal{L}(\bm{q},\bm{\lambda},\bm{x})\leq\xi,\forall\bm{\lambda}\succeq 0,$ $\displaystyle\text{(\ref{0003d})}.$ Thus, the proof of Lemma 3 is concluded.∎ The constraints (20a) and (20b) are composed of an infinite number of constraints ($\bm{q}$ is a matrix composed of continuous variables), which makes problem $\mathcal{M}2$ hard to solve. Next we settle the Lagrangian multipliers $\bm{\lambda}$ and $\bm{\nu}$ to make problem $\mathcal{M}2$ more explicit by Lemma 4. ###### Lemma 4. If $\mathcal{S}^{(k)}$ is feasible, and both its optimal solution $\bm{q}^{(k)}$ and the dual solution $\bm{\lambda}^{(k)}$ have been obtained, we have: $\displaystyle\min_{\bm{q}\succeq 0}\mathcal{L}(\bm{q},\bm{\lambda}^{(k)},\bm{x})=\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x}).$ (24) If $\mathcal{S}^{(k)}$ is infeasible, and the optimal solution $\bm{q}^{(k)}$ as well as the dual solution $\bm{\nu}^{(k)}$ of problem $\mathcal{S}2^{(k)}$ have been obtained, the following equations are equivalent. $\displaystyle\min_{\bm{q}\succeq 0}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})\leq 0:\sum_{n=1}^{N}\nu_{n}^{(k)}=1,$ (25) and $\displaystyle\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0.$ (26) ###### Proof. If $\mathcal{S}^{(k)}$ is feasible, according to (15), (24) is tenable. If $\mathcal{S}^{(k)}$ is infeasible, according to (17), we have: $\displaystyle\tfrac{\partial(\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}\phi}{\partial\phi}=1-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}=0$ (27) Then according to (16) and (18) we have $\displaystyle(\bm{q}^{(k)},\phi)=$ $\displaystyle{arg\min_{\bm{q}\succeq 0,\phi\geq 0}}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}\phi$ (28) $\displaystyle=$ $\displaystyle{arg\min_{\bm{q}\succeq 0,\phi\geq 0}}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})+\phi(1-\sum\limits_{n=1}^{N}\nu_{n}^{(k)}),$ Combining (28) with (27), we have $\displaystyle\bm{q}^{(k)}=$ $\displaystyle{arg\min_{\bm{q}\succeq 0}~{}\mathcal{L}^{\prime}(\bm{q},\bm{\nu}^{(k)},\bm{x})}.$ (29) where $\sum_{n=1}^{N}\nu_{n}^{(k)}=1$. Hence, (25) and (26) are equivalent. The proof of Lemma 4 is concluded.∎ According to Lemma 4, we can relax problem $\mathcal{M}2$ into problem $\mathcal{M}3$ by calculating the optimal solution $\bm{q}^{(k)}$ and the dual solution $\bm{\lambda}^{(k)}$ of feasible problem $\mathcal{S}^{(k)}$, and we can relax problem $\mathcal{M}2$ into problem $\mathcal{M}3$ by calculating the optimal solution $\bm{q}^{(k)}$ and the dual solution $\bm{\nu}^{(k)}$ of problem $\mathcal{S}2^{(k)}$ when problem $\mathcal{S}^{(k)}$ is infeasible $\displaystyle\mathcal{M}3:~{}\min_{\bm{x}}~{}~{}$ $\displaystyle\xi$ s.t. $\displaystyle\mathcal{L}(\bm{q}^{(k_{1})},\bm{\lambda}^{(k_{1})},\bm{x})\leq\xi,~{}~{}k_{1}\in\\{k|\text{$\mathcal{S}^{(k)}$ is feasible}\\}$ (30a) $\displaystyle\mathcal{L}^{\prime}(\bm{q}^{(k_{2})},\bm{\nu}^{(k_{2})},\bm{x})\leq 0,~{}~{}k_{2}\in\\{k|\text{$\mathcal{S}^{(k)}$ is infeasible}\\}$ (30b) $\displaystyle\text{(\ref{0003d})}.$ Note that problem $\mathcal{M}3$ is more explicit than problem $\mathcal{M}1$. ###### Lemma 5. The optimal value of problem $\mathcal{M}3$ is a lower bound of problem $\mathcal{P}2$. ###### Proof. The proof is stated in Remark 2.3 of [33] in detail.∎ Input: Variance of Channel Estimation $\bm{\alpha}$, Large-scale Fading $\bm{\beta}$, 1 Output: Power Allocation Matrix $\bm{q}$, Grouping Matrix $\bm{x}$ 2 for _$n=1\textrm{ to }N$_ do 3 $g=mod(n,G)+1$; $x_{gn}^{1}=1$ 4 end for 5$k=1$;Create problem $\mathcal{M}3$ without feasi-constraint or infeasi- constraint; 6repeat 7 Solve power allocation problem $\mathcal{S}^{(k)}$ by the interior point method; 8 if _$\mathcal{S}^{(k)}$ is feasible._ then 9 Calculate the optimal solution $\bm{q}^{(k)}$, optimal value $P_{t}^{(k)}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}{\varphi_{gmn}^{(k)}}}$ and the dual solution $\bm{\lambda}^{(k)}$ of problem $\mathcal{S}^{(k)}$; 10 Add constraint $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})\leq\xi$ to the relaxed master problem $\mathcal{M}3$; 11 Update upper bound $b_{u}=P_{t}^{(k)}$; 12 else 13 Calculate the optimal solution $\bm{q}^{(k)}$, $P_{t}^{(k)}={\sum\limits_{m=1}^{M}\sum\limits_{n=1}^{N}q_{mn}^{2}\sum\limits_{g=1}^{G}x^{(k)}_{gn}{\varphi_{gmn}^{(k)}}}$ and the dual solution $\bm{\nu}^{(k)}$ of problem $\mathcal{S}2^{(k)}$ by the interior point method; 14 Add constraint $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0$ to the relaxed master problem $\mathcal{M}3$; 15 end if 16 17 Solve the relaxed master problem $\mathcal{M}3$ to get new grouping matrix $\bm{x}^{(k+1)}$ and its optimal value $\xi_{min}$; 18 Update lower bound $b_{l}=\xi_{min}$; $k=k+1$; 19until _$b_{u}-b_{l}\leq\delta$ or $b_{u}$ won’t change or number of iterations exceeds N_; Algorithm 1 GBD Based Joint Power Allocation and User Grouping Algorithm (GPGA) Since the upper bound and lower bound of problem $\mathcal{P}2$ can be obtained by solving problem $\mathcal{S}^{k}$ and problem $\mathcal{M}3$, respectively, we propose a joint power allocation and user grouping algorithm (GPGA) based on GBD as shown in Algorithm 1. In this algorithm, steps 1-4 is the initialization of grouping matrix $\bm{x}^{(k)}$. Then according to the feasibility of problem $\mathcal{S}^{(k)}$ and Lemma 4, we add constraint $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})\leq\xi$ or $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})\leq 0$, which we called them feasi-constraint and infeasi-constraint, respectively, to relaxed master problem $\mathcal{M}3$ and update the upper bound and lower bound of problem $\mathcal{P}2$. A new user grouping matrix $\bm{x}^{(k+1)}$ is obtained by solving problem $\mathcal{M}3$. Next, matrix $\bm{x}^{(k)}$ is updated by matrix $\bm{x}^{(k+1)}$. Steps 6-19 is repeated until the gap between the upper bound and lower bound of problem $\mathcal{P}2$ is less than $\delta$, i.e., $\delta$-optimal solution. ###### Proposition 1. Algorithm 1 is bound to stop in finite steps for any given $\delta>0$. ###### Proof. After each iteration of 6-19 in Algorithm 1, the upper bound of problem $\mathcal{P}2$ is nonincreasing and the lower bound of problem $\mathcal{P}2$ is nondecreasing. Therefore, the gap between the upper bound and lower bound of problem $\mathcal{P}2$ is shrunk. Moreover, the strategic space of user grouping matrix $\bm{x}$ is finite. Thus, Algorithm 1 is bound to stop in finite steps for any given $\delta>0$. The proof is stated in section 2.4 of [33] in detail.∎ In Algorithm 1, we solve power allocation problem ${\mathcal{S}^{(k)}}$ by the interior point method, and its computational complexity is $O\big{(}N(NM)^{3}\big{)}$[34]. If we solve the relaxed master problem $\mathcal{M}3$ by exhaustive search algorithm, the computational complexity will be unbearable. We introduce the way to solve the relaxed master problem $\mathcal{M}3$ in Section IV. ## IV Relaxed Master Problem Analysis and Solutions Based on Graph Theory In this section, we convert the relaxed master user grouping problem into a problem of searching for some special negative loops in a graph composed of users based on graph theory. Two algorithms to find these loops are proposed. In order to find the way to reduce the values of $\mathcal{L}(\bm{q}^{(k_{1})},\bm{\lambda}^{(k_{1})},\bm{x})$ and $\mathcal{L}^{\prime}(\bm{q}^{(k_{2})},\bm{\nu}^{(k_{2})},\bm{x})$ in the relaxed master user grouping problem $\mathcal{M}3$, we introduce three definitions as follows: ###### Definition 1. For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if problem $\mathcal{S}^{(k)}$ is feasible and $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and putting user $n_{L-1}$ into the group of user $n_{L}$, or if problem $\mathcal{S}^{(k)}$ is infeasible, and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and putting user $n_{L-1}$ into the group of user $n_{L}$, these users compose a _k-shift union_. To explain the meaning of $n\rightarrow n^{\prime}$, we assume that with grouping strategy $\bm{x}$, user $n$ and user $n^{\prime}$ are in group $g$ and $g^{\prime}$, respectively. That is, $x_{gn}=1$, $x_{g^{\prime}n^{\prime}}=1$. Then $n\rightarrow n^{\prime}$ means transferring user $n$ into group $g^{\prime}$ and removing user $n^{\prime}$ from group $g^{\prime}$, that is, $x_{gn}=0$, $x_{gn^{\prime}}=1$, $x_{g^{\prime}n^{\prime}}=0$. ###### Definition 2. For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if problem $\mathcal{S}^{(k)}$ is feasible and $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, or if problem $\mathcal{S}^{(k)}$ is infeasible, and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users compose a _k-exchange union_. ###### Definition 3. For grouping strategy $\bm{x}$, if the value of $\xi$ in problem $\mathcal{M}3$ can not be reduced by any _shift union_ or _exchange union_ with all the constraints in problem $\mathcal{M}3$ satisfied, grouping matrix $\bm{x}$ is called _all-stable solution_. To find the _shift union_ s and _exchange union_ s among users, we analyze the rules that values of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ change after changing user grouping matrix $\bm{x}$. By dividing the expressions of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$, i.e., $(\ref{0016})$ and $(\ref{0019})$ in groups, we define two weighted interference plus noise variables $\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ and $\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$ as follows: $\displaystyle\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ (31) $\displaystyle=$ $\displaystyle\sum\limits_{{j=1}}^{N}x_{gj}\lambda_{j}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}{\upsilon_{gmji}}}\right)^{\tfrac{1}{2}}\gamma_{j}^{\tfrac{1}{2}}-{{\sum\limits_{m=1}^{M}q_{mj}x_{gj}}{\vartheta_{gmj}}}\right)$ $\displaystyle\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$ (32) $\displaystyle=$ $\displaystyle\sum\limits_{j=1}^{N}x_{gj}\nu_{j}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}q_{mi}^{2}{\upsilon_{gmji}}}\right)^{\tfrac{1}{2}}\gamma_{j}^{\tfrac{1}{2}}-{{\sum\limits_{m=1}^{M}q_{mj}x_{gj}{\vartheta_{gmj}}}}\right)$ Combining $(\ref{0016})$, $(\ref{0019})$, $(\ref{g001})$ and $(\ref{g002})$, we have $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})=\sum\limits_{g=1}^{G}\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})=\sum\limits_{g=1}^{G}\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$. Next we investigate how user grouping strategy changing impacts the value of $\omega_{g}(\bm{x};\bm{q},\bm{\lambda})$ and $\omega^{\prime}_{g}(\bm{x};\bm{q},\bm{\nu})$. For convenience, we assume that in grouping strategy $\bm{x}$, user $n$ is in group $g_{n}$. Then we construct a directed graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$, where $\mathcal{N}$ is the set of nodes composed of users and $\mathcal{E}^{(k)}$ is the set of edges existing between two users in different groups. The adjacency matrix of graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ is denoted by $\bm{a}^{(k)}$, and we set that: $a_{ij}^{(k)}=\left\\{\begin{array}[]{ll}\omega_{g_{j}}(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j}&;\bm{q}^{(k)},\bm{\lambda}^{(k)})-\omega_{g_{j}}(\bm{x};\bm{q}^{(k)},\bm{\lambda}^{(k)})\\\ &\text{if $g_{i}\neq g_{j}$, $\mathcal{S}^{(k)}$ is feasible}\\\ \omega^{\prime}_{g_{j}}(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j}&;\bm{q}^{(k)},\bm{\nu}^{(k)})-\omega^{\prime}_{g_{j}}(\bm{x};\bm{q}^{(k)},\bm{\nu}^{(k)})\\\ &\text{if $g_{i}\neq g_{j}$, $\mathcal{S}^{(k)}$ is infeasible}\\\ \infty,&\text{if $g_{i}=g_{j}$}\end{array}\right.$ (33) where $\bm{x}_{-i,j}$ denotes the user grouping strategies of users except users $i$ and $j$, thus $(x_{g_{j}i}=1,x_{g_{j}j}=0,\bm{x}_{-i,j})$ represents that user $i$ is in group $g_{j}$, user $j$ is not in group $g_{j}$, and the user grouping strategies of users except users $i$ and $j$ consistent with $\bm{x}$. The relation between problem $\mathcal{M}3$ and graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ can be indicated with the following propositions. ###### Proposition 2. For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if problem $\mathcal{S}^{(k)}$ is feasible and $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users can compose a negative loop $n_{1}->n_{2}->\ldots->n_{L}->n_{1}$ in graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$. ###### Proof. We assume that the user grouping matrix before and after $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$ are $\bm{x}$ and $\bm{x}^{\prime}$. Then the difference of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ is $\displaystyle\nabla_{\mathcal{L}}=$ $\displaystyle\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x}^{\prime})-\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ (34) $\displaystyle=$ $\displaystyle\sum\limits_{n=1}^{N}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x^{\prime}_{gn}\sum\limits_{i=1}^{N}x^{\prime}_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$ $\displaystyle\left.-{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$ $\displaystyle-\sum\limits_{n=1}^{N}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$ $\displaystyle\left.-{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$ We assume that users $n_{1},n_{2},\ldots,n_{L}$ are in groups $g_{1},g_{2},\ldots,g_{L}$, respectively, note that the value of $\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}\right.$ $-\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right),~{}~{}n\notin\\{n_{1},n_{2},\ldots,n_{L}\\}$ will not change after $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$. Then according to (34), we have: $\displaystyle\nabla_{\mathcal{L}}=$ $\displaystyle\sum\limits_{l=1}^{L}\sum\limits_{n=1}^{N}x^{\prime}_{g_{l}n}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x^{\prime}_{g_{l}i}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}-\right.$ (35) $\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$ $\displaystyle-\sum\limits_{l=1}^{L}\sum\limits_{n=1}^{N}x_{g_{l}n}\lambda_{n}^{(k)}\left(\left({\sigma^{2}+\sum\limits_{i=1}^{N}x_{g_{l}i}\sum\limits_{m=1}^{M}(q_{mi}^{(k)})^{2}{\upsilon^{(k)}_{gmni}}}\right)^{\tfrac{1}{2}}\gamma_{n}^{\tfrac{1}{2}}-\right.$ $\displaystyle\left.{{\sum\limits_{m=1}^{M}q_{mn}\sum\limits_{g=1}^{G}x_{gn}{\vartheta^{(k)}_{gmn}}}}\right)$ $\displaystyle=$ $\displaystyle\sum\limits_{l=1}^{L}a_{lj}^{(k)}$ where $j=mod(l,L)+1$. Then the proof of Proposition 2 is concluded.∎ ###### Proposition 3. For $L$ users numbered by $n_{1},n_{2},\ldots,n_{L}$ in different groups, if problem $\mathcal{S}^{(k)}$ is infeasible, and $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ can be reduced by $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$, these users can compose a negative loop $n_{1}->n_{2}->\ldots->n_{L}->n_{1}$ in graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$. ###### Proof. The proof is similar to Proposition 2.∎ According to Proposition 2 and Proposition 3, we can find the grouping changing method to reduce the value of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ or $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ by searching for the negative loop with all users in different groups, we call them negative differ-group loop. However, the number of users in each group will not change after $n_{1}\rightarrow n_{2},\ldots,n_{L}\rightarrow n_{1}$. To find the grouping changing method that can lead to arbitrary number of users in each group and reduce the value of $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ or $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$, we expand graph $G(\mathcal{N},\mathcal{E}^{(k)};\bm{x})$ to $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ by adding a virtual user to each group. The virtual user added to group $g$ is numbered by $n_{g}^{v}$. We set the achievable SINR of these virtual users to $0$, so these virtual users will not be allocated any power. ###### Proposition 4. If users $n_{1},n_{2},\ldots,n_{L-1},n_{L}$ compose a _shift union_ with grouping strategy $\bm{x}$, users $n_{1},n_{2},\ldots,n_{L-1},n_{g_{L}}^{v}$ can compose an _exchange union_ with grouping strategy $\bm{x}$. ###### Proof. Obviously, if grouping strategy $\bm{x}$ is changed to $\bm{x}^{\prime}$ after $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1}$ and putting user $n_{L-1}$ into the group of user $n_{L}$, it will also be changed to $\bm{x}^{\prime}$ after $n_{1}\rightarrow n_{2},\ldots,n_{L-2}\rightarrow n_{L-1},n_{L-1}\rightarrow n_{g_{L}}^{v}$. So the proof of Proposition 4 is concluded.∎ ###### Theorem 1. For grouping strategy $\bm{x}$, if the value of $\xi$ in problem $\mathcal{M}3$ can not be reduced by any negative differ-group loop in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ with all the constraints in problem $\mathcal{M}3$ satisfied, grouping matrix $\bm{x}$ is called _all- stable solution_. ###### Proof. According to Proposition 2, Proposition 3 and Proposition 4, if there is a _shift union_ or an _exchange union_ among all real users and virtual users, there must be a negative differ-group loop in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$. Therefore, if the value of $\xi$ in problem $\mathcal{M}3$ can not be reduced by any negative differ- group loop in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x})$ with all the constraints in problem $\mathcal{M}3$ satisfied, the value of $\xi$ in problem $\mathcal{M}3$ can not be reduced by any _shift union_ or _exchange union_ with all the constraints in problem $\mathcal{M}3$ satisfied, i.e., the grouping matrix $\bm{x}$ is _all-stable solution_. ∎ Figure 2: Illustration of the directed graph with “shift union” and “exchange union”. In order to explain the concepts of _shift union_ and _exchange union_ more clearly, an illustration of the directed graph composed of 8 nodes is shown in Fig.2 with edges among users in different groups, where the real users and virtual users are represented by solid circles and dotted circles, respectively. The users are divided into three groups, and the users in the same colour are grouped into the same group with initial user grouping strategy. In this directed graph, two negative differ-group loops $n_{1}->n_{3}->n_{5}->n_{1}$ and $n_{4}->n_{2}->n_{8}->n_{4}$ are found. Among them, users $n_{1}$, $n_{3}$, $n_{5}$ can compose an _exchange union_ , and users $n_{1}$, $n_{3}$, $n_{5}$ can compose a _shift union_. Then, $\mathcal{L}(\bm{q}^{(k)},\bm{\lambda}^{(k)},\bm{x})$ (if problem $\mathcal{S}^{(k)}$ is infeasible) or $\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x})$ (if problem $\mathcal{S}^{(k)}$ is infeasible) can be reduced by $n_{1}\rightarrow n_{3},n_{3}\rightarrow n_{5},n_{5}\rightarrow n_{1}$ or $n_{4}\rightarrow n_{2},n_{2}\rightarrow n_{8},n_{8}\rightarrow n_{4}$. It is worth noting that the initial user grouping strategy is an _all-stable solution_ , if there are no negative differ-group loop can be found in the initial directed graph. Input: Relaxed Master Problem $\mathcal{M}3$, Grouping Matrix $\bm{x}^{(k)}$, 1 Output: Grouping Matrix $\bm{x}^{(k+1)}$ 2 Create set of infeasible loops $\mathcal{A}=\varnothing$; 3repeat 4 Find $k_{max}=arg\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is infeasible.}}~{}~{}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$; 5 $maxL=\mathcal{L}^{\prime}(\bm{q}^{(k_{max})},\bm{\lambda}^{(k_{max})},\bm{x}^{(k)})$; 6 if _$maxL >0$._ then 7 Create graph $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k_{max})})$; 8 Search for negative differ-group loop $\bm{L}^{(k_{max})}\notin\mathcal{A}$ in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k)};\bm{x}^{(k)})$; 9 Change grouping matrix $\bm{x}^{(k)}$ to $\bm{x}^{(k+1)}$ according to loop $\bm{L}^{(k)}$ based on Proposition 2-3. 10 for _$i=1\textrm{ to }k-1$_ do 11 12 if _$\mathcal{S}^{(i)}$ is infeasible._ then 13 14 if _$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x}^{(k+1)}) >maxL$_ then 15 16 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 6; 17 end if 18 19 end if 20 21 end for 22 $\bm{x}^{(k)}$ = $\bm{x}^{(k+1)}$;$\mathcal{A}=\varnothing$; 23 end if 24 25until _$maxL <0$_; 26repeat 27 28 $\mathcal{A}=\varnothing$; 29 Find $k_{max}=arg\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is feasible.}}~{}~{}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$; 30 Create graph $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$; 31 Search for negative differ-group loop $\bm{L}^{(k_{max})}\notin\mathcal{A}$ in graph $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$; 32 Change grouping matrix $\bm{x}^{(k)}$ to $\bm{x}^{(k+1)}$ according to loop $\bm{L}^{(k)}$ based on Proposition 2-3. 33 for _$i=1\textrm{ to }k$_ do 34 35 if _$\mathcal{S}^{(i)}$ is feasible._ then 36 37 if _$\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k+1)}) >\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k_{max})})$_ then 38 39 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 22; 40 end if 41 42 else 43 44 if _$\mathcal{L}^{\prime}(\bm{q}^{(k)},\bm{\nu}^{(k)},\bm{x}^{(k+1)}) >0$_ then 45 46 Add loop $\bm{L}^{(k_{max})}$ to $\mathcal{A}$; Jump to step 22; 47 end if 48 49 end if 50 51 end for 52 53 $\bm{x}^{(k)}=\bm{x}^{(k+1)}$; 54until _Cannot find an appropriate negative differ-group loop_ ; Return $\bm{x}^{(k+1)}$. Algorithm 2 Graph Theory Based Algorithm to Solve Master Problem (GBMA) Graph theory based algorithm to solve relaxed master problem $\mathcal{M}3$ is shown in Algorithm 2. In this algorithm, we first search for a new user grouping matrix which satisfies all the infeasi-constraints in problem $\mathcal{M}3$ in steps 2-17. In each iteration of steps 3-16, we change the user grouping matrix to reduce the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is infeasible.}}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$, where $\mathcal{A}$ is the set of the loops according to which we can not reduce the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is infeasible.}}\mathcal{L}^{\prime}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$. Then we search for the solution of problem $\mathcal{M}3$ in steps 18-36. In each iteration of steps 19-35, we change the user grouping matrix to reduce the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is feasible.}}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$, where $\mathcal{A}$ is the set of the loops according to which we can not reduce the value of $\max\limits_{i\leq k,\mathcal{S}^{(i)}\text{is feasible.}}\mathcal{L}(\bm{q}^{(i)},\bm{\lambda}^{(i)},\bm{x}^{(k)})$. ###### Corollary 1. Algorithm 2 can converge to _all-stable solution_ in finite iterations. ###### Proof. The number of nodes in the graph is limited by the numbers of users and groups, so the number of the negative differ-group loops in the graph is infinite. In addition, the optimal value of problem $\mathcal{M}3$ in each iteration of Algorithm 2 will descend and the feasibility of the outputted user grouping matrix for problem $\mathcal{M}3$ in each iteration can be guaranteed by step 26. Therefore, Algorithm 2 will stop after finite iterations and output a solution without negative differ-group loop, i.e., _all-stable solution_. ∎ Input: Group $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$, Set of infeasible loops $\mathcal{A}$, Adjacency matrix $\bm{a}^{(k)}$ Output: _Negative differ-group loop_ $\bm{L}^{(k)}$ 1 Create super node. 2for _$j=1\textrm{ to }(G+N)$_ do 3 $w_{n}=0$, $\mathcal{T}_{n}=\varnothing$, $n\in\mathcal{V}$; 4 end for 5 6repeat 7 for _$i=1\textrm{ to }(G+N)$_ do 8 for _$j=1\textrm{ to }(G+N)$_ do 9 if _$(w_{j} >w_{i}+a^{(k)}_{ij})\&(a^{(k)}_{kj}\neq\infty,\forall k\in\mathcal{T}_{i}\setminus\\{j\\})$_ then 10 11 if _There is a loop $\bm{L}$ in $(\mathcal{T}_{i}\cup\\{i\\})$ and $\bm{L}\notin\mathcal{A}$_ then 12 13 $\mathcal{T}_{j}=\mathcal{T}_{i}\cup\\{i\\}$, $w_{j}=w_{i}+a^{(k)}_{ij}$ 14 end if 15 16 end if 17 if _$(w_{j} >w_{i}+a^{(k)}_{ij})\&(\exists a^{(k)}_{kj}=\infty,k\in\mathcal{T}_{i}\setminus\\{j\\})$_ then 18 Find the shortest path $\mathcal{T}^{\prime}_{i}$ from the super node to user $i$ with $a^{(k)}_{kj}\neq\infty,\forall k\in\mathcal{T}^{\prime}_{i}\setminus\\{j\\}$, assume the distance of path $\mathcal{T}^{\prime}_{i}$ is $m^{\prime}_{i}$; 19 if _$w_{j} >m^{\prime}_{i}+a^{(k)}_{ij}$_ then 20 if _There is a loop $\bm{L}$ in $(\mathcal{T}^{\prime}_{i}\cup\\{i\\})$ and $\bm{L}\notin\mathcal{A}$_ then 21 $\mathcal{T}_{j}=\mathcal{T}^{\prime}_{i}\cup\\{i\\}$, $w_{j}=m^{\prime}_{i}+a^{(k)}_{ij}$ 22 end if 23 24 end if 25 26 end if 27 if _$\|\mathcal{T}_{j}\| >G$_ then 28 Find the _negative differ-group loop_ $\bm{L}$ in $\mathcal{T}_{j}$; return $\bm{L}$ and break; 29 end if 30 31 end for 32 33 end for 34 35until _$\mathcal{T}_{n}$ , $n\in\mathcal{V}$ do not change_; Algorithm 3 Extended Bellman-Ford Algorithm to Search for Negative Differ- group Loops in GBMA (EBSA) To find these negative differ-group loops, we extend the Bellman-Ford algorithm to Algorithm 3 [35] [36] [37], where the negative differ-group loops in the set of infeasible loops $\mathcal{A}$ are avoided to be outputted. In this algorithm, we first create a super node. The distance from the super node to node $n$ is set to $w_{n}=0$, and the path from super node to node $n$, $\mathcal{T}_{n}$, $n\in\mathcal{V}$, is initialized in steps 2-4. Then these paths are constantly relaxed in steps 5-26. In each step of relaxing, the users in the same group are avoided to be added to the same path from super node to any node as step 8 and step 13 show. And the loops in $\mathcal{A}$ are avoided to form in any path $\mathcal{T}_{n}$ as step 9 and step 16 show. Therefore, according to the principle of Bellman-Ford algorithm, if the path from super node to any node is longer than the number of groups, there must be a negative differ-group loop in this path [38]. To obtain an appropriate solution of problem $\mathcal{P}1$ with polynomial time, we also design a greedy fast algorithm for the solving of problem $\mathcal{M}3$ as shown in Algorithm 4. This searching algorithm starts from the minimal edge in the graph. Then we iteratively search for the minimal output edge until there exists no next output edge. In this process, the set of loops that have been rejected in steps 5-7 of Algorithm 4 is avoided to be outputted. Input: Group $G(\mathcal{N}^{e},\mathcal{E}^{(k_{max})};\bm{x}^{(k)})$, Set of infeasible loops $\mathcal{A}$, Adjacency matrix $\bm{a}^{(k)}$ Output: _Negative differ-group loop_ $\bm{L}^{(k)}$ 1 2for _$t=1\textrm{ to }(N+G)$_ do 3 $\mathcal{T}=\varnothing$; 4 Find the minimal edge $a^{(k)}_{ij}=\min\limits\\{a^{(k)}_{ij}|i,j\in\mathcal{N}^{e}\\}$; 5 $\mathcal{T}=\mathcal{T}\cup\\{i\\}\cup\\{j\\}$, $m_{t}=a^{(k)}_{ij}$; 6 if _$m_{t}+a_{ji}^{(k)} <0$&$\mathcal{T}\notin\mathcal{A}$_ then 7 $\bm{L}^{(k)}\leftarrow\mathcal{T}$; return $\bm{L}^{(k)}$. 8 end if 9 10 $a^{(k)}_{ij}=\infty$, $i=j$; for _$l=3\textrm{ to }G$_ do 11 Find the minimal output edge of node $i$ : $a^{(k)}_{ij}=\min\limits\\{a^{(k)}_{ij}|j\notin\mathcal{T}\\}$; 12 $m_{t}=m_{t}+a^{(k)}_{ij}$, $\mathcal{T}=\mathcal{T}\cup\\{j\\}$; 13 if _$m_{t}+a_{ji}^{(k)} <0$&$\mathcal{T}\notin\mathcal{A}$_ then 14 $\bm{L}^{(k)}\leftarrow\mathcal{T}$; return $\bm{L}^{(k)}$. 15 end if 16 $i=j$; 17 end for 18 19 end for 20 Algorithm 4 Greedy Fast Algorithm to Search for Negative Differ-group Loop in GBMA (GFSA) _Computational Complexity Analysis:_ In GFSA, complexity of steps $10$-$15$ is $O\big{(}G+N\big{)}$, and complexity of steps $2$-$8$ is $O\big{(}(G+N)^{2}\big{)}$. Hence, computational complexity of GFSA is $O\big{(}(G+N)^{3}\big{)}$. Assume that GFSA is repeated $C$ times in Algorithm 2. Then apparently computational complexity of GBMA is $O\big{(}C(G+N)^{3}\big{)}$. We solve power allocation problem ${\mathcal{S}^{(k)}}$ by the interior point method, and its computational complexity is $O\big{(}N(NM)^{3}\big{)}$[34]. Then computational complexity of the proposed fast greedy algorithm is $O\big{(}max(N^{2}(NM)^{3},CN(G+N)^{3})\big{)}$. ## V Performance Evaluation In this section, we evaluate the performance of the proposed two algorithms in cell-free massive MIMO systems in terms of transmit power, interference from the desired signals of the other users in the same group, etc. In the simulations, APs and users are randomly placed in a 3km$\times$3km rectangular area. We set large-scale channel gain to $128.1+37.6log_{10}$ ($d_{n}$ [km]) dB. The small-scale fading follows an i.i.d. Gaussian distribution. Some default values in the simulations are shown in Table II [39]. TABLE II: Main Notations Parameter | Value ---|--- Number of users(N) | 200 Number of groups(G) | 5 Number of APs(M) | 200 Bandwidth(B) | 20 MHz Noise power spectral density($N_{0}$) | -174 dBm/Hz Power of pilot signal ($\rho_{r}$) | 200 mW Length of pilot sequences ($\tau$) | $2\lceil N/G\rceil$ Target data rate | 0.1-1.5 Mbps Figure 3: Performance comparison of different user grouping algorithms: a. Average number of iterations with different numbers of users and different $\delta$; b. Convergence of lower and upper bounds with the proposed fast greedy user grouping algorithm(200 users and 200 APs in total). . ### V-A Convergence Performance To evaluate the convergence performance of the proposed fast greedy algorithm, in Fig. 3, we show the average number of iterations (denoted by $T_{iter}$) of steps 7-18 in Algorithm 1 with different numbers of users and different $\delta$. We can see that $T_{iter}$ increases as number of users increases and $\delta$ reduces. In addition, $T_{iter}<10$ even when $N=240$ and $\delta=10^{-9}$. In Fig. 3, we show the process that the gap between the upper bound and lower bound of problem $\mathcal{P}2$ reduces. The results show that the proposed fast greedy algorithm converges rapidly, which illustrate the practicability of the proposed fast greedy user grouping algorithm. As shown in Fig. 3, the gap between the upper bound and the lower bound shrinks as the number of iterations increases. According to the principle of benders decomposition, the optimal user grouping and power allocation strategy can be found if this gap $\delta$ is 0. The number of users is finite, hence the grouping strategy profile is finite. Every time we change the user grouping strategy, the total transmit power will not increase, which means that a grouping strategy profile will not be selected repeatedly. Thus we can obtain the optimal user grouping and power allocation strategy with a small enough $\delta$ in Algorithm 1. ### V-B Impacts of pilot signal As mentioned in section II-A, channel estimation is carried out after user grouping in cell-free massive MIMO systems. Since the accuracy of channel estimation will affect the performance of cell-free massive MIMO with beamforming, we investigate the impacts of pilot signal on $\alpha$ in this subsection. $\alpha$ is the variance of MMSE estimate of channel fading ${h}$ as stated in (2). In Fig. 4, we change the power of pilot signal $\rho_{r}$ and the length of pilot sequences $\tau_{g}$ to show its influence on $\alpha$ under the proposed user grouping algorithm, where $U_{g}$ means the of number of users in group $g$. Considering the case of pilot reuse to observe the effects of non-orthogonal pilots, the length of pilot signal will be less than the number of users, i.e., $\tau_{g}<\sum_{i=1}^{N}x_{gi}$ [40]. To investigate the effect of pilot signal with $\tau_{g}<\sum_{i=1}^{N}x_{gi}$, in this figure, the range of $\tau_{g}$ is set to $\tfrac{1}{2}U_{g}$, $\tfrac{1}{3}U_{g}$ and $\tfrac{1}{4}U_{g}$. We can see that in Fig. 4, as the increase of $\rho_{r}$ and $\tau_{g}$, the mean value of $\alpha$ will also increase, which agrees with (3). Then the channel estimation error is reduced as stated in (4). That is to say, by adding the length of pilot sequences or the power of the pilot signal, the accuracy of channel estimation can be increased. By user grouping, the number of users served by each time-slot can be reduced. Therefore, the length of pilot sequences to maintain the accuracy of channel estimation can be reduced by user grouping. Figure 4: Influence of $\rho_{r}$ and $\tau$ on $\alpha_{mn}$. Figure 5: Performance comparison of different user grouping algorithms: a. Total transmit power vs. number of APs; b. Total transmit power vs. Number of APs; c. Total transmit power vs. Range of preset data rates (Mbps) . ### V-C Performance comparison In this subsection, we compare four proposed user grouping algorithms (named “MRT-GPGA-EBSA”, “MRT-GPGA-GFSA”, “ZF-GPGA-EBSA” and “ZF-GPGA-GFSA”, respectively) with the basic random user grouping algorithm(BCGA) and Gale- Shapley algorithm(Gale-S) [41], where each user prefers the group where interference is less and each group prefers to reject the access requests of the users with the highest requirements on power. The number of users in each group with Gale-S is equal. To evaluate interference that users suffer, we define a mean-interference variable $I$ as follows: $\displaystyle I=$ $\displaystyle\tfrac{1}{N}\sum_{n=1}^{N}\bigg{(}{\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}\bigg{)}$ (36) where $\bigg{(}{\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}\bigg{)}$ is the right of denominator of $\mathrm{SINR}_{n}$ in (1). We first vary the number of users and APs to show mean-interference variable $I$ with four different user grouping algorithms in Fig. 6 and Fig. 6, respectively. The number of users increases from 150 to 240 with 200 APs and five groups in total in Fig. 6, and the number of APs increases from 150 to 240 with 200 users and five groups in total in Fig. 6. We can see that mean- interference increases with the increase of users and the reduction of APs. The reason is that as the number of groups is given, the number of users sharing the same time-slot will increase with the increase of users. Then the value of ${\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}$ in (36) will increase. In addition, as the number of APs reduces, to maintain enough SINR in (1), the power that each AP allocates to a user will increase, then more interference will appear according to (36). Moreover, the mean- interference of proposed algorithms is less than the reference two. The main reason is that, in this paper, power allocation and user grouping are jointly optimized considering QoS constraints. To reduce the total transmit power and satisfy QoS requirements of different users as problem $\mathcal{P}1$ shows, the value of ${\sum\limits_{g=1}^{G}x_{gn}\sum\limits_{i=1}^{N}x_{gi}\sum\limits_{m=1}^{M}p_{mi}\beta_{mn}\alpha_{gmi}}$ in (8b) is reduced. Although interference is considered in the Gale-S strategy, the mean-interference of this strategy is high. The reason is that, as the users with lower target data rates need lower transmit power in general, the users with lower target data rates may be grouped into one group with less interference and the users with higher target data rates may be grouped into the other group. The interference among the desired signals of users in the group with higher target data rates is very serious. Besides, it should be noted that, due to the inherent ability of ZF beamforming to null interference among the desired signals of users in each group, ZF beamforming is not shown in this figure. Figure 6: Performance comparison of different user grouping algorithms: a. Mean-interference vs. number of users; b. Mean-interference vs. Number of APs. It is clear that interference has great impact on power allocation. In Fig. 5 and Fig. 5, we illustrate the total transmit power of six different user grouping algorithms with varied numbers of users and APs, respectively. The results show that all the six curves in Fig. 5 rise as the number of users increases and all the six curves in Fig. 5 decrease as the number of APs increases. That is because that, as shown in Fig. 6 and Fig. 6, the mean- interference increases with the increase of users and the reduction of APs. Then more power is needed to maintain enough SINR. In addition, the total transmit power of the proposed user grouping algorithms is significantly lower than the reference two, which agrees with the results in Fig. 6 and Fig. 6. Furthermore, with the proposed user grouping strategies, the transmit power consumption of ZF beamforming is lower than that of MRT beamforming. This result derives from the inherent ability of ZF beamforming to null interference among the desired signals of different users. Figure 7: Performance comparison under given total transmit power: a. Average data rate(Mbps) vs. Length of coherence interval(M=250, N=240, $P_{t}$=10W); b. Number of groups vs. Length of coherence interval(M=250, N=240, $P_{t}$=10W). Figure 8: Distribution of users and APs in 3km $\times$ 3km rectangular area(50 users, 50 APs and 5 groups). Figure 9: Number of users in each group and in each range of QoS requirements(50 Users, 50 APs and 5 Groups). In Fig. 5, we show the total transmit power with different ranges of target data rate. The results show that the total transmit power increases with target data rate, and the proposed algorithms outperform the reference algorithm. The reason is that, target $\mathrm{SINR}$ of each user, i.e., $\gamma_{n}$, are explicit in constraints (8b) of problem $\mathcal{P}1$. Furthermore, in Fig. 5, the total transmit power of the downlink cell-free massive MIMO system without user grouping (named “Non-grouping”), is compared with that of the proposed system with user grouping. We can see that the column without grouping is higher than the other columns. This result shows that, after user grouping, the minimal transmit power required for satisfying all users’ QoS requirements is reduced. An important reason is that, after user grouping, the length of pilot sequences, i.e., $\tau_{g}$, can be reduced without reducing the accuracy of channel estimation as shown in Fig. 4. Then the number of symbols for data transmission within each coherent interval, i.e., $\tau_{c}-\sum_{g=1}^{G}\tau_{g}$, can be increased. In Fig. 7, under given total transmit power, the average data rate is evaluated with different lengths of coherence interval and group numbers. In Fig. 7, we vary the length of coherence interval to show the average data rate with different beamforming methods. As the length of coherence interval increases, the symbols for data transmission will increase, and the length of pilot sequence is unchanged. Therefore, the average data rate will increase. Furthermore, the average data rate of users with ZF beamforming is higher than that of users with conjugate beamforming, the reason is that the interference among the desired signals of different users can be cancelled by ZF beamforming. In order to further demonstrate the advantages of user grouping in cell-free massive MIMO systems, in Fig. 7, we show the average data rate vary with the number of groups. We can see that the average data rate can be improved by user grouping. In general, by beamforming among the antennas of many APs, more gains from spatial diversity can be obtained. After user grouping, the number of users sharing the same time-frequency resource will be reduced, and the utilization efficiency of spatial diversity is reduced. However, the pilot overheads will be greatly reduced by user grouping as shown in section V.B. There is a tradeoff between the utilization efficiency of spatial diversity and the pilot overheads. Therefore, in Fig. 7, the average data rate will increase from $G=1$ to $G=3$, and descend when the number of groups is greater than three. The number of users sharing the same time-slot in cell-free massive MIMO systems is much larger than traditional communication systems where radio resources of different users are usually orthogonal. In general, the users with higher QoS requirements require more transmit power from APs to guarantee a certain SINR. More transmit power will lead to more severe interference to the desired signals of the other users in the same group. If the users with high QoS requirements be assigned into the same group, the interference among the signals of users in the same group will be too serious to be eliminated and the power consumption will be unbearable. Therefore, to alleviate the serious interference from the desired signals of the other users in the same group, users with high QoS requirements should be avoided to be assigned into the same group. In Fig. 8, we show the distribution of users and APs with different user grouping algorithms, where users and APs are represented by dots and triangles, respectively. The number of APs is 50. There are 50 users which are assigned into 5 groups, and the dots in the same colour represent the users in the same group. The size of each dot reflects its QoS requirement as shown in the legend of Fig. 8. In addition, to analyze the distribution of users and APs in Fig. 8 more intuitively, we also show the number of users in each group and in each range of QoS requirements in Fig. 9. The results show that there are 5 users whose target data rates are greater than $1.5$Mbps in group $2$ with user grouping algorithm BCGA, and there are 5 users whose target data rates are greater than $1.5$Mbps in group $4$ with user grouping algorithm Gale-S, which will bring serious interference from the desired signals of the other users in the same group to the users in this group. By contrast, users with high target data rates are separated into different groups in the proposed algorithms. This also explains why the proposed algorithms outperform the reference algorithm in terms of transmit power, interference from the desired signals of the other users in the same group as shown in Fig. 5, Fig. 5, Fig. 6 and Fig. 6. Moreover, the number of users in each group is no more than $16$ as Fig. 9 shows. In other words, length of pilot sequence can be effectively reduced by user grouping. ## VI Conclusion In this paper, we study the joint optimization problem of power allocation and user grouping to minimize the total transmit power in cell-free massive MIMO systems. We decompose this problem into a primal problem: power allocation problem and a master problem: user grouping problem, where the power allocation problem is proved to be convex. We analyze and relax these two problems by GBD method. Then an algorithm based on GBD method is proposed to solve the joint optimization problem by iteratively solving these two problems and reduce the gap between the upper bound and lower bound of the original problem. Moreover, the relaxed master user grouping problem is converted into a problem of searching for some special negative loops in a graph composed of users based on graph theory. An algorithm extended from Bellman-Ford algorithm as well as a fast greedy suboptimal algorithm is proposed to search for these negative loops. Although the complexity of channel estimation and decoding can be reduced by user grouping, there still remain some challenges in research on cell-free massive MIMO as the number of users increases. For instance, each AP needs to know the transmitted symbols of all users after user grouping, so the limited fronthaul is still one of the bottleneck in cell-free massive MIMO systems as the number of users increases. An effective method for fronthaul reduction is to reducing the number of APs connected with each user (AP grouping). However, the benefit of spatial diversity will also decrease after AP grouping. To serve more users in cell-free massive MIMO systems with limited APs and limited fronthaul, there still remain many works to do. ## References * [1] M. Zhang, H. Lu, F. Wu, and C. W. Chen, “NOMA-Based Scalable Video Multicast in Mobile Networks With Statistical Channels,” _IEEE Trans. Mobile Comput._ , vol. 20, no. 6, pp. 2238–2253, 2021, 10.1109/TMC.2020.2977639. * [2] J. Zhu, D. W. K. Ng, N. Wang, R. Schober, and V. K. Bhargava, “Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments,” _IEEE Trans. on Wireless Commun._ , vol. 16, no. 3, pp. 2001–2016, Mar. 2017. * [3] J. Zhang, L. Dai, Z. He, S. Jin, and X. Li, “Performance Analysis of Mixed-ADC Massive MIMO Systems Over Rician Fading Channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 6, pp. 1327–1338, June 2017. * [4] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta, “Cell-Free Massive MIMO: Uniformly great service for everyone,” _IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC_ , vol. 2015-Augus, pp. 201–205, 2015. * [5] E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal Design of Energy-Efficient Multi-User MIMO Systems: Is Massive MIMO the Answer?” _IEEE Trans. on Wireless Commun._ , vol. 14, no. 6, pp. 3059–3075, June 2015. * [6] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta, “Cell-free Massive MIMO Versus Small Cells,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 3, pp. 1834–1850, 2017. * [7] E. Nayebi, A. Ashikhmin, T. L. Marzetta, H. Yang, and B. D. Rao, “Precoding and Power Optimization in Cell-Free Massive MIMO Systems,” _IEEE Trans. Wireless Commun._ , vol. 16, no. 7, pp. 4445–4459, 2017. * [8] J. Zhang, Y. Wei, E. Bjornson, Y. Han, and S. Jin, “Performance Analysis and Power Control of Cell-Free Massive MIMO Systems with Hardware Impairments,” _IEEE Access_ , vol. 6, pp. 55 302–55 314, 2018. * [9] M. Bashar, K. Cumanan, A. G. Burr, M. Debbah, and H. Q. Ngo, “On the uplink Max-min SINR of Cell-free Massive MIMO Systems,” _IEEE Trans. on Wireless Commun._ , vol. 18, no. 4, pp. 2021–2036, 2019. * [10] H. Q. Ngo, L. Tran, T. Q. Duong, M. Matthaiou, and E. G. Larsson, “On the Total Energy Efficiency of Cell-Free Massive MIMO,” _IEEE Trans. Green Commun. Netw._ , vol. 2, no. 1, pp. 25–39, Mar. 2018. * [11] T. H. Nguyen, T. K. Nguyen, H. D. Han, and V. D. Nguyen, “Optimal Power Control and Load Balancing for Uplink Cell-Free Multi-User Massive MIMO,” _IEEE Access_ , vol. 6, pp. 14 462–14 473, 2018. * [12] M. Bashar, K. Cumanan, A. G. Burr, H. Q. Ngo, and M. Debbah, “Cell-Free Massive MIMO with Limited Backhaul,” in _2018 IEEE International Conference on Communications (ICC)_ , May 2018, pp. 1–7. * [13] G. Femenias and F. Riera-Palou, “Cell-Free Millimeter-Wave Massive MIMO Systems with Limited Fronthaul Capacity,” _IEEE Access_ , vol. 7, pp. 44 596–44 612, 2019. * [14] J. C. Chen, “Low-PAPR Precoding Design for Massive Multiuser MIMO Systems via Riemannian Manifold Optimization,” _IEEE Communications Letters_ , vol. 21, no. 4, pp. 945–948, 2017. * [15] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An Overview of Massive MIMO: Benefits and Challenges,” _IEEE Journal on Selected Topics in Signal Processing_ , vol. 8, no. 5, pp. 742–758, 2014. * [16] Z. Chen and E. Bjornson, “Channel Hardening and Favorable Propagation in Cell-free Massive MIMO with Stochastic Geometry,” _IEEE Trans. Commun._ , vol. 66, no. 11, pp. 5205–5219, 2018. * [17] Y. Li and G. A. A. Baduge, “NOMA-Aided Cell-Free Massive MIMO Systems,” _IEEE Wireless Communications Letters_ , vol. 1, no. 2, pp. 2–5, 2018. * [18] M. Attarifar, A. Abbasfar, and A. Lozano, “Modified Conjugate Beamforming for Cell-Free Massive MIMO,” _IEEE Wireless Communications Letters_ , vol. 8, no. 2, pp. 616–619, Apr. 2019. * [19] Y. Zhang, M. Zhou, X. Qiao, H. Cao, and L. Yang, “On the Performance of Cell-Free Massive MIMO With Low-Resolution ADCs,” _IEEE Access_ , vol. 7, pp. 117 968–117 977, 2019. * [20] X. Zhang, D. Guo, K. An, Z. Ding, and B. Zhang, “Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems,” _IEEE Access_ , vol. 7, pp. 57 332–57 340, 2019. * [21] G. Femenias, N. Lassoued, and F. Riera-Palou, “Access Point Switch ON/OFF Strategies for Green Cell-Free Massive MIMO Networking,” _IEEE Access_ , vol. 8, pp. 21 788–21 803, 2020. * [22] E. Nayebi, A. Ashikhmin, T. L. Marzetta, and H. Yang, “Cell-Free Massive MIMO systems,” _Conference Record - Asilomar Conference on Signals, Systems and Computers_ , vol. 2016-Febru, pp. 695–699, 2016. * [23] A. Ibrahim, T. M. N. Ngatched, and O. Dobre, “Using Bender’s Decomposition for Optimal Power Control and Routing in Multihop D2D Cellular Systems,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2019. * [24] J. Krolikowski, A. Giovanidis, and M. Di Renzo, “A Decomposition Framework for Optimal Edge-Cache Leasing,” _IEEE J. Sel. Areas Commun._ , vol. 36, no. 6, pp. 1345–1359, June 2018. * [25] L. Xiang, D. W. K. Ng, R. Schober, and V. W. S. Wong, “Secure Video Streaming in Heterogeneous Small Cell Networks With Untrusted Cache Helpers,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 4, pp. 2645–2661, Apr. 2018. * [26] H. Zhang, S. J. Moura, Z. Hu, W. Qi, and Y. Song, “Joint PEV Charging Network and Distributed PV Generation Planning Based on Accelerated Generalized Benders Decomposition,” _IEEE Trans. Transp. Electrification_ , vol. 4, no. 3, pp. 789–803, Sep. 2018. * [27] A. Cherukuri, E. Mallada, S. Low, and J. Cortés, “The Role of Convexity in Saddle-Point Dynamics: Lyapunov Function and Robustness,” _IEEE Trans. Autom. Control_ , vol. 63, no. 8, pp. 2449–2464, Aug. 2018. * [28] J. Du, F. R. Yu, X. Chu, J. Feng, and G. Lu, “Computation Offloading and Resource Allocation in Vehicular Networks Based on Dual-Side Cost Minimization,” _IEEE Trans. Veh. Technol._ , vol. 68, no. 2, pp. 1079–1092, Feb. 2019. * [29] T. Abrão, S. Yang, L. D. H. Sampaio, P. J. E. Jeszensky, and L. Hanzo, “Achieving Maximum Effective Capacity in OFDMA Networks Operating Under Statistical Delay Guarantee,” _IEEE Access_ , vol. 5, pp. 14 333–14 346, 2017. * [30] M. Zhu and S. Martínez, “An Approximate Dual Subgradient Algorithm for Multi-Agent Non-Convex Optimization,” _IEEE Trans. Autom. Control_ , vol. 58, no. 6, pp. 1534–1539, June 2013. * [31] X. Wang, W. Xie, and R. Duan, “Semidefinite Programming Strong Converse Bounds for Classical Capacity,” _IEEE Trans. Inform. Theory_ , vol. 64, no. 1, pp. 640–653, Jane 2018. * [32] A. M. Geoffrion, “Generalized Benders Decomposition,” _Journal of optimization theory and applications_ , vol. 10, no. 4, pp. 237–260, 1972. * [33] L. Angeles, “Generalized Benders Decomposition, GBD,” _SpringerReference_ , vol. 10, no. 4, 2012. * [34] S. Boyd and L. Vandenberghe, _Convex Optimization_. Cambridge university press, 2004. * [35] F. Guo, H. Lu, X. Jiang, M. Zhang, J. Wu, and C. W. Chen, “QoS-aware User Grouping Strategy for Downlink Multi-Cell NOMA Systems,” _IEEE Trans. Wireless Commun._ , pp. 1–1, 2021, 10.1109/TWC.2021.3088487. * [36] V. T. Chakaravarthy, F. Checconi, P. Murali, F. Petrini, and Y. Sabharwal, “Scalable Single Source Shortest Path Algorithms for Massively Parallel Systems,” _IEEE Trans. Parallel Distrib. Syst._ , vol. 28, no. 7, pp. 2031–2045, July 2017. * [37] L. Maccari, L. Ghiro, A. Guerrieri, A. Montresor, and R. L. Cigno, “On the distributed computation of load centrality and its application to dv routing,” in _IEEE INFOCOM 2018 - IEEE Conference on Computer Communications_ , 2018, pp. 2582–2590. * [38] F. Busato and N. Bombieri, “An Efficient Implementation of the Bellman-Ford Algorithm for Kepler GPU Architectures,” _IEEE Trans. Parallel Distrib. Syst._ , vol. 27, no. 8, pp. 2222–2233, Aug. 2016. * [39] X. Hu, C. Zhong, X. Chen, W. Xu, H. Lin, and Z. Zhang, “Cell-Free Massive MIMO Systems with Low Resolution ADCs,” _IEEE Trans. Commun._ , pp. 1–1, 2019. * [40] A. Papazafeiropoulos, P. Kourtessis, M. Di Renzo, S. Chatzinotas, and J. M. Senior, “Performance Analysis of Cell-Free Massive MIMO Systems: A Stochastic Geometry Approach,” _IEEE Transactions on Vehicular Technology_ , vol. 69, no. 4, pp. 1–1, 2020. * [41] Z. Zhao, M. Xu, Y. Li, and M. Peng, “A non-orthogonal multiple access-based multicast scheme in wireless content caching networks,” _IEEE Journal on Selected Areas in Communications_ , vol. 35, no. 12, pp. 2723–2735, 2017.
arxiv-papers
2021-07-27T08:02:09
2024-09-04T03:07:20.844245
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Fengqian Guo, Hancheng Lu and Zhuojia Gu", "submitter": "Fengqian Guo", "url": "https://arxiv.org/abs/2107.12650" }
2107.12653
# Entangling Power of Symmetric Two-Qubit Quantum Gates D. Morachis Galindo Departamento de Física, Centro de Nanociencias y Nanotecnología, Universidad Nacional Autónoma de México, Apartado Postal 14, 22800 Ensenada, B.C., México Jesús A. Maytorena Departamento de Física, Centro de Nanociencias y Nanotecnología, Universidad Nacional Autónoma de México, Apartado Postal 14, 22800 Ensenada, B.C., México ###### Abstract The capacity of a quantum gate to produce entangled states on a bipartite system is quantified in terms of the entangling power. This quantity is defined as the average of the linear entropy of entanglement of the states produced after applying a quantum gate over the whole set of separable states. Here we focus on symmetric two-qubit quantum gates, acting on the symmetric two-qubit space, and calculate the entangling power in terms of the appropriate local-invariant. A geometric description of the local equivalence classes of gates is given in terms of the $\mathfrak{su}(3)$ Lie algebra root vectors. These vectors define a primitive cell with hexagonal symmetry on a plane, and through the Weyl group the minimum area on the plane containing the whole set of locally equivalent quantum gates is identified. We give conditions to determine when a given quantum gate produces maximally entangled states from separable ones (perfect entanglers). We found that these gates correspond to one fourth of the whole set of locally-distinct quantum gates. The theory developed here is applicable to three-level systems in general, where the non-locality of a quantum gate is related to its capacity to perform non-rigid transformations on the Majorana constellation of a state. The results are illustrated by an anisotropic Heisenberg model, the Lipkin- Meshkov-Glick model, and two coupled quantized oscillators with cross-Kerr interaction. Geometric phase, Uhlmann, Topological, Mixed States, Spin-j Particle. UhlmannJ dmorachisgalindo February 2021 ## I Introduction Entanglement is a purely quantum mechanical phenomenon that is essential to achieve universal quantum computation based on interacting qubits systemsAudrescht (2007). Quantum logic gates are the building blocks to perform quantum algorithms, where the generation of entangled states from a separable set of states is mandatory to achieve the desired resultsHorodecki _et al._ (2009). Most of the proposed quantum computer architectures are based on multi-qubit processors. Nevertheless, there are also proposals that use higher dimensional systems called qudits, which have the advantage of reducing the number of physical entities required to perform calculationsMuthukrishnan and Stroud (2000). Among these are three-level systems, called qutrits, which are the smallest systems that may exhibit purely quantum correlations such as contextualityJerger _et al._ (2016), and they have been used to construct three-level quantum gatesDogra _et al._ (2018); Randall _et al._ (2018). Qutrits may be emulated by a two-qubit system symmetric under particle exchange. This allows us to think of many three-level transformations in terms of operations on the symmetric two-qubit symmetric space. Within the Majorana representation Majorana (1932); Devi _et al._ (2012), symmetric two-qubit states appear as two points (“the stars”) on the unit sphere. It can be shown that the distance between the two stars maps bijectively to the concurrenceLiu and Fu (2016). States with maximally separated stars correspond to Bell states, while states with stars at the same position are separable. This allows to think of any transformation between this kind of states as rigid or non-rigid motions of the associated Majorana constellation, where the latter (former) does (does not) change the entanglement of states. Whenever there is no place for confusion, we will refer to a two-qubit symmetric state (space) as symmetric state (space) only. Since many transformations on symmetric (three-level) spaces involve changing the entanglement (distance between the Majorana stars), it is important to quantify the capacity of quantum gates to generate it. Such a quantity is called the entangling powerZanardi _et al._ (2000). It is defined as the average linear entropy of the states produced by a quantum gate $\hat{V}$ acting on the manifold of all separable states. For general two-qubit gates (TQQGs) the entangling power can be compactly written in terms of a two-qubit gate local invariantBalakrishnan and Sankaranarayanan (2010) and sets values to classify TQQGs as perfect entanglersRezakhani (2004); Balakrishnan and Sankaranarayanan (2010), that is to say, a quantum gate that at least produces a Bell state out of a separable state. Nevertheless, these expressions do not quantify the entangling power of gates acting irreducibly on the symmetric subspace, called symmetric quantum gates (SQGs), because they involve a contribution from separable non-symmetric states. Here we will derive the appropriate expression of the entangling power for SQGs and find an onset value above which they can be classified as perfect entanglers. As noted by Zhang et al.Zhang _et al._ (2003), distinct TQQGs can be put together into sets whose elements differ by local transformations, called local equivalence classes (LECs). By group theoretical methods, the authors were able to represent all LECs of TQQGs classes on a tetrahedron, and showed that half of its volume is occupied by perfect entanglers. Motivated by Reference Zhang _et al._ , 2003, we develop a geometric description of the LECs of symmetric gates. We found that these are characterized by a periodic set of points on a plane, displaying hexagonal symmetry with lattice vectors determined by the $\mathfrak{su}(3)$ algebra root vectors. This allows us to identify a minimum extension where all inequivalent LECs of SQGs are located, known as the Weyl chamber, and to show that one fourth of it is occupied by perfect entanglers. This geometric approach as well as the entangling power concept are relevant to study operations in general three-level systems. This paper is organized as follows. In sections II and III we present brief descriptions of the Majorana representation and of the Cartan decomposition of TQQGs and how it is related to SQGs, respectively. In section IV the appropriate local-invariant for SQGs is defined. Section V is devoted to analyse the entangling power and use it to classify SQGs as perfect entanglers. In section VI the developed formalism is applied to some example models involving two interacting spinsAbliz _et al._ (2006), the three-level Lipkin-Meshkov-Glick model from nuclear physicsLipkin _et al._ (1965), and two coupled quantized oscillators through the cross-Kerr effect of quantum opticsBhattacharya and Shi (2013). Section VII is devoted to conclusions. Appendix A includes the derivation of the entangling power formula while appendix B contains a theorem which allows to classify SQGs as perfect entanglers. ## II Majorana stellar representation The Majorana representation is a geometric depiction of quantum states contained in a finite Hilbert space, which can give insight into their entangling propertiesLiu and Fu (2016). The idea behind its construction is to obtain a complex polynomial out of the probability amplitudes that define a state for some fixed basis. The roots of such a polynomial can be represented by points in the Argand diagram, and mapped into a sphere by stereographic projectionMajorana (1932); Liu and Fu (2016). For a quantum state $\ket{\psi}=\sum a_{k}\ket{k}$ in a $n$ dimensional Hilbert space, the Majorana polynomial is given by $\displaystyle\sum\limits_{k=1}^{n}$ $\displaystyle\frac{(-1)^{k}a_{k}}{\sqrt{(n-k)!k!}}z^{n-k}=0.$ (1) The solutions $\\{z_{k}\\}$ lie on the complex plane, and their projection onto the Riemann sphere is made by the following association $z_{k}=\tan(\theta_{k}/2)e^{i\phi_{k}}$. Each root $z_{k}$ is called a Majorana star, while the whole set of roots is denoted as the Majorana constellation of the quantum state $\ket{\psi}$. In fact, any two quantum states with the same constellation are in fact equivalent, up to a global phase, which makes this representation a good description of their projective space. The $n+1$ dimensional Hilbert space has a bijection onto the space of $n$ qubits with particle permutation symmetry. This implies that symmetric-qubit states have associated Majorana constellations. The $z_{k}$ roots define the components of a ket state in the symmetric space, by the relation $\displaystyle\ket{\psi}$ $\displaystyle=\frac{1}{\sqrt{n!}N_{n}}\sum\limits_{P}^{n}\ket{u_{P(1)},u_{P(2)},...,u_{P(n)}},$ (2) where $\ket{u_{i}}$ represents the 1-qubit state $(\cos\frac{\theta_{i}}{2}\ e^{i\phi_{i}}\sin\frac{\theta_{i}}{2})^{T}$; the $P$ symbol denotes all the possible permutations of the $\ket{u_{i}}$ states and $N_{n}$ is a normalization coefficientLiu and Fu (2014). Thus, the Majorana constellation serves as the mapping between an $n+1$ dimensional Hilbert space and the space of $n$ qubit symmetric wavefunctions. For symmetric two-qubit states, the Majorana constellation consists of two stars. As shown in Reference Liu and Fu, 2016, their concurrence is proportional to the square of the chordal distance between the stars. This implies that states with zero concurrence have their Majorana stars on the same position, or equivalently said, have degenerate stars. On the contrary, maximally entangled states have stars occupying antipodal positions on the sphere. For mono-partite three-level systems we may also speak of entangled states as those whose Majorana stars are not coincident. On the same line of thought, three-level transformations will be referred to as entangling as long as they can produce a state with non-degenerate Majorana stars from a state with a degenerate constellation. Fig. 1 illustrates a separable state (degenerate constellation) which, after being acted on by a SQG ends up as a fully entangled state (antipodal Majorana stars). Examples of these gates in three-level systems are phase gates and the $SWAP_{12}$ and $SWAP_{23}$, which have found applications in qutrit-based quantum computingDogra _et al._ (2018). Figure 1: Action of a quantum gate on a separable initial state (with concurrence $C=0$) which ends up as a Bell state ($C=1$) on the Majorana sphere. ## III Cartan decomposition of unitary two-qubit transformations The whole set of transformations on the Hilbert space of two-qubits can be classified as local and non-local. Local operations are those physical processes that act separately only on one component of the bipartite system and, as a consequence, do not change the entanglement properties of the state. Local two-qubit gates can always be written as tensor product of one-qubit operations: $\displaystyle\hat{V}^{(12)}$ $\displaystyle=\hat{V}^{(1)}\otimes\hat{V}^{(2)},$ (3) which belong to the $SU(2)\otimes SU(2)$ Lie group. We will restrict $\hat{V}$ to denote transformations on the two-qubit space, not necessarily symmetric. In general, TQQGs $\in SU(4)$ that cannot be written as in (3) are called non- local. There is a very concise way of writing every element of $SU(4)$ given by the Cartan decomposition of the group. Namely, for every $\hat{V}\in SU(4)$, we have the following identityKnapp (1996) $\displaystyle\hat{V}$ $\displaystyle=\hat{K}_{1}\hat{A}\hat{K}_{2},$ (4) $\displaystyle\hat{A}$ $\displaystyle=\exp\left[\frac{i}{2}\sum\limits_{k}c_{k}\hat{\sigma}^{(1)}_{x_{k}}\otimes\hat{\sigma}^{(2)}_{x_{k}}\right],$ (5) The $\hat{K}$ factors belong to the $SU(2)\otimes SU(2)$ Lie group, hence they are local. As usual, the $\hat{\sigma}_{x_{k}}$ operators denote the Pauli matrices, with $k=1,2,3$ and $x_{k}=x,y,z$. The $\hat{A}$ factor contains the non-local part of the quantum gates, and is given by the exponential of linear combinations of the operators $\hat{\sigma}^{(1)}_{x_{i}}\otimes\hat{\sigma}^{(2)}_{x_{i}}$. TQQGs that differ only by a $\hat{K}$ factor are said to be in the same local equivalence class. These set of operators span the Cartan subalgebra of the $SU(4)$ Lie group, which is a maximally commuting subalgebra of $\mathfrak{su}(4)$Zhang _et al._ (2003). It is seen that the $(c_{1},c_{2},c_{3})$ coordinates have a period of $\pi$ each, and thus the topological structure of the local equivalence classes is a $3$-torusZhang _et al._ (2003). The $\boldsymbol{c}=(c_{1},c_{2},c_{3})$ point will be called geometrical point hereafter. For a more detailed discussion of the Cartan decomposition of $SU(4)$ and its algebra, namely the $\mathfrak{su}(4)$ Lie algebra, see Reference Zhang _et al._ , 2003. There is a special case of TQQGs that act irreducibly on the symmetric and anti-symmetric two-qubit ket spaces. Therefore, if $\hat{V}^{(r)}$ is an element of such a special set, in which $(r)$ denotes a reducible representation, it has a matrix form $\displaystyle\hat{V}^{(r)}$ $\displaystyle=\left(\begin{matrix}\hat{U}&0\\\ 0&1\\\ \end{matrix}\right),$ (6) where $\hat{U}\in SU(3)$ acts on any symmetric linear combination of the computational basis; $\hat{U}$ is thus the SQG we are interested in. The last factor acts on the anti-symmetric Bell state $\ket{\phi^{-}}=\frac{1}{\sqrt{2}}(\ket{01}-\ket{10})$. Since reducible gates are a subgroup of $SU(4)$, the Cartan decomposition holds for all elements of the form (6). Also, for reducible TQQGs, the Cartan decomposition is composed of reducible factors. To see this, first let us note that $\hat{A}$ is reducible, as will be seen in the next section. With this, it is readily shown that a sufficient condition for $\hat{V}$ to be reducible is that $\hat{K}$ be reducible. To show that reducibility of $\hat{V}$ implies the reducibility of $\hat{K}$ consider the product $\displaystyle\left(\begin{matrix}\hat{U}&0\\\ 0&1\end{matrix}\right)$ $\displaystyle=\left(\begin{matrix}K^{(s)}_{1}&K^{\prime}_{1}\\\ K^{\prime\prime}_{1}&K^{(a)}_{1}\end{matrix}\right)\left(\begin{matrix}A^{(s)}&0\\\ 0&A^{(a)}\end{matrix}\right)\left(\begin{matrix}K^{(s)}_{2}&K^{\prime}_{2}\\\ K^{\prime\prime}_{2}&K^{(a)}_{2}\end{matrix}\right).$ The upper and lower off-diagonal elements (primed and doubled-primed) are three-dimensional column and row vectors, respectively. The $(s)$ and $(a)$ upper indices denote the $3\times 3$ matrix acting on the symmetric subspace and the scalar acting on the anti-symmetric subspace, severally. By explicit evaluation of the right hand side of the equation above, it is seen that $K^{\prime}_{1}=K^{\prime}_{2}=0$ and $K^{\prime\prime}_{1}=K^{\prime\prime}_{2}=0$, which implies that the $\hat{K}$ factors are also reducible. The $\hat{K}$ factors for SQGs are forcefully of the form $e^{-i\frac{\theta}{2}\boldsymbol{\hat{n}}\cdot\boldsymbol{\hat{\sigma}}}\otimes e^{-i\frac{\theta}{2}\boldsymbol{\hat{n}}\cdot\boldsymbol{\hat{\sigma}}}$, with $\boldsymbol{\hat{n}}$ and $\theta$ a unit vector and a rotation angle. It can be shown that the $\hat{K}^{(s)}$ factors belong to the $SU(2)$ group in the spin-$1$ representationN. Jeevanjee (2015), which are seen as $SO(3)$ rotations on the Majorana sphereDogra _et al._ (2018); Liu and Fu (2016). ## IV Local invariants and equivalence classes of symmetric quantum gates TQQGs that are equivalent up to a local gate factor (see eq.(4)) have the same local invariants Makhlin (2002); Zhang _et al._ (2003). Local invariants for two-qubit quantum gates are determined by the set of eigenvalues of $\displaystyle\hat{M}$ $\displaystyle=\hat{V}^{T}_{B}\hat{V}_{B},$ (7) where the label $B$ indicates that the gate $\hat{V}$ is expressed in the Bell basis $B=\\{\ket{\psi^{+}},\ket{\psi^{-}},\ket{\phi^{+}},\ket{\phi^{-}}\\}$. The transformation matrix between the Bell states and the computational basis, ordered as $\\{\ket{00},\ket{01},\ket{10},\ket{11}\\}$, is $\displaystyle\hat{Q}^{\dagger}$ $\displaystyle=\frac{1}{\sqrt{2}}\left(\begin{matrix}1&0&0&1\\\ 0&i&i&0\\\ i&0&0&-i\\\ 0&1&-1&0\\\ \end{matrix}\right),$ (8) where the definition of the Bell states is evident from the matrix above; note that the last row corresponds to the anti-symmetric one. The Lie algebra of the local components of two-qubit quantum gate is isomorphic to the Lie algebra of the $SO(4)$ groupZhang _et al._ (2003), through the map defined by eq.(8). Thus, any two-qubit quantum gate in the Bell basis, whose decomposition is given by (4), becomes $\displaystyle\hat{V}_{B}$ $\displaystyle=\hat{O}_{1}\hat{F}\hat{O}_{2},$ (9) where $\hat{O}_{1,2}=\hat{Q}^{\dagger}\hat{K}_{1,2}\hat{Q}\in SO(4)$, and $\hat{F}=\hat{Q}^{\dagger}\hat{A}\hat{Q}$ which is diagonal in this basis. The Bell states $\ket{\psi^{+}},\ket{\psi^{-}},\ket{\phi^{+}},\ket{\phi^{-}}$ are thus eigenstates of the $\hat{A}$ matrix, with respective eigenvalues $\displaystyle\lambda_{1}$ $\displaystyle=e^{i(c_{1}-c_{2}+c_{3})/2},$ (10a) $\displaystyle\lambda_{2}$ $\displaystyle=e^{i(c_{1}+c_{2}-c_{3})/2},$ (10b) $\displaystyle\lambda_{3}$ $\displaystyle=e^{i(-c_{1}+c_{2}+c_{3})/2},$ (10c) $\displaystyle\lambda_{4}$ $\displaystyle=e^{-i(c_{1}+c_{2}+c_{3})/2}.$ (10d) The eigenvalues of the matrix $\hat{M}$ are determined by the quantities $(\operatorname{Tr}\,{\hat{M}})^{2}$ and $(\operatorname{Tr}\,{\hat{M}})^{2}-\operatorname{Tr}\,\hat{M}^{2}$, which in turn serve to define the local invariants of two qubit quantum gates, namely $\displaystyle G_{1}$ $\displaystyle=\frac{1}{16}(\operatorname{Tr}\,\hat{M})^{2},$ (11a) $\displaystyle G_{2}$ $\displaystyle=\frac{1}{4}[(\operatorname{Tr}\,\hat{M})^{2}-\operatorname{Tr}\,\hat{M}^{2}]\ .$ (11b) Thus, distinct TQQGs having the same local invariants are said to be locally equivalent. Reducible TQQGs can be expressed as in eq.(6) and their action on the symmetric subspace only depends on $\hat{U}$. The local invariant of the symmetric part of the gate is determined by the eigenvalues of $\displaystyle\hat{m}$ $\displaystyle=\hat{U}^{T}_{B}\hat{U}_{B},$ (12) and is then independent of the $\lambda_{4}$ eigenvalue. Since we have considered special unitary gates, this implies $\displaystyle c_{1}+c_{2}+c_{3}=0.$ (13) Had we regarded general unitary gates, removing the extra phase factor would lead to the same condition above, thus all LECs can be located in the plane defined in (13). Figure 2: Phase plot of $\operatorname{Tr}\hat{m}$. The $\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ are the root vectors of the $\mathfrak{su}(3)$ Lie algebra. Every pair of antiparallel short arrows lies in a plane belonging to the set that generate the Weyl group. The inset shows a subcell divided into six slices, each one corresponding to a Weyl chamber. The secular equation of the matrix $\hat{m}$ is given by $\displaystyle\lambda^{3}-\operatorname{Tr}(\hat{m})\lambda^{2}-\operatorname{Tr}^{*}(\hat{m})\lambda-1$ $\displaystyle=0,$ (14) where we have used (9) and (10) to simplify the related factor $\operatorname{Tr}^{2}(\hat{m})-\operatorname{Tr}(\hat{m}^{2})$. Thus, for SQGs the eigenvalues of $\hat{m}$ are determined by its trace. The argument of $\operatorname{Tr}\hat{m}$ is plotted in Fig.2. We define the SQG local invariant as $\displaystyle G$ $\displaystyle=\frac{1}{9}\left[\operatorname{Tr}(\hat{m})\right]^{2}.$ (15) The norm of $G$ can be compactly written in terms of the $(c_{1},c_{2},c_{3})$ vector as $\displaystyle|G|$ $\displaystyle=1-\frac{4}{9}\left[\sin^{2}(c_{12})+\sin^{2}(c_{13})+\sin^{2}(c_{32})\right],$ (16) where $c_{ij}$ is a short-hand notation for $c_{i}-c_{j}$. Thus, distinct SQGs having the same value of $G$ are said to be locally equivalent. The whole extension of the $O$-plane (13) has more information than is actually needed, given the periodicity the matrix $\hat{A}$ (eq.(5)) up to local gate factors $\hat{K}$. Consider the vectors $\boldsymbol{\alpha}_{1}=(-\pi,0,\pi)$ and $\boldsymbol{\alpha}_{2}=(0,\pi,-\pi)$ lying on the $O$-plane. The $\hat{A}$ matrix is obviously periodic along these directions. Also, the angle between them is $2\pi/3$. Thus, SQGs whose geometrical point differ by a $n\boldsymbol{\alpha}_{1}+m\boldsymbol{\alpha}_{2}$ translation ($n,m\in\mathbb{Z}$) are locally equivalent, and the whole set of local equivalent classes can be found within the hexagonal primitive cell spanned by $\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$, which is displayed in Fig. 2 by the area between these vectors and the dotted lines. The vectors $\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ are the root vectors of the $\mathfrak{su}(3)$ Lie algebra, and the set $\\{\pm\boldsymbol{\alpha}_{1},\pm\boldsymbol{\alpha}_{2},\pm(\boldsymbol{\alpha}_{1}+\boldsymbol{\alpha}_{2})\\}$ (solid-arrows in Fig. 2) form the root space of the algebraHall (2015). Consider the reflection matrix $(\hat{\sigma}_{\boldsymbol{\hat{\beta}}})_{ij}=\delta_{ij}-2\beta_{i}\beta_{j}/\beta^{2}\ (i,j=x,y,z)$ on the plane normal to the unit vector $\boldsymbol{\hat{\beta}}$, which is obtained from any vector lying between two successive root vectors (dotted-line arrows). It can be checked that the effect of $\hat{\sigma}_{\boldsymbol{\hat{\beta}}}$ is to permute and complex- conjugate the eigenvalues of the $\hat{m}$ matrix. From Fig. 2 it is seen that reflection on the plane normal to the vertical $\boldsymbol{\hat{\beta}}$ vectors interchanges the triangles composing the unit cell depicted there. This means that knowledge of $\operatorname{Tr}\hat{m}$ on a subcell determines its value on the other subcell by complex conjugation, and thus all LECs can be located in just one subcell. Reflection on the planes normal to the root vectors generates the Weyl group of $\mathfrak{su}(3)$; the corresponding reflection matrices are given by $\hat{\sigma}_{\boldsymbol{\hat{\alpha}}}$, where $\boldsymbol{\hat{\alpha}}$ is a normalized root vector. The action of this group on the $\hat{A}$ matrix is permuting its eigenvalues, and thus leaves the character of $\hat{m}$ invariant. As in the general two-qubit caseZhang _et al._ (2003), the Weyl group allows to define a minimum extension containing the whole set of local equivalence classes, called the Weyl chamber Zhang _et al._ (2003); Hall (2015). By bisecting one triangle of the primitive cell by the planes normal to the root space we get the inset of Fig. 2. Every slice of the triangle contains all the local-equivalence classes of SQGs up to complex conjugation and represents a Weyl chamber. Thus, by means of the $\hat{\sigma}_{\boldsymbol{\hat{\beta}}}$ and $\hat{\sigma}_{\boldsymbol{\hat{\alpha}}}$ reflections, we have reduced to a minimum the extension needed to locate all distinct LECs. We will take advantage of this in the next section to obtain the ratio of perfect entanglers to all the possible SQGs. ## V Entangling power of symmetric two-qubit quantum gates ### V.1 Expression and properties Figure 3: Entangling power $ep$ of SQGs on the $O$-plane. The parallelogram spanned by the root vectors $\boldsymbol{\alpha_{1}},\boldsymbol{\alpha_{2}}$ corresponds to the primitive cell. The smaller section defined by $\boldsymbol{\beta_{1}},\boldsymbol{\beta_{2}}$ contains all the possible values $ep$. The entangling power of a quantum gate acting on a bipartite system is a measure of the ability for these gates to create entangled states from the set of all bipartite separable states. In the general two-qubit caseZanardi _et al._ (2000), the entangling power of a gate $\hat{V}$ (4) is defined as the average of the linear entropy of entanglement $E(\ket{\psi})=1-\operatorname{Tr}(\hat{\rho}^{2}_{1})$, over the set of all separable symmetric two-qubit states with a uniform probability, $\displaystyle ep(\hat{A})$ $\displaystyle=\overline{E(\hat{V}\ket{\psi_{1}}\otimes\ket{\psi_{2}})},$ (17) with the bar indicating such an average. Note that we have written $ep$ as a function of $\hat{A}$, since local transformations do not change the entanglement of a quantum state. The entanglement power is very informative, given that it can be compactly expressed in terms of the two-qubit $|G_{1}|$ local-invariant and can be used as an indicator to whether a quantum gate is a perfect entangler or notBalakrishnan and Sankaranarayanan (2010). Nevertheless, for SQGs acting on symmetric states only, this expression of the entangling power is not adequate since it takes into account all two-qubit separable states, not necessarily symmetric. Hence, we need to restrict the entangling power definition to symmetric states in order to obtain the correct expression. Accordingly, we define the entangling power of SQGs as $\displaystyle ep(\hat{U})$ $\displaystyle=\overline{E(\hat{U}\ket{u}\otimes\ket{u})}.$ (18) where $\ket{u}$ is a 1-qubit state, as in the section II. We are now going to derive an explicit formula for this expression. First of all, let us consider a uniform distribution of initial $\ket{u,u}$ states, for which the Majorana constellation consists of two stars in the same position. Referring to appendix A for the details in the derivation, the entangling of SQGs is $\displaystyle ep(\hat{U})$ $\displaystyle=\frac{3}{10}\left(1-|G|\right),$ (19) with $|G|$ given by expression (16). It is remarkable that the entangling power obtained can be so compactly expressed in terms of the local invariant $|G|$, which only depends on the trace of matrix $\hat{m}$ (12). This result resembles that of the entangling power for general two-qubit gatesBalakrishnan and Sankaranarayanan (2010), namely $ep=2(1-|G_{1}|)/9$. The function $ep(c_{1},c_{2},c_{3})$ (19) presents minimum and maximum magnitudes at the geometrical points $\boldsymbol{c}=(0,0,0)$ and $(-\pi/3,0,\pi/3)$, which are zero and $3/10$, respectively. As Fig. 3 suggests, these extreme values are also reached in additional points $\boldsymbol{c}$, obtained through symmetry operations which are translations along $\boldsymbol{\beta}$ vectors and $C_{6}$ rotations about the $(1,1,1)$ axis. Note also that $ep$ is invariant under translations along this same vector, which means that the same pattern as that shown in Fig. 3 is displayed in planes parallel to the $O$-plane (13). ### V.2 Perfect entanglers A TQQG $\hat{V}$ is a perfect entangler if it is capable of producing a fully entangled state from a separable one. The condition for this is that the convex hull of eigenvalues of the $\hat{M}$ matrix contains the origin in the $\boldsymbol{c}$-spaceZhang _et al._ (2003). For SQGs the same condition holds applied to the corresponding matrix $\hat{m}$. The proof of this goes along the same lines as in the general case Zhang _et al._ (2003); in order to make the paper more self-contained we sketch it in appendix B. Figure 4: Convex hull of the matrix $\hat{m}$ associated to SQGs for several entanglement capabilities. The vertices on the unitary circle are defined by the phase of the eigenvalues of $\hat{m}$. (a) Perfect entangler with a maximum value of $ep$. (b) Perfect entangler with a minimum value of $ep$. (c) Not a perfect entangler. The entangling character of the gate is geometrically determined by the location of the origin, inside (perfect) or outside (non- perfect) of the convex hull. Fig. 4 shows the convex hulls of eigenvalues for three distinct cases. The eigenvalues of unitary matrices all have unit length, and thus the circle in the figure is unitary. The vertices of the triangles are defined by the phase of $\lambda_{i}^{2}$, which are the eigenvalues of $\hat{m}$. In (a) the eigenvalues are separated by $2\pi/3$. This case corresponds to the maximum value $ep=3/10$ of the entangling power, since $\lambda^{2}_{1}+\lambda^{2}_{2}+\lambda^{2}_{3}=0$ and $|G|=0$. The case in (b) also represents a convex hull for a perfect entangling SQG, with the requirement that $\lambda^{2}_{i}=-\lambda^{2}_{j}$. This makes $|G|=1/9$ and, as a consequence,the entangling power is then $4/15$. In fact, the $SWAP_{12}$ ($SWAP_{23}$) gateDogra _et al._ (2018) have this value of $ep$, hence all SQGs with the same entangling power are locally equivalent to the $SWAP_{12}$. Since any deformation of such a convex hull such that it no longer contains the origin makes $ep$ less than $4/15$, this values is the minimum such that the corresponding SQGs are perfect entanglers. A SQG with this convex hull can be built with coefficients $(0,\pi/2,\pi/2)$. Other coefficients $(c_{1},c_{2},c_{3})$ satisfying this condition can be obtained through symmetry transformations on the geometric point just given. The case when the convex hull does not contain the origin is depicted in (c), the SQGs not being perfect entanglers ($ep<4/15$). Now that we can classify SQGs as perfect entanglers or not according the geometrical point $\boldsymbol{c}$, we are at a position to calculate the ratio of perfect entanglers to non-perfect entanglers. To do this we will calculate the area on the Weyl chamber whose geometrical points correspond to perfect entangling SQGs. Let us restrict the $(c_{1},c_{2},c_{3})$ to the Weyl chamber, as shown on Fig. 5. Comparison with Fig. 3 indicates the following association: $\boldsymbol{v}=\boldsymbol{\beta}_{1}+\boldsymbol{\beta}_{2}$, $\boldsymbol{v}_{x}=(\boldsymbol{\alpha}_{1}+\boldsymbol{\alpha}_{2})/2$ and $\boldsymbol{v}_{y}=(\boldsymbol{\alpha}_{1}-\boldsymbol{\alpha}_{2})/6$. As before, the $\boldsymbol{\alpha}_{1}$ and $\boldsymbol{\alpha}_{2}$ root vectors are taken as $\pi(-1,0,1)$ and $\pi(0,1,-1)$. Hence, the vectors on Fig. 5 are $\boldsymbol{v}=\frac{\pi}{3}(-2,1,1)$, $\boldsymbol{v}_{x}=\frac{\pi}{2}(-1,1,0)$, and $\boldsymbol{v}_{y}=\frac{\pi}{6}(-1,-1,2)$. Figure 5: Weyl chamber of local-equivalence classes. The blue area contains all the perfect entanglers, and it is one fourth of the triangle. Any geometrical point on the Weyl chamber shown in Fig. 5 can be expressed as $\boldsymbol{c}=s_{1}\boldsymbol{v}_{x}+s_{2}\boldsymbol{v}_{y}$, where $s_{1},s_{2}\in[0,1]$ and $s_{2}\leq s_{1}$. Upon multiplying the $\lambda^{2}$ eigenvalues by a total phase, its convex hull gets rotated, and does not affect whether or not it contains the origin. Thus, regarding $c_{1}+c_{2}+c_{3}=0$ and setting $\lambda^{2}_{2}=0$ (see eqs.(10)), we have $\displaystyle\phi_{1}$ $\displaystyle=\pi(s_{1}+s_{2}),$ (20) $\displaystyle\phi_{3}$ $\displaystyle=\pi(s_{2}-s_{1}),$ (21) where $\phi_{1}$ and $\phi_{3}$ are the phase angles of $\lambda^{2}_{1}$ and $\lambda^{2}_{3}$, respectively. With this, a SQG is a perfect entangler if and only if the following condition holds: $\displaystyle 0\leq\phi_{1}\leq\pi\hskip 14.22636ptAND\hskip 14.22636pt-\pi\leq\phi_{3}\leq-\pi+\phi_{1},$ (22) where all phases are equivalent modulo $2\pi$. The case $\phi_{1}>\pi$ always yields non-perfect entanglers by the imposed conditions on $s_{1}$ and $s_{2}$ (see the discussion below). Let us analyse all sections of the Weyl chamber to determine whether they are composed of perfect entanglers or not. Area 1. This area is constrained to the $(s_{1},s_{2})$ coordinates: $0\leq s_{1}<1/2$ and $0\leq s_{2}\leq s_{1}$. These inequalities imply that $s_{1}+s_{2}<1$, hence $0\leq\phi_{1}<\pi$, leaving us in the domain of (22). By substituting $\phi_{3}$ into the right side of (22) we get $s_{1}\geq 1/2$, which is a contradiction given the imposed conditions on $s_{1}$ and $s_{2}$. Thus, all geometrical points in this section of the Weyl chamber do not correspond to perfect entanglers. Areas 2 and 3. For these regions we have the following restriction on the $(s_{1},s_{2})$ coordinates: $1/2<s_{1}\leq 1$ and $1-s_{1}<s_{2}\leq s_{1}$. These imply $\phi_{1}>\pi$ and $-\pi<\phi_{3}<0$. Thus, both $\lambda^{2}_{1}$ and $\lambda^{2}_{3}$ are on the lower half of the unit circle (see Fig.4.c), none of them at $\pi$. The convex hull does not contain the origin and the geometrical points do not correspond to perfect entanglers. Blue area. In this case, the $(s_{1},s_{2})$ coordinates are constrained by the inequalities: $1/2\leq s_{1}\leq 1$ and $0\leq s_{2}\leq 1-s_{1}$. This implies $\pi\geq\phi_{1}\geq\pi/2$ and consequently we must focus on expression (22). Inserting eqs.(20) and (21) into the right inequality of (22) we obtain $-1\leq s_{2}-s_{1}\leq-1+s_{1}+s_{2}$. $-1\leq s_{2}-s_{1}$ holds trivially, while the right hand side of the last inequality implies $s_{1}\geq 1-s_{1}$, which holds since we are considering $1\geq s_{1}\geq 1/2$. Expression (22) holds in this case and all the geometrical points contained in the blue area correspond to perfect entanglers. This section occupies one fourth of the Weyl chamber. For this reason, the perfect entanglers are one fourth of the total SQGs. It is worth noting at this point that the geometric picture of LECs of SQGs does not trivially arises from that of TQQGs. For example, the Weyl Chamber of TQQGs is a tetrahedron that, without loss of generality, has one vertex on the origin $O$. One of its edges, called the $OA_{3}$ edgeZhang _et al._ (2003); Balakrishnan and Sankaranarayanan (2009), along geometrical points of the form $(c,c,c)$, contains a point $P$ which represents a perfect entangler. Nevertheless, for SQGs, the convex hull on any geometrical point of the form $(c,c,c)$ does not contain the origin, as can be seen from inspection of eqs.(10) and, as a result, the entangling power is zero along the $OA_{3}$ edge. This fundamental difference between the geometry of LECs of SQGs and TQQGs proves that the former is not just a trivial special case of the latter. ## VI Examples In this section we will apply the theory developed so far to three distinct physical models with three-dimensional Hilbert spaces. We calculate the entangling power as a function of an independent parameter for the three models and find conditions on them to obtain perfect entanglers. The linear entropy on the Majorana sphere is computed, where each point on it corresponds to a state with degenerate Majorana constellation and the color indicates the value of the entanglement measure of the final state. We comment on some features of the spacial distribution of entanglement on the Majorana sphere. ### VI.1 Anisotropic Heisenberg model with no cross-terms The anisotropic Heisenberg model of two interacting spins is represented by the HamiltonianAbliz _et al._ (2006) $\displaystyle\hat{H}_{H}$ $\displaystyle=-\frac{1}{2}\left(I_{x}\hat{\sigma}^{(1)}_{x}\hat{\sigma}^{(2)}_{x}+I_{y}\hat{\sigma}^{(1)}_{y}\hat{\sigma}^{(2)}_{y}+I_{z}\hat{\sigma}^{(1)}_{z}\hat{\sigma}^{(2)}_{z}\right),$ (23) where $I_{i}$ are the spin coupling constants. This Hamiltonian is composed of the Cartan subalgebra elements of $\mathfrak{su}(4)$, and hence has a reducible representation into symmetric and anti-symmetric subspaces. The symmetric part of the time evolution operator is, in the Bell basis, $\displaystyle\hat{U}_{H}$ $\displaystyle=\left(\begin{matrix}e^{i(I_{x}-I_{y}+I_{z})t/2}&0&0\\\ 0&e^{i(I_{x}+I_{y}-I_{z})t/2}&0\\\ 0&0&e^{i(-I_{x}+I_{y}+I_{z})t/2}\end{matrix}\right).$ (24) From eq.(23), the $\boldsymbol{c}$ coordinate vector is $(I_{x},I_{y},I_{z})$. The entangling power becomes $\displaystyle ep$ $\displaystyle=\frac{2}{15}\left[\sin^{2}(I_{xy}t)+\sin^{2}(I_{yz}t)+\sin^{2}(I_{xz}t)\right],$ (25) where $I_{ij}=I_{i}-I_{j}$. Note that for equal spin coupling constants the entangling power is zero, which means that the isotropic Heisenberg model does not have any entangling power on the symmetric two-qubit subspace. Fig. 6(a) shows the entangling power as a function of $\omega t$ for the choice of parameters $I_{y}=0,I_{x}=-I_{z}=\omega$ (left panel). The maximum values are located at $\omega t=\pi/3,2\pi/3$, as one would expect, while the minimum $ep$ for which the quantum gate is a perfect entangler is located at $\omega t=\pi/2$. The sphere on the right shows the linear entropy on the Majorana sphere; we have chosen $\omega t=\pi/3$ in order to obtain maximum entanglement. There are zones on which the quantum gate does not produce entanglement (red spots), and zones where the initial states become symmetric Bell states (blue spots). Even though it is not fully depicted here, there are exactly four low- entanglement zones and four high-entanglement zones, which form a tetrahedron on the sphere. As far as we have numerically checked, this tetrahedron distribution of entanglement on the Majorana sphere is a general feature of SQGs with maximum entangling power. Figure 6: Left: entangling power for (a) the anisotropic Heisenberg model, (b) the Lipkin-Meshkov-Glick model and (c) the cross-Kerr interaction. The horizontal-dashed line indicates the lower bound for perfect entanglers ($ep=4/15$). Right: Linear entropy of the final states obtained by applying $\hat{U}$ to the initial states with degenerate Majorana stars. ### VI.2 Lipkin-Meshkov-Glick model The Lipkin-Meshkov-Glick model was firstly proposed to study the many body problem in nuclear physicsLipkin _et al._ (1965), and has also been useful to model the physics of molecular solidsGarg (1993); Campos and Hirsch (2011) and critical phenomena in Bose-Einstein condensatesRibeiro _et al._ (2007). The Hamiltonian describing the interaction is given by $\displaystyle\hat{H}_{L}$ $\displaystyle=B\hat{J}_{z}+g_{1}\hat{J}^{2}_{z}-g_{2}\hat{J}^{2}_{x}.$ (26) This Hamiltonian commutes with the total angular momentum operator $\boldsymbol{J}^{2}$, which allows us to fix the $j$ value to unity, for which the model belongs to the $\mathfrak{su}(3)$ Lie algebra. This model can be written in matrix form as $\displaystyle\hat{H}_{L}$ $\displaystyle=\left(\begin{matrix}B+g_{1}-g_{2}/2&0&-g_{2}/2\\\ 0&-g_{2}&0\\\ -g_{2}/2&0&-B+g_{1}-g_{2}/2\end{matrix}\right).$ (27) The eigenvalues oh $\hat{H}_{L}$ are: $\lambda_{0}=-g_{2}$ and $\lambda_{\pm}=g_{1}-g_{2}/2\pm\sqrt{B^{2}+g^{2}_{2}/4}$. The corresponding quantum gates of this system are given by $\exp{(-i\hat{H}_{L}t)}$. This model is a three-level system, and as such can be mapped to the symmetric two-qubit space. The isomorphism is given by mapping the angular momentum kets $\ket{1,1},\ket{1,0}$ and $\ket{1,-1}$ to the symmetric states $\ket{0,0},\frac{1}{\sqrt{2}}(\ket{0,1}+\ket{1,0}),\ket{11}$, respectively. With this, the transformation matrix from the spin-$1$ angular momentum basis to the symmetric Bell-basis is given by $\displaystyle\hat{T}$ $\displaystyle=\left(\begin{matrix}1&0&1\\\ 0&\frac{i}{\sqrt{2}}&0\\\ i&0&-i\end{matrix}\right).$ (28) The definition of the Bell states should be evident from the matrix above. With this, the absolute square of the local invariant G, is given by $\displaystyle|G_{L}|$ $\displaystyle=\frac{1}{9}[1+4G_{1}\cos(2(g_{1}+g_{2}/2)t)+4G^{2}_{1}]\ .$ (29) where $\displaystyle G_{1}$ $\displaystyle=1-\frac{g^{2}_{2}\sin^{2}(Rt)}{2R},$ $\displaystyle R$ $\displaystyle=\sqrt{B^{2}+g^{2}_{2}/4}.$ The entangling power is readily obtained through eq.(19). Fig. 6(b) shows the entangling power for the choice of parameters $-2B/7=g_{1}/2=g_{2}/4=\omega$, where $\omega$ is a fixed frequency. The entangling power displays an oscillating behaviour where the maximum $ep$ is reached at values of $\omega t$ closed to $\frac{\pi}{4}(n+1/2)$ for some integer $n\geq 0$. On the right panel the linear entropy on the Majorana sphere for $\omega t=\pi/8$ is plotted. The colors on the sphere follow the tetrahedron-like patterns, as we have numerically checked for SQGs with maximum entangling power. ### VI.3 Cross-Kerr Interaction The non-linear cross-Kerr effect in quantum optics is model by the HamiltonianBhattacharya and Shi (2013) $\displaystyle\hat{H}_{CK}$ $\displaystyle=\omega_{a}\hat{a}^{\dagger}\hat{a}+\omega_{b}\hat{b}^{\dagger}\hat{b}+\omega_{CK}\hat{a}^{\dagger}\hat{a}\hat{b}^{\dagger}\hat{b}.$ (30) This Hamiltonian conserves the total number of excitations $\hat{N}=(\hat{a}^{\dagger}\hat{a}+\hat{b}^{\dagger}\hat{b})$. By transforming the Hamiltonian via the Schwinger operators of angular momentumSakurai and Napolitano (1994), it is easily seen that $\hat{N}/2$ equals the total angular momentum $j$ of the resulting Hamiltonian. Let us work in the $j=1$ representation. The cross-Kerr Hamiltonian becomes $\displaystyle\hat{H}_{CK}$ $\displaystyle=(\omega_{a}-\omega_{b})\hat{J}_{z}-g_{CK}\hat{J}^{2}_{z},$ The cross-Kerr interaction can be modeled as a Lipkin-Meshkov-Glick model after the identification $B=\omega_{a}-\omega_{b},g_{1}=-g_{CK},g_{2}=0$. The entangling power is then easily obtained from eqs. (29) and (19) and the transformation matrix (28), $\displaystyle ep_{CK}$ $\displaystyle=\frac{4}{15}\sin^{2}(g_{CK}t).$ Fig. 6(c) shows the entangling power for a choice of parameters $B=g_{1}/2=\omega$. The entangling power has an oscillating behaviour that never reaches the maximum possible value. The eigenvalues of the $\hat{m}$ matrix are $e^{-ig_{CK}t},e^{-ig_{CK}t},1$. There is a pair of degenerate eigenvalues, and thus the convex hull contains the origin only when the vertices are on antipodal positions on the unit circle, which gives the minimum $ep$ for which $\hat{U}_{CK}$ is a perfect entangler. The linear entropy on the Majorana sphere is depicted on the right, which is very different from the spheres on panels (a) and (b). The antipodal high entangling spots on the sphere with a low entangling zone between them is a general feature of quantum gates with $ep=4/15$, as we have seen from distinct numerical calculations, without regards on the details of the Hamiltonian. ## VII Conclusions We have given a geometric classification of the LECs of SQGs, which turns out to be a plane with hexagonal symmetry. There we have identified the Weyl chamber, which is the minimum area that contains all distinct LECs. This geometric description contrasts with the general two-qubit case, for which the geometry is three-dimensional. The entangling power for SQGs is obtained in terms of the local-invariant. As was done in the general two-qubit case in reference Zhang _et al._ (2003), we give conditions for which a SQG is a perfect entangler, and have found that the perfect entanglers are 1/4 of all possible SQGs. Along this line, it is also found that perfect entanglers must have $ep\geq 4/15$. It is stressed that LECs of SQGs do not arise trivially from those of TQQGs, since there exist geometrical points corresponding to perfect entanglers in the latter case (TQQGs) that yield gates with zero $ep$ in the former (SQGs). The theoretic framework just developed can be applied to any three-level system, despite whether being bi-partite or not. The entangling power then refers to the capability of quantum gates to perform transformations that do not act as $SO(3)$ rotations on the Majorana constellation as, for example, some phase gates, $SWAP_{12}$ and $SWAP_{23}$ gatesDogra _et al._ (2018). Finally, the theory just developed was applied to three physical models, namely, the anisotropic Heisenberg ModelAbliz _et al._ (2006), the Lipkin-Meshkov-Glick modelLipkin _et al._ (1965) and two coupled quantized oscillators with cross-Kerr interactionBhattacharya and Shi (2013) and found some conditions on the Hamiltonian parameters to generate perfect entangling SQGs. Additional examples might include solid-state systems, or optical analogues, like assemblies of three quantum dots with few electrons used to study coherent control of quantum statesBrandes (2005), Landau-Zener- Stückelberg interferometryGallego-Marcos _et al._ (2016) or quantum transport Maldonado _et al._ (2018), among other properties. ## VIII Acknowledgements D.M.G. acknowledges financial support from CONACyT (México). ## Appendix A Derivation of the entangling power for SQGs To derive an explicit expression for the entangling power of SQGs we first compute $\operatorname{Tr}[\hat{\rho}^{2}_{1}]$ and then integrate it over the unit sphere. The pure state density matrix obtained after applying a SQG $\hat{U}$ to a symmetric two-qubit separable state $\ket{u,u}$ is given by $\hat{U}\ket{u,u}\bra{u,u}\hat{U}^{\dagger}$. Since we are interested in this quantity in order to calculate the entropy of entanglement, the local contributions to the quantum gate $\hat{U}$ can be omitted, hence $\displaystyle\hat{\rho}$ $\displaystyle=\hat{A}\ket{u,u}\bra{u,u}\hat{A}^{\dagger}.$ Now, by expressing $\ket{u,u}$ in the Bell basis through the matrix $\hat{Q}^{\dagger}$ (8), we find $\displaystyle\hat{Q}^{\dagger}$ $\displaystyle\ket{u,u}=\frac{1}{\sqrt{2}}\left(\begin{matrix}a&ib&-ic&0\end{matrix}\right)^{T},$ where $a=\cos\phi-i\sin\phi\cos\theta$, $b=i\sin\theta$ and $c=-i\sin\phi+\cos\phi\cos\theta$. By transforming the $\hat{A}$ matrix to the Bell basis too, and after some manipulations we get the density matrix $\displaystyle\hat{\rho}$ $\displaystyle=\frac{1}{4}\left(\begin{matrix}|A|^{2}&AB^{*}&AB^{*}&AC^{*}\\\ A^{*}B&|B|^{2}&|B|^{2}&BC^{*}\\\ A^{*}B&|B|^{2}&|B|^{2}&BC^{*}\\\ A^{*}C&BC^{*}&BC^{*}&|C|^{2}\\\ \end{matrix}\right),$ where the complex coefficients in the matrix elements are $A=\lambda_{1}a-i\lambda_{3}c$, $B=\lambda_{2}b$ and $C=\lambda_{1}a+i\lambda_{3}c$, with the $\lambda_{i}$ factors given in eqs. (10). After reducing this matrix on one of the subsystem, we obtain $\displaystyle\operatorname{Tr}\hat{\rho}^{2}_{1}$ $\displaystyle=\frac{1}{16}\left[(|A|^{2}+|B|^{2})^{2}+(|B|^{2}+|C|^{2})^{2}\right.$ $\displaystyle\hskip 99.58464pt\left.+2|AB^{*}+BC^{*}|^{2}\right].$ What remains is to average this expression over all the possible symmetric separate states (degenerate Majorana constellations), where each state is equally likely to be obtained, $\displaystyle\overline{\operatorname{Tr}\hat{\rho}^{2}_{1}}=\frac{1}{4\pi}\int_{\mathcal{A}}\left[\operatorname{Tr}\hat{\rho}^{2}_{1}\right]\sin\theta\,d\theta d\phi,$ with integration performed over the surface $\mathcal{A}$ of the unit sphere. After a long but straightforward algebra, we obtain from (18) $\displaystyle ep$ $\displaystyle=\frac{2}{15}[\sin^{2}(c_{12})+\sin^{2}(c_{23})+\sin^{2}(c_{31})],$ which can be recast in the form (19) by using the local invariant expression (16). ## Appendix B Condition for a perfect entangler In order to determine the values of $ep$ for which a SQG is a perfect entangler, we need first a theorem based on the eigenvalues of the matrix $\hat{m}$. The proof runs very similar as that given in Reference Zhang _et al._ , 2003 for the general two-qubit case, with the appropriate changes to focus on the symmetric case. First, we recall the definition of a convex hull. ###### Definition 1 (Convex hull) The convex hull of $n+1$ points $\boldsymbol{p}_{0},\boldsymbol{p}_{1},...,\boldsymbol{p}_{n}\in\mathbb{R}^{n}$ is given by the set of all vectors of the form $\sum\limits^{n}_{i=0}\theta_{i}\boldsymbol{p}_{i}$, where $\theta_{i}$ are non-negative real numbers satisfying $\sum\limits^{n}_{i=0}\theta_{i}=1$. Now, we state and prove the following theorem. ###### Theorem 1 (Perfect entanglers) A symmetric two-qubit gate $\hat{U}$ is a perfect entangler if and only if the convex hull of eigenvalues of $\hat{m}$ contains zero. Proof: As explained in section III, a general symmetric two-qubit gate can be decomposed as $\hat{U}=\hat{K}^{(s)}_{1}\hat{A}^{(s)}\hat{K}^{(s)}_{2}$, where $\hat{K}^{(s)}\in SU(2)$ in the spin-$1$ representation. Given a symmetric separable two-qubit state $\ket{\psi_{o}}=(a\ b\ b\ c)^{T}$, it is obtained for the concurrenceAudrescht (2007) of the state $\hat{U}\ket{\psi_{o}}$ that $C(\hat{U}\ket{\psi_{o}})=C(\hat{A}\ket{\psi_{o}})$, and thus, for $\hat{U}$ to be a perfect entangler, $\hat{A}$ has to be a perfect entangler; we have also used $\hat{A}\ket{\psi_{o}}=\hat{A}^{(s)}\ket{\psi_{o}}$, since $\ket{\psi_{o}}$ is symmetric. Explicitly, $C(\hat{A}\ket{\psi_{o}})=\overline{\bra{\psi_{o}}}\hat{A}^{T}\hat{P}\hat{A}\ket{\psi_{o}}$, where $\hat{P}=-\hat{\sigma}_{y}\otimes\hat{\sigma}_{y}$. This expression can be rewritten in terms of Bell states as $C(\hat{A}\ket{\psi_{o}})=\overline{\bra{\psi_{o}}\hat{Q}})\hat{F}^{2}(\hat{Q}^{\dagger}\ket{\psi_{o}}$, where we have used the matrix $\hat{Q}$ (8) and the result $\hat{Q}^{T}\hat{P}\hat{Q}=\mathds{1}$; the operator $\hat{F}$ is $\hat{Q}^{\dagger}\hat{A}\hat{Q}$. Let $\hat{Q}^{\dagger}\ket{\psi_{o}}=\ket{\phi}$. Since $\ket{\psi_{o}}$ is a non- entangled state, we have $C(\ket{\psi_{o}})=\overline{\bra{\psi_{o}}}\hat{P}\ket{\psi_{o}}=\overline{\bra{\phi}}\hat{Q}^{T}\hat{P}\hat{Q}\ket{\phi}=\overline{\bra{\phi}}\mathds{1}\ket{\phi}=0$, which implies $\displaystyle\phi^{2}_{1}+\phi^{2}_{2}+\phi^{2}_{3}=0,$ (31) where only three expansion coefficients appear, since $\ket{\psi_{o}}$ is a symmetric state, and thus has no projection on the antisymmetric axis. For $\hat{A}$ to be a perfect entangler, the concurrence of $\hat{A}\ket{\psi_{o}}$ must equal unity, which along with the normalization condition yields $|\phi_{1}^{2}\lambda^{2}_{1}+\phi_{2}^{2}\lambda^{2}_{2}+\phi_{3}^{2}\lambda^{2}_{3}|=|\phi^{2}_{1}\lambda^{2}_{1}|+|\phi^{2}_{2}\lambda^{2}_{2}|+|\phi^{2}_{3}\lambda^{2}_{3}|$, where the eigenvalues $\lambda_{i}$ are given in eq.(10). This equation holds if and only if there exists a number $\theta\in[0,2\pi)$, such that $\phi_{j}^{2}\lambda^{2}_{j}=|\phi_{j}|^{2}e^{i2\theta},\,j=1,2,3,4$. With the abovementioned and eq.(31), we get $\displaystyle\phi^{2}_{1}+\phi^{2}_{2}+\phi^{2}_{3}$ $\displaystyle=e^{i2\theta}\left(\frac{|\phi_{1}|^{2}}{\lambda^{2}_{1}}+\frac{|\phi_{2}|^{2}}{\lambda^{2}_{2}}+\frac{|\phi_{3}|^{2}}{\lambda^{2}_{3}}\right),$ $\displaystyle=e^{i2\theta}\left(|\phi_{1}|^{2}\overline{\lambda^{2}_{1}}+|\phi_{2}|^{2}\overline{\lambda^{2}_{2}}+|\phi_{3}|^{2}\overline{\lambda^{2}_{3}}\right),$ $\displaystyle=0.$ By complex conjugation of the last equality, it follows that the convex hull of the eigenvalues of $m(\hat{U})$ contains the origin. The converse statement can be done following Reference Zhang _et al._ , 2003. ## References * Audrescht (2007) J. Audrescht, “Entanglement,” in _Entangled Systems_ (John Wiley & Sons, Ltd, 2007) Chap. 8, pp. 143–168. * Horodecki _et al._ (2009) R. Horodecki, P. Horodecki, M. Horodecki, and K. Horodecki, Rev. Mod. Phys. 81, 865 (2009). * Muthukrishnan and Stroud (2000) A. Muthukrishnan and C. R. Stroud, Phys. Rev. A 62, 052309 (2000). * Jerger _et al._ (2016) M. Jerger, Y. Reshitnyk, M. Oppliger, A. Potočnik, M. Mondal, A. Wallraff, K. Goodenough, S. Wehner, K. Juliusson, N. K. Langford, and A. Fedorov, Nat. Commun. 7, 12930 (2016). * Dogra _et al._ (2018) S. Dogra, K. Dorai, and Arvind, Journal of Physics B: Atomic, Molecular and Optical Physics 51, 045505 (2018). * Randall _et al._ (2018) J. Randall, A. M. Lawrence, S. C. Webster, S. Weidt, N. V. Vitanov, and W. K. Hensinger, Phys. Rev. A 98, 043414 (2018). * Majorana (1932) E. Majorana, Nuovo Cim 9, 43 (1932). * Devi _et al._ (2012) A. R. U. Devi, Sudha, and A. K. Rajagopal, Quantum Information Processing 11, 685 (2012). * Liu and Fu (2016) H. D. Liu and L. B. Fu, Phys. Rev. A 94, 022123 (2016). * Zanardi _et al._ (2000) P. Zanardi, C. Zalka, and L. Faoro, Phys. Rev. A 62, 030301 (2000). * Balakrishnan and Sankaranarayanan (2010) S. Balakrishnan and R. Sankaranarayanan, Phys. Rev. A 82, 034301 (2010). * Rezakhani (2004) A. T. Rezakhani, Phys. Rev. A 70, 052313 (2004). * Zhang _et al._ (2003) J. Zhang, J. Vala, S. Sastry, and K. B. Whaley, Phys. Rev. A 67, 042313 (2003). * Abliz _et al._ (2006) A. Abliz, H. J. Gao, X. C. Xie, Y. S. Wu, and W. M. Liu, Phys. Rev. A 74, 052105 (2006). * Lipkin _et al._ (1965) H. Lipkin, N. Meshkov, and A. Glick, Nuclear Physics 62, 188 (1965). * Bhattacharya and Shi (2013) M. Bhattacharya and H. Shi, Am. J. Phys. 81, 267 (2013). * Liu and Fu (2014) H. D. Liu and L. B. Fu, Phys. Rev. Lett. 113, 240403 (2014). * Knapp (1996) A. W. Knapp, _Lie Groups Beyond an Introduction_ (Birkhäuser, 1996). * N. Jeevanjee (2015) N. Jeevanjee, _An Introduction to Tensors and Group Theory for Physicists._ , 2nd ed. (Birkhäuser, 2015). * Makhlin (2002) Y. Makhlin, Quantum Information Processing 1, 243 (2002). * Hall (2015) B. Hall, _Lie Groups, Lie Algebras and Representations: An Elementary Introduction_ (Springer International Publishing, 2015). * Balakrishnan and Sankaranarayanan (2009) S. Balakrishnan and R. Sankaranarayanan, Phys. Rev. A 79, 052339 (2009). * Garg (1993) A. Garg, Europhysics Letters (EPL) 22, 205 (1993). * Campos and Hirsch (2011) J. Campos and J. Hirsch, Rev. Mex. Fis. 57, 56 (2011). * Ribeiro _et al._ (2007) P. Ribeiro, J. Vidal, and R. Mosseri, Phys. Rev. Lett. 99, 050402 (2007). * Sakurai and Napolitano (1994) J. Sakurai and J. Napolitano, _Modern Quantum Mechanics_ (Addison-Wesley Publishing Company, 1994). * Brandes (2005) T. Brandes, Physics Reports 408, 315 (2005). * Gallego-Marcos _et al._ (2016) F. Gallego-Marcos, R. Sánchez, and G. Platero, Phys. Rev. B 93, 075424 (2016). * Maldonado _et al._ (2018) I. Maldonado, J. Villavicencio, L. D. Contreras-Pulido, E. Cota, and J. A. Maytorena, Phys. Rev. B 97, 195310 (2018).
arxiv-papers
2021-07-27T08:06:32
2024-09-04T03:07:20.861759
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "D. Morachis and Jes\\'us A. Maytorena", "submitter": "Diego Morachis Galindo", "url": "https://arxiv.org/abs/2107.12653" }
2107.12657
# Continual Learning with Neuron Activation Importance Sohee Kim Seungkyu Lee Kyunghee University, Department of Computer Engineering, Yongin, Republic of Korea [email protected] [email protected] ###### Abstract Continual learning is a concept of online learning with multiple sequential tasks. One of the critical barriers of continual learning is that a network should learn a new task keeping the knowledge of old tasks without access to any data of the old tasks. In this paper, we propose a neuron activation importance-based regularization method for stable continual learning regardless of the order of tasks. We conduct comprehensive experiments on existing benchmark data sets to evaluate not just the stability and plasticity of our method with improved classification accuracy also the robustness of the performance along the changes of task order. ## 1 Introduction Continual learning is a sequential learning scheme on multiple different tasks. New tasks do not necessarily consist of only existing classes of previous tasks nor statistically similar instances of existing classes. In challenging situations, new tasks may consist of mutually disjoint classes or existing classes with unseen types of instances in previous tasks. One of the main challenges is learning such new tasks without catastrophic forgetting existing knowledge of previous tasks. Researchers have proposed diverse continual learning approaches to achieve both stability (remembering past tasks) and plasticity (adapting to new tasks) of their deep neural networks from sequential tasks of irregular composition of classes and varying characteristics of training instances. Since the training of a neural network is influenced more by recently and frequently observed data, the neural network forgets what it has learned in prior tasks without continuing access to them in the following tasks. A rigorous approach that maintains the knowledge of entire tasks may solve the problem while sacrificing computational cost, however, it is impractical with an undefined number of tasks in real applications of continual learning. Continual learning model has to adapt to a new task without access to some or entire classes of past tasks while it maintains acquired knowledge from the past tasks [19]. In addition, the continual learning model has to be evaluated with arbitrary order of tasks since the order of tasks is not able to be fixed nor predicted in real applications. The continual learning model is required to function consistently regardless of the order of tasks. Figure 1: Three different (Importance-Measurement) ways (a) WI-WM: Weight Importance ($\Omega_{1}\sim\Omega_{l}$) by respective Weight Measurement (b) NI-WM: Neuron Importance ($\Omega_{k}$) by Weight Measurements. The maximum value of weight importance out of ($\Omega_{1}\sim\Omega_{l}$) is assigned to neuron importance ($\Omega_{k}$). And then all weights connected to the neuron get the same importance of the neuron. (c) NI-NM: Neuron Importance ($\Omega_{k}$) by Neuron Measurement, where $l$ and $\Omega$ indicate weight index and importance of either weight or neuron respectively. The proposed method belongs to (c) NI-NM. (a) Task order: 1 $\rightarrow$ 2 $\rightarrow$ 3 $\rightarrow$ 4 $\rightarrow$ 5 (b) Task order: 2 $\rightarrow$ 4 $\rightarrow$ 3 $\rightarrow$ 5 $\rightarrow$ 1 Figure 2: Classification accuracy of continual learning on Split Cifar10. SI [22], MAS [2] and UCL [1] show critical changes in their performance as the order of tasks changes. | Absolute Task Order ---|--- Method | T1 | T2 | T3 | T4 | T5 SI [22] | 11.9 | 5.9 | 2.4 | 1.5 | 9.48 MAS [2] | 11.4 | 5.2 | 7.0 | 3.3 | 4.5 UCL [1] | 10.2 | 3.1 | 2.0 | 5.0 | 4.7 OURS | 11.4 | 1.5 | 0.5 | 1.7 | 1.6 Table 1: Performance disparity(%) between Figure 2(a) and 2(b) on Split CIFAR 10. ”Absolute task order” represents the sequence of tasks that a model learns. (Additional explanation is discussed in Section 3.) There are three major categories in prior continual learning approaches; 1) architecture modification of neural networks [21, 18, 17], 2) rehearsal using sampled data from previous tasks [16, 3], and 3) regularization freezing significant weights of a model calculating the importance of weights or neurons [14, 10, 22, 15, 2, 4, 23, 1, 7, 8]. Most recent methods have tackled the problem with fundamental regularization approaches that utilize the weights of given networks to the fullest. The basic idea of regularization approaches is to constrain essential weights of prior tasks not to change. In general, they alleviate catastrophic interference with a new task by imposing a penalty on the difference of weights between the prior tasks and the new task. The extent of the penalty is controlled by the significance of weights or neurons in solving a certain task using respective measurements. As Figure 1 illustrates, weight importance can be decided by three different (Importance-Measurement) ways. WI-WM (Weight Importance by Weight Measurement) [10, 22, 2, 15, 23] calculates weight importance based on the measurement of the corresponding weight as described in Figure 1a. Elastic weight consolidation (EWC) [10] estimates parameter importance using the diagonal of the Fisher information matrix equivalent to the second derivative of the loss. Synaptic intelligence (SI) [22] measures the importance of weights in an online manner by calculating each parameter’s sensitivity to the loss change while it trains a network. When a certain parameter changes slightly during training batches but its contribution to the loss is high (i.e., rapid change of its gradient), the parameter is considered to be crucial and restricted not to be updated in future tasks. Unlike SI [22], Memory aware synapses (MAS) [2] assesses the contribution of each weight to the change of a learned function. It considers the gradient of outputs of a model with a mean square error loss. Gradient itself represents a change of outputs concerning the weights. Variational Continual Learning (VCL) [15], a Bayesian neural network-based method, decides weight importance through variational inference. Bayesian Gradient Descent (BGD) [23] finds posterior parameters (e.g., mean and variance) assuming that the posterior and the prior distributions are Gaussian. To mitigate the interference across multiple tasks in continual learning, weight importance-based approaches let each weight have its weight importance. However, in the case of convolutional neural networks, since a convolutional filter makes one feature map that can be regarded as one neuron, those weights should have the same importance. Furthermore, those methods that consider the amount of change of weights [10, 22, 2] are impossible to reinitialize weights at each training of a new task, which possibly decreases the plasticity of the network. (Additional explanation of weight re-initialization is discussed in section 3.) NI-WM (Neuron Importance by Weight Measurement) calculates neuron importance based on the measurement of all weights. Weight importance is redefined as the importance of its connected neuron [1]. Uncertainty-regularized Continual Learning (UCL) [1] measures weight importance by its uncertainty indicating the variance of weight distribution. It claims that the distribution of essential weights for past tasks has low variance, and such stable weights during training a task are regarded as important weights not to forget. As illustrated in Figure 1b, it suggests neuron-based importance in neural networks. The smallest variance value (maximum importance) among the weights incoming to and outgoing from a corresponding neuron decides the importance of the neuron, and then the importance of all those weights is updated as the neuron importance. Figure 3: Normalized Weight importance distribution of each convolution layer. To show the proportion of the average value of weight importance among layers, we normalize the values to sum 1. This is based on the first task of Split CIFAR 10 (task order: 3-1-2-4-5). NI-NM (Neuron Importance by Neuron Measurement) calculates neuron importance based on the measurement of the corresponding neuron [8]. Weight importance is defined as the importance of its connected neuron. [8] exploits proximal gradient descents using a neuron importance. Its neuron importance depends on the average activation value. Activation value itself is a measurement of neuron importance, and weights connected to the neuron get identical weight importance. One critical observation in prior experimental evaluations of existing continual learning methods is that the accuracy of each task significantly changes when the order of tasks is changed. As discussed in [20], proposing a continual learning method robust to the order of tasks is another critical aspect. Therefore, performance evaluation with fixed task order does not coincide with the fundamental aim of continual learning where no dedicated order of tasks is given in reality. Figure 2 shows sample test results of state-of-the-art continual learning methods compared to our proposed method. As summarized in Table 1, classification accuracy values of prior methods fluctuate as the order of tasks changes(from Figure 2(a) to Figure 2(b)). In this work, we propose a regularization approach for continual learning assigning neuron importance by the measurement of average neuron activation. As Figure 3 describes, we balance neuron importance distribution among layers based on the average neuron activation divided by standard deviation, which is critical to performance consistency along the changes of task order. We assign calculated neuron importance to all weights of incoming edges connected to the neuron. A Neuron with high activation to the majority of instances is defined as an essential neuron. We freeze essential neurons by freezing the weights of all connected incoming edges (essential weights) during the learning of a new task so that our model remembers past tasks. We propose to evaluate the robustness to the order of tasks in a comprehensive manner in which we evaluate the average and standard deviation of classification accuracy with multiple sets of randomly shuffled tasks. Our approach remembers past tasks robustly compared to recent regularization methods [22, 15, 2, 1]. To measure performance fluctuation along the change of task order, we evaluate our method with numerous shuffled orders. We quantitatively evaluate our classification performance based on a measure of interference from past tasks on MNIST [13, 6], CIFAR10, CIFAR100 [12] and Tiny ImageNet [5] data sets. Key contributions of our work include 1) a simple but intuitive and effective continual learning method introducing activation based neuron importance, 2) a comprehensive experimental evaluation framework on existing benchmark data sets to evaluate not just the final accuracy of continual learning also the robustness of the accuracy along the changes of the order of tasks. Based on the evaluation framework, existing state-of-the-art methods and the proposed method are evaluated. ## 2 Proposed Method ### 2.1 Neuron Importance by Average Neuron Activation The proposed method extracts neuron importance based on the average activation value of all instances. And then the neuron importance is assigned to all weights of incoming edges connected to the neuron. In convolutional neural networks, activation value of a neuron corresponds to the average value of one feature map (i.e., global average pooling value). The average activation value of neuron corresponds to the average of global average pooling value. The average activation values at each layer are independently calculated but are considered together. In other words, the individual average activation values represent the importance of each neuron of a whole model. However, encoded features at each layer describe different aspects of an input image and, as a result, the average activation values at each layer should not be evaluated together. Therefore, the average activation value is not able to fully represent the characteristics of the essential neuron. Besides, in convolution neural networks, the absolute magnitude of average activation value (i.e., the average of global average pooling value) varies along the location of layer: in high-level feature maps, the portion of activated area decreases. Due to the difference in absolute average activation values across the layers, weights of earlier layers tend to be considered more essential as Figure 4 shows. If the average activation value is used as neuron importance, networks will prefer to keep the weights of earlier layers. Figure 4: Normalized Weight importance distribution of each convolution layer. To show the proportion of the average value of weight importance among layers, we normalize the values to sum 1. Our method relaxes the tendency to excessively consolidate weights of earlier layers. This is based on the first task of Split CIFAR 10 (task order: 3-1-2-4-5). Instead, we propose to use layer-wise average activation divided by the respective standard deviation for neuron importance measurement. Compared to the average activation-based neuron importance [8], ours prevents earlier layers from getting excessive importance compared to other layers, which, in turn, prevents a network from vulnerable to changing the order of tasks in terms of forgetting past tasks. Figure 4 shows normalized average weight importance of each layer(total 6 layers). Prior average activation based regularization term assigns around 57% of total importance to layer 1(57%, 12%, 10%, 6%, 8%, 8%, respectively for the 6 layers). On the other hand, our proposed regularization loss term assigns 26% of total importance to layer 1. Furthermore, our method avoids assigning excessive importance to certain layer(26%, 16%, 16%, 15%, 15%, 12%). Then, why this improves the continual learning performance regardless of task order? In prior works, more weights of lower layers tend to be frozen in earlier tasks that eliminate the chance of upcoming tasks to build new low- level feature sets. Only a new task that is fortunately able to rebuild higher-layer features based on the frozen lower layer weights from previous tasks could survive. On the other hand, ours keeps the balance of frozen weights in all layers securing more freedom of feature descriptions for new tasks in both lower and higher layers. Indeed, lower layer features such as edges are not class (task) dependent features. Therefore, excessively freezing lower layer features is not preferable in continual learning. Even though tasks change, a new task may find alternative low-level features that have high similarity with them of past tasks, as discussed in [11]. In order to encode such relation, we propose to use the average and standard deviation of neuron activation values at each layer. Our loss function is described as follows. $\displaystyle L_{t}=\tilde{L_{t}}+\alpha\sum\limits_{l}\Omega_{k}^{t}(w_{l}^{t-1}-w_{l}^{t})^{2},$ (1) where $\tilde{L_{t}}$ is loss of current task (e.g., cross entropy loss), $t$ is task index, $l$ is weight index, and $\Omega_{k}^{t}$ indicates $k^{th}$ neuron importance. $\alpha$ is a strength parameter to control the amount of weights consolidation. Neuron importance is defined as follows. $\begin{gathered}\Omega^{t}_{k}=\frac{\frac{1}{N_{t}}\sum\limits_{{i=1}}^{N_{t}}{f_{k}(x^{(t)}_{i})}}{\sigma+\epsilon},\\\ \sigma=\sqrt{\frac{\sum\limits_{{i=1}}^{N_{t}}{\\{{f_{k}(x^{(t)}_{i})-\frac{1}{N_{t}}\sum\limits_{{i=1}}^{N_{t}}{f_{k}(x^{(t)}_{i})}}\\}^{2}}}{N_{t}}},\end{gathered}$ (2) where $N_{t}$ is the number of instances, $x$ is input, $k$ is neuron index, $f_{k}(\cdot)$ is activation value (global average value, in the case of convolution neural network), and $i$ is instance index. We introduce $\epsilon$ to prevent the numerator from being zero when the standard deviation becomes zero. Proposed method considers the variation of average activation value among instances and the differences of average activation value among different layers. It encourages freezing more weights of later layers than earlier layers which are more likely to describe given task- specific features. Our experiments(Table 2 in Section 3.2) show that prior methods tend to forget past tasks in learning new tasks. In the prior methods, weights of later layers are more likely to change than weights of earlier layers during learning a new task. In general, if the essential weights of later layers of previous tasks change, the network forgets past tasks and hardly recovers previous task-specific features. On the other hand, even though weights of earlier layers of previous tasks change, there are other chances to recover general low-level features which are shared with following new tasks. Since our method puts relatively more constraints on the weights of task-specific features not to change than the prior methods(Figure 3), our method forgets past tasks less showing stable performance along the change in the order of tasks. ### 2.2 Weight Re-initialization for Better Plasticity In continual learning, networks have to not only avoid catastrophic forgetting but also learn new tasks. According to the extent of difference in optimal classification feature space of different tasks, optimized feature space in the previous task might be significantly changed with a new task. In the learning of a new task, we can let the model start either from random weights or from optimized weights with previous tasks. Even though the optimized weights on previous tasks can be considered as a set of random weights for a new task, we avoid a situation where the optimized weights for one task work as a local optimal for another similar task that may hinder new training from obtaining new optimal weights through weight re-initialization. The situation can be explained with $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term in the loss function of our network. During the learning of a new task, the network is informed of past tasks by $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term which lets the network maintain essential weights of the past tasks assigning high $\Omega_{k}$ values. In other words, $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ delivers the knowledge of previous tasks. Whatever the magnitude of $\Omega_{k}$ is, however, $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ term is ignored if $w_{k}^{t-1}$ almost equals to $w_{k}{t}$ already in the initial epoch of the training of a new task, which prevents the network from learning a new task. This situation is alleviated by weight re-initialization that allows the value of $\Omega_{k}(w_{k}^{t-1}-w_{k}^{t})^{2}$ to be high enough regardless of the magnitude of $\Omega_{k}$ in the training of a new task. In this case, still the knowledge of previous tasks will be delivered by $\Omega_{k}$ and affect the training of a new task. ## 3 Experimental Evaluations We perform experimental evaluations of our method compared to existing state- of-the-art methods for continual learning on several benchmark data sets; Split and permuted MNIST [13, 6], and incrementally learning classes of CIFAR10, CIFAR100 [12] and Tiny ImageNet [5]. We set hyper-parameters of other existing approaches based on the description in [1] which has tested existing approaches with different hyper-parameters to find their best performance. We train all different tasks with a batch size of 256 and Adam [9] using the same learning rate (0.001). For the Split CIFAR tasks and Split Tiny ImageNet, as aforementioned, we perform the evaluation multiple times shuffling the order of tasks randomly to evaluate the robustness to task orders. We test with all 120, 200, and 50 random orders for Split CIFAR10, Split CIFAR10-100 and Split Tiny ImageNet respectively. To minimize statistical fluctuations of accuracy, each combination of task sequences is repeated three times. Figure 5: Evaluation Metrics: DOI(Degree of Interference) and LA Accuracy of task. T, L and n stands for task, learning step, and the number of tasks respectively. As described in Figure 5, we define several evaluation metrics. ”Absolute task order” indicates the sequence of tasks that a model learns. For instance, task 1 stands for the first task that a model learns no matter which classes comprise the task. ”Learning step-wise average accuracy(LA Accuracy)” represents the accuracy of each learning step averaged through the whole tasks involved. (i.e., $LA_{k}=Average(L_{k})$). ”Degree of interference(DOI)” indicates the decreased extent of accuracy of each task after all learning steps are conducted. It is calculated by $(T_{k},L_{k})-(T_{k},L_{n})$. When we report the performance of randomly shuffled order experiment, we respectively average LA accuracy and DOI of randomly shuffled ordered test. ### 3.1 MNIST We first evaluate our algorithm on a Split MNIST benchmark. In this experiment, two sequential classes compose each task (total 5 tasks). We use multi-headed and multi-layer perceptrons with two hidden layers with 400 ReLU activations. Each task has its output layer with two outputs and Softmax. We train our network for 40 epochs with $\alpha$ = 0.0045. In Figure 6, we compare the accuracy of each task for at every learning step (column-wise comparison in Figure 5) and LA accuracy. MAS [2] outperforms all other baselines reaching 99.81% while ours achieves 99.7%. However, the accuracy is almost saturated due to the low complexity of the data. Figure 6: Results on Split MNIST benchmark. Here, VCL indicates VCL(without coreset)[15]. We also evaluate methods on permuted MNIST data set. Our model used in this evaluation is MLP which consists of two hidden layers with 400 ReLUs each and one output layer with Softmax. The network is trained for 20 epochs with $\lambda$ = 0.005. Also, to normalize the range of activation value, ReLU is applied to the output layer additionally when computing neuron importance $\Omega_{k}$. Our algorithm (95.21%) outperforms MAS [2] (94.70%), EWC [10] (82.45%) and VCL(without coreset) [15] (89.76%) and on the other hand, UCL [1] (96.72%), SI [22] (96.39%) and BGD [23] (96.168%) show better results. However, most results on this data set achieve almost saturated accuracy. ### 3.2 Split CIFAR10 We test our method on a Split CIFAR10 benchmark. In this experiment, two sequential classes compose each task (total 5 tasks). Evaluation on Split CIFAR10 data set is based on the multi-headed network with six convolution layers and two fully connected layers where the output layer is different for each task. We train our network for 100 epochs with $\alpha=0.7$. The order of 5 tasks that comprise CIFAR10 is randomly shuffled (total 120 random orders). Figure 7: Average LA Accuracy and its std. of Split CIFAR10 benchmark. | Average DOI of Absolute Task Order ---|--- Method | D1 | D2 | D3 | D4 SI [22] | 28.05(±11.7) | 20.00(±7.4) | 15.51(±8.2) | 8.68(±5.8) MAS [2] | 33.59(±11.7) | 27.37(±11.3) | 19.15(±10.6) | 11.45(±6.7) UCL [1] | 11.36(±5.8) | 8.56(±3.6) | 5.94(±3.0) | 3.55(±6.5) BGD [23] | 39.06(±10.1) | 34.83(±8.5) | 29.19(±8.8) | 19.71(±2.1) OURS | 1.44(±1.1) | 1.59(±1.2) | 1.18(±0.8) | 0.70(±0.7) Table 2: Average DOI(Degree of interference) and its std.(%) on Split CIFAR10. Note that proposed method forgets past tasks less regardless of the order of tasks. As Figure 7 describes, our method overall outperforms all other methods with large margins. Also, the standard deviation graph shows that our algorithm is more robust to the order of tasks. As Table 2 shows, proposed method shows better stability in the order of tasks and also has a low degree of forgetting. In our method, average degraded degree of performance is lowest as $1.23\%$, whereas SI [22] is $18.06\%$, UCL [1] is $7.35\%$, MAS [2] is $22.89\%$, and BGD [23] is $30.7\%$. #### 3.2.1 Ablation study To verify the effect of weight re-initialization for the learning of new tasks, we compare performance of ours and UCL [1] with those without weight re-initialization. | Task Order ---|--- Method | T5 | T4 | T3 | T2 | T1 UCL [1] | 0 | -0.425 | -0.9 | 4.93 | 6.38 OURS | -1 | 15.7 | 21.44 | 18.62 | 21.44 Table 3: Performance difference(%) = (accuracy with weight re-initialization) - (accuracy without weight re-initialization). Note that the task order is fixed. As Table 3 indicates, accuracy increases in both methods when weight re- initialization is applied. It suggests that weight re-initialization encourages better plasticity. Note that several weight importance based methods [10, 22, 2] cannot employ weight re-initialization since they consider the amount of weight changes in the methods. ### 3.3 Split CIFAR10-100 Figure 8: Average LA Accuracy and its std. of CIFAR10-100 benchmark. | Average DOI of Absolute Task Order ---|--- Method | D1 | D2 | D3 | D4 | D5 | D6 | D7 | D8 | D9 | D10 SI [22] | 5.85(±0.9) | 7.37(±2.3) | 6.58(±2.1) | 5.87(±2.0) | 5.57(±1.7) | 5.09(±1.7) | 4.45(±1.5) | 3.97(±1.3) | 3.28(±1.2) | 2.17(±1.0) MAS [2] | 9.32(±1.4) | 9.18(±2.8) | 8.19(±2.2) | 7.39(±2.1) | 6.65(±1.9) | 6.17(±1.9) | 5.30(±1.6) | 4.64(±1.4) | 3.70(±1.2) | 2.50(±1.0) UCL [1] | 3.74(±0.4) | 1.20(±1.2) | 1.31(±1.1) | 0.98(±1.0) | 0.78(±0.9) | 0.68(±0.8) | 0.64(±0.7) | 0.59(±0.7) | 0.37(±0.5) | 0.27(±0.4) OURS | 2.03(±0.4) | 2.08(±0.9) | 1.26(±0.9) | 0.94(±0 8) | 0.84(±0.8) | 0.77(±0.7) | 0.61(±0.7) | 0.59(±0.6) | 0.47(±0.5) | 0.24(±0.4) Table 4: Average DOI(Degree of interference) and its std.(%) on Split CIFAR10-100. Note that proposed method forgets past tasks less regardless of the order of tasks. We evaluate our method on Split CIFAR10-100 benchmark where each task has 10 consecutive classes (total 11 tasks). We use the same multi-headed setup as in the case of Split CIFAR10. We train our network for 100 epochs with $\alpha=0.5$. We fix task 1 as CIFAR10 due to the difference in the size of data set between CIFAR10 and CIFAR100. The order of remaining tasks that consist of CIFAR100 is randomly shuffled (total 200 random orders). Our method shows better stability showing the best accuracy values in old tasks. On the other hand, previous methods seem to prefer to be better with recent new tasks proving that our importance based continual learning is working appropriately. Indeed, as Figure 8 and Table 4 represent, SI [22] and MAS [2] seem that they learn new tasks very well forgetting what they have learned before. (a) LA accuracy of Split Cifar10 (b) LA accuracy of Split Cifar10-100 Figure 9: The performance on Split CIFAR10 and CIFAR10-100 with doubled channel. Accuracy increases when we use a doubled channel network. Note that the task order is fixed. Since all incoming weights are tied to the neuron in our method, the higher number of weights to be consolidated during training new tasks causes lower accuracy of final task. In practice, the decrease of plasticity in our method can be addressed by using a larger network (e.g., the larger number of channels). We test the performance with a network of a doubled number of channels (256 to 512). Figure 9 shows that our network with doubled number of channels has improved accuracy keeping its stability and better plasticity. Table 4 shows that our method obtains lowest average degraded degree of performance $0.98\%$ compared to SI [22], MAS [2], UCL [1] achieving $5.02\%$, $6.3\%$, $1.06\%$ respectively. Also, the proposed method shows the lowest standard deviation of DOI, which indicates that our method is robust to the interference from various combinations of tasks. Figure 10: Average LA Accuracy and its std. of Tiny ImageNet data set | Average DOI of Absolute Task Order ---|--- Method | D1 | D2 | D3 | D4 | D5 | D6 | D7 | D8 | D9 SI [22] | 27.35(±3.7) | 29.02(±4.4) | 27.09(±4.9) | 22.67(±4.2) | 20.24(±3.7) | 18.25(±4.4) | 14.86(±3.8) | 11.70(±3.2) | 7.78(±3.0) MAS [2] | 20.49(±4.2) | 16.32(±3.6) | 14.40(±4.1) | 11.02(±3.6) | 9.14(±3.6) | 8.27(±2.7) | 6.20(±2.3) | 5.41(±2.3) | 3.86(±1.8) OURS | 11.47(±3.6) | 6.75(±2.8) | 5.78(±2.3) | 3.98(±1.5) | 3.16(±1.2) | 2.76(±1.5) | 2.15(±1.1) | 1.70(±0.9) | 0.98(±0.7) Table 5: Average DOI(Degree of interference) and its std.(%) on Split Tiny ImageNet. Note that proposed method forgets past tasks less regardless of the order of tasks. ### 3.4 Split Tiny ImageNet We evaluate our method on Split Tiny ImageNet data set where each task has 20 consecutive classes (total 10 tasks). We use the same multi-headed setup as in the case of Split CIFAR10 and Split CIFAR10-100. We train our network for 100 epochs with $\alpha=0.5$. The order of tasks is randomly shuffled (total 50 random orders). Only convolution neural networks based methods are tested for a fair comparison. In Figure 10, our method outperforms all other methods with large margins. The standard deviation graph shows that our method algorithm shows the least performance disparity under the change in the order of tasks. Table 5 presents that our method acquires lowest average degraded degree of performance among SI [22], MAS [2] and ours, achieving $19.08\%$, $10.5\%$, and $4.3\%$ respectively. Also, ours has the lowest standard deviation of DOI. This implies that our method is robust to the interference from various combinations of tasks. ## 4 Conclusion We have proposed an activation importance-based continual learning method that consolidates important neurons of past tasks. Comprehensive evaluation has proved that the proposed method has implemented regularization-based continual learning achieving the fundamental aim of continual learning tasks not only balancing between stability and plasticity but also keeping robustness of the performance to the changes in the order of tasks. ## References * [1] Hongjoon Ahn, Sungmin Cha, Donggyu Lee, and Taesup Moon. Uncertainty-based continual learning with adaptive regularization. In Advances in Neural Information Processing Systems, pages 4392–4402, 2019. * [2] Rahaf Aljundi, Francesca Babiloni, Mohamed Elhoseiny, Marcus Rohrbach, and Tinne Tuytelaars. Memory aware synapses: Learning what (not) to forget. In Proceedings of the European Conference on Computer Vision (ECCV), pages 139–154, 2018. * [3] Rahaf Aljundi, Min Lin, Baptiste Goujaud, and Yoshua Bengio. Gradient based sample selection for online continual learning. In Advances in Neural Information Processing Systems, pages 11816–11825, 2019. * [4] Rahaf Aljundi, Marcus Rohrbach, and Tinne Tuytelaars. Selfless sequential learning. arXiv preprint arXiv:1806.05421, 2018. * [5] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database, 2009. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 248–255, 2020. * [6] Ian J Goodfellow, Mehdi Mirza, Da Xiao, Aaron Courville, and Yoshua Bengio. An empirical investigation of catastrophic forgetting in gradient-based neural networks. arXiv preprint arXiv:1312.6211, 2013. * [7] Khurram Javed and Martha White. Meta-learning representations for continual learning. In Advances in Neural Information Processing Systems, pages 1820–1830, 2019. * [8] Sangwon Jung, Hongjoon Ahn, Sungmin Cha, and Taesup Moon. Adaptive group sparse regularization for continual learning. arXiv preprint arXiv:2003.13726, 2020. * [9] Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. * [10] James Kirkpatrick, Razvan Pascanu, Neil Rabinowitz, Joel Veness, Guillaume Desjardins, Andrei A Rusu, Kieran Milan, John Quan, Tiago Ramalho, Agnieszka Grabska-Barwinska, et al. Overcoming catastrophic forgetting in neural networks. Proceedings of the national academy of sciences, 114(13):3521–3526, 2017. * [11] Simon Kornblith, Mohammad Norouzi, Honglak Lee, and Geoffrey Hinton. Similarity of neural network representations revisited. In International Conference on Machine Learning, pages 3519–3529. PMLR, 2019. * [12] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009\. * [13] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. * [14] Zhizhong Li and Derek Hoiem. Learning without forgetting. IEEE transactions on pattern analysis and machine intelligence, 40(12):2935–2947, 2017. * [15] Cuong V Nguyen, Yingzhen Li, Thang D Bui, and Richard E Turner. Variational continual learning. arXiv preprint arXiv:1710.10628, 2017. * [16] Matthew Riemer, Ignacio Cases, Robert Ajemian, Miao Liu, Irina Rish, Yuhai Tu, and Gerald Tesauro. Learning to learn without forgetting by maximizing transfer and minimizing interference. arXiv preprint arXiv:1810.11910, 2018. * [17] Andrei A Rusu, Neil C Rabinowitz, Guillaume Desjardins, Hubert Soyer, James Kirkpatrick, Koray Kavukcuoglu, Razvan Pascanu, and Raia Hadsell. Progressive neural networks. arXiv preprint arXiv:1606.04671, 2016. * [18] Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. Cnn features off-the-shelf: an astounding baseline for recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 806–813, 2014. * [19] Sebastian Thrun. Is learning the n-th thing any easier than learning the first? In Advances in neural information processing systems, pages 640–646, 1996. * [20] Jaehong Yoon, Saehoon Kim, Eunho Yang, and Sung Ju Hwang. Scalable and order-robust continual learning with additive parameter decomposition. arXiv preprint arXiv:1902.09432, 2019. * [21] Jaehong Yoon, Eunho Yang, Jeongtae Lee, and Sung Ju Hwang. Lifelong learning with dynamically expandable networks. arXiv preprint arXiv:1708.01547, 2017. * [22] Friedemann Zenke, Ben Poole, and Surya Ganguli. Continual learning through synaptic intelligence. Proceedings of machine learning research, 70:3987, 2017. * [23] Chen Zeno, Itay Golan, Elad Hoffer, and Daniel Soudry. Task agnostic continual learning using online variational bayes. arXiv preprint arXiv:1803.10123, 2018.
arxiv-papers
2021-07-27T08:09:32
2024-09-04T03:07:20.876419
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Sohee Kim, Seungkyu Lee", "submitter": "Sohee Kim", "url": "https://arxiv.org/abs/2107.12657" }
2107.12660
# The Pursuit and Evasion of Drones Attacking an Automated Turret ††thanks: This work is in support of ONR-Code 30 OTA #N00014-18-9-0001. This work was supported in part by the National Science Foundation under Grant No. [IIS-1553063] and [IIS-1849303]. ††thanks: 1Department of Electrical and Computer Engineering, University of Houston, Houston, TX 77204 USA {debiediger,atbecker}@uh.edu. ††thanks: 2Bloomberg, USA [email protected]. Daniel Biediger1, Luben Popov2, and Aaron T. Becker1 ###### Abstract This paper investigates the pursuit-evasion problem of a defensive gun turret and one or more attacking drones. The turret must “visit” each attacking drone once, as quickly as possible, to defeat the threat. This constitutes a Shortest Hamiltonian Path (SHP) through the drones. The investigation considers situations with increasing fidelity, starting with a 2D kinematic model and progressing to a 3D dynamic model. In 2D we determine the region from which one or more drones can always reach a turret, or the region close enough to it where they can evade the turret. This provides optimal starting angles for $n$ drones around a turret and the maximum starting radius for one and two drones. We show that safety regions also exist in 3D and provide a controller so that a drone in this region can evade the pan-tilt turret. Through simulations we explore the maximum range $n$ drones can start and still have at least one reach the turret, and analyze the effect of turret behavior and the drones’ number, starting configuration, and behaviors. ## I Introduction An anti-aircraft automated gun turret versus a group of quadcopters is an asymmetric engagement. While there are eight leading designs for a Close-In Weapons System (CIWS) turret, each costs several million dollars and requires a fixed mount [1]. In contrast, commercially available quadcopters are easily deployed and each cost less than $1,000 [2]. Automated turrets are used because the speed of engagements exceeds the reaction speed of humans [3]. This paper analyzes scenarios where the quadcopters can defeat a turret through numbers and motion strategies. For this paper, a _gun turret_ is a stationary defensive weapon with one or more degrees of freedom and kinematic movement (no inertia). Initially, we assume that the turret instantaneously kills anything aligned with the turret gun barrel. This models a turret with a rapid rate of fire whose projectiles move much faster than the adversary’s top speed, such as a laser turret, or a CIWS. Fig. 1 shows a frame from our simulation between a turret and seven attacking quadcopters. This is a pursuit evasion problem where the turret must chase the drones by turning to face them. For a turret with a pan-tilt mount this corresponds to a two-dimensional state space in the pan and tilt angles. The drone evaders have bounded velocity, thrust, inertia and turn rates. To defeat the attack, the turret must visit, in state-space, the pan and tilt angles corresponding to each drone. The 2D version of this is similar to the _Lake Monster Problem_ , where an evading rowboat in a circular lake must reach the lake shore without being captured by a monster that cannot swim, but can run faster than the rowboat can move [4]. For both 2D problems, the optimal strategies have a two-step approach that depends on the relative speeds of the agents. The turret must move through the attacking drones before any drone reaches the turret. To survive, the drones can utilize several strategies. They can attack with overwhelming numbers. They can move into regions where the drones can out-pace the turret motion. They can also split and some move evasively, forcing the turret to follow as long a path as possible, and enabling other drones to reach the turret. Wiener proposed that random evasions are optimal for avoiding anti-aircraft, which was recently confirmed [5]. To avoid counter-fire, missiles are programmed with a variety of strategies [6], including weaving trajectories [7]. This paper compares the effectiveness of the three approaches in 2D and in 3D. Figure 1: Simulated turret engaging quadcopter attackers. ## II 2D Turret & Drone Theory Drone-mitigation methods use radars and cameras to detect drones. To avoid detection, drones can use terrain to mask their approach as long as possible before attempting to reach their target [8]. Such an approach can reduce the effective problem from 3D to 2D. The effect of terrain masking is shown as an inset to Fig. 2, calculated using the open source SPLAT! software for a 9m radar tower [9]. This section identifies the maximum distance from a gun turret where a drone(s) can first be detected and yet still reach the turret. \begin{overpic}[width=390.25534pt]{Turret2DregionAnnote.pdf} \scriptsize\put(66.0,72.0){$p_{0}$} \put(53.0,68.0){$p_{d}$} \put(35.0,48.0){$p_{\perp}$} \put(42.0,42.0){$v$} \end{overpic} Figure 2: Schematic of 2D turret, drone, and safety regions. The inset image shows how a drone can exploit terrain masking to avoid detection and stealthily approach a target. In a 2D model, the turret’s orientation is $\phi$ and the turret has a maximum rate of traverse (turning rate) of $\omega$, $|\dot{\phi}|\leq\omega$. We assume that the turret can rotate infinitely in either direction. The mobile opponent is a drone with position $p\in\mathbb{R}^{2}$ and has instantaneous velocity $|\dot{p}|\leq v_{D}$, where $v_{D}\in\mathbb{R}^{+}$. To simplify analysis, we eliminate a parameter by dividing the drone velocity by the maximum rate of traverse: $|\dot{p}|\leq\frac{v_{D}}{\omega}=v$. For the following proofs, we assume that the turret always moves at a top speed of 1 rad/s, so the path length of the turret is equal to the time $t$. For simplicity, we place the turret at $[0,0]$. A drone located at $[x,y]$ has angle $\theta=\mathrm{arctan}(x,y)$ with respect to the $x$-axis. The minimum angle from the turret to the drone is $\alpha=\mathrm{arctan}(\cos(\theta-\phi),\sin(\theta-\phi))$. ### II-A One mobile drone vs. a limited rate of traverse turret Consider the diagram shown in Fig. 2. The drone initial position is $p_{0}$ and at time $t$ is located at $p_{t}=[x(t),y(t)]$. If the drone is no further than $v$ from the turret, the drone can fly faster than the turret can rotate, since it can easily move 1 rad/s by flying along this circle’s circumference. We call this circle of radius $v$ the “Safety Circle”, excluding the region where the turret is currently aimed, along the line from $[0,0]$ to $v[\cos(\phi),\sin(\phi)]$. If the angle from the drone to the turret is $\alpha$, the turret will take $\alpha$ seconds to rotate to the drone’s position, in which time the drone can move $v\alpha$ distance. Therefore, the region bounded by the radius $\rho(\alpha)$ is also survivable: $\displaystyle\rho(\alpha)=v(1+|\alpha|),\qquad\ \text{ for }\alpha\in[-\pi,\pi].$ (1) This region is outlined by brown in Fig. 2. If $\|p_{t}\|>v(|\alpha(t)|+1)$, then the drone cannot reach the safety circle in time by flying radially inwards. If the drone flies directly toward the origin, it will be intercepted at $(\|p_{0}\|-v|\alpha|)\left[\cos(\theta),\sin(\theta)\right]$. However, a larger survivable region, outlined in purple, is possible if the drone flies at an angle instead of flying radially inwards. The angle that maximizes this region brings the drone to the tangent of the safety circle. The point tangent to the circle from $p_{0}$ in the direction of $\alpha$ is $\displaystyle p_{\perp}$ $\displaystyle=v\left[\cos(\theta+\beta),\sin(\theta+\beta)\right],$ (2) $\displaystyle\textrm{where }\beta$ $\displaystyle=\textrm{sign}(\alpha)\cos^{-1}\left(\frac{v}{\|p_{0}\|}\right).$ (3) Here $\beta$ is calculated using the 90∘ triangle $([0,0],p_{\perp},p_{0})$. If the drone starts further than $\displaystyle\frac{\left\|p_{0}-p_{\perp}\right\|}{v}>\left|\alpha\right|+\left|\beta\right|,$ (4) it cannot reach the tangent position, and is destroyed at time $t_{d}$. This time is computed by numerically solving the following equation: $\displaystyle t_{d}$ $\displaystyle=\left|\alpha\right|+\left|\beta\right|-\tan^{-1}\left(\frac{\left\|p_{0}-p_{\perp}\right\|-t_{d}v}{v}\right).$ (5) The drone is destroyed at position $\displaystyle p_{d}$ $\displaystyle=p_{0}-t_{d}v\frac{(p_{0}-p_{\perp})}{\left\|p_{0}-p_{\perp}\right\|}.$ (6) To compute the survivable region when flying to the tangent point of the safety circle, we parameterize the points where the drone ends tangent to the safety circle of radius $v$. We then solve for the corresponding starting positions: $\displaystyle p_{0}(\gamma)=v\big{[}$ $\displaystyle\cos(\gamma+\phi)+\gamma\sin(\gamma+\phi),$ (7) $\displaystyle\sin(\gamma+\phi)-\gamma\cos(\gamma+\phi)\big{]},$ $\displaystyle\text{for }\gamma\in[-$ $\displaystyle\gamma_{\max},\gamma_{\max}].$ The maximum angle occurs when $\tan(\gamma_{\max})=\gamma_{\max}$, at $\gamma_{\max}\approx 4.49$ rad. Figure 3: Comparing in 2D the shortest Hamiltonian path and greedy path planning in 2D. 500 trials were run for each number of drones $n$. A 95% confidence ellipse is plotted for each $n$. ### II-B Maximizing the turret travel, $n$ radially moving drones \begin{overpic}[width=390.25534pt]{Greedy2DturretGreedy.pdf} \put(-5.0,12.0){\rotatebox{90.0}{greedy turret}} \end{overpic} \begin{overpic}[width=390.25534pt]{Optimal2DTurretSpacing.pdf} \put(-5.0,2.0){\rotatebox{90.0}{both, doubling spacing}} \end{overpic} \begin{overpic}[width=390.25534pt]{Greedy2DturretOpt.pdf} \put(-5.0,12.0){\rotatebox{90.0}{optimal turret}} \end{overpic}\begin{overpic}[width=390.25534pt]{TurretPathLengthGvsO.pdf} \put(-2.0,8.0){\rotatebox{90.0}{turret path length (radians)}} \end{overpic} Figure 4: Placing drones to maximize path length for a greedy turret results in path lengths that approach 2$\pi$. The same placements for an optimal turret have path lengths that approach $\pi$. Doubling spacing using (11) causes both strategies to approach 2$\pi$. If the drones start too far away to reach the safety circle, they can still work to maximize the time the turret requires to destroy them. Given $n$ drones that all move radially inwards toward the turret, at what angular positions should the $n$ drones be initially placed to force the turret to follow the longest path? Fig. 3 indicates that the longest path is less than $2\pi$ by comparing the resulting path for $n$ drones randomly placed on the circumference of a circle against (1) a greedy turret that always targets the done which requires the smallest traversal, and (2) an optimal turret that selects targets to construct the overall shortest Hamiltonian path. If the turret is greedy, it can be exploited by placing the $j$th drone at angle $\displaystyle\alpha_{j}=\left(\sum_{i=0}^{j-1}\left(\frac{1}{2}\right)^{n-1-i}\pi\right)-\epsilon$ (8) for some small, non-zero constant $\epsilon$. This places the first drone at $\left(\frac{1}{2}\right)^{n-1}\pi-\epsilon$ and the last drone at $-\left(\frac{1}{2}\right)^{n-1}\pi-\epsilon$. Because the counter-clockwise (CCW) drone is $2\epsilon$ closer, the turret initially turns CCW. The greedy turret never turns clockwise (CW) because the intermediate drones are placed at positions that double the distance travelled so far, but are always closer than the CW drone. This results in a path length that is $\displaystyle L_{\textrm{greedy turret, spacing \eqref{eq:spacingToMaxGreedy} }}=2\pi\left(1-\left(\frac{1}{2}\right)^{n}\right)-\epsilon.$ (9) This path performs poorly with a optimal turret, which simply turns CW first, and then CCW, resulting in a path length of $\displaystyle L_{\textrm{optimal turret, spacing \eqref{eq:spacingToMaxGreedy} }}=\pi\left(1+\left(\frac{1}{2}\right)^{n-1}\right)-\epsilon.$ (10) The turret paths and the total path lengths are shown in Fig. 4. Given an optimal turret, the drones should be placed symmetrically to the left and the right of the turret, with inter-drone angular spacing that doubles for each drone, placing the drones at $\\{\pm\alpha_{\textrm{opt}},\pm 3\alpha_{\textrm{opt}},\pm 7\alpha_{\textrm{opt}},...\\}$. If $n$ is odd, the final drone should be placed at $\pi$. $\displaystyle\alpha_{\textrm{opt}}=\frac{2\pi}{2^{\left\lceil\frac{n}{2}\right\rceil}+2^{\left\lfloor\frac{n}{2}\right\rfloor+1}-2}.$ (11) The turret is then forced to move only slightly less than (9): $\displaystyle L_{\textrm{both, doubling spacing \eqref{eq:spacingToMaxGreedy} }}=2\pi-\alpha_{\textrm{opt}}.$ (12) In all cases, the total total movement of the turret is bounded, no matter the number of drones. Increasing the number of drones is not effective in the 2D case, instead the drones should move in more effective ways. ### II-C Two mobile drones vs. a limited rate of traverse turret Let drone 1 start at radial distance $r$ and starting angle $\alpha_{1}$ to the turret. We would like to determine the angle $\alpha_{2}$ and distance $\geq r$ that drone 2 should start, such that drone 2 reaches the safety circle. What motion strategy should each drone follow to maximize $r$? The answer is shown in Fig. 5, which plots $r_{\textrm{max}}(\alpha_{1})$ for several strategies. First, both drones should start at the same radial distance; starting the second drone further away increases its required time to reach the target, and reduces its effective angular velocity relative to the turret. \begin{overpic}[width=433.62pt]{OptimalR2drones.pdf} \end{overpic} \begin{overpic}[width=212.47617pt]{dronesAlpha1p0.pdf} \put(0.0,95.0){\scriptsize A. $\alpha_{1}=1.0$} \put(0.0,88.0){\scriptsize{\color[rgb]{217,142,32}hybrid}} \put(75.0,93.0){\scriptsize{\color[rgb]{128,128,128}stay-alive}} \put(80.0,88.0){\scriptsize{\color[rgb]{128,128,128}circle}} \end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha1p45.pdf} \put(0.0,95.0){\scriptsize B. $\alpha_{1}=1.45$} \put(0.0,88.0){\scriptsize{\color[rgb]{86,116,170}transition}} \end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha1p5.pdf} \put(0.0,95.0){\scriptsize C. $\alpha_{1}=1.5$} \put(0.0,88.0){\scriptsize{\color[rgb]{86,116,170}transition}} \end{overpic}\begin{overpic}[width=212.47617pt]{dronesAlpha2p0.pdf} \put(0.0,95.0){\scriptsize D. $\alpha_{1}=2.0$} \put(0.0,88.0){\scriptsize{\color[rgb]{147,181,70}tangent}} \end{overpic} Figure 5: (Top) maximum starting distance $r_{\textrm{max}}/v$ with drone 1 placed at angle $\alpha_{1}$. (Bottom) optimal paths for $\alpha_{1}=\\{1,1.45,1.5,2\\}$ with 2 drones. For both radially moving drones (1) and for drones that move to the tangent of the safety circle (2), the second drone should start at $\pi+\alpha_{1}$ if $\alpha_{1}<\pi/2$ (opposite the first drone) and $-\alpha_{1}$ otherwise. For both, the optimal $\alpha=\pi/2$. The maximum radius, $r_{\textrm{max}}$, for radially moving drones is $(1+3\pi/2)v$, and for tangentially moving drones $\displaystyle r_{\perp}=r_{\textrm{max}}(\pi/2)\approx 6.202v.$ (13) For $\alpha_{1}\geq\pi/2$, both drones should move toward the tangent of the safety circle, as given by (2). However, for $0\leq\alpha_{1}\lessapprox 1.434$ there exists a hybrid solution that outperforms the radial and tangent solutions. Note that the reachable set for drone 1 in time $t$ is a circle of radius $vt$. Drone 1 should move to stay alive as long as possible. This is accomplished by moving in a straight line such that drone 1 dies where the circle of its reachable set is tangent to the firing-line projected from the turret. This “stay alive circle” is drawn in light grey in Fig. 5A. The drone will have moved to maximize the angular distance that the turret must travel to pursue it. Drone 1’s death occurs at angle $\beta$ that solves the equation $\displaystyle\alpha_{1}=\beta-\sin^{-1}\left(\frac{1}{\frac{r_{\perp}}{\beta}+1}\right).$ (14) Meanwhile, drone 2 starts at angle $\pi+\beta$ and moves radially inward until drone 1 dies. When drone 1 dies, drone 2 is directly behind the turret. The turret can then arbitrarily select to rotate in either direction to engage drone 2. To maximize its survivability, drone 2 should now move toward the safety-circle tangent point away from the turret’s direction of motion. At angle $\alpha_{1}\approx 1.434$ radians, $\beta+\pi=2\pi-\alpha_{1}$, so for $1.434\lessapprox\alpha_{1}\leq\pi/2$, the second drone cannot start opposite of the place where the drone 1 dies. In this region, the _transition_ strategy is optimal. Here, drone 1 moves in a straight line but at an angle intermediate between strategy (14) and the tangent meet point. The transition strategy is shown in Fig. 5B and C. The required angle is solved numerically. Meanwhile drone 2 starts at $-\alpha_{1}$ and moves in a straight line to the point $\pi$ radians from drone 1’s eventual death, and then switches to moving toward the tangent to the safety circle, as shown in Fig. 5B. The maximum radius $\approx 6.3197v$ occurs at $\approx 1.449$ radians, with drone 1 moving at angle $\approx-2.740$ radians with respect to the turret’s initial orientation. ## III 3D Turret & Drone Theory In 3D there are safety regions that correspond to the 2D safety circle. Current CIWS used by five world militaries are degree-of-freedom turrets with a controllable pan and tilt [10, 1]. Moreover, the turret has a maximum rate of traverse $115^{\circ}$/sec. For a drone moving with a speed of 5 m/s, this corresponds to a safety circle of radius $\approx$ 2.5 m. For a turret whose speed is constrained by geodesic distance, the safety region is the red sphere in Fig. 6A, but the turret is actually limited by traverse rate in both pan and tilt, resulting in the cylindrical safety region shown in Fig. 6B. If the tilt angle is limited from $-25^{\circ}$ to $+85^{\circ}$, then these rotation limits mean that drones in the blue conical regions shown in Fig. 6C are safe. These limits are just mechanical constraints and the ranges vary among CIWS designs [1], so our analysis will assume no joint limits. A pan-tilt robot equipped with a gun can be modeled as a spherical robot where the final link is a prismatic joint. The kinematics are a rotation $R_{z,\theta}R_{y,\phi}$ and a translation $T_{d}$ along the current $z$-axis. The manipulator Jacobian is then $\displaystyle J(\theta,\phi,d)=\scriptsize\left[\begin{array}[]{ccc}-d\sin(\theta)\sin(\phi)&d\cos(\theta)\cos(\phi)&\cos(\theta)\sin(\phi)\\\ d\cos(\theta)\sin(\phi)&d\sin(\theta)\cos(\phi)&\sin(\theta)\sin(\phi)\\\ 0&-d\sin(\phi)&\cos(\phi)\\\ \end{array}\right].$ (18) This Jacobian has singularities whenever $\phi=\\{0,\pi\\}$ and also trivially whenever $d$ is zero. A drone can evade the turret indefinitely when near the turret’s singularity. This singularity could be moved, but not eliminated by mounting the turret at a different angle, as shown in Fig. 6D. Figure 6: Safety regions for a drone with max velocity 5 m/s and a representative CIWS. The cone and cylinder sets extend infinitely in the axial directions. ### III-A Increasing the number of attacking drones as a strategy In 2D increasing the number of drones makes little difference on the effectiveness of the attack, since the distance the turret must travel to clear the area around it is bounded. In 3D, the drones can space out on a manifold. If the drones all fly radially inward to attack a turret, the time required for the turret to defeat the attack depends on the number of drones. For radial motion, the angular distance between the drones does not change from the perspective of the turret. Because a sphere has the largest state space, it represents an upper limit on the path length for a number of drones. The problem reduces to solving the shortest Hamilton path on a sphere. The SHP is the shortest path that visits all points of interest once from a given starting location. It is related to the Traveling Salesman Problem (TSP), which requires the shortest closed tour through all points of interest. Related problems with TSP on a sphere include [11], which used up to 400 points with a genetic algorithm and [12] which used up to 400 points with ant colony optimisation. A more complete paper that compares algorithms is [13]. Making long TSP tours was presented in [14] based on the theory in [15]. The distance metric for a freely-rotating turret is the shortest angle between two vectors. Given two drone positions with unit vectors (from the turret) of $\vec{u}$ and $\vec{v}$, the angular distance between them is $\cos^{-1}\left(\vec{u}\cdot\vec{v}\right)$ (19) To understand the effect of the number of drones on the SHP, we place drones on a sphere using two approaches: a Fibonacci spiral on a sphere [16] and random placement with relaxation using Lloyd’s algorithm [17]. The Fibonacci spiral places points on a sphere, using the _golden ratio_ to distribute the points somewhat evenly. It produces a spiral pattern on the surface of the sphere, as shown in Fig. 7. Our second approach selects uniformly distributed points on the sphere at random. It then executes Lloyd’s algorithm, repeatedly computing the Voronoi cells on the sphere and moving the points to the centroids of these cells. An example of these cells is also shown in Fig. 7. Figure 7: 200 points placed on a sphere using the Fibonacci spiral and randomly generated and spaced with Lloyd’s algorithm. Figure 8: Nearest neighbor and shortest Hamiltonian path distance comparison for $n$ drones placed using the Fibonacci spiral on a sphere. The length of the path required to engage and defeat all the drones depends on the number of drones present. More drones means more points for the turret to visit in state-space. As the number of points spaced evenly on a sphere increases, the distance between the points decreases. To determine the path length through the points we used two approaches: finding the nearest-neighbor (NN) point at each step and using the freely available _Concord_ TSP solver based on the work in [18]. Concorde has been used to find optimal tours though very large problems including those on the surface of a sphere (with latitude and longitude on Earth) in [19]. We adapted the solver to our problem by adding in an extra phantom point with maximum-distance to and from all points, but zero-distance to and from the starting position. This is inspired by the strategy for transforming asymmetric-TSP problems into symmetric-TSP problems, presented in [20]. The solver connects the phantom point to the starting position as either the first or last stop in the tour (the remaining distances are symmetric). To find the SHP, we discard the phantom point and select the direction through the tour with the shortest first move. The blue line in Fig. 8 line shows the SHP computed using the Concord TSP solver. The green line above it shows the results for the finding the path using the NN approach. The point sets used in both cases are generated with the Fibonacci spiral. A best-fit line shows that the path distance increases with the _square-root_ of the number of points, $O\left(\sqrt{n}\right)$. This agrees with and extends the results for the distances of a TSP tour on a unit square given by [21]. Above a small number of drones, the NN approach produces a path that is seven to ten percent longer than the optimal path. For a real turret with more than a few attacking drones, it is not feasible to generate the optimal (and the computationally expensive) solution online. The NN approach provides a fast option for selecting the next target, though it does not find the optimal shortest path above a small number of drones. It also follows a trend where the path length increases as the $O(\sqrt{n})$ in $n$ drones. ### III-B Simulating drones attacking a turret (a) (b) Figure 9: Comparison of drone attack configurations using direct and indirect attack strategies with different levels of turret repulsion. Rather than move radially inward, the drones can attempt to evade the turret by moving with a tangential component relative to the turret. This could potentially increase the traversal distance required by the turret and prolong the life of other drones. In order to test our 3D theories, we used a simulation methodology based on the work in [22]. The simulation pits the drones against a CIWS turret, with the drones attempting to crash into turret while the turret attempts to eliminate the drones. This framework, built in the Unity game engine, allows us to simulate drones using a dynamic model. This model places limits on the thrust, pitch and yaw rates, top speed, and includes inertia. It can simulate a repulsion between drones to prevent collisions and allows the drones to flee from the turret. Fig. 10 shows the forces acting on a drone in normal flight. The weight of the drone, $\vec{F_{w}}$ is counteracted by the thrust $\vec{T}$. Together they sum to a net force $\vec{F_{n}}$ acting in the desired direction of motion. The figure shows an overlay of the velocity. $\displaystyle\vspace{-2em}\vec{F_{n}}$ $\displaystyle=\vec{T}+\vec{F_{w}}$ (20) $\displaystyle 0$ $\displaystyle=\vec{F_{n}}+\vec{F_{d}}$ At maximum speed, the drag force $\vec{F_{d}}$ counteracts the net force and the drone moves in the direction of $\vec{F_{n}}$. Without any other repulsive forces, the net force $\vec{F_{n}}$ is the same as the force pulling the drone to the goal, $\vec{F_{g}}$. Figure 10: Forces acting on a drone. ### III-C Simulating drones directly attacking a turret with evasion Similar to the 2D case with multiple drones, the drones in front of the turret should move in a way that increases the distance the turret must travel. The drones behind the turret should move as quickly as possible toward the turret. We simulate this behavior by placing an outward repulsion from the line extending from the gun on the turret. Drones within a $\pi/4$ cone are subject to the repulsion. We place the turret at the origin [0,0,0] and drone $i$ at position $p_{i}=[x_{i},y_{i},z_{i}]$. The unit vector to the drone is $\hat{p_{i}}$ and the unit vector in the direction that the gun turret it pointing is $\hat{g}$. The direction of drone repulsion is then given by (21). The magnitude of this force depends on the angle between the vectors; maximum when the angle between the gun and drone is small and zero when the drone is outside the cone of repulsion. $\displaystyle\vspace{-2em}\hat{F_{r}}$ $\displaystyle=\left(\hat{g}\times\hat{p_{i}}\right)\times\hat{p_{i}}$ (21) $\displaystyle\psi$ $\displaystyle=\arccos(\hat{g}\cdot\hat{p_{i}})$ $\displaystyle\vec{F_{r}}$ $\displaystyle=\hat{F_{r}}\left\\{\begin{array}[]{ll}1-\frac{\psi}{\pi/8}&\psi<\pi/8\\\ 0&\text{else}\end{array}\right.$ (24) The weight applied to this repulsion, $\xi$, varies in the range [0,1]. A repulsion of zero indicates that the drones ignore the danger posed by the gun and focus only on reaching it. A repulsion of one means that the drones flee the turret and ignore reaching it. In between, the desired net force is a linear combination of the force vector pointing to the goal, $\vec{F_{g}}$ and the repulsion vector $\vec{F_{r}}$ given in (25). $\displaystyle\vspace{-2em}\vec{F_{n}}=\left(1-\xi\right)\vec{F_{g}}+\xi\vec{F_{r}}$ (25) We generate three drone attack configurations with successively increasing spatial coverage: a plane, a half-cylinder, and a cylinder. The planar formation distributes the $n$ drones in a starting rectangle along staggered rows. The starting region is a distance $d$ in front of the turret and extends from $-\pi/4$ to $\pi/4$ in the turret’s pan angle and $0$ to approximately $\pi/4$ in the tilt angle. The half-cylinder places the same $n$ drones evenly spaced in staggered rows from $-\pi/2$ to $\pi/2$ at a distance $d$ in front of the turret. The cylinder surrounds the turret with staggered rows of drones with radius $d$. To compare the effectiveness of different strategies, we simulate an attack and record its success or failure. If at least one drones reaches (and destroys) the turret, we increase the nominal starting distance and try again. If the drones are defeated, we decrease the starting distance and try again. After successive iterations, we can determine the maximum starting distance for each combination of configurations and strategies. A longer distance reflects an attack that evades and survives for more time. As the maximum distance increases, it is more likely that the drones could approach undetected and complete a successful attack. Shorter distances indicate that the attack is less effective and must start closer to the turret. Fig. 9a shows a comparison of the drone starting distances for each of the attack patterns. The solid black line shows that the cylinder, beyond some initial benefit from repulsion is relatively unaffected by adding more. The half-cylinder and plane are the most impacted by adding additional repulsion, but the effect is negative. The results are deterministic, but depend on the details of the repulsion and the targets picked by the turret. As the repulsion levels increase, the drones are pushed further away from paths toward the turret. This causes a difference in path the turret takes through the drones. A high repulsion tends to herd the drones away from the turret making them less effective. The plane suffers the most from the herding effect, as the drones at the sides of the configuration are forced out into unoccupied regions. While this will cause the turret to pan more to reach these drones, they are starting from a much greater radial distance and take longer to reach the turret. The half-cylinder can benefit somewhat from the repulsion to move into unoccupied areas. Low repulsion weights do not negatively impact the performance, but high weights hamper the performance. ### III-D Simulating drones exploiting the 3D safety region If a drone can position itself directly above the turret, or nearly so, it can spiral down avoiding fire from the turret. This corresponds directly to the safety circle in the 2D case where the turret cannot pan fast enough to directly target the drone. We investigated the same three drone attack configurations as before: a plane, a half-cylinder, and a cylinder. To exploit the safety region, the drones move inward toward this cylindrical region above the turret. They move at maximum speed in level flight until they reach the region and then begin to spiral down. The drones attempt to avoid the front of the turret by moving toward a goal behind the gun and below their current position. This position is determined by (26). In the simulation, $k_{1}=4$m, $k_{2}=5$m and the drone’s goal position is $p_{i,\text{goal}}$. $\displaystyle p_{i,\text{goal}}=[-k_{1}\hat{g}_{x},-k_{1}\hat{g}_{y},p_{i,z}-k_{2}]$ (26) Fig. 9b shows a comparison of the drone starting distances for each of the attack patterns. The solid black line shows that the cylinder benefits greatly from additional repulsion. In comparison to the direct attack, the indirect attack performs significantly better across all weights. The half-cylinder and plane also benefit from the repulsion and both perform better than under direct attack. The plots show more discontinuities in starting distance as well. Because the spiral attack from above is so effective, if drones can reach and enter the safety region they are more likely to defeat the turret. If the turret selects targets in high latitudes, it can counter this threat. In some cases the NN approach does find this path, but in other cases, the turret does not select these drones. ## IV Conclusions and Future Work In 2D, no arrangement of drones can force the turret to follow a path longer than $2\pi$. In a similar way, in 3D increasing the number of drones in an attack to $n$ provides only an $O(\sqrt{n})$ increase in survivability. While avoiding the turret in 2D provides some benefit, the use of repulsion in our 3D simulation provided mixed results. When the drones are in direct attack, the repulsion seems to herd the drones away from the turret more than it increases the survivability. As a result, the overall performance decreases with increasing repulsion. When the drones pursue indirect attack, some turret repulsion increases the survivability of the attack. Repulsion spreads the drones to fill in gaps or to move to empty regions in the airspace. Overall the indirect attack plan performed better than direct attack. In general, the indirect attack approach performs better than direct attack. If drones can reach the safe region above a turret, they spiral down and destroy it. If the turret tilts up and clears the drones at high latitudes, the attackers near the horizon move in quickly to defeat the turret. To better counter these threats, we plan to improve the turret’s target selection to consider not just the nearest target, but also the most proximate threat to the turret or its safety region. ## References * [1] K. Fong, “CIWS: The last-ditch defence,” _Asian Defence Journal_ , vol. Naval Forces, July/August 2008. * [2] R. H. Stoner, “History and technology r2d2 with attitude: The story of the phalanx close-in weapons.” [Online]. Available: http://www.navweaps.com/index_tech/tech-103.php * [3] D. Kleinman and T. Perkins, “Modeling human performance in a time-varying anti-aircraft tracking loop,” _IEEE Transactions on Automatic Control_ , vol. 19, no. 4, pp. 297–306, 1974. * [4] P. J. Nahin, _Chases and escapes: the mathematics of pursuit and evasion_. Princeton University Press, 2012\. * [5] V. Kreinovieh and O. Kosheleva, “Wiener-process-type evasive aircraft actions are indeed optimal against anti-aircraft guns: Wiener’s data revisited,” _Mathematical Structures and Modeling_ , no. 2 (34), 2015. * [6] J. Shinar, Y. Lipman, and M. Zarkh, “Mixed strategies in missile versus missile interception scenarios,” in _Proceedings of 1995 American Control Conference-ACC’95_ , vol. 6. IEEE, 1995, pp. 4116–4120. * [7] A. Vermeulen and R. Savelsberg, “Interception of an aerodynamically stable weaving re-entry vehicle,” _International Journal of Intelligent Defence Support Systems_ , vol. 5, no. 2, pp. 127–145, 2014. * [8] A. Robertson and G. Watson, “Drone Threats: Evolving Towards Swarms Current and Future Techniques for Detecting and Defeating Large Numbers of Rogue Drones,” Fortem Technologies, Tech. Rep., 08 2020. * [9] “SPLAT! is an RF signal propagation, loss, and terrain analysis tool,” https://www.qsl.net/kd2bd/splat.html, accessed: 2020-10-20. * [10] T. DiGiulian, “USA 20 mm Phalanx Close-in Weapon System (CIWS),” http://www.navweaps.com/Weapons/WNUS_Phalanx.php, accessed: 2021-03-04. * [11] A. Uğur, S. Korukoğlu, A. Çalıskan, M. Cinsdikici, and A. Alp, “Genetic algorithm based solution for TSP on a sphere,” _Mathematical and computational applications_ , vol. 14, no. 3, pp. 219–228, 2009. * [12] H. Eldem and E. Ülker, “The application of ant colony optimization in the solution of 3d traveling salesman problem on a sphere,” _Engineering science and technology, an international journal_ , vol. 20, no. 4, pp. 1242–1248, 2017. * [13] X. Chen, Y. Zhou, Z. Tang, and Q. Luo, “A hybrid algorithm combining glowworm swarm optimization and complete 2-opt algorithm for spherical travelling salesman problems,” _Applied Soft Computing_ , vol. 58, pp. 104–114, 2017\. * [14] L. A. Goddyn, “Quantizers and the worst-case euclidean traveling salesman problem,” _Journal of Combinatorial Theory, Series B_ , vol. 50, no. 1, pp. 65–81, 1990. * [15] H. J. Karloff, “How long can a Euclidean traveling salesman tour be?” _SIAM Journal on Discrete Mathematics_ , vol. 2, no. 1, pp. 91–99, 1989. * [16] D. P. Hardin, T. Michaels, and E. B. Saff, “A comparison of popular point configurations on s2,” _arXiv preprint arXiv:1607.04590_ , 2016. * [17] S. Lloyd, “Least squares quantization in pcm,” _IEEE transactions on information theory_ , vol. 28, no. 2, pp. 129–137, 1982. * [18] D. Applegate, W. Cook, S. Dash, and A. Rohe, “Solution of a min-max vehicle routing problem,” _INFORMS Journal on Computing_ , vol. 14, pp. 132–143, 05 2002. * [19] D. L. Applegate, R. E. Bixby, V. Chvátal, W. Cook, D. G. Espinoza, M. Goycoolea, and K. Helsgaun, “Certification of an optimal tsp tour through 85,900 cities,” _Operations Research Letters_ , vol. 37, no. 1, pp. 11–15, 2009. * [20] R. Kumar and H. Li, “On asymmetric tsp: Transformation to symmetric tsp and performance bound,” 01 2000. * [21] K. J. Supowit, E. M. Reingold, and D. A. Plaisted, “The travelling salesman problem and minimum matching in the unit square,” _SIAM Journal on Computing_ , vol. 12, no. 1, pp. 144–156, 1983. * [22] L. Popov, “Drone swarm simulation,” Master’s thesis, University of Houston, 2020\.
arxiv-papers
2021-07-27T08:16:49
2024-09-04T03:07:20.893172
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Daniel Biediger, Luben Popov, Aaron T. Becker", "submitter": "Aaron Becker", "url": "https://arxiv.org/abs/2107.12660" }
2107.12664
# Adaptive Boundary Proposal Network for Arbitrary Shape Text Detection Shi-Xue Zhang1, Xiaobin Zhu1 , Chun Yang1, Hongfa Wang3, Xu-Cheng Yin1,2,4 1School of Computer and Communication Engineering, University of Science and Technology Beijing 2USTB-EEasyTech Joint Lab of Artificial Intelligence, 3Tencent Technology (Shenzhen) Co. Ltd 4Institute of Artificial Intelligence, University of Science and Technology Beijing [email protected], {zhuxiaobin, chunyang, xuchengyin}@ustb.edu.cn, [email protected] Corresponding author. ###### Abstract Arbitrary shape text detection is a challenging task due to the high complexity and variety of scene texts. In this work, we propose a novel adaptive boundary proposal network for arbitrary shape text detection, which can learn to directly produce accurate boundary for arbitrary shape text without any post-processing. Our method mainly consists of a boundary proposal model and an innovative adaptive boundary deformation model. The boundary proposal model constructed by multi-layer dilated convolutions is adopted to produce prior information (including classification map, distance field, and direction field) and coarse boundary proposals. The adaptive boundary deformation model is an encoder-decoder network, in which the encoder mainly consists of a Graph Convolutional Network (GCN) and a Recurrent Neural Network (RNN). It aims to perform boundary deformation in an iterative way for obtaining text instance shape guided by prior information from the boundary proposal model. In this way, our method can directly and efficiently generate accurate text boundaries without complex post-processing. Extensive experiments on publicly available datasets demonstrate the state-of-the-art performance of our method. Code is available at the website: https://github.com/GXYM/TextBPN. ## 1 Introduction Scene text detection has been widely applied in various applications, such as online education, product search, and video scene parsing. Benefiting from the rapid development of deep learning, text detection methods [29, 11, 42, 22] have achieved impressive performance on images in which text instances are regular shape or aspect ratio. Recently, arbitrary shape text detection has attracted ever-increasing interests for it can well adapt to real applications. Figure 1: Illustration of the boundary proposal deformation process: (a) Boundary proposal; (b) Sampling on boundaries; (c) Extracting node feature matrix; (d) Learning offsets of sampling vertexes via adaptive boundary deformation model. Although arbitrary shape text detection methods [2, 12, 41] have achieved great improvements in recent years, there are still many issues to be addressed due to the challenging characteristic of scene texts, including varied shape, texture, scale, _etc_. Segmentation-based methods [37, 33, 12] have sparked a new wave of arbitrary shape text detection that locate text regions by a pixel-level prediction for enhancing the robustness to shape variations. However, there are still two main problems that remain to be explored. One problem is that segmentation-based methods tend to fail in separating adjacent text instances in image. To solve this problem, existing methods [19, 34, 30, 40] usually shrink annotation boundaries as kernels (_e.g_., text kernel [34], text center region [19]) to distinguish different text instances. For rebuilding a complete text, these methods usually need to merge the pixels in text regions to kernels by pre-defined expansion rules or auxiliary information (_e.g_., similarity vector [34]). However, the merging process in [37, 33] are always performed by pixel-to-pixel, which is complex and inefficient. The other problem is that the final detected contours of texts in existing segmentation-based methods usually contain a lot of defects and noises. This because the performance of existing segmentation-based methods [4, 12, 33, 34] greatly relies on the accuracy of contour detection, neglecting adaptively adjusting detected contours. Different from generic object instances, text instances usually don’t have closed contours and often contain a lot of background noisy pixels in coarse-grained boundary annotations. These will generate unpredictable results of pixels, especially those near boundaries, resulting in a lot of noises and defects in segmentation results. To tackle the above-mentioned problems, we propose a novel adaptive boundary proposal network for arbitrary shape text detection, which can learn to directly produce accurate boundary for arbitrary shape text without any post- processing. Our adaptive boundary proposal network is mainly composed of a boundary proposal model and an adaptive boundary deformation model. The boundary proposal model is composed of multi-layer dilated convolutions, which will predict a classification map, a distance field, and a direction field based on shared convolutions. Inspired by RPN [25], we adopt the distance field and pixel classification map to generate coarse boundary proposals as shown in Fig. 1 (a). These coarse boundary proposals can roughly locate texts, and well separate adjacent texts because they are always slimmer than their boundary annotations in our method. To refine the coarse proposals, we adopt an innovative adaptive boundary deformation model to perform iterative boundary deformation for generating accurate text instance shape under the guidance of prior information (classification map, distance field and direction field). For fully excavating and exploiting topology and sequence context in each boundary proposal, the adaptive boundary deformation model adopt an encoder-decoder structure, in which the encoder mainly consists of a GCN and a RNN (B-LSTM). Notably, the proposed method is a unified end-to-end trainable framework with iterative optimization. Extensive experiments demonstrate that our method achieves state-of-the-art performance on several publicly available datasets. In summary, the main contributions of this paper are three-fold: * • We propose a novel unified end-to-end trainable framework for arbitrary shape text detection, which can directly generate accurate boundaries of arbitrary shape texts without any post-processing. * • We propose an adaptive boundary deformation model which can perform iterative boundary deformation for refining text boundary. * • Extensive experiments on public available datasets demonstrate the state-of- the-art performance of our method. Figure 2: Framework of our method. Our network mainly consists of shared convolutions, boundary proposal model, and adaptive boundary deformation model, which is a unified end-to-end trainable framework with iterative optimization. ## 2 Related Work Regression-Based Methods. Methods of this type rely on box-regression based object detection frameworks with word-level and line-level prior knowledge [22, 10, 13, 42, 40, 8]. Different from generic objects, texts are often presented in irregular shapes with various aspect ratios. To deal with this problem, RRPN [22] and Textboxes++ [10] localized text boxes by predicting the offsets from anchors. Different from these methods localizing text regions by implementing refinement on pre-defined anchors, EAST [42] and DDR [7] directly regressed the offsets from boundaries or vertexes to the current point for accurate and efficient text detection. Although regression-based methods have achieved good performance in quadrilateral text detection, they often can’t well adapt to arbitrary shape text detection. CC-Based Methods. The Connected Component (CC) based methods [39, 26, 5, 2, 41] usually detect individual text parts or characters firstly, followed by a link or group post-processing procedure for generating final texts. CRAFT [2] detected text regions by exploring affinities between characters. TextDragon [5] first detected the local region of the text, and then groups them by their geometric relations. Zhang _et al_. [41] used a graph convolution neural network (GCN) to learn and infer the linkage relationships of text components to group text components. Although CC-based methods have a more flexible representation that can adapt to irregular shape text well, the complex post- processing for grouping text components to complete texts is always time- consuming and unsatisfied. Segmentation-Based Methods. Methods of this type [33, 37, 34, 12, 20] mainly draw inspiration from semantic segmentation methods and detect texts by estimating word bounding areas. To effectively distinguish adjacent text, PSENet [33] adopted a progressive scale algorithm to gradually expand the pre- defined kernels. In [34], Wang _et al_. proposed an efficient arbitrary shape text detector, named Pixel Aggregation Network (PAN), which is equipped with a low computational-cost segmentation head and learnable post-processing. DB [12] performed an adaptive binarization process in a segmentation network, which simplifies the post-processing and enhances the detection performance. However, the performances of these methods are strongly affected by the quality of segmentation accuracy. Contour-based methods. In addition to the above methods, Contour-based methods also have attracted many researchers [21, 35, 32, 36]. Yao _et al_. [21] detected texts by predicting the corner of texts, and Lyu _et al_. [35] adopted a similar architecture as SSD [16] and rebuilt text with predicted corner points. Wang _et al_. [32] proposed an end-to-end approach toward arbitrary shape text spotting, which proposed a boundary point detection network to locate the text boundary in the text proposal region. ContourNet [36] represented text region with a set of contour points, which adopted a Local Orthogonal Texture-aware Module (LOTM) to model the local texture information of proposal features in two orthogonal directions for generating contour points. However, compared with segmentation-based methods, the contour-based method has a big gap in detection performance and speed without recognition information. ## 3 Proposed Method ### 3.1 Overview The framework of our method is illustrated in Fig. 2. The ResNet-50 [6] is adopted to extract features. To preserve spatial resolution and take full advantage of multi-level information, we exploit a multi-level feature fusion strategy (similar to FPN [14]), as shown in Fig. 3. The boundary proposal model composed of multi-layer dilated convolutions uses the shared features for performing text pixels classification, generating the distance field and direction field [37]. Then, we use these information to produce coarse boundary proposals. Each boundary proposal consists of $N$ points, representing a possible text instance. For refining the coarse proposals, an adaptive boundary deformation model is proposed to perform iterative boundary deformation for obtaining the more accurate text boundaries under the guidance of prior information (classification map, distance field, and direction field). Figure 3: Architecture of shared convolutions, $F_{S}$ denotes the shared features and $F_{p}$ denotes the prior information (classification map, distance field, and direction field). ### 3.2 Adaptive Boundary Proposal Network Figure 4: Illustration of boundary proposal generation. Figure 5: Illustration of ground truths for boundary proposal model, and the unit vector $(\stackrel{{\scriptstyle\rightarrow}}{{x}},\stackrel{{\scriptstyle\rightarrow}}{{y}})$ in (e) and (f) is a vector representation of direction field in (c). #### 3.2.1 Boundary Proposal Generation The boundary proposal model is composed of multi-layer dilated convolutions, include two $3\times 3$ convolution layers with different dilation rates and one $1\times 1$ convolution layers, as shown in Fig. 2. It will use the shared features extracted from the backbone network to generate classification map, distance field map, and direction field map. Similar to other text detection methods [42, 19, 41], the classification map contains a classification confidence of each pixel (text/non-text). As in [37, 31], the direction field map ($V$) consists of a two-dimensional unit vector ($\stackrel{{\scriptstyle\rightarrow}}{{x}},\stackrel{{\scriptstyle\rightarrow}}{{y}}$), which indicates the direction of each text pixel in boundary to its nearest pixel on boundary (pixel-to-boundary). For each pixel $p$ inside a text instance $T$ , we will find its nearest pixel $B_{p}$ on text boundary, as shown in Fig. 5. Then, a two-dimensional unit vector $\mathcal{V}_{gt}(p)$ that points away from the text pixel $p$ to $B_{p}$ can be formulated as $\mathcal{V}_{gt}(p)\;=\;\left\\{\begin{matrix}\ \overrightarrow{B_{p}p}/\left|\overrightarrow{B_{p}p}\right|,&p\in\mathbb{T}\\\ \\\ (0,0),&p\not\in\mathbb{T}\end{matrix}\right.$ (1) where $\left|\overrightarrow{B_{p}p}\right|$ represents the distance between $B_{p}$ and text pixel $p$, and $\mathbb{T}$ represent the total set of text instances in an image. For the non-text area ($p\not\in\mathbb{T}$), we represent those pixels with $(0,0)$. The unit vector $\mathcal{V}_{gt}(p)$ not only directly encodes approximately relative location of $p$ inside $T$ and highlights the boundary between adjacent text instances [37], but also provides direction indication information for boundary deformation. For boundary deformation, the relative position distance information is as important as the direction information. In this work, the distance field map ($\mathcal{D}$) is a normalized distance map, and the normalized distance of the text pixel $p$ to nearest pixel $B_{p}$ on text boundary is defined as $\mathcal{D}_{gt}(p)\;=\;\left\\{\begin{matrix}\ \left|\overrightarrow{B_{p}p}\right|/L,&p\in\mathbb{T}\\\ \\\ 0,&p\not\in\mathbb{T}\end{matrix}\right.$ (2) For the non-text area ($p\not\in\mathbb{T}$), we represent the distance of those pixels with $0$. $L$ represents the scale of text instance $T$ where the pixel $p$ is located, and is defined as $L=max(D_{gt}(p));\quad p\in T,$ (3) $\mathcal{D}_{gt}(p)$ not only directly encodes the relative distance of $p$ inside $T$ and further highlights the boundary between adjacent text instances, but also provides a relative distance information for boundary deformation. With the distance field map ($\mathcal{D}$), we can generate candidate boundary proposals by using a fixed threshold ($th_{d}$) to the predicted distance, as shown in Fig. 4 (b). However, these candidate boundary proposals inevitably contains false detections. Hence, we calculate the average confidence of each candidate boundary proposal according to the classification map for removing some of them with low confidence ($th_{s}$), as shown in Fig. 4 (c) and (d). #### 3.2.2 Adaptive Boundary Deformation Inspired by interactive annotation of object segmentation methods [1, 15] and instance segmentation method [23], we perform arbitrary shape text detection by deforming a boundary proposal to a more accurate text boundary. Specifically, we take a boundary as input based on CNN features and predict per-vertex offsets pointing to the text boundary. In [1], the authors use a Recurrent Neural Network to model the sequence of 2D vertices of the polygon outlining an object. Afterwards, they propose a method [15] to treat the location of each control point as a continuous random variable, and learn to predict these variables via a Graph Neural Network that takes image evidence as input. Inspired by [1, 15], DeepSnake [23] performs object segmentation by deforming an initial contour to object boundary with circular convolution which consists of multi-layer 1-D convolutions with $1\times N$ kernel size. However, these methods only consider individual topology context or sequence context, which isn’t highly satisfactory for text detection. For the unique properties of texts, both topology context and sequence context are important in detection. For each boundary proposal, we will uniformly sample $N$ control points for facilitating batch processing. As shown in Fig. 2, the sampled control points form a closed polygon in which topology context and sequence context are co- existing. To fully exploit the boundary topology and sequence context, we introduce an adaptive boundary deformation model combined with GCN and RNN, which can efficiently perform feature learning and iterative boundary deformation for refining coarse text boundaries. Let $cp_{i}=[x_{i},y_{i}]^{T}$ denote the location of the $i$-th control point, and $p=\\{{p}_{0},{p}_{1},...,{p}_{N-1}\\}$ be the set of all control points. For a boundary proposal with $N$ control points, we first construct feature vectors for each control point. The input feature $f_{i}$ for a control point $cp_{i}$ is a concatenation of 32-D shared features $F_{s}$ obtained by CNN backbone and 4-D prior features $F_{p}$ (_e.g_., pixels classification, distance field and direction field). Therefore, the features of a control point are extracted from the corresponding location in $F:f_{i}=concat\\{F_{s}(x_{i},y_{i}),F_{p}(x_{i},y_{i})\\}$. Here, $F_{s}(x_{i},y_{i})$ and $F_{p}(x_{i},y_{i})$ are computed by bilinear interpolation. After obtaining the feature matrix $X$ (size: $N\times C$) of boundary proposal, we adopt the adaptive deformation model based on an encoder-decoder architecture to perform efficient feature learning and iterative boundary deformation. The encoder model is combined with GCN and RNN for feature learning, which can fully exploit and fuse the boundary topology and sequence context. As shown in Fig. 2, the encoder model can be formulated as $X^{{}^{\prime}}=RNN(X)\oplus GCN(X)\oplus Conv_{1\times 1}(X)$ (4) where “$\oplus$” refers to the concatenation operation; RNN is consisted of one-layer B-LTSM with 128 hidden size; $Conv_{1\times 1}$ consists of one- layer $1\times 1$ convolution layers with 128 dimensions, which form a residual connection like RestNet [6]; GCN is consisted of four graph convolution layers activated by ReLU, and the graph convolution layer in our method is formulated as $\displaystyle\mathbb{X}_{g}=ReLU((\mathbb{X}\oplus\mathbb{G}\mathbb{X})\mathbb{W}),$ (5) $\displaystyle\mathbb{G}=\mathbb{\tilde{D}}^{-1/2}\mathbb{\tilde{A}}\mathbb{\tilde{D}}^{-1/2},$ (6) where $\mathbb{X}\in\Re^{N\times d_{i}},\mathbb{X}_{g}\in\Re^{N\times d_{o}}$, $d_{i}/d_{o}$ is the dimension of in/out features, and $N$ is the number of control points; $\mathbb{G}$ is a symmetric normalized Laplacian of size $N\times N$; $W$ is a layer-specific trainable weight matrix; $\tilde{A}=A+I_{N}$ is an adjacency matrix of the local graph with added self- connections; $I_{N}$ is the identity matrix and $\mathbb{\tilde{D}}$ is a diagonal matrix with $\tilde{D}_{ii}=\sum_{j}\tilde{A}_{ij}$. We form $A$ by connecting each control point in $p$ with its four neighbors. The decoder in adaptive deformation model consists of three-layer $1\times 1$ convolutions with ReLU, which will learn to predict offsets between control points and the target points. To obtain the more accurate text boundary, we perform iterative boundary deformation, as shown in Fig. 2. ### 3.3 Optimization In this work, the total loss $\mathcal{L}$ can be formulated as $\mathcal{L}=\mathcal{L}_{Bp}+\dfrac{\lambda*\mathcal{L}_{Bd}}{1+e^{(i-eps)/eps}},$ (7) where $\mathcal{L}_{Bp}$ is a loss for the boundary proposal model, and $\mathcal{L}_{Bd}$ is a loss for the adaptive boundary deformation model; $eps$ denotes the maximum epoch of training, and $i$ denote the $i$-th epoch in train. In our experiments, $\lambda$ is set to 0.1. In Eq. 7, $\mathcal{L}_{Bp}$ is computed as $\mathcal{L}_{Bp}=\mathcal{L}_{cls}+\alpha*\mathcal{L_{D}}+\mathcal{L_{V}},$ (8) where $\mathcal{L}_{cls}$ is a cross-entropy classification loss for pixels classification, and $\mathcal{L_{D}}$ is a $L_{2}$ regression loss for distance field. OHEM [27] is adopted for $\mathcal{L}_{cls}$ and $\mathcal{L_{D}}$ in which the ratio between the negatives and positives is set to 3:1. To balance the losses in $\mathcal{L}_{Bp}$, the weights $\alpha$ is set to 3.0. Similar to [31], $\mathcal{L_{V}}$ consists of $L_{2}$-norm distance and angle distance for direction field $\mathcal{V}$: $\mathcal{L_{V}}=\sum_{p\in\Omega}{w(p){\|\mathcal{V}_{p}-\hat{\mathcal{V}}_{p}\|}_{2}}+\frac{1}{\mathbb{T}}\sum_{p\in\mathbb{T}}(1-\cos(\mathcal{V}_{p},\hat{\mathcal{V}}_{p})),$ (9) where $\Omega$ represents image domain; the weight ($w(p)=1/\sqrt{|GT_{p}|}$) at pixel $p$ is proportional to the inverse square root of the size of ground truth segment $GT_{p}$ containing $p$. $\mathcal{L}_{Bd}$ is a point matching loss similar to [15]. In this work, the prediction and ground truth control point sets have equal sized and similar order (counter-clockwise), denoted as $\textbf{p}=\\{p_{0},p_{1},\cdots,p_{N-1}\\}$, and $\textbf{p}^{\prime}=\\{p^{\prime}_{0},p^{\prime}_{1},\cdots,p^{\prime}_{N-1}\\}$ ($N$ is the number of points), respectively. Hence, the matching loss for p and $\textbf{p}^{\prime}$ is defined as $\mathcal{L}_{(\textbf{p},\textbf{p}^{\prime})}=\min_{j\in[0\cdots,N-1]}\sum_{i=0}^{N-1}{smooth_{L1}(p_{i},p^{\prime}_{(j+i)\%N})},$ (10) Because there is usually more than one text instance in an image, $\mathcal{L}_{Bd}$ is defined as $\mathcal{L}_{Bd}=\frac{1}{\mathbb{T}}\sum_{p\in\mathbb{T}}\mathcal{L}_{(\textbf{p},\textbf{p}^{\prime})},$ (11) where $\mathbb{T}$ represents all the text instances in an image, p represents the control point set for text instance $T$ ($T\in\mathbb{T}$). ## 4 Experiments ### 4.1 Datasets Total-Text: It consists of $1,255$ training and $300$ testing complex images, including horizontal, multi-oriented, and curved text with polygon and word- level annotations. CTW-1500: It consists of $1,000$ training and $500$ testing images, and curved text instances are annotated by polygons with 14 vertices. MSRA-TD500: It consists of $500$ training and $200$ testing images, including English and Chinese texts which contain multi-lingual long texts with multi- orientations. SynthText: It contains 800k synthetic images generated by blending natural images with artificial text which are all word-level annotated . ICDAR2017-MLT: It consists of $7,200$ training images, $1,800$ validation images, and $9,000$ test images with multi-lingual ($9$ languages) texts annotated by quadrangle. Table 1: Ablation experiments for deformation model on Total-Text and CTW-1500. The best score is highlighted in bold. Methods | Total-Text | CTW-1500 ---|---|--- Recall | Precision | F-measure | FPS | Recall | Precision | F-measure | FPS FC | 81.56 | 90.16 | 85.65 | 9.52 | 78.32 | 85.03 | 81.54 | 11.13 RNN | 83.31 | 87.71 | 85.93 | 11.15 | 81.26 | 86.00 | 83.56 | 12.22 Circular convolution | 82.80 | 89.73 | 86.13 | 9.33 | 80.35 | 84.88 | 82.55 | 10.89 Graph convolution | 82.74 | 89.94 | 86.19 | 10.42 | 80.31 | 86.12 | 83.12 | 11.94 Adaptive deformation | 83.30 | 90.76 | 86.87 | 10.56 | 80.57 | 87.66 | 83.97 | 12.08 ### 4.2 Implementation Details In our experiments, we first pre-train our network on SynthText by one epochs, in which images are randomly cropped and resized to $512\times 512$. In pre- training, the Adam [9] optimizer is applied with a fixed learning rate of $0.001$, and a mini-batch is set to 16. In fine-tuning, we randomly crop the text region, and resize them to $640\times 640$ for training the model with the mini-batch 12. The Adam [9] optimizer is adopted, in which the initial learning rate is $0.001$ and decreased to $0.9$ of the original after each 50 epochs. The data augmentation includes: random rotation with an angle (sampled by Gaussian distribution in ($-60^{\circ},60^{\circ}$)), random cropping, and random flipping. In inference, we keep the aspect ratio of test images, then resize and pad them into the same size for testing. The code is implemented with PyTorch 1.7 and python 3. Training is performed on single GPU (RTX-3090), and testing is performed on single GPU (GeForce RTX-2080) with Intel Xeon Silver 4108 CPU @ 1.80GHz. ### 4.3 Ablation Study In ablation experiments, we only train the model on corresponding real-world datasets for 660 epochs without pre-training, and the other training settings are identical with the fine-tuning process in Sec 4.2. In testing, the short side of an image is scaled to 640, and ensure that the long side doesn’t exceed 1,024. The threshold $th_{d}$ and $th_{s}$ are set to 0.3 and 0.8, respectively. Effectiveness of adaptive deformation model. To verify the effectiveness of the adaptive deformation model, we conduct ablation experiments on Total-Text and CTW-1500. Our deformation model consists of an encoder and a decoder. For fair comparison, we use a lightweight full connection network (FC) structure as decoder, and we adopt four types of encoder, _i.e_., FC with $Conv_{1\times 1}$, RNN, circular convolution, and graph convolution (GCN), for conducting comparative experiments. As listed in Tab. 1, our adaptive deformation model achieves the best performance compared with the other four methods on both Total-Text and CTW-1500, which achieves improvements by $0.94\%$ in terms of F-measure on Total-Text compared with RNN, and by $0.85\%$ in terms of F-measure on Total-Text compared with GCN. Moreover, our adaptive deformation model doesn’t bring obvious more consume of detection time. Figure 6: Experimental results of control point number (N). (a) boundary proposals (b) iter 1 (c) iter 2 (d) iter 3 Figure 7: Visual results of different iterations. The blue contours are boundary proposals, and the green contours are detection boundaries after iterative deformation. Influence of control point number ($N$). We study the influence of the control point number ($N$) by setting the number of control point number from 12 to 32 with an interval of 4. The models are evaluated on Total-Text and CTW-1500. From Fig. 6, we can find that the F-measures drops when $N$ is too large or too small. Especially, too few control points will make great degradation of performance. This is because the detection boundary often can’t correctly cover the whole text when the control number is too small. Apparently, our model achieves the best detection performance on both two datasets while the number of control points is around 20. Therefore, in our experiments, the number of control points is fixed at 20. Table 2: Experimental results of different iterations on CTW-1500. | Iter. 1 | Iter. 2 | Iter. 3 ---|---|---|--- F-measure | 82.24 | 83.33 | 83.97 Speed (fps) | 13.68 | 12.83 | 12.08 Influence of iteration number. To fully validate the influence of iteration number, we further compare models with different inference iterations. As listed in Tab. 2, with the increase of the number of iterations, the detection performance is gradually improved but the inference speed of our model is gradually dropped. When the number of iterations is from 2 to 3, the increase of detection performance is not very obvious. Considering the balance of speed and performance, the number of iterations is set to 3 by default in our experiments. As shown in Fig. 7, the detection boundaries become more accurate along with the increase of iterations. Table 3: Ablation study for classification map (cls), distance field (dis), and direction field (dir) on Total-Text. cls | dis | dir | Recall | Precision | F-measure ---|---|---|---|---|--- $\checkmark$ | $\times$ | $\times$ | 76.96 | 83.01 | 79.87 $\checkmark$ | $\checkmark$ | $\times$ | 81.97 | 88.95 | 85.32 $\checkmark$ | $\checkmark$ | $\checkmark$ | 83.30 | 90.76 | 86.87 Influence of prior information. We conduct ablation studies on Total-Text to verify the importance of each prior information (_e.g_., classification map, distance field and direction field). As listed in Tab. 3, the detection performance is unsatisfactory when only use classification map. Once distance field and direction field are introduced, the performance is improved significantly, and F-measure is improved by $5.45\%$ and $1.55\%$, respectively. Table 4: Experimental results on Total-Text for different resolution FPN. “R”, “P”, and “F” represent Recall, Precision, and F-measure, respectively. Methods | R | P | F | FPS ---|---|---|---|--- FPN-P1 (${1}/{1}$) | 83.30 | 90.76 | 86.87 | 10.56 FPN-P1 (${1}/{2}$) | 82.63 | 90.75 | 86.50 | 12.68 FPN-P2 (${1}/{4}$) | 82.99 | 89.51 | 86.13 | 15.17 Influence of different resolution FPN. We have conducted experiments without any pre-training to explore the influence of using the different resolution FPN-layer as the shared features. In Tab. 4, FPN-P2 (${1}/{4}$) means that we use the FPN-P2 layer as the shared features (the resolution of FPN-P2 is ${1}/{4}$ of the original document image). From Tab. 4, we can see that FPN-P1 and FPN-P2 both achieve the state-of-the-art performance on Total-Text. (a) Total-Text (b) Total-Text (c) CTW-1500 (d) CTW-1500 Figure 8: Visual experimental results. The blue contours are boundary proposals, and the green contours are final detection boundaries. Table 5: Experimental results on Total-Text. ‘Ext’ denotes that the extra pre-training data is used. ‘Syn’/ ‘MLT’ means SynthText or ICDAR2017-MLT dataset are used for pre-training, and ‘MLT+’ means there are other pre-training data besides MLT. Methods | Ext | R | P | F | FPS ---|---|---|---|---|--- TextSnake [19] | Syn | 74.5 | 82.7 | 78.4 | - ATTR [35] | - | 76.2 | 80.9 | 78.5 | 10.0 MSR [38] | Syn | 85.2 | 73.0 | 78.6 | 4.3 CSE [18] | MLT | 79.7 | 81.4 | 80.2 | 0.42 TextDragon [5] | MLT+ | 75.7 | 85.6 | 80.3 | - TextField [37] | Syn | 79.9 | 81.2 | 80.6 | 6.0 PSENet-1s [33] | MLT | 77.96 | 84.02 | 80.87 | 3.9 SegLink++ [28] | Syn | 80.9 | 82.1 | 81.5 | - LOMO [40] | Syn | 79.3 | 87.6 | 83.3 | 4.4 CRAFT [2] | Syn | 79.9 | 87.6 | 83.6 | - DB [12] | Syn | 82.5 | 87.1 | 84.7 | 32.0 PAN [34] | Syn | 81.0 | 89.3 | 85.0 | 39.6 TextPerception[24] | Syn | 81.8 | 88.8 | 85.2 | - ContourNet [36] | - | 83.9 | 86.9 | 85.4 | 3.8 DRRG [41] | MLT | 84.93 | 86.54 | 85.73 | - Boundary [32] | Syn | 85.0 | 88.9 | 87.0 | - Ours | - | 83.30 | 90.76 | 86.87 | 10.56 Ours | Syn | 84.65 | 90.27 | 87.37 | 10.28 Ours | MLT | 85.19 | 90.67 | 87.85 | 10.69 ### 4.4 Comparison with the state-of-the-arts We compare our method with the previous state-of-the-art methods on Total- Text, CTW-1500 and MSRA-TD500. In testing, the short side of the images is scaled to 640, and the long side will be suppressed in 1,024. The threshold $th_{d}$ for obtaining the candidate boundary proposals with distance filed is fixed to 0.3. Table 6: Experimental results on CTW-1500. Methods | Ext | R | P | F | FPS ---|---|---|---|---|--- TextSnake [19] | Syn | 85.3 | 67.9 | 75.6 | - CSE [18] | MLT | 76.1 | 78.7 | 77.4 | 0.38 LOMO[40] | Syn | 76.5 | 85.7 | 80.8 | 4.4 ATRR[35] | Sy- | 80.2 | 80.1 | 80.1 | - SegLink++ [28] | Syn | 79.8 | 82.8 | 81.3 | - TextField [37] | Syn | 79.8 | 83.0 | 81.4 | 6.0 MSR[38] | Syn | 79.0 | 84.1 | 81.5 | 4.3 PSENet-1s [33] | MLT | 79.7 | 84.8 | 82.2 | 3.9 DB [12] | Syn | 80.2 | 86.9 | 83.4 | 22.0 CRAFT [2] | Syn | 81.1 | 86.0 | 83.5 | - TextDragon [5] | MLT+ | 82.8 | 84.5 | 83.6 | - PAN [34] | Syn | 81.2 | 86.4 | 83.7 | 39.8 ContourNet [36] | - | 84.1 | 83.7 | 83.9 | 4.5 DRRG [41] | MLT | 83.02 | 85.93 | 84.45 | - TextPerception[24] | Syn | 81.9 | 87.5 | 84.6 | - Ours | - | 80.57 | 87.66 | 83.97 | 12.08 Ours | Syn | 81.45 | 87.81 | 84.51 | 12.15 Ours | MLT | 83.60 | 86.45 | 85.00 | 12.21 Total-Text. In testing, the threshold $th_{s}$ is set to 0.825. The quantitative results are listed in Tab. 5. From Tab. 5, we can find that our method achieves $87.37\%$ in terms of F-measure when pre-trained on SynthText, and $87.85\%$ in the item of F-measure when pre-trained on MLT17. Obviously, our method significantly outperform other methods with a great margin. From the visible results in Fig. 8 (a) and Fig. 8 (b), we can observe that our method can precisely detect word-level irregular texts. CTW-1500. In testing, the threshold $th_{s}$ is set to 0.8. Representative visible results are shown in Fig. 8 (c) and (d), which indicate our method precisely detects boundaries of long curved text with line-level. The quantitative results are listed in Tab. 6. Compared with the previous sate-of- the-art methods [12, 34, 36], our approach achieves promising performance of both precision ($87.81\%$) and F-measure ($85.0\%$). Specifically, our method greatly outperforms TextSnake [19] and DB [12] on CTW-1500 in item of F-measure by $9.4\%$ and $1.6\%$, respectively. Table 7: Experimental results on MSRA-TD500. Methods | R | P | F | FPS ---|---|---|---|--- SegLink [26] | 70.0 | 86.0 | 77.0 | 8.9 PixelLink [4] | 73.2 | 83.0 | 77.8 | - TextSnake [19] | 73.9 | 83.2 | 78.3 | 1.1 TextField [37] | 75.9 | 87.4 | 81.3 | 5.2 MSR[38] | 76.7 | 87.4 | 81.7 | - FTSN [3] | 77.1 | 87.6 | 82.0 | - LSE[30] | 81.7 | 84.2 | 82.9 | - CRAFT [2] | 78.2 | 88.2 | 82.9 | 8.6 MCN [17] | 79 | 88 | 83 | - ATRR[35] | 82.1 | 85.2 | 83.6 | - PAN [34] | 83.8 | 84.4 | 84.1 | 30.2 DB[12] | 79.2 | 91.5 | 84.9 | 32.0 DRRG [41] | 82.30 | 88.05 | 85.08 | - Ours (Syn) | 80.68 | 85.40 | 82.97 | 12.68 Ours (MLT) | 84.54 | 86.62 | 85.57 | 12.31 MSRA-TD500. In testing, the threshold $th_{s}$ is set to 0.925. The quantitative comparisons with other methods on this dataset is listed in Tab. 7. From Tab. 7, we can conclude that our method successfully detects long text lines of arbitrary orientations and sizes. Notably, our method achieves $85.57\%$ in terms of F-measure, which outperforms other sate-of-the-art methods, such as DB [12], DRRG [41], _etc_. ## 5 Conclusion In this paper, we propose a novel adaptive boundary proposal network for arbitrary shape text detection, which adopt an boundary proposal model to generate coarse boundary proposals, and then adopt an adaptive boundary deformation model combined with GCN and RNN to perform iterative boundary deformation to obtain the more accurate text instance shape. Extensive experiments show that the proposed method can precisely detects the boundaries of arbitrary shape text in challenging datasets. In future study, we are interested in developing a real time method for text of arbitrary shapes based on current work. Acknowledgements. This work was supported in part by the National Key R&D Program of China (2020AAA09701), National Natural Science Foundation of China (62006018, 62076024). ## References * [1] David Acuna, Huan Ling, Amlan Kar, and Sanja Fidler. Efficient interactive annotation of segmentation datasets with polygon-rnn++. In CVPR, pages 859–868, 2018. * [2] Youngmin Baek, Bado Lee, Dongyoon Han, Sangdoo Yun, and Hwalsuk Lee. Character region awareness for text detection. In CVPR, pages 9365–9374, 2019. * [3] Yuchen Dai, Zheng Huang, Yuting Gao, Youxuan Xu, Kai Chen, Jie Guo, and Weidong Qiu. Fused text segmentation networks for multi-oriented scene text detection. In ICPR, pages 3604–3609, 2018. * [4] Dan Deng, Haifeng Liu, Xuelong Li, and Deng Cai. PixelLink: Detecting scene text via instance segmentation. In AAAI, pages 6773–6780, 2018. * [5] Wei Feng, Wenhao He, Fei Yin, Xu-Yao Zhang, and Cheng-Lin Liu. Textdragon: An end-to-end framework for arbitrary shaped text spotting. In ICCV, pages 9075–9084, 2019. * [6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, pages 770–778, 2016. * [7] Wenhao He, Xu-Yao Zhang, Fei Yin, and Cheng-Lin Liu. Deep direct regression for multi-oriented scene text detection. In ICCV, pages 745–753, 2017. * [8] Jie-Bo Hou, Xiaobin Zhu, Chang Liu, Kekai Sheng, Long-Huang Wu, Hongfa Wang, and Xu-Cheng Yin. HAM: hidden anchor mechanism for scene text detection. IEEE Trans. Image Process., 29:7904–7916, 2020. * [9] Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. In ICLR, 2015. * [10] Minghui Liao, Baoguang Shi, and Xiang Bai. Textboxes++: A single-shot oriented scene text detector. IEEE Trans.Image Processing, 27(8):3676–3690, 2018. * [11] Minghui Liao, Baoguang Shi, Xiang Bai, Xinggang Wang, and Wenyu Liu. Textboxes: A fast text detector with a single deep neural network. In AAAI, pages 4161–4167, 2017. * [12] Minghui Liao, Zhaoyi Wan, Cong Yao, Kai Chen, and Xiang Bai. Real-time scene text detection with differentiable binarization. In AAAI, pages 11474–11481, 2020. * [13] Minghui Liao, Zhen Zhu, Baoguang Shi, Gui-Song Xia, and Xiang Bai. Rotation-sensitive regression for oriented scene text detection. In CVPR, pages 5909–5918, 2018. * [14] Tsung-Yi Lin, Piotr Dollár, Ross B. Girshick, Kaiming He, Bharath Hariharan, and Serge J. Belongie. Feature pyramid networks for object detection. In CVPR, pages 936–944, 2017. * [15] Huan Ling, Jun Gao, Amlan Kar, Wenzheng Chen, and Sanja Fidler. Fast interactive object annotation with curve-gcn. In CVPR, pages 5257–5266, 2019. * [16] Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott E. Reed, Cheng-Yang Fu, and Alexander C. Berg. SSD: Single shot multibox detector. In ECCV, pages 21–37, 2016. * [17] Zichuan Liu, Guosheng Lin, S.Yang, Jiashi Feng, Weisi Lin, and Wang Ling Goh. Learning markov clustering networks for scene text detection. In CVPR, pages 6936–6944, 2018. * [18] Zichuan Liu, Guosheng Lin, Sheng Yang, Fayao Liu, Weisi Lin, and Wang Ling Goh. Towards robust curve text detection with conditional spatial expansion. In CVPR, pages 7269–7278, 2019. * [19] Shangbang Long, Jiaqiang Ruan, Wenjie Zhang, Xin He, Wenhao Wu, and Cong Yao. Textsnake: A flexible representation for detecting text of arbitrary shapes. In ECCV, pages 19–35, 2018. * [20] Pengyuan Lyu, Minghui Liao, Cong Yao, Wenhao Wu, and Xiang Bai. Mask TextSpotter: An end-to-end trainable neural network for spotting text with arbitrary shapes. In ECCV, pages 71–88, 2018. * [21] Pengyuan Lyu, Cong Yao, Wenhao Wu, Shuicheng Yan, and Xiang Bai. Multi-oriented scene text detection via corner localization and region segmentation. In CVPR, pages 7553–7563, 2018. * [22] Jianqi Ma, Weiyuan Shao, Hao Ye, Li Wang, Hong Wang, Yingbin Zheng, and Xiangyang Xue. Arbitrary-oriented scene text detection via rotation proposals. IEEE Trans. Multimedia, 20(11):3111–3122, 2018. * [23] Sida Peng, Wen Jiang, Huaijin Pi, Xiuli Li, Hujun Bao, and Xiaowei Zhou. Deep snake for real-time instance segmentation. In CVPR, pages 8530–8539. IEEE, 2020. * [24] Liang Qiao, Sanli Tang, Zhanzhan Cheng, Yunlu Xu, Yi Niu, Shiliang Pu, and Fei Wu. Text perceptron: Towards end-to-end arbitrary-shaped text spotting. In AAAI, pages 11899–11907, 2020. * [25] Shaoqing Ren, Kaiming He, Ross B. Girshick, and Jian Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell., 39(6):1137–1149, 2017\. * [26] Baoguang Shi, Xiang Bai, and Serge J. Belongie. Detecting oriented text in natural images by linking segments. In CVPR, pages 3482–3490, 2017. * [27] Abhinav Shrivastava, Abhinav Gupta, and Ross B. Girshick. Training region-based object detectors with online hard example mining. In CVPR, pages 761–769, 2016. * [28] Jun Tang, Zhibo Yang, Yongpan Wang, Qi Zheng, Yongchao Xu, and Xiang Bai. Seglink++: Detecting dense and arbitrary-shaped scene text by instance-aware component grouping. Pattern Recognition, 96, 2019. * [29] Zhi Tian, Weilin Huang, Tong He, Pan He, and Yu Qiao. Detecting text in natural image with connectionist text proposal network. In ECCV, pages 56–72, 2016. * [30] Zhuotao Tian, Michelle Shu, Pengyuan Lyu, Ruiyu Li, Chao Zhou, Xiaoyong Shen, and Jiaya Jia. Learning shape-aware embedding for scene text detection. In CVPR, pages 4234–4243, 2019. * [31] Jianqiang Wan, Yang Liu, Donglai Wei, Xiang Bai, and Yongchao Xu. Super-bpd: Super boundary-to-pixel direction for fast image segmentation. In CVPR, pages 9250–9259. IEEE, 2020. * [32] Hao Wang, Pu Lu, Hui Zhang, Mingkun Yang, Xiang Bai, Yongchao Xu, Mengchao He, Yongpan Wang, and Wenyu Liu. All you need is boundary: Toward arbitrary-shaped text spotting. In AAAI, pages 12160–12167, 2020. * [33] Wenhai Wang, Enze Xie, Xiang Li, Wenbo Hou, Tong Lu, Gang Yu, and Shuai Shao. Shape robust text detection with progressive scale expansion network. In CVPR, pages 9336–9345, 2019. * [34] Wenhai Wang, Enze Xie, Xiaoge Song, Yuhang Zang, Wenjia Wang, Tong Lu, Gang Yu, and Chunhua Shen. Efficient and accurate arbitrary-shaped text detection with pixel aggregation network. In ICCV, pages 8439–8448, 2019. * [35] Xiaobing Wang, Yingying Jiang, Zhenbo Luo, Cheng-Lin Liu, Hyunsoo Choi, and Sungjin Kim. Arbitrary shape scene text detection with adaptive text region representation. In CVPR, pages 6449–6458, 2019. * [36] Yuxin Wang, Hongtao Xie, Zheng-Jun Zha, Mengting Xing, Zilong Fu, and Yongdong Zhang. Contournet: Taking a further step toward accurate arbitrary-shaped scene text detection. In CVPR, pages 11753–11762, 2020. * [37] Yongchao Xu, Yukang Wang, Wei Zhou, Yongpan Wang, Zhibo Yang, and Xiang Bai. Textfield: Learning a deep direction field for irregular scene text detection. IEEE Trans. Image Processing, 28(11):5566–5579, 2019. * [38] Chuhui Xue, Shijian Lu, and Wei Zhang. MSR: multi-scale shape regression for scene text detection. In IJCAI, pages 989–995, 2019. * [39] Xu-Cheng Yin, Wei-Yi Pei, Jun Zhang, and Hong-Wei Hao. Multi-orientation scene text detection with adaptive clustering. IEEE Trans. Pattern Anal. Mach. Intell., 37(9):1930–1937, 2015\. * [40] Chengquan Zhang, Borong Liang, Zuming Huang, Mengyi En, Junyu Han, Errui Ding, and Xinghao Ding. Look more than once: An accurate detector for text of arbitrary shapes. In CVPR, pages 10552–10561, 2019. * [41] Shi-Xue Zhang, Xiaobin Zhu, Jie-Bo Hou, Chang Liu, Chun Yang, Hongfa Wang, and Xu-Cheng Yin. Deep relational reasoning graph network for arbitrary shape text detection. In CVPR, pages 9699–9708, 2020. * [42] Xinyu Zhou, C.Yao, He Wen, Yuzhi Wang, Shuchang Zhou, Weiran He, and Jiajun Liang. EAST: An efficient and accurate scene text detector. In CVPR, pages 2642–2651, 2017.
arxiv-papers
2021-07-27T08:25:24
2024-09-04T03:07:20.906384
{ "license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/", "authors": "Shi-Xue Zhang, Xiaobin Zhu, Chun Yang, Hongfa Wang, Xu-Cheng Yin", "submitter": "Shi-Xue Zhang", "url": "https://arxiv.org/abs/2107.12664" }
2107.12668
# Next-Generation Multiple Access Based on NOMA with Power Level Modulation Xinyue Pei, Yingyang Chen, Miaowen Wen, Hua Yu, Erdal Panayirci, and H. Vincent Poor, X. Pei, M. Wen, and H. Yu are with the National Engineering Technology Research Center for Mobile Ultrasonic Detection, South China University of Technology, Guangzhou 510640, China (e-mail: [email protected]; {eemwwen, yuhua}@scut.edu.cn).Y. Chen is with Department of Electronic Engineering, College of Information Science and Technology, Jinan University, Guangzhou (e-mail: [email protected]).E. Panayirci is with the Department of Electrical and Electronics Engineering, Kadir Has University, 34083 Istanbul, Turkey (e-mail: [email protected]).H. V. Poor is with the Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ 08544 USA (e-mail: [email protected]). ###### Abstract To cope with the explosive traffic growth of next-generation wireless communications, it is necessary to design next-generation multiple access techniques that can provide higher spectral efficiency as well as larger-scale connectivity. As a promising candidate, power-domain non-orthogonal multiple access (NOMA) has been widely studied. In conventional power-domain NOMA, multiple users are multiplexed in the same time and frequency band by different preset power levels, which, however, may limit the spectral efficiency under practical finite alphabet inputs. Inspired by the concept of spatial modulation, we propose to solve this problem by encoding extra information bits into the power levels, and exploit different signal constellations to help the receiver distinguish between them. To convey this idea, termed power selection (PS)-NOMA, clearly, we consider a simple downlink two-user NOMA system with finite input constellations. Assuming maximum- likelihood detection, we derive closed-form approximate bit error ratio (BER) expressions for both users. The achievable rates of both users are also derived in closed form. Simulation results verify the analysis and show that the proposed PS-NOMA outperforms conventional NOMA in terms of BER and achievable rate. ###### Index Terms: Bit error rate, next-generation multiple access (NGMA), achievable rate, finite alphabet input, non-orthogonal multiple access (NOMA). ## I Introduction Future wireless networks, such as beyond fifth-generation (B5G) or sixth- generation (6G) networks, are expected to support extremely high data rates and numerous users or nodes with various applications and services [References]. However, the conventional orthogonal access (OMA) schemes used in the previous wireless generations cannot meet these unprecedented demands, limiting the improvement of the overall spectral efficiency (SE). Against the background, non-orthogonal multiple access (NOMA) was proposed, which allows numerous users to share the same resource (e.g., a time/frequency resource block) and separate the users in power and code domains at the expense of additional receiver complexity [References], [References]. In the power-domain NOMA, users are typically multiplexed with different power levels by using superposition coding at the transmitter and are distinguished through successive interference cancellation (SIC) at the receiver [References], [References]. Compared with OMA, NOMA has higher significant system throughput and greater fairness [References]-[References]. Due to these advantages, NOMA has been recognized as a critical technology by the third-generation partnership project (3GPP) for future wireless networks [References]. It is worth noting that the majority of existing NOMA schemes assume Gaussian input signals [References]-[References]. Although Gaussian inputs can theoretically attain the channel capacity, the corresponding implementation faces many difficulties, e.g., very large storage capacity, high computational complexity, and extremely long decoding delay [References]. Applying the results derived from the Gaussian inputs to the signals with finite alphabet inputs, e.g., pulse amplitude modulation (PAM), can result in a significant performance loss [References]. Motivated by this situation, some researchers have considered finite alphabet inputs [References]-[References]. In particular, the authors of [References] studied NOMA-aided two-user Gaussian multiple access channels (MACs) with finite complex input constellations, and the constellation-constrained capacity region of the proposed scheme was derived. Moreover, they designed a constellation rotation (CR) scheme for $M$-ary phase shift keying (PSK) and $M$-PAM signals. In [References], the same authors proposed a novel power allocation scheme for the model in [References], which can achieve similar performance as the CR scheme while reducing the decoding complexity for quadrature amplitude modulation (QAM) constellations. The authors of [References] developed a novel framework for a classical two-transmitter two-receiver NOMA system over Z-channels with QAM and max-min user fairness based on the aforementioned two studies. Specifically, they formulated a max-min optimization problem to maximize the smaller minimum Euclidean distance among the two resulting signal constellations at both receivers. Similarly, in [References], the authors considered a classical two-user MAC with NOMA and practical QAM constellations, aiming at maximizing the minimum Euclidean distance of the received sum constellation with a maximum likelihood (ML) detector by controlling transmitted powers and phases of users. On the other hand, spatial modulation (SM) has been regarded as another promising multi-antenna technique of improving SE for next-generation wireless networks [References]. Unlike conventional multiple-input multiple-output (MIMO), SM selects only one activated antenna for each transmission, thus avoiding inter-antenna interference and the requirement of multiple radio frequency (RF) chains. Hence, SM systems can achieve reduced implementation cost and complexity. Precisely, in SM systems, the transmitted information consists of the index of an active antenna and a modulated symbol. Clearly, combining NOMA with SM (termed SM-NOMA) will further improve system SE without increasing the power consumption and implementation complexity. Therefore, SM- NOMA has been exploited extensively in recent years, and capacity or BER performance analysis is the focus of many works [References]-[References]. In [References], an iterative algorithm for the spatial-domain design was proposed to maximize the instantaneous capacity of SM-NOMA. The authors of [References] applied SM-NOMA in wireless vehicle-to-vehicle (V2V) environments. Moreover, they analyzed closed-form capacity expressions, and BER performance via Monte Carlo simulations and formulated a pair of power allocation optimization schemes for the system. In [References], the authors studied the BER and capacity performance of a novel three-node cooperative relaying system using SM-aided NOMA. Notably, all the above mentioned works focused on Gaussian input, which do not apply to finite input constellations. Few researchers have considered finite alphabet inputs in SM-NOMA systems [References]-[References]. The authors of [References], [References] proposed and studied the respective SM-NOMA systems from their mutual information (MI) perspective. Since the MI lacks a closed-form formulation, they proposed a lower bound to quantify it. In [References], an SM aided cooperative NOMA scheme with bit allocation was studied, and its SE was analyzed. The authors of [References] mainly investigated the fundamental applicability of SM for multi-antenna channels and found intrinsic cooperation for constructing energy-efficient finite-alphabet NOMA. However, to the best of our knowledge, all works about SM-NOMA simply considered transmitting NOMA signals in SM systems. In other words, they did not change NOMA itself. Conversely, how can we use an SM-like idea to design a novel NOMA scheme and improve its performance? Furthermore, will we be able to design the transmit power to achieve effects similar to the spatial gain in SM-NOMA? At the time of writing, no work has solved this problem. Against the background, in this paper, we propose a novel downlink NOMA scheme using power selection (PS) with finite-alphabet inputs, termed PS-NOMA, over Rayleigh fading channels, which consists of one BS and two users. At the transmitter, except for the PAM symbols intended for the users, we also design the transmit power into the codebook, thus increasing the number of bits transmitted. The main contributions of this paper are summarized as follows: * • We design a novel PS-NOMA scheme for the classical two-user downlink channel, where the transmitter randomly chooses transmit power from the preset power matrix. Nevertheless, PS makes both transmission and decoding different from previous works. To this end, we design specific constellations and the ML detector for the proposed scheme. We further discuss the influence caused by different configurations of the power matrix and give the optimal order of the matrix. Moreover, we calculate the best design for the power matrix based on the minimum Euclidean distance of the constellation. * • The performance of PS-NOMA is theoretically analyzed in terms of BER and achievable rate. We derive closed-form achievable rate expressions for PS- NOMA. Since it is difficult to derive exact BER expressions, approximate closed-form BER expressions are derived for users employing $M$-ary PAM instead, which well match with the simulation counterparts. It is worth noting that all derived results are restricted to specific constellations and Rayleigh fading channels. * • Monte Carlo simulations are performed to verify the theoretical analysis. In consideration of fairness, conventional NOMA without PS (termed NOMA) is used as a benchmark. Simulation results show that PS-NOMA outperforms NOMA in terms of BER and achievable rate. The rest of this paper is organized as follows. Section II describes the system model of PS-NOMA. Section III provides the achievable rate and BER analyses. Section IV analyzes the numerical results. Finally, we conclude the work in Section V. _Notation_ : The probability of an event and the probability density function (PDF) of a random variable are denoted by $\Pr(\cdot)$ and $p(\cdot)$, respectively. $Q(\cdot)$, $\Gamma(\cdot)$, $\mathbb{E}\\{\cdot\\}$, and $\text{Var}\\{\cdot\\}$ denote the Gaussian Q-function, gamma function, expectation, and variance, respectively. $|\cdot|$ denotes the absolute value of a complex scalar. $\lfloor\cdot\rfloor$ denotes the floor function. $\mathcal{R}\\{\cdot\\}$ indicates the real part of a complex value. Superscript $*$ stands for complex conjugates. ${\rm{I}}(\cdot)$ denotes MI, and ${\rm H}(\cdot|\cdot)$ denotes entropy. Finally, $x\sim\mathcal{N}_{c}(\mu_{x},\beta_{x})$ indicates that the random variable $x$ obeys a complex Gaussian distribution with mean $\mu_{x}$ and variance $\beta_{x}$. ## II System Model Figure 1: System model with 2 users and $N=2$. Figure 2: Constellation $\mathcal{S}_{C}(i)$ ($i\in\\{1,\cdots,8\\}$) of superimposed signal transmitted with 2-PAM signals $s_{A}$ as well as $s_{B}$ and $N=2$. ### II-A Transmission Model Before introducing PS-NOMA, let us recall the conventional downlink two-user NOMA system first. In such a system, the base station (denoted by BS) transmits a superimposed signal to the users. Based on the NOMA protocol, this signal consists of the data symbols desired by both users, and the power allocated to the symbols. In conventional NOMA systems, information is carried out only by data symbols. However, the power allocation coefficients contained in the superimposed signal can also be utilized to carry information by appropriate design. Based on this idea, we consider a downlink PS-NOMA network as illustrated in Fig. 1, which consists of a BS, a near user (denoted by $U_{A}$), a far user (denoted by $U_{B}$). All the nodes are equipped with a single antenna. The channels of BS$\rightarrow U_{A}$ and BS$\rightarrow U_{B}$ are respectively denoted by $h_{A}$ and $h_{B}$, which are assumed to follow $\mathcal{N}_{c}(0,\beta_{A})$ and $\mathcal{N}_{c}(0,\beta_{B})$ distributions. Notably, in our system, all the nodes are assumed to be synchronous in both time and frequency. Moreover, complete and perfect channel state information (CSI) is assumed to be available to users. Unlike conventional NOMA, we obtain a spectral efficiency gain by selecting a power level (PL) at the transmitter. Similar to the SM, a PL is chosen from a set of PLs $N$ at random where $N=2^{k}$, $k=1,2,\ldots$, so that each PL carries $\log_{2}(N)$ bits of information in addition to the amount of information carried by the transmitted data symbols. Noticing that $U_{A}$ is the near user and $U_{B}$ is the far user, we have $\beta_{A}\geq\beta_{B}$, and the power allocated to $U_{A}$ should be smaller than that assigned to $U_{B}$ according to the principle of NOMA [References]. In this manner, the transmit power allocation coefficient matrix can be written as $\displaystyle\textbf{P}=\left[\begin{array}[]{cc}\sqrt{p_{A}(1)},&\sqrt{1-p_{A}(1)}\\\ \sqrt{p_{A}(2)},&\sqrt{1-p_{A}(2)}\\\ \cdots&\cdots\\\ \sqrt{p_{A}(N)},&\sqrt{1-p_{A}(N)}\\\ \end{array}\right],$ (5) where the first ($0<p_{A}(l)<0.5$, $l\in\\{1,\ldots,N\\}$) and the second columns represent the power allocation coefficient for $U_{A}$ and $U_{B}$, respectively, and different rows represent different PLs. To ensure the PLs are distinguishable, we deliberately rotate each PL with a certain angle, which is given by $\bm{\Theta}=\text{diag}(\exp(0),\exp(j\pi/N),\cdots,\exp(j(N-1)\pi/N))$. Therefore, the rotated power allocation coefficient matrix can be derived as $\displaystyle\textbf{G}=\bm{\Theta}\textbf{P}=\left[\begin{array}[]{cc}\alpha_{A}(1),&\alpha_{B}(1)\\\ \alpha_{A}(2),&\alpha_{B}(2)\\\ \cdots&\cdots\\\ \alpha_{A}(N),&\alpha_{B}(N)\\\ \end{array}\right],$ (10) where $\alpha_{A}(l)=\exp(j(l-1)\pi/N)p_{A}(l)$ and $\alpha_{B}(l)=\exp(j(l-1)\pi/N)(1-p_{A}(l))$. During each transmission, the BS first chooses the PL $l\in\mathcal{N}$ $(\mathcal{N}={1,2,\cdots,N})$ as the transmit power. Subsequently, it conveys the superposition coded symbol $\displaystyle s_{C}=\alpha_{A}(l)s_{A}+\alpha_{B}(l)s_{B}$ (11) to $U_{A}$ and $U_{B}$ simultaneously, where $s_{A}\in\mathcal{S}_{A}$ and $s_{B}\in\mathcal{S}_{B}$ are the data symbols intended for $U_{A}$ and $U_{B}$, respectively. We assume that $s_{A}$ and $s_{B}$ are $M_{A}$-ary PAM and $M_{B}$-ary PAM symbols with $\mathbb{E}\\{|s_{A}|^{2}\\}=\mathbb{E}\\{|s_{B}|^{2}\\}=1$; $\displaystyle\mathcal{S}_{A}=\\{\pm d_{A},\pm 3d_{A},\cdots,\pm(2M_{A}-1)d_{A}\\}$ (12) and $\displaystyle\mathcal{S}_{B}=\\{\pm d_{B},\pm 3d_{B},\cdots,\pm(2M_{B}-1)d_{B}\\}$ (13) are the corresponding $M_{A}$ and $M_{B}$ points constellations, respectively, where $d_{A}=\sqrt{3/(M_{A}^{2}-1)}$ and $d_{B}=\sqrt{3/(M_{B}^{2}-1)}$ respectively represent half of the minimum distance between two adjacent points of the normalized $M_{A}$-PAM and $M_{B}$-PAM constellations. Let $\mathcal{M}_{i}=\\{1,2,\cdots,M_{i}\\}$ ($i\in\\{A,B\\}$), the signal constellation of $s_{C}$ can be expressed as $\displaystyle\mathcal{S}_{C}=\\{s_{C}|s_{i}=\mathcal{S}_{i}(k_{i}),{\rm{PL}}=l,k_{i}\in\mathcal{M}_{i},l\in\mathcal{N},i\in\\{A,B\\}\\},$ (14) which is an irregular $M_{A}M_{B}N$-ary constellation, as shown in Fig. 2. Consequently, the received signals at $U_{A}$ and $U_{B}$ can be given by $\displaystyle y_{A}=h_{A}s_{C}+n_{A}$ (15) and $\displaystyle y_{B}=h_{B}s_{C}+n_{B},$ (16) respectively, where $n_{A}\sim\mathcal{N}_{c}(0,N_{0})$ ($n_{B}\sim\mathcal{N}_{c}(0,N_{0})$) indicates the additive white Gaussian noise (AWGN) at $U_{A}$ ($U_{B}$) with power spectral density $N_{0}$. Figure 3: Constellations of $s_{B}$ with $N=2$, where $s_{B}$ is a 2-PAM symbol, and $\mathcal{S}_{B}^{R}$ denotes the union constellation of $s_{B}$ and PL. $\mathcal{S}_{B}^{R}(1),\mathcal{S}_{B}^{R}(3):s_{B}=-1$, $\mathcal{S}_{B}^{R}(2),\mathcal{S}_{B}^{R}(4):s_{B}=1$. Figure 4: Constellation of 2-PAM signal $s_{A}$. Algorithm 1 Detection Algorithm 1:for $U_{A}$ do 2: Compare the received signal $y_{A}$ with the joint constellation $\mathcal{S}_{B}^{R}$: $\displaystyle\mathcal{S}_{B}^{R}(\hat{i})=\mathop{\arg\min\limits_{i}}|y_{A}-h_{A}\mathcal{S}_{B}^{R}(i)|^{2},$ (17) where $i\in\\{1,\cdots,NM_{B}\\}$, and $\hat{i}$ is the estimate of $i$ at $U_{A}$. 3: Determine active PL $\hat{l}$ and the transmitted signal $\hat{s}_{B}$ by resolving $\mathcal{S}_{B}^{R}(\hat{i})$, where $\hat{s}_{B}$ and $\hat{l}$ are the estimates of $s_{B}$ and $l$ at $U_{A}$. 4: Use SIC to decode $s_{A}$, whose ML detector can be expressed as $\displaystyle\hat{s}_{A}=\mathop{\arg\min\limits_{s_{A}}}|y_{A}-h_{A}\alpha_{B}(\hat{l})\hat{s}_{B}-h_{A}\alpha_{A}(\hat{l})s_{A}|^{2},$ (18) where $\hat{s}_{A}$ is the estimate of $s_{A}$ at $U_{A}$. 5:end for 6:for $U_{B}$ do 7: Compare the received signal $y_{B}$ with the joint constellation $\mathcal{S}_{B}^{R}$: $\displaystyle\mathcal{S}_{B}^{R}(\hat{i})=\mathop{\arg\min\limits_{i}}|y_{B}-h_{A}\mathcal{S}_{B}^{R}(i)|^{2},$ (19) where $i\in\\{1,\cdots,NM_{B}\\}$, and $\hat{i}$ is the estimate of $i$ at $U_{B}$. 8: Determine active PL $\hat{l}$ and the transmitted signal $\hat{s}_{B}$ by resolving $\mathcal{S}_{B}^{R}(\hat{i})$, where $\hat{s}_{B}$ and $\hat{l}$ are the estimates of $s_{B}$ and $l$ at $U_{B}$. 9:end for ### II-B Signal Decoding The above subsection describes the transmission model of PS-NOMA. Now we shift our focus to the decoding process. Before the following description, we need to first clarify which data symbol gets the information of the PL. _In this paper, we use the information of PL to enhance the performance of $U_{B}$. In other scenarios, it can also be used to improve the performance of $U_{A}$_. It is assumed that both users invoke ML detectors to decode their signals. As we know, PL is an important factor affecting the decoding procedure because it is closely related to SIC and the decoding of data symbols. In conventional NOMA scheme, whose PLs are fixed, the users already know the values of PLs when decoding. While in PS-NOMA, PLs change over time and are unknown at the users. Hence, the conventional ML detector cannot be applied directly in PS- NOMA, and we should also decode PL at both users. Under the NOMA protocol, $U_{A}$ first decodes $s_{B}$ and $l$; for $U_{B}$, it detects $s_{B}$ and $l$ by treating $s_{A}$ as noise. We herein use the joint constellation of $s_{B}$ and PL to help decoding. For example, in the case of $N=2$ and 2-PAM $s_{B}$ as shown in Fig. 3, a combined 4-ary constellation is formed with four points, i.e., $\displaystyle\mathcal{S}_{B}^{R}(i)=\\{s_{B}=\pm 1,l=1,\,2\\},i\in\\{1,\cdots,4\\}.$ (20) Explicitly, the information of $s_{B}$ and PL is contained in each point of the constellation. If the received signal after equalization is close to $\mathcal{S}_{B}^{R}(1)$, we can readily know the estimated $s_{B}=-1$ and $l=1$. With these information, $U_{A}$ then subtracts the estimated $s_{B}$ and decodes its own signal, and this procedure can be seen as a common 2-PAM signal decoding as shown in Fig. 4. The detailed detection algorithm for both users are summarized in Algorithm 1. ## III Performance Analysis In this section, we theoretically analyze the performance of the proposed PS- NOMA scheme in terms of achievable rate and BER. Moreover, we discuss the optimal design of $N$ and G. ### III-A Achievable Rate Analysis For convenience, we let $\\{a,b,l\\}$ ($a\in\mathcal{M}_{A}$, $b\in\mathcal{M}_{B}$, $l\in\mathcal{N}$) denote $(\alpha_{A}(l)\mathcal{S}_{A}(a)+\alpha_{B}(l)\mathcal{S}_{B}(b))$. It is considered that all PLs are activated equally likely for PS-NOMA. #### III-A1 Achievable Rate Analysis of $U_{B}$ It follows from the chain rule that $\displaystyle{\rm{I}}(s_{B},{\rm{PL}};y_{B})={\rm{I}}(s_{B};y_{B}|{\rm{PL}})\it+{\rm{I}}({\rm{PL}}\it;y_{B}).$ (21) Therefore, we deal with the calculations of ${\rm{I}}(s_{B};y_{B}|{\rm{PL}})$ and ${\rm{I}}({\rm{PL}};y_{B})$ in the following. Specifically, we have $\displaystyle{\rm{I}}(s_{B};y_{B}|{\rm{PL}})={\rm{H}}(\it y_{B}|{\rm{PL}})-{\rm{H}}(\it y_{B}|s_{B},{\rm{PL}}),$ (22) where $\displaystyle{\rm{H}}(y_{B}|{\rm{PL}})=\frac{1}{N}\sum_{l=1}^{N}{\rm{H}}(y_{B}|{\rm{PL}}=l)$ (23) and $\displaystyle{\rm{H}}(y_{B}|s_{B},{\rm{PL}})=\frac{1}{NM_{B}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}{\rm{H}}(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l).$ (24) Here, ${\rm{H}}(y_{B}|{\rm{PL}}=l)$ and ${\rm{H}}(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l)$ can be respectively given by $\displaystyle{\rm{H}}(y_{B}|{\rm{PL}}=l)=\int p(y_{B}|{\rm{PL}}=l)\log_{2}(p(y_{B}|{\rm{PL}}=l))dy_{B}$ $\displaystyle=-\frac{\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\\!\log_{2}\left({\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(i_{B}),{\rm{PL}}=l)}/{M_{A}M_{B}}\right)}{M_{A}M_{B}N}$ (25) and $\displaystyle H(y_{B}|s_{B}\\!=\\!\mathcal{S}_{B}(k_{B}),{\rm{PL}}\\!=\\!l)\\!\\!=\\!\\!\int\\!\\!p(y_{B}|s_{B}\\!=\\!\mathcal{S}_{B}(k_{B}),\\!{\rm{PL}}\\!=\\!l)\log_{2}(p(y_{B}|s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l))dy_{B}$ $\displaystyle=-\frac{\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\log_{2}\left({\sum_{i_{A}=1}^{M_{A}}p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(k_{B}),{\rm{PL}}=l)}/{M_{A}}\right)}{M_{A}M_{B}N}.$ (26) Substituting (III-A1), (III-A1), and $\displaystyle p(y_{B}|s_{A}=\mathcal{S}_{A}(i_{A}),s_{B}=\mathcal{S}_{B}(i_{B}),{\rm{PL}}=l)=\frac{1}{\pi N_{0}}\exp\left(-\frac{|y_{B}-h_{B}\\{i_{A},i_{B},l\\}|^{2}}{N_{0}}\right)$ (27) into (22), ${\rm{I}}(s_{B};y_{B}|{\rm{PL}})$ can be given by $\displaystyle{\rm{I}}(s_{B};y_{B}|{\rm{PL}})=\log_{2}(M_{B})-\frac{1}{M_{A}M_{B}N}$ $\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\sum_{i_{B}=1}^{M_{B}}\exp(-|h_{B}\\{k_{A},k_{B},l\\}-h_{B}\\{i_{A},i_{B},l\\}+n_{B}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\exp(-|h_{B}\\{k_{A},k_{B},l\\}-h_{B}\\{i_{A},k_{B},l\\}+n_{B}|^{2}/N_{0})}\right)\right\\}.$ (28) In this manner, ${\rm{I}}({\rm{PL}};y_{B})$ can also be derived as $\displaystyle{\rm{I}}({\rm{PL}};y_{B})={\rm{H}}(y_{B})-{\rm{H}}(y_{B}|{\rm{PL}})$ $\displaystyle=\log_{2}(N)+\frac{1}{M_{A}M_{B}N}$ $\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\exp(\\!-\\!|h_{B}\\{k_{A},k_{B},l\\}\\!\\!-\\!\\!h_{B}\\{i_{A},i_{B},l\\}\\!\\!+\\!\\!n_{B}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\sum_{ll=1}^{N}\\!\exp(\\!-\\!|h_{B}\\{k_{A},k_{B},l\\}\\!\\!-\\!\\!h_{B}\\{i_{A},i_{B},ll\\}\\!\\!+\\!\\!n_{B}|^{2}/N_{0})}\right)\right\\}.$ (29) #### III-A2 Achievable Rate Analysis of $U_{A}$ Different from $U_{B}$, $U_{A}$ detects its own signal after removing the interference imposed by $U_{B}$. By invoking a similar mathematical method, the achievable rate for $U_{A}$ detecting $s_{B}$ is given by $\displaystyle{\rm{I}}(s_{B},{\rm{PL}};y_{A})={\rm{I}}(s_{B};y_{A}|{\rm{PL}})+{\rm{I}}({\rm{PL}};y_{A}),$ (30) where ${\rm{I}}(s_{B};y_{A}|{\rm{PL}})$ and ${\rm{I}}({\rm{PL}};y_{A})$ can be respectively derived as $\displaystyle{\rm{I}}(s_{B};y_{A}|{\rm{PL}})=\log_{2}(M_{B})-\frac{1}{M_{A}M_{B}N}$ $\displaystyle\times\sum_{k_{A}=1}^{M_{A}}\sum_{k_{B}=1}^{M_{B}}\sum_{l=1}^{N}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\sum_{i_{B}=1}^{M_{B}}\exp(-|h_{A}\\{k_{A},k_{B},l\\}-h_{A}\\{i_{A},i_{B},l\\}+n_{A}|^{2}/N_{0})}{\sum_{i_{A}=1}^{M_{A}}\exp(-|h_{A}\\{k_{A},k_{B},l\\}-h_{A}\\{i_{A},k_{B},l\\}+n_{A}|^{2}/N_{0})}\right)\right\\}$ (31) and $\displaystyle{\rm{I}}({\rm{PL}};y_{A})=\log_{2}(N)+\frac{1}{M_{A}M_{B}N}$ $\displaystyle\times\\!\\!\sum_{k_{A}=1}^{M_{A}}\\!\sum_{k_{B}=1}^{M_{B}}\\!\sum_{l=1}^{N}\\!\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\exp(\\!-\\!|h_{A}\\{k_{A},k_{B},l\\}\\!-\\!h_{A}\\{i_{A},i_{B},l\\}\\!+\\!n_{A}|^{2}\\!/\\!N_{0})}{\sum_{i_{A}=1}^{M_{A}}\\!\sum_{i_{B}=1}^{M_{B}}\\!\sum_{ll=1}^{N}\\!\exp(-|h_{A}\\{k_{A},k_{B},l\\}\\!-\\!h_{A}\\{i_{A},i_{B},ll\\}\\!+\\!n_{A}|^{2}\\!/\\!N_{0})}\right)\right\\}.$ (32) With the detected PL, the achievable rate for $U_{A}$ detecting $s_{A}$, i.e., ${\rm{I}}(s_{A};y_{A}|{\rm{PL}})$ can be derived as $\displaystyle{\rm{I}}(s_{A};y_{A}|{\rm{PL}})=\log_{2}(M_{A})-\frac{1}{M_{A}N}$ $\displaystyle\times{\sum_{k_{A}=1}^{M_{A}}\sum_{l=1}^{N}}\mathbb{E}\left\\{\log_{2}\left(\frac{\sum_{i_{A}=1}^{M_{A}}\exp\left(|h_{A}\alpha_{A}(l)(\mathcal{S}_{A}(k_{A})-\mathcal{S}_{A}(i_{A}))+n_{A}|^{2}/N_{0}\right)}{\exp\left(-|n_{A}|^{2}/N_{0}\right)}\right)\right\\}.$ (33) ### III-B BER Analysis In this subsection, closed-form BER expressions are derived for $U_{A}$ and $U_{B}$ in PS-NOMA systems. #### III-B1 BER of $U_{B}$ To obtain the BER of $U_{B}$, we should derive the symbol error ratio (SER) of $s_{B}$ at $U_{B}$ first. Similar to [References], [References], we utilize the conditional pairwise error probability (PEP), which indicates the probability of detecting $s_{B}$ as $\hat{s}_{B}$ conditioned on $h_{B}$, namely $\displaystyle\Pr(s_{B}\to\hat{s}_{B}|h_{B})$ $\displaystyle=\Pr(|y_{B}-h_{B}\alpha_{B}(l)s_{B}|^{2}>|y_{B}-h_{B}\alpha_{B}(\hat{l})\hat{s}_{B}|^{2})$ $\displaystyle\overset{(a)}{=}\Pr(|h_{B}x_{B}|^{2}-|h_{B}\hat{x}_{B}|^{2}-2\mathcal{R}\\{y_{B}^{*}h_{B}(x_{B}-\hat{x}_{B})\\}>0)$ $\displaystyle\overset{(b)}{=}\Pr(-|h_{B}\triangle x_{B}|^{2}-2\mathcal{R}\\{w_{B}^{*}h_{B}\triangle x_{B}\\}>0)$ $\displaystyle\overset{(c)}{=}Q\left(\sqrt{\frac{|h_{B}|^{2}(|\triangle x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\})^{2}}{2N_{0}|\triangle x_{B}|^{2}}}\right)$ $\displaystyle\overset{(d)}{=}Q\left(\sqrt{\frac{|h_{B}|^{2}}{2N_{0}^{\rm{equal}}}}\right),$ (34) where we define in $(a)$ ${x}_{B}\triangleq\alpha_{B}({l}){s}_{B}$ and $\hat{x}_{B}\triangleq\alpha_{B}(\hat{l})\hat{s}_{B}$; in $(b)$ $w_{B}=h_{B}\alpha_{A}(l)s_{A}+n_{B}=h_{B}x_{A}+n_{B}$, with $x_{A}\triangleq\alpha_{A}({l}){s}_{A}$, and $\triangle x_{B}=x_{B}-\hat{x}_{B}$; the detailed derivation of $(c)$ is present in Appendix A; $(d)$ is obtained by defining equivalent noise variance as $\displaystyle N_{0}^{\rm{equal}}\triangleq\frac{N_{0}|\triangle x_{B}|^{2}}{(|\triangle x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\})^{2}}.$ (35) Since we model $h_{B}$ as a complex Gaussian random variable, $|h_{B}|^{2}$ has a PDF $\displaystyle p_{|h_{B}|^{2}}(x)=\frac{1}{\beta_{B}}\exp\left(-\frac{x}{\beta_{B}}\right).$ (36) With $p_{|h_{B}|^{2}}(x)$, we can arrive at [References, Eq. (64)] $\displaystyle\Pr(s_{B}\to\hat{s}_{B})$ $\displaystyle=\int_{0}^{+\infty}\Pr(s_{B}\to\hat{s}_{B}|h_{B})p_{|h_{B}|^{2}}(x)dx$ $\displaystyle=\int_{0}^{+\infty}Q\left(\sqrt{\frac{|h_{B}|^{2}}{2N_{0}^{\rm{equal}}}}\right)p_{|h_{B}|^{2}}(x)dx$ $\displaystyle=\frac{1}{2}\left(1-\sqrt{\frac{\beta_{B}}{4N_{0}^{\rm{\rm{equal}}}+\beta_{B}}}\right),$ (29) which can be averaged over all the possible values of $x_{A}^{*}$ to consider all interference scenarios. Notably, $x_{A}$ herein should keep the same PL as $x_{B}$. Let $P_{ij,B}^{\rm{bit}}$ denote the number of error bits when symbol $\mathcal{S}_{B}^{R}(i)$ is incorrectly detected as $\mathcal{S}_{B}^{R}(j)$. Since $s_{B}$ and PL have $\log_{2}(NM_{B})$ bits, the BER of $s_{B}$ and PL detections at $U_{B}$ can be approximated by $\displaystyle P_{B}$ $\displaystyle\approx\frac{1}{NM_{B}\log_{2}(NM_{B})}\sum_{i=1}^{NM_{B}}\sum_{j\neq i}\Pr(\mathcal{S}_{B}^{R}(i)\to\mathcal{S}_{B}^{R}(j))P_{ij,B}^{\rm{bit}}.$ (30) #### III-B2 BER of $U_{A}$ Recall the ML detection in (17) and (18). $U_{A}$ first decodes PL as well as $s_{B}$ and extracts $s_{B}$ from the received signal $y_{A}$ and then decodes $s_{A}$ from the residual signal. Obviously, the overall BER can be divided into two complementary parts, depending on whether $s_{B}$ and PL $l\in\mathcal{N}$ are correctly detected or not. Since we have $N$ PLs, the overall BER of $U_{A}$ can be evaluated as $\displaystyle P_{A}\approx(1-P_{A}^{s_{B}})\left(\frac{1}{N}\sum_{l=1}^{N}P_{\rm{bit}}^{A}(l)\right)+\frac{P_{A}^{s_{B}}}{2},$ (31) where $P_{A}^{s_{B}}$ is the SER of $s_{B}$ at $U_{A}$, and $P_{\rm{bit}}^{A}(l)$ denotes the BER of $M_{A}$-ary PAM demodulation over Rayleigh fading channels with PL $l$ selected. Since it is difficult to exactly calculate the BER when $s_{B}$ or PL is detected incorrectly at $U_{A}$, we use the estimate ${P_{A}^{s_{B}}}/{2}$ instead. Similarly, to derive $P_{A}^{s_{B}}$, we use the conditional PEP, which denotes the probability of detecting $s_{B}$ as $\hat{s}_{B}$ conditioned on $h_{A}$ [References], [References] $\displaystyle\Pr(s_{B}\to\hat{s}_{B}|h_{A})$ $\displaystyle=\Pr(|y_{A}-h_{A}\alpha_{B}(l)s_{B}|^{2}>|y_{A}-h_{A}\alpha_{B}(\hat{l})\hat{s}_{B}|^{2})$ $\displaystyle=Q\left(\sqrt{\frac{|h_{A}|^{2}(|\triangle x_{B}|^{2}+2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\})^{2}}{2N_{0}|\triangle x_{B}|^{2}}}\right)$ $\displaystyle=Q\left(\sqrt{\frac{|h_{A}|^{2}}{2N_{0}^{\rm{\rm{equal}}}}}\right).$ (32) Definitions of ${x}_{B}$, $\hat{x}_{B}$, $x_{A}$, $\triangle x_{B}$, and $N_{0}^{\rm{equal}}$ are given in (III-B1) and (35). Having $\displaystyle p_{|h_{A}|^{2}}(x)=\frac{1}{\beta_{A}}\exp\left(-\frac{x}{\beta_{A}}\right),$ (33) we can arrive at [References, Eq. (64)] $\displaystyle\Pr(s_{B}\to\hat{s}_{B})$ $\displaystyle=\int_{0}^{+\infty}\Pr(s_{B}\to\hat{s}_{B}|h_{A})p_{|h_{A}|^{2}}(x)dx$ $\displaystyle=\frac{1}{2}\left(1-\sqrt{\frac{\beta_{A}}{4N_{0}+\beta_{A}}}\right),$ (34) which can be averaged over all the possible values of $x_{A}^{*}$ to consider all interference scenarios. Equally, the $x_{A}$ herein should keep the same PL as $x_{B}$. Hence, $P_{A}^{s_{B}}$ is given by $\displaystyle P_{A}^{s_{B}}\approx\frac{1}{NM_{B}}\sum_{i=1}^{NM_{B}}\sum_{j\neq i}\Pr(\mathcal{S}_{B}^{R}(i)\to\mathcal{S}_{B}^{R}(j)).$ (35) As for the calculation of $P_{\rm{bit}}^{A}(l)$, we first derive the conditional error probability for PL $l$ under the $m_{A}$-th bit ($m_{A}\in\\{1,\ldots,\log_{2}(M_{A})\\}$) and the conditions of receive signal-to-noise ratio (SNR) at $U_{A}$, i.e., $\displaystyle\gamma_{A}=\frac{\alpha_{A}(l)^{2}|h_{A}|^{2}}{N_{0}},$ (36) as [References] $\displaystyle P_{\rm{bit}}^{A}(l|m_{A},\gamma_{A})=\frac{2}{M_{A}}$ $\displaystyle\times\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\left\\{(-1)^{\lfloor{i(2^{m_{A}}-1)}/{M_{A}}\rfloor}\left(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor\right)Q\left((2i+1)d_{A}\sqrt{2\gamma_{A}}\right)\right\\}.$ (37) By substituting the alternative representation, i.e., $\displaystyle Q(x)=\frac{1}{\pi}\int_{0}^{\frac{\pi}{2}}\exp\left(-\frac{x^{2}}{2\sin^{2}\psi}\right)d\psi$ (38) for the Gaussian Q-function in (III-B2), we can obtain $\displaystyle P_{\rm{bit}}^{A}(l|m_{A},\gamma_{A})=$ $\displaystyle\frac{2}{M_{A}}\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\\{(-1)^{\lfloor\frac{i(2^{m_{A}}-1)}{M_{A}}\rfloor}$ $\displaystyle\times(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor)$ $\displaystyle\times\underbrace{\frac{1}{\pi}\int_{0}^{\pi/2}\exp\left(-\frac{((2i+1)d_{A})^{2}\gamma_{A}}{\sin^{2}\psi}\right)d\psi}_{\mathcal{Q}(i|\gamma_{A})}\\}.$ (39) By statistically averaging the equation above over the PDF of $\gamma_{A}$, which is given by $\displaystyle p_{\gamma_{A}}(\gamma_{A})=\frac{N_{0}}{(\alpha_{A}(l))^{2}\beta_{A}}\exp\left(\frac{-N_{0}\gamma_{A}}{(\alpha_{A}(l))^{2}\beta_{A}}\right),$ (40) $\mathcal{Q}(i)$ can be derived as $\displaystyle\mathcal{Q}(i)$ $\displaystyle\\!=\\!\frac{1}{\pi}\int_{0}^{\frac{\pi}{2}}\\!\\!\int_{0}^{\infty}\\!\\!\exp\\!\\!\left(-\frac{((2i+1)d_{A})^{2}\gamma_{A}}{\sin^{2}\psi}\right)\\!\\!p_{\gamma_{A}}(\gamma_{A})d\gamma_{A}d\psi=\frac{1-\mathcal{G}(i)}{2},$ (41) where $\displaystyle\mathcal{G}(i)=\sqrt{\frac{(\alpha_{A}(l))^{2}\beta_{A}((2i+1)d_{A})^{2}}{N_{0}+(\alpha_{A}(l))^{2}\beta_{A}((2i+1)d_{A})^{2}}}.$ (42) In this manner, we have $\displaystyle P_{\rm{bit}}^{A}(l|m_{A})=$ $\displaystyle\frac{2}{M_{A}}\sum_{i=0}^{(1-2^{-m_{A}})M_{A}-1}\left\\{(-1)^{\lfloor\frac{i(2^{m_{A}}-1)}{M_{A}}\rfloor}\left(2^{m_{A}-1}-\lfloor\frac{i(2^{m_{A}-1})}{M}+\frac{1}{2}\rfloor\right)\mathcal{Q}(i)\right\\}.$ (43) Therefore, we have $\displaystyle P_{\rm{bit}}^{A}(l)=\frac{1}{\log_{2}(M_{A})}\sum_{m_{A}=1}^{\log_{2}(M_{A})}P_{\rm{bit}}^{A}(l|m_{A}).$ (44) Finally, by substituting (35) and (44) into (31), we can derive the expression of $P_{A}$. ### III-C Optimal Constellation Analysis Figure 5: Constellations of $s_{B}$ with $N=4$, where $s_{B}$ is a 2-PAM symbol, and $\mathcal{S}_{B}^{R}$ denotes the union constellation of $s_{B}$ and PL. In this subsection, we discuss the optimal design of constellation in terms of the values of $N$ as well as G. For convenience, let $d_{B,ij}$ denote the Euclidean distance between points $\mathcal{S}_{B}^{R}(i)$ and $\mathcal{S}_{B}^{R}(j)$, where $i$, $j\in\\{1,\ldots,NM_{B}\\}$. According to the geometric analysis, we can obtain the following. ###### Lemma 1. Optimal BER performance is achieved at $N=2$. ###### Proof. Since the cases of $N\geq 2$ all have similar derivation processes, we can obtain pattern by analyzing a certain case. For ease of discussion, we consider the 2-PAM signal $s_{A}$, 2-PAM signal $s_{B}$, and $N=4$ scenario as an example. As indicated in Algorithm 1, $N$ only affects the order of combined constellation. When $N=4$, the combined constellation is shown as Fig. 5. Let $d_{B,i,\min}$ denotes the minimum Euclidean distance between $\mathcal{S}_{B}^{R}(i)$ and other points. Considering the symmetry of Fig. 5, we first take $\mathcal{S}_{B}^{R}(1)$ for instance. From Fig. 5, we can obtain $d_{B,1,\min}$ as $\displaystyle d_{B,1,\min}=\min\\{d_{B,12},d_{B,13},d_{B,16},d_{B,18}\\},$ (45) where $\displaystyle d_{B,12}=2d_{B}|\alpha_{B}(1)|,$ (46) $\displaystyle d_{B,13}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(2)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(2)|\cos\left(\frac{\pi}{N}\right)},$ (47) $\displaystyle d_{B,16}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(3)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(3)|\cos\left(\frac{2\pi}{N}\right)},$ (48) and $\displaystyle d_{B,18}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(4)|^{2}-2d_{B}^{2}|\alpha_{B}(1)\alpha_{B}(4)|\cos\left(\frac{\pi}{N}\right)},$ (49) respectively. In the similar manner, we can derive $d_{B,2,\min}$, and so on. Therefore, the minimum Euclidean distance of Fig. 5, can be derived as $\displaystyle d_{B,\min}=\min\\{d_{B,1,\min},d_{B,2,\min},d_{B,3,\min},d_{B,4,\min},d_{B,5,\min},d_{B,6,\min},d_{B,7,\min},d_{B,8,\min}\\}.$ (50) Since we have $N\geq 2$, the angle ${\pi}/{N}$ and ${2\pi}/{N}$ are values between 0 and $\pi$. In other words, $\cos(\pi/N)$ is monotonously increasing with respect to $N$. Evidently, to achieve optimal BER performance, $N$ should be equal to the minimum value, which proves Lemma 1. ∎ ###### Corollary 1. Optimal BER performance is achievable when the information of PL is only carried out by the difference of angle. ###### Proof. According to Lemma 1, we consider 2-PAM signal $s_{A}$, 2-PAM signal $s_{B}$, and $N=2$ scenario in the following. Unlike the derivation of Lemma 1, here we should also consider the BER performance of $U_{A}$. We begin with the analysis of $s_{A}$, whose constellation is Fig. 4. In this manner, its minimum Euclidean distance can be derived as $\displaystyle d_{A,\min}=2d_{A}|\alpha_{A}(l)|,$ (51) where $l\in\mathcal{N}$. Obviously, $d_{A,\min}$ is determined by the minimum value of $|\alpha_{A}(l)|$. Therefore, if $|\alpha_{A}(l)|$ with different $l$ has a constant value, $d_{A,\min}$ will be optimal and easy to design. For example, if we consider the case where $|\alpha_{A}(1)|=0.2$, $|\alpha_{A}(2)|=0.1$, and the case where $|\alpha_{A}(1)|=|\alpha_{A}(2)|=0.2$. It is clear that the latter case has larger $d_{A,\min}$. Then we shift our focus to $s_{B}$. The combined constellation is shown as Fig. 3, whose minimum Euclidean distance can be written as $\displaystyle d_{B,\min}=\min\\{d_{B,12},d_{B,34},d_{B,14},d_{B,23}\\},$ (52) where $\displaystyle d_{B,12}=2d_{B}|\alpha_{B}(1)|,$ (53) $\displaystyle d_{B,34}=2d_{B}|\alpha_{B}(2)|,$ (54) and $\displaystyle d_{B,14}=d_{B,23}=\sqrt{|d_{B}\alpha_{B}(1)|^{2}+|d_{B}\alpha_{B}(2)|^{2}}.$ (55) Collating (55) with (53) and (54), it is clear that $d_{B,\min}$ is determined by the minimum value of $|\alpha_{B}(1)|$ and $|\alpha_{B}(2)|$. In a similar manner, larger $d_{B,\min}$ will be achieved by crafty design in the case of $|\alpha_{B}(1)|=|\alpha_{B}(2)|$. Consequently, larger $d_{i,\min}$, $i\in\\{A,B\\}$, will be achieved when $|\alpha_{i}(l)|=|\alpha_{i}(l^{\prime})|$, where $l,l^{\prime}\in\mathcal{N}$. In this scenario, the incremental bits of PS- NOMA come from $\bm{\Theta}$, which in turn reduces the design complexity of G. Relevant content is also discussed in Section. IV. ∎ ## IV Numerical Results In this section, we illustrate the BER and achievable rate performance of the proposed scheme through Monte Carlo simulation and numerical results. Since the power coefficients of PS-NOMA are randomly varying, from the fairness perspective, we set the counterpart without PS (denoted by NOMA) as a regular NOMA scheme. The average powers of $h_{A}$, $h_{B}$ are set to be $\beta_{A}=10$, $\beta_{B}=1$, respectively. For brevity, we will refer to “PS-NOMA ($M_{A}$-PAM, $M_{B}$-PAM, $N$)” as the PS-NOMA scheme where the BS has $N$ PLs and maps the information bits for $U_{A}$ and $U_{B}$ into $M_{A}$-PAM and $M_{B}$-PAM, respectively. Similarly, “NOMA ($M_{A}$-PAM, $M_{B}$-PAM)” denotes the NOMA scheme with $M_{A}$-PAM and $M_{B}$-PAM signals intended for $U_{A}$ and $U_{B}$, respectively. Besides, we take SNR=$1/N_{0}$ as the horizontal axis of the following figures. Figure 6: BER comparison between PS-NOMA and NOMA. Figure 7: BER comparison between PS-NOMA schemes with different PL intervals: Case 1. Figure 8: BER comparison between PS-NOMA schemes with different PL intervals: Case 2. Figure 9: BER comparison between PS-NOMA schemes with different PL intervals: Case 3. Figure 10: BER comparison between PS-NOMA schemes with different PL intervals: Case 4. ### IV-A BER Performance In this subsection, the BER performance of PS-NOMA and NOMA is compared, assuming that $U_{A}$ and $U_{B}$ in all considered schemes employ ML detection. Since the comparison of OMA and NOMA has been widely argued in previous works, the BER curves of OMA counterparts are not presented. In Fig. 6, we compare the BER performance of “PS-NOMA (2-PAM, 2-PAM, $N=2$)” and “NOMA (2-PAM, 4-PAM)” with their theoretical BER results presented. Given fairness, we assume that the maximum spectral efficiency for both schemes are 3 bits per second per Hertz (bps/Hz), and both schemes have the same constellation order. According to Lemma 1 and Corollary 1, the power matrices of “PS-NOMA (2-PAM, 2-PAM, $N=2$)” and “NOMA (2-PAM, 4-PAM)” are set by $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.2},&\sqrt{0.8}\\\ \sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (58) and $\textbf{G}=[\sqrt{0.2},\sqrt{0.8}]$, respectively. It can be seen from Fig. 6 that the theoretical curves approximately match with their simulation counterparts. Besides, one can find that the BER performance of $U_{A}$ is superior to that of $U_{B}$ in both PS-NOMA and NOMA, which comes from the fact $\beta_{A}>\beta_{B}$. Although all the curves have the same constellation order as 8, the performances of PS-NOMA are always better than those of NOMA. This phenomenon tells us that applying PS can improve performance without increasing constellation complexity when the amplitudes of power allocation coefficients of the system are the same. Figure 7, 8, 9, and 10 respectively investigate four different scenarios where the power matrices of the compared counterparts $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\ \sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (61) for case 1, $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.3},&\sqrt{0.7}\\\ \sqrt{0.4}\exp(j\pi/2),&\sqrt{0.6}\exp(j\pi/2)\\\ \end{array}\right]$ (64) for case 2, $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.2},&\sqrt{0.8}\\\ \sqrt{0.2}\exp(j\pi/2),&\sqrt{0.8}\exp(j\pi/2)\\\ \end{array}\right]$ (67) for case 3, and $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\ \sqrt{0.1}\exp(j\pi/2),&\sqrt{0.9}\exp(j\pi/2)\\\ \end{array}\right]$ (70) for case 4, respectively. Besides, the power matrix of the benchmark, i.e., PS-NOMA (2-PAM, 2-PAM, $N=2$), equals $\displaystyle\textbf{G}=\left[\begin{array}[]{cc}\sqrt{0.1},&\sqrt{0.9}\\\ \sqrt{0.4}\exp(j\pi/2),&\sqrt{0.6}\exp(j\pi/2)\\\ \end{array}\right].$ (73) Here the PL interval denotes the absolute difference between the absolute values of two adjacent rows of G. Smaller interval denotes smaller value of PL interval than (73). Hence all the cases correspond to smaller intervals. We first discuss the BER performance of $U_{B}$. Concretely, in cases 1, 3, and 4, the minimum Euclidean distances of $s_{B}$ are larger than those of the benchmark according to (52). Hence they show better BER performances, while opposite observations are found in the other cases. Furthermore, the phenomenon that performance of case 4 is better than that of benchmark also confirms the correctness of Corollary 1. More specifically, by comparing the curves of $U_{A}$ in these cases, we observe that the minor power of $U_{A}$ does not decrease the BER performance of $U_{A}$. From (17) and (18), we know that false detection of $s_{B}$ and PL may result in the wrong $s_{B}$, or wrong PL, or wrong $s_{B}$ and PL. The first detection process (17) is related to both $s_{B}$ and PL, and it is directly related to the correctness of (18), so the power of $U_{B}$ has a more significant influence than $U_{A}$. Notably, we assume that $M_{A}=M_{B}$ in this figure. Therefore this conclusion stands. In a word, we can consistently achieve better BER performance through designing power matrices with the same power value when $N=2$ and the design of lower-order matrices are much simpler than higher- order ones. Figure 11: Achievable rate and MI performance of PS-NOMA. Figure 12: Achievable rate comparison between PS-NOMA and NOMA. ### IV-B Achievable Rate Performance In this subsection, we first evaluate the achievable rate and MI performance of the proposed PS-NOMA, and then compare the achievable rate of PS-NOMA with the NOMA counterparts. In Fig. 11, we show the achievable rate and MI performance of PS-NOMA with (58) and $\textbf{G}=(\sqrt{0.2},\sqrt{0.8})$, respectively. As seen from the figure, all the curves grow steadily as the SNR increases at low-to-medium SNR while achieving floors at high SNR. Obviously, the rates of $U_{A}$ obtained from (III-A2), $U_{B}$ obtained from (21), and $U_{B}$ observed at $U_{A}$ obtained from (30) saturate to $\log_{2}(M_{A})$, $\log_{2}(NM_{B})$, and $\log_{2}(NM_{B})$, respectively. On the other hand, the MI curves ${\rm I}({\rm{PL}};y_{A})$ and ${\rm I}({\rm{PL}};y_{B})$ respectively denote the PL gains at $U_{A}$ and $U_{B}$ and are respectively generated from (III-A2) and (III-A1). Evidently, both curves saturate at 1 bps/Hz since the input entropy of the power-domain is $\log_{2}(N)$. In other words, all the gains gleaned from the power-domain are assigned to $U_{B}$. Moreover, since the channel quality of $U_{A}$ is much better than that of $U_{B}$, the achievable rate or MI obtained at $U_{A}$ is always higher than that at $U_{B}$, which guarantees the success of SIC. Subsequently, in Fig. 12, we present the curves of PS-NOMA versus NOMA with the same system setups as Fig. 11. Compared to NOMA, PS-NOMA provides achievable rate gains for both $U_{A}$ and $U_{B}$, and obtains the sum achievable rate enhancement in turn. This system performance improvement is more pronounced at low SNR, while the system gap narrows with increasing SNR. Since PS-NOMA and NOMA have the same constellation order, at high SNR, the achievable rate performances of them are equal. It is worth noting that the performance improvement of $U_{A}$ is more obvious than that of $U_{B}$. ## V Conclusions In this paper, we have proposed a novel two-user NOMA scheme using PS, in which the ordinary PAM symbol carries the bits of users. In addition, the BS randomly chooses a PL from the power matrix preset for each transmission to carry more information. For PS-NOMA, approximate BER expressions have been derived in closed form for both users over Rayleigh flat fading channels. The rates and MI under finite input have also been developed. Computer simulations have verified the performance analysis and shown that the proposed scheme achieves better BER performance than conventional NOMA without increasing constellation complexity. Moreover, we observe that the proposed PS-NOMA can achieve better BER performance with the minimum number of PLs, which reduces the design difficulty of the power matrix. Furthermore, if we set an equal amplitude for each PL, the system performance will also increase. On the other hand, the proposed scheme also shows superior achievable rate performance compared to that of the NOMA counterpart. This work focuses only on the two- user scenario. We leave the more-user extension for future study. ## Appendix A Proof of $(c)$ To process step $(c)$ of (III-B1), we use the method introduced in [References]. Let $\mathcal{D}\triangleq-|h_{B}\triangle x_{B}|^{2}-2\mathcal{R}\\{w_{B}^{*}h_{B}\triangle x_{B}\\}$. With $w_{B}=h_{B}x_{A}+n_{B}$, $\mathcal{D}$ can be rewritten as $\displaystyle\mathcal{D}=$ $\displaystyle-|h_{B}\triangle x_{B}|^{2}-|h_{B}|^{2}2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\}-2\mathcal{R}\\{n_{B}^{*}h_{B}\triangle x_{B}\\}.$ (A.1) Obviously, $\mathcal{D}$ is Gaussian distributed with $\displaystyle\mathbb{E}\\{\mathcal{D}\\}=-|h_{B}\triangle x_{B}|^{2}-|h_{B}|^{2}2\mathcal{R}\\{x_{A}^{*}\triangle x_{B}\\}$ (A.2) and $\displaystyle\text{Var}\\{\mathcal{D}\\}=$ $\displaystyle\text{Var}\\{n_{B}^{*}h_{B}\triangle x_{B}\\}=2N_{0}|h_{B}\triangle x_{B}|^{2}.$ (A.3) Therefore, we have $\Pr(\mathcal{D}>0)=Q({-\mathbb{E}\\{\mathcal{D}\\}}/{\sqrt{\text{Var}\\{\mathcal{D}\\}}})$, which can be easily simplified as the result of $(c)$. ## References * [1] Ericsson, “Cellular networks for massive IoT,” Tech. Rep. Uen 284 23-3278, Jan. 2016. * [2] L. Dai, B.Wang, Y. Yuan, S. Han, C.-L. I, and Z.Wang, “Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” _IEEE Commun. Mag._ , vol. 53, no. 9, pp. 74–81, Sep. 2015\. * [3] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer,” _IEEE J. Sel. Areas Commun._ , vol. 34, no. 4, pp. 938-953, Apr. 2016. * [4] J. Liberti, S. Moshavi, and P. Zablocky, “Successive interference cancellation,” U.S. Patent 8 670 418 B2, Mar. 2014. * [5] M. Vaezi, Z. Ding, and H. V. Poor, Multiple Access Techniques for 5G Wireless Networks and Beyond. Springer International Publishing, 2019. * [6] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” _IEEE Signal Process. Lett._ , vol. 21, no. 12, pp. 1501–1505, Dec. 2014. * [7] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, I. Chih-Lin, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” _IEEE Commun. Mag._ , vol. 55, no. 2, pp. 185–191, Feb. 2017. * [8] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. Kwak, “Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges,” _IEEE Commun. Surveys Tuts._ , vol. 19, no. 2, pp. 721–742, Secondquarter 2017. * [9] “3rd generation partnership project; technical specification group radio access network; study on non-orthogonal multiple access (NOMA) for NR, release 16, (V16.0.0),” 3GPP, Sophia Antipolis, France, Rep. TR 38.812, Dec. 2018. * [10] D. Slepian and J. K. Wolf, “A coding theorem for multiple access channels with correlated sources,” _Bell Syst. Tech. J._ , vol. 52, no. 7, pp. 1037–1076, 1973. * [11] R. S. Cheng and S. Verdú, “Gaussian multiaccess channels with ISI: Capacity region and multiuser water-filling,” _IEEE Trans. Inf. Theory_ , vol. 39, no. 3, pp. 773–785, May 1993. * [12] G. Caire and S. Shamai (Shitz), “On the achievable throughput of a multi-antenna Gaussian broadcast channel,” _IEEE Trans. Inf. Theory_ , vol. 49, no. 7, pp. 1691–1706, Jul. 2003. * [13] T. M. Cover and J. A. Thomas, _Elements of Information Theory_ , 2nd ed. Hoboken, NJ, USA: Wiley, 2006. * [14] A. Lozano, A. M. Tulino, and S. Verdú, “Optimum power allocation for parallel Gaussian channels with arbitrary input distributions,” _IEEE Trans. Inf. Theory_ , vol. 52, no. 7, pp. 3033–3051, Jul. 2006. * [15] J. Harshan and B. S. Rajan, “On two-user Gaussian multiple access channels with finite input constellations,” _IEEE Trans. Inf. Theory_ , vol. 57, no. 3, pp. 1299–1327, Mar. 2011. * [16] J. Harshan and B. S. Rajan, “A novel power allocation scheme for two-user GMAC with finite input constellations,” _IEEE Trans. Wireless Commun._ , vol. 12, no. 2, pp. 818–827, Feb. 2013. * [17] Z. Dong, H. Chen, J. Zhang, and L. Huang, “On non-orthogonal multiple access with finite-alphabet inputs in Z-channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 12, pp. 2829–2845, Dec. 2017. * [18] Z. Dong, H. Chen, J. Zhang, L. Huang, and B. Vucetic, “Uplink non-orthogonal multiple access with finite-alphabet inputs,” _IEEE Trans. Wireless Commun._ , vol. 17, no. 9, pp. 5743–5758, Sept. 2018. * [19] Y. Yang and B. Jiao, “Information-guided channel-hopping for high data rate wireless communication,” _IEEE Commun. Lett._ , vol. 12, no. 4, pp. 225–227, Apr. 2008. * [20] C. Liu, M. Ma, Y. Yang, and B. Jiao, “Optimal spatial-domain design for spatial modulation capacity maximization,” _IEEE Commun. Lett._ , vol. 20, no. 6, pp. 1092–1095, Jun. 2016. * [21] Y. Chen, L. Wang, Y. Ai, B. Jiao, and L. Hanzo, “Performance analysis of NOMA-SM in vehicle-to-vehicle massive MIMO channels,” _IEEE J. Sel. Areas Commun._ , vol. 35, no. 12, pp. 2653–2666, Dec. 2017. * [22] Q. Li, M. Wen, E. Basar, H. V. Poor, and F. Chen, “Spatial modulation-aided cooperative NOMA: Performance analysis and comparative study,” _IEEE J. Sel. Topics Signal Process._ , vol. 13, no. 3, pp. 715–728, Jun. 2019. * [23] X. Wang, J. Wang, L. He, Z. Tang, and J. Song, “On the achievable spectral efficiency of spatial modulation aided downlink non-orthogonal multiple access,” _IEEE Commun. Lett._ , vol. 21, no. 9, pp. 1937–1940, Sept. 2017. * [24] X. Wang, J. Wang, L. He, and J. Song, “Spectral efficiency analysis for downlink NOMA aided spatial modulation with finite alphabet inputs,” _IEEE Trans. Veh. Technol._ , vol. 66, no. 11, pp. 10562–10566, Nov. 2017. * [25] L. Pan and J. Zheng, “Spatial modulation aided cooperative NOMA: Implementation and achievable rate analysis,” in _Proc. IEEE Int. Conf. Commun. (ICC)_ , Shanghai, China, May 2019, pp. 1–6. * [26] Y. -Y. Zhang and J. -K. Zhang, “Fundamental applicability of spatial modulation: High-SNR limitation and low-SNR advantage,” _IEEE J. Sel. Areas Commun._ , vol. 37, no. 9, pp. 2165–2178, Sept. 2019. * [27] L. Bariah, A. Al-Dweik, and S. Muhaidat, “On the performance of Non-orthogonal multiple access systems with imperfect successive interference cancellation,” in _Proc. IEEE Int. Conf. Commun. (ICC)_ , Kansas City, MO, USA, May 2018, pp. 1–6. * [28] E. Başar, Ü. Aygölü, E. Panayırcı, and H. V. Poor, “Orthogonal frequency division multiplexing with index modulation,” _IEEE Trans. Signal Process._ , vol. 61, no. 22, pp. 5536–5549, Nov. 15, 2013 * [29] M.-S. Alouini and A. J. Goldsmith, “A unified approach for calculating error rates of linearly modulated signals over generalized fading channels,” _IEEE Trans. Commun._ , vol. 47, no. 9, pp. 1324–1334, Sept. 1999. * [30] K. Cho and D. Yoon, “On the general BER expression of one-and two dimensional amplitude modulations,” _IEEE Trans. Commun._ , vol. 50, no. 7, pp. 1074–1080, Jul. 2002.
arxiv-papers
2021-07-27T08:30:19
2024-09-04T03:07:20.919213
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Xinyue Pei, Yingyang Chen, Miaowen Wen, Hua Yu, Erdal Panayirci, and\n H. Vincent Poor", "submitter": "Yingyang Chen", "url": "https://arxiv.org/abs/2107.12668" }
2107.12670
# Elasticity of Single Flexible Polymer Chains in Good and Poor Solvents Vikhyaat Ahlawat Department of Physics, Indian Institute of Science Education and Research, Dr. Homi Bhabha Road, Pune 411 008, India Shatruhan Singh Rajput Shivprasad Patil [email protected] Department of Physics, Indian Institute of Science Education and Research, Dr. Homi Bhabha Road, Pune 411 008, India ###### Abstract ## Abstract Force versus extension curves measure entropic elasticity of single polymer chain in force spectroscopy experiments. A Worm-like Chain model is used to describe force extension experiments with an intrinsic chain parameter called persistence length, which is a measure of local bending flexibility. For flexible polymers, there is a discrepancy in estimates of persistence length in various force regimes. For instance, Atomic Force Microscopy (AFM) based pulling experiments report anomaly low values which are also inconsistent with magnetic tweezers experiments. To understand this, we investigate the role of coupling between microscopic force probe and intrinsic elasticity of polyethylene glycol chain in AFM-based experiments. We perform experiments using oscillatory rheology by providing an external excitation of fixed frequency to the probe. We show that a proper quantification of elastic response measured directly by oscillatory technique deviates significantly from conventional force-extension curves. The persistence length obtained by fitting WLC to stiffness extension data matches well with equilibrium tweezers experiments. In addition, for polystyrene chain in poor solvent no deviation in elastic response is observed between oscillatory and constant velocity pulling experiments. However, such deviation is seen for polystyrene in good solvent. We attribute this to hydrophobic interaction between monomers of polystyrene in water. Our results suggest that oscillatory rheology on single polymer chains provide quantitative estimate of its elastic response. The consistency in values of persistence length using magnetic tweezers experiments in low force regime and the AFM experiments in high force regime suggests that WLC is successful in describing the polymer elasticity in the force range typically probed in AFM experiments. ## Introduction Elasticity of single polymer chain under external force is a fundamental problem in polymer sciencecolby . It has been studied in the context of understanding mechanical properties of complex biological and polymeric systemscarrillo to mechanobiology of protein titin in muscle contractioneckels . With wide technological importance, it plays crucial role in the field of microrheologycharles and fundamentals of protein collapse and protein foldingzoldak . Polymer elasticity is largely entropic in nature and it arises from changes in vast conformational space of polymer’s backbone dihedral angles as external force is applied. Single molecule force spectroscopy techniques such as atomic force microscopy (AFM), optical Tweezers (OTs) and magnetic tweezers (MTs) measures elasticity by generating force versus extension curves with piconewton force resolution and nanometer spatial resolutionneumann . Previous studies based on single molecule force spectroscopy have been done on synthetic polymers and biopolymersvancso ; Cui including DNABustamante , polysaccharidesMarszalek and proteinsLorna . At low forces($<$ 10 pN), chain extension is linear with force(x $\sim$ f) behaving as ideal chain in theta solvent or as a real swollen chain(x $\sim$ f2/3) in good solvent. As force is increased, extension changes nonlinearly with force and asymptotically approaches its contour length. This nonlinear stretching regime is described by two main classes of entropic models that include worm-like chain (WLC)Marko and freely jointed chain(FJC)colby models. WLC treats the polymer as a continuum structureless chain and persistence length ($l_{p}$), a measure of local bending stiffness of chain, is estimated as a fitting parameter. In force regime f $>$ $k_{B}T/l_{p}$, elasticity of DNAbustamante1 ; omar1 , proteinspopa ; berne and synthetic polymer chains saleh ; saleh3 is described by WLC. Typically these experiments were carried out with magnetic tweezers(MTs) in the force range of 1-100 pN. In contrast to MT, AFM experiments done in high force regime of 20-500 pN show anomaly low and unphysical values of persistence length vancso ; walker ; zhang ; zhang2 . To justify such low values, models such as FJC and its modifications were chosen to describe force-extension curve radiom ; Cui ; vancso . It is expected that beyond a threshold force, the nonlinear stretching regime will transition from continuum WLC to a behavior dominated by discrete nature of polymer chain(FJC)rosa ; rubinstein . However, such a transition has not been reported in AFM experiments which covers the range of higher forcessaleh3 . In force spectroscopy experiments, one end of the polymer is typically anchored to a fixed surface with other end tethered to a macroscopic force probe like AFM cantilever or a bead. To generate force-extension curves either the end-to-end distance is controlled externally and force is measured or vice versa. The choice of external control or a statistical ensemble reflects the complexity of interpreting the experimental data. In a typical AFM setup, force is measured indirectly through deflection of the cantilever as end-to- end distance is varied at constant velocity. Such experiments correspond to an ensemble of coupled cantilever-polymer system, wherein polymer stiffness and cantilever probe act simultaneously in an intricate wayfranco ; kreuzer ; staple . This convolution is likely to produce a biased molecular trajectory in which derivative of force-extension curve is not the intrinsic stiffness of the polymer. In MT experiments however, the force is controlled externally and kept fixed while position of the bead is monitored. Such experiments measure properties of an isolated polymer in equilibrium, averaging out the effect of macroscopic probekreuzer ; staple . In literature, method such as equilibrium Weighted Histogram Analysis Method(WHAM)franco ; kumar and othersthirumalai ; netz have been proposed to deconvolute the apparatus effects and obtain the intrinsic trajectory of the molecule. Oscillatory rheology on composite mechanical system is an alternative method which may allow deconvolutionnetz . It is based on the idea of differentiating the dynamical linear response of a single component from the overall response of composite system. In AFM experiments, it can be implemented on cantilever plus polymer system by adding oscillatory perturbation to cantilever probe. In this case, linear response of cantilever and the polymer due to small perturbation is additive to the overall system response. Here, we show that such additivity in linear response allows differentiation of polymer intrinsic response from effects arising due to its coupling to cantilever probe. We implement this by providing oscillations to AFM cantilever while the polymer is simultaneously pulled at constant velocity. Extracting in-phase and out-of- phase linear response to this perturbation, we propose a method to determine the elasticity of single polymer chain. It is demonstrated that elasticity determined from in-phase response show significant deviation from constant velocity pulling experiments. The elastic response of synthetic flexible polymers such as Polyethylene Glycol(PEG) and Polystyrene(PS) is extracted from dynamic oscillatory method and analysed with WLC. For PEG in good solvents, persistence length is large ($\sim$0.64 nm) compared to constant velocity pulling experiments ($\sim$0.13 nm). This value is physically reasonable and matches with equilibrium measurement carried out with MT. In addition, the effect of solvent quality on dynamic oscillatory method is considered. The poor solvent can significantly alter the polymer dynamics and elasticity halperin ; radiom ; grater ; berne2 . For polymers in poor solvents, such as PS in water, the deviation in stiffness measured using constant velocity and oscillatory method is not observed. This is in contrast to good solvent(8M urea) for PS where marked deviation is observed with persistence length about three times ($\sim$0.8 nm) compared to pulling experiments ($\sim$0.25 nm). Although, there are many organic liquids which are typically used as good solvent for PS, we resorted to use 8M urea since it is feasible in AFM experiments compared to volatile organic solvents. Deviation is possibly due to additional hydrophobic forces operating for polystyrene in water. Our results, for the first time, reconcile AFM and MT measurements of single chain elasticity in high force regime (f $>$ $k_{B}T/l_{p}$) and confirms that WLC is largely successful in the force regime probed using AFM. However, the results hint at using WLC with caution for polymers in poor solvents. ## Experimental Section Sample preparation for PEG : Monofunctionalized poly(ethylene) glycol (MeO- PEG-SH) with a molecular weight of 10 kDa was purchased from Sigma-Aldrich with one end functionalized with a thiol group (-SH). For measurements in water Poly(ethylene) glycol was dissolved in deionized-water($>$16 M$\Omega$ cm) to prepare a solution with concentration of 20 $\mu$M. Similar concentration was used to prepare a solution for PEG in 2-propanol. Thermally evaporated gold coverslips were prepared. Gold is inert and does not react with anything chemically but accumulates many organic contaminants due to its high surface free energy. To clean such a gold surface we used UV ozone treatment which is known to remove organic entities and prepare clean gold surfaces. Before use, gold coverslips were gently rinsed with ethanol and deionized water to remove salts. A drop of 60 $\mu$L solution of PEG in respective solvents was deposited on gold cover-slip and incubated for 20 min for strong attachment of thiol ended PEG group on gold surface. Thereafter, the solution was thoroughly rinsed with respective solvents removing any unbound PEG and other impurities. Sample was mounted in the fluid cell for measurement in deionized(DI) water or 2-propanol. Sample preparation for Polystyrene Polystyrene of molecular weight 192 kDa was purchased from Sigma-Aldrich. It was dissolved and stirred in THF$($tetrahydrofuran$)$ for 1 hour with a concentration of $0.1\mu$M. A hot piranha solution$($4:1 mixture of concentrated sulphuric acid and hydrogen peroxide$)$ treated glass coverslip was rinsed with ethanol and deionized$($DI$)$ water. Thereafter, 50 $\mu$l of the solution incubated on it for 10 min. To remove loosely adsorbed polymer, sample was rinsed thoroughly with THF and dried for half an hour. Final sample was mounted in fluid cell and filled with deionized(DI)water or 8M urea for measurement. ### Force measurements The force measurements were carried out on a commercial atomic force microscope (Model JPK Nanowizard II, Berlin, Germany). Gold coated cantilevers from MikroMasch SPM probes were used for experiment. The spring constant of the cantilever was calibrated using thermal fluctuation methodButt . Cantilever was hard pressed against a clean glass coverslip and from already calibrated z- piezo movement sensitivity in units of nm/V was determined. This sensitivity was then used in thermal fluctuation method to calculate spring constant. The spring constant of the cantilever used in the measurement was in the range $0.6-0.8$ N/m with resonance frequency $\sim$ 13 KHz. Such a range was found appropriate for both force and dynamic measurement. Force versus extension profiles were generated following a standard procedure. Initially the cantilever was approached to substrate with a contact setpoint of about 2 nN. Contact setpoint was maintained for 1-2 seconds allowing adsorption of polymer strand on cantilever tip. Cantilever deflects as the attached polymer is stretched while the cantilever was pulled with constant velocity of 150 nm/s. Both z-piezo distance and cantilever deflection detected by quadrant photodiode are recorded. Extension in z-piezo distance is corrected for vertical deflection and force is obtained by multiplying the deflection by spring constant of cantilever. In force spectroscopy experiments, it is crucial to record only single molecule events since the binding between the tip and polymer is non-specific. To achieve this:(1) sample was prepared with low concentration of polymer solution and rinsed several times before measurement. This ensured that mostly individual binding events were captured in force profile. We have discarded any multiple events from analysis and included data which shows cantilever picking only single polymer chain. (2) The curves were rescaled with their apparent contour length obtained by fitting WLC model to force-extension curves(see supplementary fig 3). This is because polymer is picked at random points along the contour and also the polydisperse nature of polymer. If the curves superimpose well, such a normalization procedure indicate that single molecule event was sampled (see supplementary fig 3).(3) Statistics of such curves obtained was (N$\sim$ 50) for each polymer in their respective solvent conditions. All these curves were fitted to extract model parameters (data not shown). In the paper, representative force-curves (N$\sim$ 5) are shown and normalized for fitting procedure in respective solvents. Figure 1: Experimental schematic shows extraction of in-phase (X) and out-of- phase (Y) components of cantilever oscillations using lock-in amplifier with a polymer anchored between the tip and gold substrate. Dither piezo is sinusoidally oscillated with less than 1 KHz frequency and vertical deflection from photodiode is fed into lock-in amplifier. ### Dynamic measurement and Analysis Dynamic measurements were performed with hyperdrive cantilever holder(Bruker) in which cantilever base is oscillated with a small dither piezo as shown in the schematic of figure 1. A sinusoidal voltage was supplied to dither using the lock-in SR830 (Stanford Research System, Sunnyvale, California) with peak- to-peak amplitude of 1-2 nm. Off-resonance frequencies close to $1$ kHz were exploited (resonance frequency $\sim$ 13 Hz). With sinusoidal oscillation as the reference signal, X and Y component of amplitude from photodiode detector were recorded using lock-in amplifier (Time constant 10 ms). Small amplitudes are necessary for simultaneous comparison with static pulling experiment. Also comparatively low pulling velocity (40-70 nm/s) are needed for narrow bandwidth measurements. Vibrations of cantilever beam need to be appropriately modelled for correct interpretation of our dynamic measurement. Flexural vibration of a continuous cantilever beam, can in principle, be decomposed into $n$ eigenmodes. By parameterizing each mode with an equivalent point mass $m^{*}_{n}$, stiffness $k^{*}_{n}$ and quality factor $Q^{*}_{n}$ frequency response (amplitude and phase response) of each mode can be modelled with damped simple harmonic oscillator (SHO). Continuous cantilever beam therefore can be represented as $n$ equivalent simple harmonic oscillatorsraman1 . Figure 2: Rheological description representing our experimental configuration. It comprises of two voigt-kelvin element(i.e., spring and a dashpot) corresponding to the cantilever and polymer. Two elements are acting in parallel i.e their respective spring and dashpot effectively add with each other. In the past, interpretation of dynamic AFM measurement were based on phenomenological point mass model which considers only first eigenmode ($n=1$) to represent the vibrating cantilever. For off-resonance operation employed here, which do not involve eigenmodes, point mass description is appropriate but with a caveat. The oscillating motion of the base is comparable to oscillating amplitude at the cantilever-tip. For quantitative description, base motion need to be explicitly accounted for in the equation of motion because AFM measures deflection or bending with respect to the base.kulik . Also, effects of hydrodynamic loading on the lever due to motion of surrounding fluid are included in the equation of motion. $m^{*}$ is mass that includes an added mass due to inertial loading of fluid moved along with the oscillating lever. $\gamma_{c}$ is viscous damping of the cantilever in the surrounding fluid. Off-resonance operation allows for small amplitudes of oscillation and therefore linearization of interaction force as $F_{int}=k_{i}y-\gamma_{i}\dot{y}$ where y is instantaneous cantilever position. $k_{i}$ and $\gamma_{i}$ are stiffness and damping of molecule. According to the rheological descriptionpethica ; kulik (Figure 2), $k_{i}$ and $\gamma_{i}$ are added in parallel with cantilever spring constant $k_{c}$ and damping $\gamma_{c}$. This is explained (see also supplementary fig 2) and equation of motion governing cantilever-molecule system that includes the base-motion is $m^{*}\frac{\partial^{2}y}{\partial t^{2}}+\gamma\frac{\partial y}{\partial t}+ky=k_{c}A_{b}\cos\omega t$ (1) where $m^{*}$, $\gamma=\gamma_{i}+\gamma_{c}$ and $k=k_{i}+k_{c}$ are effective mass, damping and stiffness of molecule plus cantilever system respectively. The term $k_{c}A_{b}\cos(\omega t)$ is base motion contribution where $\omega$ and $A_{b}$ are drive frequency and amplitude of cantilever dithering. Note that because of base motion, the instantaneous cantilever tip- position $y$ is the sum of cantilever deflection with respect to the base $z$ and base displacement $A_{b}\cos(\omega t)$. Since AFM measures deflection or bending with respect to cantilever base $z$ and not the cantilever position $y$. Hence, transforming equation $1$ with measured $z=y-A_{b}\cos(\omega t)$ we have, $m^{*}\frac{\partial^{2}z}{\partial t^{2}}+\gamma\frac{\partial z}{\partial t}+kz=\underbrace{A_{b}(m^{*}\omega^{2}-k_{i})}_{A\cos\delta}\cos\omega t+\underbrace{A_{b}(\gamma\omega)}_{-A\sin\delta}\sin\omega t\\\ $ (2) $=A\cos\omega t+\delta$ For off-resonance operation first two terms on left hand side are neglectedsarid . Assuming $k_{i}\ll k_{c}$ and identifying amplitude $z$ as $X\cos\omega t+Y\sin\omega t$, we see from eq (2) that ’in phase’ component $X=A\cos\delta$ and ’quadrature’ component $Y=A\sin\delta$ of lock-in signal amplitude are directly proportional to elastic and viscous response of molecule respectively. X and Y are: $X={\frac{A_{b}}{k_{c}}}(-k_{i}+m^{*}\omega^{2})$ (3) and $Y={\frac{-A_{b}\omega}{k_{c}}}{(\gamma_{i}+\gamma_{c})}$ (4) X and Y in volts are converted to angstrom using dc (static) deflection sensitivity calibrated by the response in deep contact and it is further used for spring constant calibration. Proper quantification of stiffness requires accurate estimate of $A_{b}$. As expected, for deep contact with hard glass surface lock-in amplitude $\tilde{A}={2\over{3}}L\large{dz\over{dx}}=A_{b}$ follows the motion of dither piezo and gives an indirect way of measuring $A_{b}$. However this relation may still involve small fluid contribution because of cantilever base motionRaman and therefore for our measurement we employed non-destructive way of directly measuring $A_{b}$ using home built Fabry- Perot based interferometer detection (see supplementary fig 1). This calibration gives the same value to within 10 % as given by deep contact. Error in measuring stiffness $k_{i}$ will primarily arise from systematic error in amplitude $A_{b}$(supplementary). We believe that a maximum systematic error of 20 % in $A_{b}$ will not significantly change our final result. The same procedure as mentioned in force measurement was followed for single molecule detection. The simultaneous dynamic measurements corresponding to such single molecule force events were analyzed. 50 curves for PEG in water and 40 curves for PEG in 2-propanol were analyzed. For polystyrene, 40 and 20 curves in water and 8M urea were analyzed respectively. Representative curves are shown in the paper. Figure 3: a) WLC fit to normalized force-extension curves measured in 2-propanol. WLC fits the force regime with persistence length $l_{p}=0.13$ nm. b) Two-state FJC fit to normalized force extension curves measured in water. The estimated parameter of kuhn length is $0.24$ nm. Additional best fit parameters include(see supplementay) free energy difference between gauche and trans conformer $\Delta G=3.1k_{B}T$ and length of gauche state $L_{gauche}=0.23$ nm. ## Results and Discussion ### .1 Poly(ethylene)glycol #### .1.1 Force-extension measurement Typical force versus extension curves of polyethylene glycol PEG in 2-propanol recorded in single molecule force spectroscopy experiments are shown in Figure 3a. It shows force versus extension curves normalized by their apparent chain extension(see supplementary fig. 3). At a phenomenological level, these non linear force-extension profiles are described with statistical models like wormlike chain (WLC) or freely jointed chain (FJC). WLC treat the polymer as a continuum chain and accounts for entropy dominated contribution to elasticity with two adjustable fitting parameters, persistence length, $l_{p}$ and contour length, $L$. Persistence length is the characteristic length-scale beyond which thermal energy can bend the polymer chain. Therefore, it is a measure of local bending stiffness of the polymer. Equation $5$ describes the Marko-Siggia interpolation formula relating force $F$ to extension $x$ of polymer chain which accounts for low F $<$ $k_{B}$T/$l_{p}$ and high force F $>$ $k_{B}$T/$l_{p}$ behavior of WLC $F={k_{B}T\over{l_{p}}}\bigg{(}{1\over{4(1-{x\over{L}})^{2}}}-{1\over{4}}+{x\over{L}}\bigg{)}$ (5) with boltzmann constant $k_{B}$ and temperature $T$ in kelvin. Figure 3a shows fitted WLC (eq 5) to normalized force-extension profile. The value of persistence length estimated is $l_{p}=0.13\pm 0.02$ nm. WLC fits reasonably well but persistence length obtained is even lower than the monomer size of $(0.4$nm$)$. Note that models with additional free parameters (such as extended-WLC) did not change the goodness of fit or the value of persistence length. Measurements were also performed in deionized(DI) water as shown in 3b. PEG in aqueous medium is known to exhibit a conformational change from gauche to trans as a function of force shown in experimentsgaub ; gaub1 and simulationheymann . The effect of this transition is seen as linear-force region between 100 and 300 pN in 3b, which is not present in 2-propanol. To account for this, force-extension profiles are typically modelled with two- state FJC modelgaub ; Cui1 (supplementary eq 1). This model combines FJC entropic elasticity with changes in length of PEG monomers from gauche to trans as force is applied. Figure 3b shows normalized force extension curves fitted with two-state FJC model. The value of Kuhn length obtained is $b_{k}=0.24$ nm which matches well with its value in 2-propanol($2l_{p}\sim 0.25$ nm) and other organic solventsCui2 . However, the Kuhn length $0.24$ nm is about about five time less compared to $1.2$ nm(or persistence length 0.6 nm) measured in low-force magnetic tweezer measurementssaleh ; saleh2 . Note that a prior work by Oesterhelt et.algaub chose a value of Kuhn length(0.7-0.8 nm) as measured for PEG in hexadecane, to model PEG elasticity with two-state FJC model in water. However, recent measurement shows that such a large value is likely a result of excluded volume effects due to large size of hexadecaneCui2 . The unphysical value of $l_{p}$ seem to suggest that WLC model of entropic elasticity is not the adequate description of AFM data, although it fits well since persistence length is a fit parameter. It is suggested that in typical force range of AFM experiments, WLC behavior will transition to FJC-like behaviorrosa ; rubinstein . Based on this, a WLC-FJC interpolation model was proposed which has features of both WLC (persistence length $l_{p}$) and FJC( a discrete bond length $b$) rubinstein . This interpolation model was used to analyze AFM stretching data on different polymers(see Appendix C, ref.rubinstein ). It is observed that the value of persistence length are similar and does not change with respect to original fitting with WLC model. We tested such a model on our data and similarly no change in persistence length was observed(supplementary fig 4). It suggests that choice of a different model does not explain unreasonably low values of persistence lengths in AFM experiments. This begs the question that why anomaly low values of persistence length( or Kuhn length) repeatedly appear in AFM-based pulling experiments. Another consideration which possibly explains such anomaly is the method of performing the conventional pulling experiments using AFM. It has been recognized that cantilever probe couples with the polymer elasticity in an intricate manner for constant velocity pulling experimentsfranco ; kreuzer . This produces a biased trajectory wherein polymer is not able to sample its intrinsic equilibrium conformations and experiment may not capture the elastic response of the polymer chain alone. This is in contrast to magnetic tweezers experiments wherein properties of isolated polymer in equilibrium are measuredkreuzer . In the next section, we describe our oscillatory rheology measurements on single polymer chain which deconvolute the effect arising due to cantilever from the polymer’s elastic response. We discuss the principle of deconvolution in the last section. #### .1.2 Dynamic measurement Figure 4: For PEG in water, simultaneously measured raw profiles of force in constant velocity(60 nm/sec) pulling experiment (black) and also in-phase X-signal (red) and quadrature Y signal (green) of lock-in amplifier. Figure 5: Comparison of stiffness obtained via dynamic oscillatory method for PEG with conventional force curve derivative a) in water. Derivative of fitted WLC(blue dash) $l_{p}=0.13$ nm obtained in constant velocity pulling experiment simultaneous with stiffness from dynamic oscillatory method(black) fitted with WLC derivative(red) $l_{p}=0.65$ nm. Note that green region between 100 and 300 pN(or extension between 80 and 100 pN) is excluded while fitting to WLC or its derivative. b) in 2-propanol. Derivative of fitted WLC(blue dash) $l_{p}=0.13$ nm from constant velocity pulling experiment compared with stiffness from dynamic oscillatory(black) method fitted with WLC derivative(red) $l_{p}=0.64$ nm. To address this, we directly measure elastic response of PEG chain using dynamic oscillatory method along with constant velocity pulling force- extension curve. For this, the cantilever is simultaneously oscillated while it is pulled slowly at a constant velocity $\sim$ 60 nm/s. This velocity is much less than pulling velocities used in the previous reportsradiom ; Cui . Using lock-in amplifier we record the dynamic linear response at a frequency close to 1 KHz. Figure 4 shows raw profile of X and Y signal of lock-in amplifier measured simultaneously with force-extension curve of PEG in water. From eq $3$, in-phase X signal is directly proportional to the elastic response of polymer $k_{i}$ apart from a fixed contribution from cantilever’s hydrodynamic loading. X-signal follows the feature of force-extension curve and subtracting the fixed cantilever contribution one extracts the elastic response of polymer. Quadrature Y signal is proportional to effective friction of the combined polymer cantilever system. Y signal shows no difference with and without polymer attached and remains featureless in Figure 4. In our recent work, we have shown that the dissipation due to unfolded protein chain of I27 is also immeasurably lowshatruhan . This is possibly due to much faster polymer internal dynamics compared to experimental timescalesmoglich . In Figure 5, the stiffness of the polymer extracted using the in-phase X component data is shown along with derivative of WLC fit to force-extension data. We chose the derivative of the fit for comparison since the derivative of experimental data become noisy for any meaningful comparison. The derivative of force-extension behavior(blue dash) shows marked deviation from directly measured stiffness data(black)for PEG in water(Figure 5a). Analyzing the stiffness data with WLC model(red) gives persistence length of $l_{p}=0.65\pm 0.19$ nm compared to $l_{p}=0.13\pm 0.02$ nm from derivative of force-extension curve. We excluded part of the data in the extension range of 80 to 100 nm (green) which show marked deviations while fitting both force and stiffness data to WLC (see supplementary fig 5). As explained earlier, PEG monomers undergo a well-known trans-trans-gauche to all-trans conformational change in water as shown in experimentsgaub ; gaub1 and simulationheymann . As observedgaub1 , this transition characteristically shows up as a linear force region between 100 and 300 pN(80 and 100 nm). Deviation of stiffness data in similar force region(80 and 100 nm) shows that our dynamic measurement is sensitive to such conformational change. However, due to conformational change such a fitting procedure with WLC cannot be used to extract any meaningful estimate of persistence length. To avoid the conformational change in water, we performed measurements in 2-propanol which is also a good solvent for PEG. Since 2-propanol is volatile, the experiment is performed within 2 hour of injecting it into fluid cell. The effects due to conformational change are now absent in both the dynamic stiffness in Figure 5b) as well as in constant velocity pulling data (figure 3a). For PEG in 2-propanol, direct measurement of stiffness through oscillatory rheology gives the persistence length $l_{p}=0.64\pm 0.19$ nm and WLC fits well in the entire range without having to exclude any region due to hydration effects as in Figure 5a. The constant velocity pulling experiments yield a value persistence length($0.13\pm 0.02$ nm). Persistence length of $0.64\pm 0.19$ nm is consistent with low-force equilibrium measurements performed using magnetic tweezers manipulationsaleh ; saleh2 and also other ensemble techniquescolby ; colby2 . Dittmore et. alsaleh and Innes-gold et. alsaleh2 reported the $l_{p}$ value of $0.55$ nm and $0.65$ nm respectively. And the neutron scattering measurements by Smith et. alcolby2 report the $l_{p}$ for PEG as $0.6$ nm. In the context of extracting viscoelastic information, oscillatory measurements have been performed on single moleculeskawakami ; kawakami2 ; liang . In contrast to the present study, these measurements were performed with oscillation frequencies close to cantilever resonance and have reported dissipation for single molecule. Recent work in modelling of cantilever dynamics in liquid, highlights the problem in interpretation of single- molecule dissipation dataDeitler2 ; shatruhan . It points out difficulty in making a distinction between elastic and dissipative signals especially for frequencies close to cantilever resonance. Dynamic measurement on PEG were also performed in water previouslyhinterdorfer . Kienberger et al.used PEG derivatives with functional groups at the chain ends to couple the chain to tip and the substrate and magnetic excitation scheme to oscillate the cantilever close to resonance. The measured static pulling as well as dynamic force-extension profiles were analyzed with the extended Worm-Like-Chain (WLC) model, yielding a persistence length of 0.38 nm. These measurements are not strictly off-resonance as compared to ours. The use of magnetic excitation method, however are known to produce artefact-free measurementsraman2 . It is noteworthy that the oscillatory measurements in their case also produce reasonably good persistence length estimates. A detailed investigation to compare our method to the one used by Kienberger et al. is worthwhile. In the next section we describe our measurements on polystyrene(PS) in good and poor solvents. This sheds light on the influence of solvents on our dynamic measurement and ultimately understanding its effect on polymer elasticity. ### .2 Polystyrene In order to further examine the effect of poor solvents on dynamic oscillatory measurements, we performed force spectroscopy measurement on polystyrene in water. One difference between the two homopolymers is that PS has aromatic side chains which are hydrophobic and the polymer chain collapses in poor solvent such as water. It has been demonstrated recently that high concentration aqueous solution of urea acts as good solvent for PS zangi ; mondal ; england . We performed both, the constant velocity pulling and dynamic oscillatory measurements, on PS in water and PS in 8 M urea solution in water. #### .2.1 Force-extension measurement Figure 6: Normalized force-extension curves for polystyrene in water with persistence length $l_{p}=0.23$ nm. Figure 7: Comparison of derivative of WLC obtained from fitting to force-extension curve(blue dash), stiffness measured with dynamic oscillatory(black) method and WLC derivative fit(red) to stiffness. a)Polystyrene in water b)Polystyrene in 8M urea. Figure 6 shows normalized force extension profiles fitted with WLC. Note that we fit in the entire force regime ignoring the flat plateau region ($<$20 pN) which results from coil-globule transition for polystyrene in waterwalker2 . The fit gives a persistence length $l_{p}=0.23\pm 0.02$ nm consistent with observation made earlierwalker . The steric hindrances are offered by aromatic side group of benzene. It is 0.72 nm long and is responsible for determining the persistence length. In this sense, the size of the monomer is about $0.72$ nm and the observed low value of persistence length has been debatedradiom . It is expected to have a $l_{p}$ larger than $1$ nm. Low value of $0.25$ nm is also consistently cited in ideal to good solvents like tolueneradiom ; walker2 . #### .2.2 Dynamic measurement We repeat our simultaneous oscillatory measurement along with force-extension measurements on polystyrene in water. Figure 7a shows stiffness measured by dynamic oscillatory method(black), WLC fit to it (red) and derivative of WLC fit to the force-extension curve (blue dash). Interestingly, they coincide with each other having no clear deviation as in case of PEG in water or 2-propanol. Persistence length obtained by fit to the dynamic stiffness data is similar $l_{p}=0.21\pm 0.02$ nm. Similarly, in contrast to our observation on PEG in good solvents(5), the unfolded globular proteins show same value of persistence length in AFMLorna , MTspopa and also oscillatory measurementsDeitler2 ; shatruhan . As in case of polystyrene, we suspect that fitting WLC to the data yields persistence length as only an effective parameter. However, in WLC model the strong hydrophobic effects are not considered along with backbone entropic contributions. A need to include this effect has already been suggested in the literaturegrater ; berne . In order to confirm this effect, we employed our measurement scheme on polystyrene in good solvent. High concentration of aqueous urea solution behaves similar to a good solvent for hydrophobic polymer, as it weakens the hydrophobic interaction which causes the polymer to collapse in waterzangi ; mondal ; england . We carry out dynamic measurement in 8M urea as shown in Figure 7b. It shows the comparison of dynamic and constant velocity pulling measurements. Interestingly, we obtain a similar deviation between the derivative of WLC fit to force-extension curves($l_{p}$=0.25 nm) and stiffness-extension curves measured using dynamic oscillatory method ($l_{p}$ as 0.8 nm). This value of $l_{p}$ is reasonable since it is larger than monomer size. The similarity in results between PEG and PS in good solvent is striking. We discuss it further in the next section. We argue that the hydrophobic interactions dominate the polymer elasticity in such a way that stiffness from dynamic oscillatory technique and derivative of force extension curves approach each other. ### .3 Principle of deconvolution To qualitatively explain the deviation between derivative of force-extension curve and oscillatory measurement we begin by noting that conventional constant velocity pulling experiments represent a coupled cantilever-molecule system. In AFM experiments, the extension of molecule and force on it are measured indirectly through the deflection of cantilever probe to which the molecule is tethered. This deflection force is determined by simultaneous action of both cantilever and the molecule in an intricate convolution and effect of one from the other is difficult to separatefranco ; kreuzer . To understand this better, one makes a connection between force-extension curve and polymer stretching thermodynamics(see supplementary information). Under equilibrium condition, canonical partition function $Z_{system}$ of composite cantilever plus molecule system at a given displacement $D$ of cantilever at time t can be written asfranco ; kreuzer : $Z_{system}(D)\sim Z_{m}*Z_{c}=e^{{-\beta F(x)}}e^{{-{\beta k_{c}\delta^{2}}/2}}$ (6) where $\beta$ is 1/$k_{B}T$, $x$ is end-to-end extension of molecule. $Z_{m}$ is the partition function of isolated molecule determined by its molecular free energy F($x$) and $Z_{c}$ is cantilever partition function determined by its stiffness $k_{c}$ and deflection $\delta$. Because deflection is $\delta$=$D-x$, the function in eq (6) defines the mathematical convolution of cantilever and molecule in pulling experiments. Therefore, measured quantities such as average force determined by $Z_{system}$ are those of composite molecule plus cantilever system(see supplementary). However, one is interested in the properties of molecule itself determined by $Z_{m}$. One notes from eq(6) that either at high force characterized by large deflection or the use of stiff spring $k_{c}$, contribution of cantilever biasing potential $k_{c}(D-x)^{2}/2$ is reduced substantially with $Z_{c}$ approaching delta function $\delta(D-x)$kreuzer . This implies that at high forces the derivative of force-extension curve and stiffness from the dynamic measurement will start to coincide as seen in fig 5a, 5b and fig 7b. Similarly, for soft spring or low force magnetic tweezer measurement done at a constant force, partition function reduces to that for an isolated moleculekreuzer . Therefore, effect of coupling would be maximum at intermediate forces. To see this, it is noted that a free energy($F$) in eq(6) is determined by WLC entropy ($-TS_{WLC}$). At an intermediate force ($\sim$ 250 pN), cantilever potential is $\sim$ 12 kT compared with WLC entropic contribution($-TS_{WLC}$) of about 2 kT( see supplementary information). Therefore, from eq(6), cantilever dominantly determines the overall $Z_{system}$, producing a biased force-extension curve. In contrast, directly measuring stiffness by externally oscillating the cantilever, stretched polymer and the cantilever work in parallel pathways. This means that the contribution of polymer and cantilever to the overall system response is simply additive as seen from eq(3) and eq(4). Therefore, oscillatory measurement allows to extract polymer intrinsic response from its coupling to cantilever probe. For externally modulated AFM cantilever it is known that spring for the polymer effectively adds with cantilever to determine net force on the systempethica ; kulik (supplementary fig 2). This observation results in parallel coupling pathway in eq (3). In addition to conformational entropy of backbone, polymer-solvent interactions significantly influence elasticity of extended hydrophobic polymers like polystyrenegrater ; berne2 ; radiom ; gosline . It is well established that hydrophobic interactions among nonpolar monomers tend to soften the polymer, reducing its persistence length by a large factorgrater ; berne2 . Thermodynamically, the strength of hydrophobic interactions can be described in terms of hydrophobic solvation free energy between polymer and solvent. Exposure of hydrophobic side chains upon extension would require hydrophobic free energy penalty that is large and positivegosline . It is estimated from experiments to be about six times the chain entropygrater even for relatively large chain extension and lowers the persistence length significantly. With bulky aromatic side chain, hydrophobic free energy per monomer of polystyrene is estimated to be $\sim$ 20 kTabraham . Hence, from eq (6) we see that total free energy F($F_{hydrophobic}$+$F_{WLC}$) starts to become dominant compared to cantilever biasing in determining overall $Z_{system}$. Therefore, the dynamic oscillatory method and the constant velocity pulling experiments produces similar stiffness profiles for polystyrene in water. Since WLC only accounts for entropic contributions, one should avoid its use to analyse the data of both unfolded proteins and hydrophobic polymers in poor solvents. ## Conclusions We employ oscillatory rheology to get an independent yet simultaneous estimate of elastic response in single molecule pulling experiments. This response shows significant deviation in elasticity from conventional constant velocity pulling experiments in good solvents. The analysis with WLC model, which accounts for entropic nature of elasticity, results in a large and physically acceptable value of persistence length. This value is consistent with equilibrium magnetic tweezers measurements, which suggests that oscillatory dynamic measurement using AFM is better suited for measurement of single polymer chain elasticity compared to constant velocity pulling experiment. We conclude that constant velocity pulling experiments using AFM produces a biased molecular trajectory due to convolution of cantilever probe with molecule’s response. In contrast, for polymer chain in poor solvent no deviation is observed in stiffness profiles extracted from data using both methods. We explain this by considering the contribution of additional hydrophobic free energy and its effect on sampling the intrinsic equilibrium configuration in poor solvents. Such considerations explain our observation that both methods yield the same elastic response for polymer single chain in poor solvent. While pulling experiments were suspected to be biased in earlier works, present study is the first to show oscillatory technique to deconvolute apparatus effects. Although we use WLC at a phenomenological level, a persistence length consistent with other techniques underlines its success in high-force AFM stretching experiments. However, results hint at observing caution for its use in describing AFM data of polymers in poor solvents. ## Supporting Information * • Calibration of drive amplitude of dither piezo; Error analysis; Normalization of PEG force-extension curves; Stiffness add in parallel; two-state fjc, wlc- fjc interpolation; Connection between force-extension curve and thermodynamics. ## Acknowledgements The work was supported by Wellcome Trust-DBT India Alliance fellowship to SP (500172/Z/09/Z). Amrita Kulkarni helped in preparing samples. VA and SR would like to acknowledge fellowship from IISER Pune. ## References ## References * (1) Rubinstein, M.; Colby, R. H. Polymer Physics; Oxford University Press: New York, 2003. * (2) Carrillo, J. M. Y.; MacKintosh, F. C.; Dobrynin, A. V. Nonlinear Elasticity: From Single Chain to Networks and Gels. Macromolecules 2013, 46, 3679-3692. * (3) Eckels, E. C.; Tapia-Rojo, R.; Rivas-Pardo, J. A., Fernández JM. The work of titin protein folding as a major driver in muscle contraction. Annu. Rev. Physiol. 2018, 80, 327–351. * (4) Schroeder, C. M. Single Polymer Dynamics for Molecular Rheology. J. Rheol. 2018, 62, 371– 403. * (5) Žoldák, G.; Rief, M. Force as a single molecule probe of multidimensional protein energy landscapes. Curr. Opin. Struct. Biol. 2013, 23, 48– 57 * (6) Neuman, K. C.; Attila, N. Single-Molecule Force Spectroscopy: Optical Tweezers, Magnetic Tweezers and Atomic Force Microscopy. Nat. Methods 2008, 5, 491– 505. * (7) Giannotti, M. I.; Vancso, G. J. Interrogation of Single Synthetic Polymer Chains and Polysaccharides by AFM-Based Force Spectroscopy ChemPhysChem 2007, 8, 2290. * (8) Bao, Y.; Luo, Z.; Cui, S. Environment-Dependent Single-Chain Mechanics of Synthetic Polymers and Biomacromolecules by Atomic Force Microscopy-Based Single-Molecule Force Spectroscopy and the Implications for Advanced Polymer Materials. Chem. Soc. Rev. 2020, 49, 2799– 2827. * (9) Bustamante, C.; Bryant, Z.; Smith, S. B. Ten years of tension: single-molecule DNA mechanics. Nature 2003, 421, 423-427. * (10) Marszalek, P. E.; Dufrene, Y. F. Stretching single polysaccharides and proteins using atomic force microscopy. Chem. Soc. Rev. 2012, 41, 3523-3534. * (11) Hoffmann, T.; Dougan, L. Single molecule force spectroscopy using polyproteins. Chem. Soc. Rev. 2012, 41, 4781– 4796. * (12) Marko, J. F.; Siggia, E. D. Stretching DNA. Macromolecules 1995, 28, 8759-8770. * (13) Bustamante, C.; Marko, J. F.; Siggia, E. D.; Smith, S. Entropic elasticity of lambda-phage DNA. Science 1994, 265, 1599– 1600. * (14) Saleh, O. A.; McIntosh, D. B.; Pincus, P.; Ribeck, N. Nonlinear low-force elasticity of single-stranded DNA molecules. Phys. Rev. Lett. 2009, 102, 068301-1– 068301-4. * (15) Valle-Orero, J.; Rivas-Pardo, J. A.; Popa, I. Multidomain proteins under force. Nanotechnology 2017, 28 (17) 174003. * (16) Stirnemann, G.; Giganti, D.; Fernandez, J. M.; Berne, B. J. Elasticity, Structure, and Relaxation of Extended Proteins Under Force. Proc. Natl. Acad. Sci. 2013, 3847– 3852. * (17) Dittmore, A.; McIntosh, D. B.; Halliday, S.; Saleh, O. A. Single-molecule elasticity measurements of the onset of excluded volume in poly (ethylene glycol). Phys. Rev. Lett. 2011, 107, 148301. * (18) Saleh, O. A. Perspective: Single polymer mechanics across the force regimes. J. Chem. Phys. 2015, 142, 194902. * (19) Al Maawali, S.; Bemis, J. E.; Akhremitchev, B. B.; Liu, H.; Walker, G. C. Single-Molecule AFM Study of Polystyrene Grafted at Gold Surfaces J. Adhes. 2005, 81, 999-1016. * (20) Li, H.; Zhang, W.; Xu, W.; Zhang, X. Hydrogen Bonding Governs the Elastic Properties of Poly(vinyl alcohol) in Water: Single-Molecule Force Spectroscopic Studies of PVA by AFM Macromolecules 2000, 33, 465– 469. * (21) Dessinges, M.-N.; Maier, B.; Zhang, Y.; Peliti, M.; Bensimon, D.; Croquette, V. Stretching Single Stranded DNA, a Model Polyelectrolyte. Phys. Rev. Lett. 2002, 89, 248102. * (22) Milad Radiom, Plinio Maroni, and Michal Borkovec . Influence of Solvent Quality on the Force Response of Individual Poly(styrene) Polymer Chains. ACS Macro Letters 2017, 6 , 1052-1055. * (23) Rosa, A.; Hoang, T. X.; Marenduzzo, D.; Maritan, A. Elasticity of semiflexible polymers with and without self-interactions. Macromolecules 2003, 36, 10095– 10102. * (24) Dobrynin, A. V.; Carrillo, J.-M. Y.; Rubinstein, M. Chains Are More Flexible under Tension. Macromolecules 2010, 43 (21), 9181– 9190. * (25) Franco, I.; Ratner, M. A.; Schatz, G. C. Single-Molecule Pulling: Phenomenology and Interpretation. Nano and Cell Mechanics; John Wiley $\&$ Sons, Ltd: Chichester, U.K., 2012; Vol. 3113, pp 359– 388. * (26) Kreuzer, H. J.; Payne, S. H.; Livadaru, L. Stretching a macromolecule in an atomic force microscope: statistical mechanical analysis. Biophys. J.2001, 80, 2505–2514. * (27) Staple, D. B.; Hanke, F.; Kreuzer, H. J. Comment on sub- Angstrom conformational changes of a single molecule captured by AFM variance analysis. Biophys. J. 2008, 95, 1001-1002. * (28) Kumar, S.; Bouzida, D.; Swendsen, R. H.; Kollman, P. A.; Rosenberg, J. M. The weighted histogram analysis method for free‐energy calculations on biomolecules. I. The method. J. Comput. Chem. 1992, 13, 1011-1021. * (29) Hinczewski, M.; Gebhardt, J. C. M.; Rief, M.; Thirumalai, D. From mechanical folding trajectories to intrinsic energy landscapes of biopolymers. Proc. Natl. Acad. Sci. U. S. A. 2013, 110 (12), 4500. * (30) Hinczewski, M.; von Hansen, Y.; Netz, R. R. Deconvolution of Dynamic Mechanical Networks Proc. Natl. Acad. Sci. U.S.A. 2010, 107, 21493– 21498. * (31) Halperin, A., Goldbart, P. M. Early stages of homopolymer collapse. Phys. Rev. E 2000, 61, 565-573. * (32) Walther, K. A., Grater, F., Dougan, L., Badilla, C. L., Berne, B. J., and Fernandez, J. M. Signatures of hydrophobic collapse in extended proteins captured with force spectroscopy. Proc. Natl. Acad. Sci. U.S.A. 2007, 104, 7916– 7921. * (33) Grater, F.; Heider, P.; Zangi, R.; Berne, B. J. Dissecting Entropic Coiling and Poor Solvent Effects in Protein Collapse. J. Am. Chem. Soc. 2008, 130, 11578– 11579. * (34) Butt, H. J.; Jaschke, M. Calculation of thermal noise in atomic force microscopy. Nanotechnology 1995, 6, 1-7. * (35) Melcher, J.; Hu, S.; Raman, A. Equivalent Point-Mass Models of Continuous Atomic Force Microscope Probes Appl. Phys. Lett. 2007, 91, 053101. * (36) Kiracofe, D.; Raman, A. Quantitative Force and Dissipation Measurements in Liquids Using Piezo-Excited Atomic Force Microscopy: A Unifying Theory. Nanotechnology 2011, 22, 485502. * (37) Pethica, J. B.; Oliver, W. C. Tip surface interactions in STM and AFM. Phy. Scr. 1987, T19, 61. * (38) Burnham, N. A.; Gremaud, G.; Kulik, A. J.; Gallo, P.-J.; Oulevey, F. Materials’ properties measurements: choosing the optimal scanning probe microscope configuration J. Vac. Sci. Technol.B 1996, 14, 1308-1312. * (39) Sarid, D.Scanning Force Microscopy; Oxford University Press, London, UK, 1991. * (40) Benedetti, F.; Gazizova, Y.; Kulik, A. J.; Marszalek, P. E.; Klinov, D. V.; Dietler, G.; Sekatskii, S. K. Can Dissipative Properties of Single Molecules Be Extracted from a Force Spectroscopy Experiment? Biophys. J. 2016, 111, 1163-1172. * (41) Oesterhelt, F.; Rief, M.; Gaub, H. E. Single Molecule Force Spectroscopy by AFM Indicates Helical Structure of Poly(ethyleneGlycol) in Water. New J. Phys. 1999, 1, 1-11. * (42) Ott, W.; Jobst, M. A.; Bauer, M. S.; Durner, E.; Milles, L. F.; Nash, M. A.; Gaub, H. E. Elastin-Like Polypeptide Linkers for Single Molecule Force Spectroscopy. ACS Nano 2017, 11, 6346-6354. * (43) Heymann, B.; Grubmüller, H. Elastic properties of poly (ethylene-glycol) studied by molecular dynamics stretching simulations. Chem. Phys. Lett. 1999, 303, 1. * (44) Cai, W., Lu, S., Wei, J. and Cui, S., Single-chain polymer models incorporating the effects of side groups: an approach to general polymer models. Macromolecules 2019, 52(19), pp.7324-7330. * (45) Luo, Z.; Zhang, B.; Qian, H. J.; Lu, Z. Y.; Cui, S. Effect of the Size of Solvent Molecules on the Single-Chain Mechanics of Poly(Ethylene Glycol): Implications on a Novel Design of a Molecular Motor. Nanoscale 2016, 8, 17820– 17827. * (46) Möglich, A.; Joder, K.; Kiefhaber, T. End-to-end distance distributions and intrachain diffusion constants in unfolded polypeptide chains indicate intramolecular hydrogen bond formation. Proc. Natl. Acad. Sci. U.S.A. 2006, 103, 12394-12399. * (47) Shatruhan,S. S.; Deopa, S. P. S.; Yadav, J.; Ahlawat, V.; Patil, S. The nano-scale viscoelasticity using atomic force microscopy in liquid environment. Nanotechnology 2021, 32, 085103. * (48) Innes-Gold, S. N.; Morgan,I. L.; Saleh,O. A. Surface-induced effects in fluctuation-based measurements of single-polymer elasticity: A direct probe of the radius of gyration.J. Chem. Phys. 2018, 148(12), 123314. * (49) Smith, G. D.; Yoon, D. Y.; Jaffe, R. L.; Colby, R. H.; Krishnamoorti, R.; Fetters, L. J. Conformations and Structures of Poly(oxyethylene) Melts from Molecular Dynamics Simulations and Small-Angle Neutron Scattering Experiments. Macromolecules 1996, 29, 3462. * (50) Kawakami, M., Byrne, K., Khatri, B., McLeish, T. C. and Smith, D. A. Viscoelastic properties of single poly (ethylene glycol) molecules ChemPhysChem 2006, 7, 1710. * (51) Kawakami, M.; Byrne, K.; Khatri, B.; Mcleish, T. C. B.; Radford, S. E.; Smith, D. A. Viscoelastic measurements of single molecules on a millisecond time scale by magnetically driven oscillation of an atomic force microscope cantilever Langmuir 2005, 21, 4765-4772. * (52) Liang, X.; Nakajima, K. Investigating the Dynamic Viscoelasticity of Single Polymer Chains using Atomic Force Microscopy J. Polym. Sci. B 2019, 57, 1736–43. * (53) Kienberger, F.; Pastushenko, V. P.; Kada, G.; Gruber, H. J.; Riener, C.; Schindler, H.; Hinterdorfer, P. Static and dynamical properties of single poly(ethylene glycol) molecules investigated by force spectroscopy Single Mol. 2000, 1, 123– 128. * (54) Xu, X.; Raman, A. Comparative dynamics of magnetically, acoustically, and Brownian motion driven microcantilevers in liquids J. Appl. Phys. 2007, 102 (3) 034303. * (55) Gunari, N.; Balazs, A. C.; Walker, G. C. Force-Induced Globule-Coil Transition in Single Polystyrene Chains in Water. J. Am. Chem. Soc. 2007, 129, 10046– 10047. * (56) Zangi, R.; Zhou, R.; Berne, B. J. Ureas Action on Hydrophobic Interactions. J. Am. Chem. Soc. 2009, 131, 1535– 1541. * (57) Mondal, J.; Halverson, D.; Li, I. T. S.; Stirnemann, G.; Walker, G. C.; Berne, B. J. How Osmolytes Influence Hydrophobic Polymer Conformations: A Unified View from Experiment and Theory Proc. Natl. Acad. Sci. U. S. A. 2015, 112, 9270– 9275. * (58) England, J. L.; Haran, G. Role of Solvation Effects in Protein Denaturation: From Thermodynamics to Single Molecules and Back Annu. Rev. Phys. Chem. 2011, 62, 257– 277 * (59) Gosline, J. M. Hydrophobic interaction and a model for the elasticity of elastin. Biopolymers 1978, 17, 677-695. * (60) Abraham, M. H.; Whiting, G. S.; Fuchs, R.; Chambers, E. J.Thermodynamics of Solute Transfer from Water to Hexadecane J. Chem. Soc., Perkin Trans. 1990, 2, 291-300.
arxiv-papers
2021-07-27T08:35:49
2024-09-04T03:07:20.932293
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Vikhyaat Ahlawat, Shatruhansingh Rajput, Shivprasad Patil", "submitter": "Shivprasad Patil", "url": "https://arxiv.org/abs/2107.12670" }
2107.12672
1136 research algorithm/technique Weiss et al.: Differentiable Direct Volume Rendering A fully differentiable direct volume renderer is used for a) viewpoint optimization, b) transfer function optimization, and optimization of voxel properties using c) an absorption-only model and d) an emission- absorption model with rgb$\alpha$ transfer functions. a), c) and d) show intermediate results of the optimization process until convergence. # Differentiable Direct Volume Rendering Sebastian Weiss and Rüdiger Westermann e-mail: [email protected]: [email protected] Technical University of Munich ###### Abstract We present a differentiable volume rendering solution that provides differentiability of all continuous parameters of the volume rendering process. This differentiable renderer is used to steer the parameters towards a setting with an optimal solution of a problem-specific objective function. We have tailored the approach to volume rendering by enforcing a constant memory footprint via analytic inversion of the blending functions. This makes it independent of the number of sampling steps through the volume and facilitates the consideration of small-scale changes. The approach forms the basis for automatic optimizations regarding external parameters of the rendering process and the volumetric density field itself. We demonstrate its use for automatic viewpoint selection using differentiable entropy as objective, and for optimizing a transfer function from rendered images of a given volume. Optimization of per-voxel densities is addressed in two different ways: First, we mimic inverse tomography and optimize a 3D density field from images using an absorption model. This simplification enables comparisons with algebraic reconstruction techniques and state-of-the-art differentiable path tracers. Second, we introduce a novel approach for tomographic reconstruction from images using an emission-absorption model with post-shading via an arbitrary transfer function. ###### keywords: Differentiable rendering, Direct Volume Rendering, Automatic Differentiation Introduction Differentiable direct volume rendering (DiffDVR) can serve as a basis for a multitude of automatic optimizations regarding external parameters of the rendering process such as the camera, the transfer function (TF), and the integration stepsize, as well as the volumetric scalar field itself. DiffDVR computes derivatives of the rendered pixel values with respect to these parameters and uses these derivatives to steer the parameters towards an optimal solution of a problem-specific objective (or loss) function. DiffDVR is in particular required when using neural network-based learning tasks, where derivatives need to be propagated seamlessly through the network for training end-to-end regarding the loss function. While a number of approaches have been proposed for differentiable surface rendering [20], approaches focusing on differentiable rendering in the context of volume visualization are rare. For surface rendering, one objective is on the optimization of scene parameters like material properties, lighting conditions, or even geometric shape, to achieve matchings of synthetic and real images in computer vision tasks. Others have used implicit surface representations encoded via volumetric signed distance functions to derive analytic gradients for image-based shape reconstruction tasks [25, 44, 35]. These approaches assume opaque surfaces so that in each optimization iteration the gradient descent is with respect to the encoding of a single fragment per pixel. This is different from direct volume rendering applications, where the optimization needs to consider the contributions of many samples to a pixel color. This requires considering a large number of partial derivatives of pixel colors with respect to parameter or material changes, and to propagate them back into the volumetric field. The differentiable rendering framework Mitsuba 2 [37] also provides a solution for direct volume rendering through Monte Carlo path tracing. However, Mitsuba directly applies so-called reverse-mode differentiation, which requires all intermediate derivatives to be saved for backpropagation. Thus, the memory required in direct volume rendering applications quickly exceeds the available system memory. This limits the approach to small volumetric grids and a small number of volume interactions that cannot faithfully optimize for small-scale structures. A follow-up work [36] addresses this issue but limits the differentiability to volume densities and colors. ### 0.1 Contribution This work presents a general solution for DiffDVR: differentiable Direct Volume Rendering using the emission-absorption model without multiple scattering. This requires analyzing approaches for automatic differentiation (AD) with respect to the specific requirements in direct volume rendering (DVR). So-called forward-mode approaches are efficient if the number of parameters is low, yet they become computationally too expensive with an increasing number of parameters, i.e., when optimizing for per-voxel densities in a volumetric field. The so-called reverse mode or adjoint mode records the operations and intermediate results in a graph structure. This structure is then traversed in reverse order during the backward pass that propagates the changes to the sample locations. However, this requires storing $O(kn)$ intermediate results, where $n$ is the number of pixels and $k$ the number of sample locations, and reversing the order of operations. We show that a-priori knowledge about the operations performed in DVR can be exploited to avoid recording the operations in reverse-mode AD. We propose a custom computation kernel that inverts the order of operations in turn and derives the gradients used by AD. We further present a method for recomputing intermediate results via an analytic inversion of the light accumulation along the view rays. By this, intermediate results do not need to be recorded and the memory consumption of reverse-mode AD becomes proportional to $O(n)$. As our second contribution, we discuss a number of use cases in which AD is applied in volume rendering applications (Differentiable Direct Volume Rendering). These use cases demonstrate the automatic optimization of external parameters of the rendering process, i.e., the camera and the TF. Here the 3D density field is not changed, but the optimization searches for the external parameters that—when used to render this field—yield an optimal solution of a problem-specific loss function. In addition, we cover problems where the optimization is with respect to the densities. I.e., the field values are optimized so that an image-based loss function—after rendering the optimized field—yields an optimal solution. We consider inverse tomography by restricting the rendering process to an absorption-only model without a TF and optimize the densities using given images of the field. For this case, we compare our method against algebraic reconstruction techniques [50, 49] and Mitsuba 2 [37, 36]. Beyond that, and for the first time to our best knowledge, we show how to incorporate TFs and an emission-absorption model into tomographic reconstruction and deal with the resulting non-convex optimization problem. DiffDVR is written in C++ and CUDA, and it provides seamless interoperability with PyTorch for a simple embedding into existing training environments with complex, potentially network-based loss functions. The code is made publicly available under a BSD license111https://github.com/shamanDevel/DiffDVR. ## 1 Related Work #### Differentiable Rendering A number of differentiable renderers have been introduced for estimating scene parameters or even geometry from reference images, for example, under the assumption of local illumination and smooth shading variations [26, 41, 42, 21], or via edge sampling to cope with discontinuities at visibility boundaries [24]. Scattering parameters of homogeneous volumes have been estimated from observed scattering pattern [12]. Recently, Nimier-David et al. proposed Mitsuba 2 [37], a fully-differentiable physically-based Monte-Carlo renderer. Mitsuba 2 also handles volumetric objects, yet it requires storing intermediate results during the ray sampling process at each sampling point. This quickly exceeds the available memory and makes the approach unfeasible for direct volume rendering applications. Later, the authors have shown how to avoid storing the intermediate results [36], by restricting the parameters that can be derived to, e.g., only shading and emission. However, these methods are tailored for path tracing with multiple scattering and rely on Monte-Carlo integration with delta tracking. This makes them prone to noise and leads to long computation times compared to classical DVR methods without scattering. Our method, in contrast, does not require storing intermediate results and can, thus, use large volumes with arbitrary many sampling steps without resorting to a restricted parameter set. Furthermore, it does not impose restrictions on the parameters of the volume rendering process that can be differentiated. #### Parameter Optimization for Volume Visualization An interesting problem in volume visualization is the automatic optimization of visualization parameters like the viewpoint, the TF, or the sampling stepsize that is required to convey the relevant information in the most efficient way. This requires at first hand an image-based loss function that can be used to steer the optimizer toward an optimal parameter setting. To measure a viewpoint’s quality from a rendered image, loss functions based on image entropy [19, 51, 46, 7] or image similarity [47, 57] have been used. For volume visualization, the relationships between image entropy and voxel significance [5] as well as importance measures of specific features like isosurfaces [45] have been considered. None of these methods, however, considers the rendering process in the optimization process. Instead, views are first generated from many viewpoints, e.g., by sampling via the Fibonacci sphere algorithm [28], and then the best view regarding the used loss function is determined. We envision that by considering the volume rendering process in the optimization, more accurate and faster reconstructions can be achieved. Another challenging problem is the automatic selection of a “meaningful” TF for a given dataset, as the features to be displayed depend highly on the user expectation. Early works attempted to find a good TF using clusters in histograms of statistical image properties [15] or fitting visibility histograms [8]. Others have focused on guiding an explorative user interaction [59, 27], also by using neural networks [3]. For optimizing a TF based on information measures, Ruiz et al. [43] proposed to bin voxels of similar density and match their visibility distribution from multiple viewpoints with a target distribution defined by local volume features. For optimization, the authors employ a gradient-based method where the visibility derivatives for each density bin are approximated via local linearization. Concerning the performance of direct volume rendering, it is crucial to determine the minimum number of data samples that are required to accurately represent the volume. In prior works, strategies for optimal sampling in screen-space have been proposed, for instance, based on perceptual models [4], image saliency maps [39], entropy-based measures [56], temporal history [29], or using neural networks [53, 54]. Other approaches adaptively change the sampling stepsize along the view rays to reduce the number of samples in regions that do not contribute much to the image [9, 23, 6, 32]. DiffDVR’s capability to compute gradients with respect to the stepsize gives rise to a gradient-based adaptation using image-based loss functions instead of gradient-free optimizations or heuristics. #### Neural Rendering As an alternative to classical rendering techniques that are adapted to make them differentiable, several works have proposed to replace the whole rendering process with a neural network. For a general overview of neural rendering approaches let us refer to the recent summary article by Tewari et al. [48]. For example, RenderNet proposed by Nguyen-Phuoc et al. [34] replaces the mesh rasterizer with a combination of convolutional and fully connected networks. In visualization, the works by Berger et al. [3] and He et al. [16] fall into the same line of research. The former trained a network on rendered images and parameters of the rendering process, and use the network to predict new renderings by using only the camera and TF parameters. The latter let a network learn the relationships between the input parameters of a simulation and the rendered output, and then used this network to skip the rendering process and create images just from given input parameters. ## 2 Background In the following, we review the fundamentals underlying DVR using an optical emission-absorption model [30]. Then we briefly summarise the foundation of Automatic Differentiation (AD), a method to systematically compute derivatives for arbitrary code [2]. ### 2.1 Direct Volume Rendering Integral Let $V:\mathbb{R}^{3}\rightarrow[0,1]$ be the scalar volume of densities and let $r:\mathbb{R}^{+}\rightarrow\mathbb{R}^{3}$ be an arc-length parameterized ray through the volume. Let $\tau:[0,1]\rightarrow\mathbb{R}_{0}^{+}$ be the absorption and $C:[0,1]\rightarrow\mathbb{R}_{0}^{+}$ the self-emission due to a given density. Then, the light intensity reaching the eye is given by $L(a,b)=\int_{a}^{b}g(V(r(t)))e^{-\int_{a}^{t}\tau(V(r(u)))\text{d}u}\text{d}t,$ (1) were the exponential term is the transparency of the line segment from $t=a$, the eye, to $b$, the far plane, and $g(v)=\tau(v)C(v)$ is the emission. The transparency is one if the medium between $a$ and $b$ does not absorb any light and approaches zero for complete absorption. We assume that the density volume is given at the vertices $\mathbf{v}_{i}$ of a rectangular grid, and the density values are obtained via _trilinear_ interpolation. The functions $\tau$ and $C$ define the mapping from density to absorption and emission. We assume that both functions are discretized into $R$ regularly spaced control points with linear interpolation in between. This is realized on the GPU as a 1D texture map $T$ with hardware-supported linear interpolation. For arbitrary mappings of the density to absorption and emission, the volume rendering integral in Equation 1 cannot be solved analytically. Instead, it is approximated by discretizing the ray into $N$ segments over which the absorption $\alpha_{i}$ and emission $L_{i}$ are assumed constant. We make use of the Beer-Lambert model $\alpha_{i}=1-\exp(-\Delta t\tau(d_{i}))$, where $d_{i}$ is the sampled volume density, to approximate a segment’s transparency. This leads to a Riemann sum which can be computed in front-to- back order using iterative application of alpha-blending, i.e., $L=L+(1-\alpha)L_{i}$, and $\alpha=\alpha+(1-\alpha)\alpha_{i}$. ### 2.2 Automatic Differentiation The evaluation of any program for a fixed input can be expressed as a computation graph, a directed acyclic graph where the nodes are the operations and the edges the intermediate values. Such a computation graph can be reformulated as a linear sequence of operations, also called a Wengert list [55, 2], $\displaystyle\bm{x}_{0}$ $\displaystyle=\text{const}$ (2) $\displaystyle\bm{x}_{1}$ $\displaystyle=f_{1}(\bm{x}_{0},\bm{w}_{1})$ $\displaystyle\bm{x}_{2}$ $\displaystyle=f_{2}(\bm{x}_{1},\bm{w}_{2})$ $\displaystyle\ldots$ $\displaystyle\bm{x}_{\text{out}}$ $\displaystyle=f_{k}(\bm{x}_{k-1},\bm{w}_{k})$ where the $\bm{w}_{i}$’s $\in\mathbb{R}^{p}$ are the external parameters of the operations of size $p$ and the $\bm{x}_{i}$’s $\in\mathbb{R}^{n}$ refer to the state of intermediate results after the i-th operation of size $n$. The output $\bm{x}_{\text{out}}\in\mathbb{R}^{m}$ has size $m$. Note here that in DiffDVR, $n$ and $k$ are usually large, i.e., $n$ is in the order of the number of pixels and $k$ in the order of the number of sampling points along the view rays. The output $\bm{x}_{\text{out}}$ is a scalar ($m=1$), computed, for example, as the average per-pixel loss over the image. The goal is then to compute the derivatives $\frac{\text{d}\bm{x}_{\text{out}}}{\text{d}\bm{w}_{i}}$. The basic idea is to split these derivatives into simpler terms for each operation using the chain rule. For example, assuming univariate functions and $w_{1}$ the only parameter of interest, the chain rule yields $x_{3}=f_{3}(f_{2}(f_{1}(w_{1})))\ \Rightarrow\ x_{3}^{\prime}=f_{3}^{\prime}(f_{2}(f_{1}(x)))\,f_{2}^{\prime}(f_{1}(x))\,f_{1}^{\prime}(x).$ (3) There are two fundamentally different approaches to automatically evaluate the chain rule, which depend on the order of evaluations. If the product in the above example is evaluated left-to-right, the derivatives are propagated from bottom to top in Equation 2. This gives rise to the adjoint- or backward-mode differentiation (see subsection 3.3). If the product is evaluated right-to- left, the derivatives “ripple downward” from top to bottom in Equation 2. This corresponds to the so-called forward-mode differentiation (see subsection 3.2). ## 3 AD for Direct Volume Rendering Now we introduce the principal procedure when using AD for DiffDVR and hint at the task-dependent differences when applied for viewpoint optimization (subsection 4.1), TF reconstruction (subsection 4.2) and volume reconstruction (subsection 4.3 and subsection 4.4). We further discuss computational aspects and memory requirements of AD in volume rendering applications and introduce the specific modifications to make DiffDVR feasible. ### 3.1 The Direct Volume Rendering Algorithm In direct volume rendering, the pixel color represents the accumulated attenuated emissions at the sampling points along the view rays. In the model of the Wengert list (see Equation 2), a function $f_{i}$ is computed for each sample. Hence, the number of operations $k$ is proportional to the overall number of samples along the rays. The intermediate results $\bm{x}_{i}$ are rgb$\alpha$ images of the rendered object up to the $i$-th sample, i.e., $\bm{x}_{i}$ is of size $n=\text{W}*\text{H}*4$, where $W$ and $H$, respectively, are the width and height of the screen. The last operation $f_{k}$ in the optimization process is the evaluation of a scalar-valued loss function. Thus, the size of the output variable is $m=1$. The parameters $\bm{w}_{i}$ depend on the use case. For instance, in viewpoint optimization, the optimization is for the longitude and latitude of the camera position, i.e., $p=2$. When reconstructing a TF, the optimization is for the $R$ rgb$\alpha$ entries of the TF, i.e., $p=4R$. The DVR algorithm with interpolation, TF mapping, and front-to-back blending is shown in Algorithm 1. For clarity, the variables in the algorithm are named by their function, instead of using $\bm{w}_{i}$ and $\bm{x}_{i}$ as in the Wengert list (Equation 2). In the Wengert list model, the step size $\Delta t$, the camera intrinsics $cam$, the TF $T$, and the volume density $V$ are the parameters $\bm{w}_{i}$. The other intermediate variables are represented by the states $\bm{x}_{i}$. Each function operates on a single ray but is executed in parallel over all pixels. Algorithm 1 Direct Volume Rendering Algorithm 1:stepsize $\Delta t$, camera $cam$, TF $T$, volume $V$ 2:$u\\!v$ the pixel positions where to shoot the rays 3:$color_{i}=0$ $\triangleright$ initial foreground color 4:$x_{o},\omega=f_{\text{camera}}(u\\!v,cam)$ $\triangleright$ start $x_{o}$ and direction $\omega$ for all rays 5:for $i=0,...,N-1$ do 6: $x_{i}=x_{o}+i\Delta t\omega$ $\triangleright$ current position along the ray 7: $d_{i}=f_{\text{interpolate}}(x_{i},V)$ $\triangleright$ Trilinear interpolation 8: $c_{i}=f_{\text{TF}}(d_{i},T)$ $\triangleright$ TF evaluation 9: $color_{i+1}=f_{\text{blend}}(color_{i},c_{i})$ $\triangleright$ blending of the sample 10:end for 11:$\bm{x}_{\text{out}}=f_{\text{loss}}(color_{N})$ $\triangleright$ Loss function on the output rgb$\alpha$ image When Algorithm 1 is executed, the operations form the computational graph. AD considers this graph to compute the derivatives of $\bm{x}_{\text{out}}$ with respect to the parameters $\Delta t,cam,T,\text{ and }V$, so that the changes that should be applied to the parameters to optimize the loss function can be computed automatically. Our implementation allows for computing derivatives with respect to all parameters, yet due to space limitations, we restrict the discussion to the computation of derivatives of $\bm{x}_{\text{out}}$ with respect to the camera $cam$, the TF $T$ and the volume densities $V$. In the following, we discuss the concrete implementations of forward and adjoint differentiation to compute these derivatives. ### 3.2 Forward Differentiation On the elementary level, the functions in Algorithm 1 can be expressed as a sequence of scalar arithmetic operations like $c=f(a,b)=a*b$. In forward-mode differentiation [33, 2], every variable is replaced by the associated _forward variable_ $\tilde{a}=\left\langle a,\frac{\text{d}a}{\text{d}w}\right\rangle,\ \tilde{b}=\left\langle b,\frac{\text{d}b}{\text{d}w}\right\rangle,$ (4) i.e., tuples of the original value and the derivative with respect to the parameter $w$ that is optimized. Each function $c=f(a,b)$ is replaced by the respective forward function $\tilde{c}=\tilde{f}(\tilde{a},\tilde{b})=\left\langle f(a,b),\frac{\partial f}{\partial a}\frac{\text{d}a}{\text{d}w}+\frac{\partial f}{\partial b}\frac{\text{d}b}{\text{d}w}\right\rangle.$ (5) Constant variables are initialized with zero, $\tilde{x}_{\text{const}}=\langle x_{\text{const}},0\rangle$, and parameters for which to trace the derivatives are initialized with one, $\tilde{w}=\langle w,1\rangle$. If derivatives for multiple parameters should be computed, the tuple of forward variables is extended. Forward differentiation uses a custom templated datatype for the forward variable and operator overloading. Each variable is wrapped in an instance of this datatype, called `fvar`, which stores the derivatives with respect to up to $p$ parameters along with their current values. ⬇ template<typename T, int p> struct fvar { T value; T derivatives[p]; }; Next, operator overloads are provided for all common arithmetic operations and their gradients. For example, multiplication is implemented similar to: ⬇ template<typename T, int p> fvar<T, p> operator*(fvar<T, p> a, fvar<T, p> b) { fvar<T, P> c; //to store c = a*b and derivatives c.value = a.value * b.value; for (int i=0; i<p; ++i) { //partial derivatives c.derivative[i] = a.value*b.derivative[i] + b.value*a.derivative[i]; } return c; } The user has to write the functions in such a way that arbitrary input types are possible, i.e., regular floats or instances of `fvar`, via C++ templates. All intermediate variables are declared with type `auto`. This allows the compiler to use normal arithmetic if no gradients are propagated, but when forward variables with gradients are passed as input, the corresponding operator overloads are chosen. As an example (see Figure 1 for a schematics), let us assume that derivatives should be computed with respect to a single entry in a 1D texture-based TF, e.g., the red channel of the first texel $T_{0,\text{red}}$. When loading the TF from memory, $T_{0,\text{red}}$ is replaced by $\tilde{T}_{0,\text{red}}=\langle T_{0,\text{red}},1\rangle$, i.e., it is wrapped in an instance of `fvar` with the derivative for that parameter set to $1$. Algorithm 1 executes in the normal way until $T_{0,\text{red}}$ is encountered in the code for the TF lookup. Now, the operator overloading mechanism selects the forward function instead of the normal non- differentiated function. The result is not a regular color $c_{i}$, but the forward variable of the color $\tilde{c}_{i}$. All following functions (i.e., the blend and loss function) continue to propagate the derivatives. In contrast, if derivatives should be computed with respect to the camera, already the first operation requires tracing the derivatives with `fvar`. It is worth noting that in the above example only the derivative of one single texel in the TF is computed. This process needs to be repeated for each texel, respectively each color component of each texel, by extending the array `fvar::derivatives` to store the required number of $p$ parameters. Notably, for input data that is high dimensional, like TFs or a 3D volumetric field, forward differentiation becomes unfeasible. For viewpoint selection, on the other hand, where only two parameters are optimized, forward differentiation can be performed efficiently. Figure 1: Schematic representation of the forward method for TF reconstruction. Gradients are stored in the forward variables (blue), and parameter values are propagated simultaneously. The computational complexity of the forward method scales linearly with the number of parameters $p$, as they have to be propagated through every operation. However, as every forward variable directly stores the derivative of that variable w.r.t. the parameters, gradients for an arbitrary number of outputs $m$ can be directly realized. Furthermore, the memory requirement is proportional to $O(np)$, as only the current state needs to be stored. Figure 2: Schematic representation of the adjoint method for density and TF reconstruction. Gradients in the adjoint variables (red) are propagated backward through the algorithm. A circled $+$ indicates the summation of the gradients over all steps and rays. ### 3.3 Adjoint Differentiation Adjoint differentiation [31], also called the adjoint method, backward or reverse mode differentiation, or backpropagation, evaluates the chain rule in the inverse order than forward differentiation. For each variable $\bm{x}_{i}$, the associated _adjoint variable_ $\hat{\bm{x}}_{i}=\frac{\partial x_{\text{out}}}{\partial\bm{x}_{i}}\ ,\ \hat{\bm{w}}_{i}=\frac{\partial x_{\text{out}}}{\partial\bm{w}_{i}},$ (6) stores the derivative of the final output with respect to the current variable. Tracing the derivatives starts by setting $\hat{x}_{\text{out}}=1$. Then, the adjoint variables are tracked backward through the algorithm, called the _backward pass_. This is equivalent to evaluating the chain rule Equation 3 from left to right, instead of right to left as in the forward method. Let $c=f(a,b)$ be again our model function, then the adjoint variables $\hat{a},\hat{b}$ are computed from $\hat{c}$ as $\hat{a}=\left(\frac{\partial f}{\partial a}\right)^{T}\hat{c},\ \hat{b}=\left(\frac{\partial f}{\partial b}\right)^{T}\hat{c}.$ (7) This process is repeated from the last operation to the first operation, giving rise to the _adjoint code_. At the end, one arrives again at the derivatives with respect to the parameters $\hat{\bm{w}}=\frac{\partial x_{\text{out}}}{\partial\bm{w}}$. If a parameter is used multiple times, either along the ray or over multiple rays, the adjoint variables are summed up. The reverted evaluation of the DVR algorithm with the gradient propagation from Equation 7 is sketched in Algorithm 2. A schematic visualization is shown in Figure 2. Because the adjoint method requires reversing the order of operation, simple operator overloading as in the forward method is no longer applicable. Common implementations of the adjoint method like TensorFlow [1] or PyTorch [40] record the operations in a computation graph, which is then traversed backward in the backward pass. As it is too costly to record every single arithmetic operation, high-level functions like the evaluation of a single layer in neural networks are treated as atomic, and only these are recorded. Within such a high-level function, the order of operations is known and the adjoint code using Equation 7 is manually derived and implemented. We follow the same idea and treat the rendering algorithm as one unit and manually derive the adjoint code. Algorithm 2 Adjoint Code of the DVR Algorithm. Each line corresponds to a line in Algorithm 1 in reverse order. 1:stepsize $\Delta t$, camera $cam$, TF $T$, volume $V$ 2:the adjoint of the output $\hat{\bm{x}}_{\text{out}}$ 3:all intermediate adjoint variables are initialized with $0$ 4:$\hat{color}_{N}\mathrel{+}=\partial f_{\text{loss}}(color_{N})^{T}\hat{\bm{x}}_{\text{out}}$ 5:for $i=N-1,...,0$ do 6: $\hat{color}_{i},\hat{c}_{i}\mathrel{+}=\partial f_{\text{blend}}(color_{i},c_{i})^{T}\hat{color}_{N}$ 7: $\hat{d}_{i},\hat{T}\mathrel{+}=\partial f_{\text{TF}}(d_{i},T)^{T}\hat{c}_{i}$ 8: $\hat{x}_{i},\hat{V}\mathrel{+}=\partial f_{\text{interpolate}}(x_{i},V)^{T}\hat{d}_{i}$ 9: $\hat{x}_{o}\mathrel{+}=\hat{x}_{i}\ ,\ \hat{\Delta t}\mathrel{+}=i\omega^{T}\hat{x}_{i}\ ,\ \hat{\omega}\mathrel{+}=i\Delta t\hat{x}_{i}$ 10:end for 11:$\hat{cam}\mathrel{+}=\partial f_{\text{camera}}(u\\!v,cam)^{T}[x_{o};\omega]$ 12:$\hat{color}_{0}$ is ignored 13:$\hat{\Delta t},\hat{cam},\hat{T},\hat{V}$ ### 3.4 The Inversion Trick One of the major limitations of the adjoint method is its memory consumption because the input values for the gradient computations need to be stored. For example, the blending operation (line 9 in Algorithm 1) is defined as follows: Let $\alpha,C$ be the opacity and rgb-emission at the current sample, i.e., the components of $c_{i}$, and let $\alpha^{(i)},C^{(i)}$ be the accumulated opacity and emission up to the current sample, i.e., the components of $color_{i}$ in Algorithm 1. Then, the next opacity and emission is given by front-to-back blending $\displaystyle C^{(i+1)}$ $\displaystyle=C^{(i)}+(1-\alpha^{(i)})C$ (8) $\displaystyle\alpha^{(i+1)}$ $\displaystyle=\alpha^{(i)}+(1-\alpha^{(i)})\alpha.$ In the following adjoint code with $\hat{\alpha}^{(i+1)},\hat{C}^{(i+1)}$ as input it can be seen that the derivatives again require the input values. $\displaystyle\hat{\alpha}$ $\displaystyle=(1-\alpha^{(i)})\hat{\alpha}^{(i+1)},\ \hat{C}=(C-\alpha^{(i)})\hat{C}^{(i+1)},$ (9) $\displaystyle\hat{\alpha}^{(i)}$ $\displaystyle=(1-\alpha)\hat{\alpha}^{(i+1)}-C\cdot\hat{C}^{(i+1)},$ $\displaystyle\hat{C}^{(i)}$ $\displaystyle=\hat{C}^{(i+1)}.$ Therefore, the algorithm is first executed in its non-adjoint form, and the intermediate colors are stored with the computation graph. This is called the _forward pass_. During the backward pass, when the order of operations is reversed and the derivatives are propagated (the adjoint code), the intermediate values are reused. In DVR, intermediate values need to be stored at every step through the volume. Thus, the memory requirement scales linearly with the number of steps and quickly exceeds the available memory. To overcome this limitation, we propose a method that avoids storing the intermediate colors after each step and, thus, has a constant memory requirement. We exploit that the blending step is invertible (see Figure 3): If $\alpha^{(i+1)},C^{(i+1)}$ are given and the current sample is recomputed to obtain $\alpha$ and $C$, $\alpha^{(i)},C^{(i)}$ can be reconstructed as $\displaystyle\alpha^{(i)}$ $\displaystyle=\frac{\alpha-\alpha^{(i+1)}}{\alpha-1}$ (10) $\displaystyle C^{(i)}$ $\displaystyle=C^{(i+1)}-(1-\alpha^{(i)})C.$ With Equation 10 and $\alpha<1$, the adjoint pass can be computed with constant memory by re-evaluating the current sample $c_{i}$ and reconstructing $color_{i}$ instead of storing the intermediate results. Thus, only the output color used in the loss function needs to be stored, while all intermediate values are recomputed on-the-fly. Note that $\alpha=1$ is not possible in practice, since it requires the absorption stored in the TF to be at infinity. (a) No Inversion (b) With Inversion Figure 3: (a) To compute the current contribution $c_{i}$, intermediate accumulated colors $\text{color}_{i}$ need to be stored for every step along the ray. (b) The inversion trick enables to reconstruct $\text{color}_{i}$ from $\text{color}_{i+1}$. Thus, only the final color used in the loss function needs to be stored. (a) (b) (c) Figure 4: Best viewpoint selection using maximization of visual entropy. The tooth dataset (Differentiable Direct Volume Renderinga) is rendered from different viewpoints on a surrounding sphere. (a) Color coding of loss values for viewpoints on the northern and southern hemispheres, with isocontours (black lines) of the loss and local gradients with respect to the longitude and latitude of the camera position at uniformly sampled positions (black dots with arrows). Eight optimization runs (colored paths on the surface) are started at uniformly seeded positions and optimized in parallel. (b) The runs converge to three clusters of local minima. The cluster with the highest entropy ($1.72$) coincides with the best value from $256$ sampled entropies. For the best run, the start view, as well as some intermediate views and the final result, are shown in Differentiable Direct Volume Renderinga. (c) Timings and memory consumption show that forward differences approximately double the runtime, but are faster and require less memory than the adjoint method. In the implementation, and indicated by the circled $+$ in Figure 2, the adjoint variables for the parameters are first accumulated per ray into local registers (camera, stepsize, volume densities) or shared memory (TF). Then, the variables are accumulated over all rays using global atomic functions. This happens once all rays have been traversed (camera, stepsize, transfer function) or on exit of the current cell (volume densities). Because the adjoint variables carry only the derivatives of the output, but not of the parameters, the computational complexity is largely constant in the number of parameters. For example, in TF optimization (subsection 4.2) only the derivative of the currently accessed texel is computed when accessed in the adjoint code of TF sampling. This is significantly different from the forward method, where the derivatives of all TF entries need to be propagated in every step. On the other hand, the adjoint method considers only a single scalar output in each backward pass, requiring multiple passes to support multi-component outputs. This analysis and the following example applications show that the forward method is preferable when optimizing for a low number of parameters like the camera position, while for applications such as TF optimization, which require the optimization of many parameters, the adjoint method has clear performance advantages. DiffDVR is implemented as a custom CUDA operation in PyTorch [40]. The various components of the DVR algorithm, like the parameter to differentiate or the type of TF, are selected via C++ template parameters. This eliminates runtime conditionals in the computation kernel. To avoid pre-compiling all possible combinations, the requested configuration is compiled on demand via CUDA’s JIT-compiler NVRTC [38] and cached between runs. This differs from, e.g., the Enoki library [18] used by the Mitsuba renderer [37], which directly generates Parallel Thread Code (PTX) for translation into GPU binary code. ## 4 Applications In the following, we apply both AD modes for best viewpoint selection, TF reconstruction, and volume reconstruction. The results are analyzed both qualitatively and quantitatively. Timings are performed on a system running Windows 10 and CUDA 11.1 with an Intel Xeon [email protected] CPU, 64GB RAM, and an NVIDIA RTX 2070. ### 4.1 Best Viewpoint Selection (a) (b) (c) Figure 5: Best viewpoint selection using maximization of visual entropy for datasets jetstream ($256^{3}$), potential field of a C60 molecule ($128^{3}$), and smoke plume ($178^{3}$). Comparison of DiffDVR with eight initializations against random uniform sampling over the sphere of 256 views. (a) Optimization paths over the sphere. (b) Initial view, selected view of DiffDVR, best sampled view. (c) Visual entropy of optimization results (colored points corresponding to (a)) vs. sampled images. Violin plot shows the distribution of loss values when sampling the sphere uniformly. Visual entropy of the best viewport is shown above each plot. We assume that the camera is placed on a sphere enclosing the volume and faces toward the object center. The camera is parameterized by longitude and latitude. AD is used to optimize the camera parameters to determine the viewpoint that maximized the selected cost function. As cost function, we adopt the differentiable opacity entropy proposed by Ji et al. [19]. Let $C\in\mathbb{R}^{H\times W\times 4}$ be the output image. We employ array notation, i.e., $C[x,y,c]$ indicates color channel $c$ (red, green, blue, alpha) at pixel $x,y$. The entropy of a vector $\bm{x}\in\mathbb{R}^{N}$ is defined as $H(\bm{x})=\frac{1}{\log_{2}N}\sum_{i=1}^{N}{p_{i}\log_{2}p_{i}}\ ,\ \ p_{i}=\frac{\bm{x}_{i}}{\sum_{j=1}^{N}{\bm{x}_{j}}}.$ (11) Then the opacity entropy is defined as $\text{OE}(C)=H(C[:,:,3]),$ where $C[:,:,3]$ indicates the linearization of the alpha channel, and the color information is unused. In a first experiment, the best viewpoint is computed for a CT scan of a human tooth of resolution $256\times 256\times 161$. Eight optimizations are started in parallel with initial views from viewpoints at a longitude of $\\{45^{\circ},135^{\circ},225^{\circ},315^{\circ}\\}$ and a latitude of $\pm 45^{\circ}$. In all cases, 20 iterations using gradient descent are performed. The viewpoints selected by the optimizer are shown as paths over the sphere in Figure 4a. The values of the cost function over the course of optimization are given in Figure 4b. It can be seen that the eight optimization runs converge to three distinct local minima. The best run converges to approximately the same entropy as obtained when the best view from 256 uniformly sampled views over the enclosing sphere is taken. Differentiable Direct Volume Renderinga shows intermediate views and the view from the optimized viewpoint. Further results on other datasets, i.e, a jetstream simulation ($256^{3}$), the potential field of a C60 molecule ($128^{3}$), and a smoke plume ($178^{3}$), confirm the dependency of the optimization process on the initial view (see Figure 5). Both the adjoint and the forward method compute exactly the same gradients, except for rounding errors. As seen in Figure 4c, a single forward/backward pass in the adjoint method requires about $9.5$ms/$14.6$ms, respectively, giving a total of $~{}24.1$ms. For the forward method, we compare two alternatives. First, _forward-immediate_ directly evaluates the forward variables during the forward pass in PyTorch and stores these variables for reuse in the backward pass. In _forward-delayed_ , the evaluation of gradients is delayed until the backward pass, requiring to re-trace the volume. With $21.3$ms, _forward-immediate_ is slightly faster than the adjoint method, while _forward-delayed_ is around $30\%$ slower due to the re-trace operation. ### 4.2 Transfer Function Reconstruction Our second use case is TF reconstruction. Reference images of a volume are first rendered from multiple views using a target TF. Given the same volume and an arbitrary initial TF, AD is then used to optimize the TF so that the rendered images match the references. The target TF comprises of 256 rgb$\alpha$ entries, the target TF with $R$ entries is initialized with random Gaussian noise. The density volume is rendered to a $512^{2}$ viewport from eight camera positions that are uniformly distributed around the volume (the view direction always pointing toward the volume’s center). Figure 6: Effect of the smoothing prior (Equation 12). A small value of $\lambda$ leads to “jagged” TFs which can accurately predict small details like the teeth in blue but introduce low frequency color shifts resulting in low PSNR and SSIM [52]. A large smoothing prior smooths out small details. Let $T\in\mathbb{R}^{R,4}$ be the TF with $R$ entries containing the rgb color and absorption, and let $\bm{x}_{i}$ be the $N$ rendered image of resolution $W\times H$, $\bm{y}_{i}$ are the reference images. In our case, $N=8,W=H=512$ and $R$ varies. We employ an $L_{1}$ loss on the images and a smoothing prior $L_{\text{prior}}$ on the TF, i.e., $\displaystyle L_{\text{total}}$ $\displaystyle=L_{1}(\bm{x})+\lambda L_{\text{prior}}(T),$ (12) $\displaystyle L_{1}(\bm{x})$ $\displaystyle=\frac{1}{NWH}\sum_{i,x,y}{|\bm{x}_{ixy}-\bm{y}_{ixy}|}$ $\displaystyle L_{\text{prior}}(T)$ $\displaystyle=\frac{1}{4(R-1)}\sum_{c=1}^{4}\sum_{r=1}^{R-1}{(T_{c,r+1}-T_{c,r})^{2}}.$ The Adam optimizer [22] is used with a learning rate of $0.8$ for $200$ epochs. The use of $\lambda$ to control the strength of the smoothing prior is demonstrated in Figure 6 for a human head CT scan as test dataset using $R=64$. If $\lambda$ is too small, the reconstructed TF contains high frequencies and introduces subtle color shifts over the whole image. If the smoothing prior is too large, small details are lost. We found that a value of $\lambda$ around $0.4$ leads to the best results, visually and using the Learned Perceptual Image Patch Similarity metric (LPIPS) [58], and is thus used in our experiments. We chose the LPIPS metric as we found that it can accurately distinguish the perceptually best results when the peak-signal-to- noise ratio (PSNR) and the structural similarity index (SSIM) [52] result in similar scores. The initialization of the reconstruction and the final result for a human head dataset are shown in Differentiable Direct Volume Renderingb. Figure 7: Timings and loss function values for different AD modes and resolutions of the reconstructed TF. Timings are with respect to a single epoch. Next, we analyze the impact of the TF resolution $R$ on reconstruction quality and performance (see Figure 7). For TF reconstruction, the backward AD mode significantly outperforms the forward mode. Because of the large number of parameters, especially when increasing the resolution of the TF, the derivatives of many parameters have to be traced in every operation when using the forward AD mode. Furthermore, the forward variables may no longer fit into registers and overflow into global memory. This introduces a large memory overhead that leads to a performance decrease that is even worse than the expected linear decrease. A naïve implementation of the adjoint method that directly accumulates the gradients for the TF in global memory using atomics is over $100\times$ slower than the non-adjoint forward pass (_adjoint- immediate_). This is because of the large number of memory accesses and write conflicts. Therefore, we employ delayed accumulation (_adjoint-delayed_). The gradients for the TF are first accumulated in shared memory. Then, after all threads have finished their assigned rays, the gradients are reduced in parallel and then accumulated into global memory using atomics. As seen in Figure 7, this is the fastest of the presented methods. The whole optimization for $200$ epochs requires around 5 minutes including I/O. However, as only 48kB of shared memory are freely available per multiprocessor, the maximal resolution of the TF is 96 texels. If a higher resolution is required, _adjoint-immediate_ must be employed. At smaller values of $R$ the reconstruction quality is decreased (see Figure 7). We found that a resolution of $R=64$ leads to the best compromise between reconstruction performance and computation time. | initial | final | reference | difference (10x) ---|---|---|---|--- Thorax | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.35) ; | Plume | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; | [inner sep=0pt] at (0,0) ; [inner sep=0pt,fill=white] at (0,-0.4) ; | Figure 8: TF reconstruction using a CT scan of a human thorax (PSNR=$42.6$dB) and a smoke plume (PSNR=$47.8$dB, SSIM=$0.999$). The used hyperparameters are the same as for the skull dataset. From left to right: Start configurations for the optimizer, optimized results, ground truths, pixel differences (scaled by a factor of $10$ for better perception) between ground truths and optimized results. To evaluate the capabilities of TF reconstruction to generalize to new datasets with the same hyperparameters as described above, we run the optimization on two new datasets, a CT scan of a human thorax and a smoke plume, both of resolution $256^{3}$. As one can see in Figure 8, the renderings with the reconstructed TF closely match the reference, demonstrating stability of the optimization for other datasets. We envision that TF optimization with respect to losses in screen space can be used to generate “good” TFs for a dataset for which no TF is available. While a lot of research has been conducted on measuring the image quality for viewpoint selection, quality metrics specialized for TFs are still an open question to the best of our knowledge. In future work, a first approach would be to take renderings of other datasets with a TF designed by experts and transform the “style” of that rendering to a new dataset via the style loss by Gatys et al. [11]. ### 4.3 Density Reconstruction Figure 9: Density reconstruction using an optical absorption-only model. Comparison between DiffDVR, algebraic reconstruction provided by the ASTRA- toolbox [50, 49] and Mitsuba’s differentiable path tracer [36]. For each algorithm, a single slice through the center of the reconstructed volume and a volume rendering of this volume are shown, including per-pixel differences to the reference images. PSNR values in column “slice” are computed over the whole volume, in column “rendering” they are with respect to the rendered images. Timings are given in subsection 4.3. In the difference images, blue and red indicate under- and over-estimation, respectively. In the following, we shed light on the use of DiffDVR for reconstructing a 3D density field from images of this field. For pure absorption models, the problem reduces to a linear optimization problem. This allows for comparisons with specialized methods, such as filtered backpropagation or algebraic reconstruction [13, 10, 17]. We compare DiffDVR to the CUDA implementation of the SIRT algebraic reconstruction algorithm [14] provided by the ASTRA-toolbox [50, 49]. Furthermore, we compare the results to those computed by Mitsuba 2 [36, 37], a general differentiable path tracer. Density reconstruction uses 64 uniformly sampled views on a surrounding sphere. Each image is rendered at a resolution of $512^{2}$. The reconstructed volume has a resolution of $256^{3}$. ASTRA and Mitsuba are used with their default optimization settings. DiffDVR performs a stepsize of $0.2$ voxels during reconstruction. The Adam optimizer with a batch size of 8 images and a learning rate of $0.3$ is used. To speed up convergence, we start with a volume of resolution $32^{3}$ and double the resolution in each dimension after $10$ iterations. At the highest resolution, the optimization is performed for $50$ iterations. The same $L_{\text{total}}$ loss function as for TF reconstruction (see Equation 12) is used, except that the smoothing prior is computed on the reconstructed volume densities in 3D, with $\lambda=0.5$. Three experiments with datasets exhibiting different characteristics are carried out. The results are shown in Figure 9. As one can see, DiffDVR consistently outperforms algebraic reconstruction via ASTRA and density reconstruction via the Mitsuba framework. In particular, Mitsuba suffers from noise in the volume due to the use of stochastic path tracing. Only for the rendering of the thorax dataset, Mitsuba shows a slightly better SSIM score than DiffDVR. For the plume dataset, intermediate results of the optimization process until convergence are shown in Differentiable Direct Volume Renderingc. Note that all compared algorithms serve different purposes. Algebraic reconstruction methods (ASTRA) are specialized for absorption-only optical models and support only such models. Mitsuba is tailored to Monte Carlo path tracing with volumetric scattering, an inherently computational expensive task. DifffDVR is specialized for direct volume rendering with an emission- absorption model and a TF, yet emissions and a TF were disabled in the current experiments. These differences clearly reflect in the reconstruction times. For instance, for reconstructing the human skull dataset, ASTRA requires only 53 seconds, DiffDVR requires around 12 minutes, and Mitsuba runs for multiple hours. ### 4.4 Color Reconstruction Figure 10: Density optimization for a volume colored via a non-monotonic rgb$\alpha$-TF using an emission-absorption model. (a) Rendering of the reference volume of a human tooth and a human thorax. (b) Local minimum of the loss function. (c) Pre-shaded color volume as initialization. (d) Final result of the density volume optimization with TF mapping. The second row shows slices through the volumes. Note the colored slice through the pre-shaded color volume in (c). Figure 11: 1D example for a density optimization with a Gaussian TF with the optimum at a density of $-1.0$. For a value $>0.4$, the gradient faces away from the optimum. Next, we consider an optical emission-absorption model with a TF that maps densities to colors and opacities, as it is commonly used in DVR. To the best of our knowledge, we are the first to support such a model in tomographic reconstruction. For TFs that are not a monotonic ramp, as in the absorption-only case, density optimization becomes a non-convex problem. Therefore, the optimization can be guided into local minima by a poor initialization. We illustrate this problem in a simple 1D example. A single unknown density value $d_{1}$ of a 1D “voxel” – a line segment with two values $d_{0}=-1$ and $d_{1}$ at the end points and linear interpolation in between – should be optimized. A single Gaussian function with zero mean and variance $0.5$ is used as TF, and the ground truth value for $d_{1}$ is $-1$. For varying $d_{1}$, Figure 11 shows the $L_{2}$-loss between the color obtained from $d_{1}$ and the ground truth, and the corresponding gradients. As can be seen, for initial values of $d_{1}>0.4$ the gradient points away from the true solution. Thus, the optimization “gets stuck” at the other side of the Gaussian, never reaching the target density of $-1$. This issue worsens in 2D and 3D, as the optimizer needs to reconstruct a globally consistent density field considering many local constraints. This failure case is also shown in Figure 10b, where the tooth dataset cannot be reconstructed faithfully due to the initialization with a poorly matching initial field. To overcome this shortcoming, it is crucial to start the optimization with an initial guess that is not “too far” from the ground truth in the high- dimensional parameter space. We account for this by proposing the following optimization pipeline: First, a pre-shaded color volume of resolution $256^{3}$ (Figure 10c) is reconstructed from images using the same multi- resolution optimization as in the case of an absorption-only model. The color volume stores the rgb-emission and scalar absorption per voxel, instead of a scalar density value that is mapped to color via a TF. By using this color volume, trapping into local minima with non-monotonic TFs can be avoid. Intermediate results of the optimization process until convergence are shown in Differentiable Direct Volume Renderingd for the tooth dataset. Then, density values that match the reconstructed colors after applying the TF are estimated. For each voxel, $256$ random values are sampled, converted to color via the TF, and the best match is chosen. To avoid inconsistencies between neighboring voxels, an additional loss term penalises differences to neighbors. Let $(\tau_{T},C_{T})$ be the target color from the color volume and $d$ the sampled density with mapped color $\tau(d),C(d)$, then the cost function is $\mathcal{C}(d)=||C_{T}-C(d)||_{2}^{2}+\alpha\log(1+|\tau_{T}-\tau(d)|)+\beta\sum_{i\in\mathcal{N}}{(d-d_{i})^{2}}.$ (13) Here, $\alpha$ and $\beta$ are weights, and $\mathcal{N}$ loops over the 6-neighborhood of the current voxel. The logarithm accounts for the vastly different scales of the absorption, similar to an inverse of the transparency integral Equation 1. In the example, we set $\alpha=1/\max(\tau_{T})$ to normalize for the maximal absorption in the color volume, and $\beta=1$. This process is repeated until the changes between subsequent iterations fall below a certain threshold, or a prescribed number of iterations have been performed. Finally, the estimated density volume is used as initialization for the optimization of the density volume from the rendered images (Figure 10d). We employ the same loss $L_{\text{total}}$ as before with a smoothing prior of $\lambda=20$. The total runtime for a $256^{3}$ volume is roughly 50 minutes. Even though the proposed initialization overcomes to a certain extent the problem of non-convexity and yields reasonable results, Figure 10 indicates that some fine details are lost and spurious noise remains. We attribute this to remaining ambiguities in the sampling of densities from colors that still lead to suboptimal minima in the reconstruction. This also shows in the slice view of Figure 10d, especially for the thorax dataset. Here, some areas that are fully transparent due to the TF are arbitrarily mapped to a density value of zero, while the reference has a density around 0.5 – between the peaks of the TF – in these areas. ## 5 Conclusion In this work, we have introduced a framework for differentiable direct volume rendering (DiffDVR), and we have demonstrated its use in a number of different tasks related to data visualization. We have shown that differentiability of the direct volume rendering process with respect to the viewpoint position, the TF, and the volume densities is feasible, and can be performed at reasonable memory requirements and surprisingly good performance. Our results indicate the potential of the proposed framework to automatically determine optimal parameter combinations regarding different loss functions. This makes DiffDVR in particular interesting in combination with neural networks. Such networks might be used as loss functions – providing blackboxes, which steer DiffDVR to an optimal output for training purposes, e.g., to synthesize volume-rendered imagery for transfer learning tasks. Furthermore, derivatives with respect to the volume from rendered images promise the application to scene representation networks trained in screen space instead of from points in object space. We see this as one of the most interesting future works, spawning future research towards the development of techniques that can convert large data to a compact representation -– a code -– that can be permanently stored and accessed by a network-based visualization. Besides neural networks, we imagine possible applications in the development of lossy compression algorithms, e.g. via wavelets, where the compression rate is not determined by losses in world space, but by the quality of rendered images. The question we will address in the future is how to generate such (visualization-)task-dependent codes that can be intertwined with differentiable renderers. ## Acknowledgments The authors wish to thank Jakob Wenzel and Merlin Nimier-David for their help and valuable suggestions on the Mitsuba 2 framework. ## References * [1] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. Tensorflow: A system for large-scale machine learning. In 12th $\\{$USENIX$\\}$ symposium on operating systems design and implementation ($\\{$OSDI$\\}$ 16), pp. 265–283, 2016. * [2] M. Bartholomew-Biggs, S. Brown, B. Christianson, and L. Dixon. Automatic differentiation of algorithms. Journal of Computational and Applied Mathematics, 124(1):171–190, 2000. Numerical Analysis 2000. Vol. IV: Optimization and Nonlinear Equations. doi: 10 . 1016/S0377-0427(00)00422-2 * [3] M. Berger, J. Li, and J. A. Levine. A generative model for volume rendering. IEEE transactions on visualization and computer graphics, 25(4):1636–1650, 2018. * [4] M. R. Bolin and G. W. Meyer. A perceptually based adaptive sampling algorithm. In Proceedings of the 25th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ’98, p. 299–309. Association for Computing Machinery, New York, NY, USA, 1998. doi: 10 . 1145/280814 . 280924 * [5] U. D. Bordoloi and H.-W. Shen. View selection for volume rendering. In VIS 05. IEEE Visualization, 2005., pp. 487–494. IEEE, 2005. * [6] L. Q. Campagnolo, W. Celes, and L. H. de Figueiredo. Accurate volume rendering based on adaptive numerical integration. In 2015 28th SIBGRAPI Conference on Graphics, Patterns and Images, pp. 17–24. IEEE, 2015. * [7] M. Chen and H. Jäenicke. An information-theoretic framework for visualization. IEEE Transactions on Visualization and Computer Graphics, 16(6):1206–1215, 2010. * [8] C. D. Correa and K.-L. Ma. Visibility histograms and visibility-driven transfer functions. IEEE Transactions on Visualization and Computer Graphics, 17(2):192–204, 2010. * [9] J. Danskin and P. Hanrahan. Fast algorithms for volume ray tracing. In Proceedings of the 1992 Workshop on Volume Visualization, VVS ’92, p. 91–98. Association for Computing Machinery, New York, NY, USA, 1992. doi: 10 . 1145/147130 . 147155 * [10] D. Dudgeon, R. Mersereau, and R. Merser. Multidimensional digital signal processing. prentice hall. Englewood Cliffs, NJ, 19842, 1984. * [11] L. A. Gatys, A. S. Ecker, and M. Bethge. Image style transfer using convolutional neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2414–2423, 2016. * [12] I. Gkioulekas, S. Zhao, K. Bala, T. Zickler, and A. Levin. Inverse volume rendering with material dictionaries. ACM Transactions on Graphics (TOG), 32(6):1–13, 2013. * [13] R. Gordon, R. Bender, and G. T. Herman. Algebraic reconstruction techniques (art) for three-dimensional electron microscopy and x-ray photography. Journal of Theoretical Biology, 29(3):471–481, 1970. doi: 10 . 1016/0022-5193(70)90109-8 * [14] J. Gregor and T. Benson. Computational analysis and improvement of sirt. IEEE Transactions on Medical Imaging, 27(7):918–924, 2008. doi: 10 . 1109/TMI . 2008 . 923696 * [15] M. Haidacher, D. Patel, S. Bruckner, A. Kanitsar, and M. E. Gröller. Volume visualization based on statistical transfer-function spaces. In 2010 IEEE Pacific Visualization Symposium (PacificVis), pp. 17–24. IEEE, 2010. * [16] W. He, J. Wang, H. Guo, K.-C. Wang, H.-W. Shen, M. Raj, Y. S. Nashed, and T. Peterka. Insitunet: Deep image synthesis for parameter space exploration of ensemble simulations. IEEE transactions on visualization and computer graphics, 26(1):23–33, 2019. * [17] G. T. Herman. Fundamentals of computerized tomography: image reconstruction from projections. Springer Science & Business Media, 2009. * [18] W. Jakob. Enoki: structured vectorization and differentiation on modern processor architectures, 2019. https://github.com/mitsuba-renderer/enoki. * [19] G. Ji and H.-W. Shen. Dynamic view selection for time-varying volumes. IEEE Transactions on Visualization and Computer Graphics, 12(5):1109–1116, 2006. * [20] H. Kato, D. Beker, M. Morariu, T. Ando, T. Matsuoka, W. Kehl, and A. Gaidon. Differentiable rendering: A survey. arXiv preprint arXiv:2006.12057, 2020. * [21] H. Kato, Y. Ushiku, and T. Harada. Neural 3d mesh renderer. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 3907–3916, 2018. * [22] D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. * [23] A. Kratz, J. Reininghaus, M. Hadwiger, and I. Hotz. Adaptive screen-space sampling for volume ray-casting. ZIB-Report, 2011. * [24] T.-M. Li, M. Aittala, F. Durand, and J. Lehtinen. Differentiable monte carlo ray tracing through edge sampling. ACM Transactions on Graphics (TOG), 37(6):1–11, 2018. * [25] S. Liu, S. Saito, W. Chen, and H. Li. Learning to infer implicit surfaces without 3d supervision. NeurIPS, 2019. * [26] M. M. Loper and M. J. Black. Opendr: An approximate differentiable renderer. In European Conference on Computer Vision, pp. 154–169. Springer, 2014. * [27] R. Maciejewski, Y. Jang, I. Woo, H. Jänicke, K. P. Gaither, and D. S. Ebert. Abstracting attribute space for transfer function exploration and design. IEEE Transactions on Visualization and Computer Graphics, 19(1):94–107, 2012. * [28] R. Marques, C. Bouville, M. Ribardière, L. P. Santos, and K. Bouatouch. Spherical fibonacci point sets for illumination integrals. Computer Graphics Forum, 32(8):134–143, 2013. doi: 10 . 1111/cgf . 12190 * [29] J. Martschinke, S. Hartnagel, B. Keinert, K. Engel, and M. Stamminger. Adaptive temporal sampling for volumetric path tracing of medical data. Computer Graphics Forum, 38(4):67–76, 2019. doi: 10 . 1111/cgf . 13771 * [30] N. Max. Optical models for direct volume rendering. IEEE Transactions on Visualization and Computer Graphics, 1(2):99–108, 1995. * [31] A. McNamara, A. Treuille, Z. Popović, and J. Stam. Fluid control using the adjoint method. ACM Trans. Graph., 23(3):449–456, Aug. 2004. doi: 10 . 1145/1015706 . 1015744 * [32] N. Morrical, W. Usher, I. Wald, and V. Pascucci. Efficient space skipping and adaptive sampling of unstructured volumes using hardware accelerated ray tracing. In 2019 IEEE Visualization Conference (VIS), pp. 256–260, 2019\. doi: 10 . 1109/VISUAL . 2019 . 8933539 * [33] R. D. Neidinger. Introduction to automatic differentiation and matlab object-oriented programming. SIAM review, 52(3):545–563, 2010. * [34] T. Nguyen-Phuoc, C. Li, S. Balaban, and Y.-L. Yang. Rendernet: A deep convolutional network for differentiable rendering from 3d shapes. arXiv preprint arXiv:1806.06575, 2018. * [35] M. Niemeyer, L. Mescheder, M. Oechsle, and A. Geiger. Differentiable volumetric rendering: Learning implicit 3d representations without 3d supervision. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020. * [36] M. Nimier-David, S. Speierer, B. Ruiz, and W. Jakob. Radiative backpropagation: An adjoint method for lightning-fast differentiable rendering. Transactions on Graphics (Proceedings of SIGGRAPH), 39(4), July 2020\. doi: 10 . 1145/3386569 . 3392406 * [37] M. Nimier-David, D. Vicini, T. Zeltner, and W. Jakob. Mitsuba 2: A retargetable forward and inverse renderer. ACM Trans. Graph., 38(6), Nov. 2019. doi: 10 . 1145/3355089 . 3356498 * [38] NVidia. Cuda nvrtc, 2021. https://docs.nvidia.com/cuda/nvrtc/index.html. * [39] J. Painter and K. Sloan. Antialiased ray tracing by adaptive progressive refinement. In Proceedings of the 16th annual conference on Computer graphics and interactive techniques, pp. 281–288, 1989. * [40] A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan, T. Killeen, Z. Lin, N. Gimelshein, L. Antiga, A. Desmaison, A. Kopf, E. Yang, Z. DeVito, M. Raison, A. Tejani, S. Chilamkurthy, B. Steiner, L. Fang, J. Bai, and S. Chintala. Pytorch: An imperative style, high-performance deep learning library. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, and R. Garnett, eds., Advances in Neural Information Processing Systems 32, pp. 8024–8035. Curran Associates, Inc., 2019\. * [41] F. Petersen, A. H. Bermano, O. Deussen, and D. Cohen-Or. Pix2vex: Image-to-geometry reconstruction using a smooth differentiable renderer. arXiv preprint arXiv:1903.11149, 2019. * [42] H. Rhodin, N. Robertini, C. Richardt, H.-P. Seidel, and C. Theobalt. A versatile scene model with differentiable visibility applied to generative pose estimation. In Proceedings of the IEEE International Conference on Computer Vision, pp. 765–773, 2015. * [43] M. Ruiz, A. Bardera, I. Boada, and I. Viola. Automatic transfer functions based on informational divergence. IEEE Transactions on Visualization and Computer Graphics, 17(12):1932–1941, 2011. * [44] V. Sitzmann, M. Zollhöfer, and G. Wetzstein. Scene representation networks: Continuous 3d-structure-aware neural scene representations. NeurIPS, 2019. * [45] S. Takahashi, I. Fujishiro, Y. Takeshima, and T. Nishita. A feature-driven approach to locating optimal viewpoints for volume visualization. In VIS 05. IEEE Visualization, 2005., pp. 495–502. IEEE, 2005. * [46] Y. Tao, H. Lin, H. Bao, F. Dong, and G. Clapworthy. Structure-aware viewpoint selection for volume visualization. In 2009 IEEE Pacific Visualization Symposium, pp. 193–200. IEEE, 2009. * [47] Y. Tao, Q. Wang, W. Chen, Y. Wu, and H. Lin. Similarity voting based viewpoint selection for volumes. In Computer graphics forum, vol. 35, pp. 391–400. Wiley Online Library, 2016. * [48] A. Tewari, O. Fried, J. Thies, V. Sitzmann, S. Lombardi, K. Sunkavalli, R. Martin-Brualla, T. Simon, J. Saragih, M. Nießner, et al. State of the art on neural rendering. In Computer Graphics Forum, vol. 39, pp. 701–727. Wiley Online Library, 2020. * [49] W. van Aarle, W. J. Palenstijn, J. Cant, E. Janssens, F. Bleichrodt, A. Dabravolski, J. D. Beenhouwer, K. J. Batenburg, and J. Sijbers. Fast and flexible x-ray tomography using the astra toolbox. Opt. Express, 24(22):25129–25147, Oct 2016. doi: 10 . 1364/OE . 24 . 025129 * [50] W. van Aarle, W. J. Palenstijn, J. De Beenhouwer, T. Altantzis, S. Bals, K. J. Batenburg, and J. Sijbers. The astra toolbox: A platform for advanced algorithm development in electron tomography. Ultramicroscopy, 157:35–47, 2015. doi: 10 . 1016/j . ultramic . 2015 . 05 . 002 * [51] P.-P. Vázquez, E. Monclús, and I. Navazo. Representative views and paths for volume models. In International Symposium on Smart Graphics, pp. 106–117. Springer, 2008. * [52] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4):600–612, 2004. * [53] S. Weiss, M. Chu, N. Thuerey, and R. Westermann. Volumetric isosurface rendering with deep learning-based super-resolution. IEEE Transactions on Visualization and Computer Graphics, pp. 1–1, 2019. doi: 10 . 1109/TVCG . 2019 . 2956697 * [54] S. Weiss, M. Işık, J. Thies, and R. Westermann. Learning adaptive sampling and reconstruction for volume visualization. IEEE Transactions on Visualization and Computer Graphics, pp. 1–1, 2020. doi: 10 . 1109/TVCG . 2020 . 3039340 * [55] R. E. Wengert. A simple automatic derivative evaluation program. Communications of the ACM, 7(8):463–464, 1964. * [56] Q. Xu, S. Bao, R. Zhang, R. Hu, and M. Sbert. Adaptive sampling for monte carlo global illumination using tsallis entropy. In International Conference on Computational and Information Science, pp. 989–994. Springer, 2005. * [57] C. Yang, Y. Li, C. Liu, and X. Yuan. Deep learning-based viewpoint recommendation in volume visualization. Journal of Visualization, 22(5):991–1003, 2019. * [58] R. Zhang, P. Isola, A. A. Efros, E. Shechtman, and O. Wang. The unreasonable effectiveness of deep features as a perceptual metric. In CVPR, 2018. * [59] L. Zhou and C. Hansen. Transfer function design based on user selected samples for intuitive multivariate volume exploration. In 2013 IEEE Pacific Visualization Symposium (PacificVis), pp. 73–80. IEEE, 2013.
arxiv-papers
2021-07-27T08:38:20
2024-09-04T03:07:20.952412
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Sebastian Weiss, R\\\"udiger Westermann", "submitter": "Sebastian Weiss", "url": "https://arxiv.org/abs/2107.12672" }
2107.12679
# MFAGAN: A Compression Framework for Memory-Efficient On-Device Super- Resolution GAN Wenlong Cheng# City University of Hong Kong Mingbo Zhao# Donghua University Zhiling Ye Tencent Computer System Co., Ltd. Shuhang Gu∗ The University of Sydney ###### Abstract Generative adversarial networks (GANs) have promoted remarkable advances in single-image super-resolution (SR) by recovering photo-realistic images. However, high memory consumption of GAN-based SR (usually generators) causes performance degradation and more energy consumption, hindering the deployment of GAN-based SR into resource-constricted mobile devices. In this paper, we propose a novel compression framework Multi-scale Feature Aggregation Net based GAN (MFAGAN) for reducing the memory access cost of the generator. First, to overcome the memory explosion of dense connections, we utilize a memory-efficient multi-scale feature aggregation net as the generator. Second, for faster and more stable training, our method introduces the PatchGAN discriminator. Third, to balance the student discriminator and the compressed generator, we distill both the generator and the discriminator. Finally, we perform a hardware-aware neural architecture search (NAS) to find a specialized SubGenerator for the target mobile phone. Benefiting from these improvements, the proposed MFAGAN achieves up to 8.3$\times$ memory saving and 42.9$\times$ computation reduction, with only minor visual quality degradation, compared with ESRGAN. Empirical studies also show $\sim$70 milliseconds latency on Qualcomm Snapdragon 865 chipset. (a) (b) (c) (d) (e) (f) HR | ESRGAN | MFAGAN ---|---|--- PSNR$\uparrow$ $|$ LPIPS$\downarrow$ | 31.13 $|$ 0.0632 | 32.59 $|$ 0.0514 $\\#$FLOPs $|$ Memory | 291G $|$ 4.29G | 8.41G $|$ 0.551G Figure 1: 4$\times$ SR results for the image ’img 009’ in Urban100. Our proposed MFAGAN reduces the memory usage of ESRAGN by 8.3$\times$ while preserving sharp edges and rich textures. (Zoom in for best view) ## 1 Introduction Single image super-resolution (SR) is a fundamental low-level vision task, which aims to reconstruct a high-resolution (HR) image from a degraded low- resolution (LR) input. In recent years, convolutional neural networks (CNNs) based approaches [10, 11, 31, 42, 21, 3, 41, 4] have achieved high fidelity in terms of peak signal-to-noise ratio (PSNR) [34]. Nevertheless, these PSNR- oriented methods tend to produce blurry output without enough high-frequency information. More recently, an emerging direction is to resolve the ill-posed SR problem by using generative adversarial networks (GANs) [14]. State-of-the- art GAN-based perceptual-driven models such as SRGAN [23], ESRGAN [36] can generate photorealistic images with more natural textures and sharper edges. With the popularity of mobile devices, there is a growing on-device demand for GAN-based SR applications. However, the aforementioned GAN-based SR applications are extremely memory intensive and energy overhead, making it impractical to deploy GAN-based SR generators into resource-limited mobile devices. On the one hand, mobile devices are memory-constrained. For instance, a Snapdragon 865 GPU has 2800MB memory bandwidth, while ESRGAN would cost over 4000MB memory consumption to process a 256 $\times$ 256 image. Furthermore, the total memory bandwidth is shared by various on-device applications and the operating system. The peak bandwidth consumed by a single application may only be allocated 20–40% [24] of the total memory bandwidth. The overall performance of GAN-based SR is bound by the limited memory bandwidth and lives under the slanted part of the roofline [28]. On the other hand, mobile devices are energy-constrained. The energy consumption of GAN-based SR mainly comes from memory access cost and computation. With a 45 nm technology, the 32b coefficients in off-chip DRAM cost 640 pJ, 128$\times$ larger than the consumption of 32b coefficients in on-chip SRAM (3.7 pJ) [15]. The heavy memory cost of GAN-based SR severely hinder the mobile deployment or at least creates performance degradation. During the past few years, tremendous model compression techniques [16] have been proposed to speed-up the inference and reduce the model parameters and GAN compression is recently a hot topic in this research area [26, 12, 35]. For example, Aguinaldo et al. [1], and Chen et al. [7] first exploited different knowledge distillation modalities for CycleGAN compression. Gong et al. [13], Shu et al. [32], and Chu et al. [8] employed reinforcement learning or co-evolutionary learning-based search to accelerate GAN. However, these methods cannot be directly extended to compress GAN-based SR due to the following reasons: first, the minimax training of GAN is notoriously unstable and prone to collapse. This will greatly result in non-trivial solutions for some complex tasks such as GAN-based SR compression; second, memory efficiency is a critical issue when deploying the memory overhead models on the mobile phone. However, none of above compression methods have consider this point. Therefore, how to develop a memory efficiency and effective generator for GAN- based SR, is an urgent problem. In this work, in order to develop a hardware-aware on-device GAN-based SR network, we propose a new network, namely, Multi-scale Feature Aggregation Net based GAN (MFAGAN) for memory efficient compression. In detail, we first propose a novel generator architecture by designing the multi-scale feature aggregation modules (MFAMs), which is memory-efficient and of sufficient expressive ability. Besides, we introduce the light-weight PatchGAN discriminator to overcome artifacts and facilitate MFAGAN training. Meriting from the above structures, we propose a two-stage compression method: we first utilize knowledge distillation both for the generator and discriminator. This is to balance the student generator and student discriminator for maintaining the stabilized training of the compressed generator so that the non-trivial solution can be achieved; we then apply NAS channel pruning method to further reduce memory usage. Finally, we utilize the hardware-aware evolutionary search for specializing SubGenerator on the target mobile phone. The main contributions can be shown as follows: 1) we start from a new and more useful point of view to design a small-size SR method by firstly considering the memory efficiency. This is of great practice in real-world applications; 2) we develop a new two-stage approach to achieve effective compression, where we first distill G/D to achieve stabilized non-trivial solution of the compressed generator and then apply NAS to reduce memory usage; 3) Extensive experiments validate the efficiency of our method. MFAGAN achieves up to 8.3$\times$ memory reduction, 42.9$\times$ computing efficiency over ESRGAN with only minor loss in PSNR and Learned Perceptual Image Patch Similarity (LPIPS) [34]. Finally, we deploy our MFAGAN on OPPO Find X2 and demonstrate $\sim$70 milliseconds latency on Snapdragon 865 GPU. ## 2 Related Work In this section, we review previous works about GAN-based super-resolution networks, efficient super-resolution networks, and GAN compression techniques, which are the most relevant to our work. ### 2.1 GAN-based Super-Resolution Networks Recently, a bunch of SR works paid more attention to visual effects. With the rapid development of perceptual-driven SR algorithms, Generative Adversarial Network (GAN)-based methods often achieved state-of-the-art visual performance. Johnson et al.[20] adopted the perceptual loss to enhance the visual quality while Ledig et al.[23] firstly employed the adversarial loss to generate more realistic images. Besides, Sajjadi et al.[30] explored the texture matching loss to reduce visually unpleasant artifacts. Based on these works, Wang et al. [36] enhanced the SRGAN by employing Residual-in-Residual Dense Block (RRDB) and the relativistic discriminator, won the champion of PIRM2018-SR challenge. Furthermore, the LPIPS metric was introduced to measure the perceptual similarity. Lately, Zhang et al.[40] proposed a novel rank- content loss to optimize the perceptual quality, which achieved state-of-the- art results in perceptual metrics. Despite their performance boost, large GAN generators’ growing complexity conflicts with the demands of mobile deployments, calling for GAN compression techniques. In this paper, we focus on memory-efficient GAN-based SR for mobile applications. ### 2.2 Efficient Super-Resolution Networks In recent years, a series of efficient networks with parameters in the range of 10M have been proposed for the efficient SR task [39]. We call these kinds of networks efficient super-resolution networks. They can be approximately divided into two classes: handcrafted architectures and model compression- based methods. A surge of handcrafted architectures have been designed for the efficient SR task, ranging from post-upsampling operators [11], group convolutions [19], residual blocks [42], recursive structures [21], cascaded architectures [3], inverse sub-pixel convolution [31], attention mechanisms [41], to information multi-distillation block (IMDB) [18]. Besides, model compression techniques such as knowledge distillation, channel pruning, and binary quantization have also been used to speed up the SR networks. Specifically, RFDN [27] applied channel pruning along with residual feature aggregation module to improve the IMDB efficiency, which is the winner solution of the AIM 2020 Challenge on Efficient Super-Resolution [39]. However, these methods aim to maximize PSNR between SR and HR, which tend to generate blurry results without high-frequency details. Efficient super- resolution networks cannot be directly used as the generator of GAN-based SR. ### 2.3 GAN Compression Techniques In the past few years, GAN has achieved prevailing success in many generation and translation tasks. However, the growing memory complexity and computation cost of GANs conflict with the demands of mobile deployments. It is hard to apply existing compression techniques, owing to the minimax training of GANs is notoriously unstable and prone to collapse. Several methods exploited knowledge distillation for compressing the image translation models. Aguinaldo et al. [1] first introduced knowledge distillation for unconditional GANs compression. Chen et al. [7] proposed to train an efficient generator by knowledge distillation over the architectures of both the generator and the discriminator. A few works have also attempted to incorporate neural architecture search (NAS) [43] with GANs. Gong et al. [13] utilized reinforcement learning to search for an efficient generator with a fixed discriminator, limiting the algorithm to discover an optimal generator since the balance between these two players needs to be considered. Shu et al. [32] later replaced the reinforcement learning by co-evolutionary pruning to accelerate CycleGAN, which relied on the cycle consistency loss. Chu et al. [8] leveraged an elastic search tactic at both micro and macro space to solve a multi-objective problem for SR. Combining multiple different compression techniques, such as weight sharing, channel pruning, knowledge distillation, and quantization, has been significantly outperformed approaches using single compression techniques. Li et al. [26] presented a compression framework for conditional GANs via intermediate feature distillation and automated channel reduction in a “once-for-all” manner. Fu et al. [12] performed computational resources constrained differential neural architecture search via the guidance of knowledge distillation. Wang et al. [35] combined three compression techniques: model distillation, channel pruning, and quantization, together with the minimax objective, into one unified optimization to form an end-to- end optimization framework. However, most of the above methods are not customized for GAN-based SR. Besides, they have not yet addressed the memory intensive problem. The memory budget should still be met for efficient network structure design. Moreover, the mutual balance of the compressed generator and discriminator needs to be considered, which is crucial for stabilizing the GANs training process. Our work is to solve the above problems. ## 3 Proposed Approaches ### 3.1 Network Structure In our network, we first develop a novel generator architecture by designing the multi-scale feature aggregation modules (MFAMs). We then introduce the light-weight PatchGAN discriminator to overcome artifacts and facilitate MFAGAN training. Meriting from the above structures, we then distill both generator and discriminator to achieve non-trivial super-generator and to apply NAS channel pruning on it. The overall proposed compression framework architecture is depicted in Figure 2. Figure 2: MFAGAN overview. (1) Construct the large MFAGAN (MFAGAN$\\_$L) using the proposed Multi-Scale Feature Aggregation Network as a generator and the introduced PatchGAN discriminator. (2) Distill both the generator and discriminator in the MFAGAN$\\_$L. (3) Train a weight-shared SuperGenerator, which comprises many SubGenerators of different channel numbers. (4) Perform a hardware-aware evolutionary search to find the satisfactory SubGenerator. (5) Fine-tune the searched SubGenerator with the previously distilled discriminator. ### 3.2 Multi-Scale Feature Aggregation Network For the generator, inspired by ESRGAN [36], VoVNet [25] and IMDN [18], we design a memory-efficient Multi-Scale Feature Aggregation Network (MFANet) shown in Figure 4. The proposed MFANet mainly contains four parts: the coarse feature extraction part, the multi-scale feature extraction part, the feature fusion part, and the reconstruction part. In particular, we use a $3\times 3$ convolution as the coarse feature extraction part to generate features from the input LR image. The following is the multi-scale features extraction part, in which three Multi-scale Feature Aggregation Modules (MFAMs) are stacked in a chain manner to refine the extracted features gradually. Later we will provide a detailed description of MFAM. After extracting multi-scale features with a set of MFAMs, we further conduct global feature aggregation by a $1\times 1$ convolution layer, which contributes to concatenate multi-scale features of different modules and reduces computation complexity. Meanwhile, a global skip connection is applied between different scale features so that the features information can be fully exploited. Then, a $3\times 3$ convolution layer is used to smooth the aggregated features. Finally, the HR images are generated by the image reconstruction part, which only consists of a $3\times 3$ convolution and a sub-pixel operation. (a) RFDB (b) MFAM(ours) (c) CFAB(ours) Figure 3: Illustration of three structures. (a) RFDB: the residual feature distillation block. (b) MFAM: the multi-scale feature aggregation module. (c) CFAB: the concatenative feature aggregation block in MFAM. Modifying from the RFDN [27], as illustrated Figure 3 (a), we propose the Multi-scale Feature Aggregation Module (MFAM), as shown in Figure 3 (b), which is more expressive and memory-efficient than the RFDB. In RFDB, we can see that the channel reduction is conducted by a $1\times 1$ convolution on the left, which compresses feature channels at a fixed ratio. Although the $1\times 1$ convolution decreases the number of parameters, it increases the overall memory complexity. Therefore, the three $1\times 1$ convolutions are removed, since we find that the NAS method is more efficient for channel reduction without introducing extra computation. Moreover, we also introduce the Concatenative Feature Aggregation Block (CFAB), as displayed in Figure 3 (c), to replace SRB in RFDB [27]. CFAB consists of five $3\times 3$ convolutions, a local feature aggregation layer, a CCA layer [18], a $1\times 1$ convolution layer, and a local skip connection. CFAB can conserve feature representations of multiple receptive fields as well as preserve original information. This schema provides diverse information for recovering high- resolution details. In summary, the main goal of MFAM is to reduce memory overhead and enhance expressive ability. ### 3.3 PatchGAN Discriminator Besides the memory-efficient generator, the ESRGAN discriminator is replaced with the PatchGAN discriminator [9]. We utilize a 7-layer fully convolutional discriminator. Each convolutional layer is followed by a leaky ReLU. To avoid unpleasant artifacts, all BN layers are removed. Compared with the original discriminator, the PatchGAN discriminator has fewer parameters. Another advantage is that it only models local patches instead of the whole image, making the MFAGAN$\\_$L training faster and more stable. Figure 4: Illustration of the overall objective. ### 3.4 Knowledge Distillation Layer-wise knowledge from the teacher generator. Several attempts have been made to compress GANs generator with knowledge distillation in image translation. In this work, we match the teacher generator’s intermediate representations, as the layer-wise knowledge distillation work in [29]. In particular, we first train a teacher generator $G$ until convergence and then conduct layer-wise knowledge transfer from $G$ to the student generator $G^{\prime}$. The goal of distillation is that the feature maps of each layer in $G^{\prime}$ should be as close as possible to those of $G$. Feature maps of the 1st, 2nd and 3rd MFAMs of $G$ denoted as $t_{1}$, $t_{2}$ and $t_{3}$ respectively. The corresponding levels of feature maps in $G^{\prime}$ are the outputs of the 1st, 2nd, and 3rd MFAMs, denoting as $s_{1}$, $s_{2}$, and $s_{3}$, respectively. To address the above issue, we use the information in $t_{1}$, $t_{2}$ and $t_{3}$ to guide the information $s_{1}$, $s_{2}$ and $s_{3}$ during the training of $G^{\prime}$. Subsequently, a student generator of fewer channels is trained by inheriting the low-level and high-level information from the original heavy teacher generator. Layer-wise knowledge from the teacher discriminator. Although we aim to compress the generator, a discriminator stores useful knowledge of a learned GAN to guide the training generator [7]. Using heavy discriminator, $D$ sometimes leads to severe training instability and image quality degradation after the generator $G$ is compressed. It is necessary to distill the teacher discriminator $D$ to assist the training of the compressed generator $G^{\prime}$. In this work, we adopt the PatchGAN discriminator architecture to distill layer-wise knowledge from teacher discriminator $D$ to student discriminator $D^{\prime}$. Concretely, we extract corresponding levels of feature maps using the outputs of every two convolution layers, denoting as $t_{2}$, $t_{4}$, $t_{6}$, respectively. After that, we use the information in $t_{2}$, $t_{4}$, $t_{6}$ to guide the information $s_{2}$, $s_{4}$, $s_{6}$ during training of student discriminator. We jointly optimize $G^{\prime}$ and $D^{\prime}$ to minimize the distillation loss $L_{Distill\\_G}$ and $L_{Distill\\_D}$. Mode collapse frequently occurs when the generator and discriminator are imbalanced. We adopt the layer-wise knowledge distillation on both the teacher generator and teacher discriminator. Hence, the student generator and discriminator are better matched. Such guidance from the teacher networks provides stable supervision in the early training phase of compressed networks. It is easy to implement, and mode collapse has never been experienced with our knowledge distillation schema. ### 3.5 Objective Function Overall objective. There are five loss functions applied to training, depicted in Figure 4. The overall objective for our MFAGAN is the weighted sum of loss terms, written as follows: $\displaystyle L={\lambda_{1}}{L_{recon}}$ $\displaystyle+{\lambda_{2}}{L_{Distill\\_G}}+{\lambda_{3}}{L_{Distill\\_D}}$ (1) $\displaystyle+{\lambda_{4}}{L_{percep}}+{\lambda_{5}}{L_{G}},$ where $\lambda_{1}$, $\lambda_{2}$, $\lambda_{3}$, $\lambda_{4}$, and $\lambda_{5}$ are the trade-off hyper-parameters to balance different objectives. Reconstruction loss. Here, we apply the reconstruction loss, specifically the Mean Absolute Error (MAE) loss, to enhance the fidelity of the recovered images. Reconstruction loss is trained to optimize the $L1$ distance between the recovered images and ground-truths: ${L_{recon}}=\frac{1}{N}\sum\limits_{i=1}^{N}{{{\left\|{R\left({x_{i}^{lr}}\right)-x_{i}^{gt}}\right\|}_{\rm{1}}}},\vspace{-0.05in}$ (2) where $x_{i}^{lr}$, $x_{i}^{gt}$ denote the $i$-th LR image patch and the corresponding HR. $N$ is the total number of training samples. $R(\cdot)$ represents the super-resolved output by MFAGAN. Layer-wise knowledge distillation loss. We introduce a layer-wise knowledge distillation to extract the intermediate feature maps of the teacher generator. The intermediate feature maps contain richer information and allow the student generator to acquire low-level and high-level information from the teacher generator. The generator distillation objective can be formalized as: ${L_{Distill\\_G}}{\rm{=}}\frac{1}{n}\sum\limits_{i=1}^{n}{{{\left\|{{G_{i}}\left({{x}}\right)-{G^{\prime}_{i}}\left({{x}}\right)}\right\|}_{2}}},\vspace{-0.05in}$ (3) where ${G_{i}}({x})$ and ${G^{\prime}_{i}}({x})$ are the intermediate feature maps of the $i$-th chosen layer in the teacher and student generator. Besides the generator, the discriminator stores useful knowledge of a learned GAN- based SR. It is useful to distill the teacher discriminator to stabilize the compressed generator training. The discriminator distillation loss function can be defined as: ${L_{Distill\\_D}}{\rm{=}}\frac{1}{m}\sum\limits_{i=1}^{m}{{{\left\|{{D_{i}}\left({{y}}\right)-{D^{\prime}_{i}}\left({{y}}\right)}\right\|}_{2}}},\vspace{-0.05in}$ (4) where ${D_{i}}({y})$ and ${D^{\prime}_{i}}({y})$ are the feature maps of the $i$-th chosen layer in the teacher and student discriminator. Perceptual loss. In [20] Johnson et al. proposed the perceptual loss to improve the visual effect of low-frequency features such as edges. Instead of computing distances in image pixel space, the images are first mapped into feature space by a pre-trained VGG19 network, denoted as $\phi$, and then compute the Mean Square Error (MSE) on their feature maps as follows: ${L_{percep}}=\sum\limits_{i=1}{{{\left\|{{\phi}\left({\hat{y_{i}}}\right)-{\phi}\left({{y_{i}}}\right)}\right\|}_{2}}},\vspace{-0.06in}$ (5) where $\phi({{\hat{y}}_{i}})$ and $\phi({{y}_{i}})$ represent the feature maps of HR ground truth and the SR, respectively. All the feature maps are obtained by the fourth convolutional layer before the fifth max-pooling layer within the VGG19 network. Adversarial loss. Following common practice, we apply adversarial loss [36] to enhance the texture details of the generator generated image to make it more realistic. Adversarial training a standard minimax optimization, and the discriminator $D$ is trained to distinguish between real images and the output of $G$. The adversarial loss ${{L}_{G}}$ is described as: ${L_{G}}=-\log(D(G({I^{LR}})).$ (6) where $I^{LR}$ is the LR image, $D(G(I^{LR}))$ means the probability of the discriminator over all training samples. ### 3.6 Hardware-aware NAS based Channel Pruning SuperGenerator training with fine-grained channels. To address the fine- grained channel pruning problem, we first build a SuperGenerator that comprises all candidate SubGenerators. Concretely, we use MFANet as the backbone to build a “once-for-al” [6] network that comprises many SubGenerators of different channel numbers (i.e., 48, 32, 24), in which the full-width model is the SuperGenerator. The combined search space contains about $3^{8}=6581$ different SubGenerators, in which every SubGenerator in the search space is a part of the SuperGenerator. In practice, the SuperGenerator only needs to be trained for the same steps as a baseline SR model, which is fast and low-cost. We thus use the most important channels of the SuperGenerator to initialize the SubGenerators. All SubGenerators share the front portion of corresponding layer weights in the SuperGenerator. Hardware-aware evolutionary search for specialized SubGenerator. After SuperGenerator training, we adopt the evolutionary search to find the satisfactory SubGenerator, which satisfies the target hardware’s latency constraints while optimizing the PSNR. We can first build a lookup table containing the latency for all possible operators on the target hardware, then the overall latency of a SubGenerator is predicted by summing up each operator’s latency [37]. Therefore, we can approximate the latency of candidate SubGenerator by querying the lookup table. The PSNR of SubGenerators is evaluated on the validation set. Afterward, we conduct the evolutionary search to get a specialized SubGenerator. Since SubGenerators training has been decoupled from the architecture search, we do not need any training cost in the search stage. This hardware-aware NAS channel pruning enables us to design a specialized SubGenerator on the target hardware. Finally, we can fine-tune the pruned SubGenerator with distilled discriminator to obtain the final model. ## 4 Experimental Results ### 4.1 Experimental Setup Datasets. Following [36], we adopt 800 HR images from the DIV2K dataset [2] as the training set. To generate LR training patches, we down-sample the HR images using bicubic interpolation in MATLAB. We also augment the training data with the random crop, horizontal/vertical flips, and $90^{\circ}$ rotations. Evaluation metrics. For evaluation, we test the compressed/searched model on four SR benchmark datasets, namely Set5 [5], Set14 [38], B100 [33], and Urban100 [17]. Inspired by the PIRM2018-SR Challenge [34], we introduce PSNR and LPIPS on the Y channel of the transformed YCbCr space as the quality evaluation metrics. To measure the computation efficiency, we compare the widely used metrics - memory access cost, parameters, FLOPs (floating-point operations), and inference latency. Regarding the inference latency, we use the published codes of competitors to evaluate on a server with 4.2GHz Intel i7 CPU, 32GB RAM, and an Nvidia V100 GPU card. Implement details. The training process is divided into four main stages. (1) Constructing the MFAGAN$\\_$L model. We first train an MFANet with the $L_{1}$ loss, while the learning rate is $2\times{10^{-4}}$ and 500K iterations. The MFANet initialized generator is then trained using the loss function in Eq.(1) with $\lambda_{1}=1$, $\lambda_{4}=1$, $\lambda_{5}=10$, the learning rate is initialized to $1\times{10^{-4}}$ and halved at $[5k,10k]$ iterations. (2) Layer-wise distillation on both the generator and discriminator in the MFAGAN$\\_$L. The student generator and student discriminator is trained with $\lambda_{1}=1$, $\lambda_{2}=0.05$, $\lambda_{3}=0.05$, $\lambda_{4}=1$, $\lambda_{5}=10$. (3) Training the weight-shared SuperGenerator. SuperGenerator is trained with $\lambda_{1}=1$, $\lambda_{4}=1$, the learning rate is set to $1\times{10^{-4}}$ and halved at $[200k,400k,600k]$ iterations. (4) Fine-tuning the searched generator with distilled discriminator about 10K iterations. For all experiments, we use the Adam [22] optimization method with $\beta_{1}=0.5$, $\beta_{2}=0.999$, $\epsilon={10^{-8}}$ to train all of the models. The mini-batch size is set to 16. Our networks are implemented using the PyTorch framework on 8 NVIDIA V100 GPUs. The entire training process takes about 120 GPU hours. ### 4.2 Model Complexity Analysis Figure 5: The memory access cost vs. LPIPS on Set5 (4$\times$) dataset. The orange circles represent our proposed models. The circles’ size represents the number of FLOPs, which are calculated on $512\times 512$ HR image. To construct a memory-efficient SR model, the memory access cost of the network is vital. As discussed in previous sections, the proposed MFAGAN could significantly reduce memory consumption. Figure 5 depicts the comparisons about LPIPS vs. memory access cost and FLOPs on Set5 4$\times$ dataset. From Figure 5, we can observe that the MFAGAN model with 3 MFAMs exhibits comparative or better performance and fewer memory usage than other state-of- the-art methods SRGAN [23], EhanceNet [30], ESRGAN [36], and AGD [12]. MFAGAN is also superior over efficient models including SRCNN [10], IMDN [18]. Compared with IMDN, our MFAGAN achieves better LPIPS with a slightly larger model. These results demonstrate that the proposed MFAGAN can correctly balance memory complexity and reconstruction performance. ### 4.3 Ablation Study In this section, we conduct ablation experiments to investigate the contributions of each component in the proposed method. The overall comparison is illustrated in Table 1, in which each column represents a model. A detailed discussion is provided as follows. Table 1: Ablation study: Memory-efficient architecture combined with knowledge distillation on both ${G}$ and ${D}$, and NAS channel pruning achieves the best performance on the Set5 dataset. Options | | Baseline --- (ESRGAN) 1st | 2nd | 3rd | 4th | 5th generator channels | 64 | 64 | 48 | 48 | 32 | 32 discriminator channels | 64 | 48 | 32 | 48 | 48 | 32 MFAGAN$\\_$L | | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$ | $\checkmark$ | Distill $G$ and $D$ --- | $\checkmark$ | | | $\checkmark$ | Distill $G$ --- | | $\checkmark$ | | NAS pruning | | | | $\checkmark$ | $\checkmark$ | PSNR$\uparrow$ --- LPIPS$\downarrow$ | 30.45 --- 0.0572 | 30.32 --- 0.0527 | 30.65 --- 0.0558 | 28.56 --- 0.0878 | 29.19 --- 0.0672 | 30.16 --- 0.0571 Memory (G) | 4.29 | 0.877 | 0.657 | 0.657 | 0.515 | 0.515 #Param. (MB) | 16.67 | 1.56 | 0.884 | 0.884 | 0.551 | 0.551 #FLOPs (G) | 291 | 23.72 | 13.45 | 13.45 | 8.41 | 8.41 Table 2: Quantitative comparison of our model with state-of-the-art perceptual-driven works on 4$\times$ SR task. In each row, red/blue represents best/second, respectively. Model | | Memory --- (G) | #FLOPs --- (G) | #Param. --- (MB) | Latency --- (ms) | Set5 --- PSNR$\uparrow$ LPIPS$\downarrow$ | Set14 --- PSNR$\uparrow$ LPIPS$\downarrow$ | B100 --- PSNR$\uparrow$ LPIPS$\downarrow$ | Urban100 --- PSNR$\uparrow$ LPIPS$\downarrow$ SRGAN | 0.7 | 36.5 | 1.55 | 80.8 | | 29.40 $|$ 0.0621 --- | 26.11 $|$ 0.1167 --- | 25.17 $|$ 0.1333 --- | $-$ --- EnhanceNet | 0.91 | 30.2 | 0.85 | 29 | | 28.56 $|$ 0.0764 --- | 25.77 $|$ 0.1295 --- | 24.93 $|$ 0.1481 --- | 23.54 $|$ 0.1307 --- ESRGAN | 4.29 | 291 | 16.67 | 169.4 | | 30.45 $|$ 0.0572 --- | 26.28 $|$ 0.1055 --- | 25.32 $|$ 0.1216 --- | 24.36 $|$ 0.1000 --- | AGD --- 0.94 | 27.1 | 0.41 | 27.7 | | 30.41 $|$ 0.0700 --- | 27.27 $|$ 0.1247 --- | 26.22 $|$ 0.1556 --- | 24.73 $|$ 0.1329 --- | MFAGAN (ours) --- 0.52 | 8.41 | 0.55 | 21.9 | | 30.16 $|$ 0.0571 --- | 26.69 $|$ 0.1133 --- | 25.33 $|$ 0.1332 --- | 24.23 $|$ 0.1132 --- Effectiveness of memory-efficient architecture. We first analyze the advantage of MFANet based MFAGAN$\\_$L. As shown in the 1st column, MFAGAN$\\_$L has comparative PSNR and LPIPS results with the baseline model. While achieves 4.89$\times$ memory saving and 12.26$\times$ computation reduction. With our memory consumption and computation complexity largely reduced, the SR performance remains relatively stable. The perceptual SR task requires the model to be expressive enough to recover more realistic texture details. Our proposed multi-scale feature aggregation modules (MFAMs) is capable of aggregating multi-scale features to produce powerful feature representation. Effectiveness of layer-wise knowledge distillation on both ${G}$ and ${D}$. We also investigate the effects of different distillation objectives on the MFAGAN$\\_$L. Two distillation methods are proposed, including solely layer- wise distillation on teacher generator $G$, and knowledge distillation on both teacher generator $G$ and teacher discriminator $D$. Results are illustrated in the 2nd and 3rd columns of Table 1, which show that the proposed distillation objective is useful for the MFAGAN$\\_$L compression. As shown in the 2nd column, distilled MFAGAN$\\_$L even has better PSNR result than MFAGAN$\\_$L, with 1.33$\times$ memory saving and 1.76$\times$ computation reduction. While solely distillation on $G$ yields worse performance compared with MFAGAN$\\_$L. As a teacher discriminator, $D$ stores useful information about teacher generator $G$. It can offer strong supervision to guide the student generator $G^{\prime}$ to learn faster and better. Effectiveness of NAS channel pruning. We further explore the role of NAS channel pruning. The results are shown in the 4th and 5th columns of Table 1. Directly using NAS channel pruning to compress the MFAGAN$\\_$L generator largely degrades the image SR performance. In contrast, knowledge distillation + NAS channel pruning achieves much better PSNR and LPIPS results, showing the necessity of jointly using channel pruning and knowledge distillation. Actually, the capacity gap between the SuperGenerator, i.e., MFAGAN-64, and the directly searched SubGenerator, i.e., MFAGAN-32, are too huge. As a result, the inherited weights from the SuperGenerator may be too recondite for the SubGenerator, in which case large ratio NAS channel pruning would have negative effects on the searched model. Applying the distilled MFAGAN-48 as SuperGenerator allows us to find a SubGenerator, which has a smaller gap between the SuperGenerator and hence makes learning easier. NAS channel pruning and knowledge distillation are complementary to each other, which guarantees MFAGAN achieve competitive results. Effectiveness of discriminator. Finally, this section aims to evaluate the importance of the PatchGAN discriminator. To this end, we train the MFAGAN$\\_$L with PatchGAN discriminator and ESRGAN discriminator on DIV2K, respectively. The convergence curves are visualized in Figure 6. We can observe that PatchGAN discriminator achieves better results, verifying that: (1) vanilla ESRGAN discriminator is not matched with light-weight MFANet and has worse performance; (2) PatchGAN discriminator leads to significantly better PSNR result and stability. Figure 6: Ablation study of PatchGAN discriminator. ### 4.4 Comparison with State-of-the-Art Methods Quantitative comparisons. We report the quantitative comparisons of state-of- the-art perceptual-driven methods over the benchmark datasets in Table 2. Compared with given methods, we can see MFAGAN achieves the best PSNR and LPIPS performance in most datasets. This reveals the effectiveness of our MFAM. Additionally, we also give the FLOPs, memory access cost, parameters, and latency for all the comparison methods. Our model achieves large compression ratios. In particular, our proposed method shows a clear advantage of ESRGAN compression compared to the previous GAN compression mthod AGD [12]. We can reduce the memory access cost of the ESRGAN generator by 8.2$\times$, which is 2$\times$ better compared to the previous AGD method while achieving a much better PSNR and LPIPS. It demonstrates that MFAGAN is superior to other perceptual-driven methods in a comprehensive performance. Table 3: Inference latency comparison of our MFAGAN with ESRGAN on the Qualcomm Snapdragon 865 GPU on 4$\times$ SR task. Model | | Memory --- (G) | #FLOPs --- (G) | #Param. --- (MB) | Set5 --- PSNR$\uparrow$ LPIPS$\downarrow$ | Mobile --- Latency ESRGAN | 4.29 | 291 | 16.67 | | 30.45 $|$ 0.0572 --- 1150 MFAGAN(ours) | 0.52 | 8.41 | 0.55 | | 30.16 $|$ 0.0571 --- 70 (a) 8023 from B100 (4$\times$) (a) (b) (c) (d) HR | DRLN | IMDN | SRGAN ---|---|---|--- (e) (f) (g) (h) EnhanceNet | ESRGAN | AGD | MFAGAN ---|---|---|--- (i) 223061 from B100 (4$\times$) (a) (b) (c) (d) HR | DRLN | IMDN | SRGAN ---|---|---|--- (e) (f) (g) (h) EnhanceNet | ESRGAN | AGD | MFAGAN ---|---|---|--- (i) 223061 from B100 (4$\times$) (a) (b) (c) (d) HR | DRLN | IMDN | SRGAN ---|---|---|--- (e) (f) (g) (h) EnhanceNet | ESRGAN | AGD | MFAGAN ---|---|---|--- Figure 7: 4$\times$ SR visual results for common test datasets. Our model (MFAGAN) can produce sharp edges and rich textures compared with other state- of-the-art methods. (Zoom in for best view) 4$\times$ Qualitative comparisons. To further illustrate the analyses above, we show visual comparisons on scales 4$\times$ on B100 and Set14. From Figure 7, it can be observed that MFAGAN can generate sharp edges and realistic textures without introducing unpleasant artifacts. For image “8023” and “223061” in the B100 dataset, we can see that MFAGAN can recover the sharpness of the edges on the objects. Besides, for challenging details in the image “Lena” in Set14, MFAGAN can generate the correct textures of hair portion and hat edges. In general, MFAGAN achieves comparatively visual quality with ESRGAN and shows more realistic textures and sharper edges over IMDN and AGD. ### 4.5 Comparison of Latency on Mobile Device Mobile inference acceleration has drawn people’s attention in recent years. At last, we compare the inference latency of our MFAGAN with ESRGAN on Qualcomm Snapdragon 865 GPU (on OPPO Find X2) for 4$\times$ SR images. We use the TensorFlow Lite framework to deploy the models on the mobile phone. The results are reported in Table 3. We can see that our mobile-friendly model can process a $128\times 128$ input with 70 ms, while ESRGAN with comparable performance requires a significantly longer 1150ms. Our proposed MFAGAN achieves 16.4$\times$ measured speedup while saving memory usage by 88%. The results show that MFAGAN is highly efficient in real-world applications. The algorithm and hardware co-design enables us to design specialized models on the target hardware. ## 5 Conclusion In this work, we propose Multi-scale Feature Aggregation Net based GAN (MFAGAN) compression framework to reduce the memory consumption of the generator in GAN-based SR. MFAGAN leverages memory-efficient architecture, layer-wise knowledge distillation, and hardware-aware evolutionary search to stabilize the training and improve the memory-efficiency. Extensive experiments show MFAGAN outperforms previous state-of-the-art methods with aggressively reduced memory access cost and a faster inference speed without visual quality degradation. For future works, we have plans to apply our findings to video SR. ## References * [1] Angeline Aguinaldo, Ping-Yeh Chiang, Alex Gain, Ameya Patil, Kolten Pearson, and Soheil Feizi. Compressing gans using knowledge distillation. arXiv preprint arXiv:1902.00159, 2019. * [2] Eirikur Agustsson and Radu Timofte. Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 126–135, 2017. * [3] Namhyuk Ahn, Byungkon Kang, and Kyung-Ah Sohn. Fast, accurate, and lightweight super-resolution with cascading residual network. In Proceedings of the European Conference on Computer Vision (ECCV), pages 252–268, 2018. * [4] Saeed Anwar and Nick Barnes. Densely residual laplacian super-resolution. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020\. * [5] Marco Bevilacqua, Aline Roumy, Christine Guillemot, and Marie Line Alberi-Morel. Low-complexity single-image super-resolution based on nonnegative neighbor embedding. 2012\. * [6] Han Cai, Chuang Gan, Tianzhe Wang, Zhekai Zhang, and Song Han. Once-for-all: Train one network and specialize it for efficient deployment. arXiv preprint arXiv:1908.09791, 2019. * [7] Hanting Chen, Yunhe Wang, Han Shu, Changyuan Wen, Chunjing Xu, Boxin Shi, Chao Xu, and Chang Xu. Distilling portable generative adversarial networks for image translation. arXiv preprint arXiv:2003.03519, 2020. * [8] Xiangxiang Chu, Bo Zhang, Hailong Ma, Ruijun Xu, Jixiang Li, and Qingyuan Li. Fast, accurate and lightweight super-resolution with neural architecture search. arXiv preprint arXiv:1901.07261, 2019. * [9] Ugur Demir and Gozde Unal. Patch-based image inpainting with generative adversarial networks. arXiv preprint arXiv:1803.07422, 2018. * [10] Chao Dong, Chen Change Loy, Kaiming He, and Xiaoou Tang. Learning a deep convolutional network for image super-resolution. In European conference on computer vision, pages 184–199. Springer, 2014. * [11] Chao Dong, Chen Change Loy, and Xiaoou Tang. Accelerating the super-resolution convolutional neural network. In European conference on computer vision, pages 391–407. Springer, 2016. * [12] Yonggan Fu, Wuyang Chen, Haotao Wang, Haoran Li, Yingyan Lin, and Zhangyang Wang. Autogan-distiller: Searching to compress generative adversarial networks. arXiv preprint arXiv:2006.08198, 2020. * [13] Xinyu Gong, Shiyu Chang, Yifan Jiang, and Zhangyang Wang. Autogan: Neural architecture search for generative adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 3224–3234, 2019. * [14] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014. * [15] Song Han, Xingyu Liu, Huizi Mao, Jing Pu, Ardavan Pedram, Mark A Horowitz, and William J Dally. Eie: efficient inference engine on compressed deep neural network. ACM SIGARCH Computer Architecture News, 44(3):243–254, 2016. * [16] Song Han, Huizi Mao, and William J Dally. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149, 2015. * [17] Jia-Bin Huang, Abhishek Singh, and Narendra Ahuja. Single image super-resolution from transformed self-exemplars. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 5197–5206, 2015. * [18] Zheng Hui, Xinbo Gao, Yunchu Yang, and Xiumei Wang. Lightweight image super-resolution with information multi-distillation network. In Proceedings of the 27th ACM International Conference on Multimedia, pages 2024–2032, 2019. * [19] Zheng Hui, Xiumei Wang, and Xinbo Gao. Fast and accurate single image super-resolution via information distillation network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 723–731, 2018. * [20] Justin Johnson, Alexandre Alahi, and Li Fei-Fei. Perceptual losses for real-time style transfer and super-resolution. In European conference on computer vision, pages 694–711. Springer, 2016. * [21] Jiwon Kim, Jung Kwon Lee, and Kyoung Mu Lee. Deeply-recursive convolutional network for image super-resolution. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1637–1645, 2016. * [22] Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. * [23] Christian Ledig, Lucas Theis, Ferenc Huszár, Jose Caballero, Andrew Cunningham, Alejandro Acosta, Andrew Aitken, Alykhan Tejani, Johannes Totz, Zehan Wang, et al. Photo-realistic single image super-resolution using a generative adversarial network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4681–4690, 2017. * [24] Juhyun Lee, Nikolay Chirkov, Ekaterina Ignasheva, Yury Pisarchyk, Mogan Shieh, Fabio Riccardi, Raman Sarokin, Andrei Kulik, and Matthias Grundmann. On-device neural net inference with mobile gpus. arXiv preprint arXiv:1907.01989, 2019. * [25] Youngwan Lee, Joong-won Hwang, Sangrok Lee, Yuseok Bae, and Jongyoul Park. An energy and gpu-computation efficient backbone network for real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 0–0, 2019. * [26] Muyang Li, Ji Lin, Yaoyao Ding, Zhijian Liu, Jun-Yan Zhu, and Song Han. Gan compression: Efficient architectures for interactive conditional gans. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 5284–5294, 2020. * [27] Jie Liu, Jie Tang, and Gangshan Wu. Residual feature distillation network for lightweight image super-resolution. arXiv preprint arXiv:2009.11551, 2020. * [28] André Lopes, Frederico Pratas, Leonel Sousa, and Aleksandar Ilic. Exploring gpu performance, power and energy-efficiency bounds with cache-aware roofline modeling. In 2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pages 259–268. IEEE, 2017. * [29] Adriana Romero, Nicolas Ballas, Samira Ebrahimi Kahou, Antoine Chassang, Carlo Gatta, and Yoshua Bengio. Fitnets: Hints for thin deep nets. arXiv preprint arXiv:1412.6550, 2014. * [30] Mehdi SM Sajjadi, Bernhard Scholkopf, and Michael Hirsch. Enhancenet: Single image super-resolution through automated texture synthesis. In Proceedings of the IEEE International Conference on Computer Vision, pages 4491–4500, 2017. * [31] Wenzhe Shi, Jose Caballero, Ferenc Huszár, Johannes Totz, Andrew P Aitken, Rob Bishop, Daniel Rueckert, and Zehan Wang. Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1874–1883, 2016. * [32] Han Shu, Yunhe Wang, Xu Jia, Kai Han, Hanting Chen, Chunjing Xu, Qi Tian, and Chang Xu. Co-evolutionary compression for unpaired image translation. In Proceedings of the IEEE International Conference on Computer Vision, pages 3235–3244, 2019. * [33] Radu Timofte, Vincent De Smet, and Luc Van Gool. A+: Adjusted anchored neighborhood regression for fast super-resolution. In Asian conference on computer vision, pages 111–126. Springer, 2014. * [34] Radu Timofte, Shuhang Gu, Jiqing Wu, and Luc Van Gool. Ntire 2018 challenge on single image super-resolution: Methods and results. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 852–863, 2018. * [35] Haotao Wang, Shupeng Gui, Haichuan Yang, Ji Liu, and Zhangyang Wang. Gan slimming: All-in-one gan compression by a unified optimization framework. In European Conference on Computer Vision, pages 54–73. Springer, 2020. * [36] Xintao Wang, Ke Yu, Shixiang Wu, Jinjin Gu, Yihao Liu, Chao Dong, Yu Qiao, and Chen Change Loy. Esrgan: Enhanced super-resolution generative adversarial networks. In Proceedings of the European Conference on Computer Vision (ECCV), pages 0–0, 2018. * [37] Bichen Wu, Xiaoliang Dai, Peizhao Zhang, Yanghan Wang, Fei Sun, Yiming Wu, Yuandong Tian, Peter Vajda, Yangqing Jia, and Kurt Keutzer. Fbnet: Hardware-aware efficient convnet design via differentiable neural architecture search. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 10734–10742, 2019. * [38] Roman Zeyde, Michael Elad, and Matan Protter. On single image scale-up using sparse-representations. In International conference on curves and surfaces, pages 711–730. Springer, 2010. * [39] Kai Zhang, Martin Danelljan, Yawei Li, Radu Timofte, Jie Liu, Jie Tang, Gangshan Wu, Yu Zhu, Xiangyu He, Wenjie Xu, et al. Aim 2020 challenge on efficient super-resolution: Methods and results. arXiv preprint arXiv:2009.06943, 2020. * [40] Wenlong Zhang, Yihao Liu, Chao Dong, and Yu Qiao. Ranksrgan: Generative adversarial networks with ranker for image super-resolution. In Proceedings of the IEEE International Conference on Computer Vision, pages 3096–3105, 2019. * [41] Yulun Zhang, Kunpeng Li, Kai Li, Lichen Wang, Bineng Zhong, and Yun Fu. Image super-resolution using very deep residual channel attention networks. In Proceedings of the European Conference on Computer Vision (ECCV), pages 286–301, 2018. * [42] Yulun Zhang, Yapeng Tian, Yu Kong, Bineng Zhong, and Yun Fu. Residual dense network for image super-resolution. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2472–2481, 2018. * [43] Barret Zoph and Quoc V Le. Neural architecture search with reinforcement learning. arXiv preprint arXiv:1611.01578, 2016.
arxiv-papers
2021-07-27T09:04:30
2024-09-04T03:07:20.967794
{ "license": "Creative Commons Zero - Public Domain - https://creativecommons.org/publicdomain/zero/1.0/", "authors": "Wenlong Cheng and Mingbo Zhao and Zhiling Ye and Shuhang Gu", "submitter": "Mingbo Zhao", "url": "https://arxiv.org/abs/2107.12679" }
2107.12680
# Kähler-Ricci flow for deformed complex structures Gang Tian, Liang Zhang and Xiaohua $\text{Zhu}^{*}$ School of Mathematical Sciences & BICMR, Peking University, Beijing 100871, China. [email protected] [email protected] [email protected] ###### Abstract. Let $(M,J_{0})$ be a Fano manifold which admits a Kähler-Ricci soliton, we analyze the behavior of the Kähler-Ricci flow near this soliton as we deform the complex structure $J_{0}$. First, we will establish an inequality of Lojasiewicz’s type for Perelman’s entropy along the Kähler-Ricci flow. Then we prove the convergence of Kähler-Ricci flow when the complex structure associated to the initial value lies in the kernel $Z$ or negative part of the second variation operator of Perelman’s entropy. As applications, we solve the Yau-Tian-Donaldson conjecture for the existence of Kähler-Ricci solitons in the moduli space of complex structures near $J_{0}$, and we show that the kernel $Z$ corresponds to the local moduli space of Fano manifolds which are modified $K$-semistable. We also prove an uniqueness theorem for Kähler-Ricci solitons. ###### Key words and phrases: Kähler-Ricci flow, Kähler-Ricci solitons, deformation space of complex structures ###### 2000 Mathematics Subject Classification: Primary: 53C25; Secondary: 53C55, 58E35 58J35 * Partially supported by NSFC Grants 11771019 and BJSF Grants Z180004. ###### Contents 1. 0 Introduction 2. 1 Weighted Hodge-Laplace on $A^{p,q}(M,T^{1,0}M)$ 3. 2 Kuranishi deformation theory for $\Box_{h}$-operator 4. 3 Restricted entropy $\nu(\cdot)$ and its variations 1. 3.1 Variation of Kähler metrics 2. 3.2 The first variation of $\nu(\cdot)$ 3. 3.3 The second variation of $\nu(\cdot)$ 5. 4 A new version of $\delta^{2}\nu$ 1. 4.1 Kernel space $Z$ of $H_{1}$ 2. 4.2 Index of $H_{1}$ 3. 4.3 Maximality of $\lambda(\cdot)$ associated to $Z$ 6. 5 Lojasiewicz inequality on the space of Kähler metrics 7. 6 Proof of Theorem 0.1 8. 7 Applications of Theorem 0.1 9. 8 Generalization of Theorem 0.1 1. 8.1 Linearly stable case 2. 8.2 Linearly semistable case ## 0\. Introduction Let $(M,J_{0})$ be a Fano manifold which admits a Kähler-Ricci, abbreviated as KR, soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. 111We always denote a Kähler metric $g$ by its Kähler form $\omega_{g}$. It is known that for any initial metric $\omega_{0}\in 2\pi c_{1}(M,J_{0})$, the KR flow will evolve $\omega_{0}$ to a KR soliton $\omega_{KS}^{\prime}$ smoothly [39, 11]. Moreover, by the uniqueness of KR solitons [35, 36], $\omega_{KS}^{\prime}=\sigma^{*}\omega_{KS}$ for some $\sigma\in{\rm Aut}(M,J_{0})$. Thus it is a natural question how to extend the above convergence result to Kähler manifolds with complex structures near $J_{0}$. The question is closely related to the existence problem of KR solitons for the local moduli of complex structures at $J_{0}$ as well as the local moduli space of KR solitons near $\omega_{KS}$. When $(M,J_{0})$ admits a Kähler-Einstein (KE) metric, it has been proved that the KR flow is always convergent to a KE metric in the $C^{\infty}$-topology for any initial metric $\omega_{0}\in 2\pi c_{1}(M,J)$ so long as $J$ is sufficiently close to $J_{0}$ [38, 32]. As a consequence, the Mabuchi’s K-energy on $(M,J)$ is bounded from below [38, Lemma 7.1] (also see [41, 8]), so all Fano manifolds $(M,J)$ near $(M,J_{0})$ are $K$-semistable. We refer the reader to [22], [20] [24], [46, Proposition 4.17] etc. for more general K-semistable Fano manifolds. However, for a KR soliton $(M,J_{0},\omega_{KS})$ which is not KE metric, the flow on $(M,J)$ may not always converge to a KR soliton smoothly even if $J$ is close to $J_{0}$, as explained in [45, Remark 6.5] by using Pasquier’s example of horospherical variety which is a degeneration of the Grassmannian manifold ${\rm Gr}_{q}(2,7)$ [26]. Thus we are led to understanding those deformed complex structures for which the KR flow is $C^{\infty}$-convergent to a KR soliton. According to the deformation theory [14, 13], the local moduli of complex structures at $(M,J_{0})$ can be parameterized by using the C$\overset{\vee}{e}$ch cohomology class $H^{1}(M,J_{0},\Theta)$, which is the infinitesimal deformation space of complex structures on $M$. In our case of Fano manifolds, we introduce the $h$-harmonic space $\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ associated to $H^{1}(M,J_{0},\Theta)$, where $h$ is a Ricci potential of Kähler metric $\omega$ in $2\pi c_{1}(M,J_{0})$ (cf. Section 1). In particular, $h$ is same as a potential function $\theta$ of soliton vector field (VF) if $\omega=\omega_{KS}$. Then the local deformation of Kähler metrics near $(M,J_{0},\omega)$ can be parameterized by $\mathcal{U}_{\epsilon}=B(\epsilon)\times C^{\infty}(M)$ (cf. Section 2), where $B(\epsilon)$ denotes a small $\epsilon$-ball in $\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ centered at the origin. Thus the variation space $\mathcal{U}$ of Kähler metrics becomes $\mathcal{U}=\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)\times C^{\infty}(M).$ By computing the second variation of Perelman’s entropy $\lambda(\cdot)$ at $(M,J_{0},\omega_{KS})$ via the parameter space $\mathcal{U}_{\epsilon}$, we are able to get the following product formula of the second variation operator (cf. Proposition 3.9), $\delta^{2}\lambda(\omega_{KS})=H(\psi,\chi)\,=\,H_{1}(\psi)\oplus H_{2}(\chi),~{}\forall~{}(\psi,\chi)\in\mathcal{U},$ where $H_{2}(\chi)$ is always non-positive [40]. However, the sign of operator $H_{1}(\psi)$ is in general not definite according to Pasquier’s example mentioned above. Thus the convergence problem of KR flow for deformed complex structure $J_{\psi_{\tau}}$ associated to $\psi_{\tau}\in B(\epsilon)\subset\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ $(\epsilon<<1)$ via the Kuranishi map will depend on the sign of $H_{1}(\psi_{\tau})$. Recall the (normalized) KR flow on a Fano manifold $(M,J)$, (0.1) $\displaystyle\frac{\partial\widetilde{\omega}(t)}{\partial t}=-{\rm Ric}\,(\widetilde{\omega}(t))+\widetilde{\omega}(t),~{}\widetilde{\omega}_{0}\in 2\pi c_{1}(M,J).$ By establishing an inequality of Lojasiewicz type for the entropy $\lambda(\cdot)$ along the flow (0.1), we will prove ###### Theorem 0.1. Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$ with respect to a holomorphic vector field (HVF) $X$. Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$ with $\psi_{\tau}\in{\rm Ker}(H_{1})=Z$ the KR flow (0.1) converges smoothly to a KR soliton $(M,J_{\infty},\omega_{\infty})$ for any initial metric $\widetilde{\omega}_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover, $X$ can be lifted to become a soliton VF of $(M,J_{\infty},\omega_{\infty})$ and (0.2) $\displaystyle\lambda(\omega_{\infty})=\lambda(\omega_{KS}).$ Also, the convergence is of polynomial rate. We note that $Z=\mathcal{H}^{0,1}(M,T^{1,0}M)$ in case of $\omega_{KS}=\omega_{KE}$ [40]. Thus Theorem 0.1 generalizes the results in [38, 32]. We also note that $\psi_{\tau}\in Z$ if and only if $X$ can be lifted to a HVF on $(M,J_{\psi_{\tau}})$ (cf. Corollary 4.5). Moreover, as in the case of $\omega_{KS}=\omega_{KE}$, the set of complex structures associated to the kernel $Z$ corresponds to the local moduli space of Fano manifolds which are modified $K$-semistable [48]. In particular, we prove the following existence theorem of KR solitons in the deformation space of complex structures. ###### Theorem 0.2. Let $(M,J_{0})$ be a Fano manifold which admits a KR-soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. Then there exists a small $\epsilon$ such that $(M,J_{\psi_{\tau}})$ admits a KR soliton close to $\omega_{KS}\in 2\pi c_{1}(M)$ in the Cheeger-Gromov topology for $\tau\in B(\epsilon)$ if and only if the Fano manifold $(M,J_{\psi_{\tau}})$ is modified $K$-polystable. Theorem 0.2 gives a confirmative answer to the Yau-Tian-Donaldson conjecture for the existence of KR solitons in the deformation space of complex structures (cf. [47, 10, 3], etc.). We also mention that Theorem 0.2 was proved by Inoue for the equivariant deformation space of complex structures by using the deformation theory [19] (also see Corollary 7.3 and Remark 7.4). Inoue’s result is a generalization of Székelyhidi’s for KE metrics [33]. Our theorem gives a more general answer for the existence of KR-solitons and determines the soliton VFs. By Theorem 0.1, we can also prove a uniqueness result for KR-solitons in the closure of the orbit by diffeomorphisms, we refer the reader to Theorem 7.5. Let us say a few of words about how to prove the Lojasiewicz inequality for $\lambda(\cdot)$. In fact, we will first derive such an inequality for the restricted $\nu(\cdot)$ of $\lambda(\cdot)$ on the parameter space $\mathcal{U}_{\epsilon}$ (cf. Proposition 5.1). The advantage of $\nu(\cdot)$ is that its gradient and the second variation $\delta^{2}\nu(\cdot)$ of $\nu(\cdot)$ are both of maps to $\mathcal{U}$ (cf. Definition 3.3, 3.8). In particular, we get an explicit formula for the kernel of $\delta^{2}\nu(\cdot)$ at a KR soliton (cf. (4.9) and Remark 4.6). Then by the spectral theorem [31], we prove the Lojasiewicz inequality for the original $\lambda(\cdot)$ (cf. Lemma 3.6, Corollary 5.4, (6.11)).222 This also answers a question of Chen-Sun [8, Remark 5.5]. We would like to mention that such an inequality for the space of Riemannian metrics along the Ricci flow has been studied by Sun-Wang [32]. Theorem 0.1 will be generalized for Kähler manifolds $(M,J_{\psi_{\tau}})$ with $H_{1}(\psi_{\tau})\leq 0$ as follows. ###### Theorem 0.3. Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. Suppose that 1. (1) $(M,J_{\psi_{\tau}})$ admits a KR soliton for any $\psi_{\tau}\in B(\epsilon)\cap Z$; 2. (2) $H_{1}(\cdot)\leq 0,~{}{\rm on}~{}\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$ Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$ the KR flow (0.1) converges smoothly to a KR soliton $(M,J_{\infty},\omega_{\infty})$ for any initial metric $\widetilde{\omega}_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover, $\displaystyle\lambda(\omega_{\infty})=\lambda(\omega_{KS}),$ and the convergence is of polynomial rate. The condition (1) may not be necessary in view of Theorem 0.1. In fact, we have the following conjecture. ###### Conjecture 0.4. Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. Let $A_{-}$ be the linear subspace of $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ associated to the negative eigenvalues of $H_{1}$. Then there exists a small $\epsilon$ such that the following is true: 1. (1) For any $\tau\in B(\epsilon)$ with $\psi_{\tau}\in A_{-}\cup Z$ the KR flow (0.1) converges smoothly to a KR soliton $(M,J_{\infty},\omega_{\infty})$ for any initial metric $\omega_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Moreover, the convergence is of polynomial rate with $\lambda(\omega_{\infty})=\lambda(\omega_{KS})$. 2. (2) For any $\tau\in B(\epsilon)$ with $\psi_{\tau}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\setminus(A_{-}\cup Z)$, the KR flow (0.1) converges to a singular KR soliton $\omega_{\infty}$ for any initial metric $\omega_{0}$ in $2\pi c_{1}(M,J_{\psi_{\tau}})$ with $\lambda(\omega_{\infty})$ strictly bigger than $\lambda(\omega_{KS})$. The above conjecture means that the set of complex structures, for which the KR flow (0.1) is stable, corresponds to the linear semistable subspace $A_{-}\cup Z$ of $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ in the deformation space of Fano manifolds which admit a KR-soliton. Otherwise, the flow on $(M,J_{\psi_{\tau}})$ is unstable, but will in general converge to a singular KR soliton $\omega_{\infty}$ with $\lambda(\omega_{\infty})$ strictly bigger than $\lambda(\omega_{KS})$ by the Hamilton-Tian conjecture [34, 2, 7, 46]. The organization of the paper is as follows. In Section 1, we introduce the weighted Hodge-Laplace operator $\Box_{h}$ and the $h$-harmonic space of $\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ on a Fano manifold. In Section 2, we study the Kuranishi deformation theory of complex structures associated to $\Box_{h}$ and prove that the solution of modified Kuranishi’s equation is divergent-free (cf. Proposition2.1)). In Section 3, we compute the first and second variations of $\nu(\cdot)$ on $\mathcal{U}_{\epsilon}$. In Section 4, we give a new version of the second variations of $\nu(\cdot)$ and prove the local maximality of $\lambda(\cdot)$ (cf. Theorem 4.4 and Proposition 4.11). Section 5 is devoted to prove the Lojasiewicz inequality (cf. Proposition 5.1). Theorem 0.1 is proved in Section 6 while Both of Theorem 0.2 and Theorem 7.5 are proved in Section 7. In Section 8, we prove Theorem 0.3. ## 1\. Weighted Hodge-Laplace on $A^{p,q}(M,T^{1,0}M)$ In this section, we introduce a weighted Hodge-Laplace operator on the space $A^{p,q+1}(M,T^{1,0}M)$ on a Fano manifold $(M,J_{0})$ with a Kähler form $\omega\in 2\pi c_{1}(M)$. This is very similar with the weighted Laplace operator associated to the Bakry-Émery Ricci curvature studied in [44]. Let $h$ be a Ricci potential of $\omega$, which satisfies that (1.1) $\displaystyle\rm{Ric}(\omega)-\omega=\sqrt{-1}\partial\bar{\partial}h.$ We denote $\delta_{h}=\overline{\partial}_{h}^{*}$ the dual operator of $\overline{\partial}$ with respect to the inner product $\int_{M}<,>e^{h}\omega^{n},$ where $<,>=<,>_{\omega}$ is the inner product on $\Lambda^{p,q}T^{*}M\otimes T^{1,0}M$ induced by $\omega$. Namely, for any $\varphi\in A^{p,q}(M,T^{1,0}M)$, $\varphi^{\prime}\in A^{p,q+1}(M,T^{1,0}M)$, we have $\int_{M}<\bar{\partial}\varphi,\varphi^{\prime}>e^{h}\omega^{n}=\int_{M}<\varphi,\delta_{h}\varphi^{\prime}>e^{h}\omega^{n}.$ Then weighted Hodge-Laplace operator $\Box_{h}$ on $A^{p,q+1}(M,T^{1,0}M)$ is defined by $\Box_{h}=\overline{\partial}\cdot\delta_{h}+\delta_{h}\cdot\overline{\partial}.$ Thus, similarly with the Hodge-Laplace operator, we see that $\Box_{h}\varphi=0$ if only if $\bar{\partial}\varphi=0~{}{\rm and}\ \delta_{h}\varphi=0.$ For simplicity, we denote $\mathcal{H}^{p,q}_{h}(M,T^{1,0}M)=\\{\varphi\in A^{p,q}(M,T^{1,0}M)|~{}\Box_{h}\varphi=0\\}$ the harmonic space of $\Box_{h}$ on $A^{p,q+1}(M,T^{1,0}M)$. In this paper, we are interested in the space $A^{0,1}(M,T^{1,0}M)$. Then under local holomorphic coordinates, for any $\varphi=\varphi^{i}_{\overline{j}}d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}\in A^{0,1}(M,T^{1,0}M),$ we have (1.2) $\displaystyle{}\delta_{h}\varphi=-(\varphi^{i}_{\overline{j},k}+\varphi^{i}_{\overline{j}}h_{k})g^{k\overline{j}}\frac{\partial}{\partial z^{i}}.$ Moreover, (1.3) $\displaystyle\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)\cong H^{1}(M,J,\Theta).$ The latter is the C$\overset{\vee}{e}$ch cohomology group associated to the infinitesimal deformation of complex structures on $(M,J_{0})$ [14]. We define a $h$-divergence operator on $A^{p,q+1}(M,T^{1,0}M)$ by ${\rm div}_{h}\varphi=e^{-h}{\rm div}(e^{h}\varphi).$ In particular, if $\varphi=\varphi^{i}_{\overline{j}}d\bar{z}^{j}\otimes\frac{\partial}{\partial z^{i}}\in A^{0,1}(M,T^{1,0}M),$ then (1.4) $\displaystyle{}{\rm div}_{h}\varphi=(\varphi^{i}_{\overline{j},i}+\varphi^{i}_{\overline{j}}h_{i})d\bar{z}^{j}.$ Also we introduce an inner product $\varphi\lrcorner\mu$ with respect to $\mu=\sqrt{-1}\mu_{k\bar{l}}dz^{k}\wedge d\bar{z}^{l}\in A^{1,1}(M)$ by $\varphi\lrcorner\mu=\sqrt{-1}\varphi^{k}_{\overline{j}}\mu_{k\overline{l}}d\bar{z}^{j}\wedge d\bar{z}^{l}\in A^{0,2}(M).$ We list some identities for the above two operators in the following lemma. ###### Lemma 1.1. 1. (1) $\overline{\partial}(\varphi\lrcorner\mu)=\overline{\partial}\varphi\lrcorner\mu+\varphi\lrcorner\overline{\partial}\mu.$ 2. (2) $\delta_{h}({\rm div}_{h}\varphi)={\rm div}_{h}(\delta_{h}\varphi).$ 3. (3) $\delta_{h}(\varphi\lrcorner\omega)=-\delta_{h}\varphi\lrcorner\omega-\sqrt{-1}{\rm div}_{h}\varphi.$ 4. (4) $\overline{\partial}{\rm div}_{h}\varphi-{\rm div}_{h}(\overline{\partial}\varphi)=-\sqrt{-1}\varphi\lrcorner\omega.$ 5. (5) ${\rm div}_{h}[\varphi,\psi]=\psi\lrcorner\partial{\rm div}_{h}\varphi+\varphi\lrcorner\partial{\rm div}_{h}\psi.$ 6. (6) $[\varphi,\psi]\lrcorner\omega=\varphi\lrcorner\partial(\psi\lrcorner\omega)+\psi\lrcorner\partial(\varphi\lrcorner\omega).$ ###### Proof. All identities can be verified directly. $(1)$ is simple. For $(2)$, we note that $\delta_{h}({\rm div}_{h}\varphi)=-(\varphi^{i}_{\overline{j},is}+\varphi^{i}_{\overline{j}s}h_{i}+\varphi^{i}_{\overline{j}}h_{is}+(\varphi^{i}_{\overline{j},i}+\varphi^{i}_{\overline{j}}h_{i})h_{s})g^{s\overline{j}}$ and ${\rm div}_{h}(\delta_{h}\varphi)=-(\varphi^{i}_{\overline{j},si}+\varphi^{i}_{\overline{j}i}h_{s}+\varphi^{i}_{\overline{j}}h_{si}+(\varphi^{i}_{\overline{j},s}+\varphi^{i}_{\overline{j}}h_{s})h_{i})g^{s\overline{j}}.$ Thus $(2)$ is true. Since $\varphi\lrcorner\omega=\sqrt{-1}\varphi^{p}_{\overline{k}}g_{p\overline{j}}d\overline{z}^{k}\wedge d\overline{z}^{j}$, we have $\displaystyle\delta_{h}(\varphi\lrcorner\omega)$ $\displaystyle=-\sqrt{-1}(\varphi^{p}_{\overline{k},s}g_{p\overline{j}}+\varphi^{p}_{\overline{k}}g_{p\overline{j}}h_{s})g^{s\overline{j}}d\overline{z}^{k}+\sqrt{-1}(\varphi^{p}_{\overline{k},s}g_{p\overline{j}}+\varphi^{p}_{\overline{k}}g_{p\overline{j}}h_{s})g^{s\overline{k}}d\overline{z}^{j}$ $\displaystyle=-\sqrt{-1}(\varphi^{s}_{\overline{k},s}+\varphi^{s}_{\overline{k}}h_{s})d\overline{z}^{k}-\sqrt{-1}(\delta_{h}\varphi)^{p}g_{p\overline{j}}d\overline{z}^{j}$ $\displaystyle=-\sqrt{-1}{\rm div}_{h}\varphi-(\delta_{h}\varphi\lrcorner\omega).$ This is $(3)$. In order to prove $(4)$, we choose a normal coordinate $(z^{1},\ldots,z^{n})$ around each $p\in M$. By (1.4), we have $\overline{\partial}{\rm div}_{h}\varphi=(\varphi^{s}_{\overline{k},s\overline{l}}+\varphi^{s}_{\overline{k},\overline{l}}h_{s}+\varphi^{s}_{\overline{k}}h_{s\overline{l}})d\overline{z}^{l}\wedge d\overline{z}^{k}.$ Since $\overline{\partial}\varphi=(\varphi^{s}_{\overline{k},\overline{l}}+\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}})d\overline{z}^{l}\wedge d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{s}},$ we see that at $p$, ${\rm div}_{h}\overline{\partial}\varphi=(\varphi^{s}_{\overline{k},\overline{l}s}+\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}}+\varphi^{s}_{\overline{k},\overline{l}}h_{s})d\overline{z}^{l}\wedge d\overline{z}^{k}.$ Thus we get (1.5) $\displaystyle\overline{\partial}{\rm div}_{h}\varphi-{\rm div}_{h}(\overline{\partial}\varphi)=(\varphi^{s}_{\overline{k},s\overline{l}}-\varphi^{s}_{\overline{k},\overline{l}s}+\varphi^{s}_{\overline{k}}h_{s\overline{l}}-\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}})d\overline{z}^{l}\wedge d\overline{z}^{k}.$ On the other hand, $\displaystyle\varphi^{s}_{\overline{k},s\overline{l}}-\varphi^{s}_{\overline{k},\overline{l}s}$ $\displaystyle=-R_{h\overline{t}s\overline{l}}g^{s\overline{t}}\varphi^{h}_{\overline{k}}-R_{t\overline{k}s\overline{l}}g^{t\overline{h}}\varphi^{s}_{\overline{h}}$ $\displaystyle=-R_{h\overline{l}}\varphi^{h}_{\overline{k}}+\partial_{s}\Gamma^{\overline{h}}_{\overline{k}\overline{l}}\varphi^{s}_{\overline{h}}.$ By (1.5) it follows that $\overline{\partial}{\rm div}_{h}\varphi-{\rm div}_{h}(\overline{\partial}\varphi)=(-R_{s\overline{l}}+h_{s\overline{l}})\varphi^{s}_{\overline{k}}d\overline{z}^{l}\wedge d\overline{z}^{k}.$ We note that $(-R_{s\overline{l}}+h_{s\overline{l}})\varphi^{s}_{\overline{k}}d\overline{z}^{l}\wedge d\overline{z}^{k}=\varphi\lrcorner\frac{{\rm Ric}(\omega)-\sqrt{-1}\partial\overline{\partial}h}{\sqrt{-1}}.$ Together with the assumption ${\rm{Ric}}(\omega)-\omega=\sqrt{-1}\partial\bar{\partial}h$, we conclude that $\overline{\partial}{\rm div}_{h}\varphi-{\rm div}_{h}(\overline{\partial}\varphi)=\varphi\lrcorner\frac{{\rm Ric}(\omega)-\sqrt{-1}\partial\overline{\partial}h}{\sqrt{-1}}=-\sqrt{-1}\varphi\lrcorner\omega,$ which proves $(4)$. For $(5)$, we recall that for any $\varphi=\varphi^{l}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}}$ and $\psi=\psi^{j}_{\overline{i}}d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$ it holds $\displaystyle[\varphi,\psi]$ $\displaystyle=\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}+\psi^{j}_{\overline{i}}\frac{\partial\varphi^{l}_{\overline{k}}}{\partial z^{j}}d\overline{z}^{i}\wedge d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}}$ $\displaystyle=\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}-\psi^{l}_{\overline{i}}\frac{\partial\varphi^{j}_{\overline{k}}}{\partial z^{l}}d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$ $\displaystyle=(\varphi^{l}_{\overline{k}}\frac{\partial\psi^{j}_{\overline{i}}}{\partial z^{l}}-\psi^{l}_{\overline{i}}\frac{\partial\varphi^{j}_{\overline{k}}}{\partial z^{l}})d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$ $\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}-(\varphi^{l}_{\overline{k}}\Gamma^{j}_{lh}\psi^{h}_{\overline{i}}-\psi^{l}_{\overline{i}}\Gamma^{j}_{hl}\varphi^{h}_{\overline{k}}))d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}$ $\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}.$ Then, $\displaystyle{\rm div}[\varphi,\psi]$ $\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l})_{j}d\overline{z}^{k}\wedge d\overline{z}^{i}-(\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})_{j}d\overline{z}^{k}\wedge d\overline{z}^{i}$ $\displaystyle=(\varphi^{l}_{\overline{k},j}\psi^{j}_{\overline{i},l}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i},j}\varphi^{j}_{\overline{k},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge d\overline{z}^{i}$ $\displaystyle=(\varphi^{j}_{\overline{k},l}\psi^{l}_{\overline{i},j}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i},j}\varphi^{j}_{\overline{k},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge d\overline{z}^{i}$ $\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj})d\overline{z}^{k}\wedge d\overline{z}^{i}.$ Hence by (1.4), we get (1.6) $\displaystyle{\rm div}_{h}[\varphi,\psi]$ $\displaystyle=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},lj}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj}+\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}h_{j}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}h_{j})d\overline{z}^{k}\wedge d\overline{z}^{i}.$ On the other hand, by (1.4) we also have $\partial{\rm div}_{h}\varphi=(\varphi^{l}_{\overline{k},lj}+\varphi^{l}_{\overline{k},j}h_{l}+\varphi^{l}_{\overline{k}}h_{lj})dz^{j}\wedge d\overline{z}^{k}.$ It follows that (1.7) $\displaystyle\psi\lrcorner\partial{\rm div}_{h}\varphi=(\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},lj}+\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}h_{j}+\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k}}h_{jl})d\overline{z}^{i}\wedge d\overline{z}^{k}.$ Similarly we have (1.8) $\displaystyle\varphi\lrcorner\partial{\rm div}_{h}\psi=(\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k},lj}+\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k},l}h_{j}+\varphi^{l}_{\overline{i}}\psi^{j}_{\overline{k}}h_{jl})d\overline{z}^{i}\wedge d\overline{z}^{k}.$ We note that $h_{ij}=h_{ji}$. Hence, combing the above (1.6)-(1.8) we will derive $(5)$ immediately. Finally we prove $(6)$. From the proof of $(5)$ we see that $[\varphi,\psi]=(\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}-\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l})d\overline{z}^{k}\wedge d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}.$ Thus we have (1.9) $\displaystyle[\varphi,\psi]\lrcorner\omega=\sqrt{-1}\varphi^{l}_{\overline{k}}\psi^{j}_{\overline{i},l}g_{j\overline{t}}d\overline{z}^{k}\wedge d\overline{z}^{i}\wedge d\overline{z}^{t}-\sqrt{-1}\psi^{l}_{\overline{i}}\varphi^{j}_{\overline{k},l}g_{j\overline{t}}d\overline{z}^{k}\wedge d\overline{z}^{i}\wedge d\overline{z}^{t}.$ On the other hand, we have $\displaystyle\partial(\psi\lrcorner\omega)=\sqrt{-1}\psi_{\overline{i},t}^{j}g_{j\overline{k}}dz^{t}\wedge d\overline{z}^{i}\wedge d\overline{z}^{k}.$ It follows that (1.10) $\displaystyle\varphi\lrcorner\partial(\psi\lrcorner\omega)=\sqrt{-1}\varphi^{l}_{\overline{k}}\psi_{\overline{i},l}^{j}g_{j\overline{t}}d\overline{z}^{i}\wedge d\overline{z}^{t}\wedge d\overline{z}^{k}.$ Similarly we have (1.11) $\displaystyle\psi\lrcorner\partial(\varphi\lrcorner\omega)=\sqrt{-1}\psi^{l}_{\overline{i}}\varphi_{\overline{k},l}^{j}g_{j\overline{t}}d\overline{z}^{k}\wedge d\overline{z}^{t}\wedge d\overline{z}^{i}.$ Hence, combining the above (1.9)-(1.11) we get $(6)$. ∎ ###### Lemma 1.2. Suppose that $\delta_{h}\varphi=0~{}{\rm and}~{}\overline{\partial}(\varphi\lrcorner\omega)=0.$ Then (1.12) $\displaystyle\Box_{h}(\varphi\lrcorner\omega)=-\sqrt{-1}({\rm div}_{h}\overline{\partial}\varphi)-\varphi\lrcorner\omega.$ ###### Proof. Using the assumption $\overline{\partial}(\varphi\lrcorner\omega)=0$, we have $\displaystyle\Box_{h}(\varphi\lrcorner\omega)$ $\displaystyle=\overline{\partial}\delta_{h}(\varphi\lrcorner\omega)+\delta_{h}\overline{\partial}(\varphi\lrcorner\omega)$ $\displaystyle=\overline{\partial}\delta_{h}(\varphi\lrcorner\omega).$ Then by Lemma 1.1-$(3)$ and the assumption $\delta_{h}\varphi=0$, we get $\displaystyle\Box_{h}(\varphi\lrcorner\omega)$ $\displaystyle=\overline{\partial}(-\delta_{h}\varphi\lrcorner\omega-\sqrt{-1}{\rm div}_{h}\varphi)$ $\displaystyle=\overline{\partial}(-\sqrt{-1}{\rm div}_{h}\varphi).$ Hence, by Lemma 1.1-$(4)$, we obtain (1.12). ∎ ###### Corollary 1.3. Let $\varphi\in\mathcal{H}^{0,1}_{h}(M,T^{1,0}M).$ Then $\Box_{h}(\varphi\lrcorner\omega)=-\varphi\lrcorner\omega.$ As a consequence, (1.13) $\displaystyle\varphi\lrcorner\omega=0.$ ###### Proof. Note that $\overline{\partial}\varphi=0$. Then by Lemma 1.1-$(1)$ we have $\overline{\partial}(\varphi\lrcorner\omega)=0$. On the other hand, since $\delta_{h}\varphi=0$, by Lemma 1.2 together with $\overline{\partial}\varphi=0$, we see that $\displaystyle\Box_{h}(\varphi\lrcorner\omega)$ $\displaystyle=-\sqrt{-1}{\rm div}_{h}(\overline{\partial}\varphi)-\varphi\lrcorner\omega$ $\displaystyle=-\varphi\lrcorner\omega.$ Thus $\displaystyle 0\leq(\varphi\lrcorner\omega,\varphi\lrcorner\omega)_{h}$ $\displaystyle=-(\Box_{h}(\varphi\lrcorner\omega),\varphi\lrcorner\omega)_{h}$ $\displaystyle=-(\delta_{h}(\varphi\lrcorner\omega),\delta_{h}(\varphi\lrcorner\omega))_{h}-(\overline{\partial}(\varphi\lrcorner\omega),\overline{\partial}(\varphi\lrcorner\omega))_{h}$ $\displaystyle\leq 0.$ It follows that $(\varphi\lrcorner\omega,\varphi\lrcorner\omega)_{h}=0,$ which implies (1.13). ∎ ## 2\. Kuranishi deformation theory for $\Box_{h}$-operator We choose a basis $\\{e_{i}\\}_{i=1,...,l}$ of $\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ and denote an $\epsilon$-ball by $B(\epsilon)=\\{\tau=(\tau_{1},...,\tau_{l})|~{}\psi_{\tau}=\sum\tau_{i}e_{i}\in\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)~{}{\rm with}~{}\sum_{i}\tau_{i}^{2}<\epsilon^{2}\\}.$ Then by the Kodaira deformation theory for complex structures on $(M,J_{0})$, there is a map $\Psi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$ as long as $\epsilon$ is small enough such that $\Psi(t)$ is a solution of Cartan-Maurer equation, (2.1) $\displaystyle\overline{\partial}\Psi(\tau)=\frac{1}{2}[\Psi(\tau),\Psi(\tau)].$ More precisely, analogous to the Kodaira theory [14], we can reduce (2.1) to solving the following equation with gauge fixed, (2.4) $\displaystyle\left\\{\begin{array}[]{ll}\delta_{h}\varphi(\tau)=0\\\ \overline{\partial}\varphi(\tau)=\frac{1}{2}[\varphi(\tau),\varphi(\tau)].\\\ \end{array}\right.$ The above equation is equivalent to (2.5) $\displaystyle\varphi(\tau)=\sum^{m}_{i=1}\tau_{i}e_{i}+\frac{1}{2}\delta_{h}G_{h}[\varphi(\tau),\varphi(\tau)],$ where $G_{h}$ the Green operator associated to $\Box_{h}$. Following the Kuranshi’s method by the implicity function theorem [13], there is a unique solution of (2.5) as long as $\sum|\tau_{i}|^{2}<\epsilon^{2}$. Thus there is a map (2.6) $\displaystyle\Phi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$ such that $\Phi(\tau)=\varphi(\tau)=\varphi_{\tau}$. For simplicity, we call $\Phi$ the Kuranishi map associated to $\Box_{h}$-operator. On the other hand, according to [14], we may write $\varphi(\tau)$ as a convergent expansion to solve (2.1), (2.7) $\displaystyle\varphi(\tau)=\sum\tau_{i}e_{i}+\sum_{|I|\leq 2}\tau^{I}\varphi_{I}.$ By (2.7), we prove ###### Proposition 2.1. Let $\varphi(\tau)$ be a Kuranishi solution of (2.5) as the form of (2.7). Then (2.8) $\displaystyle\varphi(\tau)\lrcorner\omega=0~{}{\rm and}~{}{\rm div}_{h}\varphi(\tau)=0.$ ###### Proof. Let (2.9) $\displaystyle\psi_{k}=\sum_{|I|\leq k}\tau^{I}\varphi_{I},k=1,2,\ldots.$ Then $\delta_{h}\psi_{k}=0,~{}{\rm for~{}each}~{}k\geq 1.$ We need to prove (2.8) for each $\psi_{k}$ by induction. Since $\delta_{h}\psi_{1}=0,\overline{\partial}\psi_{1}=0,$ by Corollary 1.3, we have $\psi_{1}\lrcorner\omega=0.$ By Lemma 1.1-$(3)$, it follows that (2.10) $\displaystyle{\rm div}_{h}\psi_{1}=0.$ Thus we may assume that (2.11) $\displaystyle\psi_{k}\lrcorner\omega=0~{}{\rm and}~{}{\rm div}_{h}\psi_{k}=0,~{}{\rm for~{}any}~{}k<l.$ By (2.4), we see that (2.12) $\displaystyle\overline{\partial}\psi_{l}=\frac{1}{2}\sum_{k=1}^{l-1}[\varphi_{k},\varphi_{l-k}],\delta_{h}\psi_{l}=0.$ Then by Lemma 1.1-(6) together with the first relation in (2.11), we get $\overline{\partial}\psi_{l}\lrcorner\omega=0.$ By Lemma 1.1-(1), it follows that (2.13) $\displaystyle\overline{\partial}(\psi_{l}\lrcorner\omega)=0.$ Thus by Lemma 1.2 together with the second relation in (2.12), we derive (2.14) $\displaystyle\Box_{h}(\psi_{l}\lrcorner\omega)=-\sqrt{-1}{\rm div}_{h}\overline{\partial}\psi_{l}-\psi_{l}\lrcorner\omega.$ On the other hand, $\displaystyle{\rm div}_{h}\overline{\partial}\psi_{l}$ $\displaystyle={\rm div}_{h}(\frac{1}{2}\sum_{k=1}^{l-1}[\varphi_{k},\varphi_{l-k}])$ $\displaystyle=\frac{1}{2}\sum_{k=1}^{l-1}{\rm div}_{h}[\varphi_{k},\varphi_{l-k}].$ By Lemma 1.1-(5), we have ${\rm div}_{h}\overline{\partial}\psi_{l}=0.$ Thus by (2.14), we get $\Box_{h}(\psi_{l}\lrcorner\omega)=-\psi_{l}\lrcorner\omega.$ Hence, as in the proof of (1.13), we obtain (2.15) $\displaystyle\psi_{l}\lrcorner\omega=0.$ This proves the first relation of (2.11) for $k=l$. By Lemma 1.1-(3), we also have $\delta_{h}(\psi_{l}\lrcorner\omega)=-\delta_{h}\psi_{l}\lrcorner\omega-\sqrt{-1}{\rm div}_{h}\psi_{l}.$ Thus (2.15) implies the second relation of (2.11) for $k=l$. The proposition is proved. ∎ By (2.8), for $v,w\in T^{0,1}M$ we have $\omega(v+\varphi_{\tau}(v),w+\varphi_{\tau}(w))=0.$ Since $T^{0,1}_{\varphi_{\tau}}=(id+\varphi_{\tau})(T^{0,1}M)$ and $\omega$ is real, $\omega$ is still a $(1,1)$-form with respect to the complex structure $J_{\psi_{\tau}}$ defined by $\varphi_{\tau}$. Namely, $\varphi_{\tau}$ is compatible with the Kähler form $\omega$. As a consequence, $(\omega,J_{\psi_{\tau}})$ defines a family of Kähler metrics by (2.16) $\displaystyle g_{\tau}={\omega}(\cdot,J_{\psi_{\tau}}\cdot).$ Hence, we get ###### Corollary 2.2. For any $\tau\in B(\epsilon)$, $g_{\tau}$ defined in (2.16) is a family of Kähler metrics with the same Kähler form $\omega$. The following proposition gives a relationship between the first and second relations in (2.8), which means that the Kuranishi equation is equivalent to the Cartan-Maurer equation with the divergence free gauge. ###### Proposition 2.3. Suppose that $\varphi\in A^{0,1}(M,T^{1,0}M)$ satisfies $\overline{\partial}\varphi=\frac{1}{2}[\varphi,\varphi]~{}{\rm with}~{}{\rm div}_{h}\varphi=0.$ Then $\displaystyle\varphi\lrcorner\omega=0~{}{\rm and}~{}\delta_{h}\varphi=0.$ ###### Proof. By Lemma 1.1-$(5)$ and the assumption that ${\rm div}_{h}\varphi=0$, we have $\displaystyle{\rm div}_{h}(\overline{\partial}\varphi)$ $\displaystyle=\frac{1}{2}{\rm div}_{h}[\varphi,\varphi]$ $\displaystyle=\varphi\lrcorner\partial{\rm div}_{h}\varphi$ $\displaystyle=0.$ By Lemma 1.1-$(4)$ together with the assumption ${\rm div}_{h}\varphi=0$, it follows that (2.17) $\displaystyle\varphi\lrcorner\omega=0.$ On the other hand, by Lemma 1.1-$(3)$ and (2.17), we see that $\delta_{h}\varphi\lrcorner\omega=0,$ which means that $\delta_{h}\varphi=0$. The proposition is proved. ∎ ## 3\. Restricted entropy $\nu(\cdot)$ and its variations From this section, we will always assume that $(M,J_{0})$ is a Fano Kähler manifold which admits a KR soliton $(\omega_{KS},X)$. Here the soliton VF $X$ can be regarded as an element in the center of Lie algebra $\eta_{r}(M,J_{0})$ of a maximal reductive subgroup ${\rm Aut}_{r}(M,J_{0})$ of ${\rm Aut}(M,J_{0})$ [35]. Namely $(\omega_{KS},X)$ satisfies the soliton equation, $\rm{Ric}(\omega_{KS})-\omega_{KS}=\mathcal{L}_{X}\omega_{KS},$ where $\mathcal{L}_{X}\omega_{KS}$ is the Lie derivative of $\omega_{KS}$ along $X$. Then there is a real smooth function $\theta=\theta_{X}(\omega_{KS})$ which satisfies (3.1) $\displaystyle i_{X}\omega_{KS}=\sqrt{-1}\overline{\partial}\theta,~{}\int_{M}e^{\theta}\omega_{KS}^{n}=\int_{M}\omega_{KS}^{n}.$ Thus by Corollary 2.2, there is a small ball $B(\epsilon)=\\{\tau|~{}\psi_{\tau}=\sum\tau_{i}e_{i}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M),\sum_{i}\tau_{i}^{2}<\epsilon^{2}\\},$ such that the Kuranishi map: $\Phi:B(\epsilon)\mapsto A^{0,1}(M,T^{1,0}M)$ induces a family of Kähler metrics $g_{\tau}$ with the same Kähler form $\omega_{KS}$. As a consequence, any Kähler metric $g$ in $2\pi c_{1}(M)$ with small perturbed integral complex structure of $J_{0}$ can be parameterized by the following map: $L:~{}B(\epsilon)\times C^{\infty}(M)\mapsto{\rm Sym}^{2}(T^{*}M)$ with $g_{\tau,\chi}(\cdot,\cdot)=L(\psi,\chi)(\cdot,\cdot)$ satisfying (3.2) $\displaystyle g_{\tau,\chi}=(\omega_{KS}+\sqrt{-1}\partial_{J_{\psi_{\tau}}}\overline{\partial}_{J_{\psi_{\tau}}}\chi)(\cdot,J_{\psi_{\tau}}\cdot).$ The purpose of this section is to compute the variation of Perelman’s entropy $\lambda(\cdot)$ for Kähler metrics $g_{\tau,\chi}$. Recall that the Perelman’s W-functional for Kähler metrics $g$ in $2\pi c_{1}(M)$ is defined for a pair $(g,f)$ by (cf. [40]), (3.3) $\displaystyle W(g,f)=(2\pi)^{-n}\int_{M}[R(g)+|\nabla f|^{2}+f]e^{-f}\omega_{g}^{n},$ where $f$ is a real smooth function normalized by (3.4) $\displaystyle\int_{M}e^{-f}\omega_{g}^{n}=\int_{M}\omega_{g}^{n}.$ Then $\lambda(g)$ is defined by $\lambda(g)=\inf_{f}\\{~{}W(g,f)|~{}\text{$(g,f)$ satisfies (\ref{nor})}\ \\}.$ The number $\lambda(g)$ can be attained by some $f$ (cf. [30]). In fact, such a $f$ is a solution of the equation, (3.5) $\displaystyle 2\triangle f+f-|Df|^{2}+R=\lambda(g).$ In particular, $f=\theta$ if $\omega_{g}=\omega_{KS}$, so the minimizer of $W(g,\cdot)$ is unique near a KR soliton [38, 32]. Thus by the relation (3.2), we get the restricted entropy $\nu(\cdot)$ of $\lambda(g)$ on $\mathcal{U}_{\epsilon}=B(\epsilon)\times C^{\infty}(M)$ by $\nu(\psi,\chi)=\lambda(L(\psi,\chi)),$ which is a smooth functional near $\omega_{KS}$. In fact, $\nu(\cdot)$ is analytic (cf. [32]). ### 3.1. Variation of Kähler metrics We calculate the variation of Kähler metrics $g_{\tau,\chi}$ at $g=g_{0,0}$ with its Kähler form $\omega=\sqrt{-1}g_{i\bar{j}}dz^{i}\wedge d\bar{z}^{j}.$ Let $\varphi\in A^{0,1}(M,T^{1,0}M)$ with the almost complex structure $J_{\varphi}$ associated with $\varphi$. Under local coordinates $(z^{1},\ldots z^{n})$ on $(M,J_{0})$, $\varphi$ is written as a Beltrami differential by $\varphi=\varphi_{\overline{i}}^{j}d\overline{z}^{i}\otimes\frac{\partial}{\partial z^{j}}.$ Decompose $T_{\mathbb{C}}M$ with respect to $J_{\varphi}$ by $T_{\mathbb{C}}M=T^{1,0}_{J_{\varphi}}M\oplus T_{J_{\varphi}}^{0,1}M.$ Then $T_{J_{\varphi}}^{0,1}M=(id+\varphi)T^{0,1}M,$ where $\varphi$ is viewed as a map from $T^{1,0}M\mapsto T^{1,0}M$. Let $\left\\{\begin{array}[]{ll}J_{\varphi}\frac{\partial}{\partial z^{i}}=J^{j}_{i}\frac{\partial}{\partial z^{j}}+J^{\overline{j}}_{i}\frac{\partial}{\partial\overline{z}^{j}}\\\ J_{\varphi}\frac{\partial}{\partial\overline{z}^{i}}=J^{j}_{\overline{i}}\frac{\partial}{\partial z^{j}}+J^{\overline{j}}_{\overline{i}}\frac{\partial}{\partial\overline{z}^{j}}.\\\ \end{array}\right.$ Since $J_{\varphi}$ is real, $\overline{J^{j}_{i}}=J^{\overline{j}}_{\overline{i}},\overline{J^{\overline{j}}_{i}}=J^{j}_{\overline{i}}.$ Thus for a family of $\varphi=\varphi(\tau)\in A^{0,1}(T^{1,0}M)$ with $\phi(0)=0$, we get the derivative of almost complex structure $J_{\varphi}$ as follows, $\displaystyle\frac{dJ^{j}_{\overline{i}}}{d\tau}|_{\tau=0}$ $\displaystyle=-2\sqrt{-1}\frac{d\varphi^{j}_{\overline{i}}}{d\tau},$ $\displaystyle\frac{dJ^{\overline{j}}_{\overline{i}}}{ds}|_{\tau=0}$ $\displaystyle=0.$ By Corollary 2.2, $g_{\tau}$ given in (2.16) is a family of Kähler metrics with the fixed Kähler form ${\omega}$. Locally, as a Riemannian tensor, $g_{\tau}$ is of form, $\displaystyle g_{\tau}=2{\rm Re}(-\sqrt{-1}{g_{k\overline{i}}}J^{k}_{\overline{j}}d\overline{z}^{i}\otimes d\overline{z}^{j}-\sqrt{-1}{g_{k\overline{i}}}J^{k}_{j}d\overline{z}^{i}\otimes dz^{j}).$ Then the derivative of $L$ at $(0,0)$ is given by $\eta=DL_{(0,0)}(\psi,0)=-4{\rm Re}(g_{k\overline{i}}\psi^{k}_{\overline{j}}d\overline{z}^{i}\otimes d\overline{z}^{j})$ and $DL_{(0,0)}(0,\chi)=2{\rm Re}(\chi_{j\overline{i}}d\overline{z}^{i}\otimes dz^{j}),$ where $\psi\in\mathcal{H}_{h}^{0,1}(M,T^{1,0}M)$ and $\chi\in C^{\infty}(M).$ Clearly, $\eta$ is anti-hermitian symmetric and $DL_{(0,0)}(0,\chi)$ is hermitian symmetric. We define the divergence for a $(0,2)$-type tensor $\eta$ by ${\rm div}_{h}\eta=e^{-h}{\rm div}(e^{h}\eta)=2{\rm Re}[\eta_{\overline{i}\overline{j},k}+\eta_{\overline{i}\overline{j}}h_{k})g^{k\overline{j}}d\bar{z}^{i}].$ The following lemma shows that the tensor $\eta$ is also divergence-free as $\psi$. ###### Lemma 3.1. (3.6) $\displaystyle{\rm div}_{h}\eta=0~{}{\rm and}~{}\eta_{\overline{i}\overline{j},\overline{k}}=\eta_{\overline{i}\overline{k},\overline{j}}.$ ###### Proof. By (1.4) we have $\displaystyle({\rm div}_{h}\eta)_{\overline{i}}$ $\displaystyle=(\eta_{\overline{i}\overline{j},k}+\eta_{\overline{i}\overline{j}}h_{k})g^{k\overline{j}}$ $\displaystyle=-4(g_{l\overline{i}}(\psi^{l}_{\overline{j},k}+\psi^{l}_{\overline{j}}h_{k})g^{k\overline{j}}$ $\displaystyle=-4g_{l\overline{i}}({\rm div}_{h}\psi)^{l}$ $\displaystyle=0.$ The last equality comes from (2.8). Thus ${\rm div}_{h}\eta=0.$ On the other hand, since $\overline{\partial}\varphi=0$, we have $\displaystyle\eta_{\overline{i}\overline{j},\overline{k}}$ $\displaystyle=-4g_{l\overline{i}}\psi^{l}_{\overline{j},\overline{k}}$ $\displaystyle=-4g_{l\overline{i}}\psi^{l}_{\overline{k},\overline{j}}$ $\displaystyle=\eta_{\overline{i}\overline{k},\overline{j}}.$ The lemma is proved. ∎ ###### Remark 3.2. When $(M,\omega,J_{0})$ is a KE manifold, (3.6) in Lemma 3.1 was verified by Koiso [15]. By using the $h$-harmonic space in (1.3), we can generalize Koiso’s result for any Fano manifold. The lemma will be used in the computation of the second variation of $\nu$ below. ### 3.2. The first variation of $\nu(\cdot)$ As in [40], we have the first variation of $\lambda$ at $(M,\omega,J_{0})$ as a Riemannian manifold, (3.7) $\displaystyle\delta\lambda=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),\delta g>e^{-f}\omega^{n}.$ Then (3.8) $\displaystyle\mathcal{N}(g)={\rm Ric}(g)-g+{\rm Hess}_{g}(f)$ can be regarded as the derivative of $\lambda$ which is a map from the space of $2$-symmetric tensors to itself. But for the restricted entropy $\nu(\cdot)$, we shall define its derivative from the product space $\mathcal{U}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times C^{\infty}(M)$ to itself in the following. Recall $f_{\psi,\chi}$ be the minimizer of $W$-functional at $g_{\tau,\chi}$ in (3.5). We introduce a map ${\mathbf{R}}:\mathcal{U}\to C^{\infty}(M)$ by $\displaystyle{\mathbf{R}}(\psi,\chi)$ $\displaystyle=\frac{1}{2}\sqrt{-1}(\bar{\partial}_{J_{\psi}})^{*}_{-f_{\psi,\chi}}\cdot(\partial_{J_{\psi}})^{*}_{-f_{\psi,\chi}}\cdot({\rm Ric}(\omega_{\tau,\chi})-\omega_{\tau,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi})e^{-f_{\psi,\chi}-\theta}\frac{\omega_{\tau,\chi}^{n}}{\omega^{n}},$ where $(\overline{\partial}_{J_{\psi}})^{*}_{-f_{\psi,\chi}}$ and $(\partial_{J_{\psi}})^{*}_{-f_{\psi,\chi}}$ are the dual operators of $\overline{\partial}_{J_{\psi}}$ and $\partial_{J_{\psi}}$, respectively as same as $\delta_{h}$ in Section 1 with respect to the following inner product, (3.9) $\displaystyle(\chi_{1},\chi_{2})=\int_{M}\chi_{1}\chi_{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n},~{}~{}\chi_{1},\chi_{2}\in L^{2}(M,e^{-f_{\psi,\chi}}).$ Choose an unitary orthogonal basis $\\{e_{1},\ldots,e_{l}\\}$ of $\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)$ with respect to the inner product $(a,b)_{\theta}=\int_{M}<a,b>_{\omega_{KS}}e^{\theta}\omega_{KS}^{n},~{}\forall~{}a,b\in\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M).$ We define another map ${\mathbf{Q}}:\mathcal{U}\to\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)$ by ${\mathbf{Q}}(\psi,\chi)=\sum_{i=1}^{l}(a_{i}(\psi,\chi)+\sqrt{-1}b_{i}(\psi,\chi))e_{i},$ where $\displaystyle a_{i}(\psi,\chi)$ $\displaystyle=-\frac{1}{2}\int_{M}({\rm Ric}(g_{\tau,\chi})-g_{\tau,\chi}+{\rm Hess}_{g_{\tau,\chi}}(f_{\psi,\chi}),DL_{\psi,\chi}(e_{i},0))e^{-f_{\psi,\chi}}\omega^{n}_{\tau,\chi}$ and $\displaystyle b_{i}(\psi,\chi)$ $\displaystyle=-\frac{1}{2}\int_{M}({\rm Ric}(g_{\tau,\chi})-g_{\tau,\chi}+{\rm Hess}_{g_{\tau,\chi}}(f_{\psi,\chi}),DL_{\psi,\chi}(\sqrt{-1}e_{i},0))e^{-f_{\psi,\chi}}\omega^{n}_{\tau,\chi}.$ ###### Definition 3.3. We call the pair $({\mathbf{Q}},{\mathbf{R}})$ the gradient map $\nabla\nu$ of $\nu$ on $\mathcal{U}_{\epsilon}$ with the inner product (3.10) $\displaystyle(\nabla\nu,(\psi,\chi))_{\theta}=(\mathbf{Q},\psi)_{\theta}+\int_{M}\mathbf{R}\chi e^{\theta}\omega_{KS}^{n},$ where $(\psi,\chi)\in\mathcal{U}.$ It is easy to verify that $\nabla\nu=({\mathbf{Q}},{\mathbf{R}})$ is real analytic on $\mathcal{U}_{\epsilon}$. The following lemma gives the first variation $\nu$ by $\nabla\nu$. ###### Lemma 3.4. Let $(\psi_{0},\chi_{0})\in\mathcal{U}_{\epsilon}$ and $(\psi,\chi)\in\mathcal{H}_{\theta}^{0,1}(M,T^{1,0}M)\times C^{\infty}(M)$. Then (3.11) $\displaystyle\frac{d}{ds}|_{s=0}\nu((\psi_{0},\chi_{0})+s(\psi,\chi))=(\nabla\nu(\psi_{0},\chi_{0}),(\psi,\chi))_{\theta}.$ ###### Proof. For convenience, we let $g=L(\psi_{0},\chi_{0})$ and $f=f_{g}$ be the minimizer of $W$ functional at $g$. By (3.7), we have $\displaystyle\frac{d\nu((\psi_{0},\chi_{0})+s(\psi,\chi))}{ds}|_{s=0}$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,0)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$ $\displaystyle-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(0,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$ It is easy to see that $\displaystyle I$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,0)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$ $\displaystyle=(\mathbf{Q}(\psi_{0},\chi_{0}),\psi)_{\theta}$ and $\displaystyle II$ $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(0,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$ $\displaystyle=\frac{d\lambda((\psi_{0},\chi_{0})+s(0,\chi))}{ds}|_{s=0}$ $\displaystyle=-\frac{1}{2}\int_{M}<\sqrt{-1}\partial_{J_{\psi_{0}}}\overline{\partial}_{J_{\psi_{0}}}\chi,{\rm Ric}(\omega_{\psi_{0},\chi_{0}})-\omega_{\psi_{0},\chi_{0}}+\sqrt{-1}\partial_{J_{\psi_{0}}}\overline{\partial}_{J_{\psi_{0}}}f>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}$ $\displaystyle=\int_{M}\mathbf{R}(\psi_{0},\chi_{0})\chi e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$ Thus (3.11) is true. ∎ ###### Remark 3.5. From the above, we actually have $\displaystyle\frac{d}{ds}|_{s=0}\nu((\psi_{0},\chi_{0})+s(\psi,\chi))$ $\displaystyle=((\psi,\chi),\nabla\nu(\psi_{0},\chi_{0}))_{\theta}$ (3.12) $\displaystyle=-\frac{1}{2}\int_{M}<{\rm Ric}(g)-g+{\rm Hess}_{g}(f),DL_{(\psi_{0},\chi_{0})}(\psi,\chi)>e^{-f}\omega_{\psi_{0},\chi_{0}}^{n}.$ The $L^{2}$-norm of ${\mathbf{R}}$ can be controlled by $\nabla\lambda(\cdot)=\mathcal{N}(\cdot)$ as follows. ###### Lemma 3.6. Let $k>2$ be an integer and $\epsilon$ small enough. Then there exists a constant $C=C(\epsilon,k)$ such that for any $(\psi,\chi)\in\mathcal{U}_{\epsilon}$ with $\|\chi\|_{C^{4,\gamma}}\leq\epsilon$ it holds (3.13) $\displaystyle\|{\mathbf{R}}(\psi,\chi)\|_{L^{2}}\leq C(\int_{M}|{\rm Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial\overline{\partial}f_{\psi,\chi}|^{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n})^{\frac{k-2}{k-1}}.$ ###### Proof. Let (3.14) $\displaystyle{\rm Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}=\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F.$ We extend ${\mathbf{R}}(\psi,\chi)$ to a fourth-order operator on the Hilbert space $W_{4}^{2}(M,e^{-f_{\psi,\chi}})$ with respect to the inner product (3.9) by (3.15) $\displaystyle S=-(\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}=-\overline{\partial}_{J_{\psi}}^{*}\cdot\partial_{J_{\psi}}^{*}\cdot\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}.$ We show that $S$ is elliptic and self-adjoint like the Lichnerowicz operator [4]. Let $\eta,\phi\in C^{\infty}(M)$ and $\Delta\eta=\eta_{i\bar{j}}g^{i\bar{j}}$ associated to the metric $g=L(\psi,\chi)$. Then in local coordinates on $(M,J_{\varphi})$, we compute $\displaystyle(S\eta,\phi)$ $\displaystyle=\int_{M}\eta_{i\bar{j}}\overline{\phi_{k\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle=-\int_{M}\eta_{i\bar{j}\bar{k}}\overline{\phi_{\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle=-\int_{M}\eta_{i\bar{k}\bar{j}}\overline{\phi_{\bar{l}}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle=-\int_{M}(\Delta\eta)_{\bar{j}}\overline{\phi_{\bar{l}}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}+\int_{M}\eta_{i\bar{j}}\overline{\phi_{\bar{l}}}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle=\int_{M}[(\Delta^{2}\eta)-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}]\phi e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle-\int_{M}[\eta_{i\bar{j}l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{\bar{k}}(f_{\psi,\chi})_{l}g^{i\bar{k}}g^{l\bar{j}}]\phi e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle=\int_{M}[(\Delta^{2}\eta)-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}]\phi e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}$ $\displaystyle-\int_{M}[\eta_{l\bar{j}i}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{\bar{k}}(f_{\psi,\chi})_{l}g^{i\bar{k}}g^{l\bar{j}}]\phi e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n}.$ It follows that $\displaystyle(S\eta,\phi)$ $\displaystyle=\int_{M}[\Delta^{2}\eta-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}-(\Delta\eta)_{l}(f_{\psi,\chi})_{\bar{j}}g^{l\bar{j}}$ $\displaystyle-\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}]\phi e^{-f_{\psi,\chi}}\omega_{g}^{n}.$ Thus we derive $S\eta=\Delta^{2}\eta-(\Delta\eta)_{\bar{j}}(f_{\psi,\chi})_{l}g^{l\bar{j}}-(\Delta\eta)_{l}(f_{\psi,\chi})_{\bar{j}}g^{l\bar{j}}-\eta_{i\bar{j}}(f_{\psi,\chi})_{l\bar{k}}g^{i\bar{k}}g^{l\bar{j}}+\eta_{i\bar{j}}(f_{\psi,\chi})_{l}(f_{\psi,\chi})_{\bar{k}}g^{i\bar{k}}g^{l\bar{j}}.$ Hence, $S$ is an elliptic operator. By the regularity theorem of elliptic operator, $S$ is a self-adjoint operator on the domain $D(S)=W^{2}_{4}(M,e^{-f_{\psi,\chi}})$. Since $S$ is non-negative, by the spectral theorem we see that for integer $k>0$, $x\in D(S)$ it holds (3.16) $\displaystyle(S^{k}x,x)=\int_{0}^{\infty}\lambda^{k}dE_{x,x}(\lambda),$ where $E_{x,x}(\lambda)$ is the spectral decomposition defined by $S$ [31]. By the Hölder inequality and (3.16) it follows that (3.17) $\displaystyle(S^{2}x,x)\leq(Sx,x)^{\frac{k-2}{k-1}}(S^{k}x,x)^{\frac{1}{k-1}}.$ Thus by (3.14), we get $\displaystyle\|{\mathbf{R}}(\psi,\chi)\|_{L^{2}}$ $\displaystyle\leq C((\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F,(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}F)$ $\displaystyle=C(SF,SF)$ $\displaystyle=C(S^{2}F,F)$ $\displaystyle\leq C(SF,F)^{\frac{k-2}{k-1}}(S^{k}F,F)^{\frac{1}{k-1}}$ (3.18) $\displaystyle\leq C^{\prime}(\int_{M}|{\rm Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial\overline{\partial}f_{\psi,\chi}|^{2}e^{-f_{\psi,\chi}}\omega_{\psi,\chi}^{n})^{\frac{k-2}{k-1}}(S^{k}F,F)^{\frac{1}{k-2}}.$ Note that $SF=(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}})^{*}({\rm Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}).$ Then $\displaystyle(S^{k}F,F)$ $\displaystyle=(S^{k-2}SF,SF)$ $\displaystyle=(S^{k-2}(\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\varphi}})^{*}({\rm Ric}(\omega_{\psi,\chi})-\omega_{\psi,\chi}+\sqrt{-1}\partial_{J_{\psi}}\overline{\partial}_{J_{\psi}}f_{\psi,\chi}).$ Hence (3.19) $\displaystyle(S^{k}F,F)^{\frac{1}{k-2}}<C(\epsilon)\to 0,~{}{\rm as}~{}\epsilon\to 0.$ Therefore, we get (3.13) immediately by (3.2). ∎ ### 3.3. The second variation of $\nu(\cdot)$ We will calculate the second valuation of $\nu$ at $(0,0)\in\mathcal{U}_{\epsilon}$. Let $(g,f)$ be a pair of $W$-functional in (3.3) while $f$ is a smooth solution of (3.5). Denote $\eta=\delta g,k=\delta f$ to be the variations of $g$ and $f$ respectively. Then it has been shown in [5, 40] that (3.20) $\displaystyle\delta({\rm Ric}(g)-g+{\rm Hess}(f))=-\Delta_{-f}(\eta)-{\rm Rm}(\eta,\cdot)-{\rm div}^{*}_{-f}{\rm div}_{-f}(\eta)-\frac{1}{2}{\rm Hess}(v_{\eta}),$ where the function $v_{\eta}={\rm tr}\eta-2k$. Moreover, by differentiating (3.5), we get (cf. [17]), (3.21) $\displaystyle\Delta_{-f}(v_{\eta})+\frac{v_{\eta}}{2}=-\frac{1}{2}{\rm div}_{-f}{\rm div}_{-f}(\eta).$ For convenience, we write the right term in (3.20) as $N(\eta)=-\Delta_{-f}(\eta)-{\rm Rm}(\eta,\cdot)-{\rm div}^{*}_{-f}{\rm div}_{-f}(\eta)-\frac{1}{2}{\rm Hess}(v_{\eta}).$ In case that $-f=\theta$, namely $g$ is a KR soliton, if (3.22) $\displaystyle{\rm div}_{\theta}\eta=0,$ then $\Delta_{\theta}(v_{\eta})+\frac{v_{\eta}}{2}=0.$ Since the first non-zero eigenvalue of $-\Delta_{\theta}$ is not less than one [40], we get $v_{\eta}=0.$ Thus (3.23) $\displaystyle N(\eta)=-\Delta_{\theta}(\eta)-{\rm Rm}(\eta,\cdot),$ which is an anti-hermitian symmetric 2-tensor. Now we restrict the Kähler metric $g=g_{\tau,\chi}$ in $\mathcal{U}_{\epsilon}$. Let $(\psi,\chi),(\psi^{\prime},\chi^{\prime})\in\mathcal{U}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times C^{\infty}(M).$ Then by (3.5), we have $\displaystyle\frac{d}{ds}|_{s=0}(\nabla\nu(s(\psi,\chi)),(\psi^{\prime},\chi^{\prime}))_{\theta}$ $\displaystyle=-\frac{1}{2}\int_{M}<\frac{d}{ds}_{s=0}({\rm Ric}(g_{s\psi,s\chi})+{\rm Hess}(f_{s\psi,s\chi})-g_{s\psi,s\chi}),DL_{(0,0)}(\psi^{\prime},\chi^{\prime})>e^{\theta}\omega_{KS}^{n}$ (3.24) $\displaystyle=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,\chi),DL_{(0,0)}(\psi^{\prime},\chi^{\prime})>e^{\theta}\omega_{KS}^{n}.$ ###### Lemma 3.7. $\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(0,\chi^{\prime})>e^{\theta}\omega_{KS}^{n}=0.$ ###### Proof. We note that $DL_{(0,0)}(\psi,0)$ is anti-hermitian symmetric and (3.22) holds by Lemma 3.1. Thus $N(DL_{(0,0)}(\psi,0))$ is an anti-hermitian symmetric 2-tensor by (3.23). On the other hand, $DL_{(0,0)}(0,\chi^{\prime})$ is hermitian symmetric. Hence the lemma is true. ∎ Analogous to the $Q$-map in Section 3.1, we introduce a map $H_{1}:\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\mapsto\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ by $H_{1}(\psi)=\sum_{i=1}^{l}(c_{i}(\psi)+\sqrt{-1}d_{i}(\psi))e_{i},$ where $c_{i}(\psi)=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(\delta_{i},0)>e^{\theta}\omega_{KS}^{n},i=1,2,\ldots,l,$ and $d_{i}(\psi)=-\frac{1}{2}\int_{M}<N(DL_{(0,0)}(\psi,0),DL_{(0,0)}(\sqrt{-1}\delta_{i},0)>e^{\theta}\omega_{KS}^{n},i=1,2,\ldots,l.$ Recall a fourth order non-positively elliptic operator $H_{2}$ on $C^{\infty}(M)$ introduced in [40] by $H_{2}=[P_{0}^{-1}(\overline{L}^{\prime}_{1}L^{\prime}_{1})(\overline{L}_{1}L_{1})],$ where $P_{0}\chi=2\triangle_{\theta}\chi+\chi-(X+\overline{X})(\chi),$ $L_{1}\chi=\triangle_{\theta}\chi+\psi-X(\chi)$ and $L_{1}^{\prime}\chi=\triangle_{\theta}\chi-X(\chi).$ ###### Definition 3.8. Define a map $H_{\psi,\chi}:\mathcal{U}\to\mathcal{U}$ by $H_{\psi,\chi}=D_{\psi,\chi}\nabla\nu$ and write $H=H_{0,0}$ for convenience. We call $H$ the second variation operator of $\nu(\cdot)$ at $\omega_{KS}$. By the above definition and (3.3), we see that for any $(\psi,\chi)\in\mathcal{U}$, it holds $\displaystyle\delta^{2}\nu_{(0,0)}((\psi,\chi),(\psi,\chi))$ $\displaystyle=\int_{M}<H(\psi,\chi),(\psi,\chi)>e^{\theta}\omega_{KS}^{n}$ (3.25) $\displaystyle=(H(\psi,\chi),(\psi,\chi))_{\theta}.$ Moreover, by Lemma 3.7 we get ###### Proposition 3.9. $H=H_{1}\oplus H_{2}$, namely, $H(\psi,\chi)=H_{1}(\psi)+H_{2}(\chi).$ By a result in [43] (also see [18]), we have the following explicit formula for $H_{1}$. ###### Lemma 3.10. (3.26) $\displaystyle(H_{1}(\psi),\psi)_{\theta}=\int_{M}|\psi|^{2}\widetilde{\theta}e^{\theta}\omega_{KS}^{n},~{}\forall~{}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M),$ where $\widetilde{\theta}$ differs from $\theta$ with a constant such that (3.27) $\displaystyle\int_{M}\widetilde{\theta}e^{\theta}\omega_{KS}^{n}=0.$ ###### Proof. By Lemma 3.1, $\eta=DL_{(0,0)}(\psi,0)$ satisfies that $\eta_{i\overline{j}}=0,{\rm div}_{\theta}\eta=0~{}{\rm and}~{}\eta_{\bar{i}\bar{j},\bar{k}}=\eta_{\bar{i}\bar{k},\bar{j}}.$ For such a variation of Kähler metrics, $\delta^{2}\lambda$ has been computed by the following formula [43, 18], $\displaystyle\delta^{2}\nu((\psi,0),(\psi,0))=\delta^{2}\lambda(\eta,\eta)=\frac{1}{2}\int_{M}|\eta|^{2}(\nu(\omega_{KS})-2m+\theta)e^{\theta}\omega_{KS}^{n}.$ Notice that $|\eta|^{2}=2|\psi|^{2}$ and $\int_{M}(\nu(\omega_{KS})-2m+\theta)e^{\theta}\omega_{KS}^{n}=0.$ This implies that (3.26) holds. ∎ ## 4\. A new version of $\delta^{2}\nu$ In this section, we give a new version of $H_{1}$ and then describe the geometry of the kernel space $Z={\rm ker}(H_{1})$. As an application, we are able to prove the local maximality of $\lambda(\cdot)$ on the space of Kähler metrics associated to the complex structures determined by $Z$. ### 4.1. Kernel space $Z$ of $H_{1}$ We begin with the following technical lemma. ###### Lemma 4.1. Suppose that $\varphi,\psi\in A^{0,1}(M,T^{1,0}M)$ satisfy $\left\\{\begin{array}[]{ll}\overline{\partial}\varphi=\overline{\partial}\psi=0\\\ \varphi\lrcorner\omega=\psi\lrcorner\omega=0.\end{array}\right.$ Let $v$ be a $(1,0)$-VF. Then $v<\varphi,\psi>-<[v,\varphi],\psi>={\rm div}_{\theta}(v\lrcorner\overline{\psi}\lrcorner\varphi)-(v\lrcorner\overline{\varphi})\lrcorner{\rm div}_{\theta}\varphi.$ ###### Proof. Let $v=v^{i}\frac{\partial}{\partial z^{i}},\varphi=\varphi^{l}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}},\psi=\psi^{s}_{\overline{t}}d\overline{z}^{t}\otimes\frac{\partial}{\partial z^{s}}$. Then $\displaystyle[v,\varphi]$ $\displaystyle=(v^{i}\frac{\partial\varphi_{\overline{k}}^{l}}{\partial z^{i}}-\varphi_{\overline{k}}^{i}\frac{\partial v^{l}}{\partial z^{i}})d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}}$ $\displaystyle=(v^{i}\varphi_{\overline{k},i}^{l}-\varphi_{\overline{k}}^{i}v^{l}_{,i})d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{l}}$ and $<[v,\varphi],\psi>=(v^{i}\varphi_{\overline{k},i}^{l}-\varphi_{\overline{k}}^{i}v^{l}_{,i})\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}.$ Similarly, $<\varphi,\psi>=\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$ and $v<\varphi,\psi>=v^{i}\varphi^{l}_{\overline{k},i}\psi^{s}_{\overline{t}}g^{t\overline{k}}g_{l\overline{s}}+v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t}\overline{i}}}g^{t\overline{k}}g_{l\overline{s}}.$ On the other hand, by the condition, $\varphi\lrcorner\omega=\psi\lrcorner\omega=0,$ we have $\varphi^{l}_{\overline{k}}g^{t\overline{k}}=\varphi^{t}_{\overline{k}}g^{l\overline{k}},\psi^{s}_{\overline{t}}g_{s\overline{l}}=\psi^{s}_{\overline{l}}g_{s\overline{t}},$ and by the condition, $\overline{\partial}\psi=0,$ we have $\psi^{s}_{\overline{t},\overline{i}}=\psi^{s}_{\overline{i},\overline{t}}.$ Thus $\displaystyle v<\varphi,\psi>-<[v,\varphi],\psi>$ $\displaystyle=v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{t},\overline{i}}}g^{t\overline{k}}g_{l\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$ $\displaystyle=v^{i}\varphi^{l}_{\overline{k}}\overline{\psi^{s}_{\overline{i},\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{t}}}g^{t\overline{k}}g_{l\overline{s}}$ $\displaystyle=v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{s}_{\overline{l},\overline{t}}}g^{t\overline{k}}g_{i\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{l}}}g^{t\overline{k}}g_{t\overline{s}}$ $\displaystyle=v^{l}\varphi^{t}_{\overline{k}}\overline{\psi^{s}_{\overline{l},\overline{t}}}g^{i\overline{k}}g_{i\overline{s}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{s}_{\overline{l}}}g^{t\overline{k}}g_{t\overline{s}}$ $\displaystyle=v^{l}\varphi^{t}_{\overline{k}}\overline{\psi^{k}_{\overline{l},\overline{t}}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{k}_{\overline{l}}}$ $\displaystyle=v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l},\overline{i}}}+\varphi_{\overline{k}}^{i}v^{l}_{,i}\overline{\psi^{k}_{\overline{l}}}$ $\displaystyle=(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})_{i}-v^{l}\varphi^{i}_{\overline{k},i}\overline{\psi^{k}_{\overline{l}}}$ $\displaystyle=(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})_{i}+(v^{l}\varphi^{i}_{\overline{k}}\overline{\psi^{k}_{\overline{l}}})\theta_{i}-v^{l}(\varphi^{i}_{\overline{k},i}+\varphi^{i}_{\overline{k}}\theta_{i})\overline{\psi^{k}_{\overline{l}}}$ $\displaystyle={\rm div}_{\theta}(v\lrcorner\overline{\psi}\lrcorner\varphi)-(v\lrcorner\overline{\psi})\lrcorner{\rm div}_{\theta}\varphi.$ ∎ If $v\in\eta_{r}(M,J_{0})$ is a HVF on $(M,J_{0},\omega_{KS})$, there is a potential function $P$ of $v$ such that (4.1) $\displaystyle v=\nabla_{\overline{j}}Pg^{i\overline{j}}\frac{\partial}{\partial z^{i}}={\rm grad}^{1,0}P.$ We may normalize $P$ by the following equation (cf. [35]), $g^{i\overline{j}}\nabla_{\overline{j}}\nabla_{i}P+g^{i\overline{j}}\nabla_{\overline{j}}P\nabla_{i}\theta=-P.$ This means that (4.2) $\displaystyle{\rm div}_{\theta}(v)=v^{i}_{,i}+v(\theta)=-P.$ ###### Lemma 4.2. Let $v={\rm grad}^{1,0}P$ as in (4.1) and $\varphi,\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$. Then (4.3) $\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}=\int_{M}P<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$ ###### Proof. By Corollary 1.3, we see that $\left\\{\begin{array}[]{ll}\overline{\partial}\varphi=\overline{\partial}\psi=0\\\ \varphi\lrcorner\omega_{KS}=\psi\lrcorner\omega_{KS}=0.\end{array}\right.$ Note that we also have ${\rm div}_{\theta}\varphi=0.$ Thus by Lemma 4.1 and Stoke’s formula, we get $\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}$ $\displaystyle=\int_{M}v<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$ Hence, by (4.2), we prove $\displaystyle\int_{M}<[v,\varphi],\psi>e^{\theta}\omega_{KS}^{n}$ $\displaystyle=-\int_{M}{\rm div}_{\theta}(v)<\varphi,\psi>e^{\theta}\omega_{KS}^{n}$ $\displaystyle=\int_{M}P<\varphi,\psi>e^{\theta}\omega_{KS}^{n}.$ ∎ ###### Remark 4.3. A similar relation (4.3) is obtained in [6] when $\omega_{KS}$ is a KE metric. Combining Lemma 4.2 with Lemma 3.10, we have the following new version of the operator $H_{1}$. ###### Theorem 4.4. Let $\xi={\rm Im}(X)$, where $X$ is a soliton HVF of $(M,J_{0},\omega_{KS}).$ Then (4.4) $\displaystyle H_{1}(\psi)=2\sqrt{-1}\mathcal{L}_{\xi}\psi,\forall~{}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$ ###### Proof. Note that $X={\rm grad}^{1,0}\widetilde{\theta}$ and $g^{i\overline{j}}\nabla_{\overline{j}}\nabla_{i}\widetilde{\theta}+g^{i\overline{j}}\nabla_{\overline{j}}\widetilde{\theta}\nabla_{i}\widetilde{\theta}=-\widetilde{\theta}.$ Then by Lemma 4.2, for any $\psi^{\prime}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$, we have $\int_{M}<[X,\psi],\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$ It follows that (4.5) $\displaystyle\int_{M}<\mathcal{L}_{X}\psi,\psi^{\prime}>e^{\theta}\omega^{n}=\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$ Let $(z^{1},\ldots,z^{n})$ be holomorphic local coordinates on $(M,J_{0})$. Write $\psi=\psi^{i}_{\overline{k}}d\overline{z}^{k}\otimes\frac{\partial}{\partial z^{i}},~{}X=X^{i}\frac{\partial}{\partial z^{i}}.$ Then $\mathcal{L}_{\overline{X}}\psi=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X}(\psi^{i}_{\overline{j}}))d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}.$ Since $\overline{\partial}\psi=0,$ $\frac{\partial\psi^{i}_{\overline{j}}}{\partial\overline{z}^{k}}=\frac{\partial\psi^{i}_{\overline{k}}}{\partial\overline{z}^{j}}.$ Thus $\displaystyle\overline{\partial}(\overline{X}\lrcorner\psi)$ $\displaystyle=\frac{\partial\overline{X^{k}}\psi^{i}_{\overline{k}}}{\partial\overline{z}^{j}}d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}$ $\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X^{k}}\frac{\partial\varphi^{i}_{\overline{k}}}{\partial\overline{z}^{j}})d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}$ $\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X^{k}}\frac{\partial\psi^{i}_{\overline{j}}}{\partial\overline{z}^{k}})d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}$ $\displaystyle=(\frac{\partial\overline{X^{k}}}{\partial\overline{z}^{j}}\psi^{i}_{\overline{k}}+\overline{X}(\psi^{i}_{\overline{j}}))d\overline{z}^{j}\otimes\frac{\partial}{\partial z^{i}}$ (4.6) $\displaystyle=\mathcal{L}_{\overline{X}}\psi.$ Hence, by the fact that $\delta_{\theta}\psi=0,$ we derive (4.7) $\displaystyle\int_{M}<\mathcal{L}_{\overline{X}}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=\int_{M}<\bar{X}\lrcorner\psi,\delta_{\theta}\psi^{\prime}>e^{\theta}\omega^{n}_{KS}=0.$ By (4.5) and (4.7), we have $\int_{M}<\mathcal{L}_{\xi}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=-\frac{\sqrt{-1}}{2}\int_{M}\widetilde{\theta}<\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$ By Lemma 3.10, it follows that (4.8) $\displaystyle\int_{M}<\mathcal{L}_{\xi}\psi,\psi^{\prime}>e^{\theta}\omega_{KS}^{n}=-\frac{\sqrt{-1}}{2}\int_{M}<H_{1}(\psi),\psi^{\prime}>e^{\theta}\omega_{KS}^{n}.$ On the other hand, for any $\sigma\in K_{X}$, where $K_{X}$ is the compact 1-ps of holomorphic transformations generated by $\xi$, $\sigma$ preserves the Kähler form $\omega_{KS}$ and the function $\theta$. Then $\sigma$ maps $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself. As a consequence, $\mathcal{L}_{\xi}$ maps $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself. Thus we prove (4.4) by (4.8) since $\psi^{\prime}$ is an arbitrary element in $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$. ∎ By Theorem 4.4, we have (4.9) $\displaystyle{\rm Ker}(H_{1})=Z=\\{\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)|~{}\mathcal{L}_{\xi}\psi=0\\}.$ Moreover, we have the following character for the kernel $Z$. ###### Corollary 4.5. $\psi\in Z$ if only if $\xi_{J_{\Phi(\tau\psi)}}=J_{\Phi(\tau\psi)}\xi+\sqrt{-1}\xi$ is a HVF on $(M,J_{\Phi(\tau\psi)})$ for some small $\tau$. ###### Proof. Recall that $K_{X}=e^{s\xi}$ is the 1-ps of holomorphic transformations on $(M,J_{0})$ generated by $\xi$. Then $\xi$ is holomorphic on $(M,J_{\Phi(\tau\psi)})$ if and only if $\displaystyle(e^{s\xi})^{*}J_{\Phi(\tau\psi)}=J_{\Phi(\tau\psi)},~{}\forall s\in\mathbb{R},$ which is equivalent to $\displaystyle J_{(e^{s\xi})^{*}\Phi(\tau\psi)}=J_{\Phi(\tau\psi)},~{}\forall s\in\mathbb{R}.$ The latter is also equivalent to (4.10) $\displaystyle(e^{s\xi})^{*}\Phi(\tau\psi)=\Phi(\tau\psi),~{}\forall s\in\mathbb{R}.$ Note that $e^{s\xi}$ preserves the Kähler form $\omega_{KS}$ and $\theta$. Then $(e^{s\xi})^{*}\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$ Moreover, for any $(1,1)$-form $\varphi_{k}$ $(k\geq 2)$ defined as in (2.9) for $\tau\psi$, we have $\delta_{\theta}((e^{s\xi})^{*}\varphi_{k})=0,$ Thus by the uniqueness of Kuranishi’s solutions we get $\displaystyle(e^{s\xi})^{*}\Phi(\tau\psi)=\Phi(\tau(e^{s\xi})^{*}\psi).$ Since the Kuranishi map is injective, by (4.10), we derive (4.11) $\displaystyle(e^{s\xi})^{*}\psi=\psi~{}\forall s\in\mathbb{R}.$ It follows that $\mathcal{L}_{\xi}\psi=0.$ By Theorem 4.4, we prove that $\psi\in Z$ from (4.9). The inverse is also true. In fact, if $\psi\in Z$, then (4.10) holds for any small $\tau$. Hence, $\psi\in Z$ if only if $e^{s\xi}$ is a family of holomorphisms on $(M,J_{\Phi(\tau\psi)})$. The corollary is proved. ∎ ###### Remark 4.6. It has been shown [40] that the kernel of $H_{2}$ is finitely dimensional, which is isomorphic to the linear space generalized by the real and imaginary parts on HVFs of $(M,J_{0})$. Thus by Proposition 3.9, ${\rm Ker}(H)={\rm Ker}(H_{1})\oplus{\rm Ker}(H_{2})$ is also finitely dimensional. ### 4.2. Index of $H_{1}$ Since $H_{2}$ is always non-positively elliptic operator, the index (the number of positive eigenvalues) of $H$ depends only on the Lie operator $\mathcal{L}_{\xi}$ on $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ by Theorem 4.4. In the following, we will show that it just depends on the cohomology group $H^{1}(M,J_{0},\Theta)$. Suppose that $e_{1},\ldots,e_{l}$ are the eigenvectors of $\mathcal{L}_{\xi}$. Namely there exists $\lambda_{i},i=1,2,\ldots,l$ such that $\mathcal{L}_{\xi}e_{i}=\lambda_{i}e_{i}.$ By (4.4) we have $H_{1}e_{i}=2\sqrt{-1}\lambda_{i}e_{i}.$ Thus $2\sqrt{-1}\lambda_{i}$ is real. Denote $\lambda_{i}=-\sqrt{-1}\delta_{i},\delta_{i}\in\mathbb{R}$ and let $\theta_{i}=e_{i},~{}\theta_{l+i}=\sqrt{-1}e_{i},~{}i=1,2,\ldots,l.$ It follows that $H_{1}\theta_{i}=2\delta_{i}\theta_{i},~{}H_{1}\theta_{l+i}=2\delta_{i}\theta_{l+i}.$ Hence, we need to show that the number $\delta_{i}$ is independent of choice of representation of $[\theta_{i}]$. The following lemma can be found in the book of Kodaira [14]. ###### Lemma 4.7. If $\varphi\in A^{0,p}(M,T^{1,0}(M)),\psi\in A^{0,q}(M,T^{1,0}(M))$, we have (4.12) $\displaystyle\overline{\partial}[\varphi,\psi]=[\overline{\partial}\varphi,\psi]+(-1)^{p}[\varphi,\overline{\partial}\psi].$ In particular, if $Y$ is a HVF, and $\varphi\in A^{0,p}(M,T^{1,0}(M))$ then (4.13) $\displaystyle\overline{\partial}\mathcal{L}_{Y}(\varphi)=\mathcal{L}_{Y}\overline{\partial}(\varphi).$ ###### Lemma 4.8. Let $\varphi\in A^{0,1}(M,T^{1,0}(M))$. Then the following is true: $\displaystyle\overline{\partial}\mathcal{L}_{\xi}\varphi=0,~{}{\rm if}~{}\overline{\partial}\varphi=0;$ (4.14) $\displaystyle\mathcal{L}_{\xi}\varphi=\frac{\overline{\partial}(\mathcal{L}_{X}Y-\overline{X}\lrcorner\varphi)}{2\sqrt{-1}},~{}{\rm if}~{}\varphi=\overline{\partial}Y,Y\in T^{1,0}M.$ ###### Proof. By (4.1), we have (4.15) $\displaystyle\bar{\partial}\mathcal{L}_{\bar{X}}\varphi=0,~{}\forall~{}\varphi\in H^{1}(M,J_{0},\Theta).$ By (4.13), we also have (4.16) $\displaystyle\bar{\partial}\mathcal{L}_{X}\varphi=0.$ Thus, $\overline{\partial}\mathcal{L}_{\xi}\varphi=0.$ By (4.13) we have $\mathcal{L}_{X}\bar{\partial}Y=\bar{\partial}\mathcal{L}_{X}Y.$ Together with (4.1) we see that $\displaystyle\mathcal{L}_{\xi}\bar{\partial}Y$ $\displaystyle=\frac{\mathcal{L}_{X}\bar{\partial}Y-\mathcal{L}_{\bar{X}}\bar{\partial}Y}{2\sqrt{-1}}$ $\displaystyle=\frac{\bar{\partial}\mathcal{L}_{X}Y-\bar{\partial}(\bar{X}\lrcorner\bar{\partial}Y)}{2\sqrt{-1}}.$ Hence (4.8) is true. ∎ By (4.8), we see that for any $\varphi=\overline{\partial}Y,Y\in T^{1,0}M$, it holds $[\mathcal{L}_{\xi}\varphi]=0.$ Thus (4.17) $\displaystyle\mathcal{L}_{\xi}[\varphi]=[\mathcal{L}_{\xi}\varphi].$ This means that the eigenvalue $\theta_{i}$ depends only on the operator $\mathcal{L}_{\xi}$ on $H^{1}(M,J_{0},\Theta)$. Hence, we prove ###### Proposition 4.9. The index of $H$ depends only on the operator $\mathcal{L}_{\xi}$ on $H^{1}(M,J_{0},\Theta)$. ### 4.3. Maximality of $\lambda(\cdot)$ associated to $Z$ First we recall a formula computed for the $W$-functional on a Fano manifold $(M,J)$ in [39]. Let $Y$ be any HVF with ${\rm Im}(Y)$ generating a compact 1-ps $K_{Y}$ of holomorphic transformations on $(M,J)$. Then for any $K_{Y}$-invariant Kähler form $\omega_{g}\in 2\pi c_{1}(M,J)$, the potential $\theta_{Y}(\omega_{g})$ of $Y$ in (3.1) associated to $\omega_{g}$ is real. Define an invariant for $Y$ by $N_{Y}(c_{1}(M,J))=\int_{M}\theta_{Y}(\omega_{g})e^{\theta_{Y}(\omega_{g})}\omega_{g}^{n},$ which is independent of choice of $K_{Y}$-invariant $\omega_{g}\in 2\pi c_{1}(M,J)$ [39]. Moreover, for any $K_{Y}$-invariant $\omega_{g}\in 2\pi c_{1}(M,J)$, we have the following formula, (4.18) $\displaystyle W(g,-\theta_{Y}(\omega_{g}))=(2\pi)^{-n}(nV- N_{Y}(c_{1}(M,J))-F_{Y}^{J}(Y)),$ where $F_{\cdot}^{J}(\cdot)$ is the modified Futaki-invariant on $(M,J)$ introduced in [36]. $N_{Y}(c_{1}(M,J))+F_{Y}^{J}(Y)$ is also called the $H(Y)$-invariant on $\eta_{r}(M,J)$ [39]. By Corollary 4.5, we know that $X=\xi_{J_{\psi_{\tau}}}=J_{\psi_{\tau}}\xi+\sqrt{-1}\xi$ is a HVF on $(M,J_{\psi_{\tau}})$ for any $\tau<<1$, where $\psi_{\tau}=\tau\psi\in B(\epsilon)\cap Z$ and $J_{\psi_{\tau}}$ is associated to $\varphi_{\tau}=\Phi(\psi_{\tau})$. Thus by (4.18), for any $\omega_{g}=\omega_{g_{\tau,\chi}}$ with $\xi(\chi)=0$ in (3.2), it holds (4.19) $\displaystyle W(g,-\theta_{X}(\omega_{g}))=(2\pi)^{-n}(nV- N_{X}(c_{1}(M,J_{\psi_{\tau}}))-F_{X}^{J_{\psi_{\tau}}}(X)).$ Notice that $\theta=\theta_{X}(\omega_{KS})$ is independent of $\psi_{\tau}$. Thus $\displaystyle N_{X}(c_{1}(M,J_{\psi_{\tau}}))$ $\displaystyle=\int_{M}\theta_{X}(\omega_{KS})e^{\theta_{X}(\omega_{KS})}\omega_{KS}^{n}$ $\displaystyle=\int_{M}\theta e^{\theta}\omega_{KS}^{n}$ (4.20) $\displaystyle=N_{X}(c_{1}(M,J_{0}))$ is independent of $\psi_{\tau}$. Next we show that $F_{X}^{J_{\psi_{\tau}}}(X)$ is also independent of $\psi_{\tau}$. In fact, we prove ###### Lemma 4.10. (4.21) $\displaystyle F_{X}^{J_{\psi_{\tau}}}(X)=F_{X}^{J_{0}}(X)=0,~{}\forall~{}\psi_{\tau}\in B(\epsilon)\cap Z.$ ###### Proof. We use an argument in [19] to prove the lemma. Let $\mathcal{J}_{K_{X}}(M,\omega_{KS})$ be a set of almost $K_{X}$-invariant complex structures which are compatible with $\omega_{KS}$. Then for any $J\in\mathcal{J}_{K_{X}}(M,\omega_{KS})$ it induces a Hermitian metric $g_{J}$. As in [19], we define a modified Hermitian scalar curvature function on $\mathcal{J}_{K_{X}}(M,\omega_{KS})$ by $s_{\xi}(J)=s(J)-n+2\Box_{J}{\theta}-X({\theta})-{\theta},~{}\forall~{}J\in\mathcal{J}_{K_{X}}(M,\omega_{KS}),$ where $s(J)$ is the Hermitian scalar curvature of $g_{J}$ (cf. [12]) and $\Box_{J}$ is the Lapalace operator induced by the Chern connection associated to $g_{J}$. Now we consider a family of $J_{\psi_{\tau}}\in\mathcal{J}_{K_{X}}(M,\omega_{KS})$. By [19, Proposition 3.1], we have the formula, (4.22) $\displaystyle\frac{d}{ds}\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\theta}e^{{\theta}}\omega_{KS}^{n}=\Omega_{\xi}(\mathcal{L}_{\xi}J_{\psi_{\tau}},\dot{J}_{\psi_{\tau}}).$ where $\Omega_{\xi}$ is a non-degenerate 2-form on $\mathcal{J}_{T}(M,\omega)$ (cf. [12, 19]). By Corollary 4.5, we have $\mathcal{L}_{\xi}J_{\psi_{\tau}}=0$ and so we get $\Omega_{\xi}(\mathcal{L}_{\xi}J_{\psi_{\tau}},\dot{J}_{\psi_{\tau}})=0.$ Thus by (4.22), the quantity $\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\theta}e^{{\theta}}\omega_{KS}^{n}$ is independent of $\tau$. As a consequence, for the normalized $\widetilde{\theta}$ as in (3.27), $\int_{M}2s_{\xi}(J_{\psi_{\tau}}){\tilde{\theta}}e^{{\tilde{\theta}}}\omega_{KS}^{n}$ is also independent of $\tau$. On the other hand, it is know in [36] that $\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=-F_{X}^{J_{\psi_{\tau}}}(X).$ Note that $F_{X}^{J_{0}}(X)=0$ since $(\omega_{KS},X)$ is the KR soliton on $(M,J_{0})$. Hence, $\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=0,~{}\forall\tau<<1.$ As a consequence, we get $F_{X}^{J_{\psi_{\tau}}}(X)=-\int_{M}s_{\xi}(J_{\psi_{\tau}})\widetilde{\theta}e^{\widetilde{\theta}}\omega_{KS}^{n}=0.$ ∎ ###### Proposition 4.11. Let $\psi_{\tau}\in B(\epsilon)\cap Z$. Then for any $\chi\in C^{\infty}(M)$ with $\xi(\chi)=0$ it holds $\lambda(g_{\tau,\chi})\leq\lambda(g_{KS}).$ ###### Proof. By (4.18) and (4.21), we have $\displaystyle\lambda(g_{\tau,\chi})$ $\displaystyle\leq W(g_{\tau,\chi},-\theta(\omega_{g_{\tau,\chi}}))$ $\displaystyle=(2\pi)^{-n}(nV-N_{X}(c_{1}(M,J_{\varphi_{\tau}})).$ Thus by (4.3), we get $\displaystyle\lambda(g_{\tau,\chi})$ $\displaystyle\leq(2\pi)^{-n}(nV- N_{X}(c_{1}(M,J_{0})))$ $\displaystyle=\lambda(g_{KS}).$ ∎ Proposition 4.11 can be also proved by using the equivalent formula for the modified Futaki-invariant in [47] as follows. ###### Another proof of Proposition 4.11. According to the above proof of Proposition 4.11, we need to show that (4.21) holds for $J_{\psi_{\tau}}$. In fact, as in the proof of [21, Lemma 2.1], by the partial $C^{0}$-estimate, there is a large integer $L_{0}$ such that for any integer $k$ the family of Fano manifolds $(M,g_{\tau,0})$ $(\tau\leq\epsilon$) can be embed into an ambient projection space $\mathbb{C}P^{N_{k}}$ by normal orthogonal bases of $H^{0}(M,kK_{M}^{-L_{0}},g_{\tau,0})$. Then by introducing two equivariant Riemann-Roch formulas of $S_{1}$ and $S_{2}$ with $G=(S^{1})^{2}$-action by (4.23) $\displaystyle S_{1}=k\frac{\partial}{\partial t}{\rm trace}(e^{\frac{sX^{k}+tX^{k}}{k}})|_{s=1,\ t=0},\ \ S_{2}=\frac{1}{2}\frac{\partial}{\partial s}\frac{\partial}{\partial t}{\rm trace}(e^{\frac{sX^{k}+tX^{k}}{k}})|_{s=1,t=0},$ where $X^{k}=(X_{\alpha}^{k})$ is the induced HVF as an element of Lie algebra $sl(N_{k}+1,\mathbb{C})$, $F_{X}^{J_{\psi_{\tau}}}(X)$ is the leading term $F_{0}$ (which is a multiple of $F_{1}$ for a smooth Fano variety) in the following expansion of (4.24) $\displaystyle-\frac{S_{1}-S_{2}}{kN_{k}}=F_{0}+F_{1}k^{-1}+o(k^{-2}).$ Here ${\rm trace}(e^{\frac{sX^{k}+tv^{k}}{k}})=\int_{M}{\rm ch}^{G}(kL){\rm Td}^{G}(M),$ and ${\rm ch}^{G}(kL)$ is the $G$-equivalent Chern character of multiple line bundle $kL=kK_{M}^{-L_{0}}$ and ${\rm Td}^{G}(M)$ is the $G$-equivalent Chern character of $M$ [1]. Since $K_{M_{\tau}}^{-1}$ is the restriction of $\frac{1}{kL_{0}}\mathcal{O}(-1)$, where $M_{\tau}=(M,J_{\tau})\subset\mathbb{C}P^{N_{k}}$, $S_{1}$ (or $S_{2}$ ) as a restriction of derivatives of ${\rm trace}(e^{\frac{sX^{k}+tv^{k}}{k}})$ on $kL$ is same for any $\tau$ as long as $X$ can be lifted as a HVF on $M_{\tau}$. Thus we get $F_{X}^{J_{\psi_{\tau}}}(X)=F_{X}^{J_{0}}(X)=0.$ ∎ ## 5\. Lojasiewicz inequality on the space of Kähler metrics In this section we prove an inequality of Lojasiewicz type for the functional $\nu(\cdot)$ on $\mathcal{U}_{\epsilon}$. We note that $\nu(\cdot)$ can be defined on the $C^{k+4,\gamma}$ continuous space, $W^{k+4,\gamma}(M)=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times C^{k+4,\gamma}(M),$ where $k\geq 0$ is any integer. Clearly, there is a natural $C^{k+4,\gamma}$-norm on $W^{k+4,\gamma}(M)$ by $\|(\psi,\chi)\|_{C^{k+4,\gamma}}=\|\psi\|_{\theta}+\|\chi\|_{C^{k+4,\gamma}}.$ Let $W_{\epsilon}^{k+4,\gamma}(M)=\\{(\psi,\chi)\in W^{k+4,\gamma}(M)|~{}\psi\in B(\epsilon)\\}.$ Set an $\epsilon$-neighborhood of $(0,0)$ in $W_{\epsilon}^{k+4,\gamma}(M)$ by $\mathcal{V}_{\epsilon}=\\{(\psi,\chi)\in W_{\epsilon}^{k+4,\gamma}(M)|~{}\psi\in B(\epsilon),\|\chi\|_{C^{k+4,\gamma}}<\epsilon\\}.$ We prove ###### Proposition 5.1. There are $\epsilon>0$ and $\alpha\in[\frac{1}{2},1)$ such that for any $a=(\varphi,\chi)\in\mathcal{V}_{\epsilon}$ it holds (5.1) $\displaystyle\|\nabla\nu(a)\|_{L^{2}}\geq c_{0}|\nu(a)-\nu(0)|^{\alpha},$ where $\|\cdot\|_{L^{2}}$ is taken for $\nabla\nu=(Q,R)\in W^{k,\gamma}(M)$ and $c_{0}>0$ is some small constant. ###### Proof. We will follow the argument in [32]. By Remark 4.6, $W_{0}={\rm ker}(H)$ is finitely dimensional. Then both of $W_{0}={\rm ker}(H)$ and $W^{\perp}=\\{a\in W^{k+4,\gamma}(M)|~{}(a,b)_{\theta}=0,~{}\forall b\in W_{0}\\}$ are closed sets of $W^{k+4,\gamma}(M)$. Since $H_{2}$ is elliptic, there is a constant $C>0$ such that (5.2) $\displaystyle\parallel H(\eta)\parallel_{L^{2}}\geq C\parallel\eta\parallel_{L^{2}_{4}},~{}\forall~{}\eta\in W^{\perp}.$ Consider the project map, $\Phi={\rm pr}_{W^{\perp}}\nabla\nu:\mathcal{U_{\epsilon}}\to W^{\perp}.$ Then $\Phi$ is analysis and it satisfies that $\displaystyle\Phi(0,0)=0,D_{(0,0)}\Phi={\rm pr}_{W^{\perp}}\circ H.$ Thus $D_{(0,0)}\Phi(\cdot):0\oplus W^{\perp}\to 0\oplus W^{\perp}$ is an isomorphic. By the implicity function theorem, there is a neighborhood $U$ of $0$ in $W_{0}$ and a map $G(x):U\to W^{\perp}$ such that $\nabla\nu(x+G(x))\in W_{0},~{}\forall~{}x\in U.$ Define a functional on $U$ by $F(x)=\nu(x+G(x)).$ Then for any $x\in U$, $z\in W_{0}$, we have $\frac{dG(x+tz)}{dt}|_{t=0}\in W^{\perp}.$ It follows that $\displaystyle\frac{dF(x+tz+G(x+tz))}{dt}|_{t=0}$ $\displaystyle=(z+\frac{dG(x+tz)}{dt}|_{t=0},\nabla\nu(x+G(x)))_{\theta}$ $\displaystyle=(z,\nabla\nu(x+G(x)))_{\theta}$ Thus $\nabla F(x)=\nabla\nu(x+G(x))\in W_{0},~{}\forall x\in U.$ Since $F(x)$ is analytic, by the classic Lojasiewicz inequality on $W_{0}$ (cf. [8, 32]), there is an $\alpha\in[\frac{1}{2},1)$ such that $\displaystyle|\nabla\nu(x+G(x))|_{L^{2}}\geq c_{1}|\nabla\nu(x+G(x))|$ (5.3) $\displaystyle\geq c_{2}|\nu(x+G(x))-\nu(0)|^{\alpha},~{}\forall~{}|x|<<1.$ By Definition 3.8, we have $\|H_{(\psi,\chi)}\|_{C^{k,\gamma}}\leq C,~{}\forall~{}(\psi,\chi)\in\mathcal{V}_{\epsilon}.$ Moreover, (5.4) $\displaystyle\|H-H_{(\psi,\chi)}\|_{C^{k,\gamma}}<<1,~{}{\rm as~{}long~{}as}~{}\|(\psi,\chi)\|_{C^{k+4,\gamma}}<<1.$ For any $a=(\psi,\chi)\in\mathcal{V}_{\epsilon}$, we write $a=x+G(x)+y$ for some $y\in W^{\perp}$. Thus there exists a small $\epsilon$ such that for any $a=(\psi,\chi)\in\mathcal{V}_{\epsilon}$ it holds $\displaystyle\nabla\nu(a)$ $\displaystyle=\nabla\nu(x+G(x)+y)$ $\displaystyle=\nabla\nu(x+G(x))+\int_{0}^{1}\delta_{y}\nabla\nu(x+G(x)+sy)ds$ $\displaystyle=\nabla\nu(x+G(x))+\delta_{y}\nabla\nu(x+G(x))+\int_{0}^{1}[\delta_{y}\nabla\nu(x+G(x)+sy)-\delta_{y}\nabla\nu(x+G(x))]ds$ $\displaystyle=\nabla F(x)+\delta_{y}\nabla\nu(0)+\int_{0}^{1}[\delta_{y}\nabla\nu(x+G(x)+sy)-\delta_{y}\nabla\nu(x+G(x))]ds+o(\parallel y\parallel_{W^{2}_{4}})$ (5.5) $\displaystyle=\nabla F(x)+H(y)+o(\parallel y\parallel_{W^{2}_{4}}).$ Since $\nabla F(x)$ is perpendicular to $H(y)$ with respect to $(\cdot,\cdot)_{\theta}$, and $H$ is nondegenerate on $W^{\perp}$ by (5.2), we get (5.6) $\displaystyle\|\nabla\nu(a)\|^{2}_{L^{2}}\geq\|\nabla F(x)\|^{2}_{L^{2}}+c_{3}\|y\|^{2}_{W^{2}_{4}},$ where $c_{3}>0$ is some small constant. Similarly, by (5.4), we have $\displaystyle\nu(a)$ $\displaystyle=\nu(x+G(x)+y)$ $\displaystyle=\nu(x+G(x))+\int_{0}^{1}<\nabla\nu(x+G(x)+sy),y>ds$ $\displaystyle=\nu(x+G(x))+\frac{1}{2}<\delta_{y}\nabla\nu(x+G(x)+y),y>$ $\displaystyle+\int_{0}^{1}\int_{0}^{1}s<\delta_{y}\nabla\nu(x+G(x)+sty)-\delta_{y}\nabla\nu(x+G(x)+y),y>dtds$ $\displaystyle=F(x)+\frac{1}{2}<H(y),y>$ $\displaystyle+\int_{0}^{1}\int_{0}^{1}s<\delta_{y}\nabla\nu(x+G(x)+sty)-H(y),y>dtds+o(\parallel y\parallel_{W^{2}_{4}}^{2})$ (5.7) $\displaystyle=F(x)+\frac{1}{2}<H(y),y>+o(\parallel y\parallel_{W^{2}_{4}}^{2}).$ Notice that $\displaystyle|<H(y),y>|$ $\displaystyle\leq\parallel y\parallel_{L^{2}}|\parallel H(y)\parallel_{L^{2}}$ $\displaystyle\leq C_{1}\parallel y\parallel_{L^{2}}\parallel y\parallel_{C^{k+4,\gamma}}$ $\displaystyle\leq C_{2}\parallel y\parallel_{L^{2}}^{2}$ $\displaystyle\leq C\parallel y\parallel_{W^{2}_{4}}^{2}.$ It follows that (5.8) $\displaystyle|\nu(a)-\nu(0)|\leq|F(x)-F(0)|+C\parallel y\parallel_{W^{2}_{4}}^{2}.$ Hence combining (5.6) and (5.8) together with (5), we obtain $\displaystyle\parallel\nabla\nu(a)\parallel_{L^{2}}^{2}$ $\displaystyle\geq c_{2}|F(x)-F(0)|^{2\alpha}+c_{3}\parallel y\parallel_{W^{2}_{4}}^{2}$ $\displaystyle\geq c_{4}(|F(x)-F(0)|+\parallel y\parallel_{W^{2}_{4}}^{2})^{2\alpha}$ $\displaystyle\geq c_{0}|\nu(a)-\nu(0)|^{2\alpha}.$ This proves (5.1). ∎ Recall the operator $\mathcal{N}(\cdot)$ in (3.8) from ${\rm Sym}^{2}(T^{*}M)$ to itself. Then we can rewrite (3.5) as $(\nabla\nu(a_{0}),(\psi,\chi))_{\theta}=-\frac{1}{2}(\mathcal{N}(L(a_{0})),DL_{a_{0}}((\psi,\chi)))_{L^{2}(L(a_{0}))},~{}\forall~{}a_{0}\in\mathcal{U}_{\epsilon}.$ Thus there is a dual operator $(DL_{a_{0}})^{*}$ of $DL_{a_{0}}$ with respect to the inner product $(\cdot,\cdot)_{\theta}$ such that $((DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})),(\psi,\chi))_{\theta}=(\mathcal{N}(L(a_{0}),DL_{a_{0}}((\psi,\chi)))_{L^{2}(L(a_{0}))}.$ As a consequence, we have $\nabla\nu(a_{0})=-\frac{1}{2}(DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})).$ Hence, (5.9) $\displaystyle(\nabla\nu(a_{0}),\nabla\nu(a_{0}))_{\theta}=\frac{1}{4}(\mathcal{N}(L(a_{0}),DL_{a_{0}}(DL_{a_{0}})^{*}\mathcal{N}(L(a_{0})))_{L^{2}(L(a_{0}))}.$ The following is a generalization of Lemma 3.6. ###### Lemma 5.2. Let $k>2$ be an integer, and $\epsilon$ a small constant. Then there exists a constant $C=C(\epsilon)>0$ such that (5.10) $\displaystyle((DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}\leq C(\mathcal{N}(L(a),\mathcal{N}(L(a))))^{\gamma}_{L^{2}(L(a))},~{}\forall a\in\mathcal{V}_{\epsilon}.$ Here $\gamma=\frac{k-2}{k-1}<1$. ###### Proof. Let $S=(DL_{a})^{*}(DL_{a})$ be an operator on the Hilbert space $\mathcal{H}=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times L^{2}(M),$ whose domain $D(S)$ contains $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times C^{\infty}(M)$. As same as the operator in (3.15), $S$ is a self-adjoint fourth-order non-negative elliptic operator. Thus by the spectral theorem, for integer $k>0$, $x\in D(S)$, it holds (5.11) $\displaystyle(S^{k}x,x)_{\theta}=\int_{0}^{\infty}\lambda^{k}dE_{x,x}(\lambda).$ By the Hölder inequality and (5.11) we get (5.12) $\displaystyle(S^{2}x,x)_{\theta}\leq(Sx,x)_{\theta}^{\frac{k-2}{k-1}}(S^{k}x,x)_{\theta}^{\frac{1}{k-1}}.$ For any $a\in\mathcal{V}_{\epsilon}$, we decompose $\mathcal{N}(L(a))$ into (5.13) $\displaystyle\mathcal{N}(L(a))=DL_{a}x+y,$ where $x\in\mathcal{H}^{0,1}(M,T^{1,0}M)\times C^{\infty}(M)$ and $y\in{\rm Im}(DL_{a})^{\perp}$. Since $(z,(DL_{a})^{*}(y))_{\theta}=(DL_{a}(z),y)_{L^{2}(L(a))}=0,~{}\forall~{}z\in\mathcal{H}^{0,1}(M,T^{1,0}M)\times C^{\infty}(M),$ $(DL_{a})^{*}(y)=0.$ Thus by (5.12) and the fact that $S$ is self-adjoint, we have $\displaystyle((DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}$ $\displaystyle=((DL_{a})^{*}DL_{a}x,(DL_{a})^{*}DL_{a}x)_{\theta}$ $\displaystyle=(Sx,Sx)_{\theta}$ $\displaystyle=(S^{2}x,x)_{\theta}$ $\displaystyle\leq(Sx,x)_{\theta}^{\gamma}(S^{k}x,x)_{\theta}^{1-\gamma}$ $\displaystyle=(DL_{a}x,DL_{a}x)_{L^{2}(L(a))}^{\gamma}(S^{k}x,x)_{\theta}^{1-\gamma}$ (5.14) $\displaystyle\leq\|\mathcal{N}(L(a)))\|_{L^{2}(L(a))}(S^{k}x,x)_{\theta}^{1-\gamma}.$ On the other hand, $\displaystyle(S^{k}x,x)_{\theta}$ $\displaystyle=(S^{k-1}x,Sx)_{\theta}$ $\displaystyle=(S^{k-2}(DL_{a})^{*}DL_{a}x,(DL_{a})^{*}DL_{a}x)_{\theta}$ $\displaystyle=(S^{k-2}(DL_{a})^{*}\mathcal{N}(L(a)),(DL_{a})^{*}\mathcal{N}(L(a)))_{\theta}.$ Then (5.15) $\displaystyle(S^{k}x,x)_{\theta}^{1-\gamma}\leq C,$ as long as $a\in\mathcal{V}_{\epsilon}$. Hence, combining (5) and (5.15), we derive (5.10). ∎ ###### Remark 5.3. In order to apply the spectral theorem, the fourth-order operator $S$ should be self-adjoint as in (3.15). In the other words, we shall define the domain $D(S)$ of S. By decomposing $S$ into $S(\varphi,\chi)=(S_{11}\varphi+S_{12}\chi,S_{21}\varphi+S_{22}\chi),$ it suffices to consider the domains $D(S_{12})$ and $D(S_{22})$. On the other hand, by (3.15), $S_{22}=(\sqrt{-1}\partial_{J_{\varphi}}\bar{\partial}_{J_{\varphi}})^{*}(\sqrt{-1}\partial_{J_{\varphi}}\bar{\partial}_{J_{\varphi}})$ is a fourth-order elliptic self-adjoint operator. Thus $D(S_{22})=W^{2}_{4}(M)$. Note that $S_{12}$ is a second order operator. Hence, $D(S)=\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)\times W^{2}_{4}(M)$ and so $S$ is self-adjoint on $D(S)$. ###### Corollary 5.4. There are constant $c_{0}>0$ and number $\alpha^{\prime}\in(\frac{1}{2},1)$ such that (5.16) $\displaystyle\|\mathcal{N}(L(a))\|_{L^{2}(L(a))}\geq c_{0}\|\lambda(L(a))-\lambda(L(0))\|^{\alpha^{\prime}},\forall a\in\mathcal{V}_{\varepsilon}.$ ###### Proof. By (5.9), Lemma 5.2 and Proposition 5.1, we have $\displaystyle\|\mathcal{N}(L(a))\|_{L^{2}(L(a))}$ $\displaystyle\geq C\|\nabla\nu(a)\|_{L^{2}}^{\frac{1}{\gamma}}$ $\displaystyle\geq C\|\nu(a)-\nu(0)\|^{\frac{\alpha}{\gamma}}$ $\displaystyle=C\|\lambda(L(a))-\lambda(L(0))\|^{\frac{\alpha}{\gamma}}.$ Set $\alpha^{\prime}=\frac{\alpha}{\gamma}$. Then $\alpha^{\prime}\in(\frac{1}{2},1)$ when $k>>1$. Hence, (5.16) is true. ∎ ## 6\. Proof of Theorem 0.1 In this section, we prove Theorem 0.1. Let $\widetilde{f}(t)$ be the minimizer of $W$-functional as in (3.5) for the solution $\widetilde{g}(t)$ of KR flow (0.1). Let $X(t)$ be a family of gradient vector fields defined by $X(t)=\frac{1}{2}{\rm grad}_{\widetilde{g}(t)}\widetilde{f}(t),$ which generates a family of differential transformations $F(t)\subseteq{\rm Diff}(M)$. Then $g(t)=F(t)^{*}\widetilde{g}(t)$ is a solution of the following modified Ricci flow, (6.1) $\displaystyle\frac{\partial g(t)}{\partial t}=-{\rm Ric}(g(t))+g(t)+{\rm Hess}_{t}(f(t)),$ where $f(t)=F(t)^{*}\widetilde{f}(t)$ is the minimizer of $W$-functional for ${g}(t)$. It follows that (6.2) $\displaystyle\|\dot{g}(t)\|_{L^{2}(t)}=\|\mathcal{N}(t)\|_{L^{2}(t)}.$ Here $\mathcal{N}(t)={\rm Ric}(g(t))-g(t)+{\rm Hess}_{t}(f(t))$ just as one in (3.8). Let $\omega(t)=F(t)^{*}\widetilde{\omega}(t)$. Then $\omega(t)$ is just the Kähler form of $g(t)$. Thus by (6.1), we get $\displaystyle\frac{d\omega(t)}{dt}=-{\rm Ric}(\omega(t))+\omega(t)+\sqrt{-1}\partial_{J(t)}\bar{\partial}_{J(t)}(f(t))$ and (6.3) $\displaystyle\omega(t)(\cdot,\frac{dJ(t)}{dt})=D_{t}f(t),$ where $D_{t}f$ denotes the anti-Hermitian part of ${\rm Hess}(f)$. Hence, $\displaystyle\|\dot{J}(t)\|_{L^{2}(t)}$ $\displaystyle=\|D_{t}f(t)\|_{L^{2}(t)}$ $\displaystyle\leq\|\mathcal{N}(t)\|_{L^{2}(t)}$ (6.4) $\displaystyle=\|\dot{g}(t)\|_{L^{2}(t)}.$ We first prove the following convergence theorem. ###### Theorem 6.1. There exists a small $\epsilon$ such that for any $(\tau,\chi)\in\mathcal{V}_{\epsilon}$ with $\psi_{\tau}=\sum\tau_{i}e_{i}\in Z$ and $\xi(\chi)=0$ the flow (6.1) with the initial metric $g=L(\tau,\chi)$ converges smoothly to a KR soliton $(M,J_{\infty},g_{\infty})$. Moreover, the convergence is fast in the polynomial rate. ###### Proof. We need to prove that the normalized flow $g(t)$ of (6.1) is uniformly bounded in $C^{k+2,\gamma}$-norm. Fix a small number $\delta_{0}$ we consider (6.5) $\displaystyle T=T_{\tau,\chi}=\sup\\{t|~{}\|g(t)-g_{KS}\|_{C^{k+2,\gamma}}<\delta_{0},~{}\|J(t)-J_{0}\|_{C^{k+2,\gamma}}<\delta_{0}\\}.$ Then it suffices to show that $T=\infty$. By the stability of Ricci flow for the short time, $T_{\tau,\chi}\geq T_{0}>0.$ In fact, for the KR flow (6.1), $T_{0}$ can be made any large as long as $\tau$ and $\chi$ are small enough. By the Kuranishi theorem for the completeness of deformation space of complex structures [25], for any $t<T$, there is a $K(t)\in{\rm Diff(M)}$ closed to the identity such that (6.6) $\displaystyle K(t)^{*}J(t)=J_{\varphi_{t}},~{}\varphi_{t}=\Phi(t)=~{}\Phi(\psi_{t})$ for some $\psi_{t}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with $\|\psi_{t}\|<\epsilon_{0}$, where $\epsilon_{0}=\epsilon$ as chosen in (2.6) and (5.16) in Corollary 5.4. In fact, by the construction of $K(t)$ in [25, Theorem 3.1], we have the estimate $\displaystyle\|\psi_{t}\|_{L^{2}(M)}=O(\|\varphi_{t}\|_{L^{2}(M)})\leq\epsilon_{0},$ (6.7) $\displaystyle K(t)^{*}\omega(t)=(1+O(\|\varphi_{t}\|_{L^{2}(M)}))\omega(t).$ Thus there is a smooth function $\chi_{t}$ such that (6.8) $\displaystyle\omega_{K(t)^{*}g(t)}=K(t)^{*}\omega(t)=\omega_{KS}+\sqrt{-1}\partial_{J_{\varphi_{t}}}\bar{\partial}_{J_{\varphi_{t}}}\chi_{t}.$ Here $\chi_{t}$ can be normalized by $\int_{M}\chi_{t}\omega_{KS}^{n}=0.$ It follows that $\displaystyle\|\Delta_{g_{KS}}\chi_{t}\|_{C^{k+2,\gamma}}$ $\displaystyle\leq 2\|\Delta_{g_{\psi_{t},0}}\chi_{t}\|_{C^{k+2,\gamma}}$ $\displaystyle=2\|{\rm trace}_{\omega_{KS}}(K(t)^{*}\omega(t))-n\|_{C^{k+2,\gamma}}$ (6.9) $\displaystyle\leq 2\|(1+\delta_{1}){\rm trace}_{g_{KS}}(g(t))-n\|_{C^{k+2,\gamma}}\leq\delta_{2}(\delta_{0})<<1.$ Hence, we get (6.10) $\displaystyle\|\chi_{t}\|_{C^{k+4,\gamma}(M)}\leq\epsilon_{0}$ as long as $\delta_{2}$ is chosen small enough. Note that $\|\mathcal{N}(g)\|_{L^{2}(g)}$ is invariant under the action of ${\rm Diff}(M)$. Therefore, by Corollary 5.4, we obtain the following Lojasiewicz inequality, (6.11) $\displaystyle\|\mathcal{N}(g(t))\|_{L^{2}(g(t))}=\|\mathcal{N}(L(\psi_{t},\chi_{t}))\|_{L^{2}(L(\psi_{t},\chi_{t}))}\geq c_{0}\|\lambda(g(t))-\lambda(g_{KS})\|^{\alpha},$ where $\alpha\in(\frac{1}{2},1)$. Note that $\widetilde{g}(t)$ are all $K_{X}$-invariant for any $t\geq 0$. Then by Proposition 4.11, we have $\displaystyle\lambda(\widetilde{g}(t))\leq\lambda(g_{KS}),~{}t>0.$ and so, (6.12) $\displaystyle\lambda(g(t))\leq\lambda(g_{KS}),~{}t>0.$ Thus by (6.1), for any $\beta>2-\frac{1}{\alpha}$, we get $\displaystyle\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}$ $\displaystyle=-(1-(2-\beta)\alpha)[\lambda(g_{KS})-\lambda(g(t))]^{-(2-\beta)\alpha}\frac{d}{dt}\lambda(g(t))$ (6.13) $\displaystyle=-\frac{(1-(2-\beta)\alpha)}{2}[\lambda(g_{KS})-\lambda(g(t))]^{-(2-\beta)\alpha}\int_{M}<\mathcal{N}(t),\mathcal{N}(t)>e^{-f_{t}}\omega_{t}^{n}.$ By (6.11), it follows that $\displaystyle\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}$ $\displaystyle\leq-C(\int_{M}<\mathcal{N}(t),\mathcal{N}(t)>e^{-f_{t}}\omega_{t}^{n})^{\frac{\beta}{2}}$ $\displaystyle=-C\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}.$ As a consequence, (6.14) $\displaystyle\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}dt$ $\displaystyle\leq C(\beta)[\lambda(g_{KS})-\lambda(g(t_{1}))]^{1-(2-\beta)\alpha}$ Hence, for any $(\tau,\chi)\in\mathcal{V}_{\epsilon}$, we prove $\int_{1}^{T}\|\dot{g}(t)\|_{L^{2}(t)}^{\beta}dt\leq C(\beta)[\lambda(g_{KS})-\lambda(g(0))]^{1-(2-\beta)\alpha}\leq\delta_{3}(\epsilon).$ Similarly, it also holds $\int_{1}^{T}\|\dot{J}(t)\|_{L^{2}(t)}^{\beta}dt<\delta_{4}(\epsilon).$ By (6) and (6.11), we see that $\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-(2-\beta)\alpha}\leq-C^{\prime}(\lambda(g_{KS})-\lambda(g(t)))^{\alpha\beta}.$ Then $\frac{d}{dt}[\lambda(g_{KS})-\lambda(g(t))]^{1-2\alpha}\geq C>0.$ It follows that (6.15) $\displaystyle\lambda(g_{KS})-\lambda(g(t))\leq C^{\prime\prime}(t+1)^{-\frac{1}{2\alpha-1}}.$ On the other hand, by the interpolation inequalities for tensors, for $\beta\in(2-\frac{1}{\alpha},1)$ and any integer $p\geq 1$, there exists $N(p)$ which is independent of $t$, such that $\displaystyle\|\dot{g}(t)\|_{L^{2}_{p}(t)}$ $\displaystyle\leq C(p)\|\dot{g}(t)\|^{\beta}_{L^{2}(t)}\||\mathcal{N}(t)|^{1-\beta}_{L^{2}_{N(p)}(t)}$ $\displaystyle\leq C(p)\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)},~{}\forall~{}t<T.$ Similarly, we have (6.16) $\displaystyle\|\dot{J}(t)\|_{L^{2}_{p}(t)}\leq C(p)\parallel\dot{J}(t)\parallel^{\beta}_{L^{2}(t)},~{}\forall~{}t<T.$ Hence, by (6.14) and (6.15), we derive $\displaystyle\parallel g(t_{1})-g(t_{2})\parallel_{C^{k+2,\gamma}}$ $\displaystyle\leq\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel_{C^{k+2,\gamma}}$ $\displaystyle\leq C\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel_{L^{2}_{p}(t)}$ $\displaystyle\leq C\int_{t_{1}}^{t_{2}}\parallel\dot{g}(t)\parallel^{\beta}_{L^{2}(t)}$ $\displaystyle\leq C(\beta)[\lambda(g_{KS})-\lambda(g(t_{1}))]^{1-(2-\beta)\alpha}$ (6.17) $\displaystyle\leq C(\beta)(t_{1}+1)^{-\frac{1-(2-\beta)\alpha}{2\alpha-1}},~{}\forall~{}t_{2}>t_{1}.$ Therefore, we can choose a large $T_{0}$ such that $\|g(t)\|_{C^{k+2,\gamma}}<\delta_{0},~{}\forall~{}t\geq T_{0}.$ Similarly we can use (6) and (6.16) to prove that (6.18) $\displaystyle\|J(t)\|_{C^{k+2,\gamma}}<\delta_{0}.~{}\forall~{}t\geq T_{0}.$ As a consequence, we prove that $T=\infty$. Furthermore, we can show that the limit of $g(t)$ is a KR soliton by (6.2) (cf. [37, 38]). The convergence speed comes from (6). ∎ ###### Remark 6.2. By (6.15) and a result of Dervan-Székelyhidi [11] (also see [45]), we know that (6.19) $\displaystyle\sup_{\omega_{g}\in 2\pi c_{1}(M,J_{\psi_{\tau}})}\lambda(g)=\lim_{t}\lambda(g(t))=\lambda(g_{KS}).$ In particular, (6.12) holds for KR flow (0.1) with any initial metric in $2\pi c_{1}(M,J_{\psi_{\tau}})$. Thus the condition $\xi(\chi)=0$ can be removed in Theorem 6.1 according to the above proof 333The convergence part also comes from the Hamilton-Tian conjecture and the uniqueness result in [16, 45]. . We also remark that the limit complex structure $J_{\infty}$ in Theorem 6.1 may be different with the original one $J_{\psi_{\tau}}$. But the soliton VF of $(M_{\infty},J_{\infty})$ must be conjugate to $X$. In fact, we have the following analogy of [46, Proposition 5.10] for the uniqueness of soliton VFs . ###### Lemma 6.3. There is a small $\delta_{0}$ such that for any KR soliton $(M,J^{\prime},g_{KS}^{\prime})$ with (6.20) $\displaystyle{\rm dist}_{CG,C^{3}}((M^{\prime},g_{KS}^{\prime}),(M,g_{KS}))\leq\delta_{0},$ $X$ can be lifted to a HVF on $(M,J^{\prime})$ so that it is a soliton VF of $(M,J^{\prime},g_{KS}^{\prime})$. Moreover, (6.21) $\displaystyle\lambda(g_{KS}^{\prime})=\lambda(g_{KS}),$ ###### Proof. As in the second proof of Proposition 4.11, by the partial $C^{0}$-estimate, one can embed any KR soliton $(M,J^{\prime};\omega_{KS}^{\prime},X^{\prime})$ with satisfying (6.20) into an ambient projection space $\mathbb{C}P^{N}$. Then the lemma turns to prove that there is some $\sigma\in{\rm U}(N+1,\mathbb{C})$ such that $X^{\prime}=\sigma\cdot X\cdot\sigma^{-1}.$ Thus one can use the argument in [46, Proposition 5.10] to get the compactness of soliton VFs in ${\rm sl}(N+1,\mathbb{C})$ and prove the lemma by the uniqueness result of soliton VFs [46, Proposition 2.2]. On the other hand, by (6.20), there is a $F\in{\rm Diff(M)}$ such that $\|F^{*}J^{\prime}-J_{0}\|_{C^{3}}\leq\delta_{0}^{\prime}.$ Then by the Kuranishi’s theorem, there are $K\in{\rm Diff(M)}$ and $\tau^{\prime}\in B(\epsilon)$ such that $K^{*}(F^{*}J^{\prime})=J_{\psi_{\tau^{\prime}}}.$ Thus, we may assume that $(M,\omega_{KS}^{\prime})$ is a KR soliton with respect to $J^{\prime}=J_{\psi_{\tau^{\prime}}}$. Since both of $\theta_{X}(\omega_{KS}^{\prime})$ and $\theta_{X}(\omega_{KS})$ are minimizers of the $W$-functional respect to $\omega_{KS}^{\prime}$ and $\omega_{KS}$, by (4.19)-(4.21) in Section 4, we obtain $\lambda(g_{KS}^{\prime})=W(g_{KS}^{\prime},-\theta_{X}(\omega_{KS}^{\prime}))=W(g_{KS},-\theta_{X}(\omega_{KS}))=\lambda(g_{KS}).$ ∎ By Lemma 6.3, we can finish the proof of Theorem 0.1. ###### Proof of Theorem 0.1. By the uniqueness of limits of KR flow [16, 45], we may assume that $\widetilde{\omega}_{0}=g=L(\tau,\chi)$ with $(\tau,\chi)\in\mathcal{U}_{\epsilon}$ and $\xi(\chi)=0$. Thus the convergence part of theorem comes from Theorem 6.1. Moreover, by Lemma 6.3, $X$ can be lifted to a HVF on $(M,J_{\infty})$ so that it is a soliton VF of $(M,J_{\infty},g_{\infty})$ and (0.2) is satisfied. (0.2) also comes from (6.15) as well as the convergence speed of $g(t)$ with the polynomial rate comes from (6). ∎ ## 7\. Applications of Theorem 0.1 In this section, we first prove Theorem 0.2. Recall that a special degeneration on a Fano manifold $M$ is a normal variety $\mathcal{M}$ with a $\mathbb{C}^{*}$-action which consists of three ingredients [34]: 1. (1) an flat $\mathbb{C}^{*}$-equivarant map $\pi:\mathcal{M}\to\mathbb{C}$ such that $\pi^{-1}(t)$ is biholomorphic to $M$ for any $t\neq 0$; 2. (2) an holomorphic line bundle $\mathcal{L}$ on $\mathcal{M}$ such that $\mathcal{L}|_{\pi^{-1}(t)}$ is isomorphic to $K_{M}^{-r}$ for some integer $r>0$ and any $t\neq 0$; 3. (3) a center $M_{0}=\pi^{-1}(t)$ which is a $Q$-Fano variety. The following definition can be found in [47] (also see [42, 3, 10], etc.). ###### Definition 7.1. A Fano manifold $M$ is modified $K$-semistable with respect to a HVF $X$ in $\eta(M)$ if the modified Futaki-invariant $F(\cdot)\geq 0$ for any special degeneration $\mathcal{M}$ associated to a 1-ps $\sigma_{t}$ induced by a $\mathbb{C}^{*}$\- action, which communicates with the one-parameter subgroup $\sigma_{t}^{X}$ associated to the lifting of $X$ on $\mathcal{M}$. In addition that $F(\cdot)=0$ if only if $\mathcal{M}\cong M\times\mathbb{C}$, $M$ is called modified $K$-polystable with respect to $X$. For a Fano manifold $(M,J_{\psi_{\tau}})$ in the deformation space in Theorem 0.1, we introduce ###### Definition 7.2. A Fano manifold $(M,J_{\psi_{\tau}})$ is called modified $K$-semistable (modified $K$-polystable) in the deformation space of complex structures on $(M,J_{0})$ which admits a KR soliton $(g_{KS},X)$ if $X$ can be lifted to a HVF on $(M,J_{\psi_{\tau}})$ and $(M,J_{\psi_{\tau}})$ is modified $K$-semistable (modified $K$-polystable) with respect to $X$. ###### Proof of Theorem 0.2. By Lemma 6.3, the soliton VF on $(M,J_{\psi_{\tau}})$ is conjugate to $X$. Thus we need to prove the sufficient part since the modified $K$-polystability is a necessary condition for the existence of KR solitons (cf. [3]). By Theorem 0.1 and Lemma 6.3, the KR flow $g(t)$ converges smoothly to a KR soliton $(M,J_{\infty},g_{\infty})$ with respect to $X$ for the initial Kähler metric $g_{\tau,0}$ on $(M,J_{\psi_{\tau}})$. Then as in the proof of [21, Lemma 2.1], by the partial $C^{0}$-estimate, there is a large integer $L_{0}$ such that the family of Kähler manifolds $(M,g(t))$ and the limit manifold $(M,J_{\infty},g_{\infty})$ can be embed into an ambient projection space $\mathbb{C}P^{N}$ by normal orthogonal bases of $H^{0}(M,K_{M}^{-L_{0}},g(t))$ and the images $\tilde{M}_{t}$ of $(M,g(t))$ converges smoothly to the image $\tilde{M}_{\infty}$ of $(M,J_{\infty},g_{\infty})$ in $\mathbb{C}P^{N}$. Thus there is a family of group $\sigma_{t}\in{\rm SL}(N+1,\mathbb{C})$ such that $\sigma_{t}(\tilde{M}_{t_{0}})=\tilde{M}_{t},~{}\forall t\geq t_{0}.$ Moreover, we may assume that $\sigma_{t}\cdot\sigma_{s}^{X}=\sigma_{s}^{X}\cdot\sigma_{t},$ by modifying the base of $H^{0}(M,K_{M}^{-L_{0}},g(t))$ after a transformation in ${\rm SL}(N+1,\mathbb{C})$ (cf. [10]). Here $X$ can be lifted to a HVF in $\mathbb{C}P^{N}$ such that it is tangent to each $\tilde{M}_{t}$. Set a reductive subgroup of ${\rm SL}(N+1,\mathbb{C})$ by $G=\\{\sigma\in{\rm SL}(N+1,\mathbb{C})|~{}\sigma\cdot\sigma_{s}^{X}=\sigma_{s}^{X}\cdot\sigma\\}.$ Then $G_{c}=\\{\sigma\in G|~{}\sigma(\tilde{M}_{\infty})=\tilde{M}_{\infty}\\}\subset{\rm Aut}_{r}(\tilde{M}_{\infty}),$ where ${\rm Aut}_{r}(\tilde{M}_{\infty})$ is a reductive subgroup of ${\rm Aut}(\tilde{M}_{\infty})$ which contains $\sigma_{s}^{X}$. Note that $M_{\infty}$ admits a KR soliton and $X$ is a center of $\eta_{r}(\tilde{M}_{\infty})$ by [36]. Thus $G_{c}={\rm Aut}_{r}(\tilde{M}_{\infty})$ is a reductive subgroup of $G$. By GIT, there is a $\mathbb{C}^{*}$-action in $G$ which induces a smooth degeneration $\mathcal{M}$ on the Fano manifold $\tilde{M}_{t_{0}}$ with the center $\tilde{M}_{\infty}$. Clearly, this $\mathbb{C}^{*}$-action communicates with $\sigma_{s}^{X}$. It follows that the corresponding modified Futaki-invariant $F(\cdot)=0$ by the fact $\tilde{M}_{\infty}$ admitting a KR soliton. Hence $\mathcal{M}$ must be a trivial degeneration and we get $M\cong M_{\infty}$. This proves that $M$ admits a KR soliton. ∎ Let $T$ be a torus subgroup of ${\rm Aut}_{r}(M,J_{0})$ which contains the soliton VF $X$. Then by Proposition 4.9 and Corollary 4.5, we see that any $T$-equivalent subspace $H_{X}^{1}(M,J_{0},\Theta)\subset H^{1}(M,J_{0},\Theta)$ is included in $Z$, which is invariant under ${\rm Aut}_{r}(M,J_{0})$. Thus by Theorem 0.2 we actually prove the following existence result for KR solitons in the $T$-equivalent deformation space. ###### Corollary 7.3. Let $(M,J_{0},\omega)$ be a Fano manifold which admits a KR soliton $(\omega_{KS},X)$. Then there exists a small $\epsilon$-ball $B_{\epsilon}(0)\subset H_{T}^{1}(M,J_{0},\Theta)$ such that for any $\psi_{\tau}\in B_{\epsilon}(0)$ the Fano manifold $(M,J_{\psi_{\tau}})$ admits a KR soliton if and only if $(M,J_{\psi_{\tau}})$ is modified $K$-polystable. ###### Remark 7.4. By using the deformation theory, Inoue proved the sufficient part of Corollary 7.3 in sense of the GIT-polystability via the group ${\rm Aut}(M,J_{0})$ [19, Proposition 3.8]. But it is still unknown whether the necessary part is true in sense of the GIT-polystability [19, Postscript Remark 1]. Next we prove the following uniqueness result for KR-solitons in the closure of the orbit by diffeomorphisms. ###### Theorem 7.5. Let $\\{\omega_{i}^{1}\\}$ and $\\{\omega_{i}^{2}\\}$ be two sequences of Kähler metrics in $2\pi c_{1}(M,J)$ which converge to KR-solitons $(M_{\infty}^{1},\omega_{KS}^{1})$ and $(M_{\infty}^{2},\omega_{KS}^{2})$ in sense of Cheeger-Gromov, respectively. Suppose that (7.1) $\displaystyle\lambda(\omega_{KS}^{1})=\lambda(\omega_{KS}^{2})=\sup\\{\lambda(\omega_{g^{\prime}})|~{}\omega_{g^{\prime}}\in 2\pi c_{1}(M,J)\\}.$ Then $M_{\infty}^{1}$ is biholomorphic to $M_{\infty}^{2}$ and $\omega_{KS}^{1}$ is isometric to $\omega_{KS}^{2}$. Theorem 7.5 generalizes the uniqueness result of Tian-Zhu for KR-solitons [35] as well as a recent result of Wang-Zhu [45, Theorem 0.4] in sense of diffeomorphisms orbit where both of ${\rm Aut}_{0}(M_{\infty}^{1})$ and ${\rm Aut}_{0}(M_{\infty}^{2})$ are assumed to be reductive444In fact, we expect to generalize Theorem 7.5 for the singular KR-solitons of $(M_{\infty}^{1},\omega_{KR}^{1})$ and $(M_{\infty}^{2},\omega_{KR}^{2})$ as in [45, Theorem 6.7], and it is also a generalization of uniqueness result of Chen-Sun for KE-metrics orbit [8] (also see [23]). We also note that the assumption (7.1) is necessary according to Pasquier’s counter-example of horospherical variety [45, Remark 6.5]. Recall [46] ###### Definition 7.6. Let $(M,J)$ be a Fano manifold. A complex manifold $(M^{\prime},J^{\prime})$ is called a canonical smooth deformation of $(M,J)$ if there are a sequence of Kähler metrics $\omega_{i}$ in $2\pi c_{1}(M,J)$ and diffeomorphisms $\Psi_{i}:M^{\prime}\to M$ such that (7.2) $\displaystyle\Psi_{i}^{*}\omega_{i}\stackrel{{\scriptstyle C^{\infty}}}{{\longrightarrow}}\omega^{\prime},~{}\Psi_{i}^{*}J\stackrel{{\scriptstyle C^{\infty}}}{{\longrightarrow}}J^{\prime},~{}{\rm on}~{}M^{\prime}.$ In addition that $J^{\prime}$ is not conjugate to $J$, $J^{\prime}$ is called a jump of $J$. Theorem 7.5 is a direct corollary of following convergence result of KR flow together with the uniqueness result of Han-Li [16] (cf. [45]). ###### Proposition 7.7. Let $(M^{\prime},J^{\prime})$ be a canonical smooth jump of a Fano manifold $(M,J)$. Suppose that $(M^{\prime},J^{\prime})$ admits a KR soliton $\omega_{KS}$ such that (7.3) $\displaystyle\lambda(\omega_{KS})=\sup\\{\lambda(g)|~{}\omega_{g}\in 2\pi c_{1}(M,J)\\}.$ Then for any initial metric $\widetilde{\omega}_{0}\in 2\pi c_{1}(M,J)$ the flow $(M,J,\widetilde{\omega}(t))$ of (0.1) is uniformly $C^{\infty}$-convergent to $(M^{\prime},J^{\prime},\omega_{KS})$. ###### Proof. By the assumption, there is a sequence of Kähler metrics $\omega_{i}$ in $2\pi c_{1}(M,J)$ such that $\lim_{i}{\rm dist}_{CG}((M,\omega_{i}),(M^{\prime},\omega^{\prime}))=0,$ where $\omega^{\prime}\in 2\pi c_{1}(M^{\prime},J^{\prime})$. Note that the KR flow of (0.1) with the initial $\omega^{\prime}$ converges to the KR soliton $\omega_{KS}$ [39, 11]. Then by the stability of (0.1) for the finite time, there is a sequence of $\tilde{\omega}_{i}^{t_{i}}$ such that $\tilde{\omega}_{i}^{t_{i}}=\omega_{KS}+\sqrt{-1}\partial_{J}\bar{\partial}_{J}\chi_{i}$ and $\lim_{i}{\rm dist}_{CG,C^{3}}((M,\tilde{\omega}_{i}^{t_{i}}),(M^{\prime},\omega_{KS}))=0,$ where $\tilde{\omega}_{i}^{t}$ is the solution of flow (0.1) with the initial metric $\omega_{i}$. It follows that there are diffeomorphisms $\Phi_{i}$ such that $\lim_{i}\|\Phi_{i}^{*}J-J^{\prime}\|_{C^{4,\gamma}}=0.$ Thus there are diffeomorphisms $K_{i}$ (cf. (6.6)) such that $J_{\varphi_{i}}=K_{i}^{*}(\Phi_{i}^{*}J)~{}{\rm and}~{}\|\varphi_{i}\|_{C^{k+4,\gamma}(M)}<<1,~{}{\rm as}~{}i>>1.$ Hence, as in the proof of Theorem 6.1 555(6.12) always holds by (7.3)., we conclude that the sequence $\\{g_{i}(t)\\}$ of modified flows of (6.1) uniformly converges to the soliton flow generated by $\omega_{KS}$. Since the limit of $g_{i}(t)$ is independent of the initial metrics $\tilde{\omega}_{i}^{t_{i}}$ [16, 45], each $g_{i}(t)$ must converge to $\omega_{KS}$. Again by the uniqueness result in [16, 45], we prove the proposition. ∎ By Proposition 7.7, we in particular prove the following uniqueness result for the centers of smooth degenerations with admitting KR solitons. ###### Corollary 7.8. Let $(M,J)$ be a Fano manifold. Suppose there is a smooth degeneration on $(M,J)$ with its center $(M^{\prime},J^{\prime})$ admitting a KR soliton $g_{KS}$ which satisfies (7.4) $\displaystyle\lambda(g_{KS})=\sup\\{\lambda(g)|~{}\omega_{g}\in 2\pi c_{1}(M,J)\\}.$ Then $(M^{\prime},J^{\prime})$ is unique. ###### Proof. By Corollary 2.2 and Kuranishi’s completeness theorem [25], there is a smooth path $\tau(s)\in B(\epsilon)$ $(s<<1)$ such that $g_{0}=g_{KS}$. Then $g_{\tau(s)}={\omega}(\cdot,J_{\tau(s)}\cdot)$ induces a smooth jump of $(M,J)$ to $(M^{\prime},J^{\prime})$. Here $\omega$ is the Kähler form of $g_{KS}$. Thus the corollary comes from Proposition 7.7 immediately. ∎ ## 8\. Generalization of Theorem 0.1 In this section, we generalize the argument in the proof of Theorem 0.1 to prove Theorem 0.3. We will use a different way to obtain the entropy estimate (6.12) in the proof of Theorem 6.1. We first consider the special case of $H_{1}<0$, i.e., the stable case, and prove the jump of KR flow (0.1) to the KR soliton $(M,J_{0},\omega_{KS})$. ### 8.1. Linearly stable case ###### Theorem 8.1. Let $(M,J_{0})$ be a Fano manifold which admits a KR soliton $\omega_{KS}\in 2\pi c_{1}(M,J_{0})$. Suppose that for any $\psi\neq 0~{}{\rm in}~{}\mathcal{H}^{0,1}_{h}(M,T^{1,0}M)$ it holds (8.1) $\displaystyle H_{1}(\psi)<0.$ Then there exists a small $\epsilon$ such that for any $\tau\in B(\epsilon)$ the flow (6.1) with an initial metric $g=L(\tau,\chi)$ converges smoothly to the KR soliton $(M,J_{0},\omega_{KS})$. Furthermore, the convergence is fast in the polynomial rate. ###### Proof. By the Hamilton-Tian conjecture and the uniqueness result in [16, 45], we need to prove the convergence of flow $g(t)$ of (6.1) with the initial metric $g_{\tau}=L(\tau,0)$ for any $\tau\in B(\epsilon)$. Moreover by (8.1), we may assume that there is $\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ such that (8.2) $\displaystyle\|\psi\|=1,\psi_{\tau}=\sum\tau_{i}e_{i}=\tau\psi=\tau(\psi_{1}+\psi^{\prime})$ with the property: $\displaystyle\|\psi_{1}\|\geq\frac{1}{l}>0,H_{1}(\psi_{1})=-\delta_{1}\psi_{1};$ (8.3) $\displaystyle<H_{1}(\psi^{\prime}),\psi^{\prime}>\leq 0,~{}\|\psi^{\prime}\|\leq 1.$ Here $\delta_{1}\geq 0$. Without loss of generality, $-\delta_{1}$ may be regarded as the largest negative eigenvalue of $H_{1}$. Thus for any $\chi$ with $\|\chi\|_{C^{4,\gamma}}\leq\tau N_{0}$, where $N_{0}$ is fixed, the following is true: $\displaystyle(\psi_{\tau},\chi)=\tau(\psi,\chi^{\prime}),~{}\|\chi^{\prime}\|_{C^{4,\gamma}}\leq N_{0},$ (8.4) $\displaystyle\lambda(g_{\tau,\chi})\leq\lambda(g_{KS})-\tau^{2}(\frac{\delta_{1}}{l^{2}}+o(1))<\lambda(g_{KS}).$ Let $T=T_{\tau,0}$ be the set defined as in (6.5) with $\delta_{0}=O(\tau)$. Let $\tilde{\psi}=\psi_{t}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with $\|\tilde{\psi}\|<\epsilon_{0}=O(\tau)$ defined as in (6.6) such that $K(t)^{*}J(t)=J_{\tilde{\varphi}},~{}\tilde{\varphi}=\Phi(\tilde{\psi}).$ Then as in (8.2) and (8.1), there is $\tilde{\psi}_{1}\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with $\|\tilde{\psi}_{1}\|\geq\frac{1}{l}$ such that $\displaystyle\|\tilde{\psi}\|=\tau^{\prime}<\epsilon_{0};$ $\displaystyle\tilde{\psi}=\tau^{\prime}(\tilde{\psi}_{1}+\tilde{\psi}^{\prime}),\|\tilde{\psi}_{1}+\tilde{\psi}^{\prime}\|=1;$ (8.5) $\displaystyle H_{1}(\tilde{\psi}_{1})=-\delta_{1}^{\prime}\tilde{\psi}_{1}~{}{\rm and}~{}<H_{1}(\tilde{\psi}^{\prime}),\tilde{\psi}^{\prime}>\leq 0,$ where $\delta_{1}^{\prime}\geq\delta_{1}.$ On the other hand, we may assume that $\omega_{g(t)}$ is same as $\omega_{KS}$. Otherwise, by Moser’s theorem, there is a diffeomorphism $\hat{K}(t)\in{\rm Diff(M)}$ such that $\omega_{\hat{g}(t)}=\omega_{KS},$ where $\hat{g}(t)=\hat{K}(t)^{*}g(t)$. Then we can replace $g(t)$ by $\hat{g}(t)$. Thus, there are $K(t)\in{\rm Diff(M)}$ and $\tilde{\chi}\in C^{\infty}(M)$ as in (6.8) such that (8.6) $\displaystyle\omega_{K(t)^{*}g(t)}==K(t)^{*}\omega_{KS}=\omega_{KS}+\sqrt{-1}\partial_{J_{\tilde{\varphi}}}\bar{\partial}_{J_{\tilde{\varphi}}}\tilde{\chi},~{}\int_{M}\tilde{\chi}\omega_{KS}^{n}=0.$ Moreover, as in (6), we have $K(t)^{*}\omega_{KS}=(1+O(\|\tilde{\varphi}_{t}\|_{L^{2}(M)}))\omega_{KS}.$ It follows that (cf. (6)) $\|\Delta\tilde{\chi}\|_{C^{4,\gamma}}\leq\tau^{\prime}N_{0}.$ Consequently, by (8.1), we derive (8.7) $\displaystyle\lambda(g(t))=\lambda(L{\tilde{\psi},\tilde{\chi}})\leq\lambda(g_{KS})-(\tau^{\prime})^{2}(\frac{\delta_{1}}{l^{2}}+o(1))\leq\lambda(g_{KS}).$ Hence, we can continue the argument in the proof of Theorem 6.1 to show that the flow (6.1) converges smoothly to a KR soliton $(M,J_{\infty},\omega_{\infty})$ such that $\lambda(g_{\infty})=\lambda(g_{KS}).$ Moreover, by (8.7), $\tau^{\prime}$ must go to zero. Therefore, $\tilde{\psi}$ goes to zero and $g_{\infty}$ is same as $g_{KS}$ by the uniqueness of KR solitons [35]. For a general initial metric in $2\pi c_{1}(M,J_{\tau})$, we only remark how to get the decay estimate. In fact, we can choose a large $T_{0}$ such that ${\rm dist}_{CG,C^{k}}((M,g(T_{0})),(M,g_{\infty}))\leq\epsilon$ and there is an auto-diffeomorphism $\sigma$ such that $\|\sigma^{*}J({T_{0}})-J_{0}\|_{C^{k}}\leq\epsilon^{\prime}.$ Then as in (8.6), there is an auto-diffeomorphism $K(T_{0})$ and $\psi\in\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ with $\varphi=\Phi^{\prime}(\psi)$ for the metric $\sigma^{*}g(T_{0})$ such that $\|\psi\|=\tau<<1~{}{\rm and}\|\Delta\chi\|_{C^{4,\gamma}}\leq\tau N_{0}.$ Hence, by the above argument, the KR flow with the initial metric $g(T_{0})$ converges to $g_{\infty}$ fast in the polynomial rate. The proof is complete. ∎ Theorem 8.1 means that any KR flow with an initial metric in $2\pi c_{1}(M,J_{\tau})$ with $\tau<<1$ under the condition (7.6) will jump upto the original KR soliton $(M,J_{0},\omega_{KS})$ and also show that the KR soliton $(M,J_{0},\omega_{KS})$ is isolated in the deformation space of complex structures in this case. But upto now, we do not know whether there is such an example of Fano manifold with admitting an isolated KR soliton around her deformation space of complex structures. ### 8.2. Linearly semistable case In this subsection, we generalize Theorem 8.1 with the existence of non- trivial kernel $Z$ of operator $H_{1}$ to prove Theorem 0.3. Let $K$ be a maximal compact subgroup of ${\rm Aut}_{r}(M,J_{0})$ which contains $K_{X}$. Then $(\omega_{KS},J_{0})$ is $K$-invariant [35], and so $\sigma$ maps $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ to itself for any $\sigma\in K$. The latter means that $\sigma(\psi)$ is still $\theta$-harmonic whenever $\psi$ is $\theta$-harmonic. Thus we can extend the action ${\rm Aut}_{r}(M,J_{0})$ on $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ so that $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$ is an ${\rm Aut}_{r}(M,J_{0})$-invariant space. Since $K_{X}\cdot\sigma=\sigma\cdot K_{X},~{}\forall\sigma\in{\rm Aut}_{r}(M,J_{0}),$ we have $\mathcal{L}_{\xi}\sigma^{*}\psi=0,~{}\forall~{}\psi\in Z.$ Hence, $Z$ is also an ${\rm Aut}_{r}(M,J_{0})$-invariant subspace of $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M)$. Furthermore, we prove ###### Lemma 8.2. Suppose that $(M,J_{\psi_{\tau}})$ admits a KR soliton for any $\psi_{\tau}\in B(\epsilon)\cap Z$. Then (8.8) $\displaystyle\sigma^{*}{\psi}=\psi_{,}~{}\forall~{}\sigma\in{\rm Aut}_{r}(M,J_{0}),\psi\in Z.$ ###### Proof. Since the union of maximal tori is dense in a reductive complex group, we need to prove (8.8) for any torus 1-ps $\sigma_{t}$ and $\psi\in Z$. On the contrary, there are $\sigma\in{\rm Aut}_{r}(M,J_{0})$ and $\psi\in Z$ such that $\sigma_{t}=\sigma^{-1}\cdot\rho_{t}\cdot\sigma$ with some nontrivial weights for $\psi$, where $\rho_{t}:\mathbb{C}^{*}\mapsto{\rm Aut}_{r}(M,J_{0})$ is a diagonal torus action on $Z$. Since $Z$ is ${\rm Aut}_{r}(M,J_{0})$-invariant, there is a basis of $Z$, $\\{e_{1},\ldots,e_{s}\\}$ $(s={\rm dim}Z)$ such that $\sigma(\psi)=\sum_{i\leq s}e_{i}$ and $\sigma_{t}(\psi)=\sum_{i}t^{a_{i}}\sigma^{-1}(e_{i}),t\in\mathbb{C}^{*},$ where $a_{i}\in\mathbb{Z}$ are weights of $\sigma_{t}$ with some $a_{i}\neq 0$. Without loss of generality, we may assume $a_{1}>0$. Now we consider a degeneration of $\rho_{t}(e_{1})$ $(|t|<\epsilon,|e_{1}|<<1)$ in $Z$. Note that $J_{\rho_{t}^{*}\Phi(e_{1})}=\rho_{t}^{*}J_{\Phi(e_{1})}.$ Then by the Kuranishi theorem, there is a $K_{t}\in{\rm Diff(M)}$ such that $J_{\Phi(\rho_{t}(e_{1}))}=K_{t}^{*}(\rho_{t}^{*}J_{\Phi(e_{1})}).$ Thus, for any small $t_{1}$ and $t_{2}$ it holds $(M,J_{\Phi(t_{1}e_{1})})\cong(M,J_{\Phi(t_{2}e_{1})}).$ Hence, the family of $(M,J_{\Phi(te_{1})})$ $(|t|<\epsilon)$ is generated by a $C^{*}$-action on $(M,J_{\Phi(e_{1})})$, which degenerates to $(M,J_{0})$. Moreover, it communicates with 1-ps $\sigma_{s}^{X}$ and its modified Futaki- invariant is zero. Therefore, we get a contradiction with the modified K-polystability of $(M,J_{\Phi(e_{1})})$ which admits a KR soliton. The proof is finished. ∎ ###### Remark 8.3. In case of $\omega_{KS}=\omega_{KE}$, $Z=\mathcal{H}^{0,1}(M,T^{1,0}M)$. Then the property (8.8) turns to hold for any $\sigma\in{\rm Aut}(M,J_{0}),\psi\in\mathcal{H}^{0,1}(M,T^{1,0}M)$. Thus Lemma 8.2 is actually a generalization of [6, Theorem 3.1] in the case of KE metrics. By Lemma 8.2, we prove ###### Lemma 8.4. Under the assumption in Lemma 8.2, there exists $\delta>0$ such that for any $(\tau,\chi)\in\mathcal{V}_{\delta}$ it holds $\lambda(g_{\tau,\chi})\leq\lambda(g_{KS}),$ if $H_{1}(\cdot)\leq 0$ on $\mathcal{H}^{0,1}_{\theta}(M,T^{1,0}M).$ ###### Proof. Let $\mathfrak{k}$ be the Lie algebra of $K$, and $\eta_{u}$ the nilpotent part of $\eta(M,J_{0};\mathbb{R})$. Then $\eta(M,J_{0};\mathbb{R})=\eta_{r}\oplus\eta_{u}=\mathfrak{k}\oplus J_{0}\mathfrak{k}\oplus\eta_{u}.$ Fix a small ball $U(\epsilon_{0})\subseteq\mathfrak{k}\oplus\eta_{u}$ centered at the original. By the Kuranishi theorem there exists $\tau^{\prime}\in B(\epsilon)$ and $\gamma\in{\rm Diff}(M)$ for any $\tau\in B(\epsilon),(v_{1},v_{2})\in U(\epsilon_{0})$ such that (8.9) $\displaystyle(e^{J_{\tau}v_{1}+v_{2}})^{*}J_{\tau}=\gamma^{*}J_{\tau^{\prime}},$ where $J_{\tau}$ and $J_{\tau^{\prime}}$ are complex structures associated to $\psi_{\tau}$ and $\psi_{\tau^{\prime}}$, respectively. We define a smooth map $\Phi:U(\epsilon)\times\mathcal{V}_{\epsilon}\mapsto\mathcal{V}_{\epsilon}$ by $\Phi((v_{1},v_{2}),(\tau,\chi))=(\tau^{\prime},\chi^{\prime}),$ where the Kähler potential $\chi^{\prime}$ is determined by (8.10) $\displaystyle(\gamma^{-1})^{*}(e^{J_{\tau}v_{1}+v_{2}})^{*}(\omega+\sqrt{-1}\partial_{J_{\tau}}\bar{\partial}_{J_{\tau}}\chi)=\omega+\sqrt{-1}\partial_{J_{\tau^{\prime}}}\bar{\partial}_{J_{\tau^{\prime}}}\chi^{\prime}~{}{\rm and}~{}\int_{M}\chi^{\prime}\omega_{KS}=0.$ Let $\Psi:U(\epsilon)\times\mathcal{V}_{\epsilon}\mapsto{\rm ker}(H_{2})$ be a projection of $\Phi$ such that $\Psi={\rm Pr}_{{\rm ker}(H_{2})}\circ{\rm Pr}_{2}\circ\Phi.$ Namely, $\Psi(((v_{1},v_{2})(\tau,\chi)))={\rm Pr}_{{\rm ker}(H_{2})}(\chi^{\prime}).$ A direct calculation shows that $D_{(0,0)}\Psi((v_{1},v_{2}),0)=\theta_{Y}+\overline{\theta_{Y}},$ where $\theta_{Y}$ is a potential of HVF, $Y=\frac{1}{2}\sqrt{-1}(v_{1}-\sqrt{-1}J_{0}v_{1})+\frac{1}{2}(v_{2}-\sqrt{-1}J_{0}v_{2}).$ Thus by [40], we see that $D_{(0,0)}\Psi(\cdot,0):\mathfrak{k}\oplus\eta_{u}\mapsto{\rm ker}(H_{2})$ is an isomorphism. By the implicit function theorem, there are $\delta<\epsilon$ and map $G:\mathcal{V}_{\delta}\to U(\varepsilon_{0})$ such that $\displaystyle{\rm Pr}_{2}\circ\Phi(G(\tau,\chi),(\tau,\chi))\in{\rm ker}(H_{2})^{\perp}.$ It follows that (8.11) $\displaystyle(\tau^{\prime},\chi^{\prime})=\Phi(G(\tau,\chi),(\tau,\chi))\in\mathcal{V}_{\delta^{\prime}},$ where $\chi^{\prime}\in{\rm ker}(H_{2})^{\perp}$ and $\delta^{\prime}(\delta)<<1.$ Let $\tilde{\mathcal{V}}_{\epsilon}=\\{(\tau_{0},\widetilde{\chi})\in\mathcal{V}_{\epsilon}|~{}\tau_{0}\in Z,~{}\xi(\widetilde{\chi})=0\\}.$ Then the restricted map $\widetilde{\Psi}$ of $\Psi$ on $\mathfrak{k}\times\tilde{\mathcal{V}}_{\epsilon}$ is also smooth and $D_{(0,0)}\widetilde{\Psi}(\cdot,0):\mathfrak{k}\mapsto\\{\theta_{Y}+\overline{\theta_{Y}}\\}$ is an isomorphic map. Here $Y=\frac{1}{2}\sqrt{-1}(v-\sqrt{-1}J_{0}v),~{}v\in\mathfrak{k}.$ We claim: (8.12) $\displaystyle{\rm ker}(H_{2})\cap\\{\chi|~{}\xi(\chi)=0\\}=\\{\theta_{Y}+\overline{\theta_{Y}}\\}.$ On contrary, there is a nontrivial $v^{\prime}~{}\in\eta_{u}$ such that $\xi(\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}})=0,$ where $Y^{\prime}=v^{\prime}-\sqrt{-1}J_{0}v^{\prime}$. Then for any $\sigma\in K_{X}$, $\sigma^{*}(\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}})=\theta_{Y^{\prime}}+\overline{\theta_{Y^{\prime}}}.$ It follows that $\sigma^{*}Y^{\prime}=Y^{\prime},~{}\forall~{}\sigma\in K_{X}.$ This implies $Y^{\prime}\in\eta_{r}(M,J_{0})$, which is a contradiction! By (8.12), $D_{(0,0)}\widetilde{\Psi}(\cdot,0):\mathfrak{k}\mapsto{\rm ker}(H_{2})\cap\\{\chi|~{}\xi(\chi)=0\\}$ is an isomorphism. On the other hand, by Lemma 8.4, $(e^{J_{\tau_{0}}v})^{*}J_{\tau_{0}}=J_{\tau_{0}},~{}\forall~{}\psi_{\tau_{0}}\in Z,v\in\mathfrak{k}.$ Hence, applying the implicit function theorem to $\widetilde{\Psi}$ at $(\tau_{0},\widetilde{\chi})\in\tilde{\mathcal{V}}_{\epsilon}$, there are $v\in\mathfrak{k}$ and Kähler potential $\chi_{0}\in{\rm ker}(H_{2})^{\perp}$ such that $(\tau_{0},\chi_{0})\in\tilde{\mathcal{V}}_{\delta^{\prime}}$ and $(e^{J_{\tau}v})^{*}(\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J_{\tau_{0}}}\widetilde{\chi})=\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}.$ Note that a Kähler potential $\widetilde{\chi}$ of KR soliton with respect to $X$ on $(M,J_{\tau_{0}})$ satisfies $\xi(\widetilde{\chi})=0$ [35]. Therefore, there is a KR soliton $\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}$ on $(M,J_{\tau_{0}})$ such that (8.13) $\displaystyle\chi_{0}\in{\rm ker}(H_{2})^{\perp}~{}{\rm and}~{}(\tau_{0},\chi_{0})\in\tilde{\mathcal{V}}_{\delta^{\prime}}.$ Decompose $\psi_{\tau^{\prime}}$ in (8.11) as (8.14) $\displaystyle\psi_{\tau^{\prime}}=\psi_{\tau_{0}}+\psi_{\tau_{1}},~{}\psi_{\tau_{0}}\in Z,~{}\psi_{\tau_{1}}\in Z^{\perp}.$ Then by (8.13), there are Kähler potentials $\chi_{0}$ and $\chi_{1}\in{\rm ker}(H_{2})^{\perp}$ such that (8.15) $\displaystyle\chi^{\prime}=\chi_{0}+\chi_{1},$ where $\omega+\sqrt{-1}\partial_{J_{\tau_{0}}}\bar{\partial}_{J{\tau_{0}}}\chi_{0}$ is a KR soliton. Thus, we get the following expansion for the reduced entropy $\nu$, (8.16) $\displaystyle\nu(\tau^{\prime},\chi^{\prime})=\nu(\tau_{0},\chi_{0})+\frac{1}{2}(D^{2}_{(\tau_{0},\chi_{0})+\zeta(\tau_{1},\chi_{1})}\nu)((\tau_{1},\chi_{1}),(\tau_{1},\chi_{1})).$ Here $\zeta\in(0,1)$. Since $D^{2}_{(0,0)}\nu(0,\cdot)$ is strictly negative on ${\rm ker}(H_{2})^{\perp}$ [40], by the assumption in Lemma 8.4, it is strictly negative on ${\rm ker}(H_{1})^{\perp}\times{\rm ker}(H_{2})^{\perp}$. It follows that $D^{2}_{(\tau_{0},\chi_{0})+\zeta(\tau_{1},\chi_{1})}\nu$ is strictly negative on ${\rm ker}(H_{1})^{\perp}\times{\rm ker}(H_{2})^{\perp}$. Hence, we derive (8.17) $\displaystyle\nu(\tau^{\prime},\chi^{\prime})\leq\nu(\tau_{0},\chi_{0}).$ As a consequence, we prove $\lambda(g_{\tau,\chi})\leq\lambda(g_{\tau_{0},\chi_{0}})=\lambda(g_{KS}).$ ∎ By Lemma 8.4, we can use the argument in the proof of Theorem 6.1 (or Theorem 8.1) to finish the proof of Theorem 0.3. We leave it to the reader. We end this subsection by the following two remarks to Theorem 0.3. ###### Remark 8.5. In Theorem 0.3, we can actually prove that the convergence is of polynomial rate of any order. This is because we can improve the Lojasiewicz inequality of (5.1) for $\nu(\cdot)$ in Proposition 5.1 as follows: For any $a=(\varphi,\chi)\in\mathcal{V}_{\epsilon}$ it holds (8.18) $\displaystyle\|\nabla\nu(a^{\prime})\|_{L^{2}}\geq c_{0}|\nu(a^{\prime})-\nu(0)|^{\frac{1}{2}},$ where $a^{\prime}=(\tau^{\prime},\chi^{\prime})\in\mathcal{V}_{\delta^{\prime}}$ is determined in (8.11). It follows that the Lojasiewicz inequality of (6.11) for $\lambda(\cdot)$ along the flow holds for any $\alpha^{\prime}>\frac{1}{2}.$ Hence, by (6), the convergence is of polynomial rate of any order. (8.18) can be proved together with (5) and (5) since the functional $F$ there can vanish by the decompositions (8.14) and (8.15). ###### Remark 8.6. We call the KR flow $\widetilde{\omega}(t)$ of (0.1) is stable on $(M,J_{\psi_{\tau}})$ if it converges smoothly to a KR soliton $(M_{\infty},J_{\infty},\omega_{\infty})$ with $\lambda(\omega_{\infty})=\lambda(\omega_{KS})$. In Theorem 0.3, we show that the flow (0.1) is always stable for any complex structure in the deformation space under the conditions of (1) and (2). By the above argument (also see Remark 6.2), it is easy to see that the flow $\widetilde{\omega}(t)$ is stable on $(M,J_{\psi_{\tau}})$ if and only if the energy level $L([M,J_{\psi_{\tau}}])$ of flow is equal to $\lambda(\omega_{KS}).$ Here (8.19) $\displaystyle L([M,J_{\psi_{\tau}}])=\lim_{t}\lambda(\widetilde{\omega}(t)),$ which is independent of flow $\widetilde{\omega}(t)$ with the initial metric $\widetilde{\omega}_{0}\in 2\pi c_{1}(M,J_{\psi_{\tau}})$ [38, 11, 45]. ## References * [1] Atiyah, M.F. and Singer, M.I., The index of elliptic operator, III, Ann. of Math. (2) 87 (1968), 546-604. * [2] Bamler, R., Convergence of Ricci flows with bounded scalar curvature, Ann. Math. 188 (2018), 753-831. * [3] Berman, R. and Nystrom, D., Complex optimal transport and the pluripotential theory of Kähler-Ricci solitons , arXiv: 1401.8264. * [4] Calabi, E., Extremal Kähler metric, Seminar on Differential Geometry, pp. 259-290, Ann. of Math. Stud., 102, Princeton Univ. Press, Princeton, N.J., 1982. * [5] Cao, H.D., Hamilton, S. and Ilmanen, T., Gaussian densities and stability for some Ricci solitons, arXiv:0404165. * [6] Cao, H.D., Sun, X., Yau, S.T. and Zhang, Y., On deformation of fano manifolds, arXiv:2006.01355. * [7] Chen, X. and Wang, B., Space of Ricci flows (II)-Part B: Weak compactness of the flows, J. Differential Geom. 116 (2020), 1-123. * [8] Chen, X. and Sun, S., Calabi flow, geodesic rays, and uniqueness of constant scalar curvature Kähler metrics, Ann. of Math. (2) 180 (2014), no. 2, 407-454. * [9] Chen, X., Sun S., and Wang B., Kähler-Ricci flow, Kähler-Einstein metric, and K-stability, Geometry and Topology, 22 (2018), 3145-3173. * [10] Datar, D. and Székelyhidi, G., Kähler-Einstein metrics along the smooth continuity method, Geom. Funct. Anal. 26 (2016), no. 4, 975-1010. * [11] Dervan, R. and Székelyhidi G., Kähler-Ricci flow and optimal degenerations, J. Differential Geom. 116 (2020), no. 1, 187-203. * [12] Donaldson, S., Remarks on gauge theory, complex geometry and 4-manifold topology, Fields Medallists’ lectures, 384-403, World Sci. Ser. 20th Century Math., 5, World Sci. Publ., River Edge, NJ, 1997. * [13] Kuranishi, M., New proof for the existence of locally complete families of complex structures,1965 Proc. Conf. Complex Analysis (Minneapolis, 1964) pp. 142-154 Springer, Berlin. * [14] Kodaira, K., Complex manifolds and deformation of complex structures, Springer-Verlag, Berlin, 2005. x+465 pp. ISBN: 3-540-22614-1. * [15] Koiso, N., Einstein metrics and complex structures, Invent. Math. 73 (1983), no. 1, 71-dh106. * [16] Han, Z. and Li, C., Algebraic uniqueness of Kähler-Ricci flow limits and optimal degenerations of Fano varieties, arXiv: 2009.01010v1. * [17] Hall S and Murphy T., On the linear stability of Kähler-Ricci solitons, Proc. Amer. Math. Soc. 139 (2011), no. 9, 3327-3337. * [18] Hall S and Murphy T., Variation of complex structures and the stability of Kähler-Ricci solitons, Pacific J. Math. 265 (2013), no. 2, 441-454. * [19] Inoue, E., The moduli space of Fano manifolds with Kähler Ricci solitons. Adv. Math. 357 (2019), 106841, 65 pp. * [20] Li, C., Yau-Tian-Donaldson correspondence for K-semistable Fano manifolds, J. Reine Angew. Math, 733 (2017), 55-85. * [21] Li, Y., Tian G. and Zhu X.H., Singular limits of Kähler-Ricci flow on Fano $G$-manifolds, arXiv:1807.09167. * [22] Li, C. and Xu, C., Special test-configurations and K-stability of Fano varieties, Ann. of Math. 180 (2014), no.1, 197-232. * [23] Li, C. and Xu, C. and Wang X., Quasi-projectivity of the moduli space of smooth Kähler-Einstein Fano manifolds, Ann. Sci. Ec. Norm. Super. (4) 51 (2018), no. 3, 739-772. * [24] Li, C., Xu, C. and Wang X., On the proper moduli spaces of smoothable Kähler-Einstein Fano varieties, Duke Math. J. 168 (2019), no. 8, 1387-1459. * [25] Morrow, J. and Kodaira, K., Complex manifolds, AMS Chelsea Publishing, Providence, RI, 2006. x+194 pp. ISBN: 0-8218-4055-X. * [26] Pasquier, B., On some smooth projective two-orbit varieties with Picard number 1, Math. Ann. 344 (2009), no. 4, 963-987. * [27] Pali, N., Variational stability of Kähler-Ricci solitons, Adv. Math. 290 (2016), 15-35. * [28] Pali, N., Concavity of Perelman’s W -functional over the space of Kähler potentials, Eur. J. Math. 3 (2017), no. 3, 587-602. * [29] Perelman, G., The entropy formula for the Ricci flow and its geometric applications, arXiv:0211159, 2002. * [30] Rothaus, O., Logarithmic Sobolev inequality and the spectrum of Schördinger operators, J. Funct Anal, 42 (1981), 110-120. * [31] Rudin, W., Functional analysis, McGraw-Hill, Inc., New York, 1991. xviii+424 pp. ISBN: 0-07-054236-8. * [32] Sun, S. and Wang, Y., On the Kähler-Ricci flow near a Kähler-Einstein metric, J. Reine Angew. Math. 699 (2015), 143-158. * [33] Székelyhidi, G., The Kähler-Ricci flow and K-polystability, Amer. J. Math. 132 (2010), no. 4, 1077-1090. * [34] Tian, G., Kähler-Einstein metrics with positive scalar curvature, Invent. Math. 130 (1997), no. 1, 1-37. * [35] Tian, G. and Zhu, X. H., Uniqueness of Kähler-Ricci solitons, Acta Math. 184 (2000), no. 2, 271-305. * [36] Tian, G. and Zhu, X. H., A new holomorphic invariant and uniqueness of Kähler Ricci solitons, Comment. Math. Helv. 77 (2002), no. 2, 297-325. * [37] Tian, G. and Zhu, X. H., Convergence of the Kähler-Ricci flow, J. Amer Math. Sci. 17 (2007), 675-699. * [38] Tian, G. and Zhu, X. H., Convergence of the Kähler-Ricci flow on Fano manifolds, J. Reine Angew. Math. 678 (2013), 223-245. * [39] Tian, G., Zhang, S., Zhang, Z. and Zhu, X. H., Perelman’s entropy and Kähler-Ricci flow an a Fano Manifold, Tran. AMS. 365 (2013), 6669-6695. * [40] Tian, G. and Zhu, X. H., Perelman’s $W$-functional and stability of Kähler-Ricci flows, Progress in Math., vol 2 (2018), n 1, 1-14; arXiv:0801.3504v2. * [41] Tosatti, V., The K-energy on small deformations of constant scalar curvature Kähler manifolds, Advances in geometric analysis, 139-147, Adv. Lect. Math. (ALM), 21, Int. Press, Somerville, MA, 2012. * [42] Xiong M., Kähler-Ricci solitons and generalized Tian-Zhu’s invariant, Internat. J. Math. 25 (2014), no. 7, 1450068, 13 pp. * [43] Wang, Y., On Ricci solitons and Ricci flows, Thesis (Ph.D.), The University of Wisconsin-Madison. 2011. 91 pp. * [44] Wang, F. and Zhu, X. H., The structure of spaces with Bakry-Émery Ricci curvature bounded below, J. Reine Angew. Math. 757 (2019), 1-50. * [45] Wang, F. and Zhu, X. H., Uniformly strong convergence of Kähler-Ricci flows on a Fano manifold, arXiv: 2009.10354 * [46] Wang, F. and Zhu, X. H., Tian’s partial $C^{0}$-estimate implies Hamilton-Tian’s conjecture, Adv. Math. 381 (2021), 107619, 29 pp. * [47] Wang, F., Zhou, B. and Zhu, X. H., Modified Futaki invariant and equivariant Riemann-Roch formula, Adv. Math. 289 (2016), 1205-1235. * [48] Zhang, L., Lower bound of modified $K$-energy on a Fano manifold with degeneration to Kähler-Ricci solitons, preprint, 2021. * [49] Zhu, X.H. Stability on Kähler-Ricci flow on a compact Kähler manifold with positive first Chern class, Math. Ann. 356 (2013), 1425-1454.
arxiv-papers
2021-07-27T09:07:25
2024-09-04T03:07:20.982767
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Gang Tian, Liang Zhang and Xiaohua Zhu", "submitter": "Xiaohua Zhu", "url": "https://arxiv.org/abs/2107.12680" }
2107.12681
# Uniqueness of conservative solutions for the Hunter–Saxton equation Katrin Grunert Department of Mathematical Sciences NTNU Norwegian University of Science and Technology NO-7491 Trondheim Norway [email protected] https://www.ntnu.edu/employees/katrin.grunert and Helge Holden Department of Mathematical Sciences NTNU Norwegian University of Science and Technology NO-7491 Trondheim Norway [email protected] https://www.ntnu.edu/employees/holden ###### Abstract. We show that the Hunter–Saxton equation $u_{t}+uu_{x}=\frac{1}{4}\big{(}\int_{-\infty}^{x}d\mu(t,z)-\int^{\infty}_{x}d\mu(t,z)\big{)}$ and $\mu_{t}+(u\mu)_{x}=0$ has a unique, global, weak, and conservative solution $(u,\mu)$ of the Cauchy problem on the line. ###### Key words and phrases: Hunter–Saxton equation, uniqueness, conservative solutions ###### 1991 Mathematics Subject Classification: Primary: 35A02, 35L45 Secondary: 35B60 We acknowledge support by the grants Waves and Nonlinear Phenomena (WaNP) and Wave Phenomena and Stability — a Shocking Combination (WaPheS) from the Research Council of Norway. ## 1\. Introduction The Hunter–Saxton (HS) equation [14] reads $\displaystyle u_{t}+uu_{x}$ $\displaystyle=\frac{1}{4}\Big{(}\int_{-\infty}^{x}d\mu(t,z)-\int^{\infty}_{x}d\mu(t,z)\Big{)},$ $\displaystyle\mu_{t}+(u\mu)_{x}$ $\displaystyle=0.$ Here $u$ is an $H^{1}(\mathbb{R})$ function for each time $t$, and $\mu(t)$ is a non-negative Radon measure. Derived in the context of modeling liquid crystals, the HS equation has turned out to have considerable interest mathematically. It has, e.g., a geometric interpretation [17, 19, 20, 21, 18], convergent numerical methods [9, 12], and a stochastic version [11], in addition to numerous extensions and generalizations [24, 25], too many to mention here. The first comprehensive study appeared in [15, 16]. While the HS equation was originally derived on differential form $(u_{t}+uu_{x})_{x}=\frac{1}{2}u_{x}^{2},$ where, in the case of smooth functions, $\mu$ equal to $u_{x}^{2}$ will automatically satisfy the second equation, we prefer to work on the integrated version. Note that there are several ways to integrate this equation, say $u_{t}+uu_{x}=\frac{1}{2}\int_{0}^{x}u_{x}^{2}(t,y)dy,$ for which the uniqueness of conservative solutions on the half-line has been established in [5], but we prefer the more symmetric form. For us it is essential to introduce a measure $\mu(t)$ on the line such that for almost all times $d\mu=d\mu_{\rm ac}=u_{x}^{2}dx$. The times $t$ when $d\mu\neq u_{x}^{2}dx$ will precisely be the times when uniqueness can break down. Our task here is to analyze this situation in detail, and restore uniqueness by carefully selecting particular solutions called conservative solutions. The aim of this paper is to show the following uniqueness result (Theorems 3.6 and 5.10): For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton equation has a unique global conservative weak solution $(u,\mu)\in\mathcal{D}$. Here $\mathcal{D}$ is given in Definition 2.2. In the case of the so-called dissipative solutions, where energy is removed exactly at the times when the measure $\mu$ ceases to be absolutely continuous, the uniqueness question has been addressed in [7] by showing uniqueness of the characteristics. The problem at hand can be illustrated by the following explicit example [6]. Consider the trivial case $u_{0}=0$, which clearly has $u(t,x)=0$ as one solution. However, as can be easily verified, also (1.1) $u(t,x)=-\frac{\alpha}{4}t\,\mathbb{I}_{(-\infty,-\frac{\alpha}{8}t^{2})}(x)+\frac{2x}{t}\,\mathbb{I}_{(-\frac{\alpha}{8}t^{2},\frac{\alpha}{8}t^{2})}(x)+\frac{\alpha}{4}t\,\mathbb{I}_{(\frac{\alpha}{8}t^{2},\infty)}(x)$ is a solution for any $\alpha\geq 0$, with $\mu(0)=\alpha\delta_{0}$ and $d\mu(t)=4t^{-2}\mathbb{I}_{(-\alpha t^{2}/8,\alpha t^{2}/8)}(x)dx$ for $t\not=0$. Here $\mathbb{I}_{A}$ is the indicator (characteristic) function of the set $A$. Thus the initial value problem is not well-posed without further constraints. Furthermore, it turns out that the solution $u$ of the HS equation may develop singularities in finite time in the following sense: Unless the initial data is monotone increasing, we find (1.2) $\inf(u_{x})\to-\infty\text{ as }t\uparrow t^{*}=2/\sup(-u_{0}^{\prime}).$ Past wave breaking there are at least two different classes of solutions, denoted conservative (energy is conserved) and dissipative (where energy is removed locally) solutions, respectively, and this dichotomy is the source of the interesting behavior of solutions of the equation (but see also [8, 10]). We will in this paper consider the so-called conservative case where the associated energy is preserved. The natural approach to solve the HS equation is by the use of characteristics, i.e., to solve the equation (1.3) $\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi)),\quad\check{y}(0,\xi)=\check{y}_{0}(\xi).$ However, in this case the function $u=u(t,x)$ will in general only be Hölder and not Lipschitz continuous. This is the crux of the problem. Thus we cannot expect uniqueness of solutions of this equation. Indeed, it is precisely in the case where uniqueness fails that the HS equation encounters singularities. See [3, 5, 7, 26, 27, 28]. We will reformulate the HS equation in new variables, the aim being to identify variables where the singularities disappear. Rewriting the HS equation, using characteristics, yields a linear system of differential equations [4], $\displaystyle\check{y}_{t}(t,\xi)$ $\displaystyle=\check{U}(t,\xi),$ (1.4) $\displaystyle\check{U}_{t}(t,\xi)$ $\displaystyle=\frac{1}{2}(\check{H}(t,\xi)-\frac{1}{2}C),$ $\displaystyle\check{H}_{t}(t,\xi)$ $\displaystyle=0,$ where $C=\mu(0,\mathbb{R})=\mu(t,\mathbb{R})$. Here $\check{U}(t,\xi)=u(t,\check{y}(t,\xi))$ and $\check{H}(t,\xi)=\int_{-\infty}^{\check{y}(t,\xi)}u_{x}^{2}(t,x)dx$. This system describes weak, conservative solutions and can be integrated to yield $\displaystyle\check{y}(t,\xi)$ $\displaystyle=\check{y}(0,\xi)+t\big{(}\check{U}(0,\xi)+\frac{t}{4}(\check{H}(0,\xi)-\frac{1}{2}C)\big{)},$ $\displaystyle\check{U}(t,\xi)$ $\displaystyle=\check{U}(0,\xi)+\frac{t}{2}(\check{H}(0,\xi)-\frac{1}{2}C),$ $\displaystyle\check{H}(t,\xi)$ $\displaystyle=\check{H}(0,\xi).$ Here we may recover $(u,\mu)$ from $u(t,x)=\check{U}(t,\xi)$ for some $\xi$ such that $x=\check{y}(t,\xi)$ and $\mu=\check{y}_{\\#}(\check{H}_{\xi})d\xi$. In particular, it has been shown in [4], that given any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ there exists at least one conservative solution and this solution satisfies (1.4). On the other hand, the question of uniqueness of conservative solutions has not been addressed. This question can also be rephrased as: Do all conservative solutions satisfy (1.4)? In [6] we introduced a new set of coordinates, which allowed us, in contrast to [4], to construct a Lipschitz metric $d$, which is not based on equivalence classes. The underlying system of differential equations, which has been derived using pseudo-inverses and the system (1.4), is surprisingly simple, but forced us to impose an additional first moment condition111Condition (2.15) in [6], here stated in terms of the measure $\mu$., $\int_{\mathbb{R}}(1+\left|x\right|)d\mu_{0}<\infty$, on the measure. To be more specific, $d$ satisfies $d((u_{1},\mu_{1})(t),(u_{2},\mu_{2})(t))\leq\big{(}1+t+\frac{1}{8}t^{2}\big{)}d((u_{1},\mu_{1})(0),(u_{2},\mu_{2})(0))$ for any two weak, conservative solutions $(u_{i},\mu_{i})\in\mathcal{D}$, which satisfy the additional condition $\int_{\mathbb{R}}(1+\left|x\right|)d\mu_{i,0}<\infty$. The new coordinates are defined as follows. Let $\chi(t,\eta)=\sup\\{x\mid\mu(t,(-\infty,x))<\eta\\}$ and $\mathcal{U}(t,\eta)=u(t,\chi(t,\eta))$ and introduce $\hat{\chi}(t,\eta)=\chi(t,C\eta)$ and $\hat{}\mathcal{U}(t,\eta)=\mathcal{U}(t,C\eta)$ where $C=\mu(t,\mathbb{R})$. Then we define $d((u_{1},\mu_{1})(t),(u_{2},\mu_{2})(t))=\left\|\hat{}\mathcal{U}_{1}(t)-\hat{}\mathcal{U}_{2}(t)\right\|_{L^{\infty}}+\left\|\hat{\chi}_{1}(t)-\hat{\chi}_{2}(t)\right\|_{L^{1}}+\left|C_{1}-C_{2}\right|.$ However, a closer look reveals that one explicitly associates to any initial data the weak conservative solution computed using (1.4). Thus the question if all weak conservative solutions satisfy (1.4) is never addressed. Furthermore, to study stability questions for conservative solutions the coordinates from [6] seem to be favorable, but not for investigating the uniqueness. The main difficulty stems from the fact that for each $t\in\mathbb{R}$, the function $F(t,x)=\mu(t,(-\infty,x))$, where $\mu$ denotes a positive, finite Radon measure, is increasing but not necessarily strictly increasing. This means, in particular, that its spatial inverse $\chi(t,\eta)$ might have jumps. Time evolution of increasing functions with possible jumps can lead to the same problems as for conservation laws. What happens to jumps as time evolves? Do they satisfy some kind of Rankine–Hugoniot condition or do they behave more like rarefaction waves? In [6] this issue has been resolved by using the system (1.4) to show that any jump preserves position and height. Thus the associated system for $(\chi(t,\eta),\mathcal{U}(t,\eta))$ cannot be treated using classical ODE theory, but only in a weak sense with some additional constraints. Hence these new variables would not simplify the study of uniqueness questions. Given a conservative solution $(u,\mu)$, define the quantities $\displaystyle y(t,\xi)$ $\displaystyle=\sup\\{x\mid x+\mu(t,(-\infty,x))<\xi\\},$ $\displaystyle U(t,\xi)$ $\displaystyle=u(t,y(t,\xi)),$ $\displaystyle\tilde{H}(t,\xi)$ $\displaystyle=\xi-y(t,\xi).$ Then one can derive, see Theorem 3.4, that these quantities satisfy $\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$ $\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$ $\displaystyle=0,$ $\displaystyle U_{t}(t,\xi)+UU_{\xi}(t,\xi)$ $\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C).$ In contrast to $u(t,x)$, the function $U(t,\xi)$ is Lipschitz continuous and hence the above system can be solved uniquely using the method of characteristics, which is sufficient to ensure the uniqueness of conservative solutions. In particular, it can be shown that by applying the method of characteristics the above system turns into (1.4), see Remark 3.5. Although the uniqueness question is successfully addressed, the above system has one main drawback: The definition of the function $y(t,\xi)$ is far from unique. On the other hand, the above system can be used to find other equivalent formulations of the Hunter–Saxton equation, which might be advantageous for addressing, e.g., stability questions. As an illustration, we here introduce a novel set of coordinates, which can be studied on its own, without relying on special properties of solutions to (1.4) and which avoids the formation of jumps but requires to impose additional moment conditions. The main idea is to introduce an auxiliary measure $\nu$, such that $G(t,x)=\nu(t,(-\infty,x))$ is strictly increasing for each $t\in\mathbb{R}$. To that end define the auxiliary function (the power $n$ to be fixed later) $p(t,x)=\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y),$ which will be a smooth function for all Radon measures $\mu$ and let $\displaystyle\chi(t,\eta)$ $\displaystyle=\sup\\{x\mid\nu(t,(-\infty,x))<\eta\\}$ $\displaystyle=\sup\\{x\mid\int_{-\infty}^{x}p(t,y)dy+\mu(t,(-\infty,x))<\eta\\},$ $\displaystyle\mathcal{U}(t,\eta)$ $\displaystyle=u(t,\chi(t,\eta)),$ $\displaystyle\mathcal{P}(t,\eta)$ $\displaystyle=p(t,\chi(t,\eta)).$ Provided $(u,\mu)$ is a weak, conservative solution of the HS equation, which satisfies an additional moment condition, see (5.2), we show, cf. Theorem 5.9, that the triplet $(\chi(t,\eta),\mathcal{U}(t,\eta),\mathcal{P}(t,\eta))$ satisfies (1.5a) $\displaystyle\chi_{t}+h\chi_{\eta}$ $\displaystyle=\mathcal{U},$ (1.5b) $\displaystyle\mathcal{U}_{t}+h\mathcal{U}_{\eta}$ $\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$ (1.5c) $\displaystyle\mathcal{P}_{t}+h\mathcal{P}_{\eta}$ $\displaystyle=\mathcal{R}$ where (1.6) $\displaystyle h(t,\eta)$ $\displaystyle=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$ $\displaystyle\mathcal{R}(t,\eta)$ $\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$ (1.7) $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}.$ In particular, $h(t,\eta)$ is continuous w.r.t. time and Lipschitz continuous w.r.t. space, so that the above system has a unique solution and can be solved by applying the method of characteristics. This is sufficient to ensure the uniqueness of conservative solutions that satisfy an additional moment condition, cf. Theorem 5.10. ## 2\. Background In this section we introduce the concept of weak conservative solutions for the Hunter–Saxton equation. Afterwards we show that there indeed exists at least one weak conservative solution to every admissible initial data. We use $\mathcal{C}_{c}^{\infty}$ to denote smooth functions with compact support and $\mathcal{C}_{0}^{\infty}$ to denote smooth functions that vanish at infinity. As a starting point we introduce the spaces we work in. ###### Definition 2.1. Let $E$ be the vector space defined by (2.1) $E=\\{f\in L^{\infty}(\mathbb{R})\mid f^{\prime}\in L^{2}(\mathbb{R})\\}$ equipped with the norm $\left\|f\right\|_{E}=\left\|f\right\|_{L^{\infty}}+\left\|f^{\prime}\right\|_{L^{2}}$. Furthermore, let $H_{1}^{1}(\mathbb{R})=H^{1}(\mathbb{R})\times\mathbb{R}\quad\text{and}\quad H_{2}^{1}(\mathbb{R})=H^{1}(\mathbb{R})\times\mathbb{R}^{2}.$ Write $\mathbb{R}$ as $\mathbb{R}=(-\infty,1)\cup(-1,\infty)$ and consider the corresponding partition of unity $\psi^{+}$ and $\psi^{-}$, i.e., $\psi^{+}$ and $\psi^{-}$ belong to $C^{\infty}(\mathbb{R})$, $\psi^{-}+\psi^{+}\equiv 1$, $0\leq\psi^{\pm}\leq 1$, $\operatorname{supp}(\psi^{-})\subset(-\infty,1)$, and $\operatorname{supp}(\psi^{+})\subset(-1,\infty)$. Furthermore, introduce the linear mapping $\mathcal{R}_{1}$ from $H_{1}^{1}(\mathbb{R})$ to $E$ defined as $(\bar{f},a)\mapsto f=\bar{f}+a\psi^{+},$ and the linear mapping $\mathcal{R}_{2}$ from $H_{2}^{1}(\mathbb{R})$ to $E$ defined as $(\bar{f},a,b)\mapsto f=\bar{f}+a\psi^{+}+b\psi^{-}.$ The mappings $\mathcal{R}_{1}$ and $\mathcal{R}_{2}$ are linear, continuous, and injective. Accordingly introduce $E_{1}$ and $E_{2}$, the images of $H_{1}^{1}(\mathbb{R})$ and $H_{2}^{1}(\mathbb{R})$ by $\mathcal{R}_{1}$ and $\mathcal{R}_{2}$, respectively, i.e., (2.2) $E_{1}=\mathcal{R}_{1}(H_{1}^{1}(\mathbb{R}))\quad\text{ and }\quad E_{2}=\mathcal{R}_{2}(H_{2}^{1}(\mathbb{R})).$ The corresponding norms are given by $\left\|f\right\|_{E_{1}}=\left\|\bar{f}+a\psi^{+}\right\|_{E_{1}}=\Big{(}\left\|\bar{f}\right\|_{L^{2}}^{2}+\left\|\bar{f}^{\prime}\right\|_{L^{2}}^{2}+a^{2}\Big{)}^{1/2}$ and $\left\|f\right\|_{E_{2}}=\left\|\bar{f}+a\psi^{+}+b\psi^{-}\right\|_{E_{2}}=\Big{(}\left\|\bar{f}\right\|_{L^{2}}^{2}+ \left\|\bar{f}^{\prime}\right\|_{L^{2}}^{2}+a^{2}+b^{2}\Big{)}^{1/2}.$ Note that the mappings $\mathcal{R}_{1}$ and $\mathcal{R}_{2}$ are also well- defined for all $(\bar{f},a)\in L^{2}_{1}(\mathbb{R})=L^{2}(\mathbb{R})\times\mathbb{R}$ and $(\bar{f},a,b)\in L_{2}^{2}(\mathbb{R})=L^{2}(\mathbb{R})\times\mathbb{R}^{2}$. Accordingly, let $E^{0}_{1}=\mathcal{R}_{1}(L^{2}_{1}(\mathbb{R}))\quad\text{ and }\quad E^{0}_{2}=\mathcal{R}_{1}(L^{2}_{2}(\mathbb{R}))$ equipped with the norms $\left\|f\right\|_{E^{0}_{1}}=\left\|\bar{f}+a\psi^{+}\right\|_{E^{0}_{1}}=\big{(}\left\|\bar{f}\right\|^{2}_{L^{2}}+a^{2}\big{)}^{1/2}$ and $\left\|f\right\|_{E^{0}_{2}}=\left\|\bar{f}+a\psi^{+}+b\psi^{-}\right\|_{E^{0}_{2}}=\big{(}\left\|\bar{f}\right\|^{2}_{L^{2}}+a^{2}+b^{2}\big{)}^{1/2},$ respectively. With these spaces in mind, we can define next the admissible set of initial data. ###### Definition 2.2 (Eulerian coordinates). The space $\mathcal{D}$ consists of all pairs $(u,\mu)$ such that * • $u\in E_{2}$, * • $\mu\in\mathcal{M}^{+}(\mathbb{R})$, * • $\mu((-\infty,\,\cdot\,))\in E_{1}^{0}$, * • $d\mu_{\rm ac}=u_{x}^{2}dx$, where $\mathcal{M}^{+}(\mathbb{R})$ denotes the set of positive, finite Radon measures on $\mathbb{R}$. A weak conservative solution is not only a weak solution of the Hunter–Saxton equation, but has to satisfy several additional conditions, which make it possible to single out a unique, energy preserving solution. ###### Definition 2.3. We say that $(u,\mu)$ is a weak conservative solution of the Hunter–Saxton equation with initial data $(u(0,\,\cdot\,),\mu(0,\,\cdot\,))\in\mathcal{D}$ if 1. (i) At each fixed $t$ we have $u(t,\,\cdot\,)\in E_{2}$. 2. (ii) At each fixed $t$ we have $\mu(t,(-\infty,\,\cdot\,))\in E^{0}_{1}$ and $d\mu_{\rm ac}(t)=u_{x}^{2}(t,\,\cdot\,)dx$. 3. (iii) The pair $(u,\mu)$ satisfies for any $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ (2.3a) $\displaystyle\int_{0}^{\infty}\int_{\mathbb{R}}\Big{[}u\phi_{t}+\frac{1}{2}u^{2}\phi_{x}+\frac{1}{4}\left(\int_{-\infty}^{x}d\mu(t)-\int_{x}^{\infty}d\mu(t)\right)\phi\Big{]}dxdt$ $\displaystyle=-\int_{\mathbb{R}}u\phi|_{t=0}dx,$ (2.3b) $\displaystyle\int_{0}^{\infty}\int_{\mathbb{R}}(\phi_{t}+u\phi_{x})d\mu(t)dt$ $\displaystyle=-\int_{\mathbb{R}}\phi|_{t=0}d\mu(0).$ 4. (iv) The function $u(t,x)$ defined on $[0,T]\times\mathbb{R}$ is Hölder continuous and the map $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from $[0,T]$ into $E^{0}_{2}$. 5. (v) There exists a set $\mathcal{N}\subset\mathbb{R}$ with $\operatorname{meas}(\mathcal{N})=0$ such that for every $t\not\in\mathcal{N}$ the measure $\mu(t)$ is absolutely continuous and has density $u_{x}^{2}(t,\,\cdot\,)$ w.r.t. the Lebesgue measure. 6. (vi) The family of Radon measures $\\{\mu(t)\mid t\in\mathbb{R}\\}$ depends continuously on time w.r.t. the topology of weak convergence of measures. Note that the family $\\{\mu(t)\mid t\in\mathbb{R}\\}$ provides a measure- valued solution $w$ to the linear transport equation $w_{t}+(uw)_{x}=0.$ Thus one has that $\mu(t,\mathbb{R})=\mu(0,\mathbb{R})$ for all $t\in\mathbb{R}$. In [4] weak conservative solutions in $\mathcal{D}$ have been constructed. A closer look at their construction reveals that the following theorem holds. ###### Theorem 2.4. For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton equation has a global conservative weak solution $(u,\mu)$ in the sense of Definition 2.3. In other words, all the properties stated in Definition 2.3 are satisfied for the conservative solutions constructed in [4]. However, some of them are better hidden than others. This is especially true for (iv) and (vi), which we show here. We start by recalling the set of Lagrangian coordinates. ###### Definition 2.5 (Lagrangian coordinates). The set $\mathcal{F}$ consists of all triplets $(\check{y},\check{U},\check{H})$ such that * • $(\check{y}-\operatorname{Id},\check{U},\check{H})\in E_{2}\times E_{2}\times E_{1}$, * • $(\check{y}-\operatorname{Id},\check{U},\check{H})\in[W^{1,\infty}(\mathbb{R})]^{3}$, * • $\displaystyle{\lim_{\xi\to-\infty}}\check{H}(\xi)=0$, * • $\check{y}_{\xi}\geq 0$, $\check{H}_{\xi}\geq 0$ a.e., * • there exists $c>0$ such that $\check{y}_{\xi}+\check{H}_{\xi}\geq c>0$ a.e., * • $\check{U}_{\xi}^{2}=\check{y}_{\xi}\check{H}_{\xi}$ a.e.. Note that there cannot be a one-to-one correspondence between Eulerian and Lagrangian coordinates. Instead, one has that each element in Eulerian coordinates corresponds to an equivalence class in Lagrangian coordinates. Furthermore, all elements belonging to one and the same equivalence class can be identified using so-called relabeling functions. ###### Definition 2.6 (Relabeling functions). We denote by $\mathcal{G}$ the group of homeomorphisms $f$ from $\mathbb{R}$ to $\mathbb{R}$ such that (2.4) $\displaystyle f-\operatorname{Id}\text{ and }$ $\displaystyle f^{-1}-\operatorname{Id}\text{ both belong to }W^{1,\infty}(\mathbb{R}),$ (2.5) $\displaystyle f_{\xi}-1\text{ belongs to }L^{2}(\mathbb{R}),$ where $\operatorname{Id}$ denotes the identity function. Let $X_{1}=(\check{y}_{1},\check{U}_{1},\check{H}_{1})$ and $X_{2}=(\check{y}_{2},\check{U}_{2},\check{H}_{2})$ in $\mathcal{F}$. Then $X_{1}$ and $X_{2}$ belong to the same equivalence class if there exists a relabeling function $f\in\mathcal{G}$ such that $X_{1}\circ f=(\check{y}_{1}\circ f,\check{U}_{1}\circ f,\check{H}_{1}\circ f)=(\check{y}_{2},\check{U}_{2},\check{H}_{2})=X_{2}.$ Furthermore, let $\mathcal{F}_{0}=\\{(\check{y},\check{U},\check{H})\in\mathcal{F}\mid\check{y}+\check{H}=\operatorname{Id}\\}.$ Then $\mathcal{F}_{0}$ contains exactly one representative of each equivalence class in $\mathcal{F}$. Note that if $X=(\check{y},\check{U},\check{H})\in\mathcal{F}_{0}$ and $f\in\mathcal{G}$, then one has $\check{y}\circ f+\check{H}\circ f=f.$ This implies that for each $X=(\check{y},\check{U},\check{H})\in\mathcal{F}$ one has that $\check{y}+\check{H}\in\mathcal{G}$. Whether or not a function is a relabeling function, can be checked using the following lemma, which is taken from [13]. ###### Lemma 2.7 (Identifying relabeling functions). If $f$ is absolutely continuous, $f-\operatorname{Id}\in W^{1,\infty}(\mathbb{R})$, $f_{\xi}-1\in L^{2}(\mathbb{R})$, and there exists $c\geq 1$ such that $\frac{1}{c}\leq f_{\xi}\leq c$ almost everywhere, then $f\in\mathcal{G}$. In [4], one rewrites the Hunter–Saxton equation, with the help of a generalized method of characteristics as a linear system of differential equations, cf. (1.4), (2.6a) $\displaystyle\check{y}_{t}(t,\xi)$ $\displaystyle=\check{U}(t,\xi),$ (2.6b) $\displaystyle\check{U}_{t}(t,\xi)$ $\displaystyle=\frac{1}{2}(\check{H}(t,\xi)-\frac{1}{2}C),$ (2.6c) $\displaystyle\check{H}_{t}(t,\xi)$ $\displaystyle=0,$ where $C=\mu(0,\mathbb{R})=\mu(t,\mathbb{R})$. This system of differential equations does not preserve $\mathcal{F}_{0}$, but respects equivalence classes. It can be integrated to yield (2.7a) $\displaystyle\check{y}(t,\xi)$ $\displaystyle=\check{y}(0,\xi)+t\big{(}\check{U}(0,\xi)+\frac{t}{4}(\check{H}(0,\xi)-\frac{1}{2}C)\big{)},$ (2.7b) $\displaystyle\check{U}(t,\xi)$ $\displaystyle=\check{U}(0,\xi)+\frac{t}{2}(\check{H}(0,\xi)-\frac{1}{2}C),$ (2.7c) $\displaystyle\check{H}(t,\xi)$ $\displaystyle=\check{H}(0,\xi),$ with initial data determined as introduced next in (2.8). The connection between the pairs $(u,\mu)\in\mathcal{D}$ and the triplet $(\check{y},\check{U},\check{H})\in\mathcal{F}$ is given by the following definitions. ###### Definition 2.8. Let the mapping $L\colon\mathcal{D}\to\mathcal{F}_{0}$ be defined by $L(u,\mu)=(\check{y},\check{U},\check{H})$, where (2.8a) $\displaystyle\check{y}(\xi)$ $\displaystyle=\sup\\{x\mid x+\mu((-\infty,x))<\xi\\},$ (2.8b) $\displaystyle\check{H}(\xi)$ $\displaystyle=\xi-\check{y}(\xi),$ (2.8c) $\displaystyle\check{U}(\xi)$ $\displaystyle=u\circ\check{y}(\xi).$ ###### Definition 2.9. Let the mapping $M\colon\mathcal{F}\to\mathcal{D}$ be defined by $M(\check{y},\check{U},\check{H})=(u,\mu)$, where222The push-forward of a measure $\nu$ by a measurable function $f$ is the measure $f_{\\#}\nu$ defined by $f_{\\#}\nu(B)=\nu(f{{}^{-1}}(B))$ for all Borel sets $B$. (2.9a) $\displaystyle u(x)$ $\displaystyle=\check{U}(\xi)\quad\text{ for some }\xi\text{ such that }x=\check{y}(\xi),$ (2.9b) $\displaystyle\mu$ $\displaystyle=\check{y}_{\\#}(\check{H}_{\xi})d\xi.$ Now we can finally focus on showing that the weak conservative solutions constructed in [4] satisfy Definition 2.3 (iv) and (vi). ### 2.1. On the Hölder continuity in the definition of weak conservative solutions In [4] a generalized method of characteristics was used to construct weak conservative solutions as outlined above. This ansatz yields solutions $u$ that are Hölder continuous with respect to space and time, but not Lipschitz continuous. Indeed, assume we are given a solution $(u,\mu)$ with corresponding Lagrangian coordinates $(\check{y},\check{U},\check{H})$ satisfying (2.6). Choose two points $(t_{1},x_{1})$ and $(t_{2},x_{2})$. Then we can find $\xi_{1}$ and $\xi_{2}$ such that (2.10) $\check{y}(t_{1},\xi_{1})=x_{1}\quad\text{ and }\quad\check{y}(t_{2},\xi_{2})=x_{2}.$ Thus we have $\displaystyle|u(t_{1},x_{1})-u(t_{2},x_{2})|$ $\displaystyle\leq|u(t_{1},\check{y}(t_{1},\xi_{1}))-u(t_{2},\check{y}(t_{2},\xi_{1}))|$ (2.11) $\displaystyle\quad+|u(t_{2},\check{y}(t_{2},\xi_{1}))-u(t_{2},\check{y}(t_{1},\xi_{1}))|$ $\displaystyle\quad+|u(t_{2},x_{1})-u(t_{2},x_{2})|.$ As far as the first term on the right-hand side is concerned, we have (2.12) $|u(t_{1},\check{y}(t_{1},\xi_{1}))-u(t_{2},\check{y}(t_{2},\xi_{1}))|=|\check{U}(t_{1},\xi_{1})-\check{U}(t_{2},\xi_{1})|\leq\frac{1}{4}C|t_{2}-t_{1}|,$ where we have used that $-\frac{1}{4}C\leq\frac{1}{2}\check{H}(t,\xi)-\frac{1}{4}C\leq\frac{1}{4}C$. For the second term observe that the time variable is the same, but not the space variable. In particular, we have $\displaystyle|u(t_{2},\check{y}(t_{2},\xi_{1}))-u(t_{2},\check{y}(t_{1},\xi_{1}))|$ $\displaystyle\leq C^{1/2}\big{(}\check{y}(t_{2},\xi_{1})-\check{y}(t_{1},\xi_{1})\big{)}^{1/2}$ $\displaystyle\leq C^{1/2}\Big{(}|\check{U}(t_{1},\xi_{1})||t_{2}-t_{1}|+\frac{1}{8}C(t_{2}-t_{1})^{2}\Big{)}^{1/2}$ (2.13) $\displaystyle\leq C^{1/2}\Big{(}|\check{U}(0,\xi_{1})|+\frac{3}{8}CT\Big{)}^{1/2}|t_{2}-t_{1}|^{1/2}.$ Here we used that $u_{x}\in L^{2}(\mathbb{R})$ and $d\mu_{\rm ac}=u_{x}^{2}dx$ combined with the Cauchy–Schwarz inequality. Similar considerations yield (2.14) $|u(t_{2},x_{1})-u(t_{2},x_{2})|\leq C^{1/2}|x_{2}-x_{1}|^{1/2},$ thus one ends up with Hölder continuity with Hölder exponent $\frac{1}{2}$. An important consequence of the above observation is the following. The solution to the ODE $\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi))$ would be unique if the function $u(t,\,\cdot\,)$ were Lipschitz continuous. According to (2.14) this function is Hölder continuous with exponent $\frac{1}{2}$, which leads to the possibility that there might exist several weak conservative solutions to one and the same initial data. Moreover, one has, in general, that $|u(t,x)-u(t,y)|\leq\left\|u_{x}(t,\,\cdot\,)\right\|_{L^{\infty}}|y-x|,$ and hence every time wave breaking occurs, the Lipschitz continuity is lost. ### 2.2. On the Lipschitz continuity in the definition of weak conservative solutions In [4] a generalized method of characteristics was used to construct weak conservative solutions. The same approach has been used in [23], see also [6], in the case of the two-component Hunter–Saxton system, which generalizes the HS equation. However, there is a slight, but important difference in the solution spaces. The one used in [23] is bigger, since one only assumes $u(t,\,\cdot\,)\in L^{\infty}(\mathbb{R})$ and $F(t,\,\cdot\,)\in L^{\infty}(\mathbb{R})$ instead of $u(t,\,\cdot\,)\in E_{2}^{0}$ and $F(t,\,\cdot\,)\in E_{1}^{0}$ . Thus one would expect that the mapping $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from $[0,T]$ into $L^{\infty}(\mathbb{R})$. Yet, a closer look at (2.15) $u_{t}=-uu_{x}+\frac{1}{2}(F-\frac{1}{2}C),$ where (2.16) $F(t,x)=\mu(t,(-\infty,x)),$ reveals that $u_{t}(t,\,\cdot\,)$ cannot be uniformly bounded in $L^{\infty}(\mathbb{R})$, since $u_{x}(t,\,\cdot\,)$ does not belong to $L^{\infty}(\mathbb{R})$ and hence $t\mapsto u(t,\,\cdot\,)$ is not Lipschitz continuous from $[0,T]$ into $L^{\infty}(\mathbb{R})$. The smaller solution space used in [4] and here, on the other hand, is the correct choice, since the right-hand side of (2.15) belongs to $E_{2}^{0}$ and hence the mapping $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from $[0,T]$ into $E_{2}^{0}$. ### 2.3. On the continuity in the topology of weak convergence of measures in the definition of weak conservative solutions In [4] a generalized method of characteristics was used to construct weak conservative solutions as outlined above. This ansatz yields measures $\mu$, such that the mapping $t\mapsto\mu(t,\,\cdot\,)$ is locally Lipschitz continuous if we equip the set of positive Radon measures with the Kantorovich–Rubinstein norm, which generates the weak topology [1]. Denote by ${\rm BL}(\mathbb{R})$ the space of all bounded and Lipschitz continuous functions equipped with the norm $\left\|\phi\right\|=\max\left\\{\left\|\phi\right\|_{L^{\infty}},\sup_{x\not=y}\frac{|\phi(x)-\phi(y)|}{|x-y|}\right\\}.$ Then the Kantorovich–Rubinstein norm of $\mu\in\mathcal{M}^{+}(\mathbb{R})$ is given by (2.17) $\left\|\mu\right\|_{0}=\sup\left\\{\int_{\mathbb{R}}\phi d\mu\mid\phi\in{\rm BL}(\mathbb{R}),\left\|\phi\right\|\leq 1\right\\}.$ Given a solution $(u,\mu)$ with corresponding Lagrangian coordinates $(\check{y},\check{U},\check{H})$, which satisfy (2.6). Let $\phi\in{\rm BL}(\mathbb{R})$ such that $\left\|\phi\right\|\leq 1$. Then we have $\displaystyle\left|\int_{\mathbb{R}}\phi(x)d(\mu(t)-\mu(s))\right|$ $\displaystyle=\left|\int_{\mathbb{R}}\big{(}\phi(\check{y}(t,\xi))\check{H}_{\xi}(t,\xi)-\phi(\check{y}(s,\xi))\check{H}_{\xi}(s,\xi)\big{)}d\xi\right|$ $\displaystyle=\left|\int_{\mathbb{R}}(\phi(\check{y}(t,\xi))-\phi(\check{y}(s,\xi)))\check{H}_{\xi}(s,\xi)d\xi\right|$ (2.18) $\displaystyle\leq\left\|\check{y}(t,\,\cdot\,)-\check{y}(s,\,\cdot\,)\right\|_{L^{\infty}}C.$ Recalling (2.6), we have $\left\|\check{y}(t,\,\cdot\,)-\check{y}(s,\,\cdot\,)\right\|_{L^{\infty}}\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C).$ Thus $\left|\int_{\mathbb{R}}\phi(x)d(\mu(t)-\mu(s))\right|\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C)C$ for all $\phi\in{\rm BL}(\mathbb{R})$ such that $\left\|\phi\right\|\leq 1$, and, in particular, $\left\|\mu(t)-\mu(s)\right\|_{0}\leq|t-s|(\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{8}|t-s|C)C,$ which proves the local Lipschitz continuity, since $\left\|\check{U}(s,\,\cdot\,)\right\|_{L^{\infty}}$ can be uniformly bounded on any bounded time interval. Note that we cannot expect global Lipschitz continuity in time due to the last term in the above inequality. ## 3\. Uniqueness of weak conservative solutions via Lagrangian coordinates The main goal of this section is to present the proof of Theorem 3.6. To be a bit more precise, we will show that the characteristic equation $\check{y}_{t}(t,\xi)=u(t,\check{y}(t,\xi))$ has a unique solution and thereby establish rigorously that each weak conservative solution satisfies the system of ordinary differential equations (2.6) in Lagrangian coordinates. The pair $(u,\mu)$ will be a solution in the sense of Definition 2.3. In particular, this means that the function $u(t,x)$ is Hölder continuous in $(t,x)$, and the map $t\mapsto u(t,\,\cdot\,)$ is Lipschitz continuous from $[0,T]$ into $E^{0}_{2}$, the set of locally square integrable functions with possible non-vanishing asymptotics at $\pm\infty$. The measure $\mu(t)$ is finite, $\mu(t,\mathbb{R})=C$, absolutely continuous and has density $u_{x}^{2}(t,\,\cdot\,)$ w.r.t. the Lebesgue measure, except on a set $\mathcal{N}$ of zero measure. Furthermore, no moment condition is assumed on the measure here. Given a weak conservative solution $(u,\mu)\in\mathcal{D}$, let (3.1) $y(t,\xi)=\sup\\{x\mid x+F(t,x)<\xi\\},$ where $F(t,x)$ is given by (2.16). Then $y(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ is non-decreasing, $y(t,\,\cdot\,)\leq\operatorname{Id}$, and Lipschitz continuous with Lipschitz constant at most one [13, Thm. 3.8]. Furthermore, define (3.2) $\tilde{H}(t,\xi)=\xi-y(t,\xi).$ Note that $\tilde{H}(t,\,\cdot\,):\mathbb{R}\to[0,C]$ is non-decreasing (since $y(t,\,\cdot\,)$ has Lipschitz constant at most one) and continuous. For completeness, we introduce for later use (3.3) $U(t,\xi)=u(t,y(t,\xi)).$ For each time $t$, we have that $y(t,\xi)=\sup\\{x\mid x+F(t,x)<y(t,\xi)+\tilde{H}(t,\xi)\\},$ which implies that (3.4) $y(t,\xi)+F(t,y(t,\xi)-)\leq y(t,\xi)+\tilde{H}(t,\xi)\leq y(t,\xi)+F(t,y(t,\xi)+).$ Subtracting $y(t,\xi)$ in the above inequality, we end up with (3.5) $F(t,y(t,\xi)-)\leq\tilde{H}(t,\xi)\leq F(t,y(t,\xi)+)\quad\text{ for all }\xi\in\mathbb{R}.$ ###### Remark 3.1. Note that we made a particular choice in the above calculations, $y(t,\xi)+\tilde{H}(t,\xi)=\xi\quad\text{ for all }(t,\xi),$ i.e., $X(t,\,\cdot\,)=(y(t,\,\cdot\,),U(t,\,\cdot\,),\tilde{H}(t,\,\cdot\,))\in\mathcal{F}_{0}$ for all $t$. However, we could have chosen any representative of the corresponding equivalence class. Indeed, pick $f(t,x)$ such that $f(t,\,\cdot\,)\in\mathcal{G}$ for all $t$ and replace $y(t,\xi)$, $U(t,\xi)$, and $\tilde{H}(t,\xi)$ by $y_{1}(t,\xi)=\sup\\{x\mid x+F(t,x)<f(t,\xi)\\},$ $\tilde{H}_{1}(t,\xi)=f(t,\xi)-y_{1}(t,\xi)$, and $U_{1}(t,\xi)=u(t,y_{1}(t,\xi))$, respectively. Then $y_{1}(t,\xi)+\tilde{H}_{1}(t,\xi)=f(t,\xi)\quad\text{ for all }(t,\xi),$ i.e., $X_{1}(t,\,\cdot\,)=(y_{1}(t,\,\cdot\,),U_{1}(t,\,\cdot\,),\tilde{H}_{1}(t,\,\cdot\,))\in\mathcal{F}$ for all $t$. In particular, one has $X_{1}(t,\xi)=X(t,f(t,\xi))\quad\text{ for all }(t,\xi).$ ### 3.1. The differential equation satisfied by the characteristics $y(t,\xi)$ Recall that $u(t,x)$ is a weak solution to $u_{t}+uu_{x}=\frac{1}{2}(F-\frac{1}{2}C),$ and hence we obtain, by computing $u(t,\,\cdot\,)$ along characteristics, that (3.6) $\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\leq\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\quad\text{ for all }t\in[0,T].$ Thus for every characteristic $x(s)$ given by (3.7) $\dot{x}(t)=u(t,x(t)),$ we have (3.8) $|x(t)-x(s)|\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}|t-s|.$ Recall that due to the Hölder continuity of $u$ the equation (3.7) will in general not have a unique solution. This estimate together with the Hölder continuity of the weak conservative solution, helps us to refine the estimate for $|x(t)-x(s)|$. Indeed, by assumption we know that there exists a constant $D$ such that (3.9) $|u(t,x)-u(s,y)|\leq D\big{(}|t-s|+|x-y|\big{)}^{1/2}\quad\text{ for all }(t,x),(s,y)\in[0,T]\times\mathbb{R}.$ Thus every characteristic $x(t)$ given through (3.7), satisfies $|\dot{x}(t)-u(s,x(s))|\leq D\big{(}|t-s|+|x(t)-x(s)|\big{)}^{1/2}.$ Recalling (3.8) we end up with $|\dot{x}(t)-u(s,x(s))|\leq D|t-s|^{1/2}\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}.$ Integration then yields for all $s$ and $t$ in $[0,T]$ that (3.10) $\left|x(t)-x(s)-u(s,x(s))(t-s)\right|\leq M|t-s|^{3/2}.$ Here $M$ denotes some positive constant, which is independent of $s$ and $t$. Furthermore, using (3.8), there exists a positive constant $N$ such that $\left|x(t)-x(s)\right|\leq N|t-s|\quad\text{ for all }s,t\in[0,T].$ We are now ready to turn our attention towards the equation (3.11) $\mu_{t}+(u\mu)_{x}=0.$ In the case of a classical solution, one has that $F(t,x(t))=F(s,x(s))$. In our more general case, one has (3.12) $F(t,x(s)-N|t-s|)\leq F(s,x(s)\pm)\leq F(t,x(s)+N|t-s|+).$ We will show this estimate in the next lemma. For simplicity we let $s=0$ and only consider the right inequality. ###### Lemma 3.2. In the above notation, we have the following result $F(0,x(0)+)\leq F(t,x(0)+Nt+)\quad\text{ for all }t\in[0,T].$ ###### Proof. We have that $\mu(t,\mathbb{R})=C$ for all $t$. We will first show that for a given $\varepsilon>0$, we can find an $M>0$ such that (3.13) $\mu(t,(-M,M))\geq C-\varepsilon\quad\text{ for all }t\in[0,T].$ To that end we first observe that for $t=0$ we can find an $\tilde{M}_{0}>0$ such that $F(0,\tilde{M}_{0})-F(0,-\tilde{M}_{0}+)=\mu(0,(-\tilde{M}_{0},\tilde{M}_{0}))\geq C-\frac{1}{2}\varepsilon.$ Let $\delta$ be a small positive number to be decided later. Since $u(t,\,\cdot\,)\in E_{2}$ for all $t\in[0,T]$, we can find $u_{\pm\infty}(t)$, $x_{\delta}$, and $\tilde{x}_{\delta}$ such that (3.14a) $\displaystyle\left|u_{-\infty}(t)-u(t,x)\right|$ $\displaystyle\leq\delta\quad\text{ for all }(t,x)\in[0,T]\times(-\infty,x_{\delta}],$ (3.14b) $\displaystyle\left|u_{\infty}(t)-u(t,x)\right|$ $\displaystyle\leq\delta\quad\text{ for all }(t,x)\in[0,T]\times[\tilde{x}_{\delta},\infty).$ Next choose $x_{1}<x_{2}<x_{3}<x_{4}$ such that $\displaystyle x_{2}+\int_{0}^{t}u_{-\infty}(s)ds$ $\displaystyle\leq x_{\delta}\quad\text{ for all }t\in[0,T],$ $\displaystyle x_{3}+\int_{0}^{t}u_{\infty}(s)ds$ $\displaystyle\geq\tilde{x}_{\delta}\quad\text{ for all }t\in[0,T],$ and pick functions $\psi_{1},\psi_{2}\in C^{\infty}(\mathbb{R})$ with $\displaystyle\psi_{1}^{\prime}$ $\displaystyle\geq 0,\quad\psi_{1}|_{(-\infty,x_{1}]}=-\frac{1}{2},\quad\psi_{1}|_{[x_{2},\infty)}=\frac{1}{2},$ $\displaystyle\psi_{2}^{\prime}$ $\displaystyle\leq 0,\quad\psi_{2}|_{(-\infty,x_{3}]}=\frac{1}{2},\quad\psi_{2}|_{[x_{4},\infty)}=-\frac{1}{2}.$ Define $\psi(t,x)=\psi_{1}\big{(}x-\int_{0}^{t}u_{-\infty}(s)ds\big{)}+\psi_{2}\big{(}x-\int_{0}^{t}u_{\infty}(s)ds\big{)},$ which clearly satisfies $\psi(t,\,\cdot\,)\in C^{\infty}_{c}(\mathbb{R})$ for $t\in[0,T]$. We then find $\displaystyle F(t,x_{3}$ $\displaystyle+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{2}+\int_{0}^{t}u_{-\infty}(s)ds+)$ $\displaystyle\leq\int_{\mathbb{R}}\psi(t,x)d\mu(t)$ $\displaystyle\leq F(t,x_{4}+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{1}+\int_{0}^{t}u_{-\infty}(s)ds+).$ Furthermore, using that $(u,\mu)$ is a weak solution and $\psi$ is a test function, we get $\displaystyle F(t,x_{4}$ $\displaystyle+\int_{0}^{t}u_{\infty}(s)ds)-F(t,x_{1}+\int_{0}^{t}u_{-\infty}(s)ds+)$ $\displaystyle\geq\int_{\mathbb{R}}\psi(t,x)d\mu(t)=\int_{\mathbb{R}}\psi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds$ $\displaystyle\qquad\qquad\qquad\qquad\,\geq F(0,x_{3})-F(0,x_{2}+)+\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds.$ Direct computations yield $\displaystyle(\psi_{t}+u\psi_{x})(t,x)$ $\displaystyle=\psi_{1}^{\prime}\big{(}x-\int_{0}^{t}u_{-\infty}(s)ds\big{)}(-u_{-\infty}(t)+u(t,x))\mathbb{I}_{A_{1}(t)}(x)$ $\displaystyle\quad+\psi_{2}^{\prime}\big{(}x-\int_{0}^{t}u_{\infty}(s)ds\big{)}(-u_{\infty}(t)+u(t,x))\mathbb{I}_{A_{2}(t)}(x)$ with $\displaystyle A_{1}(t)$ $\displaystyle=\\{x\mid x_{1}+\int_{0}^{t}u_{-\infty}(s)ds<x<x_{2}+\int_{0}^{t}u_{-\infty}(s)ds\\},$ $\displaystyle A_{2}(t)$ $\displaystyle=\\{x\mid x_{3}+\int_{0}^{t}u_{\infty}(s)ds<x<x_{4}+\int_{0}^{t}u_{\infty}(s)ds\\}.$ This implies for all $t\in[0,T]$, using (3.14), $\displaystyle\left|\int_{0}^{t}\int_{\mathbb{R}}(\psi_{t}+u\psi_{x})d\mu(s)\,ds\right|$ $\displaystyle\leq\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}\int_{0}^{t}\int_{\mathbb{R}}\left|-u_{-\infty}(s)+u(s,x)\right|\mathbb{I}_{A_{1}(s)}(x)d\mu(s)\,ds$ $\displaystyle\quad+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}\int_{0}^{t}\int_{\mathbb{R}}\left|-u_{\infty}(s)+u(s,x)\right|\mathbb{I}_{A_{2}(s)}(x)d\mu(s)\,ds$ $\displaystyle\leq\delta TC\big{(}\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}\big{)}.$ Choosing $\delta\leq\varepsilon/(2TC(\left\|\psi_{1}^{\prime}\right\|_{L^{\infty}}+\left\|\psi_{2}^{\prime}\right\|_{L^{\infty}}))$ and $M=\max\\{\tilde{M}_{0},\left|x_{\varepsilon}\right|,\left|\tilde{x}_{\varepsilon}\right|,\left|x_{2}\right|,\left|x_{3}\right|\\}$, we see that $\mu(t,(-M,M))\geq C-\varepsilon\quad\text{ for all }t\in[0,T].$ Let $\phi\in C^{\infty}(\mathbb{R})$ with $\operatorname{supp}(\phi_{x})\subseteq[-\tilde{M},\tilde{M}]$ and $\phi_{x}\geq 0$, such that $\phi(x)=\phi(-\infty)$ for $x\leq-\tilde{M}$ with $\phi(-\infty)=-\int_{\mathbb{R}}\phi_{x}(z)dz$, and $\phi(x)=0$ for $x\geq\tilde{M}$. Introduce $\bar{\phi}\in C^{\infty}([0,T]\times\mathbb{R})$ such that $\bar{\phi}|_{[0,T]\times[-M,M]}=0,\quad\bar{\phi}_{x}\geq 0,\quad\bar{\phi}(t,x)=\begin{cases}\phi(-\infty),&\text{for $x\leq-1-M$},\\\ 0,&\text{for $x\geq 1+M$}.\end{cases}$ Fix a constant $b$. Then we find, since $\phi(x-bt)-\bar{\phi}(t,x)\in C^{\infty}_{c}([0,T]\times\mathbb{R})$, that $\displaystyle\int_{\mathbb{R}}\phi(x-bt)d\mu(t)$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi(x-bt)-\bar{\phi}(t,x))d\mu(t)$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi(x)-\bar{\phi}(0,x))d\mu(0)$ $\displaystyle\quad+\int_{0}^{t}\int_{\mathbb{R}}\Big{(}(\phi(x-bs)-\bar{\phi}(s,x))_{t}$ $\displaystyle\qquad\qquad\qquad\qquad+u(s,x)(\phi(x-bs)-\bar{\phi}(s,x))_{x}\Big{)}d\mu(s)ds$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)-\int_{\mathbb{R}}\bar{\phi}(0,x)d\mu(0)$ $\displaystyle\quad-\int_{0}^{t}\int_{\mathbb{R}}\big{(}\bar{\phi}_{t}+u\bar{\phi}_{x}\big{)}(s,x)d\mu(s)ds$ $\displaystyle\quad+\int_{\mathbb{R}}\phi(x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(u(s,x)-b)\phi^{\prime}(x-bs)d\mu(s)ds.$ By (3.13) the terms in the next to last line can be made arbitrarily small by increasing $M$, so that $\int_{\mathbb{R}}\phi(x-bt)d\mu(t)=\int_{\mathbb{R}}\phi(x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}(u(s,x)-b)\phi^{\prime}(x-bs)d\mu(s)ds.$ If we choose $b\geq u$ a.e., then $\int_{0}^{t}\int(u-b)\phi_{x}d\mu(s)ds\leq 0$, which together with $\displaystyle\int_{\mathbb{R}}\phi(x-bt)d\mu(t)$ $\displaystyle=-\int_{\mathbb{R}}\phi^{\prime}(x-bt)F(t,x\pm)dx=-\int_{\mathbb{R}}\phi^{\prime}(x)F(t,x+bt\pm)dx$ yields $\int_{\mathbb{R}}\phi^{\prime}(x)\big{(}F(t,x+bt\pm)-F(0,x\pm)\big{)}dx\geq 0,$ from which we conclude $F(0,x+)\leq F(t,x+bt+).$ ∎ For any $t\in\mathbb{R}$, introduce the strictly increasing function $L(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ given by (3.15) $L(t,x)=x+F(t,x),$ which satisfies, cf. (3.2) and (3.4), (3.16) $L(t,y(t,\xi)-)\leq\xi\leq L(t,y(t,\xi)+),\quad t\in[0,T].$ Then $L(t,x(s)-N|t-s|)\leq L(s,x(s)\pm)\leq L(t,x(s)+N|t-s|+),$ and choosing $x(s)=y(s,\xi)$, we get $L(t,y(s,\xi)-N|t-s|)\leq L(t,y(t,\xi))\leq L(t,y(s,\xi)+N|t-s|+).$ Recalling that $L(t,\,\cdot\,)$ is strictly increasing we end up with (3.17) $\left|y(t,\xi)-y(s,\xi)\right|\leq N|t-s|.$ Since $\xi\mapsto y(t,\xi)$ is Lipschitz with Lipschitz constant at most one, it follows that $y(t,\xi)$ is Lipschitz and hence differentiable almost everywhere in $[0,T]\times\mathbb{R}$. Next we aim at computing $y_{t}(t,\xi)$, using (3.10), and deriving the differential equation for $y(t,\xi)$. One has, combining (3.10) and the analysis used to derive (3.12), $\displaystyle F(t,x(s)+$ $\displaystyle u(s,x(s))(t-s)-M|t-s|^{3/2})$ $\displaystyle\leq F(s,x(s)\pm)\leq F(t,x(s)+u(s,x(s))(t-s)+M|t-s|^{3/2}+).$ We can derive this estimate as follows. For simplicity let $s=0$ and consider only the right estimate. ###### Lemma 3.3. In the above notation, we have the following result $F(0,x(0)+)\leq F(t,x(0)+u_{0}(x(0))t+Mt^{3/2}+)\quad\text{ for all }t\in[0,T].$ ###### Proof. Given an $\varepsilon>0$, we can find, as in the proof of Lemma 3.2, an $M>0$ such that (3.18) $\mu(t,\mathbb{R}\backslash(-M,M))<\varepsilon\quad\text{ for all }t\in[0,T].$ Let $\psi\in C^{\infty}(\mathbb{R})$ with $\operatorname{supp}(\psi_{x})\subseteq[-\tilde{M},\tilde{M}]$ and $\psi_{x}\geq 0$. Let $\phi=\phi(t,x)$ satisfy $\phi_{t}+g\phi_{x}=0$, with initial data $\phi|_{t=0}=\psi$ for some given continuous function $g=g(t,x)$. Introduce $\bar{\phi}\in C^{\infty}([0,T]\times\mathbb{R})$ such that $\bar{\phi}|_{[0,T]\times[-M,M]}=0,\quad\bar{\phi}_{x}\geq 0,\quad\bar{\phi}(t,x)=\begin{cases}-\int_{\mathbb{R}}\phi_{x}(t,z)dz,&\text{for $x\leq-1-M$},\\\ 0,&\text{for $x\geq 1+M$}.\end{cases}$ Then we find, since $\phi-\bar{\phi}\in C^{\infty}_{c}([0,T]\times\mathbb{R})$, that $\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi-\bar{\phi})(t,x)d\mu(t)$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)+\int_{\mathbb{R}}(\phi-\bar{\phi})(0,x)d\mu(0)$ $\displaystyle\quad+\int_{0}^{t}\int_{\mathbb{R}}\big{(}(\phi-\bar{\phi})_{t}+u(\phi-\bar{\phi})_{x}\big{)}(s,x)d\mu(s)ds$ $\displaystyle=\int_{\mathbb{R}}\bar{\phi}(t,x)d\mu(t)-\int_{\mathbb{R}}\bar{\phi}(0,x)d\mu(0)-\int_{0}^{t}\int_{\mathbb{R}}\big{(}\bar{\phi}_{t}+u\bar{\phi}_{x}\big{)}(s,x)d\mu(s)ds$ $\displaystyle\quad+\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}\phi_{t}+u\phi_{x}\big{)}(s,x)d\mu(s)ds.$ By (3.18) the terms in the next to last line can be made arbitrarily small by increasing $M$, so that $\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$ $\displaystyle=\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}\phi_{t}+u\phi_{x}\big{)}(s,x)d\mu(s)ds$ $\displaystyle=\int_{\mathbb{R}}\phi(0,x)d\mu(0)+\int_{0}^{t}\int_{\mathbb{R}}\big{(}u-g\big{)}\phi_{x}(s,x)d\mu(s)ds.$ Let $\bar{x}\in\mathbb{R}$ and consider the Hölder continuous function $g(t,x)=u(0,\bar{x})+D(t+|x-\bar{x}|)^{1/2}$, which satisfies $g\geq u$ a.e. by (3.9). Furthermore, let $\xi=\xi(t,z)$ solve $\xi_{t}=g(t,\xi)$ with initial condition $\xi(0,z)=z$. Then $\phi(t,\xi(t,z))=\phi(0,\xi(0,z))=\psi(z)$ if $\xi(t,\,\cdot\,)$ is a strictly increasing function. To see this, observe that one has if $\xi(t,z_{2})>\xi(t,z_{1})$ for $z_{2}>z_{1}$, $\displaystyle\xi_{t}(t,z_{2})-\xi_{t}(t,z_{1})$ $\displaystyle=g(t,\xi(t,z_{2}))-g(t,\xi(t,z_{1}))$ $\displaystyle=D\frac{|\xi(t,z_{2})-\bar{x}|-|\xi(t,z_{1})-\bar{x}|}{(t+|\xi(t,z_{2})-\bar{x}|)^{1/2}+(t+|\xi(t,z_{1})-\bar{x}|)^{1/2}}$ $\displaystyle\geq-\frac{D}{2t^{1/2}}(\xi(t,z_{2})-\xi(t,z_{1})),$ which implies $\xi(t,z_{2})-\xi(t,z_{1})\geq e^{-Dt^{1/2}}(\xi(0,z_{2})-\xi(0,z_{1}))=e^{-Dt^{1/2}}(z_{2}-z_{1}),$ and thus $\xi(t,\,\cdot\,)$ and $\phi(t,\,\cdot\,)$ are strictly increasing functions. Since $g\geq u$ a.e., we have $\int_{0}^{t}\int(u-g)\phi_{x}d\mu(s)ds\leq 0$, which together with $\displaystyle\int_{\mathbb{R}}\phi(t,x)d\mu(t)$ $\displaystyle=-\int_{\mathbb{R}}\phi_{x}(t,x)F(t,x\pm)dx$ $\displaystyle=-\int_{\mathbb{R}}\phi_{x}(t,\xi(t,z))F(t,\xi(t,z)\pm)\xi_{z}(t,z)dz$ $\displaystyle=-\int_{\mathbb{R}}\frac{d}{dz}\phi(t,\xi(t,z))F(t,\xi(t,z)\pm)dz$ $\displaystyle=-\int_{\mathbb{R}}\frac{d}{dz}\phi(0,\xi(0,z))F(t,\xi(t,z)\pm)dz$ $\displaystyle=-\int\psi^{\prime}(z)F(t,\xi(t,z)\pm)dz,$ implies $\int_{\mathbb{R}}\psi^{\prime}(x)\big{(}F(t,\xi(t,x)\pm)-F(0,x\pm)\big{)}dx\geq 0,$ from which we conclude (3.19) $F(0,x+)\leq F(t,\xi(t,x)+).$ It remains to estimate $\xi(t,z)-\xi(0,z)$. Integrating the differential equation for $\xi(t,z)$ we find $\displaystyle|\xi(t,z)-\xi(0,z)|$ $\displaystyle\leq|u(0,\bar{x})|t+D\int_{0}^{t}(\tau+|\xi(\tau,z)-\bar{x}|)^{1/2}d\tau$ $\displaystyle\leq|u(0,\bar{x})|t+Dt^{1/2}\left(\int_{0}^{t}(\tau+|\xi(\tau,z)-\bar{x}|)d\tau\right)^{1/2}$ $\displaystyle\leq|u(0,\bar{x})|t+\frac{D^{2}}{4}t+\int_{0}^{t}(\tau+|\xi(\tau,z)-\xi(0,z)|+|\xi(0,z)-\bar{x}|)d\tau$ $\displaystyle\leq Lt+\int_{0}^{t}|\xi(\tau,z)-\xi(0,z)|d\tau$ where $L=|u(0,\bar{x})|+|\xi(0,z)-\bar{x}|+\frac{D^{2}}{4}+\frac{T}{2}$. Thus $L+|\xi(t,z)-\xi(0,z)|\leq L+\int_{0}^{t}(L+|\xi(\tau,z)-\xi(0,z)|)d\tau,$ which by the Gronwall inequality implies $L+|\xi(t,z)-\xi(0,z)|\leq Le^{t}$ or $|\xi(t,z)-\xi(0,z)|\leq Lte^{T},\quad\text{ for all }t\in[0,T].$ Plugging this estimate into the integral representation of the solution, we find $\displaystyle\xi(t,z)-\xi(0,z)$ $\displaystyle\leq\int_{0}^{t}(u(0,\bar{x})+D(\tau+|\xi(\tau,z)-\xi(0,z)|+|\xi(0,z)-\bar{x}|)^{1/2})d\tau$ $\displaystyle\leq u(0,\bar{x})t+D|\xi(0,z)-\bar{x}|^{1/2}t+D(1+Le^{T})t^{3/2}.$ Introducing $\tilde{M}=D(1+Le^{T})$, (3.19) reads $F(0,\xi(0,z)+)\leq F(t,\xi(0,z)+u(0,\bar{x})t+D|\xi(0,z)-\bar{x}|^{1/2}t+\tilde{M}t^{3/2}+).$ A close look reveals that $\tilde{M}=D(1+(|u(0,\bar{x})|+|\xi(0,z)-\bar{x}|+\frac{D^{2}}{4}+\frac{T}{2})e^{T})$, which means that $\tilde{M}$ depends linearly on $|\xi(0,z)-\bar{x}|$. On the other hand, one has for $z=\xi(0,z)=\bar{x}$, $F(0,\bar{x}+)\leq F(t,\xi(0,\bar{x})+u(0,\bar{x})t+\tilde{M}t^{3/2}+)\leq F(t,\bar{x}+u(0,\bar{x})t+Mt^{3/2}+),$ where $M=D(1+(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{D^{2}}{4}+\frac{T}{2})e^{T})$. Since the above argument holds for any choice of $\bar{x}\in\mathbb{R}$ we end up with $F(0,x+)\leq F(t,x+u(0,x)t+Mt^{3/2}+)\quad\text{ for all }x\in\mathbb{R}.$ ∎ Recalling (3.15), (3.16), and choosing $x(s)=y(s,\xi)$, we get $\displaystyle L(t,y(s,\xi)+$ $\displaystyle u(s,y(s,\xi))(t-s)-M|t-s|^{3/2})$ $\displaystyle\leq\xi+u(s,y(s,\xi))(t-s)$ $\displaystyle\leq L(t,y(s,\xi)+u(s,y(s,\xi))(t-s)+M|t-s|^{3/2}+),$ and, applying (3.16) once more, $\displaystyle L(t,y(s,\xi)+$ $\displaystyle u(s,y(s,\xi))(t-s)-M|t-s|^{3/2})$ $\displaystyle\leq L(t,y(t,\xi+u(s,y(s,\xi))(t-s)))$ $\displaystyle\leq L(t,y(s,\xi)+u(s,y(s,\xi))(t-s)+M|t-s|^{3/2}+).$ Since $L(t,\,\cdot\,)$ is strictly increasing we end up with (3.20) $\left|y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi)-u(s,y(s,\xi))(t-s)\right|\leq M|t-s|^{3/2}.$ Note that the above inequality implies that $\lim_{s\to t}\frac{y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi)}{t-s}=u(t,y(t,\xi)),$ since combining (3.9) and (3.17) yields (3.21) $|u(s,y(s,\xi))-u(t,y(t,\xi))|\leq D\big{(}1+N\big{)}^{1/2}|t-s|^{1/2}.$ Thus, one has $\displaystyle y_{t}(t,\xi)$ $\displaystyle=\lim_{s\to t}\frac{y(t,\xi)-y(s,\xi)}{t-s}$ $\displaystyle=\lim_{s\to t}\Big{(}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}$ $\displaystyle\qquad\qquad\qquad+\frac{y(t,\xi+u(s,y(s,\xi))(t-s))-y(s,\xi))}{t-s}\Big{)}$ $\displaystyle=\lim_{s\to t}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}+u(t,y(t,\xi)),$ and it is left to compute (3.22) $\lim_{s\to t}\frac{y(t,\xi)-y(t,\xi+u(s,y(s,\xi))(t-s))}{t-s}=\lim_{s\to t}\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{t-s}.$ Recalling (3.21), the above equality (3.22) holds since $y(t,\,\cdot\,)$ is Lipschitz continuous with Lipschitz constant at most one. Moreover, note that for $u(t,y(t,\xi))\not=0$, one has $\displaystyle\lim_{s\to t}$ $\displaystyle\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{t-s}$ $\displaystyle\qquad\qquad\qquad=u(t,y(t,\xi))\lim_{s\to t}\frac{y(t,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))}{u(t,y(t,\xi))(t-s)}$ $\displaystyle\qquad\qquad\qquad=-u(t,y(t,\xi))y_{\xi}(t,\xi).$ This result also remains valid in the case $u(t,y(t,\xi))=0$. Hence we conclude that $y(t,\xi)$ satisfies (3.23) $y_{t}(t,\xi)+u(t,y(t,\xi))y_{\xi}(t,\xi)=u(t,y(t,\xi)).$ Furthermore, recalling (3.2), direct computations yield (3.24) $\tilde{H}_{t}(t,\xi)+u(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)=0.$ ### 3.2. The differential equation satisfied by $U(t,\xi)$ To begin with we have a closer look at the system of differential equations, given by (3.23) and (3.24), which reads, using (3.3) (3.25a) $\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$ (3.25b) $\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$ $\displaystyle=0.$ This systems of equations can be solved (uniquely) by the method of characteristics, if the differential equation (3.26) $k_{t}(t,\zeta)=U(t,k(t,\zeta))$ has a unique solution and $k_{\zeta}(t,\,\cdot\,)$ is strictly positive for all $t\in[0,T]$. According to classical ODE theory, (3.26) has for each fixed $\zeta$ a unique solution if the function $U(t,\xi)=u(t,y(t,\xi))$ is continuous with respect to time and Lipschitz with respect to space. The continuity with respect to time is an immediate consequence of (3.21). To establish the Lipschitz continuity with respect to space is a bit more involved. A closer look at (3.2) and (3.4) reveals that one has $y(t,\xi)+\sigma F(t,y(t,\xi)-)+(1-\sigma)F(t,y(t,\xi)+)=\xi\quad\text{ for some }\sigma\in[0,1],$ and $\tilde{H}(t,\xi)=\sigma F(t,y(t,\xi)-)+(1-\sigma)F(t,y(t,\xi)+).$ This means especially, given $\xi\in\mathbb{R}$, there exist $\xi^{-}\leq\xi\leq\xi^{+}$ such that $y(t,\xi^{-})=y(t,\xi)=y(t,\xi^{+})$ and $\tilde{H}(t,\xi^{-})=F(t,y(t,\xi)-)\quad\text{ and }\quad\tilde{H}(t,\xi^{+})=F(t,y(t,\xi)+).$ In view of Definition 2.3 (v), we then have for $\xi_{1}<\xi_{2}$ such $y(t,\xi_{1})\not=y(t,\xi_{2})$ that $\displaystyle|u(t,y(t,\xi_{2}))-$ $\displaystyle u(t,y(t,\xi_{1}))|$ $\displaystyle=|u(t,y(t,\xi_{2}^{-}))-u(t,y(t,\xi_{1}^{+}))|$ $\displaystyle\leq\big{(}y(t,\xi_{2}^{-})-y(t,\xi_{1}^{+})\big{)}^{1/2}\big{(}F(t,y(t,\xi_{2})-)-F(t,y(t,\xi_{1})+)\big{)}^{1/2}$ $\displaystyle=\big{(}y(t,\xi_{2}^{-})-y(t,\xi_{1}^{+})\big{)}^{1/2}\big{(}\tilde{H}(t,\xi_{2}^{-})-\tilde{H}(t,\xi_{1}^{+})\big{)}^{1/2}$ $\displaystyle\leq|\xi_{2}^{-}-\xi_{1}^{+}|\leq|\xi_{2}-\xi_{1}|,$ since both $y(t,\,\cdot\,)$ and $\tilde{H}(t,\,\cdot\,)$ are Lipschitz continuous in space with Lipschitz constant at most one. Thus (3.26) has a unique solution. Furthermore, if $k(0,\zeta)=\zeta$ for all $\zeta\in\mathbb{R}$ and $\zeta_{1}<\zeta_{2}$, we have, as long as the function $k(t,\,\cdot\,)$ remains non-decreasing that $-(k(t,\zeta_{2})-k(t,\zeta_{1}))\leq(k(t,\zeta_{2})-k(t,\zeta_{1}))_{t}\leq k(t,\zeta_{2})-k(t,\zeta_{1}),$ which yields $(k(0,\zeta_{2})-k(0,\zeta_{1}))e^{-t}\leq k(t,\zeta_{2})-k(t,\zeta_{1})\leq(k(0,\zeta_{2})-k(0,\zeta_{1}))e^{t}.$ Thus $k(t,\,\cdot\,)$ not only remains strictly increasing, it is also Lipschitz continuous with Lipschitz constant $e^{t}$ and hence according to Rademacher’s theorem differentiable almost everywhere. In particular, one has that (3.27) $e^{-t}\leq k_{\zeta}(t,\zeta)\leq e^{t}.$ Introducing $\bar{y}(t,\zeta)=y(t,k(t,\zeta))\quad\text{ and }\quad\bar{H}(t,\zeta)=\tilde{H}(t,k(t,\zeta)),$ we have from (3.25) (3.28a) $\displaystyle\bar{y}_{t}(t,\zeta)$ $\displaystyle=u(t,\bar{y}(t,\zeta)),$ (3.28b) $\displaystyle\bar{H}_{t}(t,\zeta)$ $\displaystyle=0.$ In particular, one has $\bar{H}(t,\zeta)=\bar{H}(s,\zeta)$ and (3.2) turns into (3.29) $\bar{y}(t,\zeta)+\bar{H}(t,\zeta)=k(t,\zeta).$ Furthermore, note that $\bar{y}(t,\zeta)$ is a characteristic due to (3.28a). Introducing $\bar{U}(t,\zeta)=u(t,\bar{y}(t,\zeta))=u(t,y(t,k(t,\zeta)))=U(t,k(t,\zeta)),$ the system (3.28) reads $\displaystyle\bar{y}_{t}(t,\zeta)$ $\displaystyle=\bar{U}(t,\zeta),$ $\displaystyle\bar{H}_{t}(t,\zeta)$ $\displaystyle=0.$ The above system can be extended to the system (2.6), which has been introduced in [4] and which describes conservative solutions in the sense of Definition 2.3, if we can show that (3.30) $\bar{U}_{t}(t,\zeta)=\frac{1}{2}\left(\bar{H}(t,\zeta)-\frac{1}{2}C\right).$ As an immediate consequence, one then obtains the uniqueness of global weak conservative solutions. The proof of (3.30) is based on an idea that has been used in [2]. According to the definition of a weak solution, one has for all $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that $\displaystyle\int_{s}^{t}\int_{\mathbb{R}}(u\phi_{t}+\frac{1}{2}u^{2}\phi_{x}+\frac{1}{2}(F-\frac{1}{2}$ $\displaystyle C)\phi)(\tau,x)dxd\tau$ $\displaystyle=\int_{\mathbb{R}}u\phi(t,x)dx-\int_{\mathbb{R}}u\phi(s,x)dx,\quad s<t.$ Note that in the above equality, one can replace $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ by $\phi(t,x)$ such that $\phi(t,\,\cdot\,)\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ for all $t$ and $\phi(\,\cdot\,,x)\in\mathcal{C}^{1}(\mathbb{R})$ for all $x$. To prove that $\bar{U}(t,\zeta)$ is Lipschitz we have to make a special choice of $\phi(t,x)$. Let $\phi_{\varepsilon}(t,x)=\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(t,\zeta)-x}{\varepsilon}\Big{)}$ where $\psi$ is a standard Friedrichs mollifier. Our choice is motivated by the following observation, $\lim_{\varepsilon\to 0}\int_{\mathbb{R}}u\phi_{\varepsilon}(t,x)dx=u(t,\bar{y}(t,\zeta)),$ and hence $u(t,\bar{y}(t,\zeta))-u(s,\bar{y}(s,\zeta))=\lim_{\varepsilon\to 0}\int_{\mathbb{R}}(u\phi_{\varepsilon}(t,x)-u\phi_{\varepsilon}(s,x))dx.$ Direct calculations then yield $\displaystyle\int_{\mathbb{R}}\big{(}u\phi_{\varepsilon,t}+\frac{1}{2}u^{2}\phi_{\varepsilon,x}$ $\displaystyle+\frac{1}{2}(F-\frac{1}{2}C)\phi_{\varepsilon}\big{)}(\tau,x)dx$ $\displaystyle=\frac{1}{2}u(\tau,\bar{y}(\tau,\zeta))^{2}\int_{\mathbb{R}}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$ $\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$ $\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$ $\displaystyle\quad+\frac{1}{2}F(\tau,\bar{y}(\tau,\zeta))-\frac{1}{4}C$ $\displaystyle=-\frac{1}{2}\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$ $\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx$ $\displaystyle\quad+\frac{1}{2}F(\tau,\bar{y}(\tau,\zeta))-\frac{1}{4}C.$ Introduce the function $F_{\rm ac}(\tau,x)=\int_{-\infty}^{x}u_{x}^{2}(\tau,y)dy$ and note that $F_{\rm ac}(\tau,\,\cdot\,)$ is absolutely continuous. Moreover, one has $|u(\tau,x)-u(\tau,y)|\leq|x-y|^{1/2}|F_{\rm ac}(\tau,x)-F_{\rm ac}(\tau,y)|^{1/2}$ and $\displaystyle|\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}$ $\displaystyle\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx|$ $\displaystyle=\frac{1}{\varepsilon}|\int_{-1}^{1}\big{(}u(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\psi^{\prime}(\eta)d\eta|$ $\displaystyle\leq|F_{\rm ac}(\tau,\bar{y}(\tau,\zeta)+\varepsilon)-F_{\rm ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon)|,$ which implies $\lim_{\varepsilon\to 0}|\int_{\mathbb{R}}\big{(}u(\tau,x)-u(\tau,\bar{y}(\tau,\zeta))\big{)}^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx|=0.$ For the last two terms, observe that for every $\tau\not\in\mathcal{N}$, i.e., for almost every $\tau\in[0,T]$ one has $F(\tau,\bar{y}(\tau,\zeta))=F_{\rm ac}(\tau,\bar{y}(\tau,\zeta))=\bar{H}(\tau,\zeta)$ and $\displaystyle\left|\int_{\mathbb{R}}\big{(}F(\tau,x)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{y}(\tau,\zeta)-x}{\varepsilon}\Big{)}dx\right|$ $\displaystyle\qquad=\left|\int_{-1}^{1}\big{(}F(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-F(\tau,\bar{y}(\tau,\zeta))\big{)}\psi(\eta)d\eta\right|$ $\displaystyle\qquad=\left|\int_{-1}^{1}\big{(}F_{\rm ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon\eta)-F_{\rm ac}(\tau,\bar{y}(\tau,\zeta))\big{)}\psi(\eta)d\eta\right|$ $\displaystyle\qquad\leq\left|F_{\rm ac}(\tau,\bar{y}(\tau,\zeta)-\varepsilon)-F_{\rm ac}(\tau,\bar{y}(\tau,\zeta))\right|\to 0,\quad\text{as $\varepsilon\to 0$.}$ Thus, the dominated convergence theorem yields $\displaystyle\bar{U}(t,\zeta)-\bar{U}(s,\zeta)$ $\displaystyle=\int_{s}^{t}\frac{1}{2}\bar{H}(\tau,\zeta)d\tau-\frac{1}{4}C(t-s)$ $\displaystyle=\frac{1}{2}\bar{H}(t,\zeta)(t-s)-\frac{1}{4}C(t-s)=\frac{1}{2}\bar{H}(s,\zeta)(t-s)-\frac{1}{4}C(t-s).$ In particular, $|\bar{U}(t,\zeta)-\bar{U}(s,\zeta)|\leq\frac{1}{2}C\left|t-s\right|,$ i.e., $\bar{U}(t,\zeta)$ is Lipschitz continuous with respect to time, and (3.31) $\bar{U}_{t}(t,\zeta)=\frac{1}{2}\bar{H}(t,\zeta)-\frac{1}{4}C$ for all $(t,\zeta)$ in $[0,T]\times\mathbb{R}$. Moreover, one has, using (3.27) and (3.29) $\displaystyle|\bar{U}(t,\zeta_{1})-\bar{U}(t,\zeta_{2})|$ $\displaystyle=|u(t,\bar{y}(t,\zeta_{1}))-u(t,\bar{y}(t,\zeta_{2}))|$ $\displaystyle\leq|\bar{y}(t,\zeta_{1})-\bar{y}(t,\zeta_{2})|^{1/2}|F_{\rm ac}(t,\bar{y}(t,\zeta_{1}))-F_{\rm ac}(t,\bar{y}(t,\zeta_{2}))|^{1/2}$ $\displaystyle\leq\left|\bar{y}(t,\zeta_{1})+F_{\rm ac}(t,\bar{y}(t,\zeta_{1}))-\bar{y}(t,\zeta_{2})-F_{\rm ac}(t,\bar{y}(t,\zeta_{2}))\right|$ $\displaystyle=|k(t,\zeta_{1})-k(t,\zeta_{2})|$ $\displaystyle\leq\left\|k_{\zeta}(t,\,\cdot\,)\right\|_{L^{\infty}}|\zeta_{1}-\zeta_{2}|$ (3.32) $\displaystyle\leq e^{t}|\zeta_{1}-\zeta_{2}|,$ i.e., $\bar{U}(t,\zeta)$ is Lipschitz continuous with respect to space. The final step is to derive the differential equation for $U(t,\xi)$ from (3.31). Recall that we have the relation (3.33) $\bar{U}(t,\zeta)=U(t,k(t,\zeta)).$ Since $k(t,\,\cdot\,)$ is continuous and strictly increasing, there exists a continuous and strictly increasing function $o(t,\,\cdot\,)$ such that (3.34) $o(t,k(t,\zeta))=\zeta\quad\text{for all }(t,\zeta)\in[0,T]\times\mathbb{R}.$ Now, given $\xi\in\mathbb{R}$, there exists a unique $\zeta\in\mathbb{R}$ such that $k(t,\zeta)=\xi$, and thus $o(t,\xi)-o(s,\xi)=o(t,k(t,\zeta))-o(s,k(t,\zeta))=o(s,k(s,\zeta))-o(s,k(t,\zeta)).$ By definition, we have that $o(t,\,\cdot\,)$ is continuous and strictly increasing and hence differentiable almost everywhere. Furthermore, one has that $o(t,\,\cdot\,)$ satisfies (3.35) $e^{-t}\leq o_{\xi}(t,\xi)=\frac{1}{k_{\zeta}(t,o(t,\xi))}\leq e^{t},$ by (3.27), which yields $|o(t,\xi)-o(s,\xi)|\leq e^{T}|k(s,\zeta)-k(t,\zeta)|\leq e^{T}\int_{\min(s,t)}^{\max(s,t)}|u(\tau,y(\tau,k(\tau,\zeta)))|d\tau.$ Since $u(t,x)$ can be uniformly bounded on $[0,T]\times\mathbb{R}$, it follows that $o(t,\xi)$ is Lipschitz with respect to both space and time on $[0,T]\times\mathbb{R}$ and by Rademacher’s theorem differentiable almost everywhere. Moreover, direct calculations yield (3.36) $o_{t}(t,\xi)+Uo_{\xi}(t,\xi)=0\quad\text{ almost everywhere.}$ For every $t\in[0,T]$, $o(t,\,\cdot\,)$ is strictly increasing and continuous, and combining (3.33) and (3.34), one has $U(t,\xi)=\bar{U}(t,o(t,\xi))\quad\text{ for all }(t,\xi)\in[0,T]\times\mathbb{R}.$ Furthermore, both $\bar{U}$ and $o$ are Lipschitz with respect to both space and time on $[0,T]\times\mathbb{R}$, and hence both $U$ and $\bar{U}$ are Lipschitz and hence differentiable almost everywhere on $[0,T]\times\mathbb{R}$. Using (3.31) and (3.36) we finally end up with (3.37) $\displaystyle U_{t}(t,\xi)$ $\displaystyle=\bar{U}_{t}(t,o(t,\xi))+\bar{U}_{\zeta}(t,o(t,\xi))o_{t}(t,\xi)$ $\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C)-UU_{\xi}(t,\xi).$ Following closely [4] one can show that for each time $t$ the triplet $(y,U,\tilde{H})$ belongs to $\mathcal{F}_{0}$. Furthermore, the system given by (3.25) and (3.37) can be uniquely solved in $\mathcal{F}_{0}$ with the help of the method of characteristics. Thus we have shown the following result. ###### Theorem 3.4. Given a weak conservative solution $(u,\mu)$ to the Hunter–Saxton equation. Then the functions $y(t,\xi)$, $U(t,\xi)$, and $\tilde{H}(t,\xi)$ defined in (3.1), (3.2), and (3.3), respectively, satisfy the following system of differential equations (3.38a) $\displaystyle y_{t}(t,\xi)+Uy_{\xi}(t,\xi)$ $\displaystyle=U(t,\xi),$ (3.38b) $\displaystyle\tilde{H}_{t}(t,\xi)+U\tilde{H}_{\xi}(t,\xi)$ $\displaystyle=0,$ (3.38c) $\displaystyle U_{t}(t,\xi)+UU_{\xi}(t,\xi)$ $\displaystyle=\frac{1}{2}(\tilde{H}(t,\xi)-\frac{1}{2}C),$ which can be solved uniquely in $\mathcal{F}_{0}$ with the help of the method of characteristics. In particular, applying the method of characteristics yields the system of ordinary differential equations (2.6), which describes the weak conservative solutions constructed in [4]. ###### Remark 3.5. Note that the above system of differential equations (3.38) is related to the system (1.4) by relabeling. Indeed, denote by $(\check{y},\check{U},\check{H})$ the classical Lagrangian solution with initial data in $\mathcal{F}_{0}$, which solves (1.4), as introduced in [4]. Applying the method of characteristics to (3.38), will yield a unique solution, since the characteristic equation $k_{t}(t,\zeta)=U(t,k(t,\zeta))\quad\text{ with }\quad k(0,\zeta)=\zeta$ can be solved uniquely and $k(t,\,\cdot\,)$ is strictly increasing, see the beginning of this subsection. Thus we are led to investigating the system (3.39a) $\displaystyle k_{t}(t,\zeta)$ $\displaystyle=\hat{U}(t,\zeta),$ (3.39b) $\displaystyle\hat{y}_{t}(t,\zeta)$ $\displaystyle=\hat{U}(t,\zeta),$ (3.39c) $\displaystyle\hat{U}_{t}(t,\zeta)$ $\displaystyle=\frac{1}{2}(\hat{H}(t,\zeta)-\frac{1}{2}C),$ (3.39d) $\displaystyle\hat{H}_{t}(t,\zeta)$ $\displaystyle=0,$ where $(\hat{y},\hat{U},\hat{H})(t,\zeta)=(y,U,\tilde{H})(t,k(t,\zeta))$ with initial data $(\hat{y},\hat{U},\hat{H})(0,\zeta)=(y,U,\tilde{H})(0,\zeta)=(\check{y},\check{U},\check{H})(0,\zeta).$ While the last three equations coincide with the ones in (1.4), which suggests (3.40) $(\hat{y}(t,\zeta),\hat{U}(t,\zeta),\hat{H}(t,\zeta))=(\check{y}(t,\zeta),\check{U}(t,\zeta),\check{H}(t,\zeta)),$ the role of the first equation has to be clarified to prove (3.40). By construction one has that $(y+\tilde{H})(t,\xi)=\xi\quad\text{ for all }(t,\xi),$ which implies that $k(t,\zeta)=(y+\tilde{H})(t,k(t,\zeta))=(\hat{y}+\hat{H})(t,\zeta)$ and in particular, $k(t,\,\cdot\,)$ is the relabeling function connecting $(y,U,\tilde{H})(t,\,\cdot\,)\in\mathcal{F}_{0}$ with $(\hat{y},\hat{U},\hat{H})(t,\,\cdot\,)\in\mathcal{F}$ for every $t\in\mathbb{R}$. Furthermore, since $k(t,\zeta)$ can be recovered using $\hat{y}(t,\zeta)$ and $\hat{H}(t,\zeta)$, the system (3.39) can be reduced to (1.4) and hence one obtains the weak conservative solutions constructed in [4]. We have proved the following theorem. ###### Theorem 3.6. For any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ the Hunter–Saxton equation has a unique global conservative weak solution $(u,\mu)\in\mathcal{D}$ in the sense of Definition 2.3. ## 4\. Introduction of an auxiliary function As a preparation for rewriting the Hunter–Saxton equation in a set of coordinates, which shares the essential features with the Lagrangian coordinates, while at the same time avoiding equivalence classes, we introduce an, at the moment, auxiliary function $p(t,x)$. According to the definition of a weak solution, one has for all $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that (4.1) $\int_{s}^{t}\int_{\mathbb{R}}(\phi_{t}+u\phi_{x})(\tau,x)d\mu(\tau,x)d\tau=\int_{\mathbb{R}}\phi(t,x)d\mu(t,x)-\int_{\mathbb{R}}\phi(s,x)d\mu(s,x).$ Furthermore, recall that $F(t,x)=\mu(t,(-\infty,x))$. If we would use the change of variables from [6], which is based on the pseudo inverse of $F$, one difficulty turns up immediately. The function $F(t,\,\cdot\,)$, might have intervals, where it is constant and that would especially mean that its inverse would have jumps. The classical method of characteristics implies that these intervals, where $F(t,\,\cdot\,)$ is constant, will change their position (i.e., they move to the right or to the left), but their length remains unchanged. This would imply that one has to deal with jumps in the inverse, and hence the involved change of variables does not simplify the problem we are interested in. Therefore, a change of variables, for proving the existence and uniqueness of conservative solutions of the HS equation, while at the same time avoiding equivalence classes, should not be based on the inverse of $F$, but the inverse of a strictly increasing and bounded function. This is where $p(t,x)$ will come into the play. Let $n\in\mathbb{N}$. Introduce the non-negative function (4.2) $p_{n}(t,x)=\big{(}K_{n}\star\mu(t)\big{)}(x)=\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y),$ with (4.3) $K_{n}(x)=\frac{1}{(1+x^{2})^{n}}.$ We note the following elementary result. ###### Lemma 4.1. Let $n\in\mathbb{N}$ and $K_{n}$ be given by (4.3). Then $K_{n}\in L^{p}(\mathbb{R})\cap\mathcal{C}^{\infty}_{0}(\mathbb{R})$ for all $1\leq p\leq\infty$. Note that $\left|K_{n}^{\prime}\right|\leq nK_{n},\quad 0<K_{n}\leq K_{1},\quad\left\|K_{1}\right\|_{L^{1}(\mathbb{R})}=\pi.$ The $j$th derivative $K_{n}^{(j)}$ satisfies $K_{n}^{(j)}(x)=\frac{q_{n,j}(x)}{(1+x^{2})^{2^{j}n}},$ where $q_{n,j}(x)$ denotes a polynomial with degree not exceeding $2^{j+1}n-2n-j$. Thus $p_{n}(t,\,\cdot\,)=K_{n}\star\mu(t)\in\mathcal{C}^{\infty}_{0}(\mathbb{R})\cap H^{s}(\mathbb{R})$ for any integer $s\geq 1$. ###### Proof. Clearly $K_{n}^{(j)}=q_{n,j}r^{-2^{j}n}$ for some polynomial $q_{n,j}$ where $r=1+x^{2}$. It remains to estimate the degree of $q_{n,j}$. We prove this by induction. Observe first that $\deg(q_{n,0})=0$ and $\deg(r^{n})=2n$. We find in general $q_{n,j+1}=q_{n,j}^{\prime}r^{2^{j}n}-2^{j}nq_{n,j}r^{2^{j}n-1}r^{\prime},\quad j\in\mathbb{N}\cup\\{0\\}.$ Assume that $\deg(q_{n,j})\leq 2^{j+1}n-2n-j$ for some $j$. Then we note $\displaystyle\deg(q_{n,j+1})$ $\displaystyle\leq\max(\deg(q_{n,j}^{\prime}r^{2^{j}n}),\deg(q_{n,j}r^{2^{j}n-1}r^{\prime}))$ $\displaystyle\leq\max(2^{j+1}n-2n-j-1+2^{j+1}n,2^{j+1}n-2n-j+2(2^{j}n-1)+1)$ $\displaystyle=2^{j+2}n-2n-j-1.$ Furthermore, one has $\deg(q_{n,j})\leq\deg(r^{2^{j}n})-j,$ and therefore $p_{n}(t,x)$ not only belongs to $\mathcal{C}^{\infty}_{0}(\mathbb{R})$, but $p_{n}(t,\,\cdot\,)$ in $H^{s}(\mathbb{R})$ for any integer $s\geq 1$. ∎ ###### Remark 4.2. We will drop the subscript $n$ in the notation, and the value of $n$ will only be fixed later. Thus we write $K(x)=\frac{1}{(1+x^{2})^{n}},\quad p(t,x)=\big{(}K\star\mu(t)\big{)}(x).$ What can we say about the time evolution of the function $p(t,x)$? We have two main ingredients: On the one hand the definition of $p(t,x)$. Consider $\psi\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ such that $\operatorname{supp}(\psi)\subset(-1,T+1)$, $\psi\equiv 1$ on $[0,T]$, and $0\leq\psi\leq 1$. If we define $\phi(t,x)=\psi(t)K(x)$, then $\phi(t,x)\in\mathcal{C}^{\infty}([0,\infty)\times\mathbb{R})$ and it can be approximated by admissible test functions. On the other hand we have the definition of a weak solution (4.1), which implies $\displaystyle p(s,x)-p(t,x)$ $\displaystyle=\int_{\mathbb{R}}\phi(s,x-y)d\mu(s,y)-\int_{\mathbb{R}}\phi(t,x-y)d\mu(t,y)$ $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y)\phi_{x}(\tau,x-y)d\mu(\tau,y)d\tau$ (4.4) $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)d\tau,\quad 0\leq t<s\leq T.$ Note that the above equation implies that the function $p(t,x)$ is locally Lipschitz continuous with respect to time, if $\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)$ can be uniformly bounded. Therefore observe that $|\int_{\mathbb{R}}u(\tau,y)K^{\prime}(x-y)d\mu(\tau,y)|\leq n\left\|u(\tau,\,\cdot\,)\right\|_{L^{\infty}}p(\tau,x)\leq n\left\|u(\tau,\,\cdot\,)\right\|_{L^{\infty}}C.$ Furthermore, since $u(t,x)$ is a weak solution to $u_{t}+uu_{x}=\frac{1}{2}(F-\frac{1}{2}C),$ we have that $\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\leq\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct\quad\text{ for all }\quad t\geq 0.$ Thus Rademacher’s theorem yields that the function $t\mapsto p(t,x)=\int_{\mathbb{R}}K(x-y)d\mu(t,y)$ from $[0,T]$ to $\mathbb{R}$ is Lipschitz continuous (or locally Lipschitz continuous on $[0,\infty)\times\mathbb{R}$) and hence differentiable almost everywhere on the finite interval $[0,T]$. In fact, one has from (4.4) and Definition 2.3 that (4.5) $p_{t}(t,x)=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)$ for all $(t,x)\in[0,T]\times\mathbb{R}$. Indeed, use (4.4) as a starting point, which reads in Lagrangian coordinates $(\check{y},\check{U},\check{H})$, (4.6) $p(s,x)-p(t,x)=-\int_{t}^{s}\int_{\mathbb{R}}\check{U}(\tau,\xi)K^{\prime}(x-\check{y}(\tau,\xi))\check{H}_{\xi}(\tau,\xi)d\xi d\tau.$ Recalling (2.6), direct calculations yield $\displaystyle p(s,x)-p(t,x)$ $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}\check{U}(t,\xi)K^{\prime}(x-\check{y}(t,\xi))\check{H}_{\xi}(t,\xi)d\xi d\tau+\mathcal{O}((t-s)^{2})$ $\displaystyle=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)(s-t)+\mathcal{O}((t-s)^{2})$ which implies (4.7) $\lim_{s\to t}\frac{p(s,x)-p(t,x)}{s-t}=-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\mu(t,y)$ for all $(t,x)\in[0,T]\times\mathbb{R}$. Note that combining (4.5), (3.6), and Lemma 4.1, one has (4.8) $|p_{t}(t,x)|\leq\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}n\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}\leq(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)nC$ For later use, note that, we have (4.9) $0\leq p(t,x)\leq\int_{\mathbb{R}}d\mu(t,y)=C$ and (4.10) $\int_{\mathbb{R}}p(t,x)dx=\int_{\mathbb{R}}\int_{\mathbb{R}}K(x-y)d\mu(t,y)dx=\int_{\mathbb{R}}\int_{\mathbb{R}}K(x-y)dx\,d\mu(t,y)=B,$ where $B$ is independent of time. A closer look reveals that $\int_{\mathbb{R}}p(t,x)dx\leq\int_{\mathbb{R}}\int_{\mathbb{R}}\frac{1}{1+(x-y)^{2}}d\mu(t,y)dx=\pi C.$ Furthermore, Lemma 4.1 implies that $p_{x}(t,\cdot)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$ and (4.11) $|p_{x}(t,x)|\leq np(t,x).$ Finally, note the following useful expression $\displaystyle\int_{-\infty}^{x}p_{t}(t,z)dz$ $\displaystyle=-\int_{-\infty}^{x}\int_{\mathbb{R}}u(t,y)K^{\prime}(z-y)d\mu(t,y)dz$ $\displaystyle=-\int_{\mathbb{R}}\int_{-\infty}^{x}u(t,y)K^{\prime}(z-y)dz\,d\mu(t,y)$ (4.12) $\displaystyle=-\int_{\mathbb{R}}u(t,y)K(x-y)d\mu(t,y).$ Thus the function (4.13) $g(t,\xi)=\int_{-\infty}^{y(t,\xi)}p(t,z)dz$ is differentiable almost everywhere on $[0,T]\times\mathbb{R}$ and satisfies (4.14) $\displaystyle g_{\xi}(t,\xi)$ $\displaystyle=p(t,y(t,\xi))y_{\xi}(t,\xi),$ $\displaystyle g_{t}(t,\xi)$ $\displaystyle=\int_{-\infty}^{y(t,\xi)}p_{t}(t,z)dz+p(t,y(t,\xi))y_{t}(t,\xi)$ (4.15) $\displaystyle=pu(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)-\int_{\mathbb{R}}u(t,z)K(y(t,\xi)-z)d\mu(t,z).$ Here we used, in the last step, (3.2) and (3.23). Note, that $g(t,\xi)$ is not only differentiable on $[0,T]\times\mathbb{R}$, but even Lipschitz continuous. ## 5\. Uniqueness in a new set of coordinates In this section we will rewrite the Hunter–Saxton equation in a set of coordinates, which shares the essential features with the Lagrangian coordinates, while at the same time avoids equivalence classes. However, there is a price to pay: we have to impose an additional moment condition. Given $\gamma>2$ and a weak conservative solution $(u,\mu)$ in the sense of Definition 2.3, such that (5.1) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(0,x)<\infty.$ Using the reformulation of the Hunter–Saxton equation in Lagrangian coordinates, whose time evolution is given by (2.6) and that $f_{\gamma}(x)=|x|^{\gamma}$ is convex for $\gamma>2$, it follows that (5.2) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t,x)<\infty\quad\text{ for all }t\in\mathbb{R}.$ We can see this as follows. $\displaystyle\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t,x)$ $\displaystyle=\int_{\mathbb{R}}(1+|\check{y}(t,\xi)|^{\gamma})\check{H}_{\xi}(t,\xi)d\xi$ $\displaystyle=\int_{\mathbb{R}}(1+|\check{y}(t,\xi)|^{\gamma})\check{H}_{\xi}(0,\xi)d\xi$ $\displaystyle\leq 2^{\gamma-1}\int_{\mathbb{R}}(1+|\check{y}(0,\xi)|^{\gamma})\check{H}_{\xi}(0,\xi)d\xi$ $\displaystyle\quad+2^{\gamma-1}(\|u_{0}\|_{\infty}+\frac{CT}{4})^{\gamma}t^{\gamma}\int_{\mathbb{R}}\check{H}_{\xi}(0,\xi)d\xi$ $\displaystyle\leq\tilde{C}\Big{(}\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(0,x)+t^{\gamma}\Big{)},$ for a constant $\tilde{C}$, using (2.7c), (2.9b) and the estimate $\left|\check{y}(t,\xi)\right|\leq\left|\check{y}(0,\xi)\right|+\int_{0}^{t}\left|\check{y}_{t}(s,\xi)\right|ds\leq\left|\check{y}(0,\xi)\right|+(\|u_{0}\|_{\infty}+\frac{CT}{4})t.$ Moreover, recalling the definition of $p(t,x)$, cf. (4.2), and introducing the non-negative measure (5.3) $d\nu(t,x)=p(t,x)dx+d\mu(t,x),$ we have that (5.2) implies for any $n\geq\gamma$, (5.4) $\int_{\mathbb{R}}(1+|x|^{\gamma})d\nu(t,x)<\infty\quad\text{ for all }t\in\mathbb{R}.$ For details we refer to Lemma A.3. Furthermore, let (5.5) $G(t,x)=\nu(t,(-\infty,x))=\int_{-\infty}^{x}p(t,y)dy+F(t,x),$ where $F(t,x)$ is given by (2.16). Then for all $t\in\mathbb{R}$ the function $G(t,\,\cdot\,)$ is strictly increasing and satisfies (5.6) $\lim_{x\to-\infty}G(t,x)=0\quad\text{ and }\quad\lim_{x\to\infty}G(t,x)=B+C.$ Last but not least introduce $\chi(t,\,\cdot\,)$ the (pseudo) inverse of $G(t,\,\cdot\,)$, i.e., (5.7) $\chi(t,\eta)=\sup\\{x\mid G(t,x)<\eta\\}.$ Then $\chi(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ is strictly increasing for every $t\not\in\mathcal{N}$. Furthermore, since the function $G(t,\,\cdot\,)$ is of bounded variation, it can have at most countably many jumps, which implies that $\chi(t,\,\cdot\,)$ can have at most countably many intervals where it is constant. On the other hand, the function $\chi(t,\,\cdot\,)$ has no jumps since the function $G(t,\,\cdot\,)$, in contrast to $F(t,\,\cdot\,)$, is strictly increasing. Our first goal is to show that (5.8) $\chi(t,\eta)=y(t,\ell(t,\eta)),$ where $y(t,\xi)$ is given by (3.1) and $\ell(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ is a strictly increasing function to be determined next. Note that combining (4.13) and (5.5) one has $G(t,y(t,\xi)\pm)=g(t,\xi)+F(t,y(t,\xi)\pm),$ and therefore (3.5) can be rewritten as $G(t,y(t,\xi)-)\leq g(t,\xi)+\tilde{H}(t,\xi)\leq G(t,y(t,\xi)+).$ Introducing (cf. (3.2) and (4.13)) (5.9) $H(t,\xi)=g(t,\xi)+\tilde{H}(t,\xi),$ we end up with (5.10) $G(t,y(t,\xi)-)\leq H(t,\xi)\leq G(t,y(t,\xi)+)\quad\text{ for all }\xi\in\mathbb{R}.$ Since $H(t,\,\cdot\,)\colon\mathbb{R}\to[0,B+C]$ is strictly increasing (as $\tilde{H}$ is non-decreasing and $g$ is strictly increasing) and continuous, it is invertible with inverse $\ell(t,\,\cdot\,)$, i.e., (5.11) $H(t,\ell(t,\eta))=\eta\quad\text{ for all }(t,\eta).$ This is the function sought in (5.8). Furthermore, (5.12) $G(t,y(t,\ell(t,\eta))-)\leq H(t,\ell(t,\eta))=\eta\leq G(t,y(t,\ell(t,\eta))+).$ Since $y(t,\,\cdot\,)$ is surjective and non-decreasing, we end up with $\chi(t,\eta)=\sup\\{x\mid G(t,x)<\eta\\}=y(t,\ell(t,\eta)).$ ###### Remark 5.1. Recall Remark 3.1 and the notation therein. Assume $X_{1}(t,\xi)=X(t,f(t,\xi))\quad\text{ for all }(t,\xi),$ where $X(t,\,\cdot\,)\in\mathcal{F}_{0}$ and $f(t,\,\cdot\,)\in\mathcal{G}$, i.e., $X(t,\,\cdot\,)$ and $X_{1}(t,\,\cdot\,)$ belong to the same equivalence class. Then, following the same lines as above and denoting the inverse of $f(t,\,\cdot\,)$ by $f^{-1}(t,\,\cdot\,)$, we would have ended up with $\chi(t,\eta)=y_{1}(t,\ell_{1}(t,\eta))=y(t,f(t,f^{-1}(t,\ell(t,\eta))))=y(t,\ell(t,\eta))$ and $\ell_{1}(t,\eta)=f^{-1}(t,\ell(t,\eta)).$ Thus we obtain the same function $\chi(t,\eta)$ independent of which representative in the corresponding equivalence class we choose. This is in contrast to some of the following steps, where relabeling will play a crucial role. In particular, it is then of great importance, which representative we choose from the equivalence class. ### 5.1. Differentiability of $\chi(t,\eta)$ with respect to time Next, we want to study the time evolution of $\chi(t,\eta)$. On the one hand, we will see that $\chi(t,\eta)$ behaves like a characteristic. On the other hand, we expect $\chi_{t}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$, since one has $\int_{\mathbb{R}}|x|^{\gamma}d\nu(t,x)=\int_{0}^{B+C}|\chi(t,\eta)|^{\gamma}d\eta,$ by (5.4) and (5.7). To begin with we aim at showing that $\chi(t,\eta)$ is differentiable with respect to time in the following sense: We establish that $\chi(\,\cdot\,,\eta)$ is Lipschitz continuous and show that for each $t\in[0,T]$ one has that $\chi_{t}(t,\eta)=\lim_{s\to t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}$ exists for almost every $\eta\in[0,B+C]$. The dominated convergence theorem then implies that $\chi_{t}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$. To establish that $\chi(t,\eta)$ is Lipschitz with respect to time, a relabeling argument will be the key. We will show that $(y+H)(t,\,\cdot\,)$ is a relabeling function denoted $v(t,\,\cdot\,)$. To that end observe that combining (3.2) and (5.9) yields (5.13) $y(t,\xi)+H(t,\xi)=\xi+g(t,\xi).$ Introducing the function (5.14) $v(t,\xi)=\xi+g(t,\xi),$ where $g(t,\xi)$ is given by (4.13), we end up with (5.15) $y(t,\xi)+H(t,\xi)=v(t,\xi).$ Combining (4.9), (4.10), and $0\leq y_{\xi}(t,\xi)\leq 1$, we have that $v(t,\,\cdot\,)$ satisfies all assumptions of Lemma 2.7 and hence $v(t,\,\cdot\,)\colon\mathbb{R}\to\mathbb{R}$ is a relabeling function. Thus $v(t,\,\cdot\,):\mathbb{R}\to\mathbb{R}$ is strictly increasing and continuous, which implies that there exists a unique, strictly increasing and continuous function $w(t,\,\cdot\,):\mathbb{R}\to\mathbb{R}$ such that (5.16) $v(t,w(t,\xi))=\xi=w(t,v(t,\xi))\quad\text{ for all } (t,\xi)\in[0,T]\times\mathbb{R}.$ In particular, one has $y(t,w(t,\xi))+H(t,w(t,\xi))=\xi\quad\text{ for all }(t,\xi)\in[0,T]\times\mathbb{R}.$ Introducing (5.17) $\hat{y}(t,\xi)=y(t,w(t,\xi))\quad\text{ and }\quad\hat{H}(t,\xi)=H(t,w(t,\xi)),$ the relation (5.15) rewrites as (5.18) $\hat{y}(t,\xi)+\hat{H}(t,\xi)=\xi.$ Since both $H(t,\,\cdot\,)$ and $w(t,\,\cdot\,)$, and hence $\hat{H}(t,\,\cdot\,)$, are strictly increasing and continuous, there exists a unique, strictly increasing and continuous function $\hat{\ell}(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ such that (5.19) $\hat{H}(t,\hat{\ell}(t,\eta))=\eta\quad\text{ for all }(t,\eta)\in[0,T]\times[0,B+C].$ Recalling (5.16) and (5.17), we have that $H\big{(}t,w(t,v(t,\ell(t,\eta)))\big{)}=H(t,\ell(t,\eta))=\eta=\hat{H}(t,\hat{\ell}(t,\eta))=H\big{(}t,w(t,\hat{\ell}(t,\eta))\big{)}.$ Thus, cf. Remark 5.1, $\hat{\ell}(t,\eta)=v(t,\ell(t,\eta))\quad\text{ for all }(t,\eta)\in[0,T]\times[0,B+C].$ and (5.20) $\chi(t,\eta)=y(t,\ell(t,\eta))=\hat{y}(t,\hat{\ell}(t,\eta)),$ which, together with (5.18), implies (5.21) $\chi(t,\eta)+\eta=\hat{y}(t,\hat{\ell}(t,\eta))+\hat{H}(t,\hat{\ell}(t,\eta))=\hat{\ell}(t,\eta)=\ell(t,\eta)+g(t,\ell(t,\eta)).$ An important consequence of the above equality is, that we can choose whether we want to study the differentiability of $\chi(t,\eta)=\hat{\ell}(t,\eta)-\eta$ or of $\hat{\ell}(t,\eta)$ with respect to time. Since $\hat{\ell}(t,\,\cdot\,)$ is the inverse to $\hat{H}(t,\,\cdot\,)$, it seems advantageous to study $\hat{\ell}(t,\eta)$ in detail. The basis will be a good understanding of the relabeling function $v(t,\eta)$ and its inverse $w(t,\eta)$. #### The Lipschitz continuity of $w(t,\xi)$ We proceed by showing that the function $w(t,\xi)$ is Lipschitz continuous, which then implies that both $\hat{y}(t,\xi)$ and $\hat{H}(t,\xi)$ are differentiable almost everywhere. A closer look at (5.14) reveals that $v(t,\xi)$ is Lipschitz continuous and hence differentiable almost everywhere on $[0,T]\times\mathbb{R}$. In particular, (4.14), (4.9), and $0\leq y_{\xi}(t,\xi)\leq 1$ yield (5.22) $1\leq v_{\xi}(t,\xi)=1+p(t,y(t,\xi))y_{\xi}(t,\xi)\leq 1+C,$ and, using (5.14) and (4.15), (5.23) $v_{t}(t,\xi)=g_{t}(t,\xi)=pu(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)-\int_{\mathbb{R}}u(t,z)K(y(t,\xi)-z)d\mu(t,z),$ which satisfies $|v_{t}(t,\xi)|\leq 2\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct\big{)}C,$ by applying in addition (3.6) and (3.2). Now, given $\xi\in\mathbb{R}$, there exists a unique $\eta\in\mathbb{R}$ by (5.16), such that $w(t,\xi)=w(t,v(t,\eta))=\eta=w(s,v(s,\eta)).$ Thus, we can write (5.24) $w(t,\xi)-w(s,\xi)=w(t,v(t,\eta))-w(s,v(t,\eta))=w(s,v(s,\eta))-w(s,v(t,\eta)).$ By definition, we have that $w(t,\,\cdot\,)$ is continuous and strictly increasing. In particular, one has that $w(t,\,\cdot\,)$ is differentiable almost everywhere and $\displaystyle w_{\xi}(t,\xi)=\frac{1}{v_{\xi}(t,w(t,\xi))}$ $\displaystyle=\frac{1}{1+p(t,y(t,w(t,\xi)))y_{\xi}(t,w(t,\xi))}$ $\displaystyle=\frac{1}{1+p(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))}\leq 1.$ Combined, with (5.24), this yields $|w(t,\xi)-w(s,\xi)|\leq|v(s,\eta)-v(t,\eta)|\leq 2(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)C|t-s|.$ Furthermore, one has $|w(t,\xi_{1})-w(t,\xi_{2})|\leq|\xi_{1}-\xi_{2}|.$ This finishes the proof of the Lipschitz continuity of $w(t,\xi)$, which implies by Rademacher’s theorem that $w(t,\xi)$ is differentiable almost everywhere on $[0,T]\times\mathbb{R}$. Since also $y$, $\tilde{H}$, and $g$ are Lipschitz continuous on $[0,T]\times\mathbb{R}$, (5.9) and (5.17) imply that $\hat{H}$ and $\hat{y}$ are differentiable almost everywhere on $[0,T]\times\mathbb{R}$. #### The Lipschitz continuity of $\hat{\ell}(\,\cdot\,,\eta)$ We are now ready to show the Lipschitz continuity of $\hat{\ell}(\,\cdot\,,\eta)$, which immediately implies that $\chi(\,\cdot\,,\eta)$ is Lipschitz continuous by (5.21). In view of (5.19), we start by having a closer look at $\hat{H}(t,\xi)$. By (5.16) we have that, (5.25) $w_{t}(t,\xi)=-v_{t}(t,w(t,\xi))w_{\xi}(t,\xi)=-g_{t}(t,w(t,\xi))w_{\xi}(t,\xi),$ and, using (5.9), (3.24), and (4.14) that $\displaystyle H_{t}(t,\xi)$ $\displaystyle+u(t,y(t,\xi))H_{\xi}(t,\xi)$ $\displaystyle=\tilde{H}_{t}(t,\xi)+u(t,y(t,\xi))\tilde{H}_{\xi}(t,\xi)+g_{t}(t,\xi)+u(t,y(t,\xi))g_{\xi}(t,\xi)$ $\displaystyle=g_{t}(t,\xi)+u(t,y(t,\xi))g_{\xi}(t,\xi)$ (5.26) $\displaystyle=g_{t}(t,\xi)+up(t,y(t,\xi))y_{\xi}(t,\xi).$ Combing the above equations and recalling (4.15), (5.17), (5.18), and (5.22) we get $\displaystyle\hat{H}_{t}(t,\xi)$ $\displaystyle+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$ $\displaystyle=\big{(}H_{t}(t,w(t,\xi))+u(t,\hat{y}(t,\xi))H_{\xi}(t,w(t,\xi))\big{)}-u(t,\hat{y}(t,\xi))H_{\xi}(t,w(t,\xi))$ $\displaystyle\quad+H_{\xi}(t,w(t,\xi))w_{t}(t,\xi)+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$ $\displaystyle=g_{t}(t,w(t,\xi))+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))-u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)v_{\xi}(t,w(t,\xi))$ $\displaystyle\quad- g_{t}(t,w(t,\xi))\hat{H}_{\xi}(t,\xi)+u(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)$ $\displaystyle=g_{t}(t,w(t,\xi))\hat{y}_{\xi}(t,\xi)+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi))$ $\displaystyle\quad- up(t,\hat{y}(t,\xi))\hat{H}_{\xi}(t,\xi)y_{\xi}(t,w(t,\xi))$ $\displaystyle=(g_{t}(t,w(t,\xi))+up(t,\hat{y}(t,\xi))y_{\xi}(t,w(t,\xi)))\hat{y}_{\xi}(t,\xi)$ $\displaystyle=\Big{(}up(t,\hat{y}(t,\xi))-\int_{\mathbb{R}}u(t,z)K(\hat{y}(t,\xi)-z)d\mu(t,z)\Big{)}\hat{y}_{\xi}(t,\xi).$ If we can show that the term on the right-hand side can be bounded by a multiple of $\hat{H}_{\xi}$, then we are led to sub- and supersolutions, which solve a transport equation. Recalling (5.9), (4.13), and (3.6), we have that $\displaystyle|\Big{(}up(t,\hat{y}(t,\xi))$ $\displaystyle-\int_{\mathbb{R}}u(t,z)K(\hat{y}(t,\xi)-z)d\mu(t,z)\Big{)}\hat{y}_{\xi}(t,\xi)|$ $\displaystyle\leq 2\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}p(t,\hat{y}(t,\xi))\hat{y}_{\xi}(t,\xi)$ $\displaystyle\leq 2\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}\hat{H}_{\xi}(t,\xi).$ Here we have used that $\displaystyle\hat{H}_{\xi}(t,\xi)$ $\displaystyle=H_{\xi}(t,w(t,\xi))w_{\xi}(t,\xi)$ $\displaystyle=\big{(}\tilde{H}_{\xi}(t,w(t,\xi))+p(t,y(t,w(t,\xi)))y_{\xi}(t,w(t,\xi))\big{)}w_{\xi}(t,\xi)$ $\displaystyle\geq p(t,\hat{y}(t,\xi))\hat{y}_{\xi}(t,\xi),$ which combines (4.13), (5.9), (5.17), $0\leq\tilde{H}_{\xi}(t,\xi)\leq 1$, and $w_{\xi}(t,\xi)\geq 0$. In particular, one obtains that $\hat{H}_{t}(t,\xi)-A\hat{H}_{\xi}(t,\xi)\leq 0\leq\hat{H}_{t}(t,\xi)+A\hat{H}_{\xi}(t,\xi),$ where $A=3(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)$. Applying the method of characteristics, we end up with the following estimate $\hat{H}(s,x-A|t-s|)\leq\hat{H}(t,x)\leq\hat{H}(s,x+A|t-s|).$ Now, following the same lines as before, we have: Given $\eta\in[0,B+C]$, there exists a unique $\hat{\eta}\in\mathbb{R}$ such that $\hat{\ell}(t,\eta)=\hat{\ell}(t,\hat{H}(t,\hat{\eta}))=\hat{\eta}=\hat{\ell}(s,\hat{H}(s,\hat{\eta})).$ Furthermore, we have $\displaystyle|\hat{\ell}(t,\eta)-\hat{\ell}(s,\eta)|$ $\displaystyle=|\hat{\ell}(t,\hat{H}(t,\hat{\eta}))-\hat{\ell}(s,\hat{H}(t,\hat{\eta}))|$ $\displaystyle=|\hat{\ell}(s,\hat{H}(s,\hat{\eta}))-\hat{\ell}(s,\hat{H}(t,\hat{\eta}))|$ $\displaystyle\leq\hat{\ell}(s,\hat{H}(s,\hat{\eta}+A|t-s|))-\hat{\ell}(s,\hat{H}(s,\hat{\eta}-A|t-s|))=2A|t-s|,$ since $\hat{\ell}(t,\,\cdot\,)$ is strictly increasing, and (cf. (5.21)) (5.27) $\left|\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}\right|=\left|\frac{\hat{\ell}(t,\eta)-\hat{\ell}(s,\eta)}{t-s}\right|\leq 2A.$ This finishes the proof of the Lipschitz continuity of $\hat{\ell}(\,\cdot\,,\eta)$. Note that $\chi(t,\,\cdot\,)\colon[0,B+C]\to\mathbb{R}$ and hence $2A$ can be seen as a dominating function. This observation is essential since the differential equation for $\chi$ has to be considered in $L^{\gamma}([0,B+C])$. #### The time derivative of $\chi_{t}(t,\eta)$ It is left to compute, cf. (5.21), $\displaystyle\chi_{t}(t,\eta)$ $\displaystyle=\lim_{s\to t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}$ (5.28) $\displaystyle=\lim_{s\to t}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s}+\lim_{s\to t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$ for almost every $\eta\in[0,B+C]$. #### The time derivative of $\ell(t,\eta)$ To begin with, we will show that $\lim_{s\to t}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s}$ exists for almost every $\eta\in[0,B+C]$ and compute its value. Since $\ell(t,\,\cdot\,)$ is the inverse of $H(t,\,\cdot\,)$, cf. (5.11), we start by having a closer look at $H(t,\xi)$. Recall (3.21), which implies that $|y\big{(}t,\xi+u(s,y(s,\xi))(t-s)\big{)}-y(t,\xi+u(t,y(t,\xi))(t-s))|\leq D(1+N)^{1/2}|t-s|^{3/2},$ and, combined with (3.20), that there exists a positive constant $\tilde{M}$ such that (5.29) $\left|y(t,\xi+u(t,y(t,\xi))(t-s))-y(s,\xi)-u(t,y(t,\xi))(t-s)\right|\leq\tilde{M}|t-s|^{3/2}.$ Applying (3.2) the above inequality reads (5.30) $\left|\tilde{H}(s,\xi)-\tilde{H}\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}\right|\leq\tilde{M}|t-s|^{3/2}.$ As the following lemma shows a similar estimate holds for $H(t,\xi)$. The proof relies on a detailed investigation of the function $g(t,\xi)$ and can be found in Lemma A.1. ###### Lemma 5.2. (i): Let $g(t,\xi)$ be given by (4.13). Then there exists a positive constant $\bar{M}$ such that (5.31) $\displaystyle-\bar{M}$ $\displaystyle|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s)))u(t,y(t,\xi)\big{)}(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$ $\displaystyle\leq g(s,\xi)-g\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$ $\displaystyle\leq\bar{M}|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$ (ii): Let $H(t,\xi)$ be defined by (5.9). Then $\displaystyle-(\tilde{M}$ $\displaystyle+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$ $\displaystyle\leq H(s,\xi)-H\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$ $\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$ Since both $H(t,\,\cdot\,)$ and its inverse $\ell(t,\,\cdot\,)$ are strictly increasing and continuous, we have that there exists a unique $\eta(s)$ such that (5.32) $\ell(s,\eta)+u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)=\ell(t,\eta(s)),$ and replacing $\xi$ by $\ell(s,\eta)$ in Lemma 5.2 (ii), we have (5.33) $\displaystyle-($ $\displaystyle\tilde{M}+\bar{M})|t-s|^{3/2}$ $\displaystyle\quad-p\big{(}t,y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))$ $\displaystyle\qquad\qquad\times K\big{(}y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(s-t)$ $\displaystyle\leq\eta-\eta(s)$ $\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}$ $\displaystyle\quad-p\big{(}t,y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))$ $\displaystyle\qquad\qquad\times K\big{(}y(t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(s-t).$ Furthermore, note that the above inequality implies that $\eta(s)\to\eta$ as $s\to t$ and hence $\ell(s,\eta)\to\ell(t,\eta)$ as $s\to t$ by (5.32). Thus we have (5.34) $\displaystyle\ell_{t}(t,\eta)$ $\displaystyle=\lim_{s\to t}\frac{\ell(s,\eta)-\ell(t,\eta)}{s-t}$ $\displaystyle=\lim_{s\to t}\left(\frac{\ell(t,\eta(s))-\ell(t,\eta)}{\eta(s)-\eta}\frac{\eta(s)-\eta}{s-t}+u(t,y(t,\ell(s,\eta)))\right)$ $\displaystyle=\lim_{s\to t}\frac{\ell(t,\eta(s))-\ell(t,\eta)}{\eta(s)-\eta}\lim_{s\to t}\frac{\eta(s)-\eta}{s-t}+\lim_{s\to t}u(t,y(t,\ell(s,\eta))),$ if all the above limits exist. The first limit is of the form $\lim_{\tilde{\eta}\to\eta}\frac{\ell(t,\tilde{\eta})-\ell(t,\eta)}{\tilde{\eta}-\eta}$ since $\eta(s)\to\eta$ as $s\to t$. Moreover, $\ell(t,\,\cdot\,)$ is strictly increasing and continuous and hence differentiable almost everywhere. Thus, the above limit exists for almost every $\eta\in\mathbb{R}$ and equals $\ell_{\eta}(t,\eta)$. For the second limit, keep in mind that both $u(t,\,\cdot\,)$ and $p(t,\,\cdot\,)$ are continuous and that $\ell(s,\eta)\to\ell(t,\eta)$ as $s\to t$. The estimate (5.33), then implies that $\displaystyle\lim_{s\to t}\frac{\eta(s)-\eta}{s-t}$ $\displaystyle=-p(t,y(t,\ell(t,\eta)))u(t,y(t,\ell(t,\eta)))$ $\displaystyle\quad+\int_{\mathbb{R}}u(t,y(t,\xi))K(y(t,\ell(t,\eta))-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$ $\displaystyle=-p(t,\chi(t,\eta))u(t,\chi(t,\eta))$ (5.35) $\displaystyle\quad+\int_{0}^{B+C}u(t,\chi(t,\xi))K(\chi(t,\eta)-\chi(t,\xi))\big{(}1-p(t,\chi(t,\xi))\chi_{\eta}(t,\xi)\big{)}d\xi.$ Here we used (5.8), (4.13), (5.9). Introducing (5.36) $\mathcal{U}(t,\eta)=u(t,\chi(t,\eta))\quad\text{ and }\quad\mathcal{P}(t,\eta)=p(t,\chi(t,\eta)),$ we end up with (5.37) $\lim_{s\to t}\frac{\eta(s)-\eta}{s-t}=-h(t,\eta),$ where (5.38) $h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$ Using once more that $u(t,\,\cdot\,)$ is continuous and that $\ell(s,\eta)\to\ell(t,\eta)$ as $s\to t$, we get (5.39) $\lim_{s\to t}u(t,y(t,\ell(s,\eta)))=u(t,y(t,\ell(t,\eta)))=\mathcal{U}(t,\eta).$ Combining (5.34)–(5.39) we have shown that for a given $t$, one has for almost every $\eta\in[0,B+C]$ that (5.40) $\ell_{t}(t,\eta)+h(t,\eta)\ell_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$ where $h(t,\eta)$ is given by (5.38). This completes the computation of $\ell_{t}(t,\eta)$. It is left to show, cf. (5.28), that $\lim_{s\to t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$ exists for almost every $\eta\in[0,B+C]$ and to compute its value. Recall (5.31) and (5.32), which imply $\displaystyle g(t,\ell(t,\eta))-$ $\displaystyle g(s,\ell(s,\eta))$ $\displaystyle=g(t,\ell(t,\eta))-g(t,\ell(t,\eta(s)))$ $\displaystyle\quad+g\big{(}t,\ell(s,\eta)+u(t,y(t,\ell(s,\eta)))(t-s)\big{)}-g(s,\ell(s,\eta))$ $\displaystyle=\frac{g(t,\ell(t,\eta))-g(t,\ell(t,\eta(s)))}{\eta-\eta(s)}(\eta-\eta(s))$ $\displaystyle\quad+p\big{(}t,y(t,\ell(t,\eta(s)))\big{)}u\big{(}t,y(t,\ell(s,\eta))\big{)}(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\tilde{\eta}))K\big{(}y(t,\ell(t,\eta(s)))-y(t,\tilde{\eta})\big{)}\tilde{H}_{\xi}(t,\tilde{\eta})d\tilde{\eta}\,(t-s)$ $\displaystyle\quad+\mathcal{O}(\left|t-s\right|^{3/2}).$ Using (5.37) and (5.38), we thus end up with (5.41) $\displaystyle\lim_{s\to t}\frac{g(t,\ell(t,\eta))-g(s,\ell(s,\eta))}{t-s}$ $\displaystyle=\big{(}1-g_{\xi}(t,\ell(t,\eta))\ell_{\eta}(t,\eta)\big{)}h(t,\eta)$ $\displaystyle=(1-\mathcal{P}(t,\eta)\chi_{\eta}(t,\eta))h(t,\eta).$ Combining (5.28), (5.40), (5.41), and (5.21), finally yields that for each $t\in[0,T]$ (5.42) $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta)$ for almost every $\eta\in[0,B+C]$ and the function $h(t,\eta)$ is given by (5.38). This completes the computation of $\chi_{t}(t,\eta)$. To summarize, we showed with the help of the dominated convergence theorem that $\displaystyle\int_{0}^{B+C}\chi_{t}^{\gamma}(t,\eta)d\eta$ $\displaystyle=\lim_{s\to t}\int_{0}^{B+C}\left(\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}\right)^{\gamma}d\eta$ $\displaystyle=\int_{0}^{B+C}\big{(}-h(t,\eta)\chi_{\eta}(t,\eta)+\mathcal{U}(t,\eta)\big{)}^{\gamma}d\eta.$ Actually we showed that $\lim_{s\to t}\int_{0}^{B+C}\left|\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s}+h(t,\eta)\chi_{\eta}(t,\eta)+\mathcal{U}(t,\eta)\right|^{\gamma}d\eta=0,$ which is a limiting process in $L^{\gamma}([0,B+C])$. Thus the correct Banach space to work in, is $L^{\gamma}([0,B+C])$. This might be surprising at first sight since only $\chi_{t}(t,\,\cdot\,)$ belongs to $L^{\gamma}([0,B+C])$ but not $\chi_{\eta}(t,\,\cdot\,)$. On the other hand, one has that the function $g(t,\ell(t,\,\cdot\,))$ is non-decreasing and hence differentiable almost everywhere. Furthermore, (5.9) and (5.11) imply that $g(t,\ell(t,\,\cdot\,))$ is Lipschitz continuous with Lipschitz constant at most one and for almost every $\eta\in[0,B+C]$ it follows that (5.43) $0\leq\frac{d}{d\eta}g(t,\ell(t,\eta))=\mathcal{P}\chi_{\eta}(t,\eta)\leq 1.$ Thus $\int_{0}^{B+C}(\mathcal{P}\chi_{\eta})^{\gamma}(t,\eta)d\eta\leq\int_{0}^{B+C}\mathcal{P}\chi_{\eta}(t,\eta)d\eta=\int_{\mathbb{R}}p(t,x)dx,$ using (5.43), which is finite, cf. (4.10) and which implies that $h\chi_{\eta}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])$. Thus we will not study (5.42) pointwise, but as a differential equation in $L^{\gamma}([0,B+C])$. ###### Theorem 5.3. The function $\chi(t,\,\cdot\,)$ satisfies for almost all $t$ the following differential equation in $L^{\gamma}([0,B+C])$ (5.44) $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$ where (5.45) $h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$ Furthermore, the mapping $t\mapsto\chi(t,\,\cdot\,)$ is continuous from $[0,T]$ into $L^{\gamma}([0,B+C])$. ###### Remark 5.4. The above computations are based on error estimates. This idea is also used when proving the chain rule in the classical setting for functions of several variables. However, one cannot use the chain rule here. Namely, writing $\chi(t,\eta)=\hat{\ell}(t,\eta)-\eta=v(t,\ell(t,\eta))-\eta,$ one is tempted to look at $\chi(t,\eta)$ as a composition of two functions, since $v(t,\xi)$ is differentiable almost everywhere with respect to both time and space. However, $v_{t}(t,\xi)$ and $v_{\xi}(t,\xi)$ are not continuous with respect to time and space, and this fact prevents us from using the following splitting $\displaystyle\frac{v(t,\ell(t,\eta))-v(s,\ell(s,\eta))}{t-s}$ $\displaystyle=\frac{v(t,\ell(t,\eta))-v(s,\ell(t,\eta))}{t-s}$ $\displaystyle\quad+\frac{v(s,\ell(t,\eta))-v(s,\ell(s,\eta))}{\ell(t,\eta)-\ell(s,\eta)}\frac{\ell(t,\eta)-\ell(s,\eta)}{t-s},$ together with a limiting process based on the existence of the partial derivatives of $v$. Furthermore, $\ell(t,\eta)$ is not differentiable almost everywhere, we only know that for fixed $t$, the derivatives $\ell_{t}(t,\eta)$ and $\ell_{\eta}(t,\eta)$ exist for almost every $\eta$. ###### Remark 5.5. An alternative derivation of the differential equation for $\chi(t,\eta)$: By the weak formulation we have, cf. (2.3b), (4.5), and (5.3), that $\displaystyle\int_{0}^{T}\int_{\mathbb{R}}$ $\displaystyle(\phi_{t}+u\phi_{x})(t,x)d\nu(t,x)dt$ $\displaystyle\qquad-\int_{0}^{T}\int_{\mathbb{R}}\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)d\nu(t,y)\phi(t,x)dxdt$ $\displaystyle\qquad-\int_{0}^{T}\int_{\mathbb{R}}\Big{(}up\phi_{x}(t,x)-\int_{\mathbb{R}}u(t,y)K^{\prime}(x-y)p(t,y)dy\phi(t,x)\Big{)}dxdt$ $\displaystyle\quad=\int_{\mathbb{R}}\phi(T,x)d\nu(T,x)-\int_{\mathbb{R}}\phi(0,x)d\nu(0,x)$ for any test function $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$. Using (5.5) and changing the coordinates according to (5.7) and (5.36), we end up with $\displaystyle\int_{0}^{T}$ $\displaystyle\int_{0}^{B+C}\big{(}\phi_{t}(t,\chi(t,\eta))+\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))\big{)}d\eta dt$ $\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$ $\displaystyle\qquad\qquad\times K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt$ $\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}\mathcal{P}(t,\eta)\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt$ (5.46) $\displaystyle=\int_{0}^{B+C}\phi(T,\chi(T,\eta))d\eta-\int_{0}^{B+C}\phi(0,\chi(0,\eta))d\eta.$ First of all note that using integration by parts (for the integral with respect to $\eta$) in the triple integral we obtain $\displaystyle\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$ $\displaystyle\qquad\qquad\qquad\times K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt$ $\displaystyle=-\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$ $\displaystyle\qquad\qquad\qquad\times K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt.$ Furthermore, the right-hand side of (5.46) can be rewritten as $\displaystyle\int_{0}^{B+C}\phi(T,\chi(T,\eta))$ $\displaystyle d\eta-\int_{0}^{B+C}\phi(0,\chi(0,\eta))d\eta$ $\displaystyle=\int_{0}^{T}\int_{0}^{B+C}\big{(}\phi_{t}(t,\chi(t,\eta))+\phi_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)\big{)}d\eta dt.$ Combining the last two equation with (5.46), we have $\displaystyle\int_{0}^{T}$ $\displaystyle\int_{0}^{B+C}\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))d\eta dt$ $\displaystyle+\int_{0}^{T}\int_{0}^{B+C}\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$ $\displaystyle\qquad\qquad\times K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}\,\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt$ $\displaystyle-\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}\mathcal{P}(t,\eta)\phi_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)d\eta dt$ $\displaystyle=\int_{0}^{T}\int_{0}^{B+C}\phi_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)d\eta dt.$ Now we are ready to read off the differential equation for $\chi(t,\eta)$, since the above equality is equivalent to $\int_{0}^{T}\int_{0}^{B+C}\big{(}\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)\big{)}\phi_{x}(t,\chi(t,\eta))d\eta dt\\\ =\int_{0}^{T}\int_{0}^{B+C}\mathcal{U}(t,\eta)\phi_{x}(t,\chi(t,\eta))d\eta dt,$ where $h(t,\eta)$ is given by (5.38). Since the above equality must hold for any test function $\phi$, we end up with $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta).$ ### 5.2. Differentiability of $\mathcal{U}(t,\eta)$ with respect to time To begin with we have a closer look at the differential equation (5.44), which reads $\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)=\mathcal{U}(t,\eta),$ where $h(t,\eta)$ is given by (5.45). This equation can be solved (uniquely) by the method of characteristics, if the differential equation (5.47) $m_{t}(t,\theta)=h(t,m(t,\theta))$ has a unique solution and $m_{\theta}(t,\,\cdot\,)$ is strictly positive for all $t\in[0,T]$. According to classical ODE theory, (5.47) has for each fixed $\theta$ a unique solution, if the function $h(t,\eta)$ is continuous with respect to time and Lipschitz with respect to space. This is the result of the next lemma, whose proof can be found in Lemma A.2. Hence (5.47) has a unique solution. ###### Lemma 5.6. Consider the function $h$ defined by (5.45). Then (i) $t\mapsto h(t,\eta)$ is continuous; (ii) $\eta\mapsto h(t,\eta)$ is Lipschitz and satisfies (5.48) $|h(t,\eta_{2})-h(t,\eta_{1})|\leq\big{(}1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct\big{)}|\eta_{2}-\eta_{1}|.$ For the method of characteristics to be well-defined, we must check that solutions to (5.47) are strictly increasing. If $m(0,\theta)=\theta$ for all $\theta\in[0,B+C]$ and $\theta_{1}<\theta_{2}$, we have, using (5.48), as long as the function $m(t,\,\cdot\,)$ remains non-decreasing, that $\left|(m(t,\theta_{2})-m(t,\theta_{1}))_{t}\right|\leq B(t)(m(t,\theta_{2})-m(t,\theta_{1})),$ where $B(t)=1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct$, which yields $(m(0,\theta_{2})-m(0,\theta_{1}))e^{-\int_{0}^{t}B(s)ds}\leq m(t,\theta_{2})-m(t,\theta_{1})\leq(m(0,\theta_{2})-m(0,\theta_{1}))e^{\int_{0}^{t}B(s)ds}.$ Thus $m(t,\,\cdot\,)$ not only remains strictly increasing, it is also Lipschitz continuous with Lipschitz constant $e^{\int_{0}^{t}B(s)ds}$ and hence according to Rademacher’s theorem differentiable almost everywhere. In particular, one has that (5.49) $e^{-\int_{0}^{t}B(s)ds}\leq m_{\theta}(t,\theta)\leq e^{\int_{0}^{t}B(s)ds}.$ Thus $m(t,\,\cdot\,)$ is strictly increasing. Introducing (5.50) $\bar{\chi}(t,\theta)=\chi(t,m(t,\theta)),$ we have from (5.44) (5.51) $\bar{\chi}_{t}(t,\theta)=u(t,\bar{\chi}(t,\theta)),$ and hence $\bar{\chi}(t,\eta)$ is a characteristic. Introducing (5.52) $\bar{}\mathcal{U}(t,\theta)=u(t,\bar{\chi}(t,\theta))=\mathcal{U}(t,m(t,\theta)),$ equation (5.51) reads $\bar{\chi}_{t}(t,\theta)=\bar{}\mathcal{U}(t,\theta).$ To take a next step towards deriving the differential equation for $\mathcal{U}(t,\eta)$, we want to show that $\bar{}\mathcal{U}(t,\theta)$ satisfies (5.53) $\bar{}\mathcal{U}_{t}(t,\theta)=\frac{1}{2}\Big{(}m(t,\theta)-\frac{1}{2}C-\int_{0}^{\theta}\bar{}\mathcal{P}(t,\alpha)\bar{\chi}_{\theta}(t,\alpha)d\alpha\Big{)},$ where (5.54) $\bar{}\mathcal{P}(t,\theta)=p(t,\bar{\chi}(t,\theta))=\mathcal{P}(t,m(t,\theta)).$ The proof of (5.53) is again based on an idea that has been used in [2]. According to the definition of a weak solution, one has, see (2.3a) and (5.5), for all $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ that $\displaystyle\int_{s}^{t}\int_{\mathbb{R}}$ $\displaystyle\Big{(}u(\tau,x)(\phi_{t}+\frac{1}{2}u\phi_{x})(\tau,x)+\frac{1}{2}\big{(}G(\tau,x)-\int_{-\infty}^{x}p(\tau,y)dy-\frac{1}{2}C\big{)}\phi(\tau,x)\Big{)}dxd\tau$ (5.55) $\displaystyle\qquad\qquad\qquad=\int_{\mathbb{R}}u\phi(t,x)dx-\int_{\mathbb{R}}u\phi(s,x)dx.$ In the above equality one can replace $\phi\in\mathcal{C}_{c}^{\infty}([0,\infty)\times\mathbb{R})$ by $\phi(t,x)$ such that $\phi(t,\,\cdot\,)\in\mathcal{C}_{c}^{\infty}(\mathbb{R})$ for all $t$ and $\phi(\,\cdot\,,x)\in\mathcal{C}^{1}(\mathbb{R})$. #### The Lipschitz continuity of $\bar{}\mathcal{U}(t,\,\cdot\,)$ To prove that $\bar{}\mathcal{U}(t,\theta)$ is Lipschitz with respect to time, we have to make a special choice of $\phi(t,x)$. Let $\phi_{\varepsilon}(t,x)=\frac{1}{\varepsilon}\psi\Big{(}\frac{\bar{\chi}(t,\theta)-x}{\varepsilon}\Big{)},$ where $\psi$ is a standard Friedrichs mollifier. Our choice is motivated by the following observation, $\lim_{\varepsilon\to 0}\int_{\mathbb{R}}u\phi_{\varepsilon}(t,x)dx=u(t,\bar{\chi}(t,\theta)),$ and hence $u(t,\bar{\chi}(t,\theta))-u(s,\bar{\chi}(s,\theta))=\lim_{\varepsilon\to 0}\int_{\mathbb{R}}\big{(}u\phi_{\varepsilon}(t,x)-u\phi_{\varepsilon}(s,x)\big{)}dx.$ Direct calculations then yield, using (5.51) $\displaystyle\int_{\mathbb{R}}\Big{(}u\phi_{\varepsilon,t}+\frac{1}{2}u^{2}\phi_{\varepsilon,x}$ $\displaystyle+\frac{1}{2}(G-\int_{-\infty}^{x}p(\tau,y)dy-\frac{1}{2}C)\phi_{\varepsilon}(\tau,x)\Big{)}dx$ $\displaystyle=\frac{1}{2}u(\tau,\bar{\chi}(\tau,\theta))^{2}\int_{\mathbb{R}}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}(G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta)))\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad+\frac{1}{2}\left(G(\tau,\bar{\chi}(\tau,\theta))-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\right)-\frac{1}{4}C$ $\displaystyle=-\frac{1}{2}\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad-\frac{1}{2}\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\quad+\frac{1}{2}\int_{\mathbb{R}}(G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta)))\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ (5.56) $\displaystyle\quad+\frac{1}{2}\left(G(\tau,\bar{\chi}(\tau,\theta))-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\right)-\frac{1}{4}C.$ Introduce the function $G_{\rm ac}(\tau,x)=\int_{-\infty}^{x}(u_{x}^{2}+p)(\tau,y)dy$ and note that $G_{\rm ac}(\tau,\,\cdot\,)$ is absolutely continuous. Moreover, one has $|u(\tau,x)-u(\tau,y)|\leq|x-y|^{1/2}|G_{\rm ac}(\tau,x)-G_{\rm ac}(\tau,y)|^{1/2},$ and $\displaystyle|\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}$ $\displaystyle\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|$ $\displaystyle=\frac{1}{\varepsilon}|\int_{-1}^{1}(u(\tau,\bar{\chi}(\tau,\theta)-\varepsilon\eta)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\psi^{\prime}(\eta)d\eta|$ $\displaystyle\leq|G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)+\varepsilon)-G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)-\varepsilon)|,$ which implies $\lim_{\varepsilon\to 0}|\int_{\mathbb{R}}(u(\tau,x)-u(\tau,\bar{\chi}(\tau,\theta)))^{2}\frac{1}{\varepsilon^{2}}\psi^{\prime}\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|=0.$ For the next term observe $\displaystyle|\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy$ $\displaystyle\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|$ $\displaystyle\leq\frac{1}{\varepsilon}\int_{\mathbb{R}}|G_{\rm ac}(\tau,x)-G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta))|\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx$ $\displaystyle\leq|G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)+\varepsilon)-G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta)-\varepsilon)|,$ which implies $\lim_{\varepsilon\to 0}|\int_{\mathbb{R}}\int_{\bar{\chi}(\tau,\theta)}^{x}p(\tau,y)dy\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx|=0.$ For the last two terms, observe that for every $\tau\not\in\mathcal{N}$, i.e., for almost every $\tau\in[0,T]$ one has, using (5.7), that $G(\tau,\bar{\chi}(\tau,\theta))=G_{\rm ac}(\tau,\bar{\chi}(\tau,\theta))=G_{\rm ac}(\tau,\chi(\tau,m(t,\theta)))=m(\tau,\theta)$ and $\lim_{\varepsilon\to 0}\frac{1}{2}\int_{\mathbb{R}}\big{(}G(\tau,x)-G(\tau,\bar{\chi}(\tau,\theta))\big{)}\frac{1}{\varepsilon}\psi\left(\frac{\bar{\chi}(\tau,\theta)-x}{\varepsilon}\right)dx=0.$ Thus, the dominated convergence theorem, using (5.56) and (5.55), yields that $\displaystyle\bar{}\mathcal{U}(t,\theta)-\bar{}\mathcal{U}(s,\theta)$ $\displaystyle=\int_{s}^{t}\frac{1}{2}\Big{(}m(\tau,\theta)-\int_{-\infty}^{\bar{\chi}(\tau,\theta)}p(\tau,y)dy\Big{)}d\tau-\frac{1}{4}C(t-s).$ Furthermore, the continuity of $m(t,\theta)$, $\bar{\chi}(t,\theta)$, and $p(t,y)$ with respect to time, imply that (5.57) $\bar{}\mathcal{U}_{t}(t,\theta)=\frac{1}{2}\Big{(}m(t,\theta)-\int_{-\infty}^{\bar{\chi}(t,\theta)}p(t,y)dy\Big{)}-\frac{1}{4}C$ for all $(t,\theta)\in[0,T]\times[0,B+C]$. Thus $\bar{}\mathcal{U}(\,\cdot\,,\eta)$ will be Lipschitz on $[0,T]$, if we can show that the right-hand side of (5.57) can be uniformly bounded on $[0,T]$. Since $p(t,\,\cdot\,)\in L^{1}(\mathbb{R})$, cf. (4.10), the claim follows if $m(t,\,\cdot\,)$ can be bounded. Therefore recall that $m(t,\theta)$ satisfies (5.47) with initial condition $m(0,\theta)=\theta$, which implies that it suffices to show that $\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$ can be bounded by a function, which is at most growing linearly. Using (5.45), (5.36), (3.6), Lemma 4.1, and (4.2), we have $\displaystyle\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$ $\displaystyle\leq\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}$ $\displaystyle\quad+(B+C)\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}+\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}\left\|K\right\|_{L^{1}}$ $\displaystyle\leq(B+(2+\pi)C)\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}}$ (5.58) $\displaystyle\leq(B+(2+\pi)C)(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct),$ and thus $\left\|h(t,\,\cdot\,)\right\|_{L^{\infty}}$ grows at most linearly. This finishes the proof of the uniform Lipschitz continuity in time of $\bar{}\mathcal{U}(t,\theta)$. As a closer look reveals the differential equation (5.57) holds pointwise. Thus one can either look at $\bar{}\mathcal{U}(t,\,\cdot\,)$ as a function in $L^{\gamma}([0,B+C])$ or in $L^{\infty}([0,B+C])$. Furthermore, the mapping $t\mapsto\bar{}\mathcal{U}(t,\,\cdot\,)$ is continuous from $[0,T]$ into $L^{\gamma}([0,B+C])$. #### The differential equation for $\mathcal{U}(t,\eta)$ In view of (5.44) it remains to derive the differential equation for $\mathcal{U}(t,\eta)$ from (5.57). Recall that we have by (5.52) the relation $\bar{}\mathcal{U}(t,\theta)=\mathcal{U}(t,m(t,\theta)).$ Since $m(t,\,\cdot\,)$ is continuous and strictly increasing, cf. (5.49), there exists a unique, continuous and strictly increasing function $n(t,\,\cdot\,)$ such that (5.59) $n(t,m(t,\theta))=\theta\quad\text{ for all }(t,\theta)\in[0,T]\times[0,B+C].$ Now, given $\eta\in[0,B+C]$, there exists a unique $\theta\in[0,B+C]$, such that $n(t,\eta)-n(s,\eta)=n(t,m(t,\theta))-n(s,m(t,\theta))=n(s,m(s,\theta))-n(s,m(t,\theta)).$ By definition, we have that $n(t,\,\cdot\,)$ is continuous, strictly increasing, and hence differentiable almost everywhere. Furthermore, one has that $n(t,\,\cdot\,)$ satisfies $\displaystyle e^{-\int_{0}^{t}B(\tau)d\tau}\leq n_{\eta}(t,\eta)=\frac{1}{m_{\theta}(t,n(t,\eta))}\leq e^{\int_{0}^{t}B(\tau)d\tau},$ by (5.49), which yields $\displaystyle|n(t,\eta)-n(s,\eta)|$ $\displaystyle\leq e^{\int_{0}^{T}B(\tau)d\tau}|m(s,\theta)-m(t,\theta)|$ $\displaystyle\leq e^{\int_{0}^{T}B(\tau)d\tau}\int_{\min(s,t)}^{\max(s,t)}|h(\tau,m(\tau,\theta))|d\tau.$ Since $h(t,\eta)$ can be uniformly bounded on $[0,T]\times[0,B+C]$, see (5.58), it follows that $n(t,\eta)$ is Lipschitz with respect to both space and time on $[0,T]\times[0,B+C]$ and by Rademacher’s theorem differentiable almost everywhere. Moreover, direct calculations yield $n_{t}(t,\eta)+hn_{\eta}(t,\eta)=0\quad\text{ almost everywhere}.$ Since $n(t,\,\cdot\,)$ is strictly increasing for every $t\in[0,T]$, combining (5.52) and (5.59), yields $\mathcal{U}(t,\eta)=\bar{}\mathcal{U}(t,n(t,\eta))\quad\text{ for all }(t,\eta)\in[0,T]\times[0,B+C].$ Furthermore, using (5.36), (5.20), (3.3), and (5.52), one has $\mathcal{U}(t,\eta)=U(t,\ell(t,\eta))\quad\text{ and }\quad\bar{}\mathcal{U}(t,\theta)=U(t,\ell(t,m(t,\theta))).$ In Section 3.2 we showed, that for every $t\in[0,T]$, the function $U(t,\,\cdot\,)$ is Lipschitz. Since $\ell(t,\,\cdot\,)$ and $m(t,\,\cdot\,)$ are strictly increasing, it follows that both $\mathcal{U}(t,\,\cdot\,)$ and $\bar{}\mathcal{U}(t,\,\cdot\,)$ are differentiable almost everywhere on $[0,B+C]$. Thus, for any $t\in[0,T]$ one ends up with $\displaystyle\mathcal{U}_{t}(t,\eta)$ $\displaystyle=\bar{}\mathcal{U}_{t}(t,n(t,\eta))+\bar{}\mathcal{U}_{\theta}(t,n(t,\eta))n_{t}(t,\eta)$ $\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{-\infty}^{\chi(t,\eta)}p(t,y)dy\Big{)}-\frac{1}{4}C-h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$ $\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C-h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$ for almost every $\eta\in[0,B+C]$. This is the sought differential equation for $\mathcal{U}(t,\eta)$. The correct Banach space to work in is $L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$. To see this, introduce the function $g_{2}(t,\eta)=\int_{-\infty}^{\chi(t,\eta)}pu_{x}(t,y)dy=\int_{0}^{\eta}\mathcal{P}\mathcal{U}_{\eta}(t,\tilde{\eta})d\tilde{\eta}.$ Observe that (5.5) and (5.12) imply that $g_{2}(t,\,\cdot\,)$ is Lipschitz continuous with Lipschitz constant at most $1+C$, since $\displaystyle|g_{2}(t,\eta_{2})-g_{2}(t,\eta_{1})|$ $\displaystyle\leq|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}pu_{x}(t,y)dy|$ $\displaystyle\leq|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}(u_{x}^{2}+p^{2})(t,y)dy|$ $\displaystyle\leq(1+C)|\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}(u_{x}^{2}+p)(t,y)dy|$ $\displaystyle\leq(1+C)|G_{\rm ac}(t,\chi(t,\eta_{2}))-G_{\rm ac}(t,\chi(t,\eta_{1}))|$ $\displaystyle\leq(1+C)|\eta_{2}-\eta_{1}|.$ Thus it follows that for any fixed $t\in[0,T]$ $g_{2,\eta}(t,\eta)=\mathcal{P}\mathcal{U}_{\eta}(t,\eta)\quad\text{ for almost every }\eta\in[0,B+C].$ In particular, one has $|\mathcal{P}\mathcal{U}_{\eta}(t,\eta)|\leq(1+C)$ and $\int_{0}^{B+C}|\mathcal{P}\mathcal{U}_{\eta}|^{\gamma}(t,\eta)d\eta\leq(1+C)^{\gamma-1}\int_{0}^{B+C}|\mathcal{P}\mathcal{U}_{\eta}|(t,\eta)d\eta=(1+C)^{\gamma-1}\int_{\mathbb{R}}|pu_{x}|(t,x)dx,$ which is finite, cf. (4.9) and (5.6), and which implies that $h\mathcal{U}_{\eta}(t,\,\cdot\,)\in L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$. To summarize we showed the following theorem. ###### Theorem 5.7. The function $\mathcal{U}(t,\,\cdot\,)$ satisfies the following differential equation in $L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$ (5.60) $\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$ where $h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$ Furthermore, the mapping $t\mapsto\mathcal{U}(t,\,\cdot\,)$ is continuous from $[0,T]$ into $L^{\gamma}([0,B+C])$. ### 5.3. Differentiability of $\mathcal{P}(t,\eta)$ with respect to time To close the system of differential equations (5.44) and (5.60), i.e., $\displaystyle\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)$ $\displaystyle=\mathcal{U}(t,\eta),$ $\displaystyle\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$ $\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$ where $h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta},$ it remains to derive the differential equation satisfied by $\mathcal{P}(t,\eta)$, given by (5.36). #### The Lipschitz continuity of $\mathcal{P}(t,\eta)$ To begin with, we show that $\mathcal{P}(t,\eta)$ is Lipschitz continuous on $[0,T]\times[0,B+C]$ and hence differentiable almost everywhere on $[0,T]\times[0,B+C]$. Direct calculations yield (5.61) $\displaystyle\mathcal{P}(t,\eta)-\mathcal{P}(s,\theta)$ $\displaystyle=p(t,\chi(t,\eta))-p(s,\chi(s,\theta))$ $\displaystyle=p(t,\chi(t,\eta))-p(s,\chi(t,\eta))$ $\displaystyle\quad+p(s,\chi(t,\eta))-p(s,\chi(s,\eta))+p(s,\chi(s,\eta))-p(s,\chi(s,\theta))$ $\displaystyle=\int_{s}^{t}p_{t}(\tau,\chi(t,\eta))d\tau$ $\displaystyle\quad+\int_{0}^{1}p_{x}\big{(}s,\chi(s,\eta)+k(\chi(t,\eta)-\chi(s,\eta))\big{)}(\chi(t,\eta)-\chi(s,\eta))dk$ $\displaystyle\quad+\int_{\theta}^{\eta}p_{x}(t,\chi(t,\tilde{\eta}))\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta},$ where we used that $p(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$ and $p(\,\cdot\,,x)$ is differentiable almost every on the finite interval $[0,T]$. Furthermore, we took advantage of $\chi(t,\,\cdot\,)$ being continuous and increasing and hence differentiable almost everywhere on $[0,B+C]$. Combining (5.61) with (5.27) and (5.43) as well as (4.8) and (4.11), we end up with $|\mathcal{P}(t,\eta)-\mathcal{P}(s,\theta)|\leq\max((\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+2A+\frac{1}{4}CT)nC,n)(|t-s|+|\eta-\theta|),$ i.e., $\mathcal{P}(t,\eta)$ is Lipschitz continuous on $[0,T]\times[0,B+C]$. We are now ready to derive the differential equation satisfied by $\mathcal{P}(t,\eta)$. Therefore note that (5.42) implies that for each $t\in[0,T]$ one has $\mathcal{P}_{\eta}(t,\eta)=p_{x}(t,\chi(t,\eta))\chi_{\eta}(t,\eta)$ for almost every $\eta\in[0,B+C]$, since $p(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$. Furthermore, one has for almost every $(t,\eta)\in[0,T]\times[0,B+C]$ that $\displaystyle\mathcal{P}_{t}(t,\eta)$ $\displaystyle=\lim_{s\to t}\frac{\mathcal{P}(t,\eta)-\mathcal{P}(s,\eta)}{t-s}$ $\displaystyle=\lim_{s\to t}\frac{p(t,\chi(t,\eta))-p(s,\chi(t,\eta))}{t-s}+\lim_{s\to t}\frac{p(s,\chi(t,\eta))-p(s,\chi(s,\eta))}{t-s},$ if the two limits on the right-hand side exist. The first one exists and is given by (4.7). The second one, on the other hand, requires a closer look. Write $\displaystyle p(s,\chi(t,\eta))-$ $\displaystyle p(s,\chi(s,\eta))$ $\displaystyle=\int_{\chi(s,\eta)}^{\chi(t,\eta)}(p_{x}(s,y)-p_{x}(t,y))dy$ $\displaystyle\quad+\int_{0}^{1}p_{x}\big{(}t,\chi(t,\eta)+k(\chi(s,\eta)-\chi(t,\eta))\big{)}dk\,(\chi(t,\eta)-\chi(s,\eta)).$ Following once more the argument leading to (4.4), recalling (3.6), (5.27), Lemma 4.1, and that $p_{x}(t,\,\cdot\,)\in\mathcal{C}_{0}^{\infty}(\mathbb{R})$, we have $\int_{\chi(s,\eta)}^{\chi(t,\eta)}(p_{x}(s,y)-p_{x}(t,y))dy=\mathcal{O}((t-s)^{2})$ and $\lim_{s\to t}\frac{p(s,\chi(t,\eta))-p(s,\chi(s,\eta))}{t-s}=p_{x}(t,\chi(t,\eta))\lim_{s\to t}\frac{\chi(t,\eta)-\chi(s,\eta)}{t-s},$ if the limit on the right-hand side exists. In view of (5.42), one has that for each $t\in[0,T]$ $\displaystyle\mathcal{P}_{t}(t,\eta)$ $\displaystyle=p_{t}(t,\chi(t,\eta))+p_{x}(t,\chi(t,\eta))\chi_{t}(t,\eta)$ for almost every $\eta\in[0,B+C]$. We find, using (5.44), (cf. (2.9b)), (4.5), (5.8), (5.9), (5.11), (4.14), that (5.62) $\displaystyle\mathcal{P}_{t}(t,\eta)+$ $\displaystyle h(t,\eta)\mathcal{P}_{\eta}(t,\eta)$ $\displaystyle $ $\displaystyle=p_{t}(t,\chi(t,\eta))+p_{x}(t,\chi(t,\eta))\mathcal{U}(t,\eta)$ $\displaystyle=-\int_{\mathbb{R}}u(t,z)K^{\prime}(\chi(t,\eta)-z)d\mu(t,z)+\mathcal{U}(t,\eta)\int_{\mathbb{R}}K^{\prime}(\chi(t,\eta)-z)d\mu(t,z)$ $\displaystyle=-\int_{\mathbb{R}}u(t,y(t,\xi))K^{\prime}(\chi(t,\eta)-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$ $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{\mathbb{R}}K^{\prime}(\chi(t,\eta)-y(t,\xi))\tilde{H}_{\xi}(t,\xi)d\xi$ $\displaystyle=-\int_{0}^{B+C}u(t,y(t,\ell(t,\tilde{\eta})))K^{\prime}(\chi(t,\eta)-y(t,\ell(t,\tilde{\eta})))\tilde{H}_{\xi}(t,\ell(t,\tilde{\eta}))\ell_{\eta}(t,\tilde{\eta})d\tilde{\eta}$ $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-y(t,\ell(t,\tilde{\eta})))\tilde{H}_{\xi}(t,\ell(t,\tilde{\eta}))\ell_{\eta}(t,\tilde{\eta})d\tilde{\eta}$ $\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$ (5.63) $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}.$ The correct Banach space to work in is again $L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$, since $|\mathcal{P}_{\eta}(t,\eta)|\leq n\mathcal{P}\chi(t,\eta)\leq n$ by (4.11) and (5.43). To summarize we showed the following theorem. ###### Theorem 5.8. The function $\mathcal{P}(t,\,\cdot\,)$, given by (5.36), satisfies for almost all $t$ the following differential equation in $L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C])$ (5.64) $\mathcal{P}_{t}(t,\eta)+h(t,\eta)\mathcal{P}_{\eta}(t,\eta)=\mathcal{R}(t,\eta),$ where $h(t,\eta)=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$ and $\displaystyle\mathcal{R}(t,\eta)$ $\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$ (5.65) $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}.$ Furthermore, the mapping $t\mapsto\mathcal{P}(t,\,\cdot\,)$ is continuous from $[0,T]$ into $L^{\gamma}([0,B+C])$. ### 5.4. Summary We have shown the following result. ###### Theorem 5.9. The functions $\chi(t,\eta)$, $\mathcal{U}(t,\eta)$, and $\mathcal{P}(t,\eta)$ defined by (5.7) and (5.36), respectively, satisfy the following system of equations: (5.66a) $\displaystyle\chi_{t}(t,\eta)+h(t,\eta)\chi_{\eta}(t,\eta)$ $\displaystyle=\mathcal{U}(t,\eta),$ (5.66b) $\displaystyle\mathcal{U}_{t}(t,\eta)+h(t,\eta)\mathcal{U}_{\eta}(t,\eta)$ $\displaystyle=\frac{1}{2}\Big{(}\eta-\int_{0}^{\eta}\mathcal{P}\chi_{\eta}(t,\tilde{\eta})d\tilde{\eta}\Big{)}-\frac{1}{4}C,$ (5.66c) $\displaystyle\mathcal{P}_{t}(t,\eta)+h(t,\eta)\mathcal{P}_{\eta}(t,\eta)$ $\displaystyle=\mathcal{R}(t,\eta)$ where (5.67) $\displaystyle h(t,\eta)$ $\displaystyle=\mathcal{U}\mathcal{P}(t,\eta)-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$ $\displaystyle\mathcal{R}(t,\eta)$ $\displaystyle=-\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta}$ (5.68) $\displaystyle\quad+\mathcal{U}(t,\eta)\int_{0}^{B+C}K^{\prime}(\chi(t,\eta)-\chi(t,\tilde{\eta}))\big{(}1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta})\big{)}d\tilde{\eta},$ which can be uniquely solved using the method of characteristics in $L^{\gamma}([0,B+C])\times(L^{\gamma}([0,B+C])\cap L^{\infty}([0,B+C]))^{2}$. We remark that Definition 2.3, which lists all properties that have to be satisfied by weak conservative solutions, requires (5.69) $u(t,\,\cdot\,)\in E_{2}\quad\text{ and }\quad\mu(t,(-\infty,\,\cdot\,))=F(t,\,\cdot\,)\in E_{1}^{0}.$ In our new coordinates these conditions can be formulated in terms of $\mathcal{U}\chi_{\eta}(t,\eta)$ and $\chi_{\eta}(t,\eta)$, whose time evolution cannot be described with the help of (5.66). On the other hand, the imposed moment condition (5.2), which is preserved with respect to time, implies (5.69). Indeed, let $u_{\pm\infty}(t)=\lim_{x\to\pm\infty}u(t,x),$ which both exist and are finite. Thus $u(t,\,\cdot\,)\in E_{2}$, if and only if $\int_{-\infty}^{-1}\big{(}(u(t,x)-u_{-\infty}(t))^{2}+u_{x}^{2}(t,x)\big{)}dx+\int_{-1}^{1}\big{(}u^{2}+u_{x}^{2}\big{)}(t,x)dx\\\ +\int_{1}^{\infty}\big{(}(u(t,x)-u_{\infty}(t))^{2}+u_{x}^{2}(t,x)\big{)}dx<\infty,$ by the definition of $E_{2}$. Here we only consider one integral, since all of them can be investigated using similar ideas. One has $\displaystyle\int_{-\infty}^{-1}(u(t,x)-u_{-\infty}(t))^{2}dx$ $\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}u_{x}(t,z)dz\right)^{2}dx$ $\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma/2}}(-z)^{\gamma/2}u_{x}(t,z)dz\right)^{2}dx$ $\displaystyle\leq\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma}}dz\right)\left(\int_{-\infty}^{x}(-z)^{\gamma}u_{x}^{2}(t,z)dz\right)dx$ $\displaystyle\leq\frac{1}{\gamma-1}\int_{-\infty}^{-1}\frac{1}{(-x)^{\gamma-1}}dx\left(\int_{\mathbb{R}}|z|^{\gamma}u_{x}^{2}(t,z)dz\right)$ $\displaystyle\leq\frac{1}{(\gamma-1)(\gamma-2)}\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right),$ which is finite if $\gamma>2$ and (5.2) is satisfied. For the second condition, recall that $\lim_{x\to-\infty} F(t,x)=0\quad\text{ and }\quad\lim_{x\to\infty} F(t,x)=C.$ Thus $F(t,\,\cdot\,)\in E_{1}^{0}$ if and only if $\int_{-\infty}^{-1}F^{2}(t,x)dx+\int_{-1}^{1}F^{2}(t,x)dx+\int_{1}^{\infty}(F(t,x)-C)^{2}dx<\infty,$ by the definition of $E_{0}^{1}$. Again we only consider one integral, since all of them can be considered using similar ideas. One has $\displaystyle\int_{-\infty}^{-1}$ $\displaystyle F^{2}(t,x)dx$ $\displaystyle=\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma/2}}(-z)^{\gamma/2}d\mu(t,z)\right)^{2}dx$ $\displaystyle\leq\int_{-\infty}^{-1}\left(\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma}}d\mu(t,z)dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$ $\displaystyle=\int_{-\infty}^{-1}\left(\frac{1}{(-x)^{\gamma}}F(t,x)-\gamma\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma+1}}F(t,z)dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$ $\displaystyle\leq C\int_{-\infty}^{-1}\left(\frac{1}{(-x)^{\gamma}}+\gamma\int_{-\infty}^{x}\frac{1}{(-z)^{\gamma+1}}dz\right)dx\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right)$ $\displaystyle\leq\frac{2C}{\gamma-1}\left(\int_{\mathbb{R}}|z|^{\gamma}d\nu(t,z)\right),$ which is finite if $\gamma>2$ and (5.2) is satisfied. We have proved the following theorem. ###### Theorem 5.10. Let $\gamma>2$, then for any initial data $(u_{0},\mu_{0})\in\mathcal{D}$ such that $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu_{0}<\infty$ the Hunter–Saxton equation has a unique global conservative weak solution $(u,\mu)\in\mathcal{D}$ in the sense of Definition 2.3, which satisfies $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t)<\infty\quad\text{ for all }t\in\mathbb{R}.$ ## Appendix A Proof of Lemma 5.2 and Lemma 5.6 ###### Lemma A.1 (Lemma 5.2). (i): Let $g(t,\xi)$ be given by (4.13). Then there exists a positive constant $\bar{M}$ such that (A.1) $\displaystyle-\bar{M}$ $\displaystyle|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$ $\displaystyle\leq g(s,\xi)-g\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$ $\displaystyle\leq\bar{M}|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$ (ii): Let $H(t,\xi)$ be defined by (5.9). Then $\displaystyle-($ $\displaystyle\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)$ $\displaystyle\leq H(s,\xi)-H\big{(}t,\xi+u(t,y(t,\xi))(t-s)\big{)}$ $\displaystyle\leq(\tilde{M}+\bar{M})|t-s|^{3/2}-p\big{(}t,y(t,\xi+u(t,y(t,\xi))(t-s))\big{)}u(t,y(t,\xi))(t-s)$ $\displaystyle\quad-\int_{\mathbb{R}}u(t,y(t,\eta))K\big{(}y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)\big{)}\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t).$ ###### Proof. (i): We want to estimate $g(s,\xi)-g(t,\xi+u(t,y(t,\xi))(t-s)).$ Recalling (4.13), we split the above difference into two terms as follows $\displaystyle g(s,\xi)-g(t,\xi+u(t,y(t,\xi))(t-s))$ $\displaystyle=\int_{y(t,\xi+u(t,y(t,\xi))(t-s))}^{y(s,\xi)}p(s,z)dz$ $\displaystyle\qquad+\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\big{(}p(s,z)-p(t,z)\big{)}dz$ $\displaystyle=\textup{I}_{1}+\textup{I}_{2}.$ $\textup{I}_{1}$: Since $p(t,x)$ is continuously differentiable on $[0,T]\times\mathbb{R}$, we have by the mean value theorem that $\displaystyle\textup{I}_{1}$ $\displaystyle=\int_{y(t,\xi+u(t,y(t,\xi))(t-s))}^{y(s,\xi)}p(s,z)dz$ $\displaystyle=p(s,m)(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$ $\displaystyle=\big{(}p(s,m)-p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\big{)}$ $\displaystyle\qquad\qquad\qquad\qquad\qquad\times(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$ $\displaystyle\quad+p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$ for some $m$ between $y(s,\xi)$ and $y(t,\xi+u(t,y(t,\xi))(t-s))$. Furthermore, we find $\displaystyle\left|p(s,m)-p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\right|\left|y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))\right|$ $\displaystyle\quad\leq M\big{(}\left|s-t\right|+\left|m-y(t,\xi+u(t,y(t,\xi))(t-s))\right|\big{)}$ $\displaystyle\qquad\qquad\qquad\qquad\qquad\times\big{(}\left|u(t,y(t,\xi))(t-s)\right|+\tilde{M}\left|t-s\right|^{3/2}\big{)}$ $\displaystyle\quad\leq M\big{(}\left|s-t\right|+\left|y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s))\right|\big{)}\left|t-s\right|$ $\displaystyle\quad\leq M\big{(}\left|s-t\right|+\left|u(t,y(t,\xi))(t-s)\right|\big{)}\left|t-s\right|$ $\displaystyle\quad\leq M\left|s-t\right|^{2},$ for some constant $M$ (that is increased during the calculation), using (4.8), (4.11), (5.29), and (3.6). In addition, we estimate $\displaystyle p(t,$ $\displaystyle y(t,\xi+u(t,y(t,\xi))(t-s)))(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))$ $\displaystyle=p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))\Big{(}u(t,y(t,\xi))(t-s)$ $\displaystyle\qquad+(y(s,\xi)-y(t,\xi+u(t,y(t,\xi))(t-s)))-u(t,y(t,\xi))(t-s)\Big{)}.$ Finally, using (5.29) once more, there exists a positive constant $\hat{M}$ such that $\left|\textup{I}_{1}+p(t,y(t,\xi+u(t,y(t,\xi))(t-s)))u(t,y(t,\xi))(t-s)\right|\leq\hat{M}|t-s|^{3/2}.$ $\textup{I}_{2}$: Using (3.1), (3.2), and (4.5), we can write $\displaystyle\textup{I}_{2}$ $\displaystyle=\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\big{(}p(s,z)-p(t,z)\big{)}dz$ $\displaystyle=\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\int_{t}^{s}p_{t}(\tau,z)d\tau dz$ $\displaystyle=-\int_{-\infty}^{y(t,\xi+u(t,y(t,\xi))(t-s))}\int_{t}^{s}\int_{\mathbb{R}}u(\tau,x)K^{\prime}(z-x)d\mu(\tau,x)d\tau dz$ $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,x)K(y(t,\xi+u(t,y(t,\xi))(t-s))-x)d\mu(\tau,x)d\tau$ $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}u(\tau,y(\tau,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))\tilde{H}_{\xi}(\tau,\eta)d\eta d\tau$ $\displaystyle=-\int_{t}^{s}\int_{\mathbb{R}}(u(\tau,y(\tau,\eta))-u(t,y(t,\eta)))$ $\displaystyle\qquad\qquad\qquad\qquad\times K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))\tilde{H}_{\xi}(\tau,\eta)d\eta d\tau$ $\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))(K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(\tau,\eta))$ $\displaystyle\qquad\qquad\qquad\qquad\qquad-K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta)))\tilde{H}_{\xi}(\tau,\eta)d\eta d\tau$ $\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))$ $\displaystyle\qquad\qquad\qquad\times K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta d\tau$ $\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta d\tau$ $\displaystyle=\textup{II}_{1}+\textup{II}_{2}+\textup{II}_{3}$ $\displaystyle\quad-\int_{t}^{s}\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta d\tau.$ Next we will show that each of the terms $\textup{II}_{1}$, $\textup{II}_{2}$, and $\textup{II}_{3}$ is of order $|t-s|^{3/2}$. Therefore it is important to keep in mind that $0\leq y_{\xi}$, $\tilde{H}_{\xi}\leq 1$. $\textup{II}_{1}$: Since $u(t,x)$ is Hölder continuous with Hölder exponent $\frac{1}{2}$ on $[0,T]\times\mathbb{R}$, we have, by (3.8) and (3.9), for all $\tau$ between $s$ and $t$ that $\displaystyle|u(\tau,y(\tau,\eta))-u(t,y(t,\eta))|$ $\displaystyle\leq D\big{(}|t-\tau|+|y(\tau,\eta)-y(t,\eta)|\big{)}^{1/2}$ $\displaystyle\leq D\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-\tau|^{1/2}$ $\displaystyle\leq D\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-s|^{1/2},$ and $|\textup{II}_{1}|\leq DC\big{(}1+\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{1/2}|t-s|^{3/2}.$ $\textup{II}_{2}$: Since $K(\,\cdot\,)$, given by (4.3), is smooth one has for all $\tau$ between $s$ and $t$ that $\displaystyle|K(y(t,\xi+u(t,y(t,\xi))(t-s))$ $\displaystyle-y(\tau,\eta))-K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))|$ $\displaystyle=|\int_{y(t,\eta)}^{y(\tau,\eta)}K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx|$ $\displaystyle\leq n|y(\tau,\eta)-y(t,\eta)|$ $\displaystyle\leq n\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-\tau|$ $\displaystyle\leq n\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-s|$ and $|\textup{II}_{2}|\leq nC\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}^{2}|t-s|^{2}.$ $\textup{II}_{3}$: Here integration by parts will be the key. Indeed, one has $\displaystyle\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta$ $\displaystyle\quad=-\int_{\mathbb{R}}u_{x}(t,y(t,\eta))$ $\displaystyle\qquad\qquad\times K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}(\tau,\eta)-\tilde{H}(t,\eta))y_{\xi}(t,\eta)d\eta$ $\displaystyle\qquad+\int_{\mathbb{R}}u(t,y(t,\eta))$ $\displaystyle\qquad\qquad\times K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}(\tau,\eta)-\tilde{H}(t,\eta))y_{\xi}(t,\eta)d\eta.$ Recalling (3.24) and that $0\leq\tilde{H}_{\xi}\leq 1$, we have for all $\tau$ between $s$ and $t$ that $|\tilde{H}(t,\eta)-\tilde{H}(\tau,\eta)|\leq\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}|t-s|$ and $\displaystyle|$ $\displaystyle\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))(\tilde{H}_{\xi}(\tau,\eta)-\tilde{H}_{\xi}(t,\eta))d\eta|$ $\displaystyle\leq\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}\int_{\mathbb{R}}|u_{x}(t,x)|K(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx\,|t-s|$ $\displaystyle\quad+\Big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\Big{)}\int_{\mathbb{R}}|u(t,x)|K^{\prime}(y(t,\xi+u(t,y(t,\xi))(t-s))-x)dx\,|t-s|$ $\displaystyle\leq\Big{(}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}C^{1/2}\pi^{1/2}+n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{2}\pi\Big{)}|t-s|.$ Thus, we have $|\textup{II}_{3}|\leq\Big{(}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}C^{1/2}\pi^{1/2}+n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}^{2}\pi\Big{)}|t-s|^{2}.$ Combining now all these estimates, we have that there exists a positive constant $\check{M}$ such that $\displaystyle\left|\textup{I}_{2}+\int_{\mathbb{R}}u(t,y(t,\eta))K(y(t,\xi+u(t,y(t,\xi))(t-s))-y(t,\eta))\tilde{H}_{\xi}(t,\eta)d\eta\,(s-t)\right|$ $\displaystyle\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\leq\check{M}|t-s|^{3/2}$ (ii): Combine (5.9), (5.30), and (A.1). ∎ ###### Lemma A.2 (Lemma 5.6). Consider the function $h$ defined by (5.45). Then (i) $t\mapsto h(t,\eta)$ is continuous; (ii) $\eta\mapsto h(t,\eta)$ is Lipschitz and satisfies (A.2) $|h(t,\eta_{2})-h(t,\eta_{1})|\leq(1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct)|\eta_{2}-\eta_{1}|.$ ###### Proof. (i) First, we establish the continuity with respect to time. Recalling (3.6), (3.9), (4.4), (4.9), and (5.27), we have $\displaystyle|\mathcal{U}\mathcal{P}(t,\eta)-\mathcal{U}\mathcal{P}(s,\eta)|$ $\displaystyle\leq|\mathcal{U}(t,\eta)||\mathcal{P}(t,\eta)-\mathcal{P}(s,\eta)|+|\mathcal{P}(s,\eta)||\mathcal{U}(t,\eta)-\mathcal{U}(s,\eta)|$ $\displaystyle\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}|p(t,\chi(t,\eta))-p(s,\chi(s,\eta))|$ $\displaystyle\quad+C|u(t,\chi(t,\eta))-u(s,\chi(s,\eta))|$ $\displaystyle\leq\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT+2A\big{)}nC|t-s|$ $\displaystyle\quad+CD\big{(}1+2A\big{)}^{1/2}|t-s|^{1/2}.$ For the second term of $h(t,\eta)$, note that one can write $\displaystyle\int_{0}^{B+C}$ $\displaystyle\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}$ $\displaystyle=\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))d\tilde{\eta}-\int_{\mathbb{R}}K(\chi(t,\eta)-y)up(t,y)dy.$ Using (3.9), (5.27), and Lemma 4.1, one has $\displaystyle\Big{|}\int_{0}^{B+C}$ $\displaystyle\Big{(}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))-\mathcal{U}(s,\tilde{\eta})K(\chi(s,\eta)-\chi(s,\tilde{\eta}))\Big{)}d\tilde{\eta}\Big{|}$ $\displaystyle\leq\Big{|}\int_{0}^{B+C}(\mathcal{U}(t,\tilde{\eta})-\mathcal{U}(s,\tilde{\eta}))K(\chi(t,\eta)-\chi(t,\tilde{\eta}))d\tilde{\eta}\Big{|}$ $\displaystyle\quad+\Big{|}\int_{0}^{B+C}\mathcal{U}(s,\tilde{\eta})\big{(}K(\chi(t,\eta)-\chi(t,\tilde{\eta}))-K(\chi(s,\eta)-\chi(s,\tilde{\eta}))\big{)}d\tilde{\eta}\Big{|}$ $\displaystyle\leq(B+C)\left\|\mathcal{U}(t,\,\cdot\,)-\mathcal{U}(s,\,\cdot\,)\right\|_{L^{\infty}}$ $\displaystyle\quad+2n\big{(}\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT\big{)}(B+C)\left\|\chi(t,\,\cdot\,)-\chi(s,\,\cdot\,)\right\|_{L^{\infty}}$ $\displaystyle\leq(B+C)D\big{(}1+2A\big{)}^{1/2}|t-s|^{1/2}$ $\displaystyle\quad+2n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)(B+C)2A|t-s|.$ Last but not least, recalling (3.9), Lemma 4.1, (4.4), (4.10), and (5.27), we have $\displaystyle\Big{|}\int_{\mathbb{R}}\big{(}K(\chi(t,\eta)-y)up(t,y)$ $\displaystyle-K(\chi(s,\eta)-y)up(s,y)\big{)}dy\Big{|}$ $\displaystyle\leq\Big{|}\int_{\mathbb{R}}(K(\chi(t,\eta)-y)-K(\chi(s,\eta)-y))up(t,y)dy\Big{|}$ $\displaystyle\quad+\Big{|}\int_{\mathbb{R}}K(\chi(s,\eta)-y)(up(t,y)-up(s,y))dy\Big{|}$ $\displaystyle\leq n\left\|\chi(t,\,\cdot\,)-\chi(s,\,\cdot\,)\right\|_{L^{\infty}}\int_{\mathbb{R}}|u|p(t,y)dy$ $\displaystyle\quad+\pi\left\|up(t,\,\cdot\,)-up(s,\,\cdot\,)\right\|_{L^{\infty}}$ $\displaystyle\leq 2nA(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)B|t-s|$ $\displaystyle\quad+\pi n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}CT)^{2}C|t-s|+\pi CD(t-s)^{1/2}.$ Thus we have that $h(t,\eta)$ is Hölder continuous with exponent $\frac{1}{2}$ with respect to time. (ii) To establish the Lipschitz continuity with respect to space is a bit more involved, but follows pretty much the same lines. As a closer look at (5.12) reveals, one has $\sigma G(t,\chi(t,\eta)-)+(1-\sigma)G(t,\chi(t,\eta)+)=\eta\quad\text{ for some }\sigma\in[0,1].$ This means especially given $\eta\in[0,B+C]$, there exist $\eta^{-}\leq\eta\leq\eta^{+}$ such that $\chi(t,\eta^{-})=\chi(t,\eta)=\chi(t,\eta^{+})$ and $\eta^{-}=G(t,\chi(t,\eta)-)\quad\text{ and }\quad\eta^{+}=G(t,\chi(t,\eta)+).$ In view of Definition 2.3 (v), (5.3), (4.11), and (5.5), we then have for $\eta_{1}<\eta_{2}$ such that $\chi(t,\eta_{1})\not=\chi(t,\eta_{2})$ that $\displaystyle|\mathcal{U}\mathcal{P}(t,\eta_{2})-$ $\displaystyle\mathcal{U}\mathcal{P}(t,\eta_{1})|$ $\displaystyle=|\mathcal{U}\mathcal{P}(t,\eta_{2}^{-})-\mathcal{U}\mathcal{P}(t,\eta_{1}^{+})|$ $\displaystyle=|up(t,\chi(t,\eta_{2}^{-}))-up(t,\chi(t,\eta_{1}^{+}))|$ $\displaystyle\leq\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}|u_{x}p+up_{x}|(t,y)dy$ $\displaystyle\leq\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}(u_{x}^{2}+p^{2}+n|u|p)(t,y)dy$ $\displaystyle\leq(1+\left\|p(t,\,\cdot\,)\right\|_{L^{\infty}}+n\left\|u(t,\,\cdot\,)\right\|_{L^{\infty}})\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}(u_{x}^{2}+p)(t,y)dy$ $\displaystyle\leq(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))(G(t,\chi(t,\eta_{2}^{-}))-G(t,\chi(t,\eta_{1}^{+})))$ $\displaystyle=(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))|\eta_{2}^{-}-\eta_{1}^{+}|$ $\displaystyle\leq(1+C+n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct))|\eta_{2}-\eta_{1}|.$ As far as the second part is concerned, observe that (cf. (5.63)) $\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})K(\chi(t,\eta)-\chi(t,\tilde{\eta}))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}=\int_{\mathbb{R}}u(t,y)K(\chi(t,\eta)-y)d\mu(t,y),$ and we have $\displaystyle|\int_{0}^{B+C}\mathcal{U}(t,\tilde{\eta})$ $\displaystyle(K(\chi(t,\eta_{2})-\chi(t,\tilde{\eta}))-K(\chi(t,\eta_{1})-\chi(t,\tilde{\eta})))(1-\mathcal{P}\chi_{\eta}(t,\tilde{\eta}))d\tilde{\eta}|$ $\displaystyle=|\int_{\mathbb{R}}u(t,y)(K(\chi(t,\eta_{2})-y)-K(\chi(t,\eta_{1})-y))d\mu(t,y)|$ $\displaystyle=|\int_{\mathbb{R}}u(t,y)\int_{\chi(t,\eta_{1})}^{\chi(t,\eta_{2})}K^{\prime}(z-y)dzd\mu(t,y)|$ $\displaystyle=|\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}\int_{\mathbb{R}}u(t,y)K^{\prime}(z-y)d\mu(t,y)dz|$ $\displaystyle\leq(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}\int_{\mathbb{R}}nK(z-y)d\mu(t,y)dz$ $\displaystyle=n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\int_{\chi(t,\eta_{1}^{+})}^{\chi(t,\eta_{2}^{-})}p(t,z)dz$ $\displaystyle=n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)\big{(}G(t,\chi(t,\eta_{2}^{-}))-G(t,\chi(t,\eta_{1}^{+}))\big{)}$ $\displaystyle\leq n(\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+\frac{1}{4}Ct)|\eta_{2}-\eta_{1}|.$ Thus we have that $h(t,\eta)$ is Lipschitz continuous with respect to space with $|h(t,\eta_{2})-h(t,\eta_{1})|\leq\big{(}1+2n\left\|u(0,\,\cdot\,)\right\|_{L^{\infty}}+C+\frac{n}{2}Ct\big{)}|\eta_{2}-\eta_{1}|.$ ∎ ###### Lemma A.3. Given $\gamma>2$ and a weak conservative solution $(u,\mu)$ in the sense of Definition 2.3, which satisfies $\int_{\mathbb{R}}(1+|x|^{\gamma})d\mu(t)<\infty\quad\text{ for all }t\in\mathbb{R}.$ Then for any $n\in\mathbb{N}$ such that $n\geq\gamma$ $\int_{\mathbb{R}}(1+|x|^{\gamma})p(t,x)dx<\infty\quad\text{ for all }t\in\mathbb{R}.$ ###### Proof. Due to (4.10) it suffices to show $\int_{-\infty}^{-1}|x|^{\gamma}p(t,x)dx+\int_{1}^{\infty}|x|^{\gamma}p(t,x)dx<\infty.$ Since $p(t,\,\cdot\,)$ is non-negative and both integrals can be estimated using the same ideas, we only present the details for the first one. Direct computations yield $\displaystyle\int_{-\infty}^{-1}|x|^{\gamma}p(t,x)dx$ $\displaystyle=\int_{-\infty}^{-1}(x^{2})^{\gamma/2}\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y)dx$ $\displaystyle=\int_{-\infty}^{-1}(((x-y)+y)^{2})^{\gamma/2}\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n}}d\mu(t,y)dx$ $\displaystyle\leq 2^{\gamma/2}\int_{-\infty}^{-1}\int_{\mathbb{R}}\left(\frac{(x-y)^{2}+y^{2}}{1+(x-y)^{2}}\right)^{\gamma/2}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}d\mu(t,y)dx$ $\displaystyle\leq 2^{\gamma/2}\int_{-\infty}^{-1}\int_{\mathbb{R}}(1+y^{2})^{\gamma/2}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}d\mu(t,y)dx$ $\displaystyle\leq 2^{\gamma/2}\int_{\mathbb{R}}\left(\int_{\mathbb{R}}\frac{1}{(1+(x-y)^{2})^{n-\gamma/2}}dx\right)(1+y^{2})^{\gamma/2}d\mu(t,y)$ $\displaystyle\leq 2^{\gamma/2}\int_{\mathbb{R}}\left(\int_{\mathbb{R}}\frac{1}{1+z^{2}}dz\right)(1+y^{2})^{\gamma/2}d\mu(t,y)$ $\displaystyle\leq 2^{\gamma/2}\pi\int_{\mathbb{R}}(1+y^{2})^{\gamma/2}d\mu(t,y)$ $\displaystyle\leq 2^{\gamma}\pi\int_{\mathbb{R}}(1+|y|^{\gamma})d\mu(t,y).$ In the above calculations we used that $(a+b)^{2}\leq 2(a^{2}+b^{2})$ and that $(a+b)^{2}\leq 2\max(a^{2},b^{2})$. ∎ ## References * [1] V. I. Bogachev, Measure Theory. Vol. I, II. Springer-Verlag, Berlin, 2007. * [2] A. Bressan, G. Chen, and Q. Zhang. Uniqueness of conservative solutions to the Camassa–Holm equation via characteristics. Discrete Contin. Dyn. Syst. 35 (2015) 25–42. * [3] A. Bressan and A. Constantin. Global solutions of the Hunter–Saxton equation. SIAM J. Math. Anal. 37 (2005) 996–1026. * [4] A. Bressan, H. Holden, and X. Raynaud. Lipschitz metric for the Hunter–Saxton equation. J. Math. Pures Appl. 94 (2010) 68–92. * [5] A. Bressan, P. Zhang, and Y. Zheng. Asymptotic variational wave equations. Arch. Ration. Mech. Anal. 183 (2007), 163–185. * [6] J. A. Carrillo, K. Grunert, and H. Holden. A Lipschitz metric for the Hunter–Saxton equation. Comm. Partial Differential Equations 44 (2019) 309–334. * [7] C. M. Dafermos. Generalized characteristics and the Hunter–Saxton equation. J. Hyperbolic Differ. Equ. 8 (2011) 159–168. * [8] K. Grunert and A. Nordli. Existence and Lipschitz stability for $\alpha$-dissipative solutions of the two-component Hunter–Saxton system. J. Hyperbolic Differ. Equ. 15 (2018) 559–597. * [9] K. Grunert, A. Nordli, and S. Solem. Numerical conservative solutions of the Hunter–Saxton equation. BIT Numerical Mathematics 61 (2021) 441–471. * [10] K. Grunert and M. Tandy. Lipschitz stability for the Hunter–Saxton equation. arXiv:2103.10227. * [11] H. Holden, K. H. Karlsen, and P.H.C. Pang. The Hunter–Saxton equation with noise. J. Differential Equations 270 (2021) 725–786. * [12] H. Holden, K. H. Karlsen, and N. H. Risebro. Convergent difference schemes for the Hunter–Saxton equation. Math. Comp. 76 (2007) 699–744. * [13] H. Holden and X. Raynaud. Global conservative solutions of the Camassa–Holm equation — a Lagrangian point of view. Comm. Partial Differential Equations 32 (2007) 1511–1549. * [14] J. K. Hunter and R. Saxton. Dynamics of director fields. SIAM J. Appl. Math. 51 (6) (1991) 1498–1521. * [15] J. K. Hunter and Y. X. Zheng. On a nonlinear hyperbolic variational equation. I. Global existence of weak solutions Arch. Rational Mech. Anal. 129 (4) (1995) 305–353. * [16] J. K. Hunter and Y. X. Zheng. On a nonlinear hyperbolic variational equation. II. The zero-viscosity and dispersion limits. Arch. Rational Mech. Anal. 129 (4) (1995) 355–383. * [17] B. Khesin and G. Misiołek. Euler equations on homogeneous spaces and Virasoro orbits. Adv. Math. 176 (2003) 116–144. * [18] J. M. Lee. Geometric approach on the global conservative solutions of the Camassa–Holm equation. J. Geom. Phys. 142 (2019) 137–150. * [19] J. Lenells. The Hunter–Saxton equation: a geometric approach. SIAM J. Math. Anal. 40 (2008) 266–277. * [20] J. Lenells. Weak geodesic flow and global solutions of the Hunter–Saxton equation. Discrete Contin. Dyn. Syst. 18 (2007) 643–656. * [21] J. Lenells. The Hunter–Saxton equation describes the geodesic flow on a sphere. J. Geom. Phys. 57 (2007) 2049–2064. * [22] H. Li and G. Toscani. Long–time asymptotics of kinetic models of granular flows. Arch. Ration. Mech. Anal. 172 (3) (2004) 407–428. * [23] A. Nordli. A Lipschitz metric for conservative solutions of the two-component Hunter–Saxton system. Methods Appl. Anal. 23 (2016) 215–232. * [24] M. Wunsch. The generalized Hunter–Saxton system. SIAM J. Math. Anal. 42 (2010) 1286–1304. * [25] M. Wunsch. On the Hunter–Saxton system. Discrete Contin. Dyn. Syst. Ser. B 12 (2009) 647–656. * [26] P. Zhang and Y. Zheng. On oscillations of an asymptotic equation of a nonlinear variational wave equation. Asymptot. Anal. 18 (3-4) (1998) 307–327. * [27] P. Zhang and Y. Zheng. On the existence and uniqueness of solutions to an asymptotic equation of a variational wave equation. Acta Math. Sin. (Engl. Ser.) 15 (1) (1999) 115–130. * [28] P. Zhang and Y. Zheng. Existence and uniqueness of solutions of an asymptotic equation arising from a variational wave equation with general data. Arch. Ration. Mech. Anal. 155 (1) (2000) 49–83.
arxiv-papers
2021-07-27T09:09:42
2024-09-04T03:07:21.008022
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Katrin Grunert, Helge Holden", "submitter": "Katrin Grunert", "url": "https://arxiv.org/abs/2107.12681" }
2107.12682
1030 Research # Time-Varying Fuzzy Contour Trees Anna-Pia Lohfink e-mail: [email protected] Frederike Gartzky e-mail: [email protected] Florian Wetzels e-mail: [email protected] Luisa Vollmer Christoph Garth e-mail: [email protected] Scientific Visualization Lab – Technische Universität Kaiserslautern ###### Abstract We present a holistic, topology-based visualization technique for spatial time series data based on an adaptation of Fuzzy Contour Trees. Common analysis approaches for time dependent scalar fields identify and track specific features. To give a more general overview of the data, we extend Fuzzy Contour Trees, from the visualization and simultaneous analysis of the topology of multiple scalar fields, to time dependent scalar fields. The resulting time- varying Fuzzy Contour Trees allow the comparison of multiple time steps that are not required to be consecutive. We provide specific interaction and navigation possibilities that allow the exploration of individual time steps and time windows in addition to the behavior of the contour trees over all time steps. To achieve this, we reduce an existing alignment to multiple sub- alignments and adapt the Fuzzy Contour Tree-layout to continuously reflect changes and similarities in the sub-alignments. We apply time-varying Fuzzy Contour Trees to different real-world data sets and demonstrate their usefulness. Human-centered computingVisualizationVisualization techniquesTreemaps; Human- centered computingVisualizationVisualization design and evaluation methods Introduction Analyzing time dependent scalar fields is usually done feature based by identifying regions with specific patterns and tracking them between time steps. While these approaches are helpful for specialized tasks, they are not suited to provide a general overview of the complete data set due to their focus on specific features and the chronology. We provide a holistic view of the data set and its feature candidates by applying Fuzzy Contour Trees (FCTs, [7]), giving a simultaneous overview of the topological structure of the considered time steps. By defining sub-alignments that originate from the _overall alignment_ containing all time steps, the development of the field topology can be tracked, while also being able to consider the overall topological structure of the data set and compare the structures of arbitrary subsets, independent of the chronology. After the introduction of FCTs as a tool for the simultaneous visualization of the topological structure of ensembles, we present time-varying FCTs (T-FCTs), specialized to the analysis of time series data. Since time series data represents a series of individual results, the application of FCTs to this problem is straight forward – instead of different ensemble members, we consider different time points. However, application specific tasks require further development of possible user interactions and visualization to ensure usefulness and consistency. After discussing related work and providing background on our previous work in Section 1, we make the following contributions: We present the T-FCT interface in Section 2. Our new contributions in the FCT back-end and front-end are discussed in Sections 3 and 4 respectively, with a short overview of the new interaction possibilities in 5. We apply T-FCTs to different real-world data sets in Section 6 and conclude with a short discussion on future work in Section 7. ## 1 Fuzzy Contour Trees and Related Work Figure 1: The FCT framework developed by Lohfink et al. We give an overview of previous work related with the novel contributions of T-FCTs. Work that is related to FCTs in general, concerning contour trees, their application in ensemble visualization and merging of graph-based topological descriptors can be found in [7]. #### Time Dependent Contour Trees A theoretical consideration of time-varying reeb graphs for continuous space- time data was given by Edelsbrunner et al. [4]. Szymczak describes sub-domain aware contour trees and uses them to track accumulated topological changes between slices of the data set. While the evolution of iso-surfaces is plotted, the contour trees are not visualized [13]. Also different interactive tools for the analysis of time varying contour trees and iso-contours have been developed: An interactive exploration tool for split/merge and contour trees for different time steps was developed by Sohn et al. [12]. They define a topology change graph and use it to navigate trees of individual time steps. Bajaj et al. provide multiple calculated signature graphs on time-varying scalar fields. Interaction possibilities and the additional visualization of single contour trees provide real-time exact quantification in the visualization of iso-contours [1]. Kettner et al. take this idea further to non-decomposable topological properties and higher dimensions in the Safari interface [5]. Lukasczyk et al. define and visualize spatio-temporal Reeb graphs in [8] to extract and visualize trajectories and relationships of hotspots. Oesterling et al. show the evolution of extrema in high-dimensional data by plotting a 1D landscape profile for each time step and connecting peaks to indicate critical events. These events are determined as structural changes in time-varying merge trees. Other than T-FCTs, none of these approaches visualize contour trees for more than a single time step or show the evolution of contour trees. #### Feature Tracking in Time Dependent Data Features have been identified and tracked in scalar fields in many different ways. The components of interests can be superlevel sets [8, 12] or sub- domains with special geometric and topological properties [2, 6, 11]. Multiple features on different levels of interest are often tracked in tracking graphs [8, 12, 9, 15]. In all of these cases, determined features are tracked between subsequent time steps, tracing these features over time. In contrast, our approach provides an overview over topological features instead of tracking individual features. Considering the topological structure at all time steps and matching it, we provide a more holistic view on the data. Similarities and differences of time steps can be determined flexibly and independent of the adjacency of the time steps. #### Fuzzy Contour Trees The foundation for T-FCTs was developed by Lohfink et al. with the Fuzzy Contour Tree framework [7]. See Figure 1 for an overview. This framework allows the simultaneous analysis of the topological structure of all members of an ensemble at once. As underlying back-end functionality, the member contour trees are matched using the tree alignment algorithm. This is done incrementally: after aligning two contour trees, the resulting alignment and a further contour tree are given as input for the alignment algorithm and so on. Since the order of the contour trees has an impact on the result, the contour trees are shuffled randomly before the execution. The resulting alignment is a super tree of all contour trees. Thus, a layout for the alignment can be transferred to the individual contour trees, yielding common layouts for all of them. Superimposing the contour trees with this layout results in a Fuzzy Contour Tree in its grouped layout. Bundling edges at saddles and linking the edges’ opacity to the fraction of contour trees that contain this specific edge results in the bundled layout. To further improve the clarity of the visualization, Lohfink et al. implemented an optimized branch spacing method that improves the positioning of branches on their parent branch while keeping certain properties of the original FCT. Multiple interaction possibilities are available that link the FCT to an overview of the contained ensemble members. Both, FCTs and T-FCTs were designed to support certain domain-agnostic, elementary analysis tasks. Due to space limitations we reserve their detailed description and evaluation for future work. ## 2 Interface Overview Figure 2: The time-varying Fuzzy Contour Tree interface: Time selector and the FCT of the selected time steps. Similar to the original FCT described by Lohfink et al. in [7] that is applied to ensembles, the T-FCT gives insight in the topological structure of time dependent data by simultaneous visualization of multiple contour trees. In addition, T-FCTs are tailored to the application to time dependent scalar fields, considering different time steps of the same simulation or measurement. This specialized application gives us the possibility to adapt visualization of and interaction with the FCT to support the exploration of time dependent fields at the best. Figure 2 shows the T-FCT interface. Both, the time selector on top and the FCT below are enhanced versions of interface components of the original FCT interface, providing specialized interaction with time dependent data and ensuring a consistent visualization. In the following we describe the background of this visualization and how to generate it. Details on the T-FCT layout and the time selector can be found in Sections 4 and 5 respectively. The T-FCT interface was implemented using $D^{3}$, python and jupyter notebook. ## 3 The Time-Varying Alignment Considering time dependent scalar fields, the main focus lies on a consistent alignment over time, prohibiting a randomized order of the input contour trees. Instead, the contour trees are aligned sequentially. Since the structure of the first aligned time step imposes its structure on the whole alignment, other choices for this time step might be beneficial depending on the data set. Furthermore, the matching of nodes in consecutive time steps is prioritized as follows: the scalar values of nodes in the alignment are set to the value of the nodes in the lastly aligned contour tree, if they exist in this contour tree. Else the value remains untouched. Thus, this contour tree is effectively contained in the alignment with its scalar values. Hence, aligning consecutive time steps behaves similar to matching adjacent trees, enforcing the consistent matching of nodes. Since for the final layout, only values from the individual time steps are used, changing the assigned values in the alignment has no impact on node ordering. The alignment process is very flexible in its application due to use of different metrics. We implemented an overlap metric in addition to the existing volume, persistence and combined metrics. It is defined as $1-J(A,B)$ where the Jaccard index $J(A,B)=\frac{|A\cap B|}{|A\cup B|}.$ The contour tree alignment algorithm with optional matching over time is available in the TTK development branch [14]. Analysis of time dependent data often takes place on the level of individual time steps instead of the whole data set. Comparing the topological structure of arbitrary sub-sets is rendered possible by the calculation of the corresponding _sub-alignment_. Sub-alignments are calculated based on an existing overall alignment. This ensures consistent matching of nodes in different sub-alignments, avoids problems with node identification between sub-alignments and guarantees a consistent layout. To obtain a sub-alignment, contour trees of time steps that are not selected are one by one subtracted from the alignment by decrementing the frequency of all contained nodes. Then, nodes with frequency 0 are deleted and connectivity of the result is restored. To do so, we determine parent - child relations of the neighboring nodes by determining paths from these neighbors to the fixed alignment root (see [7] for details) and connect the nodes accordingly. The resulting sub-alignments are alignments of the chosen sub-set of contour trees. They are likely to be less optimal with respect to the chosen metric than the result of the alignment algorithm heuristic would be. However, all we need sub-alignments to be is a sub-tree of the overall alignment to have a consistent and traceable layout. Employing the resulting FCT, analysis tasks can be approached for the selected sub-set of time steps. ## 4 The Time-Varying Fuzzy Contour Tree Figure 3: The trickle-down-layout of the T-FCT: The layout of the overall alignment (Level I) carries over to sub-alignments (Level II) that are compared in the time selector. Their layout propagates further to the individual contour trees (Level III). As a basis for the T-FCTs, the layout of the overall alignment is computed as described in [7]. In the setting of T-FCTs, the cost function of the simulated annealing doesn’t only take into account scalar values of leaves and the persistence of branches, but also their existence in time. Only contemporary branches (i.e. branches whose existence intervals overlap) with overlapping bounding boxes are regarded as overlapping. Similar to the layout of individual contour trees being based on the layout of their alignment, the sub-alignments’ layout is based on the layout of the overall alignment. An illustration for this trickle-down layout is given in Figure 3. To obtain the layout of a sub-alignment from the overall alignment, several steps are taken: First, its branch decomposition is computed. Then, the order of its branches is set according to the horizontal order in the overall alignment. The main branch, as the only branch containing two leaf nodes, is positioned according to its leaf node that can vary over time (the root node always remains the same). This facilitates spotting changes in the main branch. With the horizontal order of the branches set, it is optionally adapted to avoid gaps that occur if branches from the overall alignment are not present in the sub-alignment. While this results in more uniform individual layouts, tracking the development of individual branches is easier without re- positioning, especially in animations. After the layout for the sub-alignment is determined, leaves, saddles and branches are transferred from the individual contour trees as described in [7], following paths in the sub-alignment. The coloring of leaf nodes is kept consistent over different sub-alignments. In contrast to common feature tracking methods, T-FCTs allow the direct comparison of non-consecutive time steps as well as a topological overview over all time steps. Matching order and metric are adaptable, providing in- depth control of the result. ## 5 Interaction Due to space limitations, we present added and enhanced interaction possibilities only shortly. For more details see the FCT paper [7] and the supplemental material. Figure 4: The time selector: The complete data set with highlighted selected time steps. Buttons allow the manipulation of the selection. Interaction possibilities with the FCT aim on linking information concerning individual contour trees with information on the overall behavior of the individual fields. To adapt FCTs to the time-varying setting, the grid providing information on individual contour trees and enabling tree and member highlighting was turned into the time selector (Figure 4, compare Figure 1). Instead of showing only time steps that are contained in the current sub- alignment, every time step is represented by a colored slice of the selector. Selected time steps are highlighted as boxes with the number of the time step. To indicate areas of interest, the time selector is colored based on different measures on the sub-alignment containing a time window of given width with the considered time step at the center. Either these values are shown directly, or the averaged sum of their node-wise differences with the neighboring time step to illustrate changes between them. We implemented two centrality measures: degree and betweenness centrality [10], focusing on edge insertions and deletions, and structural changes respectively. Examples for the different coloring options are given in Figure 5. Figure 5: Time selector options Different selections and coloring. Time steps can be selected via the time selector in three different modes: _Window selection_ , _multi-selection_ and _periodic selection_ as special case of multi-selection. See Figure 5 for examples. _Window selection_ selects a connected sub-interval centered at the selected time step. _Multi-selection_ allows the manual selection of multiple, not necessarily adjacent time steps to provide deeper insight in individual members and their differences. As a special case of multi-selection, the _periodic selection_ automatically selects time steps with a given period and shows a periodic marker. A given selection can be shifted left and right. A play and a pause button start and stop automated shifting to the right (Figure 4). Figure 6: Tree highlighting: Right: Hovering selected time steps highlights the individual contour tree in the FCT. Left: For time steps that are not part of the current sub-alignment, only contained branches are highlighted without indication of specific nodes and saddles. _Tree highlighting_ is also generalized for time steps that are currently not selected: Branches that are present are highlighted without marking specific saddles and leaves (see Figure 6). _Member highlighting_ in the time selector does not only take place for currently selected time steps, but for all available time steps. Like this, navigating the data set and finding patterns in branch occurrences is facilitated. See Figure 7 for an example. ## 6 Applications Figure 7: Periodic behavior in the sea ice data set. The marked branch is contained in the contour tree only during winter months. (period 12, volume metric) ### 6.1 Sea Ice The sea ice data set describes arctic sea ice concentrations and is provided by the National Snow and Ice Data Center [3]. The concentrations are given as tenths of grid square area covered by ice. We set the value -1 for grid cells that are not over sea. We applied T-FCTs to sea ice concentrations from 1980 to 1995 and applied a mild smoothing filter to the data to avoid non-binary contour trees. Containing only discrete values, large plateaus in the data result in contour trees with branches of persistence 0, forbidding the use of metrics that rely on persistence in the alignment process. Hence, we chose volume and overlap metric for this example. The discrete nature of the saddles and extrema also complicates finding a suitable layout for the T-FCT. Optimized branch spacing as described in [7] shifts the branches to still allow a clear layout. Figures 7 and 9 show the T-FCT for the sea ice data set with branches of typical behavior highlighted. The selected branch in Figure 7 can be found in the winter months of every selected year, reflecting the periodical increase of sea ice during winter months. The highlighted minimum (ocean) is only matched if it is surrounded by sufficiently large maxima (sea ice). In Figure 9 on the other hand, the selected branch vanishes after 1986, to re-occur in early 1994. This branch represents an area of the arctic sea that was frequently surrounded by sea ice during winters before around 1985 but not any more. Both of these behaviors, periodical occurrence over the whole data set and periodical occurrence only in about the first half of the considered time frame with potential re-occurrence between 1992 and 1994 can be seen in multiple branches. Periodic selection allows the selection of individual months over all years. An example for the comparison of individual months from 1980 to 84 is given in Figure 8. Here, we used the overlap metric for the alignment and illustrate the usefulness of optimized branch spacing in discrete data sets. The much higher complexity of the main structures in the FCT during winter months indicates the larger extent of sea ice in different ice floes. Although these floes are interrupted by islands and potentially even free to move, complicating a matching between time steps, similar structures are visible between the months, indicating areas of the arctic ocean that are covered by ice around the whole year. Figure 8: Sea ice extent during individual months. Similar structures are highlighted. For March, the comparison between the FCT with and without optimized branch spacing is given (overlap metric). Figure 9: Vanishing branches over time show the yearly decreasing extent of the sea ice. In 1994 the sea ice extent peaked and the branch re-occurs (period 12, volume metric). ### 6.2 Convection Simulation Flow around a hot pole over time was simulated. The resulting 2D flow field is of size 128 × 256. Material at rest is heated around the pole, begins to rise, and forms a plume. An exemplary member is shown on the right of Figure 1. This behavior is clearly reflected in the T-FCTs in Figure 10. Advancing the selected window step by step through the data provides an overview of the topological structure at individual time steps but also their connection and development: Until time step 74, the pole is heating up. Then, the plume forms and more and more temperature minima are enclosed by the formed plume. The time selector color shows the degree values, reflecting the dynamic behavior of the plume towards the end. We chose representative time steps and scaled them to highlight the raising temperature; find the complete animation in the supplemental material. Figure 10: Sliding Window: Advancing step by step through the convection simulation result provides a clear understanding of the ongoing processes. We chose an expressive subset of time steps, the step number is given above the FCTs. ## 7 Conclusion and Future Work In this paper, we applied FCTs in the time-varying setting. As our new contribution, we adapted back-end and front-end to its specific challenges, resulting in the T-FCT interface. We illustrated usefulness and limitations in real-world examples. As future work, different options to deal with cluttered (Fuzzy) contour trees could be included, for example hiding nondescript branches and detail on demand. Also, instead of a purely additive comparison of contour trees, a subtractive comparison just showing branches not contained everywhere could improve the overview. In summary, extending and applying FCTs to time varying data results in useful, coherent visualizations providing a more general overview of the data than common analysis approaches. ###### Acknowledgements. Funded by the Deutsche Forschungsgemeinschaft (DFG, German Re- search Foundation) – 252408385 – IRTG 2057 ## References * [1] C. L. Bajaj, V. Pascucci, and D. R. Schikore. The contour spectrum. In Proceedings. Visualization ’97 (Cat. No. 97CB36155), pp. 167–173, 1997. doi: 10 . 1109/VISUAL . 1997 . 663875 * [2] P.-T. Bremer, E. M. Bringa, M. A. Duchaineau, A. G. Gyulassy, D. Laney, A. Mascarenhas, and V. Pascucci. Topological feature extraction and tracking. Journal of Physics: Conference Series, 78:012007, jul 2007. doi: 10 . 1088/1742-6596/78/1/012007 * [3] W. L. Chapman and J. E. Walsh. Arctic and southern ocean sea ice concentrations, version 1, arctic. Boulder, Colorado USA. NSIDC: National Snow and Ice Data Center, 1991, updated 1996, Accessed: 2021-02-20. doi: 10 . 7265/N5057CVT * [4] H. Edelsbrunner, J. Harer, A. Mascarenhas, V. Pascucci, and J. Snoeyink. Time-varying reeb graphs for continuous space–time data. Computational Geometry, 41(3):149–166, 2008. doi: 10 . 1016/j . comgeo . 2007 . 11 . 001 * [5] L. Kettner, J. Rossignac, and J. Snoeyink. The safari interface for visualizing time-dependent volume data using iso-surfaces and contour spectra. Computational Geometry, 25(1):97–116, 2003. European Workshop on Computational Geometry - CG01. doi: 10 . 1016/S0925-7721(02)00132-3 * [6] T. Lee, X. Tong, H. Shen, P. C. Wong, S. Hagos, and L. R. Leung. Feature tracking and visualization of the madden-julian oscillation in climate simulation. IEEE Computer Graphics and Applications, 33(4):29–37, 2013. doi: 10 . 1109/MCG . 2013 . 36 * [7] A.-P. Lohfink, F. Wetzels, J. Lukasczyk, G. H. Weber, and C. Garth. Fuzzy contour trees: Alignment and joint layout of multiple contour trees. Computer Graphics Forum, 39(3):343–355, 2020. doi: 10 . 1111/cgf . 13985 * [8] J. Lukasczyk, R. Maciejewski, C. Garth, and H. Hagen. Understanding hotspots: A topological visual analytics approach. In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems. Association for Computing Machinery, 2015. doi: 10 . 1145/2820783 . 2820817 * [9] J. Lukasczyk, G. Weber, R. Maciejewski, C. Garth, and H. Leitte. Nested tracking graphs. Computer Graphics Forum, 36(3):12–22, 2017. doi: 10 . 1111/cgf . 13164 * [10] M. Roy, S. Schmid, and G. Trédan. Modeling and measuring graph similarity: The case for centrality distance. In Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, FOMC ’14, p. 47–52. Association for Computing Machinery, 2014. doi: 10 . 1145/2634274 . 2634277 * [11] A. Schnorr, D. N. Helmrich, D. Denker, T. W. Kuhlen, and B. Hentschel. Feature tracking by two-step optimization. IEEE Transactions on Visualization and Computer Graphics, 26(6):2219–2233, 2020. doi: 10 . 1109/TVCG . 2018 . 2883630 * [12] B. Sohn and C. L. Bajaj. Time-varying contour topology. IEEE Transactions on Visualization and Computer Graphics, 12(1):14–25, 2006. doi: 10 . 1109/TVCG . 2006 . 16 * [13] A. Szymczak. Subdomain aware contour trees and contour evolution in time-dependent scalar fields. In International Conference on Shape Modeling and Applications 2005 (SMI’ 05), pp. 136–144, 2005. doi: 10 . 1109/SMI . 2005 . 45 * [14] J. Tierny, G. Favelier, J. A. Levine, C. Gueunet, and M. Michaux. The topology toolkit. IEEE Transactions on Visualization and Computer Graphics, 24(1):832–842, 2018. doi: 10 . 1109/TVCG . 2017 . 2743938 * [15] W. Widanagamaachchi, C. Christensen, V. Pascucci, and P. Bremer. Interactive exploration of large-scale time-varying data using dynamic tracking graphs. In IEEE Symposium on Large Data Analysis and Visualization (LDAV), pp. 9–17, 2012. doi: 10 . 1109/LDAV . 2012 . 6378962
arxiv-papers
2021-07-27T09:10:10
2024-09-04T03:07:21.030305
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Anna-Pia Lohfink, Frederike Gartzky, Florian Wetzels, Luisa Vollmer,\n Christoph Garth", "submitter": "Anna-Pia Lohfink", "url": "https://arxiv.org/abs/2107.12682" }
2107.12684
# Microrobots from Toposelective Nanoparticle Attachment M. R. Bailey,1∗ F. Grillo,1∗ N. D. Spencer2, L. Isa1∗ 1Laboratory for Soft Materials and Interfaces, Department of Materials, ETH Zürich, Vladimir-Prelog-Weg 5, 8093 Zürich, Switzerland 2Laboratory for Surface Science and Technology, Department of Materials, ETH Zürich, Vladimir-Prelog-Weg 5, 8093 Zürich, Switzerland ∗To whom correspondence should be addressed: E-mail: [email protected]; E-mail: [email protected]; E-mail: [email protected] > Microrobots hold promise for applications ranging from targeted delivery to > enhanced mixing at the microscale. However, current fabrication techniques > suffer from limited throughput and material selection. Here, we demonstrate > a versatile route enabling the synthesis of microrobots from off-the-shelf > micro- and nano-particles. Our protocol hinges on the toposelective > attachment of photocatalytic nanoparticles onto microparticles, exploiting a > multi-functional polymer and a Pickering-wax emulsification step, to yield > large quantities of photo-responsive active Janus particles. The polymer > presents both silane and nitrocatechol groups, binding silica microspheres > to a range of metal oxide nanoparticles. The Pickering-wax emulsions protect > part of the microspheres’ surface, enabling asymmetric functionalization, as > required for self-propulsion. The resulting photocatalytic microrobots > display a characteristic orientation-dependent 3D active motion upon UV > illumination, different to that conventionally described in the literature. > By connecting the extensive library of heterogeneous nanoparticle > photocatalysts with the nascent field of active matter, this versatile > material platform lays the groundwork towards designer microrobots, which > can swim by catalysing a broad range of chemical reactions with potential > for future applications. ## Introduction Machines increasingly perform tasks once believed the prerogative of biological systems. Yet, advances in automation are mostly limited to large machines such as cars, drones, and industrial robots. The advent of microrobots, artificial objects that convert energy sources such as light or chemicals into directed motion (?), promises to bring automation down to the micro- and nano-scale. Microrobots can transport matter at the microscale, mix and pump fluids without external agitation (?), thus offering tantalizing opportunities for performing autonomous tasks at small scales in applications ranging from targeted drug delivery (?), to environmental remediation (?), and even energy conversion (?). However, significant technological hurdles must first be overcome if microrobots are to realise their potential for real-world applications. Fabrication remains perhaps the most significant challenge to applied microrobotics, as both top-down and bottom-up approaches suffer from significant limitations with respect to scalability and modularity in combining different materials (?). Designing novel multi-functional micromachines requires increasingly expensive and specialized equipment, such as for two-photon polymerization (?), with implications for the accessibility of scientific research (?). In contrast to the complex microrobots produced by such techniques, Janus microswimmers are arguably the simplest class of synthetic active matter. These rely on surface patches with different physicochemical properties for propulsion in self-generated gradients (?). In particular, Janus chemical swimmers do not need external actuation, requiring only a chemical fuel source to move. Nevertheless, these simple microrobots often suffer from a very low fabrication throughput due to the methodology used to produce the surface patches (?). Janus microswimmers are typically produced by sputter-coating particle monolayers, exploiting line-of-sight vapour-phase deposition and particle self-shadowing (?). Metal coatings are thus selectively deposited as a spherical cap, whose extension can be controlled by tilting the monolayer (?, ?). Despite its widespread popularity, this approach has clear downsides, namely a yield on the order of micrograms and a highly inefficient use of metal precursors. Recently, Archer et al. demonstrated the scalable fabrication of Janus microrobots by functionalizing Pickering-wax emulsions with a two-step nanoparticle seeding and film-growth protocol (?). This represents a significant advance in the state-of-the-art of microswimmer fabrication, but the technique is specific to platinum and does not provide close control over the film morphology or composition. The constrained material and synthetic options in the literature, although inconsequential for fundamental studies, hamper the progress of applied microrobotics and, in particular, inhibit the development of propulsion mechanisms based on useful chemical reactions. Here, we demonstrate a modular approach to achieve the asymmetric functionalization of microparticles from the toposelective attachment of different nanoparticle thin films, thereby obtaining large (100 mg) quantities of photo-responsive Janus microrobots. Specifically, commercial nanoparticles are asymmetrically attached to SiO2 microparticles, which are partially embedded in Pickering-wax emulsion droplets, via a poly(acrylamide) modified with silane and nitrocatechol groups (?). The approach is not only scalable but also connects the vast literature on high-surface-area nanocatalysts (?, ?) to the fabrication of microswimmers, extending the range of targetable reactions and enabling the facile introduction of new functionalities. In particular, by utilizing silane and metal oxide-nitrocatechol chelation chemistry, we demonstrate Janus particles functionalized by TiO2, SrTiO3, and Fe2O3 nanoparticles. Furthermore, using a post-modifiable poly(pentafluorophenylacetate) (pPFPAC) backbone presents the opportunity to exploit other metal-coordination chemistries through the introduction of various functional groups. Focusing on commercial TiO2 P-25 nanocatalysts, we fabricate photoresponsive microswimmers, which not only self-propel under UV- illumination, but also exhibit an interesting orientation-dependent motion that could be exploited for navigation or directed transport (?). ## Results ### Polymer-assisted nanoparticle attachment on microspheres The first step in the fabrication of our photocatalytic microrobots is to identify a protocol for the robust attachment of nanoparticle thin films onto the microparticle supports. Electrostatic attachment is frequently used as a means for colloidal heteroaggregation, however, it cannot withstand the harsh cleaning protocols required to remove the solidified wax in Pickering-wax emulsions. Alternative strategies employing covalent bonds are therefore to be sought. In particular, silane groups are frequently used as anchors for SiO2, while a raft of coordination chemistries exist for transition metal complexes. However, combining all these features into a single, facile, and robust protocol presents significant challenges. Here, we overcome these obstacles by means of a polymer bridge. This comprises an acrylamide polymer backbone functionalized with both nitrocatechols and silanes to provide multiple covalent linking sites that can stably bind the nanoparticles to the SiO2 surface. We base our polymer bridge on (poly)pentafluoroacetate (pPFPAC), a post- modifiable polymer containing reactive ester linkages, which can be exchanged with amine-containing functional groups by nucleophilic substitution. To decorate our microparticles with various metal-oxide nanoparticles, we functionalize this pPFPAC backbone with: i) N-boc-hexanediamine, ii) nitrocatechols, and (iii) silane-based groups to obtain poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyldimethylethoxysilane, nitrodopamine) (?). The N-boc protecting group on the diamine is removed with TFA, exposing protonated amines on the polymer backbone. This electrostatic component assists the polymer conformation when binding to negatively charged inorganic surfaces. The silane groups covalently bind the polymer to the SiO2 microparticle support via siloxane groups, while nitrodopamine facilitates chelation to a range of metals, including titanium and iron oxides (?, ?). In this way, the multi-functional polymer acts as a bridge that provides anchoring between the cores of silica microparticles and oxide nanoparticles in a simple heteroaggreation process. Figure 1: Overview of nanoparticle attachment and combination with Pickering- wax emulsions to achieve Janus particles. a) Protocol to attach nanoparticles to microparticle supports from the sequential mixing of the polymer and nanoparticle suspensions. b) SEM image showing the absence of nanoparticles on SiO2 without intermediate polymer functionalization step (scale bar 3 $\mu$m). c,d) SEM images showing the successful attachment of TiO2 P-25 to polymer- functionalized SiO2 microparticles (scale bars 4 $\mu$m, 0.4 $\mu$m respectively). e) Loading curve of Ti/Si wt% as a function of polymer added with constant TiO2 concentration. The amount of added polymer is limited by its solubility in water. f) Loading curve of Ti/Si wt% as a function of TiO2 added with constant polymer concentration. g) Pickering-wax emulsion protocol to toposelectively attach pre-synthesized nanoparticles. Wax is used as a temporary mask to screen full coverage of the SiO2 microparticles. h) SEM image of SiO2-wax colloidosomes produced after emulsification (scale bar 5 $\mu$m). i) SEM image showing TiO2 nanoparticle-functionalized SiO2 microparticles on SiO2-wax colloidosomes (scale bar 1 $\mu$m). j,k) SEM images of Janus particles obtained after removal of the wax. All scale bars are 1 $\mu$m. We optimize the attachment of uniform nanoparticle films focusing on TiO2 P-25 as our benchmark nanoparticle system, in concurrence with its status within the field of photocatalysis. The process, schematized in Fig. 1a, starts with the activation of the surface of the SiO2 microparticles by an initial cleaning step, using a hot ammonia and hydrogen peroxide bath to provide available hydroxyl groups to form siloxane bonds with the polymer. The polymer is first dispersed at varying concentrations at $50^{\circ}$ C overnight. Cleaned particles are then added dropwise to the polymer solutions under magnetic stirring, and left to mix overnight at a final concentration of 0.1w/v%. After stirring, the SiO2 is then washed by centrifugation with double-distilled water to remove excess polymer from solution. The SiO2 particles retain a yellow color from the polymer, due to the presence of nitrodopamine. The functionalized polymer-SiO2 particles are then redispersed in a PBS 7.0 buffer solution, adapting the protocol of Serrano et al. for flat substrates (?). The particles obtain a pinkish hue, likely arising from conformational changes of nitrodopamine in alkaline environments (?). TiO2 P-25 of varying concentrations is then added dropwise to a stirred 0.1 w% solution of the polymer/SiO2 microparticles and then left mixing overnight. Finally, the P-25/SiO2 microparticles are washed extensively with alternating sonication and centrifugation steps to remove any excess TiO2 P-25 not bound to the SiO2. The produced P-25/SiO2 microparticles are imaged using SEM. We find that in the absence of the polymer functionalization step, no TiO2 P-25 nanoparticles are bound to the SiO2 microparticles after washing (Fig. 1b), even at the highest TiO2 concentrations investigated. We also verify this with ICP-OES elemental analysis, and find negligible quantities of Ti in the sample (Fig. 1e), highlighting the effectiveness of the cleaning protocol and the requirement for the polymer to bind the TiO2 P-25 nanoparticles (Figs. 1b-e). The TiO2 loading can be effectively controlled by varying the amount of polymer and TiO2 P-25 added, and is retained after washing (Figs. 1e,f). We observe a linear growth in the Ti/Si ratio with increasing polymer concentration (Fig. 1e), which is limited by the solubility of the polymer in water. The Ti/Si ratio would naturally saturate with increasing TiO2 P-25 (Fig. 1f), but, at the highest TiO2 concentrations we explore, aggregation of the nanoparticles starts to occur. ### Toposelective nanoparticle attachment Having established the success of the bulk surface modification, we combine it with a Pickering wax emulsion approach to produce asymmetrically functionalized SiO2 microparticles, en route to realizing photocatalytic microrobots (?). This strategy consists in decorating the surface of molten wax droplets in an aqueous medium with SiO2 microparticles. The particles are irreversbily adsorbed at the water-wax interface and are immobilized when solidifying the wax upon cooling. The surface of the particles immersed in the wax is then protected from surface modifications that are carried out in the aqueous medium. In particular, we prepare our Pickering emulsions by adapting the methodology described by Perro et al. (?). Cleaned particles are dispersed in didodecyldimethylammonium bromide (DDAB) solutions with concentrations corresponding to an approximate surfactant monolayer coverage on all particles (?). Wax is added to the suspension, which is heated to $75^{\circ}$ C, and then subjected to a two-step vigorous stirring protocol (?) (see experimental section for more details). The hot emulsion is then rapidly cooled in an ice- bath to obtain solidified SiO2-wax colloidosomes (Figs. S1a-d). The colloidosomes are then washed consecutively by gravitational sedimentation with distilled water, a 0.1 M NaCl solution to remove the DDAB cationic surfactant, then water once more to remove the salt. At this stage, we add the multifunctional polymer to coat the exposed surface of the SiO2 particles. The colloidosomes are dispersed in the polymer solution, gently agitated overnight with an orbital mixer, then washed once more with distilled water to remove excess polymer, redispersed in a pH 7.0 PBS solution, and gently mixed with the nanoparticles overnight. Finally, the colloidosomes are collected and dried, before mixing and filtering with chloroform to remove the wax (Fig. 1g). For straightforward functionalization, the colloidosomes should be denser than water (Fig. S3). Colloidosomes with a mean diameter of 33.4 $\mu$m are produced using 2.12 $\mu$m particles (Supplementary Fig. 2). A particle concentration of 5w/v% in water is emulsified with wax in a 1:10 wax:water volumetric ratio. The process can be readily tuned to produce colloidosomes with SiO2 particles of varying sizes (Figs. S1a-d). Microparticle size provides a convenient handle on controlling physical properties of the final microrobots such as the rotational diffusion coefficient, which could be exploited for e.g. enhanced mixing (?) or navigation (?). However, unlike some previous reports, we were not able to tune particle penetration into the wax with surfactant concentration - instead we found that the surfactant concentration only determined whether or not it was possible to obtain Pickering emulsions (?). Figure 2: HR-TEM and elemental mapping of asymmetric TiO2 P-25 nanoparticle thin films on SiO2 microparticles. a-c) HAADF-STEM and EDS mapping of Janus particles: the asymmetric functionalization with TiO2 is clearly visible (scale bars 500 nm). d-f) HR-TEM of the nanoparticle films indicate direct attachment of porous aggregate structures (scale bars 750 nm, 200 nm, 50 nm respectively). Our process gives an approximate 50-50 TiO2/SiO2 surface coating (Figs. 1i-k). Ti loading is also confirmed by ICP-OES, which gives an approximate 50% coverage for the Janus microrobots, as observed with SEM (Figs. 1e,f). The value contrasts with the expected nanoparticle coverage based on the penetration of the SiO2 microparticles into the wax (approximately 0.36R from direct measurement of the three-phase contact angle) and on previous findings using Pickering-wax emulsions (?, ?). We hypothesize that the closely packed monolayers of SiO2 form an effective barrier to the transport of TiO2 P-25 nanoparticles onto the whole surface of the silica particles that is not protected by the wax, thereby preventing a higher surface coverage. The rotated particles in Fig. 1i, likely a result of subsequent filtration steps after nanoparticle attachment, also suggest this shadowing effect. The Janus morphology is retained after the harsh cleaning protocols necessary to remove excess nanoparticles and wax, and the redispersal of the dried Janus microrobots in water (Figs. 1j,k), indicating the durability of the polymer linkage. We confirm the Janus distribution of TiO2 by elemental mapping, namely HAADF- EDS (Figs. 2a-c). Using TEM, we are also able to visualise the morphology of the thin nanoparticle films. The thin films are networks of attached nanoparticle clusters formed from multiple TiO2 primary particles rather than individual nanoparticle structures. This is in agreement with the expected morphology of commercial TiO2 P-25 (?). The formation of such porous nanoparticle structures is favourable due to their enhanced surface area compared to dense films (?), thereby increasing catalytic activity and thus swimming speeds (?). Utilizing nitrocatechol chelation chemistry extends the applicability of our polymer-based nanoparticle attachment to a range of metal oxides, and could therefore be exploited to obtain composite thin films of functional nanoparticles on microparticle supports. To this end, and to demonstrate the generality of our method, we also attach different phases of TiO2 (amorphous, anatase, and rutile), Fe2O3, and SrTiO3 using the same protocols developed for TiO2 P-25 (Fig. 3). Fe2O3 imparts both photocatalytic and magnetic properties, and could be combined with TiO2 P-25 for enhanced speeds (?) and controlled steering (?). SrTiO3 is a perovskite photocatalyst widely studied for its water-splitting properties (?), and therefore is promising as the basis for a fuel-free microswimmer. Toposelective nanoparticle attachment is thus a promising modular route to obtaining large quantities of microrobots with a range of functionalities that can be tuned by selection of the starting materials. Figure 3: Symmetric and asymmetric functionalization of SiO2 microparticles with various commercial, pre-synthesized nanoparticles, highlighting the versatility of the proposed approach (scale bars 500 nm). ### Microrobots from micro- and nano-particles swimming in 3D To investigate the autonomous, photocatalytic motion of our TiO2 P-25 microrobots, we perform single-particle tracking studies with bright-field microscopy, using in-house particle-tracking scripts (Fig. S8), under different illumination conditions and H2O2 concentrations. TiO2 is known to degrade H2O2 under UV light, and the Janus distribution of TiO2 P-25 nanoparticles on the SiO2 core’s surface thus leads to the formation of asymmetric gradients around the microswimmers. These in turn develop flow fields which result in self-diffusiophoresis of the particles (?) (Figs. 4a,b). We first confirmed the photo-responsive behavior of the microrobots by alternating off-on UV illumination cycles and found that the UV illumination is a necessary pre-condition for motion (Figs. 4c,d), with no evidence of memory or photo-charging effects (?). We then evaluated the instantaneous velocities of the microrobots under different illumination strengths and wavelengths (Fig. S8). The trajectories of microswimmers are typically described with a 2D active Brownian motion model (?), where a constant propulsion velocity is randomized in 2D by rotational diffusion. More recently, there has also been a focus on fabricating and studying microswimmers with unbounded 3D active motion (?). However, our microrobots demonstrate more complex behavior, which does not follow the 2D and 3D active Brownian motion equations (?). Specifically, their motion is mostly confined to the 2D plane, with interdispersed short and rapid periods of out-of-plane motion (Figs. 4e,h). The predominantly 2D motion may be explained by hydrodynamic interactions with the glass substrate, which favor in-plane motion (?). Competing effects from out-of-plane rotational diffusion and angular velocity arising from a non-uniform nanoparticle coating and wall-induced flows (?) could cause the observed random out-of-plane ballistic segments. To characterise this 3D motion, we first confirm that in the absence of chemical fuel the particles are able to rotate in 3D (Video S2) and measure their rotational diffusion in solvents of varying viscosity in line with theory (Table S1) (?). We then measure their 3D active trajectories via a simple approach making use of the changing diffraction patterns of the particles as they swim in and out of the focal plane (see Supplementary Text for details). Figure 4: Overview of particle motion under UV illumination in fuel-rich media. a) Schematic of particle motion. Under the decomposition of hydrogen peroxide, the microrobots swim with the functionalized cap forwards. b) Wide- field image with superimposed trajectories (shown for 3 s) under UV illumination (scale bar 20 $\mu$m). c) Distribution of instantaneous velocities during off (black) and on (violet) cycles. d) Mean instantaneous velocities of particles during alternating off-on cycles of UV illumination. e) Example of a microrobot trajectory in 3D, with the magnitude of the velocity vector color-coded to illustrate the occurrence of an orientation- dependent velocity. f) Plot of particle velocity vs. out-of-plane orientation angle. Particles swim faster out of plane, and the fastest motion is observed when the particle swims towards the glass substrate from above ($\phi=-90^{\circ}$). g) Distribution of out-of-plane orientation angles ($\phi$) across all particle trajectories. h) Distribution of displacements for all particles in x, y, and z. The distributions in x and y (in-plane) are Gaussian and similar, while the distribution of z displacements shows pronounced tails. Error bars correspond to 95% confidence intervals, which were obtained with bootstrapping. From the analysis of individual 3D trajectories, like the one reported in Fig. 4e, we measure median instantaneous velocities ranging from 2-13 $\mu$ms-1 on a per particle basis, and note that the particles swim cap first (Fig. 4a, Video S1). Under the conditions found to maximize swimming speeds (3v% H2O2, 340 nm, 9.4 mWmm-2), we find a median instantaneous velocity of approximately 6.5 $\mu$ms-1 on a per particle basis (Fig. S8). Lowering the fuel concentration leads to lower swimming speeds (?), and we also note a difference in swimming speed depending on the wavelength of illumination used. By plotting the instantaneous velocities as a function of particle orientation, we observe a significant asymmetry in the particle motion (Figs. 4f-h). In particular, the microrobots exhibit orientation-dependent velocities, displaying faster motion as their orientation is increasingly directed out of plane. The effect persists over multiple frames, indicating that it is not a tracking artifact. Moreover, contrary to expectations where shadowing dictates particle motion (?), the observed faster segments are not uni-directional. Furthermore, the previously discussed on-off photo- responsiveness of the particles excludes a memory or charging effect (?), which might have explained the bi-directional fast swimming segments (Figs. 4c,d). Based on the fact that the transmission of 340 nm wavelength light through 2 $\mu$m fused SiO2 is on the order of 90% (even after accounting for Fresnel losses), we hypothesise that the SiO2 core does not block the UV light. This implies that even when the catalytic cap is completely ”shadowed”, upwards swimming is observed, and we attribute the fastest motion towards the substrate (cap down) to the direct illumination of the catalytic cap and the concurrent effect of gravity. The slower in-plane motion could be caused by the orientation of the propulsion direction, and the near-wall hydrodynamic interactions which increase drag forces (?). Although statistics for 2D active Brownian trajectories with orientation-dependent velocities have been reported (?), their extension to the the 3D case reported here presents potential for future theoretical developments. ## Discussion We have demonstrated a modular approach to fabricate large (100 mg) quantities of photo-responsive microrobots from the asymmetric attachment of commercial nanoparticles. Our method for toposelective nanoparticle attachment provides a versatile material platform which can be extended to various functional nanoparticles. We envision that it will offer an off-the-shelf modular approach to obtain large quantities of Janus particles with mixed composite films for a range of applications. The described protocol does not require specialised equipment beyond that found in typical synthesis laboratories, lending itself to wide-spread application. Moreover, the motion of our photo-responsive microrobots highlights several avenues for further research. Analysis of the observed 3D swimming behaviour requires a new theoretical framework not currently found in the literature. We also note that the TiO2 P-25 microrobots self-propel more slowly at higher illumination wavelengths, which we attribute to TiO2’s large energy band gap. This demonstrates the opportunities to exploit the wealth of catalysis literature (?) to inform the design of microrobots with desirable attributes (e.g. with faster swimming speeds or visible light activation) by appropriate selection of nanocatalytic materials. Finally, the ballistic out-of-plane motion of our photocatalytic microrobots suggests a photoreactor design where the competition between gravity and activity is exploited. Realizing motion control in 3D, for example by dynamic light patterning (?), could induce complex flows, which in turn can enhance overall reactor efficiencies in traditionally difficult-to-mix settings. Such control would not only be favorable for mixing in microfluidic channels (?), which have similar dimensions to the observed Z displacements of the microswimmers, but also in flat-panel reactors where mass transfer is a key limiting factor (?). Increased reaction rates arising from microswimmer motion have been previously demonstrated (?), but applicability has been limited by materials and scalability. By targeting societally relevant reactions, such as water splitting, we hypothesise that scalable microrobots could be exploited in a novel photoreactor concept where the particles possess a dual catalyst- stirrer functionality. Therefore, incorporating aspects of chemical reaction engineering and soft matter physics could help overcome the four-phase mass- transfer limitations inherent to current photocatalytic systems. ## Materials and Methods ### Nitrodopamine Synthesis Nitrodopamine was synthesized following well-established protocols (?). Briefly, dopamine(5g, 32.6 mmol) and sodium nitrite (6.3g, 91.3 mmol) were dissolved in 150 mL water and cooled to $0^{\circ}$ C under stirring in an ice bath. 25mL sulfuric acid (20v/v%) was added dropwise and left stirring at r.T. overnight. The product mixture was cooled once more to $0^{\circ}$ C, filtered, and washed with copious amounts of double-distilled water at $0^{\circ}$ C and then ethanol at $0^{\circ}$ C. The resulting nitrodopamine hydrogen sulfate was then dried under high vacuum overnight. ### poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine) synthesis Synthesis of the pentafluorophenyl acrylate monomer and its polymerization were performed following previously published protocols (?). Briefly, pentafluorophenol (87.21 g, 0.47 mol) was dissolved in 150 mL of dichloromethane (DCM) at $0^{\circ}$ C and 2,6-dimethylpyridine (60.55 mL, 0.52 mol) was added slowly through a dropping funnel, which was afterwards rinsed with another 150 mL of DCM. This second portion was added to the reaction mixture. Acryloyl chloride (42.14 mL, 0.52 mol) was then added dropwise to the reactor, still under cooling, and left to react overnight under N2 atmosphere at room temperature. The resulting 2,6-dimethylpyridine hydrochloride salt was removed by filtration and the residual solution was washed three times with 100 mL of water, dried with magnesium sulfate and the solvent evaporated under reduced pressure. The product monomer was purified by distillation (in two portions) under reduced pressure (10 mbar) to give a colorless liquid (97.09 g, 78%). The monomer pentafluorophenyl acrylate (14.31 g, 60.13 mmol), the initiator AIBN (23.83 mg, 0.15 mmol) and the chain- transfer agent 2-(dodecylthiocarbonothioylthio)-2-methylpropionic acid (158.45 mg, 0.43 mmol) were dissolved in 15 mL of toluene inside a Schlenk tube. The solution was degassed via three freeze-pump-thaw cycles and left to react under a nitrogen atmosphere at $80^{\circ}$C in an oil bath for 18h. After the RAFT polymerization was completed, the mixture was left to cool to room temperature and the resulting polymer (pPFPAC) isolated by precipitation in methanol and dried under vacuum for 48h (12.90 g, 90%). Likewise, the post-modification steps were carried out as outlined in the work by Serrano et al., with the exception that the (poly)pentafluoroacetate (pPFPAC) backbone was not first PEGylated, and instead is only post-modified with the binding side groups (N-boc-hexanediamine, 3-aminopropyldimethylethoxysilane, nitrodopamine). Briefly, N-boc- hexanediamine (227 mg, 1.05 mmol) was dissolved in 6.4 mL dimethylformamide (DMF) with an excess of triethylamine (318 mg, 3.15 mmol). The mixture was added drop-wise to pPFPAC (500 mg, 2.1 mmol) dissolved in 5.07 mL DMF and left stirring overnight at $50^{\circ}$ C. A new solution containing 84.5 mg (0.525 mmol) of 3-aminopropyldimethylethoxysilane and triethylamine (160 mg, 1.58 mmol) was dissolved in 7.4 mL of DMF and added drop-wise to the previous solution, still at $50^{\circ}$ C and under stirring overnight. An excess of nitrodopamine was dissolved separately (154.4 mg, 0.525 mmol) in 7.4 mL of DMF with 160 mg of triethylamine (1.58 mmol). The latter solution was added slowly to the polymer solution and left stirring overnight at $50^{\circ}$ C. DMF was evaporated under reduced pressure, the mixture re-dissolved in DCM (40 mL, 4 equivalents) and trifluoroacetic acid (TFA, 10 mL, 1 equivalent) and left to react under stirring overnight. The resulting mixture was again evaporated under reduced pressure and re-dissolved in twice-distilled water (80 mL). This solution was purified by dialysis against water for two days using a membrane with a MWCO of 3,500 Da and subsequently freeze-dried to obtain the yellow- brown poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine). ### Polymer-assisted nanoparticle attachment onto microspheres Polymer solutions were prepared by dispersing the dry poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine) in $50^{\circ}$ C water overnight under magnetic stirring. The maximum polymer concentration is limited by the solubility of the polymer (approximately 60 mg/L). 1 w/v% SiO2 microparticles suspensions were first added to a bubbling $70^{\circ}$ C H2O2/NH4OH solution (1:1:1 volumetric ratio) under magnetic stirring for 10 minutes to activate the SiO2 surface with reactive hydroxyl groups. The cleaned particles were then added dropwise under magnetic stirring to the prepared polymer solutions and left stirring overnight (final SiO2 concentration 0.1 w/v%). The polymer-SiO2 particles were then washed by centrifugation to remove excess polymer and redispersed in phosphate-buffered saline (PBS pH 7.0). Nanoparticle suspensions of varying concentrations ((PBS pH 7.0 media) were then added dropwise to the polymer- SiO2 suspensions under magnetic stirring and left mixing overnight (final SiO2 concentration 0.1 w/v%). Finally, the nanoparticle functionalized SiO2 microparticles were washed extensively with alternating sonication and centrifugation steps to remove any excess nanoparticles not bound to the SiO2 microparticles. ### Microrobot Fabrication Wax-SiO2 Pickering Emulsions were prepared by adapting the methodology used by Perro et al (?). Suspensions containing 5w/v% SiO2 particles, 10.8 mg/L didodecyldimethylammonium bromide (DDAB) (?), and a 1:10 molten wax: water volumetric ratio were heated to $75^{\circ}$ C, then stirred for 15 minutes at 3000 RPM before vigorous mixing at 13500 RPM for 160s using an IKA T-25 Digital Ultraturrax (?). After the emulsification step, the Pickering emulsion was immediately placed in an ice bath to rapidly solidify the colloidosomes. The emulsion was then washed in a 0.1M NaCl solution to remove surfactants, before further washing in deionised water. The SiO2-Wax colloidosomes were dispersed overnight by gentle agitation in an aqueous solution of a post- modified (poly)pentafluoroacetate (pPFPAC) polymer. The pPFPAC-colloidosomes were then washed thoroughly in deionized water before redispersion in a phosphate-buffered saline (PBS) pH 7.0 suspension containing the functional metal-oxide nanoparticles. After gentle mixing overnight, the nanoparticle functionalized colloidosomes were collected by filtration and the wax is finally removed with chloroform. ### Light-controlled motion experiments Stock H2O2 (30 v/v%, manufacturer) was added to dilute particle suspensions of the microrobots to obtain 300 uL of the desired H2O2 concentrations. 280 uL thereof was then pipetted into a flow-through cell (cell 137-QS; Hellma Analytics) with a light path length of 1 mm. Particles were imaged on an inverted microscope under Köhler illumination using a 40x objective (CFI S Plan Fluor ELWD 40XC) with adjustable collar (set to 1 mm), and videos were taken at 10 fps on a Hamamatsu C14440-20UP digital camera. UV illumination of the particles (340/380 nm) was achieved using a Lumencor SPECTRA X light engine as the excitation source through the objective. ### Particle Tracking Videos were first pre-processed with Fiji (ImageJ) for conversion to 8-bit and cropped to obtain one particle per field of view. Particles centres were tracked using a custom script combining the MATLAB implementation of the Crocker and Grier IDL particle tracking method (?), and the radial symmetry approach outlined by Parthasarathy (?). The first invariant moment (inertia) of masks around the particle centres was determined using a MATLAB implementation of Hu’s 7 invariant moments formulation (?). Inertia look-up- tables (LUTs) were first obtained for stationary and diffusive particles. The evolution of inertia with Z was then inverted, before fitting of a cubic polynomial using an inbuilt MATLAB non-linear regression function (nlinfit). From this cubic functional form, the Z values of active particles could be determined with prediction intervals from inertia of their masks (see Supplementary Text for more details). ## References * 1. M. N. Popescu, Langmuir 36, 6861 (2020). * 2. K. Yuan, M. Pacheco, B. Jurado-Sánchez, A. Escarpa, Advanced Intelligent Systems p. 2100002 (2021). * 3. P. Díez, et al., ACS Nano 15, 4467 (2021). * 4. L. Wang, A. Kaeppler, D. Fischer, J. Simmchen, ACS Applied Materials and Interfaces 11, 32937 (2019). * 5. V. V. Singh, F. Soto, K. Kaufmann, J. Wang, Angewandte Chemie - International Edition 54, 6896 (2015). * 6. W. Wang, X. Lv, J. L. Moran, S. Duan, C. Zhou, Soft Matter 16, 3846 (2020). * 7. X. Hu, et al., Science advances 7, 1 (2021). * 8. A. Maia Chagas, PLoS biology 16, e3000014 (2018). * 9. J. Zhang, et al., ACS Applied Materials and Interfaces 11, 16639 (2019). * 10. A. B. Pawar, I. Kretzschmar, Langmuir 25, 9057 (2009). * 11. R. J. Archer, A. I. Campbell, S. J. Ebbens, Soft Matter 11, 6872 (2015). * 12. R. J. Archer, A. J. Parnell, A. I. Campbell, J. R. Howse, S. J. Ebbens, Advanced Science 5, 1 (2018). * 13. Â. Serrano, S. Zürcher, S. Tosatti, N. D. Spencer, Macromolecular Rapid Communications pp. 622–629 (2016). * 14. D. Astruc, F. Lu, J. R. Aranzaes, Angewandte Chemie - International Edition 44, 7852 (2005). * 15. P. W. N. M. V. Leeuwen, C. Claver, N. Turner, eds., Recent Advances in Nanoparticle Catalysis (Springer, Cham, 2020). * 16. W. E. Uspal, Journal of Chemical Physics 150 (2019). * 17. H. Gulley-Stahl, et al., Environmental Science and Technology 44, 6519 (2010). * 18. Z. Xu, Scientific Reports 3, 7 (2013). * 19. S. Cooper, J. Tulane, Ind. Eng. Chem. Anal. Ed. 8, 210 (1936). * 20. L. Hong, S. Jiang, S. Granick, Langmuir 22, 9495 (2006). * 21. A. Perro, F. Meunier, V. Schmitt, S. Ravaine, Colloids and Surfaces A: Physicochemical and Engineering Aspects 332, 57 (2009). * 22. S. Kord Daroun Kalai, Synthesis of silica Janus nanoparticles with metal semishells (2019). * 23. K. Lebdioua, A. Aimable, M. Cerbelaud, A. Videcoq, C. Peyratout, Journal of Colloid and Interface Science 520, 127 (2018). * 24. Z. Lin, J. L. Thiffeault, S. Childress, Journal of Fluid Mechanics 669, 167 (2011). * 25. M. A. Fernandez-Rodriguez, et al., Nature Communications 11, 1 (2020). * 26. T. Ohno, K. Sarukawa, K. Tokieda, M. Matsumura, Journal of Catalysis 203, 82 (2001). * 27. M. Gao, L. Zhu, W. L. Ong, J. Wang, G. W. Ho, Catalysis Science and Technology 5, 4703 (2015). * 28. U. Choudhury, L. Soler, J. G. Gibbs, S. Sanchez, P. Fischer, Chemical Communications 51, 8660 (2015). * 29. T. Maric, M. Z. M. Nasir, R. D. Webster, M. Pumera, Advanced Functional Materials 1908614, 1 (2020). * 30. V. Sridhar, B. W. Park, S. Guo, P. A. Van Aken, M. Sitti, ACS Applied Materials and Interfaces 12, 24149 (2020). * 31. Y. Goto, et al., Joule 2, 509 (2018). * 32. J. Anderson, Annual Review of Fluid Mechanics 21, 61 (1989). * 33. V. Sridhar, et al., Proceedings of the National Academy of Sciences of the United States of America 117, 24748 (2020). * 34. K. Dietrich, et al., New Journal of Physics 19 (2017). * 35. O. Yasa, P. Erkoc, Y. Alapan, M. Sitti, Advanced Materials 30, 1 (2018). * 36. H. Löwen, Journal of Chemical Physics 152 (2020). * 37. W. E. Uspal, M. N. Popescu, S. Dietrich, M. Tasinkevych, Soft Matter 11, 434 (2015). * 38. F. Rühle, J. Blaschke, J. T. Kuhr, H. Stark, New Journal of Physics 20 (2018). * 39. S. M. Anthony, L. Hong, M. Kim, S. Granick, Langmuir 22, 9812 (2006). * 40. J. R. Howse, et al., Physical Review Letters 99, 8 (2007). * 41. D. P. Singh, W. E. Uspal, M. N. Popescu, L. G. Wilson, P. Fischer, Advanced Functional Materials 28, 1706660 (2018). * 42. A. J. Goldman, R. G. Cox, H. Brenner, Chemical Engineering Science 22, 637 (1967). * 43. A. R. Sprenger, et al., Langmuir 36, 7066 (2020). * 44. V. Etacheri, C. Di Valentin, J. Schneider, D. Bahnemann, S. C. Pillai, Journal of Photochemistry and Photobiology C: Photochemistry Reviews 25, 1 (2015). * 45. J. Arrieta, M. Polin, R. Saleta-Piersanti, I. Tuval, Physical Review Letters 123, 158101 (2019). * 46. K. Ward, Z. H. Fan, Journal of Micromechanics and Microengineering 25 (2015). * 47. K. Takanabe, ACS Catalysis 7, 8006 (2017). * 48. J. Orozco, et al., Angewandte Chemie - International Edition 52, 13276 (2013). * 49. A. Napolitano, M. D’Ischia, C. Costantini, G. Prota, Tetrahedron 48, 8515 (1992). * 50. Z. Chu, et al., Colloids and Surfaces A: Physicochemical and Engineering Aspects 603, 125183 (2020). * 51. J. C. Crocker, D. G. Grier, Journal of Colloid and Interface Science 179, 298 (1996). * 52. R. Parthasarathy, Nature Methods 9, 724 (2012). * 53. M.-K. Hu, IRE Transactions On Information Theory 8, 179 (1962). * 54. MATLABacademy, MATLAB Central File Exchange (2009). * 55. D. T. Kovari, D. Dunlap, E. R. Weeks, L. Finzi, Optics Express 27, 29875 (2019). * 56. M. Speidel, A. Jonáš, E.-L. Florin, Optics Letters 28, 69 (2003). ## Acknowledgments The authors thank Dr. T Gmür and Dr. K Zhang for their assistance with polymer synthesis and characterisation. They are also grateful to Dr. S.S Lee for his assistance with the UV microscopy set up used for the particle tracking experiments, to Dr. P Zeng for the images taken with SEM and TEM, to V Niggel for the discussions on image analysis and lab safety, and to Dr. B Hattendorf for the ICP-OES measurements. M.R Bailey would additionally like to thank Dr. G.A Filonenko for his various insights pertaining to the synthesis. We acknowledge the Scientific Center for Optical and Electron Microscopy (ScopeM) of ETH Zurich for access to their instrumentation and expertise. Fabio Grillo acknowledges financial support from the Swiss National Science Foundation, grant number 190735. ### Author Contribution Statement Author contributions are defined based on the CRediT (Contributor Roles Taxonomy). Conceptualization: M.R.B., F.G., L.I. Formal Analysis: M.R.B., F.G. Funding acquisition: F.G., L.I. Investigation: M.R.B. Methodology: M.R.B., F.G., L.I., N.S. Software: M.R.B., F.G. Supervision: F.G., L.I. Validation: M.R.B., F.G. Visualization: M.R.B., F.G., L.I. Writing - original draft: M.R.B., F.G., L.I. Writing - review and editing: M.R.B., F.G., L.I., N.S. ## Supplementary materials * Text S1: Preparation of SiO2-wax colloidosomes * Text S2: Polymer characterisation * Text S3: 3D tracking with invariant moments * Text S4: Polymer stability * Text S5: 3D rotation of microrobots * Text S6: Motion under different experimental conditions * Fig. S1: Colloidosomes from different particle sizes * Fig. S2: Size distribution of colloidosomes * Fig. S3: Colloidosome density * Fig. S4: 1HNMR spectrum * Fig. S5: ATR-IR spectra * Fig. S6: LUT of Inertia(Z) * Fig. S7: Microrobot stability under highly oxidizing conditions * Fig. S8: Box-plots of instantaneous velocity under different conditions * Table S1: Conditions to obtain colloidosomes * Table S2: 3D rotational diffusion of microrobots ## Supplementary Text ### Text S1: Preparation of SiO2-wax colloidosomes SiO2-wax colloidosomes were prepared by adapting the protocol proposed by Perro et al. as described in the main manuscript (?). In contrast to the methodology presented in (?), here the particles are dispersed in the water phase with surfactants, before vigorous stirring by means of an Ultra-Turrax, to obtain the Pickering wax-in-water emulsion. We find that a 5 w/v% SiO2 in water concentration provides the best results when preparing the emulsions (5 mL). For the 2.12 $\mu$m SiO2 particles that are the focus of this work, a volumetric wax:water ratio of 1:10 was used. Surfactant concentrations were selected such that an approximate monolayer coverage of the SiO2 particles is achieved (?). The flexibility of the approach is demonstrated by producing emulsions with various particle sizes (Table S1, Fig. S1), suggesting an adaptable approach to obtain microrobots with different physical properties. We note here the importance of the overall colloidosome density. To ensure effective dispersion of the colloidosomes during functionalization, their density should be greater than that of water. However, paraffin wax has a density of 900 kgm-3, and so colloidosome size can affect dispersibility. As a rough estimation, we find that for 2 $\mu$m particles that fully cover the wax droplet’s surface, a maximum colloidosome size of approximately 100 $\mu$m ensures that the colloidosomes are denser than water (Fig. S3). The various washing procedures, which depend on sedimentation, ensure that larger colloidosomes are removed from the product before further functionalization steps. ### Text S2: Polymer characterisation The D2O 1HNMR spectrum of the post-modified poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine) (Fig. S4) is largely in agreement with literature (?). Chemical shifts of 0.9 to -0.1 and 1.7 to 1.2 ppm, attributed to the presence of 3-aminopropyl-dimethyloxysilane and 1,6-hexanediamine respectively, are observed. Likewise, the peak positions at 3.5 to 2.8 ppm correspond to the polymer backbone. However, we are not able to identify the nitro-dopamine group from the NMR spectrum, although we note that in the work by Serrano et al. the reported signal is also very weak. To further investigate the functional groups present on the post-modified polymer backbone, ATR-IR measurements were also taken (Fig. S5). The unmodified pPFPAC backbone displays two strong peaks at 990 cm-1 and 1520 cm-1, arising from the pentafluorophenyl groups (C-F stretch and C-C aromatic stretch, respectively (?)). We note that after post-modification, the C-F stretch disappears, while a new set of peaks at 1500-1550 cm-1 emerge. Looking at the spectrum for the synthesized nitrodopamine, we identify the same structure and attribute these multiple peaks to the combined contribution of the aromatic C-C in-ring stretch and NO stretch of nitrodopamine. We also identify; i) peaks which we attribute to 1,6-hexanediamine (3000-2850 cm-1, C-H stretch), ii) multiple peaks in the fingerprint regime characteristic of silanes, and iii) a strong merged peak around 1625 cm-1 which is likely a combination of the signal from the C=O stretch and in-plane N-H bend of the secondary amides formed when coupling the functional groups to the polymer. ### Text S3: 3D tracking with invariant moments To characterise the 3D swimming behaviour of the microrobots, we developed a simple image-invariant-based approach to determine the displacements in Z. We exploit the changing diffraction pattern of particles imaged under bright- field Köhler illumination as they move in and out of the focal plane. We quantify this change in the image properties by taking the inertia (first moment) of image masks centred at the particle. By studying trajectories in the Z region where the inertia changes monotonically, we are therefore able to track motion in 3D. We first create a look-up-table (LUT) of inertia values by obtaining Z-stacks of stationary particles with 0.2 $\mu$m increments (Fig. S6). A circular mask around the particle center is taken for each Z-stack image, from which the first invariant image moment (inertia) is calculated (?), (?). By performing this operation for each Z slice, a series of inertia(Z) calibration curves are obtained. These curves are then averaged, and the monotonic domain is inverted to obtain Z(inertia), to which a cubic polynomial is fitted using an in-built MATLAB function (nlinfit). This cubic polynomial is then used to determine the Z-position of active swimming trajectories. Briefly, we set the focal plane above the particle centres so that as the particles swim upwards, they move into focus. This is done to maximise the monotonically increasing regime of the particle diffraction ring’s image inertia. We then image this plane under UV illumination with H2O2 fuel as for normal 2D particle tracking experiments. For each frame, the image moment of the particle is computed as previously described for the Z-stacks. From the previously fitted cubic polynomial, a prediction for the microswimmer out-of-plane position is thus obtained from Z(inertia) with an average prediction error of approximately +/- 0.5 $\mu$m. The described methodology carries a distinct advantage over more conventional confocal approaches, in that a much higher FPS is achievable since only one Z plane is imaged with wide-field microscopy (?). Such methods also require computationally expensive point spread functions (PSFs) for accurate center finding (?). They are therefore well suited for tracking fluorescent passive particles in suspensions, but less well adapted for tracking photo-responsive asymmetric active colloids in bright-field. To capture the diffraction rings of the particles consistently, accurate center finding is important for the image masks from which the first invariant moment is calculated.To enhance particle localization and efficiency, the MATLAB implementation of the Crocker and Grier algorithm (?) is used as a first approximation to identify the particles. Masks are then created around these particles, to which the Parthasarathy radial symmetry approach (?) is applied. By combining the two approaches, we find that center finding is improved with respect to the base cases, and works well when the particles are both in and out of focus. ### Text S4: Polymer stability We investigate the stability of nanoparticle attachment via the polyacrylamide by imaging the microrobots after a simulated particle tracking experiment. The microswimmers are illuminated with high power UV (365 nm, 27 mWmm-2) in a H2O2 rich (5v/v%) environment for 30 minutes. The conditions used exceed the experimental conditions used for the single particle tracking experiments, and provide a highly oxidative environment which would degrade many organics. We then collect the particles by centrifugation and image them with SEM. We find no change to the morphology of the TiO2 nanoparticle thin films (Fig. S7), indicating a stable attachment. ### Text S5: 3D rotation of microrobots By illuminating the particles with a mixture of bright-field and 440 nm wavelength light, we clearly observe 3D rotation of the passive microrobots (see Video S2). This contrasts with descriptions of purely 2D microswimmers possessing an orientation vector diffusing on the unit circle. The observation also indicates that bottom-heaviness likely plays a less significant role for our microrobots than in previous reports (?). We expect that our porous TiO2 nanoparticle films are less heavy than the 55 nm dense TiO2 films obtained by e-beam evaporation, resulting in less constrained rotation (?). We use the ”MOON” approach proposed by Anthony et al (?) to describe this rotation. The centres of the particles, and the centroids of the nanoparticle thin films are detected using in-house python scripts. The vector connecting these structural points defines a diffusing point on a sphere using a spherical coordinate system. The angle of variation between these points can thus be obtained, from which the mean squared angular displacement (MSAD) can be determined. We fit Perrin’s equation for small angular displacements at short timescales $<\omega\textsuperscript{2}>=4D\textsubscript{R}\Delta t$ to the MSAD to obtain DR. As in (?), it is necessary to include an intercept term at $\Delta t=0$ to obtain a fit of the slope (DR), which approximates the uncertainty in $\omega$. DR values thus obtained decay with viscosity as expected from theory, indicating a physical origin for the values (Table S2). We note occasional instabilities when finding the cap centroid which can lead to outlier values, however we stress that the video clearly demonstrates 3D rotation of the particles. ### Text S6: Motion under different experimental conditions The instantaneous velocities of the P-25 microrobots were evaluated under different experimental conditions (Fig. S8). The concentration of fuel (H2O2), illumination intensity (mW mm-2), and the wavelength of illumination were varied for dilute suspensions of the microswimmers. We find that decreasing the 340 nm UV illumination intensity from 9.7 mWmm-2 to 4.9 mWmm-2 has little effect on the speeds of the microswimmers, indicating that already at 4.9 mWmm-2 the illumination is almost saturating. A decrease in the instantaneous velocities is observed upon reducing the H2O2 concentration by 4x, in line with previous reports on the relationship between fuel concentration and microswimmer speeds (?). We note that the relative decrease in the instantaneous velocities is small compared to the reduction in H2O2, indicating that low fuel concentrations are viable for motion experiments. The most evident decrease in microrobot speeds is observed when increasing the wavelength of UV illumination from 340 nm to 380 nm (decreasing the incident photon energy). The band gap of TiO2 lies between 360 and 380 nm, which likely explains the more significant reduction in instantaneous velocity observed. For the analysis of photo-responsive behavior and orientation-dependent velocities, we use the experimental conditions providing the highest median velocity (340 nm illumination, 9.4 mWmm-2, 3v% H2O2 concentration). ## Supplementary Figures Fig. S 1: Colloidosomes obtained with: a. 0.55 $\mu$m particles b. 1.2 $\mu$m particles c. 2.12 $\mu$m particles d. 4.16 $\mu$m particles Fig. S 2: a. Colloidosomes obtained from 2.1 $\mu$m particles b. Size distribution of pictured colloidosomes; from a sample size of 325, we observe a Gaussian distribution centred at 33.42 $\mu$m with a standard deviation of 4.82 $\mu$m Fig. S 3: a. Colloidosome (from 2 $\mu$m SiO2 particles) density as a function of its size. b. Density of a 50 $\mu$m colloidosome with increasing stabilizing SiO2 particle size. The red dashed line marks the density of water, and the green dashed line marks the intersection of colloidosome density and water Fig. S 4: D2O 1HNMR spectrum of post-modified poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine) Fig. S 5: ATR-IR spectra of a. Unmodified pPFPAC backbone b. Nitrodopamine c. Post-modified poly(acrylamide)-g-(1,6-hexanediamine, 3-aminopropyl-dimethyloxysilane, nitrodopamine) Fig. S 6: LUT produced of Inertia(Z) from Z-stacks of immobilised particles. The monotonic region of interest is studied. The LUT is inverted to obtain Z(Inertia), to which a cubic polynomial is fit by nonlinear regression. Left: Images of particles taken at different Z heights. Right: Inertia(Z) LUT averaged from 5 Z-stacks, with the particles on the left indicated. Scale bars represent 2$\mu$m Fig. S 7: a-c: Microrobots after exposure to highly oxidative conditions (long UV exposure in an H2O2-rich solution). The morphology of the nanoparticle thin films remains unchanged. Fig. S 8: Box-plots of instantaneous velocities (evaluated over 0.2s) obtained under different conditions as follows: A) 340nm 9.4mW/mm2, H2O2 3v% B) 340nm 4.9mW/mm2, H2O2 3v% C) 340nm 9.4mW/mm2, H2O2 0.75v% D) 380nm 61.7mW/mm2, H2O2 3v% ## Supplementary Tables Table S 1: Conditions used to obtain colloidosomes with particles of different sizes Table S 2: Rotational diffusion for single particles in different viscosity solutions found following the method proposed by Anthony et al (?). The theoretical values expected from the Stokes-Einstein relationship ($D\textsubscript{R}=k\textsubscript{B}T/8\pi\eta R\textsuperscript{3})$ are also shown as reference.
arxiv-papers
2021-07-27T09:11:14
2024-09-04T03:07:21.040487
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Maximilian R. Bailey, Fabio Grillo, Nicholas D. Spencer, and Lucio Isa", "submitter": "Maximilian Bailey", "url": "https://arxiv.org/abs/2107.12684" }
2107.12687
# Relaxation of functionals with linear growth: interactions of emerging measures and free discontinuities Stefan Krömer Czech Academy of Sciences, Institute of Information Theory and Automation, Pod vodárenskou věží 4, CZ-182 08 Prague 8, Czechia [email protected] , Martin Kružík Czech Academy of Sciences, Institute of Information Theory and Automation, Pod vodárenskou věží 4, CZ-182 08 Prague 8, Czechia and Faculty of Civil Engineering, Czech Technical University, Thákurova 7, CZ–166 29 Prague 6, Czechia [email protected] and Elvira Zappale Dipartimento di Scienze di Base ed Applicate per l’Ingegneria, Sapienza - Università di Roma, Via Antonio Scarpa, 16 00161, Roma, RM Italy [email protected] ###### Abstract. For an integral functional defined on functions $(u,v)\in W^{1,1}\times L^{1}$ featuring a prototypical strong interaction term between $u$ and $v$, we calculate its relaxation in the space of functions with bounded variations and Radon measures. Interplay between measures and discontinuities bring various additional difficulties, and concentration effects in recovery sequences play a major role for the relaxed functional even if the limit measures are absolutely continuous with respect to the Lebesgue one. MSC (2010): 49J45, 28A33 Keywords: Lower semicontinuity, nonreflexive spaces, relaxation, concentration effects Date: ## 1\. Introduction Oscillations and/or concentrations appear naturally in many problems in the calculus of variations, partial differential equations, and optimal control theory due to the lack of convexity properties and/or compactness. Concentrations usually do not play such a prominent role in minimization problems for integral functionals with superlinear growth because of various decomposition lemmas (see e.g [25]) allowing us to show that the integrand is equiintegrable along minimizing sequences. However, concentrations are a key issue in problems with only linear coercivity. This phenomenon is intimately connected with nonreflexivity of underlying spaces $L^{1}$ and $W^{k,1}$ where such problems are usually formulated. Minimization problems for a functional $F:W^{1,p}({\Omega};\mathbb{R}^{m})\times L^{q}({\Omega};{\mathbb{R}}^{d})$, where ${\Omega}\subset{\mathbb{R}}^{n}$ is a bounded Lipschitz domain, were considered e.g. in [20] with $p=1$, $q=+\infty$, in [14, 15] with $p=1$, $q\in(1,\infty]$) and in [21] with $p,q>1$ for functionals modeling energy of multiphase materials. There, $\displaystyle F(u,v):=\int_{\Omega}\psi(\nabla u(x),v(x))\,{\rm d}x\ ,$ with $\psi$ a material stored energy density, $u$ an elastic deformation, and $v$ denoting a chemical composition. Other examples include, e.g., magnetoelasticity [17, 21] where $u$ is again a deformation mapping and $v$ is a magnetization vector, models of particle inclusions in elastic matrices [12], or elastoplasticity, where $v$ plays a role of the plastic strain. In this article, we focus on $p=q=1$ and study a simplified model problem for the general case (1.1) $\displaystyle F(u,v):=\int_{\Omega}\psi(x,u(x),\nabla u(x),v(x))\,{\rm d}x\ ,$ whose main feature is a ”strong” interaction terms between $u$ and $v$ of the form $f_{1}(u)f_{2}(v)$ where $f_{2}$ has positive linear growth. The linear growth $p=q=1$ combines oscillation effects that can be caused by nonconvexity of the energy density in $\nabla u$ and $v$ with possible concentrations of minimizing sequences related to the lack of weak compactness of $W^{1,1}({\Omega};{\mathbb{R}}^{m})\times L^{1}({\Omega};{\mathbb{R}}^{d})$. The latter inevitably calls for an extension of our minimization problem to a large space possessing better compactness properties. A natural choice is the space of functions of bounded variations $BV({\Omega};{\mathbb{R}}^{m})$ for the variable $u$ and the Radon measures on $\bar{\Omega}$, $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, for $v$. Correspondingly, $F$ must be extended to $BV({\Omega};{\mathbb{R}}^{m})\times\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, which we perform by calculating an explicit representation of $\overline{\mathcal{F}}:=\Gamma-\liminf F$ with respect to weak∗-topology in $BV\times L^{1}$, cf. [18]. This extension procedure is called relaxation and provides us with a weak∗-lower semicontinuous functional. Relaxation results for $\psi$ quasiconvex and independent of $v$ and $u$ were first proven by Ambrosio and Dal Maso in [4] and then extended by Fonseca and Müller to the case $\psi=\psi(x,u,\nabla u)$ and $\psi(x,u,\cdot)$ quasiconvex in [23, 24]. A new proof under weaker assumptions was recently given by Rindler and Shaw in [32]. If the variable $v$ is included in $\psi$ and we consider $F$ from (1.1) then we refer to [30, 31] for relaxation results if $p=1$ and $q\geq 1$. However, this result uses the $L^{1}$-weak topology for approximation of $v$, thereby completely ruling out concentrations and avoiding general measures $v$ outside of $L^{1}$. In the context of dimension reduction, related results for the case without explicit dependence on $u$ can be found in [7]. Interesting phenomena are expected to occur if concentrations are combined with discontinuities, because discontinuous functions do not belong to the predual space of Radon measures. In particular, such phenomena naturally appear in impulse control. For instance, application of a drug may lead to an “instant” change of conditions of a patient, the ignition of the engine makes the space shuttle “suddenly” change its position. Besides, interactions of oscillations, concentrations and discontinuities lead to interesting questions and challenges for mathematical research; see e.g. [26, 27] for some recent results. For suitable examples, the relaxation results presented below allow us to observe the natural formation of all the three phenomena just described in minimizing sequences. In the following, $\Omega\subset\mathbb{R}^{n}$ is a bounded open set with Lipschitz boundary. For every $(u,v)\in W^{1,1}(\Omega;\mathbb{R}^{m})\times L^{1}(\Omega;\mathbb{R}^{d})$, we consider the functional (1.2) $F(u,v):=\int_{\Omega}f_{1}(u)f_{2}(v)dx+\int_{\Omega}W(\nabla u)dx,$ where $f_{1}:\mathbb{R}^{m}\to\mathbb{R}$, $f_{2}:\mathbb{R}^{d}\to\mathbb{R}$, and $W:\mathbb{R}^{m\times n}\to\mathbb{R}$ are continuous functions such that * $(H_{1})$ there exist $C_{2}>C_{1}>0$ such that for every $a\in\mathbb{R}^{m}$: $C_{1}\leq f_{1}(a)\leq C_{2}$ * $(H_{2})$ there exists $K>0$, such that for every $b\in\mathbb{R}^{d}$: $K^{-1}|b|\leq f_{2}(b)\leq K(1+|b|);$ * $(H_{3})$ there exists $\kappa>0$ such that for every $\xi\in\mathbb{R}^{m\times n}:$ $\kappa^{-1}|\xi|\leq W(\xi)\leq\kappa(1+|\xi|)\ .$ We aim at giving an integral representation of the sequentially lower semicontinuous envelope of $F$ with respect to the $BV\times\mathcal{M}$ weak* convergence, namely: (1.3) $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v):=\inf\left\\{\,\liminf_{k\to+\infty}F(u_{k},v_{k})\,\left|\,\begin{array}[]{l}(u_{k},v_{k})\in W^{1,1}(\Omega;\mathbb{R}^{m})\times L^{1}(\Omega;\mathbb{R}^{d}),\\\ (u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})\end{array}\right.\right\\}.\end{aligned}$ Making use of the Radon-Nikodým decomposition of a measure $\mu=\mu^{a}+\mu^{s}$ given in (2.5), we prove the following two main results. ###### Theorem 1.1 (Relaxation theorem – the case $n\geq 2$). Let $n\geq 2$ and $\Omega\subset{\mathbb{R}}^{n}$ be a bounded Lipschitz domain. Under the assumptions $(H_{1})$, $(H_{2})$ and $(H_{3})$, we have that (1.4) $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v)=&\int_{\Omega}\mathcal{Q}W(\nabla u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|\\\ &+\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|,\end{aligned}$ for every $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})$. Here, $\mathcal{Q}W$ denotes the quasiconvex envelope of $W$ (see Section 2 below), (1.5) $\displaystyle g(a,b):=\min\left\\{f_{1}(a)f_{2}^{\ast\ast}(b_{1})+f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}(b_{2})\,\left|\,b_{1},b_{2}\in{\mathbb{R}}^{d},~{}b_{1}+b_{2}=b\right.\right\\},$ $f_{2}^{\ast\ast}$ denotes the bipolar function of $f_{2}$, which, in view of $(H_{2})$, coincides with the greatest lower semicontinuous and convex function below $f_{2}$, the superscript “$\infty$” denotes the recession functions of the above mentioned envelopes, and (1.6) $\displaystyle f_{1}^{\rm min}:=\inf_{a\in\mathbb{R}^{m}}\\{f_{1}(a)\\}\geq C_{1}.$ For the one-dimensional case, yet another decomposition of measures is relevant, namely, $\mu=\mu^{0}+\mu^{\rm diff}$ decomposed into its atomic part $\mu^{0}$ and the ”diffuse” rest $\mu^{\rm diff}$, cf. (4.1). ###### Theorem 1.2 (Relaxation theorem – the case $n=1$). Let $\Omega=(\alpha,\beta)$ be a bounded open interval, $u\in BV(\Omega;{\mathbb{R}}^{m})$, $v\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, and suppose that $(H_{1})$, $(H_{2})$ and $(H_{3})$ hold. Then we have that (1.7) $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v)=&\int_{\Omega}\Big{(}f_{1}(u(x))df_{2}^{\ast\ast}\big{(}v^{\rm diff}\big{)}(x)+dW^{\ast\ast}\big{(}Du^{\rm diff}\big{)}(x)\Big{)}+\sum_{x\in S^{0}}f_{W}^{0}\big{(}u(x^{+}),u(x^{-}),v^{0}(\\{x\\})\big{)}\\\ &+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\big{(}u(\alpha^{+}),z,v^{0}(\\{\alpha\\})\big{)}+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\big{(}z,u(\beta^{-}),v^{0}(\\{\beta\\})\big{)}\end{aligned}$ Here, $f_{2}^{\ast\ast}$ and $W^{\ast\ast}$ are the convex hulls of $f_{2}$ and $W$, respectively, $S^{0}:=\\{x\in\Omega:|v|(\\{x\\})+|Du|(\\{x\\})\neq 0\\}$ is the (at most countable) set charged by atomic contributions in the interior of $\Omega$, and the associated density $f_{W}^{0}:{\mathbb{R}}^{m}\times{\mathbb{R}}^{m}\times{\mathbb{R}}^{d}\to{\mathbb{R}}$ is given by (1.12) $\displaystyle f_{W}^{0}(a^{+},a^{-},b):=\inf_{\begin{array}[]{ll}u\in W^{1,1}((-1,1);{\mathbb{R}}^{m}),\\\ v\in L^{1}((-1,1);{\mathbb{R}}^{d})\\\ u(-1)=a^{-},~{}~{}u(1)=a^{+},\\\ \int_{-1}^{1}vdx=b\end{array}}\left\\{\int_{-1}^{1}(f_{1}(u)(f_{2}^{\ast\ast})^{\infty}(v)+(W^{\ast\ast})^{\infty}(u^{\prime}))dx\right\\}.$ In addition, for the diffuse contributions we used the following abbreviations for nonlinear transformations of measures defined with the help of recession functions (cf. Subsection 2.4): $\displaystyle df_{2}^{\ast\ast}\big{(}v^{\rm diff}\big{)}(x)=f_{2}^{\ast\ast}\Big{(}\frac{dv^{{\rm diff},a}}{dx}(x)\Big{)}\,dx+(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv^{{\rm diff},s}}{d|v^{{\rm diff},s}|}(x)\Big{)}d|v^{{\rm diff},s}|(x)\quad\text{and}$ $\displaystyle dW^{\ast\ast}\big{(}Du^{\rm diff}\big{)}(x)=W^{\ast\ast}\big{(}u^{\prime}(x)\big{)}\,dx+(W^{\ast\ast})^{\infty}\Big{(}\frac{Du^{c}}{d|Du^{c}|}(x)\Big{)}d|Du^{c}|(x),$ where $v^{{\rm diff}}=v^{{\rm diff},a}+v^{{\rm diff},s}$ and $Du^{\rm diff}=Du^{{\rm diff},a}+Du^{{\rm diff},s}=\nabla u{\mathcal{L}}^{1}+Du^{c}$ are split into absolutely continuous and singular parts with respect to the Lebesgue measure ${\mathcal{L}}^{1}$. Notice that in case of $Du^{\rm diff}$, this can be expressed using the approximate gradient $u^{\prime}$ and the Cantor part $Du^{c}$ of $Du$. Moreover, $u(\alpha^{+})$ and $u(\beta^{-})$ denote the traces of $u$ at the boundary, and similarly, $u(x^{+})$ and $u(x^{-})$ denote the traces of $u$ from the right and the from the left, respectively, at an interior point $x$. ###### Remark 1.3. Both relaxation theorems have easily deduced variants in the space $BV(\Omega;{\mathbb{R}}^{m})\times\mathcal{M}(\Omega;{\mathbb{R}}^{d})$ (measures on $\Omega$ instead of $\bar{\Omega}$). The integral representations for the relaxed functionals in that case are obtained by simply dropping all contributions on $\partial\Omega$ in (1.4) and (1.7), respectively. ###### Remark 1.4. Both relaxation theorems still hold if we impose an additional mass constraint on $v$, i.e., $\int_{\Omega}v(x)\,dx=M$ with a constant $M$, which turns into $v(\overline{\Omega})=M$ for the relaxation. To see this, the recovery sequences in the proofs (for the upper bound) have to be modified slightly, artificially correcting the mass which is easily done with negligible error for the energy. This is actually the reason we chose to study the relaxation problem with the measures $v$ on the closure $\overline{\Omega}$, as a mass constraint is in general lost along weak∗-convergence in $\mathcal{M}(\Omega;{\mathbb{R}}^{d})$. ###### Remark 1.5. In essence, the difference between the cases $n=1$ and $n\geq 2$ arises from the fact that points have $1$-capacity zero for $n\geq 2$, but not for $n=1$. As a consequence, for $n\geq 2$, it is possible to change the value of $u$ to optimize $f_{1}(u)$ locally near points that get charged by $v$ or its recovery sequence, without noticeable energy cost paid in $W$. This ultimately leads to the natural appearance of $f_{1}^{\rm min}$ in the relaxation formula for $n\geq 2$ and can in fact make concentration effects in the recovery sequence for $v$ energetically favorable even if the limit state $v$ is absolutely continuous with respect to the Lebesgue measure, see Example 3.3 and Remark 3.4. ###### Remark 1.6. For $n\geq 2$, Theorem 1.1 can be easily modified to include the case $1<p\leq n$, with $u\in W^{1,p}$ and using $W^{1,p}\ni u_{k}\rightharpoonup u$ weakly in $W^{1,p}$ in (1.3) (instead of $W^{1,1}\ni u_{k}\rightharpoonup^{*}u$ weakly∗ in $BV$). In that scenario, the correct relaxed energy density is simply the restriction of (1.4) to $u\in W^{1,p}$, i.e., the term with $(\mathcal{Q}W)^{\infty}$ is removed as $Du^{s}=0$. Apart from a few simplifications natural in $W^{1,p}$, the proof can essentially be followed step by step. The only point where one has to be careful is the upper bound (cf. Subsection 3.2), more precisely, the function $\varphi$, which now has to be $W^{1,p}$ to still allow the cut-off arguments based on it. This is possible only for $p\leq n$, as for large $p$, any function in $W^{1,p}$ is locally bounded by embedding. (The relaxation for $p>n$ is a much more classic problem where $u_{k}\to u$ uniformly and the variable for $u$ in the relaxation formula simply gets frozen instead of the more complex phenomena we observe here.) The plan of the rest of the paper is as follows. First, we introduce necessary notation in Section 2. A proof of Theorem 1.1 is contained in Section 3 together with a few remarks. We also indicate there possible generalization and give an example where the relaxed functional is calculated explicitly. Finally, a proof of Theorem 1.2 c.an be found in Section 4. ## 2\. Notation and Preliminary Results In the following $\Omega$ is a bounded open set of $\mathbb{R}^{n}$, $n\geq 2$ and $\mathcal{A}(\Omega)$ stands for the family of open subsets of $\Omega$. ### 2.1. Radon measures By $\mathcal{M}(\Omega)$ we denote the set of signed Radon measures on $\Omega$, for the $\mathbb{R}^{d}$-valued we use the symbol $\mathcal{M}(\Omega;\mathbb{R}^{d})$. We write $\mathrm{Supp}\,\mu$ to denote the the support of $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$. Any element $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$ can be decomposed as (2.1) $\mu:=\mu^{a}+\mu^{s},$ where $\mu^{a}$ is absolutely continuous with respect to the $n$-dimensional Lebesgue measure $\mathcal{L}^{n}$, and $\mu^{s}$ is the singular part. A particularly important example of a scalar-valued, purely singular measure is the _Dirac mass_ $\delta_{z}$ charging a single point $z\in{\mathbb{R}}^{n}$. For any Borel set $A\subset{\mathbb{R}}^{n}$, it is defined by $\delta_{z}(A):=1$ if $z\in A$, and $\delta_{z}(A):=0$ otherwise. If $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$ and $\lambda\in\mathcal{M}(\Omega)$ is a nonnegative Radon measure, we denote by $\frac{d\mu}{d\lambda}$ the Radon-Nikodým derivative of $\mu$ with respect to $\lambda$. By a generalization of the Besicovitch Differentiation Theorem (see [19, Theorem 1.153 and related results in sections 1.2.1, 1.2.2]), it can be proved that there exists a Borel set $E\subset\Omega$ such that $\lambda(E)=0$ and (2.2) $\frac{d\mu}{d\lambda}(x)=\lim_{\varepsilon\to 0^{+}}\frac{\mu(x+\varepsilon\,C)}{\lambda(x+\varepsilon\,C)}$ for all $x\in\mathrm{Supp}\,\mu\setminus E$ and any open convex set $C$ containing the origin. We recall that the exceptional set $E$ does not depend on $C$. Also recall that almost every point in $\mathbb{R}^{n}$ is a Lebesgue point if $f\in L^{1}_{\mathrm{loc}}(\mathbb{R}^{n},\mu)$ and $\mu$ is a Radon measure, i.e., $\lim_{\varepsilon\to 0^{+}}\frac{1}{\mu(x+\varepsilon C)}\int_{x+\varepsilon C}|f(y)-f(x)|d\mu(y)=0$ for $\mu-$ a.e. $x\in\mathbb{R}^{n}$ and for every bounded, convex, open set $C$ containing the origin. Analogous results hold for Radon measures on the compact set $\bar{\Omega}$, and we use analogous notation for this case, consistently replacing $\Omega$ by $\bar{\Omega}$ above. If necessary, every measure in $\mathcal{M}(\bar{\Omega})$ is understood to be extended by zero outside of $\bar{\Omega}$. In what follows, for every measure $\mu\in\mathcal{M}(\Omega;\mathbb{R}^{d})$ we will identify the measure $\mu^{a}$, with its density $\frac{d\mu^{a}}{d\mathcal{L}^{n}}$. ### 2.2. Functions of bounded variation By $BV(\Omega;\mathbb{R}^{m})$ we denote the space of functions with bounded variation, i.e. the set of $L^{1}(\Omega;\mathbb{R}^{m})$ functions whose distributional gradient $Du$ is a bounded Radon measure on $\Omega$ (i.e. an element of $\mathcal{M}(\Omega;\mathbb{R}^{d})$) with values in the space $M^{m\times n}$ of $m\times n$ matrices. For every $u\in BV(\Omega;\mathbb{R}^{m})$, its distributional derivative $Du$ can be decomposed as $Du^{a}+Du^{s}$, where $Du^{a}$ is the absolutely continuous part and the singular part with respect to the Lebesgue measure $\mathcal{L}^{n}$, respectively. The function $u$ is approximately differentiable $\mathcal{L}^{n}$-a.e. in $\Omega$ and its approximate gradient $\nabla u$ belongs to $L^{1}(\Omega;M^{m\times n})$ and coincides $\mathcal{L}^{n}$-a.e. with $\tfrac{dDu^{a}}{d\mathcal{L}^{n}}$. $S_{u}$ coincides with the complement of the set of Lebesgue points of $u$, up to a set of null $\mathcal{H}^{n-1}$ measure. See [5, Sections 3.5 and 3.6] for more details. More precisely the following decomposition holds: (2.3) $Du=\nabla u\mathcal{L}^{n}+Du^{s}=\nabla u\mathcal{L}^{n}+Du^{j}+Du^{c},$ where $Du^{j}$ is concentrated on $\mathcal{S}_{u}$ the latter term is the part of $Du^{s}$ concentrated on the set $\\{x\in\Omega:\,\eqref{approximatelimit}\,\text{holds}\\}$, where (2.4) $\lim_{\varepsilon\rightarrow 0^{+}}\frac{1}{\mathcal{\varepsilon}^{n}}\int_{Q\left(x,\varepsilon\right)}\left|u(y)-u\left(x\right)\right|dy=0.$ holds. Here, and in what follows, given $x\in{\mathbb{R}}^{n}$ and $\varepsilon>0$, $Q(x,\varepsilon)=\Pi_{i=1}^{n}(x_{i}-\varepsilon/2,x_{i}+\varepsilon/2)$. According to decomposition (2.3), we can further specialize (2.1), i.e. we can decompose any measure $v\in\mathcal{M}(\bar{\Omega};\mathbb{R}^{d})$ into three mutually orthogonal measures (2.5) $v=v^{a}+v^{|Du^{s}|}+v^{\sigma},$ i.e. $v^{s}=v^{|Du^{s}|}+v^{\sigma}$, whereas $v^{|Du^{s}|}$ is absolutely continuous with respect to $|Du^{s}|$ and $v^{\sigma}$ which is singular with respect to $|Du|$. ### 2.3. Convex envelopes and recession functions Let $W_{1}:\mathbb{R}^{m}\times\mathbb{R}^{d}\times\mathbb{R}^{m\times n}\to\mathbb{R}$, be defined as $W_{1}(a,b,\xi):=f_{1}(a)f_{2}(b)+W(\xi),$ where $f_{1}$, $f_{2}$ and $W$ are the functions introduced above and satisfying $(H_{1}),(H_{2})$ and $(H_{3})$. This entails, in particular that $W_{1}$ has linear growth with respect to the last two variables. We recall that the convex envelope of a function $f_{2}:\mathbb{R}^{d}\to\mathbb{R}$ is the greatest convex function which is below $f_{2}$, and as already observed, by virtue of $(H_{2})$, it coincides with the biconjugate of $f_{2}$; cf. [16]. In the same way the quasiconvex envelope of a function $W:\mathbb{R}^{d\times n}\to\mathbb{R}$ is the greatest quasiconvex function which is below $W$ and it admits the following representation: $\mathcal{Q}W(\xi)={\rm inf}\left\\{\frac{1}{|D|}\int_{D}W(\xi+\nabla\phi(y))dy\,\left|\,\phi\in W^{1,\infty}_{0}(D;\mathbb{R}^{m})\right.\right\\},$ $D$ being a bounded Lipschitz domain. This definition is independent of $D$ and we say that $W$ is quasiconvex if $W=QW$. Integral functionals with such integrands of linear growth can be extended to measures in a meaningful way if we assume that there is a well defined recession function. Here, following [29, 32], we define the (generalized) recession function of a function $h:{\mathbb{R}}^{m\times n}\to{\mathbb{R}}$ by (2.6) $h^{\infty}(z):=\limsup_{t\to+\infty,z^{\prime}\to z}\frac{h(tz^{\prime})}{t}$ We recall that if $h$ is quasiconvex with linear growth, in particular if $h=QW$, then $h^{\infty}$ inherits these properties, both $h$ and $h^{\infty}$ are globally Lipschitz continuous and the $\limsup$ in (2.6) is a limit along all rank-$1$ lines, i.e., if both $z$ and $z^{\prime}$ are restricted to the class of matrices of rank $1$. In case of a convex function $h:{\mathbb{R}}^{m}\to{\mathbb{R}}$ with linear growth, for instance $h=f_{2}^{\ast\ast}$, its recession function automatically exists as the limit (2.7) $h^{\infty}(b)=\lim_{t\to+\infty}\frac{h(tb)}{t},\quad\text{locally uniformly in $b\in{\mathbb{R}}^{m}$.}$ Another technically useful property equivalent to (2.7) is (2.8) $\Big{|}\frac{1}{t}h(tb)-h^{\infty}(b)\Big{|}\leq\sigma(t)(|b|+1)\quad\text{for all $t>0$, $b\in{\mathbb{R}}^{m}$, where }\sigma(t)\underset{t\to\infty}{\longrightarrow}0.$ Here, $\sigma:(0,\infty)\to(0,\infty)$ is a non-increasing, continuous function independent of $b$. (For instance, given (2.7), one may choose $\sigma(t):=\sup\big{\\{}\big{|}h^{\infty}(b)-\tfrac{1}{s}h(sb)\big{|}\,:\,|b|\leq 1,s\geq t\big{\\}}$). Due to the special form of $W_{1}$, the recession function of ${\mathcal{C}}{\mathcal{Q}}W_{1}(a,b,\xi):=f_{1}(a)f_{2}^{\ast\ast}(b)+\mathcal{Q}W(\xi)$ can be expressed as $({\mathcal{C}}{\mathcal{Q}}W_{1})^{\infty}(a,b,\xi)=f_{1}(a)(f_{2}^{\ast\ast})^{\infty}(b)+(\mathcal{Q}W)^{\infty}(\xi)$ for every $(a,b,\xi)\in\mathbb{R}^{m}\times\mathbb{R}^{d}\times\mathbb{R}^{m\times n}$. ### 2.4. Nonlinear transformation of measures Throughout, we will use the following notation for scalar-, vector- or matrix valued measures transformed by a nonlinear function. Let $\nu\in{\mathcal{M}}(\Lambda;{\mathbb{R}}^{M})$ be such a measure on a Borel set $\Lambda\subset{\mathbb{R}}^{n}$ (e.g., $\Lambda=\overline{\Omega}$), and let $f:\Lambda\times{\mathbb{R}}^{M}\to{\mathbb{R}}$ with recession function $f^{\infty}(x,\cdot):=(f(x,\cdot))^{\infty}$ in the second variable, for fixed $x\in\Lambda$. For every Borel set $A\subset\Lambda$, we then define $f(\nu)(A):=\int_{A}\,df(x,\nu)(x),\quad df(x,\nu)(x):=f\Big{(}x,\frac{d\nu^{a}}{d\mathcal{L}^{n}}(x)\Big{)}\,dx+f^{\infty}\Big{(}x,\frac{d\nu^{s}}{d|\nu|^{s}}(x)\Big{)}d|\nu|^{s}(x),$ where $\nu=\nu^{a}+\nu^{s}$ is the Radon-Nikodým decomposition of $\nu$ into an absolutely continuous and a singular component with respect to the Lebesgue measure $\mathcal{L}^{n}$. Obviously, this definition requires $f$ to be regular enough so that the integral above is well-defined, which will always be the case below. ### 2.5. Continuous extension of functionals with respect to area-strict convergence The most natural way to extend a functional on $W^{1,1}$ or $L^{1}$ to $BV$ or ${\mathcal{M}}$, respectively, is by continuous extension with respect to area-strict convergence, following [29]. Here, given a Borel set $\Lambda$ which is either open or compact, we say that a sequence $(v_{k})\subset{\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ converges to $v\in{\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ _area-strictly in ${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$_ if $v_{k}\rightharpoonup^{*}v~{}~{}~{}\text{in ${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$}\quad\text{and}\quad\int_{\Lambda}da(v_{k})(x)\underset{k\to\infty}{\to}\int_{\Lambda}da(v)(x),\quad\text{where }a(\cdot):=\sqrt{1+|\cdot|^{2}}$ is the density of the area functional. Accordingly, for a sequence $(u_{k})\subset BV(\Omega;{\mathbb{R}}^{m})$ and a function $u\in BV(\Omega;{\mathbb{R}}^{m})$, we say that $u_{k}\to u$ _area-strictly in $BV(\Omega;{\mathbb{R}}^{m})$_ if $u_{k}\to u$ in $L^{1}(\Omega;{\mathbb{R}}^{m})$ and $Du_{k}\to Du$ area-strictly in ${\mathcal{M}}(\Omega;{\mathbb{R}}^{m\times n})$. The more classical, slightly weaker notion of _strict convergence_ is recovered if we replace $a$ by $\tilde{a}(\cdot):=|\cdot|$ above. An important feature is that $L^{1}(\Lambda;{\mathbb{R}}^{d})$ is dense in ${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$ with respect to area-strict convergence in ${\mathcal{M}}(\Lambda;{\mathbb{R}}^{d})$, $\Lambda=\Omega,\overline{\Omega}$ (the slightly more subtle latter case is shown in Lemma 2.5), and $W^{1,1}(\Omega;{\mathbb{R}}^{m})$ is dense in $BV(\Omega;{\mathbb{R}}^{m})$ with respect to area-strict convergence in $BV(\Omega;{\mathbb{R}}^{m})$ (by mollifying as in, e.g., [33, Section 5.3]). As a consequence, the following continuity result of [29] for functionals on ${\mathcal{M}}$ and $BV$, respectively, implies that these are actually the unique continuous extensions of their restrictions to $L^{1}$ and $W^{1,1}$, with respect to area-strict convergence. ###### Proposition 2.1 (cf. [29, Thm. 3 and Thm. 4]). Let $f_{2}$ and $W$ be continuous functions satisfying $(H_{2})$ and $(H_{3})$. Then the functionals $\displaystyle v\mapsto\int_{\overline{\Omega}}df^{\ast\ast}_{2}(v)(x),\quad{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to{\mathbb{R}},$ $\displaystyle v\mapsto\int_{\Omega}df^{\ast\ast}_{2}(v)(x),\quad{\mathcal{M}}(\Omega;{\mathbb{R}}^{d})\to{\mathbb{R}},~{}~{}\text{and}$ $\displaystyle u\mapsto\int_{\Omega}dQW(Du)(x),\quad BV(\Omega;{\mathbb{R}}^{m})\to{\mathbb{R}}$ are sequentially continuous with respect to area-strict convergence in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$, ${\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$ and $BV(\Omega;{\mathbb{R}}^{m})$, respectively. We remark that the convex or quasiconvex envelopes cannot be dropped in Proposition 2.1, but convexity is exploited there only to ensure that the recession functions exist in a strong enough sense, ensuring continuity of the integrands at infinity. ### 2.6. Auxiliary results concerning sequences and approximation The following result (cf. [19, Lemma 2.31]) will be used in the proof of the lower bound of Theorem 1.1. ###### Lemma 2.2 (Decomposition Lemma in $L^{1}$). Let $(z_{k})_{k}\subset L^{1}(\Omega;\mathbb{R}^{d})$ be bounded. Then $z_{k}$ can be decomposed as $z_{k}=z_{k}^{\rm osc}+z_{k}^{\rm conc},$ with two bounded sequences $(z_{k}^{\rm osc})_{k},(z_{k}^{\rm conc})_{k}\subset L^{1}(\Omega;\mathbb{R}^{d})$ such that $|z_{k}^{\rm osc}|$ is equiintegrable and $z_{k}^{\rm conc}$ is the purely concentrated part in the sense that $z_{k}^{\rm conc}\to 0$ in measure. In fact, one may even assume that ${\mathcal{L}}^{n}(\\{z_{k}^{\rm conc}\neq 0\\})\to 0\quad\text{as $k\to+\infty$}.$ Moreover, whenever $f:{\mathbb{R}}^{d}\to{\mathbb{R}}$ is globally Lipschitz, $\|f(z_{k})-f(z^{\rm osc}_{k})-f(z^{\rm conc}_{k})+f(0)\|_{L^{1}(\Omega)}\to 0\quad\text{as $k\to+\infty$}.$ In one-dimensional case, we also use the following lemma – here stated for any dimension – which allows us to manipulate boundary values. ###### Lemma 2.3. Let $\Omega\subset\mathbb{R}^{n}$ be a bounded open set and let $A\subset\subset\Omega$ be an open subset with Lipschitz boundary. Let $f_{1}:\mathbb{R}^{m}\to{\mathbb{R}},f_{2}:{\mathbb{R}}^{d}\to{\mathbb{R}}$ and $W:{\mathbb{R}}^{m\times n}\to{\mathbb{R}}$ be continuous functions satisfying $(H_{1})-(H_{3})$. Consider $(u,v)\in BV(\Omega;R^{m})\times\mathcal{M}(\Omega;\mathbb{R}^{d})$ such that $|v|(\partial A)=0$ and assume that $(u_{k},v_{k})\subset W^{1,1}(A,{\mathbb{R}}^{m})\times L^{1}(A;{\mathbb{R}}^{d})$ is a sequence satisfying $u_{k}\overset{*}{\rightharpoonup}u$ in $BV(A;\mathbb{R}^{m})$, $v_{k}\overset{*}{\rightharpoonup}v$ in $\mathcal{M}(A;\mathbb{R}^{d})$ and $\lim_{k\to+\infty}\int_{A}(f_{1}(u_{k})f_{2}(v_{k})+W(\nabla u_{k}))dx=l,$ for some $l<+\infty$. Then there exist a sequence $(\bar{u}_{k},\bar{v}_{k})\subset W^{1,1}(A,{\mathbb{R}}^{m})\times L^{1}(A;{\mathbb{R}}^{d})$ such that $\bar{u}_{k}=u$ on $\partial A$ (in the sense of trace), $\bar{u}_{k}\rightharpoonup^{*}u$ in $BV(A;{\mathbb{R}}^{m})$, $\bar{v}_{k}\rightharpoonup^{*}v$ in $\mathcal{M}(A;\mathbb{R}^{d})$, and $\limsup_{k\to+\infty}\int_{A}(f_{1}(\bar{u}_{k})f_{2}(\bar{v}_{k})+W(\nabla\bar{u}_{k}))dx\leq l.$ The proof is omitted, it is similar to [11, Lemma 2.2] and [7, Lemmas 4.4 and 4.5]. The following, essentially well-known approximation of an absolutely continuous measure by a purely concentrating sequence is a key ingredient for the construction of a recovery sequence in Theorem 1.1. ###### Lemma 2.4. Let $\Omega\subset{\mathbb{R}}^{n}$ be a bounded domain and let $\sigma\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ be absolutely continuous. There is a sequence $(v_{\varepsilon})_{\varepsilon}\subset L^{1}(\Omega;{\mathbb{R}}^{d})$ converging to zero in measure such that as $\varepsilon\to 0$, $v_{\varepsilon}\to\sigma$ weakly* and strictly in $\mathcal{M}(\overline{\Omega};{\mathbb{R}}^{d})$. In fact, $v_{\varepsilon}$ can be constructed as a function supported on balls of radius $r(\varepsilon)$ centered at finitely many points $x_{j}^{\varepsilon}$, $j=1,\ldots J(\varepsilon)$, such that $r(\varepsilon)\to 0$ as $\varepsilon\to 0$. ###### Proof. We partition $\bar{\Omega}$ into a collection of mutually disjoint sets, i.e., $P_{\ell}=\\{\Omega^{j}_{\ell}\\}_{j=1}^{J(\ell)}$ such that $\text{diam }(\Omega_{j}^{\ell})<1/\ell$ and $\Omega_{j}^{\ell}\cap\Omega_{k}^{\ell}=\emptyset$ if $j\neq k$. Take $x^{\ell}_{j}\in\text{int }(\Omega^{\ell}_{j})$, $\displaystyle z^{\ell}_{j\varepsilon}=\begin{cases}\sigma(\Omega^{\ell}_{j})/(|\sigma|({\Omega}^{\ell}_{j})\varepsilon)&\text{ if }|\sigma|({\Omega}^{\ell}_{j})\neq 0,\\\ 0&\text{ otherwise,}\end{cases}$ and for every $j\in\\{1,\ldots,J(\ell)\\}$ such that $|\sigma|({\Omega}^{\ell}_{j})\neq 0$ consider $x_{j}^{\ell}\in\text{ int }{\Omega}^{\ell}_{j}$ and define $N^{\ell}_{j\varepsilon}=\\{x\in\Omega:\ |x-x_{j}^{\ell}|<(|\sigma|(\Omega^{\ell}_{j})/\mathcal{L}^{n}(B(0,1))/|z_{\varepsilon j}^{\ell}|)^{1/n}\\}\ .$ If $j$ is such that $\sigma({\Omega}^{\ell}_{j})=0$ we set $N^{\ell}_{j\varepsilon}=\emptyset$. Put $w^{\ell}_{\varepsilon}(x)=\begin{cases}z_{j\varepsilon}^{\ell}&\text{if }x\in N^{\ell}_{j\varepsilon}\\\ 0&\text{ otherwise.}\end{cases}$ Notice that (2.9) $\displaystyle\int_{\Omega}|w^{\ell}_{\varepsilon}(x)|\,dx=\sum_{j}\mathcal{L}^{n}(N^{\ell}_{j\varepsilon})|z^{\ell}_{j\varepsilon}|=\sum_{j}|\sigma|(\Omega_{j}^{\ell})=|\sigma|(\bar{\Omega})<+\infty$ and that $w^{\ell}_{j\varepsilon}\to 0$ in measure as $\varepsilon\to 0$. If $\varphi\in C(\bar{\Omega};{\mathbb{R}}^{m})$ we get $\displaystyle\lim_{\varepsilon\to 0}\int_{\Omega}w^{\ell}_{\varepsilon}\varphi(x)\,dx$ $\displaystyle=\lim_{\varepsilon\to 0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}\varphi(x_{j}^{\ell})\,dx+\lim_{\varepsilon\to 0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}(\varphi(x)-\varphi(x_{j}^{\ell}))\,dx$ $\displaystyle=\int_{\bar{\Omega}}\varphi(x)\,d\sigma^{\ell}(x)\ ,$ where $\sigma^{\ell}=\sum_{j=1}^{J(l)}\sigma({\Omega}_{j}^{\ell})\delta_{x_{j}^{\ell}}$. Above, we exploited that $\displaystyle\lim_{\varepsilon\to 0}\sum_{j=1}^{J(l)}\int_{N^{\ell}_{j\varepsilon}}z^{\ell}_{j\varepsilon}(\varphi(x)-\varphi(x_{j}^{\ell}))\,dx=0$ because $\varphi$ is uniformly continuous on $\bar{\Omega}$ and $\mathcal{L}^{n}(N^{\ell}_{j\varepsilon})=|\sigma|(\Omega^{\ell}_{j})/|z^{\ell}_{j\varepsilon}|$. Altogether we have that $w*-\lim_{\varepsilon\to 0}w^{\ell}_{\varepsilon}=\sigma^{\ell}$. On the other hand, w*-$\lim_{l\to\infty}\sigma^{\ell}=\sigma$. A diagonalization argument with a suitable $\ell=\ell(\varepsilon)$ gives us a sequence $v_{\varepsilon}:=w^{\ell(\varepsilon)}_{\varepsilon}$ converging to zero in measure as well as weakly∗ to $\sigma$ as $\varepsilon\to 0$. Combining this with (2.9), we also obtain that $v_{\varepsilon}\to\sigma$ strictly. ∎ Strict approximation of general measures by $L^{1}$ functions is also well- known, but we would like to stress here that this is possible even when boundary points can be charged: ###### Lemma 2.5. Let $\Omega\subset{\mathbb{R}}^{n}$ be open and bounded. There exists a family of linear operators $(I_{j})_{j\in{\mathbb{N}}}:{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to L^{1}(\Omega;{\mathbb{R}}^{d})$ with $I_{j}\circ I_{j}=I_{j}$, such that for all $v\in{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$, (2.10) $\displaystyle\int_{\Omega}|I_{j}v|\,dx\leq\|v\|_{{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})},\quad\int_{\Omega}a(I_{j}v)\,dx\leq\int_{\overline{\Omega}}da(v)\quad\text{with}~{}a(\cdot):=\sqrt{1+|\cdot|^{2}},$ and $I_{j}v\to v$ weakly∗, strictly and area-strictly in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ as $j\to\infty$. If $v\in L^{1}(\Omega;{\mathbb{R}}^{d})$ then $I_{j}v\to v$ strongly in $L^{1}(\Omega;{\mathbb{R}}^{d})$. ###### Proof. The operator $I_{j}$ is defined as a piecewise constant interpolation on a suitable cubical grid of grid size $\tfrac{1}{j}$. For each $j\in{\mathbb{N}}$ and $z\in{\mathbb{Z}}^{n}$, let ${\mathcal{G}}_{j}:=\big{\\{}Q(j,z)\mid z\in{\mathbb{Z}}^{n}\big{\\}},\quad\text{with}\quad Q(j,z):=\tfrac{1}{j}(z+[0,1)^{n}).$ While these cubes form a pairwise disjoint covering of ${\mathbb{R}}^{n}$, it is possible that certain cubes intersect $\overline{\Omega}$ ”from the outside” in the sense that for some $Q\in{\mathcal{G}}_{j}$, $Q\cap\Omega=\emptyset\neq Q\cap\overline{\Omega}$. If $v$ charges $Q\cap\partial\Omega$, this contribution would be lost in our construction below. We avoid the issue by slightly changing some cubes on the surface: If necessary, reassign surface points from an ”outer” cube intersecting $\overline{\Omega}$ as above to a neighbor cube intersecting $\Omega$. This leads to $\tilde{{\mathcal{G}}}_{j}:=\big{\\{}\tilde{Q}(j,z)\mid z\in{\mathbb{Z}}^{n}\big{\\}},$ where the $\tilde{Q}(j,z)$ are chosen as pairwise disjoint Borel sets such that $Q(j,z)\subset\tilde{Q}(j,z)\subset\overline{Q(j,z)}$, ${\mathbb{R}}^{n}=\bigcup\tilde{{\mathcal{G}}}_{j}$ and (2.11) $\displaystyle\tilde{Q}(j,z)\cap\overline{\Omega}\neq\emptyset~{}\Longrightarrow~{}\tilde{Q}(j,z)\cap\Omega\neq\emptyset.$ With the grid given by $\tilde{{\mathcal{G}}}_{j}$, we define the piecewise constant interpolation $I_{j}:{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})\to L^{1}(\Omega;{\mathbb{R}}^{d})$, $v\mapsto I_{j}v\quad\text{with}\quad I_{j}v|_{\Omega\cap Q}:=\frac{v(\overline{\Omega}\cap Q)}{{\mathcal{L}}^{n}(\Omega\cap Q)}~{}~{}\text{for all $Q\in\tilde{{\mathcal{G}}}_{j}$}.$ As constructed, $I_{j}$ is a linear, continuous projection satisfying (2.10) (cube by cube, by convexity of $|\cdot|$ and $a$, using Jensen’s inequality) and $I_{j}v\rightharpoonup^{*}v$ in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ (notice that due to (2.11), no contributions on $\partial\Omega$ are lost). Combined with (2.10), the latter implies that $I_{j}w\to w$ strictly and area-strictly in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$. In case $w\in L^{1}(\Omega;{\mathbb{R}}^{d})$ with $|w|(\partial\Omega)=0$, we get $\limsup_{j}\int_{\Omega}|I_{j}w|\,dx\leq\int_{\Omega}|w|\,dx$ and $I_{j}w\rightharpoonup^{*}w$ in ${\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$, which implies that $I_{j}w\to w$ strongly in $L^{1}$. ∎ ### 2.7. The localized energy and its relaxation Let $\mathcal{A}_{r}(\overline{\Omega})$ be the family of all subsets of $\overline{\Omega}$ which are open with respect to the relative topology of $\overline{\Omega}$. For each $A\in A_{r}(\overline{\Omega})$, we introduce the localized energy ${\mathcal{F}}(\cdot,\cdot,A):BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\to[0,+\infty]$, defined as (2.12) $\displaystyle\begin{aligned} \mathcal{F}(u,v,A):=\left\\{\\!\\!\\!\\!\begin{array}[]{ll}\int_{\Omega\cap A}\big{(}f_{1}(u)f_{2}(v)+W(\nabla u)\big{)}\,dx,&\hbox{ if }(u,v)\in W^{1,1}(\Omega\cap A;\mathbb{R}^{n})\times L^{1}(\Omega\cap A;\mathbb{R}^{m}),\\\ \\\ +\infty,&\hbox{ otherwise.}\end{array}\right.\end{aligned}$ Its _relaxation_ , i.e., its lower semicontinuous envelope with respect to weak∗ convergence, is the functional $\overline{\mathcal{F}}(\cdot,\cdot,A):BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\to[0,+\infty]$ defined as (2.13) $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v,A):=\inf\left\\{\,\liminf_{k\to+\infty}\mathcal{F}(u_{k},v_{k},A)\left|\begin{array}[]{l}(u_{k},v_{k})\in W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}),\\\ (u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\end{array}\right.\\!\\!\\!\right\\},\end{aligned}$ Here, recall that for $A\in\mathcal{A}_{r}(\overline{\Omega})$, $\mathcal{M}(A;\mathbb{R}^{d})$ is the dual space of the continuous functions $\varphi:A\to\mathbb{R}^{d}$ with $\varphi=0$ on $\partial A\cap\Omega$. Also notice that (2.13) extends the notation $\overline{\mathcal{F}}(u,v)$ of (1.4), in the sense that $\overline{\mathcal{F}}(u,v)=\overline{\mathcal{F}}(u,v,\overline{\Omega})$ There are several other, equivalent representations of $\overline{\mathcal{F}}$ that will be useful to simplify our proofs. For now, we only collect the statements of these results. Their proofs are presented in Appendix A. A first observation is that in (2.13), $f_{2}$ and $W$ can be replaced by $f_{2}^{\ast\ast}$ and $QW$, respectively: ###### Proposition 2.6. Let $f_{1},f_{2}$ and $W$ be continuous functions satisfying $(H_{1})-(H_{3})$, let $A\in\mathcal{A}_{r}(\overline{\Omega})$ and consider the corresponding functional $\mathcal{F}$ in (2.12). Consider furthermore the relaxed functionals (1.3) and (2.14) $\displaystyle\begin{aligned} \overline{\mathcal{F}}_{\ast\ast}(u,v,A):=\inf\Big{\\{}&\liminf_{k\to+\infty}\int_{\Omega\cap A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{\Omega\cap A}\mathcal{Q}W(\nabla u_{k})dx:\\\ &(u_{k},v_{k})_{k}\subset W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}),\\\ &(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}.\end{aligned}$ Then, $\overline{\mathcal{F}}(\cdot,\cdot,\cdot)$ coincides with $\overline{\mathcal{F}}_{\ast\ast}(\cdot,\cdot,\cdot)$ in $BV(\Omega,\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})\times\mathcal{A}_{r}(\overline{\Omega})$. In addition, $u_{k}\in W^{1,1}(\Omega;{\mathbb{R}}^{m})$ can be replaced by $u_{k}\in BV(\Omega;{\mathbb{R}}^{m})$ in the definition of $\overline{{\mathcal{F}}}_{\ast\ast}$, if we use an appropriate extension of ${\mathcal{F}}_{\ast\ast}$: ###### Proposition 2.7. In the situation of Proposition 2.6, we have (2.15) $\displaystyle\begin{aligned} \overline{\mathcal{F}}_{\ast\ast}(u,v,A)=\inf\Big{\\{}&\liminf_{k\to+\infty}\int_{\Omega\cap A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{\Omega\cap A}d\mathcal{Q}W(Du_{k})(x):\\\ &(u_{k},v_{k})_{k}\subset BV(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}),\\\ &(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}.\end{aligned}$ A key ingredient to obtain an integral representation of $\overline{\mathcal{F}}$ via the blow-up method is the following preliminary result which shows that the localized relaxed functional is the restriction of a Radon measure on $\mathcal{A}_{r}(\bar{\Omega})$. ###### Lemma 2.8. Let $\Omega\subset\mathbb{R}^{n}$ be an open bounded set with Lipschitz boundary and let $f_{1},f_{2}$ and $W$ be as in (1.2), satisfying $(H_{1})-(H_{3})$. For every $(u,v)\in BV(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$, the set function $\overline{\mathcal{F}}(u,v,\cdot)$ in (2.13) is the trace of a Radon measure absolutely continuous with respect to $\mathcal{L}^{n}+|Du|+|v|$. ## 3\. Proof of Theorem 1.1 We start observing that the growth assumptions $(H_{1})$ and the structure of the functional (1.2) ensure that sequences $(u_{k},v_{k})_{k}\subset W^{1,1}(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ with $\sup_{k}F(u_{k},v_{k})<+\infty$ have (non-relabeled) subsequences $\nabla u_{k}\overset{\ast}{\rightharpoonup}m\in\mathcal{M}(\Omega;\mathbb{R}^{m})$ and $v_{k}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$. Up to imposing some boundary conditions or removing constants by working in a quotient space we can assume without loss of generality that $u_{k}\overset{\ast}{\rightharpoonup}u$ in $BV(\Omega;\mathbb{R}^{m})$. The proof of Theorem 1.1 will be achieved in two main steps, first we find a lower bound and then we prove that it is sharp. ### 3.1. Lower bound We will now show that (3.1) $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v)\geq&\int_{\Omega}\mathcal{Q}W(\nabla u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|\\\ &+\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|.\end{aligned}$ ###### Proof of the lower bound. Take $(u_{k},v_{k})\in W^{1,1}(\Omega;{\mathbb{R}}^{m})\times L^{1}(\Omega;{\mathbb{R}}^{d})$, $u_{k}\rightharpoonup^{*}u$ in $BV(\Omega;{\mathbb{R}}^{m})$, $v_{k}\rightharpoonup^{*}v$ in $\mathcal{M}(\overline{\Omega};{\mathbb{R}}^{d})$. We prove individual lower bounds for the two parts of $\mathcal{F}$. Due to [4] and the trivial estimate $W\geq\mathcal{Q}W$, we have that (3.2) $\displaystyle\liminf_{k}\int_{\Omega}W(\nabla u_{k})\,dx\geq\int_{\Omega}\mathcal{Q}W(\nabla u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|.$ It remains to show that (3.3) $\displaystyle\liminf_{k}\int f_{1}(u_{k})f_{2}(v_{k})\,dx\geq\int_{\Omega}g\left(u,\frac{dv^{a}}{d{\mathcal{L}}^{n}}\right)\,dx+\int_{\bar{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)\,d|v^{s}|.$ For $v_{k}$, we use the Decomposition Lemma in $L^{1}$, cf. Lemma 2.2: $v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$, where $(v_{k}^{\rm osc})_{k}$ is equi-integrable and $|\\{v_{k}^{\rm conc}\neq 0\\}|\to 0$. Up to a subsequence, $v_{k}^{\rm osc}\rightharpoonup^{*}v_{\rm osc},\quad v_{k}^{\rm conc}\rightharpoonup^{*}v_{\rm conc}\quad\text{in ${\mathcal{M}}(\bar{\Omega};{\mathbb{R}}^{d})$}.$ The equi-integrability of $(v_{k}^{\rm osc})_{k}$ and Dunford-Pettis’ Theorem (see [19, Theorem 2.54]) ensures that (3.4) $\displaystyle v_{k}^{\rm osc}\rightharpoonup v_{\rm osc}\quad\text{in $L^{1}(\Omega;\mathbb{R}^{d})$}\ .$ We decompose $v_{\rm conc}=v_{\rm conc}^{a}+v_{\rm conc}^{s}$ into absolutely continuous and singular part with respect to the Lebesgue measure. Accordingly, the Lebesgue decomposition of the original limit measure $v=v^{a}+v^{s}$ is given by $v^{a}=v_{\rm osc}+v_{\rm conc}^{a}\quad\text{and}\quad v^{s}=v_{\rm conc}^{s}.$ With a slight abuse of notation, we identify the absolutely continuous measures $v_{\rm osc}$ and $v_{\rm conc}^{a}$ with their respective densities $v_{\rm osc}=\frac{dv_{\rm osc}}{d{\mathcal{L}}^{n}}$ and $v_{\rm conc}^{a}=\frac{dv_{\rm conc}^{a}}{d{\mathcal{L}}^{n}}$ in $L^{1}(\Omega;{\mathbb{R}}^{d})$ below. Observe that (3.5) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}(v_{k})\,dx\geq\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})\,dx\\\ &\quad\geq\liminf_{k}\int_{\\{v_{k}^{\rm conc}=0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc})\,dx+\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq 0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc}+v_{k}^{\rm conc})\,dx.\end{aligned}$ We will estimate these two terms separately. For the first term, by [19, Cor. 7.9], exploiting the convexity of $f_{2}^{\ast\ast}$, we get that (3.6) $\displaystyle\liminf_{k}\int_{\\{v_{k}^{\rm conc}=0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc})\,dx\geq\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm osc})\,dx\ .$ For the second term, we claim that (3.7) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq 0\\}}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k}^{\rm osc}+v_{k}^{\rm conc})\,dx\geq\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq 0\\}}f_{1}^{\rm min}f_{2}^{\ast\ast}(v_{k}^{\rm conc})\,dx\\\ &\qquad\begin{aligned} &\geq\liminf_{k}\int_{\Omega}f_{1}^{\rm min}(f^{\ast\ast})^{\infty}(v_{k}^{\rm conc})\,dx\\\ &\geq\int_{\Omega}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}(v_{\rm conc}^{a})\,dx+\int_{\overline{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm conc}^{s}|}\Big{)}\,d|v_{\rm conc}^{s}|(x),\end{aligned}\end{aligned}$ To see that the first line of (3.7) holds, notice that $f_{1}(u_{k})\geq f_{1}^{\rm min}>0$ and $\displaystyle\int_{\\{v_{k}^{\rm conc}\neq 0\\}}|f_{2}^{\ast\ast}(v_{k}^{\rm osc}+v_{k}^{\rm conc})-f_{2}^{\ast\ast}(v_{k}^{\rm conc})|\,dx\leq C\int_{\\{v_{k}^{\rm conc}\neq 0\\}}|v_{k}^{\rm osc}|\,dx\underset{k\to\infty}{\longrightarrow}0,$ because convex functions with linear growth are Lipschitz continuous; see [16, Prop. 2.32], for instance. The inequality in the second line of (3.7) (actually an equality, as a matter of fact) is essentially due (2.7) and the fact that $(v_{k}^{\rm conc})$ is purely concentrating. More precisely, we exploit that $\alpha_{t}:=\inf_{|y|=1}\frac{f_{2}^{\ast\ast}(ty)}{t(f_{2}^{\ast\ast})^{\infty}(y)}\underset{t\to+\infty}{\longrightarrow}1$ by (2.7) and $\Big{|}\int_{\\{|v_{k}^{\rm conc}|\leq t\\}}(f_{2}^{\ast\ast})^{\infty}\big{(}v_{k}^{\rm conc}\big{)}\,dx\Big{|}\leq(1+K)t~{}{\mathcal{L}}^{n}(\\{v_{k}^{\rm conc}\neq 0\\})\underset{k\to\infty}{\longrightarrow}0\quad\text{for every $t>0$}$ (using $(H_{2})$, $(f_{2}^{\ast\ast})^{\infty}(0)=0$ and the fact that ${\mathcal{L}}^{n}(\\{v_{k}^{\rm conc}\neq 0\\})\to 0$ by Lemma 2.2), whence $\displaystyle\liminf_{k}\int_{\\{v_{k}^{\rm conc}\neq 0\\}}f_{2}^{\ast\ast}(v_{k}^{\rm conc})\,dx$ $\displaystyle\geq\lim_{t\to+\infty}\liminf_{k}\int_{\\{|v_{k}^{\rm conc}|>t\\}}\alpha_{t}~{}(f_{2}^{\ast\ast})^{\infty}(v_{k}^{\rm conc})\,dx$ $\displaystyle=\liminf_{k}\int_{\Omega}(f_{2}^{\ast\ast})^{\infty}(v_{k}^{\rm conc})\,dx.$ Finally, in the last line of (3.7), we applied the weak∗-lower semicontinuity of convex integral functionals on measures (see, e.g., [19, Theorem 5.27]). Combining (3.5), (3.6) and (3.7), we conclude that (3.8) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\Omega}f_{1}(u_{k})f_{2}(v_{k})\,dx\\\ &\qquad\begin{aligned} &\geq\begin{aligned} \int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm osc})\,dx&+\int_{\Omega}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}(v_{\rm conc}^{a})\,dx\\\ &+\int_{\bar{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm conc}^{s}|}\Big{)}\,d|v_{\rm conc}^{s}|(x)\end{aligned}\\\ &\geq\begin{aligned} \int_{\Omega}g(u,v^{a})\,dx+\int_{\bar{\Omega}}f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{dv_{\rm conc}^{s}}{d|v_{\rm conc}^{s}|}\Big{)}\,d|v_{\rm conc}^{s}|(x),\end{aligned}\end{aligned}\end{aligned}$ because at each $x$, $b_{1}:=v_{\rm osc}(x)$ and $b_{2}:=v_{\rm conc}^{a}(x)$ are admissible for the minimization in (1.5), the definition of $g$, where $b:=v^{a}(x)=v_{\rm osc}(x)+v_{\rm conc}^{a}(x)$ for ${\mathcal{L}}^{n}$-a.e. $x$. ∎ ### 3.2. Upper bound By Proposition 2.6 and Proposition 2.7, we may assume that $f_{2}$ is convex and $W$ is quasiconvex. We must show that the opposite inequality to (3.1) holds. The proof will be divided into two steps. First, we assume that $v\in L^{1}(\Omega;\mathbb{R}^{d})$, and the general case $v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ will be considered afterward. First Step: Let $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in L^{1}(\Omega;\mathbb{R}^{d})$. Fix $\eta>0$ and choose, for $\mathcal{L}^{n}$ a.e. $x\in\Omega$, a decomposition of $v$ into two functions (3.9) $\displaystyle v(x)=v_{\rm osc}^{\eta}(x)+v_{\rm conc}^{\eta}(x)$ almost optimal for the definition of $g$, i.e., such that (3.10) $g(u(x),v(x))+\eta\geq f_{1}(u(x))f_{2}(v^{\eta}_{\rm osc}(x))+f_{1}^{\rm min}f_{2}^{\infty}(v^{\eta}_{\rm conc}(x)).$ Here, notice that for each $x$, the set of admissible choices for $v^{\eta}_{\rm osc}(x)$ (thus fixing $v^{\eta}_{\rm conc}(x)=v(x)-v_{\rm osc}^{\eta}(x)$) is always non-empty (as $\eta>0$) and open (by continuity of $f_{2}$ and $f_{2}^{\infty}$). In addition, $u$ and $v$ are measurable and $g$ and $f_{1}$ are continuous. As a consequence, it is possible to choose $v^{\eta}_{\rm osc}$ as a measurable function (cf. [22, Lemma 3.10], e.g.). By the coercivity of $f_{2}$ assumed in $(H_{2})$, (3.10) then implies that $v^{\eta}_{\rm osc},v^{\eta}_{\rm conc}\in L^{1}(\Omega;{\mathbb{R}}^{d})$. By Lemma 2.4, we can find a sequence of functions $(v^{\eta,\varepsilon}_{\rm conc})_{\varepsilon}\subset L^{1}(\Omega;\mathbb{R}^{d})$ such that (3.11) $\displaystyle v^{\eta,\varepsilon}_{\rm conc}\underset{\varepsilon\to 0}{\longrightarrow}v^{\eta}_{\rm conc}\quad\text{strictly (and therefore also weakly${}^{*}$) in $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$},$ as well as $v^{\eta,\varepsilon}_{\rm conc}\to 0$ in measure. Let $\delta>0$ and choose $u_{\rm min}^{\delta}\in\mathbb{R}^{m}$ such that (3.12) $f_{1}^{\rm min}\leq f_{1}(u^{\delta}_{\rm min})\leq f_{1}^{\rm min}+\delta,$ where $f_{1}^{\rm min}=\inf f_{1}$ as defined in (1.6). In the following, we will modify $u$ near the (small) sets where $v^{\eta,\varepsilon}_{\rm conc}\neq 0$, there replacing its value by $u^{\delta}_{\rm min}$. For that purpose, we use that in dimension $n\geq 2$, there exists a function $\varphi\in C^{\infty}(\overline{B_{1}}(0)\setminus\\{0\\})\cap W^{1,1}_{0}(B_{1}(0))\quad\text{such that $\varphi(y)\to+\infty$ as $y\to 0$,}$ for instance, $\varphi(y)=\log(1-\log|y|)$. For $s>0$, let $\varphi_{s}(y):=\left\\{\begin{array}[]{ll}0&\hbox{ if }\varphi(y)\leq\frac{1}{s},\\\ s\varphi(y)-1&\hbox{ if }\frac{1}{s}<\varphi(y)<\frac{2}{s},\\\ 1&\hbox{ if }\varphi(y)\geq\frac{2}{s}.\end{array}\right.$ Notice that $0\leq\varphi_{s}\leq 1$, and the support of $\varphi_{s}$ shrinks to $0$ as $s\to 0$, since $\varphi(x)\to+\infty$ as $x\to 0$. In particular, $\|\nabla\varphi_{s}\|_{L^{1}}\to 0$ as $s\to 0$. We define (3.13) $\tilde{u}_{\varepsilon,\delta}(x):=(1-h_{\varepsilon}(x))u^{[1/\delta]}(x)+h_{\varepsilon}(x)u_{\rm min}^{\delta},$ where $u^{[1/\delta]}$ is the component-wise truncation of $u$ on the level $1/\delta$, i.e., for $u=(u^{(1)},\ldots,u^{(m)})$, $u^{[1/\delta]}=(u^{[1/\delta],(1)},\ldots,u^{[1/\delta],(m)})$ is defined as $u^{[1/\delta],(i)}(x):=\left\\{\begin{array}[]{ll}u^{(i)}(x)&\text{if}~{}~{}|u^{(i)}(x)|\leq\frac{1}{\delta},\\\ \frac{1}{\delta}\frac{u^{(i)}(x)}{|u^{(i)}(x)|}&\text{if}~{}~{}|u^{(i)}(x)|>\frac{1}{\delta},\end{array}\right.\qquad i=1,\ldots,m,$ and, with some $s(\varepsilon)>0$ and $(x^{\varepsilon}_{j})_{j,\varepsilon}\subset\Omega$, $J(1/\varepsilon)\in{\mathbb{N}}$ and $r(\varepsilon)$ given by Lemma 2.4 when we applied it to get (3.11), (3.14) $\displaystyle h_{\varepsilon}(x):=\sum_{1\leq j\leq J(1/\varepsilon)}\varphi_{s(\varepsilon)}(x-x^{\varepsilon}_{j}).$ Here, we choose $s(\varepsilon)>0$ such that $s(\varepsilon)\to 0$ as $\varepsilon\to 0$, but still slow enough so that $\varphi(y)\geq 2/s(\varepsilon)$ for all $|y|\leq r(\varepsilon)$, whence (3.15) $\displaystyle\varphi_{s(\varepsilon)}(y)=1\quad\text{for all $|y|\leq r(\varepsilon)$}$ by construction of $\varphi_{s}$. For $\varepsilon>0$ small enough, $h_{\varepsilon}$ has support contained in a union of disjoint balls centered at $x^{\varepsilon}_{j}$ with vanishing radii (as $\varepsilon\to 0$). Moreover, $0\leq h_{\varepsilon}(x)\leq 1$ and $\|\nabla h_{\varepsilon}\|_{L^{1}}\to 0$. Consequently, for fixed $\delta$, we get that $\displaystyle\lim_{\varepsilon\to 0}\|\tilde{u}_{\varepsilon,\delta}-u^{[1/\delta]}\|_{L^{1}(\Omega)}=0\quad\text{and}\quad\lim_{\varepsilon\to 0}\int_{\Omega}dQW(D\tilde{u}_{\varepsilon,\delta})(x)=\int_{\Omega}dQW(Du^{[1/\delta]})(x).$ Since $u^{[1/\delta]}\to u$ in $L^{1}$ and $\int_{\Omega}dQW(Du^{[1/\delta]})\to\int_{\Omega}dQW(Du)$ by dominated convergence, we can choose a diagonal subsequence $u_{\varepsilon}:=\tilde{u}_{\varepsilon,\delta(\varepsilon)}$ with $\delta(\varepsilon)\to 0$ slow enough so that (3.16) $\displaystyle\lim_{\varepsilon\to 0}\|u_{\varepsilon}-u\|_{L^{1}(\Omega)}=0\quad\text{and}\quad\lim_{\varepsilon\to 0}\int_{\Omega}dQW(Du_{\varepsilon})(x)=\int_{\Omega}dQW(Du)(x).$ On the other hand, in view of (3.9) and (3.11), it is clear that $v^{\eta,\varepsilon}:=v^{\eta}_{\rm osc}+v^{\eta,\varepsilon}_{\rm conc}$ converges to $v$ weakly* in $\mathcal{M}(\Omega;\mathbb{R}^{d})$ if $\varepsilon\to 0$. Thus, $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v,\overline{\Omega})&\leq\liminf_{\varepsilon\to 0}\mathcal{F}(u_{\varepsilon},v^{\eta,\varepsilon},\Omega)\\\ &=\liminf_{\varepsilon\to 0}\left(\int_{\Omega}dQW(Du_{\varepsilon})(x)+\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\right)\end{aligned}$ Concerning the right hand side, recalling (3.16), it is sufficient to focus on the last integral of the above inequality, for which we have that (3.17) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to 0}\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\\\ &\quad\leq\liminf_{\varepsilon\to 0}\left(\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta}_{\rm osc})dx+\int_{\Omega}f_{1}(u_{\varepsilon})(f_{2}^{\ast\ast})^{\infty}(v^{\eta,\varepsilon}_{\rm conc})dx\right)\end{aligned}$ where it has been exploited that (see [19, formula (4.33), with $t=1$]), $f_{2}^{\ast\ast}(y+z)\leq f_{2}^{\ast\ast}(y)+(f_{2}^{\ast\ast})^{\infty}(z),\hbox{ for every }y,z\in\mathbb{R}^{d}.$ By construction of $u_{\varepsilon}$ and $v^{\eta,\varepsilon}_{\rm conc}$, in particular (3.14) and (3.15), $u_{\varepsilon}\equiv u_{\rm min}^{\delta(\varepsilon)}$ on the support of $v^{\eta,\varepsilon}_{\rm conc}$. Since $f_{1}(u_{\rm min}^{\delta(\varepsilon)})\to f_{1}^{\rm min}$ as $\varepsilon\to 0$, we can replace $f_{1}(u_{\varepsilon})$ by $f_{1}^{\rm min}$ in the second integral on the right hand side of (3.17). This yields (3.18) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to 0}\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta,\varepsilon})dx\\\ &\quad\leq\liminf_{\varepsilon\to 0}\left(\int_{\Omega}f_{1}(u_{\varepsilon})f_{2}^{\ast\ast}(v^{\eta}_{osc})dx+\int_{\Omega}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(v^{\eta,\varepsilon}_{\rm conc}\right)dx\right)\\\ &\quad\leq\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v^{\eta}_{\rm osc})dx+\int_{\Omega}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(v^{\eta}_{\rm conc})dx\end{aligned}$ where, in the first limit, we have used the Dominated Convergence Theorem together with bounds, and in the second we used Reshetnyak’s continuity theorem (see [5, Theorem 2.39], e.g.), exploiting the strict convergence of $v^{\eta,\varepsilon}_{\rm conc}$ to $v^{\eta}_{\rm conc}$ obtained from Lemma 2.4. Hence, together with (3.16), (3.18) gives that $\displaystyle\overline{\mathcal{F}}(u,v)\leq\int_{\Omega}g(u,v)dx+\int_{\Omega}\mathcal{Q}W(\nabla u)\,dx+\int_{\Omega}(\mathcal{Q}W)^{\infty}\left(\frac{dDu^{s}}{d|Du^{s}|}\right)\,d|Du^{s}|+\eta$ The arbitrariness of $\eta$ concludes the proof of this case. Second step: Let $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$. To invoke the first step, we use the approximation $I_{j}v$ of $v$ and some of its components by functions in $L^{1}$ provided in Lemma 2.5. The first step and the lower semicontinuity of $\overline{\mathcal{F}}$ ensure that for every $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ (3.19) $\displaystyle\overline{\mathcal{F}}(u,v)\leq\liminf_{j}\int_{\Omega}g(u,I_{j}v)dx+\int_{\Omega}dQW(Du)dx.$ As before for (3.10), for any $\eta>0$, we can decompose the absolutely continuous part of $v$ almost optimally for the infimum defining $g$ in (1.5), i.e., $v^{a}=v_{\rm osc}^{a,\eta}+v_{\rm conc}^{a,\eta}$ so that (3.20) $g(u(x),v^{a}(x))+\eta\geq f_{1}(u(x))f_{2}(v^{a,\eta}_{\rm osc}(x))+f_{1}^{\rm min}f_{2}^{\infty}(v^{a,\eta}_{\rm conc}(x))\quad\text{for a.e.~{}$x\in\Omega$}.$ The first summand in (3.19) can be estimated as follows. (3.21) $\displaystyle\begin{aligned} &\liminf_{j}\int_{\Omega}g(u,I_{j}v)\,dx\\\ &\leq\liminf_{j}\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(I_{j}v_{\rm osc}^{a,\eta})+f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(I_{j}[v_{\rm conc}^{a,\eta}+v^{s}])\,dx\\\ &=\int_{\Omega}f_{1}(u)f_{2}^{\ast\ast}(v_{\rm osc}^{a,\eta})dx+\int_{\overline{\Omega}}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(v^{a,\eta}_{\rm conc})dx+f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|\\\ &=\int_{\Omega}\left(f_{1}(u)f_{2}^{\ast\ast}(v^{a,\eta}_{\rm osc})+f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(v^{a,\eta}_{\rm conc})\right)dx+\int_{\overline{\Omega}}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|\\\ &\leq\int_{\Omega}g(u,v^{a})dx+\int_{\overline{\Omega}}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|+\eta.\end{aligned}$ Here, for the first inequality, we used the definition of $g$ (1.5). To pass to the limit as $j\to\infty$ in the second line of (3.21), Lebesgue’s dominated convergence theorem has been used for the first term (since $I_{j}v^{a}_{1}\to v_{1}^{a}$ in $L^{1}$ and $f_{1}$ is bounded), and Reshetnyak’s continuity theorem ([5, Theorem 2.39], e.g.) for the other (exploiting strict convergence and positive $1$-homogeneity of $(f_{2}^{\ast\ast})^{\infty}$). The limit of the latter then splits because $v^{a}_{\rm conc}$ and $v^{s}$ are orthogonal measures. The last inequality in (3.21) is due to (3.20). Finally, combining (3.19) and (3.21) gives $\overline{\mathcal{F}}(u,v)\leq\int_{\Omega}g(u,v^{a})dx+\int_{\overline{\Omega}}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv^{s}}{d|v^{s}|}\right)d|v^{s}|+\int dQW(Du)(x)+\eta.$ As $\eta>0$ was arbitrary, this concludes the proof. ###### Remark 3.1. It is easily seen that an entirely analogous proof allows us to replace the energy density $W$ above by a function $f:\overline{\Omega}\times\mathbb{R}^{m}\times\mathbb{R}^{m\times n}\to\mathbb{R}$ satisfying the assumptions in [32, Theorem A], thus leading to the following representation $\displaystyle\overline{\mathcal{F}}(u,v)=$ $\displaystyle\int_{\overline{\Omega}}f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}\left(\frac{dv}{d|v^{s}|}\right)d|v^{s}|+\int_{\Omega}g\left(u,\frac{dv^{a}}{d\mathcal{L}^{N}}\right)dx$ $\displaystyle+\int_{\Omega}f(x,u,\nabla u)dx+\int_{\Omega}K_{f}(x,u^{+}(x),u^{-}(x),\nu_{u}(x))d\mathcal{H}^{n-1}$ $\displaystyle+\int_{\Omega}f^{\infty}\left(x,u(x),\frac{dDu^{c}}{d|Du^{c}|}\right)d|Du^{c}|,$ with the functions, $K_{f}$ and $f^{\infty}$ defined by [32, page 2] and [32, Definition 2.8], respectively. We emphasize the same type of result could be obtained under the more stringent assumptions provided by [24]. ###### Remark 3.2 (Properties of $g$). 1. (i) According to the terminology of [9], for fixed $a$, $g(a,\cdot)$ is the _infimal convolution_ of $f_{1}(a)f_{2}^{\ast\ast}$ and $f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}$. 2. (ii) The function $g(a,\cdot)$ is convex, as it is obtained by “projecting” a convex function defined on ${\mathbb{R}}^{2d}$ to one on ${\mathbb{R}}^{d}$ by minimizing out the other directions along a fixed linear subspace: $(b_{1},b_{2})\mapsto f_{1}(a)f_{2}^{\ast\ast}(b_{1})+f_{1}^{\rm min}\,(f_{2}^{\ast\ast})^{\infty}(b_{2})$ is convex as the sum of convex functions, and $g(b)$ is its minimal value on the hypersurface $b+H$, with the fixed $d$-dimensional linear subspace $H:=\\{(b_{1},b_{2})\in{\mathbb{R}}^{2d}\mid b_{1}+b_{2}=0\\}\subset{\mathbb{R}}^{2d}$. 3. (iii) If $f_{1}(a)=f_{1}^{\rm min}$, the choice $b_{1}=b$ (and thus $b_{2}=0$) is optimal for the minimization in the definition of $g$, because the expression to be minimized in (1.5) then can be interpreted as (the limit of) a convex combination: $\displaystyle\begin{aligned} &f_{2}^{\ast\ast}(b_{1})+(f_{2}^{\ast\ast})^{\infty}(b_{2})=\lim_{\sigma\to 0^{+}}(1-\sigma)f_{2}^{\ast\ast}(b_{1})+\sigma(f_{2}^{\ast\ast})^{\infty}\Big{(}\frac{b_{2}}{\sigma}\Big{)}\\\ &\quad=\lim_{\sigma\to 0^{+}}(1-\sigma)f_{2}^{\ast\ast}(b_{1})+\sigma f_{2}^{\ast\ast}\Big{(}\frac{b_{2}}{\sigma}\Big{)}\\\ &\quad\geq\lim_{\sigma\to 0^{+}}f_{2}^{\ast\ast}\Big{(}(1-\sigma)b_{1}+\sigma\frac{b_{2}}{\sigma}\Big{)}=f_{2}^{\ast\ast}(b_{1}+b_{2})\end{aligned}$ (see also [9, p. 685]). Conversely, if $b_{1}=b$ is optimal, then $g(a,b)=f_{1}(a)f_{2}^{\ast\ast}(b)\leq f_{1}^{\rm min}(f_{2}^{\ast\ast})^{\infty}(b)$, the latter term being the competitor for the choice $b_{2}=b$. Since $(f_{2}^{\ast\ast})^{\infty}(b)$ approximates $f_{2}^{\ast\ast}(b)$ for large $|b|$, this is impossible for large $|b|$ whenever $f_{1}^{\rm min}<f_{1}(a)$. ###### Example 3.3. Consider the functional $\mathcal{F}(u,v)=\int_{\Omega}(W(\nabla u)+f_{1}(u)f_{2}(v))\,dx$ subject to the constraints $\int_{\Omega}u\,dx=|\Omega|,\quad\int_{\bar{\Omega}}v\,dx=1,$ with integrands given by $W(\nabla u):=(|\nabla u|^{2}+1)^{\frac{1}{2}},\quad f_{1}(u):=2-\exp(-u^{2}),\quad\text{and}\quad f_{2}(v):=|v|.$ Notice that $W$ and $f_{2}$ are convex, $W^{\infty}=|\cdot|$, $f_{2}=f_{2}^{\infty}=|\cdot|$, $f_{1}^{\rm min}=f_{1}(0)=1\leq f_{1}\leq 2$ and (3.22) $\displaystyle g(a,b)=\min_{b_{1}+b_{2}=b}\Big{(}f_{1}(a)|b_{1}|+f_{1}^{\rm min}\,|b_{2}|\Big{)}=|b|.$ In this class, the associated functional ${\mathcal{F}}$ is coercive in $W^{1,1}(\Omega)\times L^{1}(\Omega)$. The associated relaxed functional is $\displaystyle\overline{\mathcal{F}}(u,v)=\int_{\Omega}W(\nabla u)\,dx+\int_{\Omega}d|D^{s}u|+|v|(\bar{\Omega}),\quad(u,v)\in BV(\Omega)\times\mathcal{M}(\bar{\Omega}),$ subject to the appropriately extended constraint (3.23) $\displaystyle\int_{\Omega}u\,dx=|\Omega|,\quad v(\bar{\Omega})=1.$ Notice that $u$ and $v$ are fully decoupled in $\overline{\mathcal{F}}$, while $\mathcal{F}$ clearly had coupling in the second term. In addition, $\inf\big{\\{}\overline{\mathcal{F}}(u,v)\,\mid\,u\in BV(\Omega),~{}v\in\mathcal{M}(\bar{\Omega}),~{}\text{\eqref{ex:constraints} holds}\big{\\}}=1=\overline{\mathcal{F}}(u^{*},v^{*}),$ where the minimizers are fully characterized by $\displaystyle u^{*}=1,\quad v^{*}\geq 0,\quad v^{*}(\bar{\Omega})=1.$ In particular, purely singular measures, for example $v^{*}=\delta_{x_{0}}$ with some $x_{0}\in\bar{\Omega}$, appear among the minimizers. ###### Remark 3.4 (Concentration can be forced for minimizing sequences). In Example 3.3, for all limit states $(u,v)\in BV\times{\mathcal{M}}$ with $u(x)\neq 0$ for a.e. $x\in\Omega$ (in particular, for $u=u^{*}=1$), each associated recovery sequence $v_{k}$ is purely concentrating in the sense that $v_{k}\to 0$ in measure, while simultaneously $\int_{\Omega}v_{k}(x)\,dx\to v(\bar{\Omega})=1$. This holds for _all_ recovery sequences $(u_{k},v_{k})$ associated to $(u,v)$ with $u\neq 0$ a.e., even if $v$ is absolutely continuous with respect to ${\mathcal{L}}^{n}$. In particular, we can choose $(u,v)=(u^{*},v^{*})$ for an arbitrary minimizer, and therefore $v_{k}$ is purely concentrating for all minimizing sequences of the original functional ${\mathcal{F}}$. To prove this concentration effect, we briefly revisit the proof of the lower bound in Theorem 1.1 where now all estimates have to hold with equality. Let $(u_{k},v_{k})\in W^{1,1}(\Omega)\times L^{1}(\Omega)$ be a recovery sequence, i.e., such that $(u_{k},v_{k})\rightharpoonup^{*}(u,v)$ in $BV(\Omega)\times{\mathcal{M}}(\bar{\Omega})$ and $\lim_{k}\mathcal{F}(u_{k},v_{k})=\overline{\mathcal{F}}(u,v)$, and recall that we decomposed $v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$ into a purely oscillating (equiintegrable) part and a purely concentrating part, $v_{k}^{\rm osc}\rightharpoonup v_{\rm osc}$ in $L^{1}$ and $v_{k}^{\rm conc}\rightharpoonup^{*}v_{\rm conc}$ in ${\mathcal{M}}$, respectively. As long as $a\neq 0$ and thus $f_{1}(a)>f_{1}^{\rm min}$, the minimum in the definition of $g(a,b)$ (3.22) is attained if and only if $b_{1}=0$ and $b_{2}=b$. As $u(x)\neq 0$ for a.e. $x\in\Omega$, the final estimate (3.8) thus holds with equality if and only if $v_{\rm osc}(x)=0$ for a.e. $x$. In addition, the lower semicontinuity inequality of Ioffe’s Theorem (essentially) used in (3.6) holds with equality, namely, $\lim_{k}\int_{\Omega}f_{1}(u)|v_{k}^{\rm osc}|\,dx=\int_{\Omega}f_{1}(u)|v_{\rm osc}|\,dx.$ Since $f_{1}\geq 1$, this implies that $v_{k}^{\rm osc}\to 0=v_{\rm osc}$ strongly in $L^{1}$. Hence, $v_{k}=v_{k}^{\rm osc}+v_{k}^{\rm conc}$ is purely concentrating as claimed. ###### Remark 3.5. In Example 3.3, if we replace $f_{1}$ by $\tilde{f}_{1}(x,u):=(x-x_{0})^{2}+2-\exp(-u^{2}),\quad\text{with a fixed $x_{0}\in\bar{\Omega}$},$ (adding $(x-x_{0})^{2}$ to the original $f_{1}$ – a situation not covered by our theorems, but it is easy to see they extend to this case), $(u^{*},\delta_{x_{0}})$ is still a minimizer with the same minimal energy, with $u^{*}$ as defined the example and the Dirac mass $\delta_{x_{0}}$ at $x_{0}$. However, the minimizer is now unique, as it is clearly optimal to concentrate all the mass of $v$ at $x=x_{0}$ where $\tilde{f}_{1}^{\rm min}(x)=(x-x_{0})^{2}+1$ is minimal. ###### Remark 3.6 (Relaxation by means of parametrized measures). Alternatively, one can extend the functional $\mathcal{F}$ in (1.2) by continuity to a set of generalized Young measures and to define the relaxation by measures in this set or to use them just as a tool to derive relaxation in $BV$. We refer to [8] for such approach or to [27] where generalized Young measures allowing for treatment of oscillations, concentrations, and discontinuities were developed. This would allow us to give a different proof of Theorem 1.1. Nevertheless, the requirement that the recovery sequence $(\tilde{u}_{k})_{k}$ can be first chosen to provide the correct limit for $(\int_{\Omega}W(\nabla\tilde{u}_{k}(x))\,{\rm d}x)_{k}$ as in [24] which is then carefully modified to recover also the other term in the functional is essential and cannot be currently avoided. ## 4\. The 1D case: Proof of Theorem 1.2 The measure representation obtained in Proposition 2.8 for $\overline{\mathcal{F}}(u,v,\cdot)$ in (2.13), leads us to provide an integral representation for this functional in any dimension. In the case $\Omega\subset\mathbb{R}$, the proof, achieved by showing a double inequality, will make use of the blow-up method introduced in [23], taking into account the specific structure of any Radon measure defined on subsets of $\mathbb{R}$. In the one-dimensional case, it turns out that two cases have to be distinguished: the zero-dimensional contribution where the limiting measure charges individual points, and the ”diffuse” rest. Here, notice that for any finite measure $\nu$ on a set $I$, we can split $\nu=\nu^{0}+\nu^{\rm diff},$ where $\nu^{0}$ is the zero-dimensional part of $\nu$ charging points, i.e., (4.1) $\displaystyle\nu^{0}:=\nu\lfloor_{S^{0}},\quad\text{where}~{}~{}S^{0}=S^{0}(\nu):=\big{\\{}x\in I\,:\,|\nu|(\\{x\\})>0\big{\\}}.$ In particular, $\nu^{0}(\\{x_{0}\\})=\nu(\\{x_{0}\\})$ for all $x_{0}\in I$ (and zero for all but countably many), $|\nu^{0}|=|\nu|^{0}$ and $|\nu|^{\rm diff}=|\nu^{\rm diff}|$. Also recall that for a $BV$-function $u$ defined on an interval $I$, $\displaystyle Du=u^{\prime}\mathcal{L}^{1}+Du^{j}+Du^{c}=u^{\prime}\mathcal{L}^{1}+[u]\mathcal{H}^{0}\lfloor{S_{u}}+Du^{c},$ where for $\mathcal{H}^{0}$-a.e. $x\in S_{u}$ (the jump set of $u$), $[u](x):=u(x^{+})-u(x^{-})$, with $u(x^{\pm}):=\lim_{y\to x^{\pm}}u(y)$. Accordingly, $Du^{j}=(Du)^{0}$ and $Du^{\rm diff}=u^{\prime}\mathcal{L}^{1}+Du^{c}$. The proof is based on the blow-up method. Let $u\in BV(\Omega;{\mathbb{R}}^{m})$, $v\in\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$, and let $\overline{{\mathcal{F}}}_{u,v}$ denote the signed Radon measure on $\bar{\Omega}$ given by Lemma 2.8, uniquely extending the set function $\overline{{\mathcal{F}}}(u,v,\cdot)$ introduced in (2.12), (2.13), i.e., $\displaystyle\overline{{\mathcal{F}}}_{u,v}(A)=\overline{{\mathcal{F}}}(u,v,A)=\Gamma-\liminf{\mathcal{F}}(u,v,A)\quad\text{for all $A\subset\overline{\Omega}$ relatively open}.$ In view of Lemma 2.8, it is enough to rephrase and prove our claim (1.7) in terms of appropriate localized statements for appropriate densities of $\overline{{\mathcal{F}}}_{u,v}$. With the abbreviation (and the implicit convention $|Du|(\partial\Omega)=0$) $\displaystyle\theta:={\mathcal{L}}^{1}+|v|+|Du|,\quad\theta\in\mathcal{M}(\bar{\Omega}),$ we claim that (4.2) $\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}^{\rm diff}}{d\theta^{\rm diff}}(x_{0})=f_{1}(u(x_{0}))\frac{df_{2}^{\ast\ast}\big{(}v^{\rm diff}\big{)}}{d\theta^{\rm diff}}(x_{0})+\frac{dW^{\ast\ast}\big{(}(Du)^{\rm diff}\big{)}}{d\theta^{\rm diff}}(x_{0})$ for $\theta^{\rm diff}$-a.e. $x_{0}\in\Omega$, (4.3) $\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=f_{W}^{0}(u(x_{0}^{+}),u(x_{0}^{-}),v^{0}(\\{x_{0}\\}))$ $\displaystyle\quad\text{for every }x_{0}\in\Omega,$ $\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=\Big{(}\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(u(x_{0}^{+}),z,v^{0}(\\{x_{0}\\})\Big{)}$ $\displaystyle\quad\text{for }x_{0}=\inf\Omega,$ $\displaystyle\overline{{\mathcal{F}}}_{u,v}^{0}(\\{x_{0}\\})=\Big{(}\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(z,u(x_{0}^{-}),v^{0}(\\{x_{0}\\})\Big{)}$ $\displaystyle\quad\text{for }x_{0}=\sup\Omega.$ Here, $f_{2}^{\ast\ast}\big{(}v^{\rm diff}\big{)}$ and $W^{\ast\ast}\big{(}(Du)^{\rm diff}\big{)}$ are the measures defined in Subsection 2.4, and $f_{W}^{0}:{\mathbb{R}}^{m}\times{\mathbb{R}}^{m}\times{\mathbb{R}}^{d}\to{\mathbb{R}}$ is given by (1.12). As to (4.2), also notice that for $\sigma^{\rm diff}$-a.e. $x_{0}$, $x_{0}$ is not a jump point of $u$, and thus $u(x_{0}):=u(x_{0}^{+})=u(x_{0}^{-})$ is well defined. ###### Remark 4.1. It is easy to check that $f_{W}^{0}(u(x^{+}),u(x^{-}),0)=(W^{\ast\ast})^{\infty}([u](x))\quad\text{with $[u](x):=u(x^{+})-u(x^{-})$},$ i.e., the typical energy contribution of a jump of $u$ at $x$ if $v$ does not play any role. Moreover, if $a^{+}=a^{-}=:a$ and $b=0$, then $f_{W}^{0}(a,a,0)=0$, with $u\equiv a$ and $v=0$ as the obvious optimal choices for the infimum. For that reason, (4.3) is trivially correct for all points $x_{0}$ with $\theta^{0}(\\{x_{0}\\})=0$, and it provides nontrivial information only for points with $\theta^{0}(\\{x_{0}\\})>0$. The latter includes the jump points of $u$, but the most interesting case is in fact $b:=v(\\{x_{0}\\})\neq 0$. In particular, it can happen that $f_{W}^{0}(a,a,b)<f_{1}(a)(f_{2}^{\ast\ast})^{\infty}(b)$ if reducing the energy by locally creating an artificial peak in $u$ to reduce $f_{1}(u)$ at a point charged by $v$ is cheaper than the cost for the corresponding slope of $u$ paid in $(W^{\ast\ast})^{\infty}$. In any such case, associated recovery sequences will not converge strictly in $BV$. In this aspect, the case $n=1$ is fundamentally different to the case $n\geq 2$, where our construction for the upper bound in Subsection 3.2 effectively yields a strictly converging recovery sequence for $u$. ### 4.1. Lower bound Since $f_{2}\geq f_{2}^{\ast\ast}$ and $W\geq W^{\ast\ast}$, we can assume that $f_{2}$ and $W$ are convex. Let $(u_{k},v_{k})\in W^{1,1}(\Omega;{\mathbb{R}}^{m})\times L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $u_{k}\to u$ in $L^{1}(\Omega;{\mathbb{R}}^{m})$ and $v_{k}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ and assume, up to a (not relabeled) subsequence, that the limit $\lim_{k\rightarrow+\infty}\int_{\Omega}(f_{1}(u_{k})f_{2}(v_{k})+W(u_{k}^{\prime}))dx<+\infty$ exists. For every Borel set $B\subset\Omega$, define (4.4) $\displaystyle\mu_{k}(B)=\int_{B}(f_{1}(u_{k})f_{2}(v_{k})+W(u_{k}^{\prime}))dx.$ Since the functions are nonnegative and $(H_{1})-(H_{3})$ hold, the sequences $(\mu_{k})$ and $(|v_{k}|+|Du_{k}|)$ of nonnegative Radon measures, being uniformly bounded in $\mathcal{M}(\Omega)$, admit two (not relabeled) subsequences weakly∗ converging to two nonnegative finite Radon measure $\mu$ and $\lambda$, i.e. (4.5) $\displaystyle\mu_{k}\overset{\ast}{\rightharpoonup}\mu\quad\text{and}\quad|v_{k}|+|Du_{k}|\overset{\ast}{\rightharpoonup}\lambda\quad\text{in $\mathcal{M}(\bar{\Omega})$}.$ We decompose $\mu$ as the sum of two mutually singular measures as described above, $\mu=\mu^{0}+\mu^{\rm diff}$, such that $|\mu^{0}|$ is the atomic part concentrating on points and $\mu^{\rm diff}$ is the remaining diffuse part. Notice that, as a consequence of the coercivity conditions in $(H_{1})$–$(H_{3})$, $|v|+|Du|+{\mathcal{L}}^{1}<<\mu$ and $|\mu|<<{\mathcal{L}}^{1}+\lambda$. On the other hand, Lemma 2.8, implies that a density of $\mu^{\rm diff}$ can be computed as a Radon-Nykodim derivative with respect to $\theta^{\rm diff}={\mathcal{L}}^{1}+|Du^{\rm diff}|+|v^{\rm diff}|$, and, if $x_{0}$ is a jump point of $u$ (i.e. $|Du|(\\{x_{0}\\})>0$), or $|v|(\\{x_{0}\\})>0$, then $x_{0}\in S^{0}(\mu)$, set of atomic contributions defined in (4.1). We now treat diffuse and atomic contributions in $\mu$ separately. Throughout, we use the intervals $I_{x_{0},\varepsilon}:=(x_{0}-\varepsilon,x_{0}+\varepsilon)\quad\text{and}\quad I:=(-1,1)$ where $x_{0}\in\Omega$ and $\varepsilon>0$ is small enough so that $I_{x_{0},\varepsilon}\subset\Omega$. ### Diffuse contributions Let $x_{0}$ be a point with $0=\lambda(\\{x_{0}\\})$ such that the measures $\mu$, $f_{2}(v)$ and $W(Du)$ have a finite density with respect to $\theta^{\rm diff}$ at $x_{0}$, i.e, $\frac{d\mu}{d\theta^{\rm diff}}(x_{0})=\lim_{\varepsilon\rightarrow 0}\frac{\mu(I_{x_{0},\varepsilon})}{\theta^{\rm diff}(I_{x_{0},\varepsilon})}<+\infty,$ $\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})=\lim_{\varepsilon\rightarrow 0}\frac{f_{2}(v)(I_{x_{0},\varepsilon})}{\theta^{\rm diff}(I_{x_{0},\varepsilon})}<+\infty,\quad\text{and}\quad\frac{dW(Du)}{d\theta^{\rm diff}}(x_{0})=\lim_{\varepsilon\rightarrow 0}\frac{W(Du)(I_{x_{0},\varepsilon})}{\theta^{\rm diff}(I_{x_{0},\varepsilon})}<+\infty.$ In particular, $0=|\mu|(\\{x_{0}\\})=|Du|(\\{x_{0}\\})=|v|(\\{x_{0}\\})=W(Du)(\\{x_{0}\\})=f_{2}(v)(\\{x_{0}\\})$, $\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})=\frac{df_{2}(v^{\rm diff})}{d\theta^{\rm diff}}(x_{0})$ and $\frac{dW(Du)}{d\theta^{\rm diff}}(x_{0})=\frac{dW(Du^{\rm diff})}{d\theta^{\rm diff}}(x_{0})$. Notice that these properties hold for $\theta^{\rm diff}$-a.e. $x_{0}\in\Omega$. To shorten the notation when calculating densities with respect to $\theta^{\rm diff}$, below, we will use the abbreviation $\vartheta_{x_{0},\varepsilon}:=\theta^{\rm diff}(I_{{x_{0}},\varepsilon})\geq{\mathcal{L}}^{1}(I_{{x_{0}},\varepsilon})=2\varepsilon.$ Take a sequence $\varepsilon\rightarrow 0^{+}$ such that $\mu\left(\\{x_{0}-\varepsilon,x_{0}+\varepsilon\\}\right)=\lambda(\\{x_{0}-\varepsilon,x_{0}+\varepsilon\\})=0$. Thus $\mu(\partial I_{x_{0},\varepsilon})=0$, and by definition of $\mu$ and a changes of variables, (4.6) $\displaystyle\begin{aligned} &\frac{d|\mu|}{d\theta^{\rm diff}}(x_{0})=\lim_{\varepsilon\to 0}\frac{\mu(I_{x_{0},\varepsilon})}{\vartheta_{x_{0},\varepsilon}}\\\ &=\lim_{\varepsilon\to 0}\lim_{k\to+\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}f_{1}(u_{k}(y))f_{2}(v_{k}(y))+W(u_{k}^{\prime}(y))\,dy\\\ &=\lim_{\varepsilon\rightarrow 0}\lim_{k\rightarrow+\infty}\int_{I_{0,\varepsilon\vartheta_{x_{0},\varepsilon}^{-1}}}f_{1}(u_{k}(x_{0})+\vartheta_{x_{0},\varepsilon}w_{k,\varepsilon}(x))f_{2}(\eta_{k,\varepsilon}(x))+W(w_{k,\varepsilon}^{\prime}(x))\,dx\end{aligned}$ where $w_{k,\varepsilon}(x):=\frac{u_{k}(x_{0}+\vartheta_{x_{0},\varepsilon}x)-u_{k}(x_{0})}{\vartheta_{x_{0},\varepsilon}}\quad\text{and}\quad\eta_{k,\varepsilon}(x):=v_{k}(x_{0}+\vartheta_{x_{0},\varepsilon}x)$ Choosing a sequence $\hat{\varepsilon}(k)>0$ with $\hat{\varepsilon}(k)\to 0$ slow enough, we see that for every sequence $\varepsilon(k)\to 0^{+}$ with $\varepsilon(k)\geq\hat{\varepsilon}(k)$, (4.7) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm diff}}(x_{0})&=\lim_{k\rightarrow+\infty}\int_{I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}}f_{1}(u_{k}(x_{0})+\vartheta_{x_{0},\varepsilon(k)}w_{k,\varepsilon(k)})f_{2}(\eta_{k,\varepsilon(k)})+W(w_{k,\varepsilon(k)}^{\prime})\,dx\end{aligned}$ By coercivity of $W$ and the fact that $\frac{d|\mu|}{d\theta^{\rm diff}}(x_{0})$ is finite, we infer that $\int_{I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}}|w_{k,\varepsilon(k)}^{\prime}|(x)\,dx$ is bounded, and since $w_{k,\varepsilon(k)}(0)=0$, this entails that $w_{k,\varepsilon(k)}$ is bounded on $I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}$ by a constant independent of $k$. Hence, (4.8) $\displaystyle\vartheta_{x_{0},\varepsilon(k)}w_{k,\varepsilon(k)}(x)\to 0\quad\text{uniformly in $x\in I_{0,\varepsilon(k)\vartheta_{x_{0},\varepsilon(k)}^{-1}}$}.$ In addition, we claim that (4.9) $\displaystyle u_{k}(x_{0})\to u(x_{0}),$ essentially because $|Du|\leq w^{*}-\lim|Du_{k}|\leq\lambda$ and $\lambda(\\{x_{0}\\})=0$. For a proof of (4.9), first recall that $u_{k}\to u$ in $L^{1}$, and thus pointwise a.e. for a subsequence. We can therefore choose a sequence $x_{j}\to x_{0}$ with, say, $x_{j}\geq x_{0}$, such that $u_{k}(x_{j})\to u(x_{j})\quad\text{as $k\to\infty$, for each $j$.}$ Since $\displaystyle\begin{aligned} |u_{k}(x_{0})-u(x_{0})|&\leq|u_{k}(x_{j})-u(x_{j})|+|u_{k}(x_{0})-u_{k}(x_{j})|+|u(x_{0})-u(x_{j})|\\\ &\leq|u_{k}(x_{j})-u(x_{j})|+(|Du_{k}|+|Du|)([x_{0},x_{j}]),\end{aligned}$ we obtain (4.9) passing to the limit, first as $k\to\infty$ and then as $j\to\infty$: $\displaystyle\begin{aligned} \limsup_{k\to\infty}|u_{k}(x_{0})-u(x_{0})|&\leq(\lambda+|Du|)([x_{0},x_{j}])\leq 2\lambda([x_{0},x_{j}])\underset{j\to\infty}{\longrightarrow}2\lambda(\\{x_{0}\\})=0.\end{aligned}$ Combining (4.8) and (4.9) with the fact that $f_{1}$ is uniformly continuous on bounded subsets of ${\mathbb{R}}^{m}$, we can replace the argument of $f_{1}$ by $u(x_{0})$ in (4.7). Retracing our steps to (4.6), we conclude that (4.10) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm diff}}(x_{0})&\geq\liminf_{\varepsilon\to 0^{+}}\lim_{k\to+\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}f_{1}(u(x_{0}))f_{2}(v_{k}(y))+W(u_{k}^{\prime}(y))\,dy.\end{aligned}$ On the right hand side of (4.10), for fixed $\varepsilon$, we can apply standard lower semicontinuity results with respect to weak∗-convergence in ${\mathcal{M}}$ and $BV$, respectively, exploiting that $f_{2}$ and $W$ are convex and that $|v|(\partial I_{x_{0},\varepsilon})=|Du|(\partial I_{x_{0},\varepsilon})=0$ for all but at most countably many $\varepsilon$. This yields that (4.11) $\displaystyle\begin{aligned} \frac{d|\mu|}{d\theta^{\rm diff}}(x_{0})&\geq\liminf_{\varepsilon\to 0^{+}}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{I_{x_{0},\varepsilon}}\big{(}f_{1}(u(x_{0}))df_{2}(v)(y)+dW(Du)(y)\big{)}\\\ &=f_{1}(u(x_{0}))\frac{df_{2}(v^{\rm diff})}{d\theta^{\rm diff}}(x_{0})+\frac{dW(Du^{\rm diff})}{d\theta^{\rm diff}}(x_{0}).\end{aligned}$ As this holds for all sequences $(u_{k},v_{k})$ admissible in the definition of $\overline{{\mathcal{F}}}(u,v,\cdot)$, (4.11) implies the lower bound (”$\geq$”) in (4.2). ### Contributions charging individual points in the interior We claim that (4.12) $\displaystyle\mu^{0}(\\{x_{0}\\})\geq f_{W}^{0}\left(u(x_{0}^{+}),u(x_{0}^{-}),v(\\{x_{0}\\})\right)\quad\hbox{ for all }x_{0}\in\Omega\cap S^{0}(\mu),$ which directly implies the lower bound (”$\geq$”) in (4.3). Here, $f_{W}^{0}$ is defined by (1.12), i.e., (4.17) $\displaystyle f_{W}^{0}(a^{+},a^{-},b)=\inf_{\begin{array}[]{ll}u\in W^{1,1}((-1,1);{\mathbb{R}}^{m}),\\\ v\in L^{1}((-1,1);{\mathbb{R}}^{d})\\\ u(-1)=a^{-},~{}~{}u(1)=a^{+},\\\ \int_{-1}^{1}vdx=b\end{array}}\left\\{\int_{-1}^{1}(f_{1}(u)(f_{2}^{\ast\ast})^{\infty}(v)+(W^{\ast\ast})^{\infty}(u^{\prime}))dx\right\\}.$ Let $x_{0}\in S^{0}(\mu)$. Since $u\in BV$ on a one-dimensional domain, $u(x_{0}^{+})$ and $u(x_{0}^{-})$ exist in $\mathbb{R}^{m}$ (and outside of the jump set of $u$, they are equal). In the following let $(\varepsilon)$ denote a sequence of positive reals converging to $0$ such that (4.18) $\displaystyle|v|(\\{x_{0}\pm\varepsilon\\})=|Du|(\\{x_{0}\pm\varepsilon\\})=\mu(\\{x_{0}\pm\varepsilon\\})=0.$ By virtue of dominated convergence, $\mu(\\{x_{0}\\})=\lim_{\varepsilon\to 0^{+}}\mu(I_{x_{0},\varepsilon})$, and by (4.5), (4.4) and a change of variables, we have that (4.19) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to 0^{+}}\lim_{k\to+\infty}\varepsilon\int_{I}\left(f_{1}(u_{k}(x_{0}+\varepsilon y))f_{2}(v_{k}(x_{0}+\varepsilon y))+W(u^{\prime}_{k}(x_{0}+\varepsilon y))\right)dy,$ where $I=(-1,1)$ as before. Next, let $v_{k,\varepsilon}(y):=v_{k}(x_{0}+\varepsilon y).$ Since $v_{k}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(\bar{\Omega};{\mathbb{R}}^{d})$ and $|v|(\\{x_{0}\pm\varepsilon\\})=0$ by (4.18), for fixed $\varepsilon$, $\int_{I}\varepsilon v_{k,\varepsilon}(y)dy=\int_{I_{x_{0},\varepsilon}}v_{k}\,dx\underset{k\to\infty}{\longrightarrow}v(I_{x_{0},\varepsilon})$ As $\varepsilon\to 0^{+}$, we conclude that $\displaystyle\lim_{\varepsilon\to 0^{+}}\lim_{k\to+\infty}\int_{I}\varepsilon v_{k,\varepsilon}(y)dy=v(\\{x_{0}\\}).$ A diagonalization argument now ensures the existence of a sequence $\overline{v}_{\varepsilon}:=v_{k(\varepsilon),\varepsilon}$ such that (4.20) $\displaystyle\lim_{\varepsilon\to 0^{+}}\int_{I}\varepsilon\overline{v}_{\varepsilon}(y)dy=v(\\{x_{0}\\}).$ On the other hand, for $u_{k,\varepsilon}(y):=u_{k}(x_{0}+\varepsilon y)$, it is easily seen that (4.23) $\displaystyle\lim_{\varepsilon\to 0^{+}}\lim_{k\to+\infty}\|u_{k,\varepsilon}-u^{\pm}\|_{L^{1}(I)}=0,\quad\text{where}\quad u^{\pm}(y)=\left\\{\begin{array}[]{ll}u(x_{0}^{+}),\hbox{ if }y\geq 0,\\\ u(x_{0}^{-}),\hbox{ if }y<0.\end{array}\right.$ In addition, defining $\overline{u}_{\varepsilon}:=u_{k(\varepsilon),\varepsilon},\quad\overline{v}_{\varepsilon}:=v_{k(\varepsilon),\varepsilon},$ with a suitable $k(\varepsilon)\to+\infty$ (fast enough), we can rewrite (4.19) as (4.24) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to 0^{+}}\varepsilon\left(\int_{I}f_{1}(\overline{u}_{\varepsilon}(y))f_{2}(\overline{v}_{\varepsilon}(y))+W\left(\frac{1}{\varepsilon}\overline{u}_{\varepsilon}^{\prime}(y)\right)\right)dy.$ Further defining $\displaystyle\hat{v}_{\varepsilon}(y):=\varepsilon\overline{v}_{\varepsilon}(y)-\varepsilon\int_{I}\overline{v}_{\varepsilon}dy+v(\\{x_{0}\\}),$ we observe that (4.25) $\displaystyle|\hat{v}_{\varepsilon}(y)-\varepsilon\overline{v}_{\varepsilon}(y)|=\left|\int_{I}\varepsilon\overline{v}_{\varepsilon}(y)dy-v(\\{x_{0}\\})\right|\to 0\hbox{ as }\varepsilon\to 0.$ Together with the global Lipschitz continuity of $f_{2}$, (4.25) justifies replacing $\overline{v}_{\varepsilon}$ by $\frac{1}{\varepsilon}\hat{v}_{\varepsilon}$ in (4.24), which gives $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to 0^{+}}\int_{I}\left(f_{1}(\overline{u}_{\varepsilon}(y))\varepsilon f_{2}\Big{(}\frac{1}{\varepsilon}\hat{v}_{\varepsilon}(y)\Big{)}+\varepsilon W\left(\frac{1}{\varepsilon}\overline{u}_{\varepsilon}^{\prime}(y)\right)\right)dy.$ Above, we may replace $f_{2}$ and $W$ by their recession functions in (4.26), using (2.8) with $h=f_{2}$ and $h=W$ (both convex with linear growth) together with the fact that both $\hat{v}_{\varepsilon}$ and $\bar{u}^{\prime}_{\varepsilon}$ are bounded in $L^{1}$. Therefore, (4.26) $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to 0^{+}}\int_{I}\left(f_{1}(\overline{u}_{\varepsilon}(y))f_{2}^{\infty}(\hat{v}_{\varepsilon}(y))+W^{\infty}(\overline{u}_{\varepsilon}^{\prime}(y))\right)dy.$ As $\int_{I}\hat{v}_{\varepsilon}=v(\\{x_{0}\\})$ by construction, $\hat{v}_{\varepsilon}$ is admissible in the infimum defining $f_{W}^{0}$ in (4.17) (in place of $v$). Applying Lemma 2.3 to the integrand $f_{1}f_{2}^{\infty}+W^{\infty}$, we modify $\overline{u}_{\varepsilon}$ into a function ${\hat{u}}_{\varepsilon}$ which has the same values as $u^{\pm}$ on $\\{\pm 1\\}$, cf. (4.23). Thus, the new function $\hat{u}_{\varepsilon}$ is also admissible in (4.17) (in place of $u$) and we obtain (4.12) from (4.26), more precisely, $\displaystyle\mu(\\{x_{0}\\})\geq\lim_{\varepsilon\to 0^{+}}\int_{I}\left(f_{1}({\hat{u}}_{\varepsilon}(y))f_{2}^{\infty}(\hat{v}_{\varepsilon})+W^{\infty}({\hat{u}}_{\varepsilon}^{\prime}(y))\right)dy\geq f_{W}^{0}\left(u(x_{0}^{+}),u(x_{0}^{-}),v(\\{x_{0}\\})\right).$ ### Contributions charging boundary points Let $x_{0}\in\partial\Omega$, say, $x_{0}=\inf\Omega$ (the other case is analogous). Passing to a subsequence if necessary, we may assume that $z:=\lim u_{k}(x_{0})$ exists. By extending $u_{k}(x):=u_{k}(x_{0})$ and $v_{k}(x):=0$ for all $x<x_{0}$, which leads to $d\mu_{k}(x)=f_{1}(u_{k}(x_{0}))f_{2}(0)dx$, $d\mu(x)=f_{1}(z)f_{2}(0)dx$ and $d\lambda(x)=0$ for $x<x_{0}$, we can argue as for interior points, with $u(x_{0}^{-})=z$. ### 4.2. Upper bound Let $(u,v)\in BV(\Omega;{\mathbb{R}}^{m})\times{\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$. As before, without loss of generality (see Proposition 2.6), $f_{2}$ and $W$ can be assumed to be convex, and we can use the representaion (2.15) of $\overline{\mathcal{F}}=\overline{\mathcal{F}}_{\ast\ast}$ obtained in Proposition 2.7. By Lemma 2.8 it is enough to prove the upper bounds for the density of $\overline{{\mathcal{F}}}_{u,v}$ with respect to the atomic and diffuse parts of $\theta=\theta^{0}+\theta^{\rm diff}$. We therefore have to show that (4.27) $\displaystyle\begin{aligned} \frac{d\overline{{\mathcal{F}}}_{u,v}}{d\theta^{\rm diff}}(x_{0})\leq f_{1}(u(x_{0}))\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})+\frac{dW(Du)}{d\theta^{\rm diff}}(x_{0})\end{aligned}$ for $\theta^{\rm diff}$-a.e. $x_{0}\in\Omega$, (4.28) $\displaystyle\begin{aligned} \overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq f_{W}^{0}\left(u^{+}(x_{0}),u^{-}(x_{0}),v(\\{x_{0}\\})\right)\end{aligned}$ for every $x_{0}\in\Omega$, $\displaystyle\begin{aligned} \overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\left(z,u^{-}(x_{0}),v(\\{x_{0}\\})\right)\end{aligned}$ for $x_{0}=\sup\Omega$, and $\displaystyle\begin{aligned} \overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}\left(u^{+}(x_{0}),z,v(\\{x_{0}\\})\right)\end{aligned}$ $\displaystyle\quad\text{for $x_{0}=\inf\Omega$}.$ Here, recall that $\theta={\mathcal{L}}^{1}+|v|+|Du|\in{\mathcal{M}}(\overline{\Omega})$ (with $|Du|(\partial\Omega):=0$). ### Diffuse contributions As before, we denote $I_{{x_{0}},\varepsilon}:=(x_{0}-\varepsilon,x_{0}+\varepsilon)$ and $\vartheta_{x_{0},\varepsilon}:=\theta^{\rm diff}(I_{{x_{0}},\varepsilon})$. We only consider $x_{0}\in\Omega$ such that the Besicovitch derivatives $\frac{d\overline{\mathcal{F}}(u,v,\cdot)}{d\theta^{\rm diff}}(x_{0})$, $\frac{df_{2}(v)}{d\theta^{\rm diff}}(x_{0})$ and $\frac{dW(Du)}{d\theta^{\rm diff}}(x_{0})$ exist with finite values. In particular, $|v|(\\{x_{0}\\})=|Du|(\\{x_{0}\\})=0$, $x_{0}$ is not a jump point of $u$, $u$ has a representative which is continuous at $x_{0}$ and $\vartheta_{x_{0},\varepsilon}\to 0$ as $\varepsilon\to 0$. For the proof of (4.27), by Proposition 2.7 (with $f=f^{\ast\ast}$ and $W=QW$), it suffices to find a sequence $v_{k}\subset L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $v_{k}\rightharpoonup^{*}v$ in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$ and (4.29) $\displaystyle\begin{aligned} &\liminf_{\varepsilon\to 0}\limsup_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u)f_{2}(v_{k})\,dx+dW(Du)(x)\\\ &\qquad\leq\lim_{\varepsilon\to 0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u(x_{0}))df_{2}(v)(x)+dW(Du)(x).\end{aligned}$ As the contribution of $W(Du)$ appears on both sides, (4.29) can be reduced to (4.30) $\displaystyle\begin{aligned} \liminf_{\varepsilon\to 0}\limsup_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u)f_{2}(v_{k})\,dx&\leq f_{1}(u(x_{0}))\lim_{\varepsilon\to 0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v).\end{aligned}$ We choose $(v_{k})\subset L^{1}(\Omega;{\mathbb{R}}^{d})$ such that $v_{k}\to v$ area-strictly in ${\mathcal{M}}(\overline{\Omega};{\mathbb{R}}^{d})$, for instance using Lemma 2.5. To prove (4.30), first observe that (4.31) $\displaystyle|u(x)-u(x_{0})|\leq\Big{|}\int_{x_{0}}^{x}d|Du|\Big{|}\leq\vartheta_{x_{0},\varepsilon}\quad\text{for all $x$ with $|x-x_{0}|<\varepsilon$ and $|Du(\\{x\\})=0|$}.$ Here, we excluded the case $|Du(\\{x\\})|>0$ to ensure that $u(x)$ is well defined; this certainly holds for ${\mathcal{L}}^{1}$-a.e. $x$. Since $f_{1}$ is continuous and $\vartheta_{x_{0},\varepsilon}\to 0$ as $\varepsilon\to 0$, (4.31) implies that (4.32) $\displaystyle\big{\|}f_{1}(u(\cdot))-f_{1}(u(x_{0}))\big{\|}_{L^{\infty}(I_{{x_{0}},\varepsilon})}\to 0\quad\text{as $\varepsilon\to 0$}.$ Moreover, as $v\mapsto\int df_{2}(v)$ is continuous with respect to area- strict convergence by Proposition 2.1, (4.33) $\displaystyle\lim_{k\to\infty}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{2}(v_{k})\,dx=\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v)\quad\text{if $v(\\{x_{0}+\varepsilon\\})=v(\\{x_{0}-\varepsilon\\})=0$.}$ (While $v_{k}\to v$ area-strictly on $\overline{\Omega}$ by construction, this in general only implies area strict-convergence on the smaller set $I_{{x_{0}},\varepsilon}$ if $v$ does not charge its boundary.) Clearly, all but countably many $\varepsilon$ satisfy the restriction required in (4.33), and thus (4.34) $\displaystyle\liminf_{\varepsilon\to 0}\lim_{k\to\infty}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{2}(v_{k})\,dx=\lim_{\varepsilon\to 0}\frac{1}{\vartheta_{x_{0},\varepsilon}}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}df_{2}(v).$ Combined, (4.32) and (4.34) imply (4.30). ### Contributions charging individual points in the interior As pointed out before, we may assume w.l.o.g. that $f_{2}$ and $W$ are convex. In addition, we will exploit that with $\tilde{u}(x)=u\big{(}\tfrac{1}{\varepsilon}(x-x_{0})\big{)}$ and $\tilde{v}(x)=\tfrac{1}{\varepsilon}v\big{(}\tfrac{1}{\varepsilon}(x-x_{0})\big{)}$, by a change of variables and the positive $1$-homogeneity of the recession functions, the definition of $f_{W}^{0}$ in (4.17) is equivalent to (4.39) $\displaystyle f_{W}^{0}(a^{+},a^{-},b)=\inf_{\begin{array}[]{ll}\tilde{u}\in W^{1,1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m}),\\\ \tilde{v}\in L^{1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{d}),\\\ \tilde{u}(x_{0}\pm\varepsilon)=a^{\pm},\\\ \int_{I_{x_{0},\varepsilon}}\tilde{v}dx=b\end{array}}\left\\{\int_{I_{x_{0},\varepsilon}}\big{(}f_{1}(\tilde{u})(f_{2}^{\ast\ast})^{\infty}\big{(}\tilde{v}\big{)}+(W^{\ast\ast})^{\infty}\big{(}\tilde{u}^{\prime}\big{)}\big{)}dx\right\\},$ independently of the choice of $\varepsilon>0$ and $x_{0}\in{\mathbb{R}}^{n}$. Here, recall that $I_{x_{0},\varepsilon}=(x_{0}-\varepsilon,x_{0}+\varepsilon)$. Let $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in\mathcal{M}(\Omega;\mathbb{R}^{d})$, and fix $x_{0}\in\Omega$. We want to show that (4.28) holds, i.e., that (4.40) $\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}}{d\delta_{x_{0}}}(x_{0})=\overline{{\mathcal{F}}}_{u,v}(\\{x_{0}\\})\leq f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),v(\\{x_{0}\\})).$ Here, $u(x_{0}^{-})$ and $u(x_{0}^{+})$ denote the left and right hand side limits of $u$ at $x_{0}$. In particular, $Du(\\{x_{0}\\})=u(x_{0}^{+})-u(x_{0}^{-})$. The equality in (4.40) is a trivial consequence of Lebesgue’s dominated convergence theorem, as $\overline{{\mathcal{F}}}_{u,v}$ is a finite measure. It therefore suffices to show the inequality. For each $\varepsilon>0$ we choose $(U_{\varepsilon},V_{\varepsilon})\in W^{1,1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m})\times L^{1}(I_{x_{0},\varepsilon};{\mathbb{R}}^{m})$ admissible and almost optimal for the infimum defining $f_{W}^{0}$ in (4.39), with $a^{\pm}:=u(x_{0}^{\pm})$ and $b:=v(\\{x_{0}\\})=\lim_{\varepsilon\to 0}v(I_{x_{0},\varepsilon})$, so that (4.41) $\displaystyle f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b)+\varepsilon\geq\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(U_{\varepsilon})f_{2}^{\infty}(V_{\varepsilon})+W^{\infty}(U^{\prime}_{\varepsilon})\,dx.$ In (4.41), we may also assume without loss of generality that $f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b)$ is finite. Hence, (4.41) implies that $U_{\varepsilon}^{\prime}$ is bounded in $L^{1}$ by the coercivity of $W^{\infty}$ inherited from $W$. We define $u_{\varepsilon}\in BV(\Omega;{\mathbb{R}}^{m})$ as the unique function satisfying (4.44) $\displaystyle Du_{\varepsilon}=\left\\{\begin{array}[]{ll}Du&\text{on $\Omega\setminus I_{x_{0},\varepsilon}$},\\\ DU_{\varepsilon}&\text{on $I_{x_{0},\varepsilon}$},\end{array}\right.\quad\text{and}\quad u_{\varepsilon}((x_{0}-\varepsilon)^{+})=a^{-}=u(x_{0}^{-}).$ As $U_{\varepsilon}(x_{0}-\varepsilon)=a^{-}$ (recall that $U_{\varepsilon}$ is admissible in (4.17)), this entails that $u_{\varepsilon}=U_{\varepsilon}$ on $I_{x_{0},\varepsilon}$. In addition, (4.47) $\displaystyle u_{\varepsilon}(x)-u(x)=\left\\{\begin{array}[]{ll}u(x_{0}^{-})-u((x_{0}-\varepsilon)^{+}){}{}&\text{for $x<x_{0}-\varepsilon$,}\\\ u(x_{0}^{+})-u((x_{0}+\varepsilon)^{-}){}{}&\text{for $x>x_{0}+\varepsilon$,}\end{array}\right.$ whence (4.48) $\displaystyle\big{\|}u_{\varepsilon}-u\big{\|}_{L^{\infty}(\Omega\setminus I_{x_{0},\varepsilon};{\mathbb{R}}^{m})}\underset{\varepsilon\to 0}{\longrightarrow}0.$ Since $u_{\varepsilon}$ is a bounded sequence in $BV$, (4.48) implies that $u_{\varepsilon}\rightharpoonup^{*}u$ in $BV(\Omega;{\mathbb{R}}^{m})$. For the measure $v$, we define the analogous approximation (4.51) $\displaystyle v_{\varepsilon}:=\left\\{\begin{array}[]{ll}v&\text{on $\Omega\setminus I_{x_{0},\varepsilon}$},\\\ V_{\varepsilon}&\text{on $I_{x_{0},\varepsilon}$}.\\\ \end{array}\right.$ Since $\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}V_{\varepsilon}\,dx=b=\frac{dv}{d\delta_{x_{0}}}(x_{0})$ and $V_{\varepsilon}$ is bounded in $L^{1}$ by (4.41) and the coercivity of $f_{2}$, $v_{\varepsilon}\rightharpoonup^{*}v|_{\Omega\setminus\\{x_{0}\\}}+b\delta_{x_{0}}=v$. To show the upper bound (4.40), we first consider the case $v\in L^{1}(\Omega\setminus\\{x_{0}\\};{\mathbb{R}}^{d})$, so that $(u_{\varepsilon},v_{\varepsilon})\in BV(\Omega;{\mathbb{R}}^{m})\times L^{1}(\Omega;{\mathbb{R}}^{d})$ and (4.52) $\displaystyle\frac{d\overline{{\mathcal{F}}}_{u,v}}{d\delta_{x_{0}}}(\\{x_{0}\\})\leq\limsup_{r\to 0}\limsup_{\varepsilon\to 0}\int_{x_{0}-r}^{x_{0}+r}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx,$ since $(u_{\varepsilon},v_{\varepsilon})$ is admissible in the infimum in the representation of $\overline{\mathcal{F}}=\overline{\mathcal{F}}_{\ast\ast}$ obtained in Proposition 2.7. The case of a general $v\in{\mathcal{M}}(\Omega;{\mathbb{R}}^{d})$ is easily recovered with an additional approximation argument, mollifying $\tilde{v}:=v-v(\\{x_{0}\\})\delta_{x_{0}}$. In (4.52), we may assume w.l.o.g. that $r=\varepsilon$: As $u_{\varepsilon}^{\prime}=u^{\prime}$ and $v_{\varepsilon}=v$ on $\Omega\setminus I_{x_{0},\varepsilon}$, and $u_{\varepsilon}-u\to 0$ uniformly on $\Omega\setminus I_{x_{0},\varepsilon}$, the integral on $I_{r}\setminus I_{x_{0},\varepsilon}$ converges to zero as $\varepsilon\leq r\to 0$. It therefore suffices to show that (4.53) $\displaystyle\limsup_{\varepsilon\to 0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx\leq f_{W}^{0}(u(x_{0}^{-}),u(x_{0}^{+}),b_{0}).$ Since $f_{2}$ and $W$ are convex, we have that $f_{2}(v_{\varepsilon})\leq f_{2}(0)+f_{2}^{\infty}(v_{\varepsilon})$ and $W(u^{\prime}_{\varepsilon})\leq W(0)+W^{\infty}(u^{\prime}_{\varepsilon})$. Consequently, also exploiting that $f_{1}(u_{\varepsilon})$ is uniformly bounded, (4.54) $\displaystyle\limsup_{\varepsilon\to 0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx\leq\limsup_{\varepsilon\to 0}\int_{x_{0}-\varepsilon}^{x_{0}+\varepsilon}f_{1}(u_{\varepsilon})f_{2}^{\infty}(v_{\varepsilon})+W(u^{\prime}_{\varepsilon})\,dx$ As $u_{\varepsilon}=U_{\varepsilon}$ and $v_{\varepsilon}=V_{\varepsilon}$ on $I_{x_{0},\varepsilon}$ by construction, (4.54) combined with (4.41) implies (4.53). ### Contributions charging points on the boundary Let $x_{0}\in\partial\Omega$, say, $x_{0}=\inf\Omega$ (the other case is analogous). For any $\delta>0$ we can choose $z_{0}=z_{0}(\delta)\in{\mathbb{R}}^{m}$ such that $f_{W}^{0}(u(x_{0}^{+}),z_{0},v^{0}(\\{x_{0}\\}))\leq\delta+\inf_{z\in{\mathbb{R}}^{m}}f_{W}^{0}(u(x_{0}^{+}),z,v^{0}\\{x_{0}\\}).$ The preceding construction for interior points is easily adapted with $u(x_{0}^{-}):=z_{0}$, we omit the details. It yields that $\displaystyle\overline{\mathcal{F}}(u,v)(\\{x_{0}\\})\leq f_{W}^{0}\left(u^{+}(x_{0}),z_{0},v(\\{x_{0}\\})\right)+\delta.$ As this holds for all $\delta>0$, we obtain the assertion. ## Appendix A Proofs of auxiliary results Here, we present the proofs of some of the auxiliary results collected in Section 2. ###### Proof of Proposition 2.6. Clearly, it suffices to prove $\overline{\mathcal{F}}(\cdot,\cdot,\cdot)\leq\overline{\mathcal{F}}_{\ast\ast}(\cdot,\cdot,\cdot)$, the opposite inequality being trivial. In order to achieve the desired conclusion we argue as follows. For every $A\in\mathcal{A}_{r}(\overline{\Omega})$, denote by $\overline{\mathcal{F}}^{w}$ the localized sequentially weak $W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})$ lower semicontinuous envelope of $F$ in (2.12). It was proved in [13] that for every $A\in\mathcal{A}_{r}(\overline{\Omega})$ (so that $A\cap\Omega$ can be any open subset of $\Omega$), $\displaystyle\overline{\mathcal{F}}^{w}(u,v,A)\\!\\!=\\!\\!\\!\int_{\Omega\cap A}(f_{1}(u)f_{2}^{\ast\ast}(v)+\mathcal{Q}W(\nabla u))dx,\hbox{ for every}(u,v)\in W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d}).$ Since for every $(u,v)\in W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})$, $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}^{w}(u,v,A)\end{aligned}$ we infer that $\displaystyle\overline{\mathcal{F}}(u,v,A)$ $\displaystyle=\begin{aligned} \inf\Big{\\{}&\liminf_{k\to+\infty}\overline{\mathcal{F}}(u_{k},v_{k},A):\\\ &W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$ $\displaystyle\leq\begin{aligned} \inf\Big{\\{}&\liminf_{k\to+\infty}\overline{\mathcal{F}}^{w}(u_{k},v_{k},A):\\\ &W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$ $\displaystyle=\begin{aligned} \inf\Big{\\{}&\liminf_{k\to+\infty}\int_{A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx+\int_{A}\mathcal{Q}W(\nabla u_{k})dx:\\\ &W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})\ni(u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\Big{\\}}\end{aligned}$ for every $(u,v)\in BV(\Omega\cap A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})$, which concludes the proof. ∎ ###### Proof of Proposition 2.7. It suffices to show ”$\leq$”, as ”$\geq$” is trivial. For every fixed $k\in\mathbb{N}$ and $u_{k}\in BV(\Omega\cap A;{\mathbb{R}}^{m})$, we can choose a sequence $(w_{k,l})_{l\in\mathbb{N}}\subset W^{1,1}(\Omega\cap A;{\mathbb{R}}^{m})$ such that as $l\to\infty$, $w_{k,l}\rightharpoonup^{*}u_{k}$ in $BV(\Omega\cap A;{\mathbb{R}}^{m})$ and (A.1) $\displaystyle\int_{\Omega\cap A}\mathcal{Q}W(\nabla w_{k,l})\,dx=\int_{\Omega\cap A}d\mathcal{Q}W(Du_{k})(x)$ (any $W^{1,1}$ recovery sequence). For instance, since $W^{1,1}$ is dense in $BV$ with respect to area strict convergence, there exists $(w_{k,l})\subset W^{1,1}$ such that as $l\to\infty$, $w_{k,l}\to u_{k}$ area-strictly, which yields (A.1) by Proposition 2.1. By $(H_{3})$ (coercivity and growth of $W$), (A.1) implies that $\limsup_{l}\|\nabla w_{k,l}\|_{L^{1}(A;{\mathbb{R}}^{m\times n})}\leq C\big{(}1+|Du_{k}|(A)\big{)}$ with a constant $C>0$. In addition, given any $v_{k}\in L^{1}(\Omega\cap A;\mathbb{R}^{m})$, we also have that $\int_{\Omega\cap A}f_{1}(w_{k,l})f_{2}^{\ast\ast}(v_{k})dx\underset{l\to\infty}{\to}\int_{\Omega\cap A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})dx$ by dominated convergence, also using that $w_{k,l}\to u_{k}$ in $L^{1}$, $f_{1}$ is bounded and $f_{2}^{\ast\ast}(v_{k})\in L^{1}(\Omega\cap A)$. If $u_{k}\rightharpoonup^{*}u$ in $BV$ and $v_{k}\rightharpoonup^{*}v$ in ${\mathcal{M}}$, it is therefore possible to choose a diagonal sequence $\tilde{u}_{k}:=w_{k,l(k)}$, with $l(k)\to\infty$ fast enough as $k\to\infty$, such that for (A.2) $\displaystyle\begin{aligned} &\liminf_{k}\int_{\Omega\cap A}f_{1}(\tilde{u}_{k})f_{2}^{\ast\ast}(v_{k})\,dx+\int_{\Omega\cap A}\mathcal{Q}W(\nabla\tilde{u}_{k})\,dx\\\ &\qquad\qquad=\liminf_{k}\int_{\Omega\cap A}f_{1}(u_{k})f_{2}^{\ast\ast}(v_{k})\,dx+\int_{\Omega\cap A}d\mathcal{Q}W(Du_{k})(x),\end{aligned}$ $\limsup_{k}\|\nabla\tilde{u}_{k}\|_{L^{1}(\Omega\cap A;\mathbb{R}^{m\times n})}\leq C(1+\limsup_{k}|Du_{k}|(\Omega\cap A)$ and $\tilde{u}_{k}\to u$ in $L^{1}(\Omega\cap A;{\mathbb{R}}^{m})$. In particular, $\tilde{u}_{k}\rightharpoonup^{*}u$ in $BV(\Omega\cap A;\mathbb{R}^{m})$. This means that if $(u_{k},v_{k})\subset BV(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{m})$ is an arbitrary admissible sequence for the infimum defining $\overline{\mathcal{F}}_{\ast\ast}$ in (2.14), then $(\tilde{u}_{k},v_{k})\subset W^{1,1}(\Omega\cap A;\mathbb{R}^{m})\times L^{1}(\Omega\cap A;\mathbb{R}^{d})$ is admissible, too. Hence, (LABEL:extendW11toBV) yields the assertion. ∎ In the following we will discuss the measure representation for the localized relaxed functionals, i.e., for $A\in\mathcal{A}_{r}(\overline{\Omega})$, $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v,A):=\inf\left\\{\,\liminf_{k\to+\infty}F(u_{k},v_{k},A)\,\left|\,\begin{array}[]{l}(u_{k},v_{k})\in W^{1,1}(A;\mathbb{R}^{m})\times L^{1}(A;\mathbb{R}^{d}),\\\ (u_{k},v_{k})\overset{\ast}{\rightharpoonup}(u,v)\hbox{ in }BV(A;\mathbb{R}^{m})\times\mathcal{M}(A;\mathbb{R}^{d})\end{array}\right.\right\\}.\end{aligned}$ Here, recall that by $\mathcal{A}_{r}(\overline{\Omega})$ we denote the family of open subsets of $\overline{\Omega}$ in the relative topology. The following result is a close relative of [1, Lemma 2.5]. ###### Lemma A.1. Let $\overline{\Omega}$ be as above. Let $\lambda:\mathcal{A}_{r}(\overline{\Omega})\to[0,+\infty)$ and $\mu$ be such that * (i) $\mu$ is a finite Radon measure on $\overline{\Omega}$; * (ii) $\lambda(\overline{\Omega})\geq\mu(\Omega)$; * (iii) $\lambda(A)\leq\mu(A)$ for all $A\in\mathcal{A}_{r}(\overline{\Omega})$; * (iv) (subadditivity) $\lambda(A)\leq\lambda(A\setminus\overline{U})+\lambda(B)$ for all $A,B,U\in\mathcal{A}_{r}(\overline{\Omega})$ such that $U\subset\subset B\subset\subset A$; * (v) for all $A\in\mathcal{A}_{r}(\Omega)$, $\varepsilon>0$, there exists $C\in\mathcal{A}_{r}(\overline{\Omega})$ such that $U\subset\subset A$ and $\lambda(A\setminus\overline{U})<\varepsilon$. Then $\lambda=\mu$ on $\mathcal{A}_{r}(\overline{\Omega})$. ###### Proof. $\lambda(A)\leq\mu(A)$, for every $A\in\mathcal{A}_{r}(\overline{\Omega})$. Indeed for every $\varepsilon>0$, and by $(iv)$ and $(v)$, we can find $U\subset\subset B\subset\subset A$, open for the relative topology, such that $\lambda(A\setminus\overline{U})<\varepsilon$, and $\lambda(A)\leq\lambda(A\setminus\overline{U})+\lambda(B)\leq\varepsilon+\mu(\overline{B})\leq\varepsilon+\mu(A)$. The arbitrariness of $\varepsilon$ proves one inequality. For what concerns the other we can observe that, by the inner regularity of $\mu$ we can find a relatively open subset of $\overline{\Omega}$, say $A^{\prime}\subset\subset A$, such that $\displaystyle\mu(A)<\varepsilon+\mu(\overline{A^{\prime}})=\varepsilon+\mu(\overline{\Omega})-\mu(\overline{\Omega}\setminus\overline{A^{\prime}})\leq$ $\displaystyle\varepsilon+\lambda(\overline{\Omega})+\lambda(\overline{\Omega}\setminus\overline{A^{\prime}})\leq\varepsilon+\lambda(A).$ Thus, letting $\varepsilon\to 0$ we obtain the desired conclusion. ∎ ###### Proof of Lemma 2.8. In order to prove that $\overline{\mathcal{F}}(u,v,A)$ is the trace of a Radon measure we refer to Lemma A.1, and define the increasing set function $\lambda:\mathcal{A}_{r}(\overline{\Omega})\to[0,+\infty]$ as $\lambda(A):=\overline{\mathcal{F}}(u,v,A).$ By defintion of $\overline{\mathcal{F}}$, we know that there exists a sequence $(u_{h},v_{h})\in W^{1,1}(\Omega;\mathbb{R}^{m})\times\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ such that $u_{h}\overset{\ast}{\rightharpoonup}u$ in $BV(\Omega;\mathbb{R}^{m})$ and $v_{h}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$ such that $\overline{\mathcal{F}}(u,v,\overline{\Omega})=\lim_{h\to+\infty}\int_{\Omega}(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla u_{h}))dx=\lambda(\overline{\Omega}).$ Next, denoting by $\lambda_{h}$ the measures $(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla u_{h})\mathcal{L}^{n}$, it converges weakly * in the sense of measures (duality with elements in $C(\overline{\Omega})$), up to a subsequence (due to the bounds) to a measure $\mu$. Now, due to the lower semicontinuity with respect to the weak* convergence, we have $\mu(\overline{\Omega})\leq\liminf_{h}\lambda_{h}(\overline{\Omega})=\lambda(\overline{\Omega}).$ Then, by the definition of $\lambda$, we have, for every $A\in\mathcal{A}_{r}(\overline{\Omega})$ $\lambda(A)\leq\liminf_{h}\int_{\Omega\cap A}(f_{1}(u_{h})f_{2}(v_{h})+W(\nabla u_{h}))dx\leq\mu(\overline{A}).$ Now by the previous lemma we would have that $\lambda=\mu$ if we prove inner regularity and subadditivity for $\overline{\mathcal{F}}(u,v,\cdot)$. For what concerns inner regularity (i.e., $(v))$ in Lemma A.1), it follows by Lemma 2.7 and $(H_{1})\div(H_{3})$. Indeed the growth condition from above and an argument similar to [7, Lemma 4.7] guarantee that $\overline{\mathcal{F}}(u,v,A)\leq C(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A))$. Thus the inner regularity of the upper bound measures provides inner regularity for $\overline{\mathcal{F}}$. Indeed one can extend $u$ and $v$ by zero outside $\overline{\Omega}$, thus obtaining elements in $BV(\mathbb{R}^{n},\mathbb{R}^{m})$ and $\mathcal{M}(\mathbb{R}^{n},\mathbb{R}^{d})$, respectively. If one first considers an open set $A$ with Lipschitz boundary such that $|v|(\partial A)=0$, then one can take a sequence of standard mollifiers $\varrho_{k}$ such that $v\ast\varrho_{k}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(A;\mathbb{R}^{d})$. Moreover since $|v|(\partial A)=0$, we have $|v\ast\varrho_{k}|(A)\to|v|(A)$, thus, taking $v\ast\varrho_{k}$ as test function for $\mathcal{F}$, and using Lemma 2.7, we have (A.3) $\displaystyle\mathcal{F}(u,v,A)\leq\beta(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A)),$ If we take an element $A\in\mathcal{A}_{r}(\overline{\Omega})$ which is open in $\mathbb{R}^{n}$, then, for any $\eta>0$, arguing as in [18, Example 14.8], we can find another open set $U$ with smooth boundary, such that $U\supset\supset A$ and (A.4) $\displaystyle\mathcal{L}^{n}(U\setminus A)+|Du|(U\setminus A)+|v|(U\setminus A)<\frac{\eta}{\beta}.$ Moreover the set $U$ itself can be chosen as a subset of $\Omega$, in this case the proof develops in full analogy with the one of [7, Lemma 4.7], and the estimate (A.3) holds. On the other hand, if $A$ is only open in the relative topology of $\overline{\Omega}$, i.e. it has $A\cap\partial\Omega=\partial A\cap\partial\Omega\not=\emptyset$, then the same arguments in [18, Example 14.8] allows to construct a set $U\supset\supset A$ with regular boundary, with $U\setminus(\partial A\cap\partial U)$ open (as a subset of $\mathbb{R}^{n})$), $\partial U\cap\partial\Omega=A\cap\partial\Omega$, and such that (A.4) holds. One can construct a family $\\{U_{t}\\}_{0<t<<1}$, of sets, invading $U$ as $t\to 0$, open in the relative topology such that $A\subset U_{t}\subset U$ with $\partial\Omega\cap U_{t}=A\cap\partial\Omega=U\cap\partial\Omega$. Moreover one can find a $t_{0}$ such that $|v|(\partial U_{t_{0}}\setminus(\partial\Omega\cap U_{t}))=0$. Then, exploiting that $\mathcal{F}(u,v,\cdot)$ is an increasing set function, we obtain the estimate $\displaystyle{\mathcal{F}}(u,v,A)\leq{\mathcal{F}}(u,v,U_{t_{0}})\leq\beta(\mathcal{L}^{n}(U_{t_{0}})+|Du|(U_{t_{0}})+|v|(\overline{U}_{t_{0}}))\leq\beta(\mathcal{L}^{n}(A)+|Du|(A)+|v|(A))+\eta.$ The arbitrariness of $\eta$ gives the inner regularity. It remains to prove that $\overline{\mathcal{F}}(u,v,\cdot)$ is subadditive in the sense of $(iv)$ in Lemma A.1, i.e. it suffices to prove that (A.5) $\displaystyle\overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus{\overline{U}})$ for all $A,U,B\in\mathcal{A}_{r}(\overline{\Omega})$ with $U\subset\subset B\subset\subset A$, $u\in BV(\Omega;\mathbb{R}^{m})$ and $v\in\mathcal{M}(\overline{\Omega};\mathbb{R}^{d})$, (see e.g. [10, Lemma 4.3.4]). Without loss of generality, in view of Proposition 2.6, we can assume $f_{2}$ convex and $W$ quasiconvex. Fix $\eta>0$ and find $(w_{h})\subset W^{1,1}((A\setminus\overline{U}),\mathbb{R}^{m}),(v_{h})\subset L^{1}(A\setminus\overline{U},\mathbb{R}^{d})$ such that $w_{h}\overset{\ast}{\rightharpoonup}u$ in $BV((A\setminus\overline{U}),\mathbb{R}^{m}),v_{h}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(A\setminus\overline{U},\mathbb{R}^{d})$ and (A.6) $\displaystyle\limsup_{h\to+\infty}\int_{A\setminus\overline{U}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla w_{h}))dx\leq\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta.$ Extract a subsequence still denoted by n such that the above upper limit is a limit. Let $B_{0}$ be a relatively open subset of $\overline{\Omega}$ with Lipschitz boundary such that $U\subset\subset B_{0}\subset\subset B$. Then there exist $(u_{h})\subset W^{1,1}(B_{0},\mathbb{R}^{m})$ and $(\bar{v}_{h})\subset L^{1}(B_{0};\mathbb{R}^{d})$ such that $u_{h}\overset{\ast}{\rightharpoonup}u$ in $BV(B_{0},\mathbb{R}^{m})$, $\bar{v}_{h}\overset{\ast}{\rightharpoonup}v$ in $\mathcal{M}(\overline{B}_{0},\mathbb{R}^{d})$ and (A.7) $\displaystyle\overline{\mathcal{F}}(u,v,B_{0})=\lim_{h\to+\infty}\int_{B_{0}}(f_{1}(u_{h})f_{2}(\bar{v}_{h})+W(\nabla u_{h}))dx.$ Consider, for every $D\in\mathcal{A}_{r}(\overline{\Omega})$ the set function ${\mathcal{G}}(u,v,D):=\int_{D}(1+|\nabla u|)dx+|v|(D)$. Due to $(H_{1})\div(H_{3})$, we may extract a bounded subsequence, that we will not relabel, from the sequences of measures $\nu_{h}:=\mathcal{G}(w_{h},v_{h},\cdot)+\mathcal{G}(u_{h},{\bar{v}}_{h},\cdot)$ restricted to $B_{0}\setminus{\overline{U}}$, converging in the sense of distributions to some Radon measure $\nu$ defined on $B_{0}\setminus{\overline{U}}$. For every $t>0$ let $B_{t}:=\\{x\in B_{0}:{\rm dist}(x,\partial B_{0})>t\\}$. Define, for $0<\delta<\eta$, the subsets $L_{\delta}:=B_{\eta-2\delta}\setminus B_{\eta+\delta}$. Consider a smooth cut-off function $\varphi_{\delta}\in C^{\infty}(B_{\eta-\delta},[0,1])$ such that $\varphi_{\delta}=1$ on $B_{\eta}$. As the thickness of the strip $L_{\delta}$ is of order $\delta$, we have an upper bound of the form $\|\nabla\varphi_{\delta}\|_{L^{\infty}(B_{\eta-\delta})}\leq C/\delta$. Define $\displaystyle w^{\prime}_{h}(x):=\varphi_{\delta}(x(u)_{h}(x)+(1-\varphi_{\delta}(x))w_{h}(x),$ $\displaystyle v^{\prime}_{h}(x):=\varphi_{\delta}(x)\overline{v}_{h}(x)+(1-\varphi_{\delta}(x))v_{h}(x).$ Clearly the sequences $w^{\prime}_{h}$ and $v^{\prime}_{h}$ weakly* converge to $u$ in $BV(A,\mathbb{R}^{d})$ and to $v$ in $\mathcal{M}(A;\mathbb{R}^{m})$ as $h\to+\infty$, respectively, and $\displaystyle\nabla w^{\prime}_{h}=\varphi_{\delta}\nabla u_{h}+(1-\varphi_{\delta})\nabla w_{h}+\nabla\varphi_{\delta}\otimes(u_{h}-w_{h}).$ By the growth conditions $(H_{1})\div(H_{3})$, we have the estimate $\displaystyle\begin{aligned} &\int_{A}\left(f_{1}(w^{\prime}_{h})f_{2}(v^{\prime}_{h})+W(\nabla w^{\prime}_{h})\right)dx\\\ &\quad\leq\begin{aligned} &\int_{B_{\eta}}(f_{1}(u_{h})f_{2}(\overline{v}_{h})+W(\nabla u_{h}))dx+\int_{A\setminus\overline{B_{\eta-\delta}}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla w_{h}))dx\\\ &\qquad+C\left(\mathcal{G}(u_{n},\overline{v}_{h},L_{\delta})+\mathcal{G}(w_{h},v_{h},L_{\delta})\right)+\frac{1}{\delta}\int_{L_{\delta}}|w_{h}-u_{h}|dx\end{aligned}\\\ &\quad\leq\begin{aligned} &\int_{B_{0}}(f_{1}(u_{h})f_{2}(\overline{v}_{h})+W(\nabla u_{h}))dx+\int_{A\setminus\overline{U}}(f_{1}(w_{h})f_{2}(v_{h})+W(\nabla w_{h}))dx\\\ &\qquad+C\left(\mathcal{G}(u_{h},\overline{v}_{h},L_{\delta})+\mathcal{G}(w_{h},v_{h},L_{\delta})\right)+\frac{1}{\delta}\int_{L_{\delta}}|w_{h}-u_{h}|dx.\end{aligned}\end{aligned}$ Thus, passing to the limit as $n\to+\infty$ and making use of the lower semicontinuity of $\overline{\mathcal{F}}(\cdot,\cdot,A)$ (which is a consequence of its definition (2.13)), (A.6) and (A.7), we obtain $\displaystyle\begin{aligned} \overline{\mathcal{F}}(u,v,A)&\leq\overline{\mathcal{F}}(u,v,B_{0})+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\overline{L_{\delta}})\\\ &\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\overline{L_{\delta}}).\end{aligned}$ Now passing to the limit as $\delta\to 0^{+}$ we get $\displaystyle\overline{\mathcal{F}}(u,v,A)\leq\overline{\mathcal{F}}(u,v,B)+\overline{\mathcal{F}}(u,v,A\setminus\overline{U})+\eta+C\nu(\partial B_{\eta}).$ It suffices to choose a subsequence $\\{\eta_{h}\\}$ such that $\eta_{h}\to 0^{+}$ and $\nu(\partial B_{\eta_{h}})=0$, to conclude the proof of (A.5). ∎ Acknowledgements EZ is grateful to the Institute of Information Theory and Automation in Prague for its kind support and hospitality. She is a member of GNAMPA-INdAM, whose support is acknowledged. The visit of SK at Dipartimento di Ingegneria Industriale, University of Salerno was partially sponsored by Project 2019 ’Analisi ed Ottimizzazione di Strutture sottili’. SK and MK are indebted to the Dipartimento di Ingegneria Industriale, University of Salerno (which EZ was affiliated with during the course of this research) for support and hospitality during their stay there. Moreover, SK and MK were supported by the GAČR-FWF project 19-29646L. ## References * [1] E. Acerbi, G. Bouchitté, I. Fonseca, Relaxation of convex functionals: the gap problem. Ann. I. H. Poincaré – AN 20, 3 (2003) 359–390. * [2] E. Acerbi, N. Fusco, Semicontinuity problems in the calculus of variations. Arch. Rational Mech. Anal. 86, (1984), 125–145. * [3] G. Alberti, Rank one property for derivatives of functions with bounded variation. Proc. R. Soc. Edinb., Sect. A 123 (1993), 239–274. * [4] L. Ambrosio, G. Dal Maso, On the Relaxation in $BV(\Omega;{\mathbb{R}}^{m})$ of quasi-convex integrals. J. Funct. Anal. 109 (1992), 76–97. * [5] L. Ambrosio, N. Fusco and D. Pallara, _Functions of Bounded Variation and Free Discontinuity Problems_. Oxford University Press, Oxford, (2000). * [6] L. Ambrosio, S. Mortola, and V. M. Tortorelli, Functionals with linear growth defined on vector valued BV functions, J. Math. Pures Appl. (9),70, (1991), n. 3, 269–323, * [7] J.-F. Babadjian, E. Zappale and H. Zorgati, _Dimensional reduction for energies involving the bending moments_. J. Math. Pures Appl. 90, (2008), 520–549. * [8] M. Baia, S. Krömer, M. Kružík, Generalized $\mathbf{W^{1,1}}$-Young measures and relaxation of problems with linear growth. SIAM J. Math. Anal. 50 (2018), 1076–1119. * [9] G. Bouchitté, G. Buttazzo, _New lower semicontinuity results for nonconvex functionals defined on measures._ Nonlinear Analysis. Th., Meth. Appl. 15, (1990), 679–692. * [10] G. Bouchitté, I. Fonseca, L. Mascarenhas, A global method for relaxation, Arch. Rational Mech. Anal. 145, (1998), 51–98. * [11] G. Bouchitté, I. Fonseca, L. Mascarenhas, Bending moment in membrane theory, J. Elasticity 73, (2004), 75–99. * [12] J.W. Cahn, F. Lärché, Surface stress and the chemical equilibrium of small crystals—II. Solid particles embedded in a solid matrix. Acta Metall. 30 (1981), 51–56. * [13] G. Carita, A. M. Ribeiro, E. Zappale, Relaxation for some integral functionals in $W^{1,p}_{w}\times L^{q}_{w}$. Boletim da Sociedade Portuguesa de Matemática (2010), 47–53. * [14] G. Carita, E. Zappale, A relaxation result in $BV\times L^{p}$ for integral functionals depending on chemical composition and elastic strain, Asymptot. Anal., 100, (2016), n=1-2, 1–20. * [15] G. Carita, E. Zappale, Integral representation results in $BV\times L^{p}$, ESAIM Control Optim. Calc. Var., 23, (2017), n.4, 1555–1599. * [16] B. Dacorogna, Direct Methods in the Calculus of Variations. 2nd ed., Springer, Berlin, 2008. * [17] A. De Simone, G. Dolzmann, Existence of minimizers for a variational problem in two-dimensional nonlinear magnetoelasticity. Arch. Ration. Mech. Anal. 144 (1998), 107–120. * [18] G. Dal Maso: An Introduction to $\Gamma$-Convergence. Birkhäuser, Boston, 1993. * [19] I. Fonseca & G. Leoni _Modern Methods in the Calculus of Variations:_ $L^{p}$ _spaces_. Springer, New York, 2007. * [20] I. Fonseca, D. Kinderlehrer, P. Pedregal, Relaxation in $BV\times L^{\infty}$ of functionals depending on strain and composition. In: Boundary value problems for partial differential equations and applications. RMA Res. Notes Appl. Math. 29, pp. 113-–152, Masson, Paris, 1993. * [21] I. Fonseca, D. Kinderlehrer, P. Pedregal, Energy functionals depending on elastic strain and chemical composition. Calc. Var. PDE 2 (1994), 283–313. * [22] I. Fonseca, S. Krömer, Multiple integrals under differential constraints: two-scale convergence and homogenization. Indiana Univ. Math. J. 59 (2010), 427–458. * [23] I. Fonseca, S. Müller, Quasiconvex integrands and Lower Semicontinuity in $L^{1}$. SIAM J. Math. Anal., 23, (1992), 1081–1098. * [24] I. Fonseca, S. Müller, Relaxation of quasiconvex functionals in $BV(\Omega;\mathbb{R}^{p})$ for integrands $f(x,u,\nabla u)$. Arch. Ration. Mech. Anal., 123, (1993), 1–49. * [25] I. Fonseca, S. Müller, P. Pedregal, Analysis of concentration and oscillation effects generated by gradients. SIAM J. Math. Anal. 29 (1998), 736–756. * [26] D. Henrion, M. Kružík, T. Weisser, Optimal control problems with oscillations, concentrations and discontinuities. Automatica 103 (2019), 159–165. * [27] A. Kałamajska, S. Krömer, M. Kružík, Weak lower semicontinuity by means of anisotropic parametrized measures. Trends in Applications of Mathematics to Mechanics (eds.: E. Rocca, U. Stefanelli, L. Truskinovsky, and A. Visintin), Springer INdAM Series 27, Springer Cham, Switzerland (2018), pp. 23–52. * [28] A. Kałamajska, M. Kružík, Oscillation and concentrations in sequences of gradients. ESAIM: COCV 14 (2008), 71–-104 . * [29] J. Kristensen, F. Rindler, Characterization of generalized gradient Young measures generated by sequences in $W^{1,1}$ and $BV$. Arch. Ration. Mech. Anal. 197 (2010), 539-598. * [30] A. M. Ribeiro, E. Zappale, Relaxation of certain integral functionals depending on strain and chemical composition. Chin. Ann. Math. Ser. B 34 (2013), 491–514. * [31] A. M. Ribeiro E. Zappale, Lower semicontinuous envelopes in $W^{1,1}\times L^{p},$ Banach Center Publications, 101 (2014), 187–206. Erratum: Lower semicontinuous envelopes in $W^{1,1}\times L^{p}$ 101 (2014), online. * [32] F. Rindler, G. Shaw, Liftings, Young measures, and lower semicontinuity. Arch. Ration. Mech. Anal. 232 (2019), 1227-1328. * [33] W.P. Ziemer: Weakly differentiable functions. Springer-Verlag, New York, 1989.
arxiv-papers
2021-07-27T09:19:50
2024-09-04T03:07:21.055296
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Stefan Kr\\\"omer, Martin Kru\\v{z}\\'ik, Elvira Zappale", "submitter": "Martin Kru\\v{z}\\'ik", "url": "https://arxiv.org/abs/2107.12687" }
2107.12688
We present some “in silico” experiments to design combined chemo- and immunotherapy treatment schedules. We introduce a new framework by combining flatness-based control, which is a model-based setting, along with model-free control. The flatness property of the used mathematical model yields straightforward reference trajectories. They provide us with the nominal open-loop control inputs. Closing the loop via model-free control allows to deal with the uncertainties on the injected drug doses. Several numerical simulations illustrating different case studies are displayed. We show in particular that the considered health indicators are driven to the safe region, even for critical initial conditions. Furthermore, in some specific cases there is no need to inject chemotherapeutic agents. iomedical control, cancer, nonlinear control, fault accommodation, flatness-based control, model-free control, shooting method. § INTRODUCTION We consider drug injections scheduling for cancer treatments from a control point of view (see, e.g., Chap. 10 in [Padmanabhan et al., 2021] for bibliographical references). Among the many models which have been used, those stemming from an earlier work of [Stepanova, 1979] are quite popular. Most appealing are several publications by d'Onofrio and different coauthors: see especially [d'Onofrio et al., 2012]. Such approaches to chemo- and immunotherapy led in recent years to promising control-theoretic investigations: see, e.g., [Alamir, 2014]; [Schättler & Ledzewicz, 2015] and references therein; [Moussa et al., 2020, Sharifi et al., 2017, Sharifi et al., 2020]. They employ various optimization techniques which are related to optimal control, model predictive control, and robust control. We explore here another route via tools which are combined here for the first time, although they both gave rise to an abundant literature in control engineering: * Flatness-based control (see [Fliess et al., 1995, Fliess et al., 1999]; and [Sira-Ramírez & Agrawal, 2004, Lévine, 2009, Rudolph, 2021]) is a model-based approach which has been well received in many industrial domains. See, e.g., [Bonnabel & Clayes, 2020] for tower cranes. * Besides being useful in concrete case-studies (see, e.g., [Amasyali et al., 2020, Park & Olama, 2021, Park et al., 2021, Telsang et al., 2021, Tumin et al., 2021] for energy management), model-free control in the sense of [Fliess & Join, 2013, Fliess & Join, 2021] has already been illustrated in biomedicine ([MohammadRidha et al., 2018, Bara et al., 2018, Faraji et al. , 2021]) and in bioengineering ([Truong et al., 2021]). Note that the terminology “model-free control” has been used many times with different definitions: see [Chareyron & Alamir, 2009] in oncology. Our virtual patient is modeled through two ordinary differential equations presented by [d'Onofrio et al., 2012]. This system is trivially flat with obvious flat outputs. The design of suitable reference trajectories with the corresponding open-loop controls becomes straightforward. A major source of uncertainty, according to [Sharifi et al., 2020], is the unknown fluctuation of the drug delivery to the tumor, which should be related to actuators faults, i.e., to a classic topic in fault-tolerant control (see, e.g., [Noura et al., 2015]). It has been already noticed that model-free control is well-suited for dealing with actuators faults: see [Fliess & Join, 2013] for an academic example and [Lafont et al., 2015] for a concrete case-study. The loop is therefore closed via model-free control. Let us emphasize the following points: * The computer implementation is easy. * Only a low computing cost is necessary. * Some scenarios, i.e., in silico experiments, lead to unexpected results. They might attract cancerologists. Our paper is organized as follows. Section <ref> presents the dynamical model of the virtual patient, Section <ref> reviews briefly flatness-based control, and model-free control. Numerical simulations are presented in Section <ref>. Section <ref> contains some suggestions for for future research on: 1) the possible medical impact of our in silico experiments, 2) some aspects related to systems biology, 3) new control paradigmes which might be derived from the methods developed here. See [Fliess et al., 2021] for a first draft. § VIRTUAL PATIENT DYNAMICAL MODEL We consider the model presented in [d'Onofrio et al., 2012] \begin{eqnarray} \label{1} \dot x &= -\mu_C x\ln\left(\frac{x}{x_\infty}\right)-\gamma xy - xu\eta_x \\ \label{2} \dot y &= \mu_I\left(x-\beta x^2\right)y-\delta y+\alpha+ yv\eta_y \end{eqnarray} $x$, $y$ are, respectively, the number of tumor cells and the immune cell density; the control variables $u$ and $v$ are the cytotoxic and immune-stimulation drugs; the parameters $\mu_C$, $\mu_I$, $\alpha$, $\gamma$, $\delta$, $x_\infty$ are positive. The terms $\eta_x$, $\eta_y$, $0 \leq \eta_x \leq 1$, $0 \leq \eta_y \leq 1$, are inspired by [Sharifi et al., 2020]: they represent the uncertain and fluctuating parts of drugs which are delivered to the tumor. The definition as well as the numerical values of these parameters can be found in Table <ref>. Parameter Definition Numerical Value ${\mu_{C}}$ tumor growth rate $1.0078\cdot10^{7}$ cells/day ${\mu_{I}}$ tumor stimulated proliferation rate .0029 ${day^{-1}}$ ${\alpha}$ rate of immune cells influx .0827 ${day^{-1}}$ ${\beta}$ inverse threshold .00.31 ${\gamma}$ interaction rate $1\cdot10^{7}$ cells/day ${\delta}$ death rate .1873 ${day^{-1}}$ ${\eta_X}$ chemotherapeutic killing parameter $1\cdot10^{7}$ cells/day ${\eta_Y}$ immunotherapy injection parameter $1\cdot10^{7}$ cells/day ${x_{\infty}}$ fixed carrying capacity $780 \cdot10^{6}$ cells This system has three equilibria corresponding to $\dot{x} = \dot{y} = u = v =0$: * a locally stable equilibrium $x = 73$, $y = 1.32$ which corresponds to a benign case; * an unstable saddle point $x = 356.2$, $y = 0.439$, which separates the benign and malignant regions; * a locally stable equilibrium $x = 737.3$, $y = 0.032$, which is malignant. The idea behind controlling such systems consists in driving the state trajectories from the region of attraction of the malignant equilibrium (critical case) to the region of attraction of the benign equilibrium. The simulations that are presented in this paper will show that the state trajectories are driven to the benign equilibrium under control action (drug delivery) for different settings. § CONTROL METHODOLOGY §.§ Flatness property A control system with $m$ independent control variables is said to be (differentially) flat if, and only if, there exists $m$ system variables $y_1, \dots, y_m$, the flat outputs, such that any system variable $z$, the control variables for instance, may be expressed as a differential function of $y_1, \dots, y_m$, i.e., $z = \Phi (y_1, \dots, y_m, \dots, y_1^{(\nu_1)}, \dots, y_m^{(\nu_m)})$, where the derivation orders $\nu_1, \dots, \nu_m$ are finite. A linear system is flat if, and only if, it is controllable. Thus flatness may be viewed as another extension of Kalman's controllability. Equations (<ref>)-(<ref>) yield \begin{eqnarray*} \label{3} u &= \frac{\dot x + \mu_C x\ln\left(\frac{x}{x_\infty}\right) + \gamma xy}{- x\eta_x} = X(x, \dot{x}, y) \\ \label{4} v &= \frac{\dot y - \mu_I\left(x-\beta x^2\right)y + \delta y - \alpha}{y\eta_y} = Y(y, \dot{y}, x) \end{eqnarray*} The above equations show immediately that System (<ref>)-(<ref>) is flat; $x$, $y$ are flat outputs. §.§ Reference trajectory and nominal open-loop control One of the main benefits of flatness is the possibility of easily deriving a suitable reference trajectory and the corresponding nominal open-loop control. For a given reference trajectory $x^\star(t)$, $y^\star(t)$, the corresponding nominal control variables \begin{eqnarray} \label{shoot1} u^\star (t) &= X(x^\star (t), \dot{x}^\star (t), y^\star (t)) \\ \label{shoot2} v^\star (t) &= Y(y^\star (t), \dot{y}^\star (t), x^\star (t)) \end{eqnarray} might exhibit unacceptable negative values. Define therefore the nominal open-loop control variables \begin{eqnarray*} u_{\rm OL}(t) &= u^\star (t) \, {\rm if} \, u^\star (t) \geq 0, \; u_{\rm OL}(t) = 0 \, {\rm if} \, u^\star (t) < 0 \\ v_{\rm OL}(t) &= v^\star (t) \, {\rm if} \, v^\star (t) \geq 0, \; v_{\rm OL}(t) = 0 \, {\rm if} \, v^\star (t) < 0 \end{eqnarray*} §.§ Closing the loop via model-free control From a control-engineering standpoint the terms $\eta_x$ and $\eta_y$ should be related to actuators faults. Introduce therefore the two “decoupled” ultra-local models ([Fliess & Join, 2013, Lafont et al., 2015]): \dot{z}_x = F_x + \alpha_x u_{\rm MFC}, \ \dot{z}_y = F_y + \alpha_y v_{\rm MFC} where $z_x = x - x^\star$, $z_y = y - y^\star$ are the tracking errors; $\alpha_x$ (resp. $\alpha_y$) is a constant parameter which is chosen by the practitioner such that $\dot{x}$ and $\alpha_x u$ (resp. $\dot{y}$ and $\alpha_y v$) are of the same order of magnitude; $F_x$ and $F_y$, which are data-driven, subsume the poorly known structures and disturbances. A real-time estimation ([Fliess & Join, 2013]) of $F_x$, $F_y$ are given by $$F_x^{\rm est} = - \frac{6}{\tau_x^{3}} \int_{t-\tau_x}^t \left( (t-2\sigma)x(\sigma) + \alpha_x \sigma(\tau_x - \sigma)u_{\rm MFC}(\sigma)\right)d\sigma$$ $$F_y^{\rm est} = - \frac{6}{\tau_y^{3}} \int_{t-\tau_y}^t \left( (t-2\sigma)y(\sigma) + \alpha_y \sigma(\tau_y - \sigma)v_{\rm MFC}(\sigma)\right)d\sigma$$ where $\tau_x, \tau_y > 0$ are “small.” Close the loop via an intelligent Proportional controller, or iP, $$u_{\rm MFC} = - \frac{F_x^{\rm est} + K_{x, P} z_x}{\alpha_x}, \ v_{\rm MFC} = - \frac{F_y^{\rm est} + K_{y, P} z_y}{\alpha_y}$$ where $K_{x, P}, K_{y, P} > 0$. From $\dot{z}_x + K_{x, P} z_x = 0$, $\dot{z}_y + K_{y, P} z_y = 0$, it follows that those two gains ensure local stability around the reference trajectory. The close-loop controls $u_{\rm CL}$, $v_{\rm CL}$ may now be defined: * If $u_{\rm OL} + u_{\rm MFC} \geq 0$, then $u_{CL} = u_{\rm OL} + u_{\rm MFC}$; if $u_{\rm OL} + u_{\rm MFC} < 0$, then $u_{\rm CL} = 0$. * If $v_{\rm OL} + v_{\rm MFC} \geq 0$, then $v_{CL} = v_{\rm OL} + v_{\rm MFC}$; if $v_{\rm OL} + v_{\rm MFC} < 0$, then $v_{\rm CL} = 0$. § NUMERICAL SIMULATIONS §.§ Presentation §.§.§ A shooting method A huge number in silico experiments have been most easily performed via the flatness property, i.e., via Formulae (<ref>)-(<ref>). It permits to select the most suitable ones with respect to boundary conditions, optimality criteria and constraints. Our approach might appear therefore as an alternative to the shooting methods in optimal control and numerical analysis (see, e.g., [Carraro et al., 2015, Pellegrini & Russell, 2020]). §.§.§ Time sampling and duration The duration of an experiment is $60$ days. The time sampling interval is equal to $30$ minutes. The total simulations duration is 60 days, even though the figures are limited to 30 days for visibility reasons, since all the variables reach a steady state at this time. §.§ Closed-loop and total amount of drugs Set $\eta_x = \eta_y = 0.5$. This nominal value might be large according to [Sharifi et al., 2020]. Figures <ref> and <ref> display two experiments with the same initial point $x = 500$, $y = 0.5$, which lies in the attraction region of the malignant equilibrium. The total amounts of injected drugs, which are often considered as important constraints, are given by the two integrals $\int_0^T u_{\rm CL}(\tau) d\tau$, $\int_0^T v_{\rm CL}(\tau) d\tau$, where $T$ is the experiment duration. Figure <ref> indicates that the quantity of drugs injected during the slow scenario is lower than in the fast one. This outcome ought to be discussed in oncology. §.§ Other scenarios §.§.§ Same initial point. Here $\eta_x = 0.31$, $\eta_y = 0.75$ are supposed to be unknown. Use the same nominal parameters as in Section <ref>, and the feedback loop of Section <ref>, with $\alpha_x = - 10000$, $\alpha_y = 1$, $K_{x, P} = 100$, $K_{y, P} = 10$. The results depicted in Figures <ref> and <ref> show that the benign equilibrium is reached after a short period of time. §.§.§ New initial point. The virtual patient is in a critical state, i.e., the initial state $x = 770$, $y = 0.1$ is close to the malignant equilibrium. The time variation of $\eta_x$ and $\eta_y$, which are displayed in Figure <ref>, are assumed to be unknown. It is possible to cure the virtual patient without the cytotoxic drug, i.e., $u_{\rm CL} \equiv 0$. Figure <ref>, which should be of interest for concerologists, exhibits a convergence to the benign equilibrium with some oscillations perhaps due to the violent fluctuations of $\eta_y$. The quality of the open loop behavior in Figure <ref> is lower. § CONCLUSION §.§ Main goal Some results encountered with our computer experiments might question oncologists: * the quantity of injected drug might be lower in some slow scenario than in the corresponding fast one; * there are critical situations where only immunotherapy matters: the cytotoxic drugs are useless. Those startling calculations need of course to be further analyzed. §.§ Systems Biology In the spirit of Systems Biology (see, e.g., [Del Vecchio & Murray , 2015]), let us suggest the the following research tracks: * Examine parameter identification in Equation (<ref>). * Flatness-based control might be helpful elsewhere: 1) Another model due to [Hahnfeldt et al., 1999] has also been investigated from a control-theoretic perspective (see, e.g., [Kovács et al., 2014], [Schättler & Ledzewicz, 2015] and references therein, [Cacace et al., 2018]). It is easy to check that it is flat; 2) the unicycle in [Sharifi et al., 2020], which is used as a nanorobot for drug delivery, is well known to be flat. §.§ New control paradigms? The control strategy which has been developed here for oncological in silico experiments might lead to new paradigms: * Assume that we have a flat nominal system with some important uncertainties. Use open-loop flatness-based techniques. Close the loop via model-free control. What's about flatness-based control of partial differential equations (see, e.g., [Rudolph, 2003, Meurer, 2013]; and references therein)? * Investigate possible connections with Active Disturbance Rejection Control, or ADRC, as presented by [Sira-Ramírez et al., 2017]. [Alamir, 2014] Alamir M. (2014). Robust feedback design for combined therapy of cancer. Optim. Control Appl. Meth., 35, 77-88. [Amasyali et al., 2020] Amasyali K., Chen Y., Telsang B., Olama M., Djouadi S.M. (2020). Hierarchical model-free transactional control of building loads to support grid services. IEEE Access, 8, 219367-219377. [Bara et al., 2018] Bara O., Fliess M., Join C., Day J., Djouadi S.M. (2018). Toward a model-free feedback control synthesis for treating acute inflammation. J. Theoret. Bio., 448, 26-37. [Bonnabel & Clayes, 2020] Bonnabel S., Clayes X. (2020). The industrial control of tower cranes: An operator-in-the-loop approach. IEEE Contr. Syst. Magaz., 40, 27-39. [Cacace et al., 2018] Cacace F., Cusimano V., Germani A., Palumbo A., Papa F. (2018). Closed-loop control of tumor growth by means of anti-angiogenic administration. Math. Biosci. Engin., 15, 827-839. [Carraro et al., 2015] Carraro T., Geiger M., Körkel S., Rannacher R. (Eds) (2015). Multiple Shooting and Time Domain Decomposition Methods. [Chareyron & Alamir, 2009] Chareyron S., Alamir M. (2009). Model-free feedback design for a mixed cancer therapy. Biotech. Progr., 25, 690-700. [Del Vecchio & Murray , 2015] Del Vecchio M., Murray R.M. (2015). Biomolecular Feedback Systems. Princeton University Press. [Faraji et al. , 2021] Faraji B., Gheisarnejad M., Rouhollahi K., Esfahani Z., Khooban M.H. (2021). Machine learning approach based on ultra-local model control for treating cancer pain. IEEE Sensors J., 21, 8245-8252. [Fliess & Join, 2013] Fliess M., Join C. (2013). Model-free control. Int. J. Contr., 86, 2228-2252. [Fliess & Join, 2021] Fliess M., Join C. (2021). An alternative to proportional-integral and proportional-integral-derivative regulators: Intelligent proportional-derivative regulators. Int. J. Robust Nonlinear Contr., 2021. https://doi.org/10.1002/rnc.5657 [Fliess et al., 2021] Fliess M., Join C., Moussa K., Djouadi S.M., Alsager M. (2021). Preliminary in silico experiments: Towards new cancer treatments? bioRxiv, https://doi.org/10.1101/2021.04.06.438636 [Fliess et al., 1995] Fliess M., Lévine J., Martin P., Rouchon P. (1995). Flatness and defect of non-linear systems: introductory theory and examples. Int. J. Contr., 61, 1327-1361. [Fliess et al., 1999] Fliess M., Lévine J., Martin P., Rouchon P. (1999). A Lie-Bäcklund approach to equivalence and flatness of nonlinear systems. IEEE Trans. Automat. Contr., 44, 922-937. [Hahnfeldt et al., 1999] Hahnfeldt P., Panigrahy D., Folkman J., Hlatky L. (1999). Tumor development under angiogenic signaling: A dynamical theory of tumor growth, treatment response, and postvascular dormancy. Cancer Res., 59, 4770-4775. [Kovács et al., 2014] Kovács L., Szeles A., Sápi J., Drexler D.A., Rudas I., Harmati I., Sápi Z. (2014). Model-based angiogenic inhibition of tumor growth using modern robust control method. Comput. Meth. Program. Biomed., 114, e98-e110. [Lafont et al., 2015] Lafont F., Balmat J.-F., Pessel N., Fliess M. (2015). A model-free control strategy for an experimental greenhouse with an application to fault accommodation. Comput. Electron. Agricult., 110, 139-149. [Meurer, 2013] Meurer T. (2013). Control of Higher-Dimensional PDEs – Flatness and Backstepping Designs. [Lévine, 2009] Lévine J. (2009). Analysis and Control of Nonlinear Systems: A Flatness-based Approach. [MohammadRidha et al., 2018] MohammadRidha T., Ait-Ahmed M., Chaillous L., Krempf M., Guilhem I., Poirier J.Y., Moog C.H. (2018). Model free iPID control for glycemia regulation of type-1 diabetes. IEEE Trans. Biomed. Eng., 65, 199-206. [Moussa et al., 2020] Moussa K., Fiacchini M., Alamir M. (2020). Robust optimal scheduling of combined chemo- and immunotherapy: Considerations on chemotherapy detrimental effects. Amer. Contr. Conf., Denver. [Noura et al., 2015] Noura H., Theilliol D., Ponsart J.-C., Chamseddine A. (2009). Fault-tolerant Control Systems: Design and Practical Applications. [d'Onofrio et al., 2012] d'Onofrio A., Ledzewicz U., Schättler H. (2012). On the dynamics of tumor-immune system interactions and combined chemo- and immunotherapy. A. d'Onofrio, P. Cerrai, A. Gandolfi (Eds.): New Challenges for Cancer Systems Biomedicine, Springer, pp. 249-266. [Padmanabhan et al., 2021] Padmanabhan R., Meskin N., Al Moustafa A.-I. (2021). Mathematical Models of Cancer and Different Therapies – Unified Framework. [Park & Olama, 2021] Park B., Olama M. (2020). A model-free voltage control approach to mitigate motor stalling and FIDVR for smart grids. IEEE Trans. Smart Grid, 12, 67-78. [Park et al., 2021] Park B., Zhang Y., Olama M., Kuruganti T. (2021). Model-free control for frequency response support in microgrids utilizing wind turbines. Elec. Power Syst. Res., 194, 107080. [Pellegrini & Russell, 2020] Pellegrini E., Russell R.P. (2020). A multiple-shooting differential dynamic programming algorithm. Part 1: Theory. Acta Astronaut., 170, 686-700. [Rudolph, 2003] Rudolph J. (2003). Flatness Based Control of Distributed Parameter Systems. Shaker Verlag. [Rudolph, 2021] Rudolph J. (2021). Flatness-Based Control: An Introduction. Shaker Verlag. [Schättler & Ledzewicz, 2015] Schättler H., Ledzewicz U. (2015). Optimal Control for Mathematical Models of Cancer: An Application of Geometric Methods. Springer, 2015. [Sharifi et al., 2017] Sharifi N., Ozgoli S., Ramezani A. (2017). Multiple model predictive control for optimal drug administration of mixed immunotherapy and chemotherapy of tumours. Comput. Meth. Program. Biomed., 144, 13-19. [Sharifi et al., 2020] Sharifi N., Zhou Y., Holmes G., Chen Y. (2020a). Overcoming channel uncertainties in touchable molecular communication for direct-drug-targeting-assisted immuno-chemotherapy. IEEE Trans. Nanobiosci., 19, 249-258. [Sharifi et al., 2020] Sharifi N., Ali M., Holmes G., Chen Y. (2020b). Blind obstacle avoidance using taxicab geometry for NanorobotAssisted direct drug targeting. 42nd Int. Conf. IEEE Engin. Med. Biol. Soc., Montreal. [Sira-Ramírez & Agrawal, 2004] Sira-Ramírez H., & Agrawal S.K. (2004). Differentially Flat Systems. Marcel Dekker. [Sira-Ramírez et al., 2017] Sira-Ramírez H., Luviano-Juárez A., Ramírez-Neria M., Zurita-Bustamante E.W. (2017). Active Disturbance Rejection Control of Dynamic Systems – A Flatness-Based Approach. [Stepanova, 1979] Stepanova N.V. (1979). Course of the immune reaction during the development of a malignant tumour (in Russian). Biophysics, 24, 917-923. [Telsang et al., 2021] Telsang B., Amasyali K., Chen Y., Olama M., Djouadi S. (2021). Power allocation by load aggregator with heterogeneous loads using weighted projection. Energy Buildings, 242, 110955. [Truong et al., 2021] Truong C.T., Huynh K.H., Duong V.T., Nguyen H.H., Pham L.A., Nguyen T.T. (2021). Model-free volume and pressure cycled control of automatic bag valve mask ventilator. AIMS Bioengin., 8, 192-207. [Tumin et al., 2021] Tumin W., Olama M.M., Djouadi S.M. (2021). Adaptive Control for Residential HVAC Systems to Support Grid Services. IEEE Power Energ. Soc. Innov. Smart Grid Techno. Conf., Washington. [Control $u$ (blue $--$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $--$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $--$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $--$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Fast trajectory [Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Slow trajectory [Control $u$ integral of figure <ref>-(a)] [Control $v$ integral of figure <ref>-(b)] [Control $u$ integral of figure <ref>-(a)] [Control $v$ integral of figure <ref>-(b)] Comparison between total drug injections [Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Unknown variation of $\eta_x$ [Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Unknown variation of $\eta_y$ [Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Very sick patient [Control $u$ (blue $-$) and Nominal control $u^\ast$ (black $- -$) ] [Control $v$ (blue $-$) and Nominal control $v^\ast$ (black $- -$)] [Output $x$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] [Output $y$ (blue $-$), Reference trajectories (black $- -$) and Stable points (red and green $-.$)] Open loop [Time evolution of $\eta_x$] [Time evolution of $\eta_y$] Fluctuation of the drug delivery
arxiv-papers
2021-07-27T09:21:12
2024-09-04T03:07:21.073856
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Michel Fliess, C\\'edric Join, Kaouther Moussa, Seddik M. Djouadi,\n Mohamed W. Alsager", "submitter": "Michel Fliess", "url": "https://arxiv.org/abs/2107.12688" }
2107.12690
# On the complete convergence for sequences of dependent random variables via stochastic domination conditions and regularly varying functions theory Nguyen Chi Dzunga and Lê Vǎn Thànhb CONTACT Lê Vǎn Thành. Email: [email protected] aInstitute of Mathematics, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Hanoi 10307, Vietnam bDepartment of Mathematics, Vinh University, 182 Le Duan, Vinh, Nghe An, Vietnam ###### Abstract This note develops Rio’s proof [C. R. Math. Acad. Sci. Paris, 1995] of the rate of convergence in the Marcinkiewicz–Zygmund strong law of large numbers to the case of sums of dependent random variables with regularly varying normalizing constants. It allows us to obtain a complete convergence result for dependent sequences under uniformly bounded moment conditions. This result is new even when the underlying random variables are independent. The main theorems are applied to three different dependence structures: (i) $m$-pairwise negatively dependent random variables, (ii) $m$-extended negatively dependent random variables, and (iii) $\varphi$-mixing sequences. To our best knowledge, the results for cases (i) and (ii) are the first results in the literature on complete convergence for sequences of $m$-pairwise negatively dependent random variables and $m$-extended negatively dependent random variables under the optimal moment conditions even when $m=1$. While the results for cases (i) and (iii) unify and improve many existing ones, the result for case (ii) complements the main result of Chen et al. [J. Appl. Probab., 2010]. Affirmative answers to open questions raised by Chen et al. [J. Math. Anal. Appl., 2014] and Wu and Rosalsky [Glas. Mat. Ser. III, 2015] are also given. An example illustrating the sharpness of the main result is presented. ###### keywords: Almost sure convergence; Complete convergence; Rate of convergence; Dependent random variables; Stochastic domination; Regularly varying function ## 1 Introduction and motivations The maximal inequalities play a crucial role in the proofs of the strong law of large numbers (SLLN). Let $\\{X,X_{n},n\geq 1\\}$ be a sequence of pairwise independent and identically distributed random variables. Etemadi [8] is the first author who proved the Kolmogorov SLLN $\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n}=0\ \text{ almost surely (a.s.)}$ under optimal moment condition $\mathbb{E}(|X|)<\infty$ without using the maximal inequalities. For $1<p<2$, Martĭkainen [12] proved that if $\mathbb{E}(|X|^{p}\log^{\beta}(|X|))<\infty$ for some $\beta>\max\\{0,4p-6\\}$, then the Marcinkiewicz–Zygmund SLLN holds, i.e., $\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}}=0\ \text{ a.s. }$ (1) As far as we know, Rio [13] is the first author who proved (1) under the optimal moment condition $\mathbb{E}(|X|^{p})<\infty$. Since then, many sub- optimal results on the Marcinkiewicz–Zygmund SLLN have been published. In 2014, Sung [15] proposed a different method and proved (1) under a nearly optimal condition $\mathbb{E}(|X|^{p}(\log\log(|X|))^{2(p-1)})<\infty$. Here and thereafter, $\log(x)$ denotes the natural logarithm (base $e$) of $\max\\{x,e\\}$, $x\geq 0$. Very recently, da Silva [6, Corollary 1] used the method proposed by Sung [15] to prove that if $\\{X,X_{n},n\geq 1\\}$ are pairwise negatively dependent and identically distributed random variables and $\mathbb{E}(|X|^{p})<\infty$, then $\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}(\log\log(n))^{2(p-1)/p}}=0\ \text{ a.s. }$ (2) A very special case of our main result will show that the optimal condition for (2) is $\mathbb{E}\left(|X|^{p}/(\log\log(|X|))^{2(p-1)}\right)<\infty.$ (3) Anh et al. [1] recently proved the Marcinkiewicz–Zygmund-type SLLN with the norming constants of the forms $n^{1/p}\tilde{L}(n^{1/p}),\ n\geq 1$, where $\tilde{L}(\cdot)$ is the Bruijn conjugate of a slowly varying function $L(\cdot)$. However, the proof in [1] is based on a maximal inequality for negatively associated random variables which is no longer available even for pairwise independent random variables. Although Rio’s result was extended by the second named author in Thành [16], it only considered sums for pairwise independent identically distributed random variables there. The motivation of the present note is that many other dependence structures do not enjoy the Kolmogorov maximal inequality such as pairwise negative dependence, extended negative dependence, among others. Unlike Thành [16], we consider in this note the case where the underlying sequence of random variables is stochastically dominated by a random variable $X$. This allows us to derive the Baum–Katz-type theorem for sequences of dependent random variables satisfying a uniformly bounded moment condition as stated in the following results. To our best knowledge, Theorem 1.1 and Corollary 1.2 are new even when the underlying sequence is comprise of independent random variables. We note that, in Theorem 1.1 and Corollary 1.2, no identical distribution condition or stochastic domination condition is assumed. ###### Theorem 1.1. Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables. Assume that there exists a universal constant $C$ such that $\operatorname{Var}\left(\sum_{i=k+1}^{k+\ell}f_{i}(X_{i})\right)\leq C\sum_{i=k+1}^{k+\ell}\operatorname{Var}(f_{i}(X_{i}))$ (4) for all $k\geq 0,\ell\geq 1$ and all nondecreasing functions $f_{i}$, $i\geq 1$, provided the variances exist. Let $L(\cdot)$ be a slowly varying function defined on $[0,\infty)$. When $p=1$, we assume further that $L(x)\geq 1$ and is increasing on $[0,\infty)$. If $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)<\infty,$ (5) then for all $\alpha\geq 1/p$, we have $\sum_{n=1}^{\infty}n^{\alpha p-2}\mathbb{P}\left(\max_{1\leq j\leq n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon n^{\alpha}{\tilde{L}}(n^{\alpha})\right)<\infty\text{ for all }\varepsilon>0,$ (6) where $\tilde{L}(\cdot)$ is the Bruijn conjugate of $L(\cdot)$. Considering a special interesting case $\alpha=1/p$ and $L(x)\equiv 1$, we obtain the following corollary. ###### Corollary 1.2. Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables satisfying condition (4). If $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)<\infty,$ (7) then $\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon n^{1/p}\right)<\infty\text{ for all }\varepsilon>0.$ (8) ###### Remark 1. * (i) Since $\\{\max_{1\leq j\leq n}|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))|,n\geq 1\\}$ is nondecreasing, it follows from (8) that (see, e.g., Remark 1 in Dedecker and Merlevède [7]) SLLN (1) holds. * (ii) For SLLN under the uniformly bounded moment condition, Baxter et al [2] proved (1) with assumptions that the sequence $\\{X_{n},n\geq 1\\}$ is independent and $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{r}\right)<\infty\text{ for some }r>p.$ This condition is much stronger than (7). Baxter et al. [2] studied the SLLN for weighted sums which is more general than (1) but their method does not give the rate of convergence like Corollary 1.2. * (iii) For sequence of pairwise independent identically distributed random variables $\\{X,X_{n},n\geq 1\\}$, Chen et al. [4] obtained (8) under condition that $\mathbb{E}(|X|^{p}(\log(|X|))^{r})<\infty$ for some $1<p<r<2$. We see that with identical distribution assumption, this moment condition is still stronger than (7). * (iv) Conditions (5) and (7) are very sharp and almost optimal. Even with assumption that the underlying random variables are independent, a special case of Example 3.3 in Section 3 shows that (8) may fail if (7) is weakened to $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}\log(|X_{n}|)\log(\log(|X_{n}|))\right)<\infty.$ The rest of the paper is arranged as follows. Section 2 presents a complete convergence result for sequences of dependent random variables with regularly varying normalizing constants. The proof of Theorem 1.1 and an example illustrating the sharpness of the result are presented in Section 3. Finally, Section 4 contains corollaries and remarks comparing our results and the ones in the literature. ## 2 Complete convergence for sequences of dependent random variables with regularly varying normalizing constants In this section, we will use the method in Rio [13] to obtain complete convergence for sums of dependent random variables with regularly varying constants under stochastic domination condition. The proof is similar to that of Theorem 1 in Thành [16]. A family of random variables $\\{X_{i},i\in I\\}$ is said to be stochastically dominated by a random variable $X$ if $\sup_{i\in I}\mathbb{P}(|X_{i}|>t)\leq\mathbb{P}(|X|>t),\ \text{ for all }t\geq 0.$ (9) We note that many authors use an apparently weaker definition of $\\{X_{i},i\in I\\}$ being stochastically dominated by a random variable $X$, namely that $\sup_{i\in I}\mathbb{P}(|X_{i}|>t)\leq C\mathbb{P}(|X|>t),\text{ for all }t\geq 0$ (10) for some constant $C\in(0,\infty)$. However, it is shown by Rosalsky and Thành [14] that (9) and (10) are indeed equivalent. Let $\rho\in\mathbb{R}$. A real-valued function $R(\cdot)$ is said to be regularly varying (at infinity) with index of regular variation $\rho$ if it is a positive and measurable function on $[A,\infty)$ for some $A>0$, and for each $\lambda>0$, $\lim_{x\to\infty}\dfrac{R(\lambda x)}{R(x)}=\lambda^{\rho}.$ A regularly varying function with the index of regular variation $\rho=0$ is called slowly varying (at infinity). If $L(\cdot)$ is a slowly varying function, then by Theorem 1.5.13 in Bingham et al. [3], there exists a slowly varying function $\tilde{L}(\cdot)$, unique up to asymptotic equivalence, satisfying $\lim_{x\to\infty}L(x)\tilde{L}\left(xL(x)\right)=1\ \text{ and }\lim_{x\to\infty}\tilde{L}(x)L\left(x\tilde{L}(x)\right)=1.$ (11) The function $\tilde{L}$ is called the de Bruijn conjugate of $L$, and $\left(L,\tilde{L}\right)$ is called a (slowly varying) conjugate pair (see, e.g., p. 29 in Bingham et al. [3]). If $L(x)=\log^{\gamma}(x)$ or $L(x)=\log^{\gamma}\left(\log(x)\right)$ for some $\gamma\in\mathbb{R}$, then $\tilde{L}(x)=1/L(x)$. Especially, if $L(x)\equiv 1$, then $\tilde{L}(x)\equiv 1$. Here and thereafter, for a slowly varying function $L(\cdot)$, we denote the de Bruijn conjugate of $L(\cdot)$ by $\tilde{L}(\cdot)$. Throughout, we will assume that $L(x)$ and $\tilde{L}(x)$ are both continuous on $[0,\infty)$ and differentiable on $[A,\infty)$ for some $A>0$. We also assume that (see Lemma 2.2 in Anh et al. [1]) $\lim_{x\to\infty}\dfrac{xL^{\prime}(x)}{L(x)}=0.$ (12) ###### Theorem 2.1. Let $1\leq p<2$, and $\\{X_{n},n\geq 1\\}$ be a sequence of random variables satisfying condition (4). Let $L(\cdot)$ be as in Theorem 1.1. If $\\{X_{n},\,n\geq 1\\}$ is stochastically dominated by a random variable $X$, and $\mathbb{E}\left(|X|^{p}L^{p}(|X|)\right)<\infty,$ (13) then for all $\alpha\geq 1/p$, we have $\sum_{n=1}^{\infty}n^{\alpha p-2}\mathbb{P}\left(\max_{1\leq j\leq n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon n^{\alpha}{\tilde{L}}(n^{\alpha})\right)<\infty\text{ for all }\varepsilon>0.$ (14) We only sketch the proof of Theorem 2.1 and refer the reader to the proof of Theorem 1 in Thành [16] for details. The main difference here is that we have to consider the nonnegative random variables so that after applying certain truncation techniques (see (15) and (16) below), the new random variables still satisfy condition (4). ###### Sketch proof of Theorem 2.1. Since $\\{X_{n}^{+},n\geq 1\\}$ and $\\{X_{n}^{-},n\geq 1\\}$ satisfy the assumptions of the theorem and $X_{n}=X_{n}^{+}-X_{n}^{-},n\geq 1$, without loss of generality we can assume that $X_{n}\geq 0$ for all $n\geq 1$. For $n\geq 1$, set $b_{n}=\begin{cases}n^{\alpha}\tilde{L}\left(A^{\alpha}\right)&\text{ if }0\leq n<A,\\\ n^{\alpha}\tilde{L}\left(n^{\alpha}\right)&\text{ if }n\geq A,\\\ \end{cases}$ $X_{i,n}=X_{i}\mathbf{1}(X_{i}\leq b_{n})+b_{n}\mathbf{1}(X_{i}>b_{n}),\ 1\leq i\leq n,$ (15) and $Y_{i,m}=\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right)-\mathbb{E}\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right),\ m\geq 1,\ i\geq 1.$ (16) It is easy to see that $b_{n}$ is strictly increasing and (14) is equivalent to $\sum_{n=1}^{\infty}2^{n(\alpha p-1)}\mathbb{P}\left(\max_{1\leq j<2^{n}}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon b_{2^{n}}\right)<\infty\text{ for all }\varepsilon>0.$ (17) It follows from stochastic domination condition and definition of $b_{n}$ that $\begin{split}0\leq\mathbb{E}\left(X_{i,2^{m}}-X_{i,2^{m-1}}\right)&\leq\mathbb{E}\left(|X|\mathbf{1}(|X|>b_{2^{m-1}})\right).\end{split}$ (18) Using (18) and the same argument as in Thành [16, Equation (23)], the proof of (17) will be completed if we can show that $\sum_{n=1}^{\infty}2^{n(\alpha p-1)}\mathbb{P}\left(\max_{1\leq j<2^{n}}\left|\sum_{i=1}^{j}(X_{i,2^{n}}-\mathbb{E}(X_{i,2^{n}}))\right|\geq\varepsilon b_{2^{n-1}}\right)<\infty\text{ for all }\varepsilon>0.$ (19) For $m\geq 0,$ set $S_{0,m}=0$ and $S_{j,m}=\sum_{i=1}^{j}(X_{i,2^{m}}-\mathbb{E}\left(X_{i,2^{m}}\right)),\ j\geq 1.$ For $1\leq j<2^{n}$ and for $0\leq m\leq n$, let $k_{j,m}=\lfloor j/2^{m}\rfloor$ be the greatest integer which is less than or equal to $j/2^{m}$, $j_{m}=k_{j,m}2^{m}$. Then (see Thành [16, Equation (28)]) $\begin{split}\max_{1\leq j<2^{n}}\left|S_{j,n}\right|&\leq\sum_{m=1}^{n}\max_{0\leq k<2^{n-m}}\left|\sum_{i=k2^{m}+1}^{k2^{m}+2^{m-1}}\left(X_{i,2^{m-1}}-\mathbb{E}(X_{i,2^{m-1}})\right)\right|\\\ &\quad+\sum_{m=1}^{n}\max_{0\leq k<2^{n-m}}\left|\sum_{i=k2^{m}+1}^{(k+1)2^{m}}Y_{i,m}\right|+\sum_{m=1}^{n}2^{m+1}\mathbb{E}\left(|X|\mathbf{1}(|X|>b_{2^{m-1}})\right).\end{split}$ (20) Combining (4), (15) and (16), we have for all $m\geq 1$, $\mathbb{E}\left(\sum_{i=k+1}^{k+\ell}X_{i,2^{m-1}}-\mathbb{E}(X_{i,2^{m-1}})\right)^{2}\leq C\sum_{i=k+1}^{k+\ell}\mathbb{E}(X_{i,2^{m-1}}^{2}),\ k\geq 0,\ell\geq 1.$ (21) and $\mathbb{E}\left(\sum_{i=k+1}^{k+\ell}Y_{i,m}\right)^{2}\leq C\sum_{i=k+1}^{k+\ell}\mathbb{E}(Y_{i,m}^{2}),\ k\geq 0,\ell\geq 1.$ (22) By using (20)–(22), and the argument as in pages 1236-1238 in Thành [16], we obtain (19). ∎ The next proposition shows that the moment condition in (13) in Theorem 2.1 is optimal. The proof is the same as that of the implication (iv)$\Rightarrow$(i) of Theorem 3.1 in Anh et al. [1]. We omit the details. ###### Proposition 2.2. Let $1\leq p<2$, and let $\\{X_{n},\,n\geq 1\\}$ be a sequence of identically distributed random variables satisfying (4), $L(\cdot)$ as in Theorem 1.1. If for some constant $c$, $\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq n}\left|\sum_{i=1}^{j}(X_{i}-c)\right|>\varepsilon n^{1/p}{\tilde{L}}(n^{1/p})\right)<\infty\text{ for all }\varepsilon>0,$ (23) then $\mathbb{E}\left(|X_{1}|^{p}L^{p}(|X_{1}|)\right)<\infty$ and $\mathbb{E}(X_{1})=c$. ## 3 On the stochastic domination condition via regularly varying functions In this section, we will present a result on the stochastic domination condition via regularly varying functions theory, and use it to prove Theorem 1.1. We need the following simple lemma. See Rosalsky and Thành [14] for a proof. ###### Lemma 3.1. Let $g:[0,\infty)\to[0,\infty)$ be a measurable function with $g(0)=0$ which is bounded on $[0,A]$ and differentiable on $[A,\infty)$ for some $A\geq 0$. If $\xi$ is a nonnegative random variable, then $\begin{split}\mathbb{E}(g(\xi))&=\mathbb{E}(g(\xi)\mathbf{1}(\xi\leq A))+g(A)+\int_{A}^{\infty}g^{\prime}(x)\mathbb{P}(\xi>x)\mathrm{d}x.\end{split}$ (24) ###### Proposition 3.2. Let $\\{X_{i},i\in I\\}$ be a family of random variables, and $L(\cdot)$ a slowly varying function. If $\sup_{i\in I}\mathbb{E}\left(|X_{i}|^{p}L(|X_{i}|)\log(|X_{i}|)\log^{2}(\log(|X_{i}|))\right)<\infty\ \text{ for some }p>0,$ (25) then there exists a nonnegative random variable $X$ with distribution function $F(x)=1-\sup_{i\in I}\mathbb{P}(|X_{i}|>x),\ x\in\mathbb{R}$ such that $\\{X_{i},i\in I\\}$ is stochastically dominated by $X$ and $\mathbb{E}\left(X^{p}L(X)\right)<\infty.$ (26) ###### Proof. By (25) and Theorem 2.5 (i) of Rosalsky and Thành [14], we get that $\\{X_{i},i\in I\\}$ is stochastically dominated by a nonnegative random variable $X$ with distribution function $F(x)=1-\sup_{i\in I}\mathbb{P}(|X_{i}|>x),\ x\in\mathbb{R}.$ Let $g(x)=x^{p}L(x)\log(x)\log^{2}(\log(x)),\ h(x)=x^{p}L(x),\ x\geq 0.$ Applying (12), there exists $B$ large enough such that $g(\cdot)$ and $h(\cdot)$ are strictly increasing on $[B,\infty)$, and $\left|\dfrac{xL^{\prime}(x)}{L(x)}\right|\leq\dfrac{p}{2},\ x>B.$ Therefore, $h^{\prime}(x)=px^{p-1}L(x)+x^{p}L^{\prime}(x)=x^{p-1}L(x)\left(p+\dfrac{xL^{\prime}(x)}{L(x)}\right)\leq\dfrac{3px^{p-1}L(x)}{2},\ x>B.$ (27) By Lemma 3.1, (25) and (27), there exists a constant $C_{1}$ such that $\begin{split}\mathbb{E}(h(X))&=\mathbb{E}(h(X)\mathbf{1}(X\leq B))+h(B)+\int_{B}^{\infty}h^{\prime}(x)\mathbb{P}(X>x)\mathrm{d}x\\\ &\leq C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{p-1}L(x)\mathbb{P}(X>x)\mathrm{d}x\\\ &=C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{p-1}L(x)\sup_{i\in I}\mathbb{P}(|X_{i}|>x)\mathrm{d}x\\\ &\leq C_{1}+\dfrac{3p}{2}\int_{B}^{\infty}x^{-1}\log^{-1}(x)\log^{-2}(\log(x))\sup_{i\in I}\mathbb{E}\left(g(|X_{i}|)\right)\mathrm{d}x\\\ &=C_{1}+\dfrac{3p}{2}\sup_{i\in I}\mathbb{E}\left(g(|X_{i}|)\right)\int_{B}^{\infty}x^{-1}\log^{-1}(x)\log^{-2}(\log(x))\mathrm{d}x\\\ &<\infty.\end{split}$ The proposition is proved. ∎ ###### Remark 2. The contribution of the slowly varying function $L(x)$ in Proposition 3.2 help us to unify Theorem 2.5 (ii) and (iii) of Rosalsky and Thành [14]. Letting $L(x)=\log^{-1}(x)\log^{-2}(\log(x))$, $x\geq 0$, then by Proposition 3.2, the condition $\sup_{i\in I}\mathbb{E}\left(|X_{i}|^{p}\right)<\infty\ \text{ for some }p>0,$ implies that the family $\\{X_{i},i\in I\\}$ is stochastically dominated by a nonnegative random variable $X$ satisfying $\mathbb{E}\left(X^{p}\log^{-1}(X)\log^{-2}(\log(X))\right)<\infty.$ This slightly improves Theorem 2.5 (ii) in Rosalsky and Thành [14]. Similarly, by letting $L(x)=1$, we obtain an improvement of Theorem 2.5 (iii) in Rosalsky and Thành [14]. ###### Proof of Theorem 1.1. Applying Proposition 3.2, we have from (5) that the sequence $\\{X_{n},n\geq 1\\}$ is stochastically dominated by a nonnegative random variable $X$ with $\mathbb{E}\left(X^{p}L^{p}(X)\right)<\infty.$ Applying Theorem 2.1, we immediately obtain (6). ∎ The following example illustrates the sharpness of Theorem 1.1 (and Corollary 1.2). It shows that in Theorem 1.1, (6) may fail if (5) is weakened to $\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)<\infty.$ (28) ###### Example 3.3. Let $1\leq p<2$ and $L(\cdot)$ be a positive slowly varying function such that $g(x)=x^{p}L^{p}(x)$ is strictly increasing on $[A,\infty)$ for some $A>0$. Let $B=\lfloor A+g(A)\rfloor+1$, $h(x)$ be the inverse function of $g(x)$, $x\geq B$, and let $\\{X_{n},n\geq B\\}$ be a sequence of independent random variables such that for all $n\geq B$ $\mathbb{P}(X_{n}=0)=1-\dfrac{1}{n\log(n)\log(\log(n))},\ \mathbb{P}\left(X_{n}=\pm h(n)\right)=\dfrac{1}{2n\log(n)\log(\log(n))}.$ By (11), we can choose (unique up to asymptotic equivalence) $\tilde{L}(x)=\dfrac{h(x^{p})}{x},\ x\geq B.$ Since $\tilde{L}(\cdot)$ is a slowly varying function, $\log(\tilde{L}(n^{1/p}))=o\left(\log(n)\right),$ and so $\log(h(n))=\log\left(n^{1/p}\tilde{L}(n^{1/p})\right)=\dfrac{1}{p}\log(n)+o(\log(n)).$ It thus follows that $\begin{split}&\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)\\\ &=\sup_{n\geq 1}\mathbb{E}\left(g(|X_{n}|)\log(|X_{n}|)\log^{2}(\log(|X_{n}|))\right)\\\ &=\sup_{n\geq 1}\dfrac{\log(h(n))\log^{2}(\log(h(n)))}{\log(n)\log(\log(n))}=\infty,\end{split}$ and $\begin{split}&\sup_{n\geq 1}\mathbb{E}\left(|X_{n}|^{p}L^{p}(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)\\\ &=\sup_{n\geq 1}\mathbb{E}\left(g(|X_{n}|)\log(|X_{n}|)\log(\log(|X_{n}|))\right)\\\ &=\sup_{n\geq 1}\dfrac{\log(h(n))\log(\log(h(n)))}{\log(n)\log(\log(n))}<\infty.\end{split}$ Therefore (5) fails but (28) holds. Now, if (6) holds, then by letting $\alpha=1/p$, we have $\lim_{n\to\infty}\dfrac{\sum_{i=B}^{n}X_{i}}{n^{1/p}\tilde{L}(n^{1/p})}=0\text{ a.s.}$ (29) It follows from (29) that $\lim_{n\to\infty}\dfrac{X_{n}}{n^{1/p}\tilde{L}(n^{1/p})}=0\text{ a.s.}$ (30) Since the sequence $\\{X_{n},n\geq 1\\}$ is comprised of independent random variables, the Borel–Cantelli lemma and (30) ensure that $\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>n^{1/p}\tilde{L}(n^{1/p})/2\right)<\infty.$ (31) However, we have $\begin{split}\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>n^{1/p}\tilde{L}(n^{1/p})/2\right)&=\sum_{n=B}^{\infty}\mathbb{P}\left(|X_{n}|>h(n)/2\right)\\\ &=\sum_{n=B}^{\infty}\dfrac{1}{n\log(n)\log(\log(n))}=\infty\end{split}$ contradicting (31). Therefore, (6) must fail. ## 4 Corollaries and remarks In this section, we apply Theorems 1.1 and 2.1 to three different dependence structures: (i) $m$-pairwise negatively dependent random variables, (ii) extended negatively dependent random variables, and (iii) $\varphi$-mixing sequences. The results for cases (i) and (ii) are new results even $L(x)\equiv 1$. We also give remarks to compare our results with the existing ones. ### 4.1 $m$-pairwise negatively dependence random variables The Baum–Katz theorem and the Marcinkiewicz–Zygmund SLLN for sequences of $m$-pairwise negatively dependent random variables were studied by Wu and Rosalsky [19]. Let $m\geq 1$ be a fixed integer. A sequence of random variables $\\{X_{n},n\geq 1\\}$ is said to be $m$-pairwise negatively dependent if for all positive integers $j$ and $k$ with $|j-k|\geq m$, $X_{j}$ and $X_{k}$ are negatively dependent, i.e., $\mathbb{P}(X\leq x,Y\leq y)\leq\mathbb{P}(X\leq x)\mathbb{P}(Y\leq y)\text{ for all $x,y\in\mathbb{R}$.}$ When $m=1$, this reduce to the usual concent of pairwise negative dependence. It is well known that if $\\{X_{i},i\geq 1\\}$ is a sequence of $m$-pairwise negatively dependent random variables and $\\{f_{i},i\geq 1\\}$ is a sequence of nondecreasing functions, then $\\{f_{i}(X_{i}),i\geq 1\\}$ is a sequence of $m$-pairwise negatively dependent random variables. The following corollary is the first result in the literature on the complete convergence for sequences of $m$-pairwise negatively dependent random variables under the optimal condition even when $m=1$ and $L(x)\equiv 1$. ###### Corollary 4.1. Let $1\leq p<2$, $\alpha\geq 1/p$, and let $\\{X_{n},\,n\geq 1\\}$ be a sequence of $m$-pairwise negatively dependent random variables, and $L(\cdot)$ as in Theorem 1.1. * (i) If (5) holds, then we obtain (6). * (ii) If $\\{X_{n},\,n\geq 1\\}$ is stochastically dominated by a random variable $X$ satisfying (13), then we obtain (14). ###### Proof. From Lemma 2.1 in Wu and Rosalsky [19], it is easy to see that $m$-pairwise negatively dependent random variables satisfy condition (4). Corollary 4.1 then follows from Theorems 1.1 and 2.1. ∎ ###### Remark 3. (i) We consider a special case where $\alpha=1/p$, $1<p<2$ and $L(x)\equiv 1$ in Corollary 4.1 (ii). Under the condition $\mathbb{E}(|X|^{p})<\infty$, we obtain $\sum_{n=1}^{\infty}n^{-1}\mathbb{P}\left(\max_{1\leq j\leq n}\left|\sum_{i=1}^{j}(X_{i}-\mathbb{E}(X_{i}))\right|>\varepsilon n^{1/p}\right)<\infty\text{ for all }\varepsilon>0,$ (32) and $\begin{split}\lim_{n\to\infty}\dfrac{\sum_{i=1}^{n}(X_{i}-\mathbb{E}(X_{i}))}{n^{1/p}}=0\ \text{ a.s.}\end{split}$ (33) (ii) For $1<p<2$, Sung [15] considered the pairwise independent case and obtained (33) under a slightly stronger condition that $\mathbb{E}\left(|X|^{p}(\log\log(|X|))^{2(p-1)}\right)<\infty.$ (34) Furthermore, one cannot obtain the rate of convergence (32) by using the method used in Sung [15]. In Chen et al. [4, Theorem 3.6], the authors proved (32) holds under condition that $\mathbb{E}(|X|^{p}\log^{r}(|X|))<\infty$ for some $r>p$. They stated an open question whether (32) holds or not under (34) (see [4, Remark 3.1]). For the case where the random variables are $m$-pairwise negatively dependent, Wu and Rosalsky [19] obtained (32) and (33) under condition $\mathbb{E}(|X|^{p}\log^{r}(|X|))<\infty$ for some $r>1+p$. Wu and Rosalsky [19] then raised an open question that whether (33) holds or not under Sung’s condition (34). For $p=1$ and also the underlying random variables are $m$-pairwise negatively dependent, Wu and Rosalsky [19, Remarks 3.6] stated another open question that whether (32) (with $p=1$) holds or not under the condition $\mathbb{E}(|X|)<\infty$. Therefore, a very special case of Corollary 4.1 gives affirmative answers to the mentioned open questions raised by Chen et al. [4] and Wu and Rosalsky [19]. (iii) Let $\alpha=1/p$, $1<p<2$, $L(x)=(\log\log(x))^{2(1-p)/p}$, $x\geq 0$. Then $\tilde{L}(x)=(\log\log(x))^{2(p-1)/p}$, $x\geq 0$. By Corollary 4.1 (ii), under condition (3), we obtain (2). Therefore, this special case of Corollary 4.1 also improves Corollary 1 of da Silva [6]. ### 4.2 Extended negatively dependent random variables The Kolmogorov SLLN for extended negatively dependent was first studied by Chen et al. [5]. A collection of random variables $\\{X_{1},\dots,X_{n}\\}$ is said to be extended negatively dependent if for all $x_{1},\dots,x_{n}\in\mathbb{R}$, there exists $M>0$ such that $\mathbb{P}(X_{1}\leq x_{1},\dots,X_{n}\leq x_{n})\leq M\mathbb{P}(X_{1}\leq x_{1})\dots\mathbb{P}(X_{n}\leq x_{n}),$ and $\mathbb{P}(X_{1}>x_{1},\dots,X_{n}>x_{n})\leq M\mathbb{P}(X_{1}>x_{1})\dots\mathbb{P}(X_{n}>x_{n}).$ A sequence of random variables $\\{X_{i},i\geq 1\\}$ is said to be extended negatively dependent if for all $n\geq 1$, the collection $\\{X_{i},1\leq i\leq n\\}$ is extended negatively dependent. Let $m$ be a positive integer. The notion of $m$-extended negative dependence was introduced in Wu and Wang [18]. A sequence $\\{X_{i},i\geq 1\\}$ of random variables is said to be $m$-extended negatively dependent if for any $n\geq 2$ and any $i_{1},i_{2},\ldots,i_{n}$ such that $|i_{j}-i_{k}|\geq m$ for all $1\leq j\leq k\leq n$, we have $\\{X_{i_{1}},\ldots,X_{i_{n}}\\}$ are extended negatively dependent. If $\\{X_{i},i\geq 1\\}$ is a sequence of $m$-extended negatively dependent random variables and $\\{f_{i},i\geq 1\\}$ is a sequence of nondecreasing functions, then $\\{f_{i}(X_{i}),i\geq 1\\}$ is a sequence of $m$-extended negatively dependent random variables. We note that the classical Kolmogorov maximal inequality or the classical Rosenthal maximal inequality are not available for extended negatively dependent random variables (see Wu and Wang [18]). ###### Corollary 4.2. Corollary 4.1 holds if $\\{X_{n},\,n\geq 1\\}$ is a sequence of $m$-extended negatively dependent random variables. ###### Proof. Lemma 3.3 of Wu and Wang [18] implies that the sequence $\\{X_{n},\,n\geq 1\\}$ satisfies condition (4). Corollary 4.2 then follows from Theorems 1.1 and 2.1. ∎ ###### Remark 4. Chen et al. [5] proved the Kolmogorov SLLN for sequences of extended negatively dependent and identically distributed random variables $\\{X,X_{n},n\geq 1\\}$ under the condition that $\mathbb{E}(|X|)<\infty$. They used the Etemadi’s method in Etemadi [8] which does not work for the case $1<p<2$ in the Marcinkiewicz–Zygmund SLLN. To our best knowledge, Corollary 4.2 is the first result in the literature on the Baum–Katz theorem for sequences of $m$-extended negatively dependent random variables under the optimal moment condition even when $L(x)\equiv 1$ and $m=1$. ### 4.3 $\varphi$-mixing dependent random variables A sequence of random variables $\\{X_{n},n\geq 1\\}$ is called $\varphi$-mixing if $\varphi(n)=\sup_{k\geq 1,A\in\mathcal{F}_{1}^{k},B\in\mathcal{F}_{k+n}^{\infty},\mathbb{P}(A)>0}\left|\mathbb{P}(B|A)-\mathbb{P}(B)\right|\to 0\text{ as }n\to\infty,$ where $\mathcal{F}_{1}^{k}=\sigma(X_{1},\ldots,X_{k})$ and $\mathcal{F}_{k+n}^{\infty}=\sigma(X_{i},i\geq k+n)$. The following corollary is the Baum–Katz type theorem for sums of $\varphi$-mixing random variables. ###### Corollary 4.3. Corollary 4.1 holds if $\\{X_{n},\,n\geq 1\\}$ is a sequence of $\varphi$-mixing random variables satisfying $\sum_{n=1}^{\infty}\varphi^{1/2}(2^{n})<\infty.$ (35) ###### Proof. Corollary 2.3 of Utev [17] implies that (4) holds under (35). Corollary 4.2 follows from Theorems 1.1 and 2.1. ∎ ###### Remark 5. The condition (4) is very general. The concepts of negative association, pairwise negative dependence, $\phi$-mixing can all be extended to random vectors in Hilbert spaces (see, e.g., [7, 11, 9, 10]). It is interesting to see if the results in this note can be extended to dependence random vectors taking values in Hilbert spaces. Acknowledgments The research of the second-named author was supported by the Ministry of Education and Training, grant no. B2022-TDV-01. ## References * [1] V.T.N. Anh, N.T.T. Hien, L.V. Thanh, and V.T.H. Van, _The Marcinkiewicz–Zygmund-type strong law of large numbers with general normalizing sequences_ , Journal of Theoretical Probability 34 (2021), pp. 331–348. * [2] J. Baxter, R. Jones, M. Lin, and J. Olsen, _SLLN for weighted independent identically distributed random variables_ , Journal of Theoretical Probability 17 (2004), pp. 165–181. * [3] N.H. Bingham, C.M. Goldie, and J.L. Teugels, _Regular variation_ , Vol. 27, Cambridge University Press, 1989. * [4] P. Chen, P. Bai, and S.H. Sung, _The von Bahr–Esseen moment inequality for pairwise independent random variables and applications_ , Journal of Mathematical Analysis and Applications 419 (2014), pp. 1290–1302. * [5] Y. Chen, A. Chen, and K.W. Ng, _The strong law of large numbers for extended negatively dependent random variables_ , Journal of Applied Probability 47 (2010), pp. 908–922. * [6] J.L. da Silva, _On the rates of convergence for sums of dependent random variables_ , arXiv preprint arXiv:2011.10262 (2020). * [7] J. Dedecker and F. Merlevède, _Convergence rates in the law of large numbers for Banach-valued dependent variables_ , Theory of Probability & Its Applications 52 (2008), pp. 416–438. * [8] N. Etemadi, _An elementary proof of the strong law of large numbers_ , Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete 55 (1981), pp. 119–122. * [9] N.T.T. Hien and L.V. Thanh, _On the weak laws of large numbers for sums of negatively associated random vectors in Hilbert spaces_ , Statistics and Probability Letters 107 (2015), pp. 236–245. * [10] N.T.T. Hien, L.V. Thanh, and V.T.H. Van, _On the negative dependence in Hilbert spaces with applications_ , Applications of Mathematics 64 (2019), pp. 45–59. * [11] M.H. Ko, T.S. Kim, and K.H. Han, _A note on the almost sure convergence for dependent random variables in a Hilbert space_ , Journal of Theoretical Probability 22 (2009), pp. 506–513. * [12] A. Martĭkainen, _On the strong law of large numbers for sums of pairwise independent random variables_ , Statistics and Probability Letters 25 (1995), pp. 21–26. * [13] E. Rio, _Vitesses de convergence dans la loi forte pour des suites dépendantes (Rates of convergence in the strong law for dependent sequences)_ , Comptes Rendus de l’Académie des Sciences. Série 1, Mathématique 320 (1995), pp. 469–474. * [14] A. Rosalsky and L.V. Thành, _A note on the stochastic domination condition and uniform integrability with applications to the strong law of large numbers_ , Statistics and Probability Letters, In press (2021). * [15] S.H. Sung, _Marcinkiewicz–Zygmund type strong law of large numbers for pairwise iid random variables_ , Journal of Theoretical Probability 27 (2014), pp. 96–106. * [16] L.V. Thành, _On the Baum–Katz theorem for sequences of pairwise independent random variables with regularly varying normalizing constants_ , Comptes Rendus Mathématique 358 (2020), pp. 1231–1238. * [17] S. Utev, _Sums of random variables with $\phi$-mixing_, Siberian Advances in Mathematics 1 (1991), pp. 124–155. * [18] Y. Wu and X. Wang, _Strong laws for weighted sums of $m$-extended negatively dependent random variables and its applications_, Journal of Mathematical Analysis and Applications 494 (2021), p. 124566. * [19] Y. Wu and A. Rosalsky, _Strong convergence for $m$-pairwise negatively quadrant dependent random variables_, Glasnik Matematički, Series III 50 (2015), pp. 245–259.
arxiv-papers
2021-07-27T09:21:44
2024-09-04T03:07:21.083594
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Nguyen Chi Dzung and L\\^e V\\v{a}n Th\\`anh", "submitter": "L\\^e V\\v{a}n Th\\`anh", "url": "https://arxiv.org/abs/2107.12690" }
2107.12691
11institutetext: Department of Computer Science, Jinan University, Guangzhou 510632, P. R. China 22institutetext: IMCCE, Observatoire de Paris, UMR 8028 du CNRS, UPMC, Université de Lille, 77 av. Denfert-Rochereau, 75014 Paris, France 33institutetext: School of Software, Jiangxi Normal University, Nanchang 330022, P. R. China 44institutetext: Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Jinan University, Guangzhou 510632, P. R. China # A deeper solution to the actual geometry of CCD mosaic chips Z.J. Zheng 1144 Q.Y. Peng Contact:[email protected] A. Vienne 2244 F.R. Lin 3344 B.F. Guo 1144 ###### Abstract Context. For charge-coupled device (CCD) mosaic chips in the focal plane of a large telescope, the unification for all the measurements of each chip is vital to some scientific projects, such as deep astrometric standards or construction for deeper images that can also seamlessly cover a larger area of the sky. A key part of the reduction involves the accurate geometric distortion (GD) correction and the precise determination of the relative positions of the CCD chips. The short-term and long-term stabilities of them are also important when it comes to studying whether there are systematic variations in the optical system of the telescope. Aims. We present a solution to determine the actual or physical relative positions between CCD chips. Due to the limited depth of the Gaia catalogue, there may be few stars identified from the Gaia catalogue for astrometric calibration on the deep observation of a large, ground-based or space-based telescope, such as the planned two-metre Chinese Space Station Telescope (CSST). For this reason, we referred to the idea from the Hubble Space Telescope (HST) astrometry to only use stars’ pixel positions to derive the relative positions between chips. We refer to the practice as differential astrometry in this paper. In order to ensure the results are reliable, we took advantage of Gaia EDR3 to derive the relative positions between chips, to provide a close comparison. We refer to the practice as photographic astrometry. Methods. By taking advantage of the GD solution and the common distortion-free frame derived from the observations, we related the physical positions of the adjacent pixel edges of two CCD chips and estimated the actual relative positions between chips. We implemented the technique for the CCD mosaic chips of the Bok 2.3-m telescope at Kitt Peak based on two epochs of observations (Jan 17,2016 and Mar 5,2017). Results. There is a good agreement between the two types of astrometry for the relative positions between chips. For the two epochs of observations, the averages of the gaps derived from photographic astrometry and differential astrometry differ to about 0.046 pixels ($\sim$0.021 arcsec) and 0.001 pixels (¡0.001 arcsec), respectively, while the average precisions of the gaps are about 0.018 pixel ($\sim$0.008 arcsec) and 0.028 pixels ($\sim$0.013 arcsec), respectively. The results provide us with more confidence in applying this solution for the CCD mosaic chips of the CSST by means of differential astrometry. Compared with the solution described by Anderson & King, which has been used to determine the interchip offset of Wide Field Planetary Camera 2 (WFPC2) chips and Wide Field Camera 3 (WFC3) chips at the HST, the solution proposed in this paper shows at least a factor of two improvement in precision, on average. Conclusions. We think there are two definite advantages of our method. On one hand, we perform the measurements for two adjacent edges instead of two individual chips, allowing the results to be as local as possible, and meanwhile we alleviate the propagated error of residual distortions of each observation deviating from the average solution throughout the field of view (FOV). On the other hand, the final outcome is not mixed up with GD effects, which would bias the realistic geometry of the CCD mosaic chips. Therefore, the proposed method is expected to be an effective technique to monitor the stability of the CCD mosaic chips in the CSST and other ground-based CCD mosaic as well. ###### Key Words.: Astrometry — Techniques: image processing — Methods: numerical ## 1 Introduction Modern telescopes are built with larger and larger apertures to enhance detection capability for searching dim targets. However, to fully exploit the scientific productivity of the telescope, an attempt to build a larger single CCD chip would face tough challenges in manufacturing. An alternative technique, called mosaic, is to build a close-packed array, in which a certain number of small-scale CCD chips are placed as close together as possible on a common base or plate, which enables the ground-based and space-based telescope to image a much larger sky area. Moreover, there is a definite trend to design complex mosaic instruments with increasing numbers of chip elements (Sekiguchi et al. 1992; Gunn et al. 1998; DePoy et al. 2008; Lou et al. 2016). Notwithstanding, a larger mosaic size brings additional difficulties in data processing. Since each CCD chip in the mounting plate is an autonomous detector and their properties vary in quantum efficiency, readout noise, dark current, and so on, careful calibration is required before the unification of the measurement of each CCD chip (Luppino et al. 1995). For high-precision astrometry, two key factors that limit the accuracy and precision of the unification are (1) geometric distortion (GD) calibration and (2) determination of relative positions of the CCD chips. For example, with the application of the GD solution for WFPC2’s corrective optics, as well as the changes in the relative positions of the four WFPC2 chips (including three WF chips and one PC chip), over time, Saturn satellite astrometry from multiple chips is combined to achieve more precise result (French et al. 2006) than when using only PC images. Some projects such as the combination of different types of images especially obtained with different chips for the construction of deeper images also rely on the high accuracy of these solutions (Wadadekar et al. 2006). A regular check for the stability of CCD mosaic geometry is necessary, especially before and after a noticeable change in the thermal environment of an optical system, since the derived calibration parameters in lab tests are not proven to be appropriate or stable for on-sky measurement. For example, a significant variation for the metrics of the NOAO CCD Mosaic Imager indicates possible thermal cycling of a dewar, which results from the difference in thermal expansion coefficients between silicon and copper (Platais et al. 2002). Another example is that the relative motion of CCDs over just one week can even be as large as 200 mas, nearly a pixel for the Dark Energy Camera, as a result of a warming or cooling event for the camera (see Fig. 15 in Bernstein et al. 2017). As one of the best space telescopes, the Hubble Space Telescope (HST) is designed for such precise positional imaging astrometry that a small variation of its optical system even over one orbital period should be taken into account or monitored. As the HST orbits the Earth while the Earth orbits the Sun, its focus variations are correlated with thermal variations induced by the angles between the Sun and the telescope (the so- called breathing effect). Also, a clear monotonic trend for the interchip offset of the WFPC2 chips was found by Anderson & King (2003). The two-metre Chinese Space Station Optical Survey is a planned full sky survey operated by the Chinese Space Station Telescope (CSST). The CSST will be equipped with five first-generation instruments including a survey camera, a terahertz receiver, a multi-channel imager, an integral field spectrograph, and a cool planet imaging coronagraph (Zhan 2021). The survey camera is the most important instrument; its aim is wide-area multi-band imaging and slitless spectroscopic survey, and its field of view (FOV) is 1.1${\times}$1.2 deg2. It is equipped with 30 9k${\times}$9k CCD detectors, of which 18 CCDs are for imaging observation and 12 CCDs are for spectroscopic observation. Before the CSST begins science operations around 2024, we should have technical preparation for monitoring the interchip offset of its CCD mosaic chips, for testing the optical system’s stability. In this paper, the CCD mosaic camera of the Bok 2.3-m telescope, which includes 4 4k$\times$4k CCDs, is used as a preliminary prototype of the CSST’s CCD mosaic chips to test the solution to the geometry of CCD mosaic chips proposed by Wang et al. (2019). Although Wang et al. (2019) derived the relative positions between chips of the Bok 2.3-m telescope by using Gaia DR2, we refer to the idea from the astrometry of the HST and propose an alternate solution for the relative position between chips by only using stars’ pixel positions. It is more practical for the ground-based or space-based deep observations such as the CSST, which can observe much fainter stars (e.g. 26 mag in g band) than the Gaia satellite, and we can usually only obtain their pixel positions. In this situation, there are few stars identified from the Gaia catalogue for astrometric calibration. In order to ensure the results were reliable, we took advantage of Gaia EDR3 to derive the relative positions between chips as in Wang et al. (2019) in order to provide a close comparison. For simplicity, we refer to the practice of using Gaia EDR3 to derive the relative positions between chips as photographic astrometry in this paper. The practice of only using stars’ pixel positions is referred to as differential astrometry. During the reduction, we tried our best to eliminate the possible errors on the basis of Wang et al. (2019). Firstly, we corrected the offset in altitude introduced by the differential colour refraction effects. In addition, we adopted some criteria to reject sources with possible bad astrometry based on Gaia EDR3’s re-normalised unit weight error (RUWE), and we also rejected sources that suffered from saturated or crowding status on the observations. We also introduced the weighted scheme to reduce the effect of a large number of low signal-to-noise (S/N) stars on the reduction. This paper is organised as follows. In Sect. 2, we briefly describe the instrument and the observations. In Sect. 3, we introduce the procedure of deriving the GD solution when using photographic or differential astrometry. In Sect. 4, we elaborate the solution for relative positions between the CCD chips, based on photographic astrometry and differential astrometry, respectively. The results are shown and discussions are made in Sect. 5. In Sect. 6, we compare the solution for the relative positions between chips proposed in this paper with the solution described by Anderson & King (2003, hereafter the AK03 method), which has been used to determine the interchip offset of WFPC2 chips and WFC3 chips (Bellini & Bedin 2009) at the HST. The conclusion is drawn in the last section. ## 2 Instrument and observations The observations are only taken to derive the GD solution for the 90Prime camera of the Bok 2.3-m telescope when it serves the Beijing-Arizona Sky Survey (BASS). Although more detailed information about the BASS project can be found in Wang et al. (2019), we briefly summarise the project below. The BASS is a new imaging survey resulting from the collaboration between the National Astronomical Observatory of China (NAOC) and Steward Observatory. It uses the Bok 2.3-m telescope, which is located at Kitt Peak (IAU code 691, E248${\degr}$ 24${\arcmin}$ 3.6${\arcsec}$, N31${\degr}$ 57${\arcmin}$ 28.7${\arcsec}$) with the 90Prime camera installed at the prime focus (4 CCDs, 4096 $\times$ 4032 pixels each, as shown in Fig. 1) to survey an area of about 5400 deg2 in the north Galactic cap. The photometric system includes the SDSS g and DES r bands. The expected depths for 5$\sigma$ point sources and Galactic extinction correction are 24.0 mag for the g band and 23.4 mag for the r band, respectively. In order to push the astrometric capability of the Bok 2.3-m telescope to its limits, the GD solution is needed. We attain two epochs of observations to derive the GD solution. Specifically, a dithered observational scheme is organised in an array of 7${\times}$7 pointings with an offset of about 10${\arcmin}$ (Wang et al. 2019). The exposure time of each observation is 60.0 s. The specifications of the instrument and the observations are given in Table 1 and Table 1. For simplicity, the two observation-sets are called Obs16 (January 17, 2016) and Obs17 (March 5, 2017), respectively. It should be noted that, due to lack of experience, Obs16 was centred on a sparse field (coordinates $(\alpha,\delta)_{\rm J2000.0}\sim(\rm 10^{h}48^{m}12^{s}\\!\\!.0,+28^{\circ}45^{\prime}46^{\prime\prime}\\!\\!.9)$). There are only about 300 stars on each chip, and they are inadequate to derive a fine GD solution. Also, the observation was interrupted on that night. About one hour later, the observation resumed. Considering the distortion is continuously evolving, only the last 30 frames (sorted by observation time) of Obs16 were chosen for processing in this paper. In 2017, a much denser calibration field was centred on coordinates $(\alpha,\delta)_{\rm J2000.0}\sim(\rm 06^{h}48^{m}12^{s}\\!\\!.0,+00^{\circ}45^{\prime}47^{\prime\prime}\\!\\!.0)$. There are about 3000 stars on each chip. Because of the cloudy weather, we discarded 11 frames of Obs17 with poor image quality. Table 1: Specifications of 90Prime camera in the Bok 2.3-m telescope. F-Ratio | f/2.98 ---|--- CCD field of view | 1.08${\degr}$${\times}$1.03${\degr}$ Absolute pointing | $<$ 3${\arcsec}$ RMS Size of CCD array | 4096${\times}$4032${\times}$4 Size of pixel | $15{\times}15$ $\mu$m2 Approximate pixel scale | $0\aas@@fstack{\prime\prime}453$/pix Table 2: Specifications of the observations. Date | Abbr. | No. | Filter | Seeing | Airmass ---|---|---|---|---|--- Jan 17,2016 | Obs16 | 32 | DES r | 1.7${\arcsec}$-2.4${\arcsec}$ | 1.05-1.14 Mar 5,2017 | Obs17 | 38 | SDSS g | 1.3${\arcsec}$-1.7${\arcsec}$ | 1.16-1.20 111The second column lists the abbreviation for the observation set. The third column lists the number of frames in each observation set. The fourth column lists the adopted filter. The last two columns list the seeing and the range of the air mass for the observations, respectively. Figure 1: CCD mosaic layout in the 90 Prime camera of the Bok 2.3-m telescope. There are four CCDs: CCD#1, CCD#2, CCD#3, and CCD#4, and four identifiers are listed at the corners of each CCD. For CCD#1, the pixel position of Corners 1, 2, 3, and 4 are (1,4032), (4096,4032), (1,1), and (4096,1), respectively. The pixel positions of corners in the other chips are the same as CCD#1. ## 3 The GD solution This section mainly describes the GD solutions for the observations by means of two types of astrometry. For simplicity, the GD solution through photographic astrometry is called GD1, while the GD solution via differential astrometry is called GD2. ### 3.1 Data pre-processing To derive an accurate GD solution, we first performed a two-dimensional Gaussian centring to obtain the pixel positions of the star images on the frame. After that, we cross-matched the pixel positions with the sources in the Gaia EDR3, considering their motions and gnomonic projection effects. It should be noted that fewer sources are found in Gaia EDR3 than Gaia DR2 (Gaia Collaboration et al. 2018) for the field of Obs17, which is in a very crowded area. According to Riello et al. (2021), in the data processing of Gaia EDR3, the background treatment for BP and RP has been considerably improved to avoid systematic problems caused by crowding, and as a result, the crowding evaluation in Gaia EDR3’s processing leads to a cleaner list of internal calibration sources. We then removed many sources with possible bad astrometry, whose RUWEs in Gaia EDR3 are larger than 1.4 for Obs16 and 1.1 for Obs17, respectively, determined by the numbers of the observed star in each frame and the suggestion given by the Gaia Collaboration (2021). We also excluded stars that are saturated or suffer from the contamination of blended neighbour(s) or saturated star(s) on the observation. Finally, we obtain about 3,000 Gaia stars for Obs16 and about 120,000 for Obs17. The above processings are based on the software developed by us (Peng et al. 2012, 2015, 2017; Wang et al. 2017). ### 3.2 Differential colour refraction correction To achieve high-accuracy results through photographic astrometry, we considered the differential colour refraction (DCR) especially in the observation of Obs17, which is observed at $\approx$30${\degr}$ zenith distance with the SDSS g filter. However, the observations were not taken with several filters on one night, so we cannot correct the DCR using the colour index of stars by the photometry of them. We referred to the technique proposed by Lin et al. (2020), which corrects the DCR of each filter against the colour index proposed by catalogue. Since the filters of the Pan-STARRS1 (PS1) survey are similar to the filters used for the observations, we cross- identified sources between PS1 and Gaia EDR3 to obtain the stars’ $gmag$ (central wavelength 4866${\AA}$) and $rmag$ (central wavelength 6215${\AA}$) provided by PS1. They correspond to the SDSS g filter (central wavelength 4776${\AA}$) and the DES r filter (central wavelength 6412${\AA}$) used by the BASS, respectively. After we cross-matched the observations with Gaia EDR3 and PS1 data, we performed the reduction in the alt-azimuth coordinate system with a fourth- order polynomial, considering all astrometric effects including proper motion, parallax, aberration, atmosphere refraction, and projection effects. It should be noted that we did not take the RA-OBS and DE-OBS keywords recorded in the FITS header as the tangential point as Wang et al. (2019) did, since they are J2000.0 positions and would affect the accurate calculation for atmospheric refraction. Instead, we calculated their apparent R.A. and Dec. positions and transformed them to the apparent azimuth and altitude positions. For atmosphere refraction correction, a simple $A$ tan $z$+$B$ tan ${}^{3}z$ model ($z$ is the zenith distance) provided by SOFA library222http://www.iausofa.org was adopted. The fourth-order polynomial makes it possible to absorb the GD effects in the observations. The residuals in altitude mainly reveal the DCR of stars. We adopted Eq. 5 of Lin et al. (2020) to derive the following DCR solution: $\operatorname{DCR}\left(a_{1},a_{2}\right)=a_{1}+a_{2}\cdot color\cdot\tan z,$ where $color$ and $z$ are the colour index ($gmag-rmag$) and the zenith distance of the star, respectively, and $a_{1}$ and $a_{2}$ are the fitted DCR parameters. The DCR solutions of each chip are shown in Table 3. After DCR correction, there are no significant systematic errors in the residual ($\langle O-C\rangle$) in altitude against $(g-r)_{PS1}$, especially for Obs17, as shown in Fig. 2. We note that the results of Obs17 are based on the stars brighter than 18 Gmag and the results of Obs16 are based on the stars brighter than 17 Gmag. The dispersion of the $\langle O-C\rangle$s in altitude is nearly the same as that in the unaffected azimuth direction. Table 3: DCR solution for the observations. Obs-set | CCD# | $a_{1}$ | $a_{2}$ ---|---|---|--- Obs16 | 1 | 0.006 | -0.013 2 | 0.005 | -0.016 3 | 0.008 | -0.022 4 | 0.007 | -0.020 Obs17 | 1 | 0.019 | -0.045 2 | 0.028 | -0.060 3 | 0.019 | -0.046 4 | 0.028 | -0.059 333The first column lists the observation set. The second column lists the index of the CCD chip. The last two columns list the coefficients of the solution. The units are in arcsec. Figure 2: Residual $(O-C)$ in alt-azimuth coordinate system against $(g-r)_{PS1}$ before and after DCR correction. The top two panels are $\langle O-C\rangle$ before and after DCR correction for Obs16. The bottom two panels are $(O-C)$ before and after DCR correction for Obs17. We note that the results of Obs17 are based on the stars brighter than 18 Gmag and the results of Obs16 are based on the stars brighter than 17 Gmag. ### 3.3 GD1 procedure by means of photographic astrometry The most direct way to solve the GD solution is to compare the observed positions with the positions of a distortion-free frame (DFF). By definition (Anderson & King 2003), the DFF is a set of positions, into which any observed positions after GD correction can be transformed. The set has nothing more than a displacement, a rotation, and a scale factor from a four-parameter conformal transformation. Now, Gaia EDR3 provides us with accurate enough positions to build a DFF for the observations. For a faint source (Gmag 20), the expected median error propagated to the astrometric position in J2000.0 of Obs17 is about 0.9 mas, while the uncertainties of the positional centring for a high S/N star image is usually 1$\%$ pixel, which is about 5 mas. So, the positions calculated from Gaia EDR3 can serve as a distortion-free frame for the observations in this paper. However, we have to consider the possible systematic errors caused by spurious astrometric solutions in Gaia processing. They are mainly due to close source pairs, especially in crowded fields, which even Gaia can not completely resolve (Fabricius et al. 2021). Although Gaia EDR3 has better angular resolution than Gaia DR2, 1.6$\%$ of the astrometric solutions may be still spurious, which produces meaningless proper motions and parallaxes (Fabricius et al. 2021). Thanks to the dithered scheme, which allows the same stars to be imaged in different positions of the CCD detectors, their possible systematic errors could be cancelled by implementing the GD1 procedure as described in the following. For each observation, we took the standard coordinate calculated from Gaia EDR3 as its DFF, considering all astrometric effects (proper motion, parallax, aberration, atmosphere refraction, and differential colour refraction) and projection effects. After gnomonic projection, a four-parameter conformal transformation was used to relate stars’ standard coordinates to their pixel positions. The residual between the observed and the calculated positions ($O$ – $C$) can be resolved into three sources: the GD effect as a function of the position of the stars in the CCD detector, the possible catalogue systematic error as described above, and the measurement error. As the same star in dithered observations falls in different pixel positions on the CCD chip, the GD effect in specific pixel positions can be derived by cancelling out the catalogue’s systematic error and compressing the measured errors (see Peng et al. 2012 for details). Since the field of Obs17 is much denser than Obs16, we can derive a finer GD solution for Obs17. We divided the FOV of each detector into 16$\times$16 elements for Obs16 and 32$\times$32 elements for Obs17, according to the compromise between the need for an adequate number of grid elements to model the GD solution and an adequate sampling of stars ($\geq 30$, determined empirically) in each grid element. The GD effect in the centre of each element was estimated from the average GD effects of all the stars in this element through a $\sigma$-clipped average solution. Solving for the GD solution is an iterative process, with continuously improving positions and reduced residuals. Convergence was reached until the average residual in each element was not larger than 0.001 pixels. After the GD solution was adopted for the observations, we calculated the standard deviation ($\sigma$) of its residuals for each star. Again we derived a new GD solution using a weighted four-parameter conformal transformation. The weight of each star was set to $1/\sigma^{2}$. We note that, during the procedure, a third-order polynomial was used to present the large-scale GD, and a look-up table was used to present the small- scale GD. The third-order polynomial is as follows: $\left\\{\begin{array}[]{rcl}\Delta x&\\!\\!\\!=\\!\\!\\!&\sum\limits_{0\leqslant i+j\leqslant 3}a_{k}\tilde{x}^{i}\tilde{y}^{j},k=1\cdots 10\\\ \Delta y&\\!\\!\\!=\\!\\!\\!&\sum\limits_{0\leqslant i+j\leqslant 3}b_{k}\tilde{x}^{i}\tilde{y}^{j},k=1\cdots 10,\\\ \end{array}\right.$ where $\tilde{x}_{i,j,k}$ and $\tilde{y}_{i,j,k}$ are the normalised positions, defined as $\left\\{\begin{array}[]{rcl}\tilde{x}=(x-2048)/2048\\\ \tilde{y}=(y-2016)/2016.\\\ \end{array}\right.$ The normalised positions make it easier to recognise the magnitude of the contribution of each term at the edge of the chip. The coefficients of the polynomial are given in Appendix A. The details of the look-up table are not given in this paper, but the interested reader may wish to contact the corresponding author for more information. The final derived GD1 solutions are shown in the left panel of Fig. 3. The median (MED) of GD1 solutions is about 0.60 pixels smaller than that of Wang et al. (2019) for Obs16 and 0.68 pixels smaller for Obs17. The maximun (MAX) GD1 solution is about 1.98 pixels larger than that of Wang et al. (2019) for Obs16 and 3.03 pixels larger for Obs17. We think the main cause is that we exclude a large amount of sources, which may introduce systematic errors. The introduced weighted scheme reduces the effect of a large number of low S/N stars in the GD1 solution. ### 3.4 GD2 procedure by means of differential astrometry For differential astrometry, its DFF (master frame in this paper) is constructed directly from the pixel positions of the stars, which the GD- corrected observations can be transform into, with nothing more than a four- parameter conformal transformation. However, as the FOV of the instrument is rather large, the projection effects should be taken into account. Therefore, we constructed a local master frame for each observation rather than constructing a global master frame for all of the observations (Anderson & King 2003). The local master frame represents a set of distortion-free positions, which can be observed with the used chip at corresponding pointing. Specifically, when a single observation was taken as the root of the local master frame, only other observations that have enough common stars ($\geq$30, determined empirically) with the root observation, were chosen for the construction of the local master frame. The constraint reduces the projection effects on the positions of the master frame, since they were derived from the observations whose pointings are not too far away from the pointing of the root observation. In detail, we found a conformal transformation from each observation to the root observation by the least-squares method, determined from their common stars’ pixel positions. The position of each star on the master frame was calculated based on the $\sigma$-clipped average of all the transform positions from the same stars of different observations. The standard deviation of each position of the master frame served as a weight for transformation in the next iteration. At the same time, a star on the frame would be flagged if it had a transform outlier during the estimation for the master frame’s position, so the outlier would not be used in the next iteration. Also, new stars were added to the master frame, and, finally, the master frame covers all the observations if they have common stars with the root observation. The primitive master frame was then used to improve the transformation, with the weights and flags determined by the previous iteration. The procedure was iterated several times until the positions on the master frame converged to 0.001 pixels ($\sim$0.5 mas) in each direction. Only the transformation residuals of the common stars were taken as the GD effects and used to derive the GD solution as previous. And after the primitive GD solution was derived, the master frames were reconstructed based on the corrected positions of the observations. The GD2 procedure iterated until the average residual in each element was not larger than 0.001 pixels. The derived GD2 solutions are shown in the right panel of Fig. 3, and they are similar to the GD1 solutions. A detailed comparison between them (GD2-GD1) for the respective chip is shown in Fig. 4. The median differences between the two GD solutions achieve a considerable level (0.91 pixels for Obs16 and 1.85 pixels for Obs17). As shown in Appendix A, the cubic terms of the two GD solutions are similar, and larger differences are found in quadratic terms and linear terms. Similar discrepancies between the two GD solutions are also found in our previous paper (Zheng et al. 2021). Although Anderson & King (2003) stated that the observations at the same orientation are unable to constrain the linear distortion terms, we think there are also some quadratic distortion terms in the constructed master frame. As a result, there might be a degeneracy between low-order terms (order$\leq$2) in the fitted distortion polynomial and the translation in the conformal transformation. By introducing observations at various orientations, the discrepancy between the two GD solutions will become much smaller (Zheng et al. 2021). Unlike many ground- based telescopes with rigid mounting of the telescope itself and of its detectors, the CSST and other space telescopes are able to obtain this type of observations. Figure 3: GD solution for 90Prime camera of the Bok 2.3-m telescope. The left panels show GD1 solutions derived by photographic astrometry, and the right panels show GD2 solutions derived by differential astrometry. The top panels show GD solutions derived from Obs16, and the bottom panels show those derived from Obs17. The horizontal direction corresponds to the x axis, and the vertical direction corresponds to the y axis. The vectors of the solutions are magnified by a factor of 20. Maximums and medians are shown at the top in pixels. Figure 4: Differences between the models derived from the GD1 solution and the GD2 solution. The left panels show the differences for Obs16, and the right panels show the differences for Obs17. The horizontal direction corresponds to the x axis, and the vertical direction corresponds to the y axis. The vectors of the solutions are magnified by factors of 200 for Obs16 and 100 for Obs17, respectively. Maximums, medians, and the RMSs of the differences are shown at the top in pixels. We note that RMS=$\sqrt{\frac{\sum_{i=1}^{n}((x_{GD2}-x_{GD1})^{2}+(y_{GD2}-y_{GD1})^{2})}{n-1}}$. ### 3.5 Accuracy of the GD solution To evaluate the accuracy of the GD solution, the GD-corrected positions were transformed to the DFF’s positions. The difference between the transformed positions ($x_{i}^{T},y_{i}^{T}$) and the distortion-free positions ($\tilde{x},\tilde{y}$) directly quantifies how close we are to reaching the DFF. For example, the standard deviation ($\sigma_{x}$) of ($x_{i}^{T}-\tilde{x}$) was used to estimate the measurement precision in $x$ as follows: $\begin{aligned} \sigma_{x}=\sqrt{\frac{\sum_{i=1}^{n}(x_{i}^{T}-\tilde{x})^{2}}{n-1}}\\\ \end{aligned},$ and the precisions of other quantities stated in this paper are similar to the above equation. A six-parameter linear model was used to transform GD-corrected positions to DFF positions. This is because it corrects not only the changes in linear terms of GD, which are easily changed by variations in the telescope’s flexure, but also a large amount of the differential atmospheric refraction (DAR, discussed in detail in the next sub-section) in the FOV for differential astrometry. The measurement precisions after GD correction for Obs16 and Obs17 are shown on the bottom panel of Fig. 5 and Fig. 6. As the $x$ axis is nearly parallel to the $RA$ direction and the $y$ axis is nearly parallel to the $DEC$ direction, to facilitate the comparison, the results of differential astrometry are converted to arcseconds with an average pixel scale of $0\aas@@fstack{\prime\prime}453$ pix${}^{\text{-}1}$. For Obs16, the precision of differential astrometry is slightly inferior to photographic astrometry in the $Y$ direction or the approximate $DEC$ direction, although it just tells us how accurately we can expect to register the relative position of a star among different dithered frames. For Obs17, the precisions of the two types astrometry reach a comparable level. The precision in the $RA$ (or $X$) direction is smaller than that in the $DEC$ (or $Y$) direction. The situation is similar to that of Wang et al. (2019) (Fig. 20). Thanks to the excluding criteria, fewer abnormal values above the average level are found in our results, especially for stars fainter than 17 Gmag. Figure 5: Measurement precision for Obs16 after GD correction. Top: Standard deviation ($\sigma$) of the transformation residuals after GD1 correction as a function of Gmag by a six-parameter linear transformation to the standard coordinate. The left shows the $RA$ direction and the right shows the $DE$ direction. Bottom: Standard deviation of the transformation residuals after GD2 correction as a function of Gmag by a six-parameter linear transformation to the master frame. The left shows the $X$ direction and the right shows the $Y$ direction. The red dashed line marks the median ($\sigma$) for the stars brighter than 18 Gmag. Figure 6: Measurement precision for Obs17 after GD correction. Top: Standard deviation ($\sigma$) of the transformation residuals after GD1 correction as a function of Gmag by a four-parameter linear transformation to the standard coordinate. The left shows the $RA$ direction and the right shows the $DE$ direction. Bottom: Standard deviation of the transformation residuals after GD2 correction as a function of Gmag by a six- parameter linear transformation to the master frame. The left shows the $X$ direction and the right shows the $Y$ direction. The red dashed line marks the median ($\sigma$) for the stars brighter than 17 Gmag. It should be noted that the GD solution of the top panel is derived by means of photographic astrometry and the GD solution of the bottom panel is derived by means of differential astrometry. Figure 7: Variations of the physical pixel scale for Obs16 against the zenith distance. The variations can be estimated by the slope of a fitted straight line to the data. Figure 8: Variations of the physical pixel scale for Obs17 against the zenith distance. The variations can be estimated by the slope of a fitted straight line to the data. Figure 9: Variations of the scale relative to the master frame for Obs16 against the zenith distance. The variations can be estimated by the slope of a fitted straight line to the data. Figure 10: Variations of the scale relative to the master frame for Obs17 against the zenith distance. The variations can be estimated by the slope of a fitted straight line to the data. As Anderson & King (2003) indicated, there is an interaction between scale and distortion. Therefore, we investigate if the scale varies during the observation. The pixel scale against the zenith distance is shown in Fig. 7 for Obs16. The pixel scale against the zenith distance of Obs17 is shown in Fig. 8. For the two epochs, the pixel scales change very little during the observation; although, a close dependence of pixel scale on zenith distance can be found for Obs16. We thus conclude that the GD effects are stable during the observation. We also investigate the variations of the scale relative to the master frame, and the results are shown in Fig. 9 and Fig. 10. A similar conclusion is reached. The stability of the scale also confirmed that much of the projection effects have been reduced since the local master frames have nearly the same scale as the root observations. ### 3.6 Estimation of the DAR of the observations for differential astrometry Since the 90Prime camera has such a large FOV, the DAR on the observations should be considered when using differential astrometry. The DAR for two sources in arcsec with observed zenith distance $z$ and zenith separation $\Delta z_{0}$, is given approximately by Gubler & Tytler (1998): $\begin{aligned} {\rm DAR}&=\frac{(1+\tan^{2}z)(A+3B\tan^{2}z)\Delta z_{0}}{206265}\\\ \end{aligned},$ where $A$ and $B$ depend on the meteorological conditions (atmospheric pressure, ambient temperature and relative humidity can be found from the historic data of the website for the site weather of Kitt Peak National Observatory444http://www-kpno.kpno.noao.edu/Info/Mtn\\_Weather/) and the wavelength of the filter. To estimate the DAR on the observations, we used iauRefco, a C routine from SOFA library to compute $A$ and $B$. The adopted value of the input parameters for iauRefco function are listed in Table 4. $\Delta z_{0}$ is set as the largest separation between a pair of stars as the FOV of each chip ($\approx$0.5${\degr}$). Finally, we find that the DAR is mainly a linear trend for the observations, since the largest residual after using a line to fit the DAR just reaches the minimum positional error; that is, 0.01 pixels ($\sim$5 mas). Therefore, the DAR is considered negligible when using a six- parameter linear transformation for differential astrometry. Table 4: Specifications of the input parameter for iauRefco. Date | PHPA | TC | RH | WL ---|---|---|---|--- | millibar | ${\degr}$C | | $\mu$m 2016.1.17 | 778 | 5.7 | 50$\%$ | 0.6412 2017.3.5 | 805 | 9.2 | 40$\%$ | 0.4776 ## 4 The determination for relative positions between the CCD chips ### 4.1 Solution to the geometry of CCD mosaic chips – Methodology In this section, we interpret the procedure of determination of the geometry of CCD mosaic chips by taking advantage of the derived GD solution. The procedure is mainly explained in the way of photographic astrometry as follows. For the same pointing, the observations taken with four chips share the same standard coordinate derived from Gaia EDR3. We adopted a six-parameter linear transformation to relate the standard coordinate $(\xi,\eta)$ to the pixel position $(x,y)$ after GD correction (GDC) for the observations, since it can absorb not only the linear distortion which is vulnerable to the gravitational flexure effect, but also the DAR in differential astrometry. The pixel position $(x,y)$ after GDC on each CCD chip can be transformed into the standard coordinate $(\xi,\eta)$. In turn, the standard coordinate can be transformed into the distortion-free pixel position of any chip. Furthermore, due to the distortion effect, its actual or physical pixel position on the chip can be estimated by implementing reverse GDC to the distortion-free position. Throughout the process, the standard coordinate serves as a bridge to enable the pixel positions of one chip to be transformed into the pixel coordinate of another chip. Specifically, we calculated the relative positions of two adjacent edges between chips to estimate the geometry of CCD mosaic chips. To further illustrate the process, we first give a layout of the CCD mosaic chips and designate a number for each corner of the chips, as shown in Fig. 1. L${}_{m\text{-}n}$ would represent a horizontal or vertical edge from Corner m to Corner n (all edges are in red in Fig. 1). Any edge of a chip can be transformed to the physical pixel coordinate of the adjacent reference chip in order to estimate the relative positions between the chips. In the following, we take the transformation of L${}_{3\text{-}4}$ into the pixel coordinate of CCD#2 as an example. The whole procedure is shown in Fig. 11. As mentioned above, L${}_{3\text{-}4}$ in CCD#1 after GDC of CCD#1 (GDC#1 for short) can be transformed into the standard coordinate for each frame. Similarly, L${}_{3\text{-}4,}$ in standard coordinates, can be transformed into CCD#2’s distortion-free pixel coordinate, depending on the transformation of CCD#2 into the standard coordinate. Finally, considering the actual GD effect of CCD#2, we adopted a reverse GDC#2 for L${}_{3\text{-}4}$ to estimate its physical (distorted) positions in CCD#2’s pixel coordinate, as described below. As seen from Fig. 3, the GD effects of the adjacent regions of any two chips are relatively small, while the GD effects reach the maximum near the four corners of the FOV. So, firstly, we roughly estimated the distorted positions. That is, we used the undistorted position ($x_{0},y_{0}$) as the input for the GD model of CCD#2, to compute GD effects. The distorted positions ($x_{d},y_{d}$) can be derived with the undistorted positions and the corresponding GD effects. Then, the distorted positions were taken as the new input for the GD model to derive new undistorted pixel positions ($\tilde{x}_{0},\tilde{y}_{0}$). The differences between the original undistorted positions ($x_{0},y_{0}$) and the new undistorted pixel positions ($\tilde{x}_{*},\tilde{y}_{*}$) were used to adjust the distorted positions, leading to much smaller differences. Finally, the iteration stopped until the differences were less than 0.001 pixels. Based on the estimated distorted pixel positions, the relative position between CCD#1 and CCD#2 can be solved analytically. It should be noted that the GD solution for each chip has the effective area covering the size of the chip, that is 4032${\times}$4096, therefore one should avoid transforming an edge too far from the reference chip, which would introduce excess extrapolation errors when performing a reverse GDC. Therefore, we choose L${}_{3\text{-}4}$ rather than L${}_{1\text{-}2}$ to be transformed into CCD#2. Figure 11: Flow chart of transforming edge L${}_{3\text{-}4}$ in CCD#1 into the pixel coordinate of the reference chip CCD#2 through photographic astrometry or differential astrometry. The key distinctions between the two methods are the ’bridge’ linking two adjacent CCD chips, which are the standard coordinates, or the master frame, respectively. However, if there are a lot of stars fainter than the Gaia faint limit ($\sim$21 Gmag), such as in the observations of the CSST, it is more effective to implement the procedure directly based on stars’ pixel positions. Accordingly, we provide an alternative procedure by means of differential astrometry to determine relative positions between CCD chips. In a similar manner, every pixel position of a chip can be transformed to the pixel coordinate of another chip, by using the local master frame and the GD solution (Fig. 11). Therefore, it is not repeated here. ## 5 Results and discussions Figure 12: Transformed positions of L${}_{3\text{-}4}$ in the pixel coordinate of CCD#2. The left is derived from photographic astrometry and the right is derived from differential astrometry. The black line shows the results of Obs16 and the red line shows the results of Obs17. Figure 13: Similar to Fig. 12, but for the transformed positions of L${}_{13\text{-}15}$ in the pixel coordinate of CCD#2. Figure 14: Similar to Fig. 12, but for the transformed positions of L${}_{13\text{-}14}$ in the pixel coordinate of CCD#3. Figure 15: Similar to Fig. 12, but for the transformed positions of L${}_{2\text{-}4}$ in the pixel coordinate of CCD#3. Figure 16: Differences between the transformed positions of L${}_{3\text{-}4}$ in the pixel coordinate of CCD#2 derived from the two types of astrometry. Each line corresponds to a single observation. The left is for Obs16 and the right is for Obs17. The averages and the standard deviation ($\sigma$) of the differences are shown at the top in pixels. Figure 17: Similar to Fig. 16, but for the transformed positions of L${}_{13\text{-}15}$ in the pixel coordinate of CCD#2. Each line corresponds to a single observation. Figure 18: Similar to Fig. 16, but for the transformed positions of L${}_{13\text{-}14}$ in the pixel coordinate of CCD#3. Each line corresponds to a single observation. Figure 19: Similar to Fig. 16, but for the transformed positions of L${}_{2\text{-}4}$ in the pixel coordinate of CCD#3. Each line corresponds to a single observation. In this section, we adopted a six-parameter linear transformation to transform the pixels of L${}_{3\text{-}4}$ and L${}_{13\text{-}15}$ into the pixel coordinate of CCD#2 and to transform L${}_{13\text{-}14}$ and L${}_{2\text{-}4}$ into CCD#3. The results of the two epochs are plotted from Fig. 12 to Fig. 15, respectively. It is clear that the adjacent edges between any two chips are not parallel. The results of photographic astrometry and differential astrometry are similar to each other, while the plottings of Wang et al. (2019) (Fig. 21 and Fig. 22) are clearly different. It confirms that the adopted tangential points in this paper meet the actual situation and do not introduce extra errors. To further investigate the consistency between photographic astrometry and differential astrometry, we performed a subtraction for the relative positions derived from the two types of astrometry in the $X$ or $Y$ direction, as shown from Fig. 16 to Fig. 19. For Obs16, the average of the differences between the two types of astrometry is about 0.046 pixels ($\sim$0.021 arcsec), and for Obs17, it is at much smaller level, of about 0.009 pixels ($\sim$0.004 arcsec). The average standard deviations of the differences are about 0.041 pixels ($\sim$0.019 arcsec) for Obs16 and about 0.032 pixels ($\sim$0.014 arcsec) for Obs17, respectively. We think the results of Obs17 are more credible, since there are more stars in the observations of 2017 than 2016. Greater differences and dispersions can also be found near the marginal areas. We think the differences are mainly due to the difference between the adopted GD solution shown in Fig. 4, while the dispersions are mainly due to the extrapolation errors when performing reverse GDC to transform positions to the reference chip. We believe the extrapolation errors are also related to the magnitude of the GD effects in the grid elements. More extrapolation errors may be introduced if the adopted GD effects are larger. Since the GD effects of the Bok 2.3-m telescope are radial, they reach their maximum in the four corners of the FOV, as shown in Fig. 3, while the adopted GD effects for determining the relative positions between chips are much smaller. To estimate the upper bound of the extrapolation errors, we computed the averages and the precisions of the transformed corners’ position, since they are easily disturbed by the extrapolation from the GD effects. The results are shown in Table 5. The averages of the differences between the results of photographic astrometry and differential astrometry are about 0.018 pixels ($\sim$0.008 arcsec) for Obs16 and about 0.026 pixels ($\sim$0.012 arcsec) for Obs17, respectively. The average precisions are about 0.049 pixels ($\sim$0.022 arcsec) for Obs16 and about 0.056 pixels ($\sim$0.025 arcsec) for Obs17, respectively. Table 5: The transformed positions of the adopted corners to the reference chips (see Fig. 1). Date | Corner | 3 | 4 | 13 | 15 ---|---|---|---|---|--- Method | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ 2016 | GD1 | (-7.409,4174.955) | (0.020,0.043) | (4087.713,4174.804) | (0.015,0.059) | (4465.584,4050.774) | (0.031,0.043) | (4474.233,19.740) | (0.022,0.060) GD2 | (-7.400,4174.983) | (0.027,0.042) | (4087.696,4174.942) | (0.018,0.029) | (4465.591,4050.840) | (0.026,0.032) | (4474.262,19.664) | (0.034,0.021) 2017 | GD1 | (-8.668,4173.269) | (0.028,0.034) | (4086.377,4174.928) | (0.028,0.044) | (4462.119,4054.050) | (0.023,0.031) | (4468.875,23.009) | (0.035,0.025) GD2 | (-8.730,4173.295) | (0.031,0.055) | (4086.362,4174.791) | (0.029,0.046) | (4462.143,4053.977) | (0.038,0.050) | (4468.928,23.057) | (0.066,0.065) Date | Corner | 2 | 4 | 13 | 14 Method | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ | mean | $\sigma$ 2016 | GD1 | (-365.724,4010.315) | (0.022,0.058) | (-362.840,-20.635) | (0.020,0.040) | (15.129,-144.431) | (0.011,0.032) | (4110.078,-132.512) | (0.018,0.037) GD2 | (-365.835,4010.479) | (0.023,0.039) | (-362.864,-20.706) | (0.021,0.031) | (15.108,-144.558) | (0.020,0.035) | (4110.114,-132.581) | (0.023,0.029) 2017 | GD1 | (-364.492,4010.520) | (0.036,0.032) | (-362.200,-20.438) | (0.031,0.025) | (13.533,-141.278) | (0.019,0.031) | (4108.507,-133.841) | (0.028,0.050) GD2 | (-364.520,4010.478) | (0.026,0.029) | (-362.197,-20.513) | (0.050,0.043) | (13.560,-141.323) | (0.034,0.047) | (4108.603,-133.934) | (0.035,0.068) 555GD1 means the results of photographic astrometry and GD2 means the results of differential astrometry. Column 3 to 10 show the mean pixel positions and their corresponding precisions. The top table shows the results taking CCD$\\#$2 as the reference and the bottom table shows the results taking CCD$\\#$3 as the reference. The averages of the differences between the results of photographic astrometry and differential astrometry are about 0.018 pixels ($\sim$0.008 arcsec) for Obs16 and about 0.026 pixels ($\sim$0.012 arcsec) for Obs17 respectively. And the average precisions are about 0.049 pixels ($\sim$0.022 arcsec) for Obs16 and about 0.056 pixels ($\sim$0.025 arcsec) for Obs17 respectively. All units are in pixels. For comparison with the AK03 method in the next section, we consider the average of the transformed positions as the average gap between chips. The relative angle between chips can be estimated by the slope of a fitted straight line of the transformed positions. The results are shown in Table 6. For the two types of astrometry, there are some little differences between them in rotation angle, which are within 0.002 degrees. For Obs16, the average gaps derived from photographic astrometry and differential astrometry differ by about 0.046 pixel ($\sim$0.021 arcsec). For Obs17, the average gaps derived from photographic astrometry and differential astrometry only differ by about 0.001 pixel. The precisions of the gaps derived from the two types of astrometry achieve a comparable level. The average precisions of the gaps are about 0.018 pixel ($\sim$0.008 arcsec) for Obs16 and 0.028 pixel ($\sim$0.013 arcsec) for Obs17, respectively. Table 6: Statistics of the average gaps and the relative angles between chips. Date | Item | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$ | $<$mean$>$ | $\sigma$ ---|---|---|---|---|---|---|---|---|--- | | CCD1(CCD2) | CCD4(CCD3) | CCD4(CCD2) | CCD1(CCD3) 2016 | GD1gap | 142.853 | 0.019 | 138.590 | 0.018 | 373.893 | 0.023 | 364.373 | 0.014 GD1angle | -0.003 | 0.001 | 0.167 | 0.001 | 89.877 | 0.000 | 89.960 | 0.000 GD2gap | 142.935 | 0.017 | 138.649 | 0.022 | 373.925 | 0.016 | 364.385 | 0.015 GD2angle | -0.002 | 0.001 | 0.169 | 0.001 | 89.877 | 0.001 | 89.960 | 0.000 2017 | GD1gap | 142.079 | 0.029 | 137.686 | 0.028 | 369.456 | 0.021 | 363.432 | 0.023 GD1angle | 0.023 | 0.001 | 0.104 | 0.001 | 89.904 | 0.001 | 89.968 | 0.001 GD2gap | 142.091 | 0.034 | 137.682 | 0.035 | 369.460 | 0.028 | 363.417 | 0.028 GD2angle | 0.022 | 0.001 | 0.104 | 0.001 | 89.903 | 0.001 | 89.968 | 0.001 666GD1 means the result of photographic astrometry and GD2 means the result of differential astrometry. Columns 3 to 10 show the average and the precision for the gaps and the angles. The reference chips are in parentheses. The results of the gaps are in pixels and the results of relative angles are in degrees. ## 6 Comparison with the AK03 method As our method is implemented by transforming the adjacent edge of one chip to the actual pixel coordinate of the reference chip, it is a physical metric for the CCD mosaic chips. In contrast, the AK03 method determines the geometry of CCD mosaic chips when each chip is put into a distortion-free coordinate. Although the AK03 method mainly aims to offer convenient solutions for many applications needing to transform the GD-corrected positions of each chip into a common distortion-free reference frame, it is still useful for monitoring the progress of the interchip offset of CCD mosaic chips. In this section, we make a comparison between the two methods from this perspective. Of the CCD#k, the distortion-corrected positions ($x_{k}^{\rm corr},y_{k}^{\rm corr}$) were transformed to the distortion-corrected positions of reference chip (CCD#ref,ref$\neq$k) using a six-parameter linear transform, which can absorb the DAR in the following first-order terms: $\begin{array}[]{rcl}\left(\begin{array}[]{c}x_{ref}^{\rm corr}\\\ y_{ref}^{\rm corr}\\\ \end{array}\right)&\\!=\\!&\\!\left[\begin{array}[]{cc}\\!\\!A&B\\\ \\!\\!C&D\\\ \end{array}\\!\right]\\!\left(\begin{array}[]{c}x_{k}^{\rm corr}\\\ y_{k}^{\rm corr}\\\ \end{array}\\!\right)+\left(\begin{array}[]{c}\\!x_{k0}\\\ \\!y_{k0}\\\ \end{array}\\!\right).\end{array}$ The relative scale between CCD#k and CCD#ref can be derived by $\alpha\textnormal{=}\sqrt{AD\textnormal{-}BC}$ and the rotation angle $\theta\textnormal{=}\arctan(B\textnormal{-}C,A\textnormal{+}D)$ according to Anderson (2007). For each frame, we can proceed to solve the relative quantities (scale, relative angle, and gap) when CCD#2 and CCD#3 are taken as references, respectively. The results are shown in Appendix B, from Table 7 to Table 10. Because our method is implemented in actual or physical coordinate including GD effects, while the AK03 method is implemented in a distortion-free coordinate, we only compare the precisions of the relative angle and gap of the two methods. For the relative angle between chips, the two methods have similar precisions. For the relative gap, we plot their values and precisions of the two epochs’s observations in Fig. 20 and Fig. 21, although they are based on measurements with different filters. We note that the results of our method are derived from differential astrometry. Similar changes in the offset can be detected by both methods; however, the solution proposed in this paper shows at least a factor of two improvement in precision on average over the AK03 method. We think there are two definite advantages to our method. On one hand, we perform the measurements for two adjacent edges instead of two individual chips, making the results as local as possible and meanwhile alleviating the propagated error of the transformation and the GD model throughout the FOV. On the other hand, the final outcome is not mixed with the GD effects, which would bias the realistic geometry of the CCD mosaic chips. Figure 20: Averages and precisions ($\sigma$) of the gap in the horizonal and vertical directions as a function of time, when CCD#2 is taken as reference. We note that the gaps of 2016 are based on measurements with the DES r filter and the gaps of 2017 are based on measurements with the SDSS g filter. The black points represent the results derived from the proposed method in this paper, and the red points represent the results derived from the AK03 method. The shaded bars indicate a $\pm\sigma\times 15$ (for clarity) interval around the mean gap location. The values of $\sigma$ are shown in the panel. Figure 21: Similar to Fig. 20. The variations of the gap in the horizonal and vertical direction as a function of time are shown, with CCD#3 taken as reference. We note that the gaps of 2016 are based on measurements with the DES r filter and the gaps of 2017 are based on measurements with the SDSS g filter. ## 7 Conclusion In this paper, we propose a solution to determine the actual geometry of CCD mosaic chips by taking advantage of the GD solution derived from the observations. Taking into consideration the fact that there may be few stars available for astrometric calibration during the deep observation of large ground-based or space-base telescope, we referred to the idea from the astrometry of the HST to only use stars’ pixel positions to derive the relative positions between chips. We refer to the practice of only using the pixel position as differential astrometry in this paper. In order to ensure the results are reliable, we took advantage of Gaia EDR3 to derive the relative positions between chips, as was done in Wang et al. (2019), to provide a close comparison. We refer to the practice of using an astrometric catalogue as photographic astrometry. We implemented the technique for the CCD mosaic chips of the Bok 2.3-m telescope at Kitt Peak, based on two epochs of observations (Jan 17,2016 and Mar 5,2017). For the two epochs of observations, the average gaps derived from photographic astrometry and differential astrometry differ by about 0.046 pixels ($\sim$0.021 arcsec) and 0.001 pixels (¡0.001 arcsec), respectively, while the average precisions of the gaps are about 0.018 pixels ($\sim$0.008 arcsec) and 0.028 pixels ($\sim$0.013 arcsec), respectively. We also made a comparison with the AK03 method, which is adopted for measuring the geometry of WFPC2 chips and WFC3 chips at the HST. The results show that the solution proposed in this paper shows an improvement of at least a factor of two in precision on average. This paper shows there is a good agreement between the two types of astrometry for the relative positions between chips. This is important for the deep observations of the planned CSST. Since the CSST can observe much fainter stars (e.g. 26 mag in the g band) than the Gaia satellite, of which we only have the pixel positions rather than their astrometric parameters (e.g. J2000.0 positions, proper motions, parallaxes, etc.), differential astrometry is expected to be more suitable for determining the relative positions between chips. In the mean time, the internal positional precisions can be substantially improved by precisely transforming the positions from different chips into a global coordinate system. However, accurate solutions for the GD and the geometry of CCD mosaic chips are needed. So, we recommend verifying the calibration on a regular basis, since the experiences with the HST show the importance of detecting long-term variations of the GD (Anderson 2007; Ubeda et al. 2014), which are caused by, for example, the slow out-gassing of metals (Bedin & Fontanive 2018). This would also lead to long-term variations of the geometry of CCD mosaic chips. ###### Acknowledgements. This work was supported by the China Manned Space Project with NO. CMS- CSST-2021-B08, by the National Natural Science Foundation of China (Grant Nos. 11873026, 11273014), by the Joint Research Fund in Astronomy (Grant No. U1431227) under cooperative agreement between the National Natural Science Foundation of China (NSFC) and Chinese Academy Sciences (CAS), and partly by the Fundamental Research Funds for the Central Universities and Excellent Postgraduate Recommendation Scientific Research Innovative Cultivation Program of Jinan University. This work has made use of data from the European Space Agency (ESA) mission _Gaia_ (https://www.cosmos.esa.int/gaia), processed by the _Gaia_ Data Processing and Analysis Consortium (DPAC, https://www.cosmos.esa.int/web/gaia/dpac/consortium). Funding for the DPAC has been provided by national institutions, in particular the institutions participating in the _Gaia_ Multilateral Agreement. ## References * Anderson (2007) Anderson, J. 2007, Variation of the Distortion Solution, Instrument Science Report ACS 2007-08 * Anderson (2007) Anderson, J. 2007, Proceedings of the American Mathematical Society * Anderson & King (2003) Anderson, J. & King, I. R. 2003, PASP, 115, 113 * Bedin & Fontanive (2018) Bedin, L. R. & Fontanive, C. 2018, MNRAS, 481, 5339 * Bellini & Bedin (2009) Bellini, A. & Bedin, L. R. 2009, PASP, 121, 1419 * Bernstein et al. (2017) Bernstein, G. M., Armstrong, R., Plazas, A. A., et al. 2017, PASP, 129, 074503 * DePoy et al. (2008) DePoy, D. L., Abbott, T., Annis, J., et al. 2008, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 7014, Ground-based and Airborne Instrumentation for Astronomy II, 70140E * Fabricius et al. (2021) Fabricius, C., Luri, X., Arenou, F., et al. 2021, A&A, 649, A5 * French et al. (2006) French, R. G., McGhee, C. A., Frey, M., et al. 2006, PASP, 118, 246 * Gaia Collaboration et al. (2018) Gaia Collaboration, Brown, A. G. A., Vallenari, A., et al. 2018, A&A, 616, A1 * Gaia Collaboration et al. (2021) Gaia Collaboration, Brown, A. G. A., Vallenari, A., et al. 2021, A&A, 649, A1 * Gubler & Tytler (1998) Gubler, J. & Tytler, D. 1998, PASP, 110, 738 * Gunn et al. (1998) Gunn, J. E., Carr, M., Rockosi, C., et al. 1998, AJ, 116, 3040 * Lin et al. (2020) Lin, F. R., Peng, Q. Y., & Zheng, Z. J. 2020, MNRAS, 498, 258 * Lou et al. (2016) Lou, Z., Liang, M., Yao, D., et al. 2016, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 10154, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, 101542A * Luppino et al. (1995) Luppino, G. A., Mezger, M. R., & Miyazaki, S. 1995, in IAU Symposium, Vol. 167, New Developments in Array Technology and Applications, ed. A. G. D. Philip, K. Janes, & A. R. Upgren, 297 * Peng et al. (2017) Peng, H. W., Peng, Q. Y., & Wang, N. 2017, MNRAS, 467, 2266 * Peng et al. (2012) Peng, Q. Y., Vienne, A., Zhang, Q. F., et al. 2012, AJ, 144, 170 * Peng et al. (2015) Peng, Q. Y., Wang, N., Vienne, A., et al. 2015, MNRAS, 449, 2638 * Platais et al. (2002) Platais, I., Kozhurina-Platais, V., Girard, T. M., et al. 2002, AJ, 124, 601 * Riello et al. (2021) Riello, M., De Angeli, F., Evans, D. W., et al. 2021, A&A, 649, A3 * Sekiguchi et al. (1992) Sekiguchi, M., Iwashita, H., Doi, M., Kashikawa, N., & Okamura, S. 1992, PASP, 104, 744 * Ubeda et al. (2014) Ubeda, L., Kozhurina-Platais, V., & Bedin, L. R. 2014, Instrument Science Report ACS 2013-03, 12 pages * Wadadekar et al. (2006) Wadadekar, Y., Casertano, S., Hook, R., et al. 2006, PASP, 118, 450 * Wang et al. (2017) Wang, N., Peng, Q. Y., Peng, H. W., et al. 2017, MNRAS, 468, 1415 * Wang et al. (2019) Wang, N., Peng, Q. Y., Zhou, X., Peng, X. Y., & Peng, H. W. 2019, MNRAS, 485, 1626 * Zhan (2021) Zhan, H. 2021, Chinese Science Bulletin, 66, 1290 * Zheng et al. (2021) Zheng, Z. J., Peng, Q. Y., & Lin, F. R. 2021, MNRAS, 502, 6216 ## Appendix A Third-order polynomial for the GD solutions Table 7: Coefficients and their errors of the third-order polynomial for each chip, derived from Obs16. Term $\\!(k)\\!\\!\\!\\!\\!$ | Polyn. | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ ---|---|---|---|---|---|---|---|---|--- | | CCD#1 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.782 | -1.876 | 0.002 | 0.005 | 1.947 | -2.194 | 0.003 | 0.008 1 | $\tilde{x}$ | 0.559 | -4.617 | 0.005 | 0.014 | -0.235 | -4.347 | 0.008 | 0.019 2 | $\tilde{y}$ | -4.048 | -0.291 | 0.005 | 0.014 | -3.852 | -1.099 | 0.008 | 0.019 3 | $\tilde{x}^{2}$ | -6.298 | 1.980 | 0.003 | 0.010 | -6.145 | 2.076 | 0.005 | 0.014 4 | $\tilde{x}\tilde{y}$ | 3.897 | -4.199 | 0.003 | 0.008 | 3.775 | -3.882 | 0.005 | 0.012 5 | $\tilde{y}^{2}$ | -2.047 | 5.666 | 0.003 | 0.010 | -2.221 | 5.635 | 0.005 | 0.014 6 | $\tilde{x}^{3}$ | 1.917 | -0.020 | 0.006 | 0.019 | 1.926 | -0.025 | 0.011 | 0.027 7 | $\tilde{x}^{2}\tilde{y}$ | -0.098 | 1.888 | 0.006 | 0.017 | -0.096 | 1.883 | 0.009 | 0.024 8 | $\tilde{x}\tilde{y}^{2}$ | 1.871 | -0.088 | 0.006 | 0.017 | 1.887 | -0.100 | 0.009 | 0.024 9 | $\tilde{y}^{3}$ | -0.026 | 2.140 | 0.006 | 0.019 | -0.027 | 2.269 | 0.011 | 0.027 | | CCD#2 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.729 | 1.479 | 0.001 | 0.003 | 1.862 | 2.045 | 0.002 | 0.004 1 | $\tilde{x}$ | 0.836 | 4.055 | 0.003 | 0.007 | -0.100 | 4.406 | 0.005 | 0.010 2 | $\tilde{y}$ | 4.100 | -0.288 | 0.003 | 0.007 | 4.303 | -1.209 | 0.005 | 0.010 3 | $\tilde{x}^{2}$ | -6.303 | -1.838 | 0.002 | 0.005 | -6.154 | -1.741 | 0.004 | 0.007 4 | $\tilde{x}\tilde{y}$ | -3.622 | -4.191 | 0.002 | 0.004 | -3.821 | -3.881 | 0.003 | 0.006 5 | $\tilde{y}^{2}$ | -2.038 | -5.305 | 0.002 | 0.005 | -2.210 | -5.423 | 0.004 | 0.007 6 | $\tilde{x}^{3}$ | 1.911 | 0.029 | 0.005 | 0.01 | 1.912 | 0.022 | 0.008 | 0.014 7 | $\tilde{x}^{2}\tilde{y}$ | 0.069 | 1.871 | 0.004 | 0.009 | 0.072 | 1.870 | 0.007 | 0.012 8 | $\tilde{x}\tilde{y}^{2}$ | 1.857 | 0.067 | 0.004 | 0.009 | 1.875 | 0.074 | 0.007 | 0.012 9 | $\tilde{y}^{3}$ | 0.024 | 1.892 | 0.005 | 0.010 | 0.008 | 1.968 | 0.008 | 0.014 | | CCD#3 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.578 | -1.566 | 0.002 | 0.003 | -1.968 | -2.111 | 0.002 | 0.004 1 | $\tilde{x}$ | 0.298 | 4.006 | 0.004 | 0.008 | -0.745 | 4.609 | 0.006 | 0.011 2 | $\tilde{y}$ | 4.066 | 0.349 | 0.004 | 0.008 | 4.073 | -0.657 | 0.006 | 0.011 3 | $\tilde{x}^{2}$ | 5.841 | 1.994 | 0.003 | 0.006 | 5.995 | 2.083 | 0.004 | 0.008 4 | $\tilde{x}\tilde{y}$ | 3.898 | 3.857 | 0.003 | 0.005 | 3.785 | 4.166 | 0.004 | 0.007 5 | $\tilde{y}^{2}$ | 1.898 | 5.721 | 0.003 | 0.006 | 1.769 | 5.684 | 0.004 | 0.008 6 | $\tilde{x}^{3}$ | 1.894 | 0.036 | 0.006 | 0.011 | 1.898 | 0.032 | 0.009 | 0.015 7 | $\tilde{x}^{2}\tilde{y}$ | 0.096 | 1.894 | 0.005 | 0.010 | 0.099 | 1.904 | 0.008 | 0.013 8 | $\tilde{x}\tilde{y}^{2}$ | 1.858 | 0.099 | 0.005 | 0.010 | 1.878 | 0.091 | 0.008 | 0.013 9 | $\tilde{y}^{3}$ | 0.041 | 1.900 | 0.006 | 0.011 | 0.040 | 1.979 | 0.009 | 0.015 | | CCD#4 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.423 | 1.352 | 0.002 | 0.003 | -1.880 | 2.106 | 0.003 | 0.005 1 | $\tilde{x}$ | 0.838 | -3.805 | 0.004 | 0.008 | -0.302 | -3.751 | 0.007 | 0.012 2 | $\tilde{y}$ | -3.637 | 0.168 | 0.004 | 0.008 | -3.170 | -0.923 | 0.007 | 0.012 3 | $\tilde{x}^{2}$ | 5.875 | -1.847 | 0.003 | 0.006 | 6.024 | -1.756 | 0.005 | 0.008 4 | $\tilde{x}\tilde{y}$ | -3.622 | 3.894 | 0.003 | 0.005 | -3.815 | 4.205 | 0.004 | 0.007 5 | $\tilde{y}^{2}$ | 1.926 | -5.285 | 0.003 | 0.006 | 1.799 | -5.409 | 0.005 | 0.008 6 | $\tilde{x}^{3}$ | 1.902 | -0.037 | 0.006 | 0.012 | 1.900 | -0.047 | 0.009 | 0.017 7 | $\tilde{x}^{2}\tilde{y}$ | -0.098 | 1.892 | 0.005 | 0.010 | -0.099 | 1.903 | 0.008 | 0.014 8 | $\tilde{x}\tilde{y}^{2}$ | 1.871 | -0.101 | 0.005 | 0.010 | 1.891 | -0.111 | 0.008 | 0.014 9 | $\tilde{y}^{3}$ | -0.032 | 1.933 | 0.006 | 0.012 | -0.035 | 2.019 | 0.009 | 0.017 Table 8: Coefficients and their errors of the third-order polynomial for each chip, derived from Obs17. Term $\\!(k)\\!\\!\\!\\!\\!$ | Polyn. | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ | $a_{k}$ | $b_{k}$ | $\sigma_{a}$ | $\sigma_{b}$ ---|---|---|---|---|---|---|---|---|--- | | CCD#1 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.706 | -1.594 | 0.001 | 0.001 | 2.677 | -2.354 | 0.001 | 0.001 1 | $\tilde{x}$ | 0.699 | -4.336 | 0.002 | 0.003 | -0.853 | -4.303 | 0.003 | 0.003 2 | $\tilde{y}$ | -4.459 | 0.235 | 0.002 | 0.003 | -3.830 | -0.659 | 0.003 | 0.003 3 | $\tilde{x}^{2}$ | -6.310 | 2.008 | 0.001 | 0.002 | -6.399 | 2.158 | 0.002 | 0.002 4 | $\tilde{x}\tilde{y}$ | 3.966 | -4.194 | 0.001 | 0.002 | 3.744 | -4.297 | 0.002 | 0.002 5 | $\tilde{y}^{2}$ | -2.041 | 5.800 | 0.001 | 0.002 | -2.022 | 5.709 | 0.002 | 0.002 6 | $\tilde{x}^{3}$ | 1.934 | -0.021 | 0.003 | 0.004 | 1.952 | -0.010 | 0.004 | 0.005 7 | $\tilde{x}^{2}\tilde{y}$ | -0.085 | 1.887 | 0.002 | 0.003 | -0.090 | 1.895 | 0.003 | 0.004 8 | $\tilde{x}\tilde{y}^{2}$ | 1.854 | -0.074 | 0.002 | 0.003 | 1.873 | -0.077 | 0.003 | 0.004 9 | $\tilde{y}^{3}$ | -0.012 | 1.889 | 0.003 | 0.004 | -0.015 | 1.919 | 0.004 | 0.005 | | CCD#2 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | 1.487 | 1.358 | 0.001 | 0.001 | 3.249 | 2.081 | 0.001 | 0.001 1 | $\tilde{x}$ | 1.283 | 3.983 | 0.002 | 0.002 | -0.631 | 4.357 | 0.003 | 0.003 2 | $\tilde{y}$ | 4.022 | 0.044 | 0.002 | 0.002 | 4.424 | -1.207 | 0.003 | 0.003 3 | $\tilde{x}^{2}$ | -6.294 | -1.813 | 0.002 | 0.002 | -6.377 | -1.666 | 0.002 | 0.002 4 | $\tilde{x}\tilde{y}$ | -3.581 | -4.149 | 0.001 | 0.001 | -3.901 | -4.257 | 0.002 | 0.002 5 | $\tilde{y}^{2}$ | -2.025 | -5.276 | 0.002 | 0.002 | -2.001 | -5.461 | 0.002 | 0.002 6 | $\tilde{x}^{3}$ | 1.920 | 0.009 | 0.003 | 0.003 | 1.937 | 0.017 | 0.004 | 0.004 7 | $\tilde{x}^{2}\tilde{y}$ | 0.030 | 1.879 | 0.003 | 0.003 | 0.032 | 1.891 | 0.004 | 0.004 8 | $\tilde{x}\tilde{y}^{2}$ | 1.865 | 0.028 | 0.003 | 0.003 | 1.881 | 0.032 | 0.004 | 0.004 9 | $\tilde{y}^{3}$ | 0.002 | 1.869 | 0.003 | 0.003 | 0.003 | 1.895 | 0.004 | 0.004 | | CCD#3 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.578 | -1.566 | 0.002 | 0.003 | -1.968 | -2.111 | 0.002 | 0.004 1 | $\tilde{x}$ | 0.298 | 4.006 | 0.004 | 0.008 | -0.745 | 4.609 | 0.006 | 0.011 2 | $\tilde{y}$ | 4.066 | 0.349 | 0.004 | 0.008 | 4.073 | -0.657 | 0.006 | 0.011 3 | $\tilde{x}^{2}$ | 5.841 | 1.994 | 0.003 | 0.006 | 5.995 | 2.083 | 0.004 | 0.008 4 | $\tilde{x}\tilde{y}$ | 3.898 | 3.857 | 0.003 | 0.005 | 3.785 | 4.166 | 0.004 | 0.007 5 | $\tilde{y}^{2}$ | 1.898 | 5.721 | 0.003 | 0.006 | 1.769 | 5.684 | 0.004 | 0.008 6 | $\tilde{x}^{3}$ | 1.894 | 0.036 | 0.006 | 0.011 | 1.898 | 0.032 | 0.009 | 0.015 7 | $\tilde{x}^{2}\tilde{y}$ | 0.096 | 1.894 | 0.005 | 0.010 | 0.099 | 1.904 | 0.008 | 0.013 8 | $\tilde{x}\tilde{y}^{2}$ | 1.858 | 0.099 | 0.005 | 0.010 | 1.878 | 0.091 | 0.008 | 0.013 9 | $\tilde{y}^{3}$ | 0.041 | 1.900 | 0.006 | 0.011 | 0.040 | 1.979 | 0.009 | 0.015 | | CCD#4 | | GD1 | GD2 0 | $\tilde{x}^{0}(\tilde{y}^{0})$ | -1.423 | 1.352 | 0.002 | 0.003 | -1.880 | 2.106 | 0.003 | 0.005 1 | $\tilde{x}$ | 0.300 | 4.171 | 0.002 | 0.002 | -1.583 | 4.809 | 0.003 | 0.003 2 | $\tilde{y}$ | 4.226 | 0.504 | 0.002 | 0.002 | 4.411 | -0.739 | 0.003 | 0.003 3 | $\tilde{x}^{2}$ | 5.971 | 2.041 | 0.001 | 0.002 | 5.994 | 2.180 | 0.002 | 0.002 4 | $\tilde{x}\tilde{y}$ | 3.982 | 3.912 | 0.001 | 0.001 | 3.745 | 3.891 | 0.002 | 0.002 5 | $\tilde{y}^{2}$ | 1.925 | 5.846 | 0.001 | 0.002 | 1.952 | 5.742 | 0.002 | 0.002 6 | $\tilde{x}^{3}$ | 1.918 | 0.009 | 0.003 | 0.003 | 1.930 | -0.004 | 0.004 | 0.004 7 | $\tilde{x}^{2}\tilde{y}$ | 0.037 | 1.859 | 0.002 | 0.003 | 0.033 | 1.873 | 0.003 | 0.004 8 | $\tilde{x}\tilde{y}^{2}$ | 1.828 | 0.040 | 0.002 | 0.003 | 1.845 | 0.037 | 0.003 | 0.004 9 | $\tilde{y}^{3}$ | 0.017 | 1.820 | 0.003 | 0.003 | 0.017 | 1.838 | 0.004 | 0.004 ## Appendix B Average relative quantities between CCD chips derived from the AK03 method Table 9: Average relative quantities (scale, relative angle and gap) derived from AK03 method for Obs16 when CCD#2 is taken as a reference, with formal errors. Parameter | $k=$[1] | $k=$[3] | $k=$[4] ---|---|---|--- $\alpha_{k}/\alpha_{[2]}$ | 0.99997 | 0.99987 | 1.00004 | $\pm$0.00001 | $\pm$0.00002 | $\pm$0.00001 $\theta_{k}$$-$$\theta_{[2]}$ | 0.029 | 0.067 | $-$0.106 | $\pm$0.001 | $\pm$0.001 | $\pm$0.001 $(x_{[2]}^{\rm corr})_{k}$ | $-$7.701 | 4459.920 | 4475.180 | $\pm$0.050 | $\pm$0.063 | $\pm$0.042 $(y_{[2]}^{\rm corr})_{k}$ | 4179.232 | 4196.955 | 21.632 | $\pm$0.042 | $\pm$0.096 | $\pm$0.028 777The values for $\theta_{k}$$-$$\theta_{[2]}$ are expressed in degrees. The relative shift $(x_{[2]}^{\rm corr})_{k}$ and $(y_{[2]}^{\rm corr})_{k}$ are given in pixels with regard to the system of CCD#2. The formal errors in bold are compared with the ones derived from our method. Table 10: Similar quantities (scale, relative angle and gap) for Obs16 to those in Table 7 when CCD#3 is taken as a reference, with formal errors. Parameter | $k=$[1] | $k=$[2] | $k=$[4] ---|---|---|--- $\alpha_{k}/\alpha_{[3]}$ | 1.00010 | 1.00013 | 1.00017 | $\pm$0.00002 | $\pm$0.00002 | $\pm$0.00001 $\theta_{k}$$-$$\theta_{[3]}$ | $-$0.038 | $-$0.067 | $-$0.171 | $\pm$0.000 | $\pm$0.001 | $\pm$0.001 $(x_{[3]}^{\rm corr})_{k}$ | $-$4467.127 | $-$4454.508 | 21.187 | $\pm$0.034 | $\pm$0.059 | $\pm$0.050 $(y_{[3]}^{\rm corr})_{k}$ | $-$22.911 | $-$4202.644 | $-$4175.838 | $\pm$0.035 | $\pm$0.079 | $\pm$0.033 888The values for $\theta_{k}$$-$$\theta_{[3]}$ are expressed in degrees. The relative shift $(x_{[3]}^{\rm corr})_{k}$ and $(y_{[3]}^{\rm corr})_{k}$ are given in pixels with regard to the system of CCD#3. The formal errors in bold are compared with the ones derived from our method. Table 11: Average relative quantities (scale, relative angle and gap) derived from AK03 method for Obs17 when CCD#2 is taken as a reference, with formal errors. Parameter | $k=$[1] | $k=$[3] | $k=$[4] ---|---|---|--- $\alpha_{k}/\alpha_{[2]}$ | 0.99997 | 1.00006 | 1.00021 | $\pm$0.00002 | $\pm$0.00003 | $\pm$0.00003 $\theta_{k}$$-$$\theta_{[2]}$ | $-$0.024 | 0.015 | $-$0.074 | $\pm$0.001 | $\pm$0.001 | $\pm$0.002 $(x_{[2]}^{\rm corr})_{k}$ | $-$11.772 | 4454.720 | 4470.083 | $\pm$0.046 | $\pm$0.109 | $\pm$0.076 $(y_{[2]}^{\rm corr})_{k}$ | 4178.207 | 4199.352 | 23.171 | $\pm$0.078 | $\pm$0.146 | $\pm$0.092 999The values for $\theta_{k}$$-$$\theta_{[2]}$ are expressed in degrees. The relative shift $(x_{[2]}^{\rm corr})_{k}$ and $(y_{[2]}^{\rm corr})_{k}$ are given in pixels with regard to the system of CCD#2. The formal errors in bold are compared with the ones derived from our method. Table 12: Similar quantities (scale, relative angle and gap) for Obs17 to those in Table 9 when CCD#3 is taken as a reference, with formal errors. Parameter | $k=$[1] | $k=$[2] | $k=$[4] ---|---|---|--- $\alpha_{k}/\alpha_{[3]}$ | 0.99990 | 0.99994 | 1.00015 | $\pm$0.00003 | $\pm$0.00003 | $\pm$0.00002 $\theta_{k}$$-$$\theta_{[3]}$ | $-$0.039 | $-$0.015 | $-$0.088 | $\pm$0.001 | $\pm$0.001 | $\pm$0.001 $(x_{[3]}^{\rm corr})_{k}$ | $-$4466.147 | $-$4452.300 | 16.439 | $\pm$0.084 | $\pm$0.114 | $\pm$0.056 $(y_{[3]}^{\rm corr})_{k}$ | $-$22.285 | $-$4200.284 | $-$4174.967 | $\pm$0.070 | $\pm$0.093 | $\pm$0.073 101010The values for $\theta_{k}$$-$$\theta_{[3]}$ are expressed in degrees. The relative shift $(x_{[3]}^{\rm corr})_{k}$ and $(y_{[3]}^{\rm corr})_{k}$ are given in pixels with regard to the system of CCD#3. The formal errors in bold are compared with the ones derived from our method.
arxiv-papers
2021-07-27T09:37:50
2024-09-04T03:07:21.094737
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Z.J. Zheng, Q.Y. Peng, A. Vienne, F.R. Lin and B.F. Guo", "submitter": "Zhongjie Zheng", "url": "https://arxiv.org/abs/2107.12691" }
2107.12692
# Dynamic and Static Object Detection Considering Fusion Regions and Point- wise Features Andrés E. Gómez H.1, Thomas Genevois1, Jerome Lussereau1 and Christian Laugier1 *This work was supported by the FUI STAR project1 Authors are with Univ. Grenoble Alpes, INRIA Grenoble Rhône-Alpes, Chroma Team, 38334 Montbonnot, France. Correspondence: [email protected], [email protected] ###### Abstract Object detection is a critical problem for the safe interaction between autonomous vehicles and road users. Deep-learning methodologies allowed the development of object detection approaches with better performance. However, there is still the challenge to obtain more characteristics from the objects detected in real-time. The main reason is that more information from the environment’s objects can improve the autonomous vehicle capacity to face different urban situations. This paper proposes a new approach to detect static and dynamic objects in front of an autonomous vehicle. Our approach can also get other characteristics from the objects detected, like their position, velocity, and heading. We develop our proposal fusing results of the environment’s interpretations achieved of YoloV3 and a Bayesian filter. To demonstrate our proposal’s performance, we asses it through a benchmark dataset and real-world data obtained from an autonomous platform. We compared the results achieved with another approach. ## I INTRODUCTION Autonomous Vehicles (AV) will only become a success if people accept them. However, as Thomas et al. concluded in [1], some persons still do not believe in Av’s performance. In fact, behind the AV development still exists several technical challenges such as software complexity, real-time data analytics, testing, and verification [2]. Nonetheless, a first step to win the users’ confidence can be to define new models for the AV’s perception-system that improve its environment understand. Different mathematical models integrate the perception system. Some of them permit the AV to find, classify and track several objects. The models decode sensor data collected from the physical world based on some requirements. Therefore, the sensors are a central part of the perception system. However, according to the sensor type, the model outcome could present some troubles. For example, an RGB camera sensor generally is a common choice given its cost and the significant amount of information available inside its field of view. Nevertheless, This sensor is vulnerable to light changes and weather conditions. Consequently, the models have to consider fusing data from different sensors to obtain a result free of a single sensor’s limitations. Critical models for the safety around an AV can improve their results by fusing information from different sensor sources. Object detection models are an example of it. By default, the development of some object detection models considers only the use of RGB cameras. In that models, the image detections are limited only to located and classified the objects inside a camera field of view. However, Lidar measures from the environment could help obtain more information concerning the same object detected by the RGB cameras (e.g., object position 2D). We propose a new approach to detect dynamic and static objects in an urban environment. Our approach also gets other characteristics from the objects detected, such as position, velocity, and heading. We found the objects’ information fusing the environment’s interpretations from two different approaches. The first approach is the YoloV3 object detector [3]. YoloV3 obtains a likely classification and position from each object inside an image achieved with an RGB camera. The second approach is the Bayesian filter known as the Conditional Monte Carlo Dense Occupancy Tracker(CMCDOT)[4]. This approach achieves dynamic and static information from the urban environment through a lidar sensor. Both approaches work in real-time. Our main contributions can be summarized as follows: * • Fusion of the results achieved from an object detector and a Bayesian filter to find dynamic and static objects in an urban environment. * • To get more characteristics about the objects detected by processing point- wise features inside fusion regions. The paper organization has the following structure: Section II reviews the related work. Section III details the definition of the fusion regions and the point-wise feature processing. Section IV shows the experimental results. Finally, section V provides concluding remarks. ## II RELATED WORK We review related works with a focus on object detections for AV. Specifically, we considered the works with two essential aspects: i) the number of sensors employed, ii) and the deep learning approaches examined to object detection. In the first aspect, we found the work presented by Liang et al. in [5]. They considered that the range image representation is a feasible alternative to object detection. Therefore, they developed a 3D object detector framework called RangeRCNN, based on range images. However, despite good performance obtained by RangeRCNN in the KITTI benchmark, it only contemplates lidar data as input. Arnold et al. in [6] reviewed several 3D object detection approaches on AV. Moreover, the authors also studied different sensor technologies and standards datasets. They consider that 2D detections on the image plane are not enough for a safety-critical system as an AV. Therefore, The authors proved that an object detection approach needs to fuse information from different sensors with models executed in real-time. This fact is the basis of our proposal. The sensors’ information and the fusion models applied in them are essential to determine the AV’s safety. In [7], Wang, Wu, and Niu analyzed typical sensors and several multi-sensor fusion strategies used in the last years on AVs. The authors confirmed the need to fuse sensors’ information because it is necessary to avoid a single sensor’s limitations and uncertainties. This conclusion is a found fact in several papers consulted. Rangesh and Trivedi in [8] present the $M^{3}OT$ framework. This framework can accept an object proposal from different sensor modalities to track it. To obtain the object track recommendations, Rangesh and Trivedi considered a tracking-by-detection approach. This approach uses a nearly-fusion model to associate the objects detected by each sensor. The result of the nearly-fusion model is a merged representation from the raw sensor data. Zhu et al. in [9] presented a literature review about several techniques used to environment perception for intelligent vehicles. The document summarizes different methods with their pros and cons. According to this, the deep- learning methods adopted for the scene understanding obtained a relevant validation. However, the authors considered that these deep-learning methods should consider motion and depth information to improve its accuracy. Consequently, an occupancy grid approach could be helpful to complement these deep-learning methods. For the second aspect, it was possible to find different deep learning approaches used on object detection problems. For example, Pang and Cao in [10] analyzed some object detection methods based on deep learning. They compare typical CNN-based architectures focused on a specific use case, pedestrian detection. One conclusion of this work is that object detection using deep-learning approaches has several challenges. The occlusion, scale variation, and deformation in the objects are some of them. In [11], Zhao et al. provided the result of a systematic review, which analyzed object detection using deep-learning models on different applications. They compared each model through experiments. According to the experiments’ results, the authors also concluded two main challenges on object detection. The first one is real-time object detection, and the second one is to extend the classical methods for 2D to 3D object detection. Additionally, we did find some proposals where the authors considered deep- learning approaches for the fusion of sensors’ information. For example, Nobis et al. in [12] proposed the fusion between radar and camera sensor data using a neural network approach. Their proposal, knowledged as Camera Radar Fusion Net (CRF-Net), merges a 2D object detector with projected sparse radar data in the image plane. Moreover, CRF-Net filters the data obtained in the image plane to improve the object detection performance. However, CRF-Net does not work in real-time. In an AV, the perception system not only needs to detect the objects around the urban environment. This system need also consider if the object is moving or not. Given this fact, Siam et al. in [13] proposed a new model that combines motion and appearance cues using a single convolutional network. Therefore, the outcome obtained with the Moving Object Detection Network (MODNet) is the static/moving classification for objects. Moreover, another contribution of this work is the KITTI MOD dataset. This dataset acts as a benchmark on motion detection on the KITTI dataset. Finally, Liang et al. in [14] exploited multiple related tasks for 3D object detection using multiple sensors. Moreover, They proposed to predict dense depth from multiple sensor data and use this result to find near correspondences between multiple sensor feature maps. These predictions are possible through a network architecture that fuses the detections from a LiDAR point cloud and an RGB image. This network architecture considers 2D and 3D object detection, ground estimation, and depth completion. After all the works analyzed previously, it is clear that object detection on AV is not a trivial problem. Therefore, it is needed to obtain and process enough scene information from diverse sensor sources. Moreover, the fusion models used to merge all the information obtained must have a real-time performance. Consequently, combining distinct methodologies like deep-learning and Bayesian filters, it is possible to complete these requirements. Our paper proposes a fusion model that combines the YoloV3 object detector with an occupancy map obtained from the CMCDOT approach. The following section explains in detail the methodology used for our proposal. ## III METHOD Figure 1: The figure shows the methodology’s block diagram used in our proposal. The input part obtains raw data from an urban scene using two sensors: lidar and an RGB camera. Eventually, in the object detection part, we utilized two approaches to look for the objects in front of the Ego-car: YoloV3 and CMCDOT. Then, we merge the result take from YoloV3 and CMCDOT approaches in the Fusion model part. Afterward, we processed the previous area’s outcome in the object information part to found the classification, motion estimation, position, velocity, and heading from the objects222The velocity and heading info are only for dynamic objects.. Finally, we present all the information found in the result part. Based on the evidence found in the related works, we define the methodology used in our proposal. It is composed of five parts described in the block diagram of figure 2. In this figure, it is possible to observe an ordered sequence of subprocesses connected between each section of the block diagram. In the remainder of this section, we will explain each subprocess and its implications in the methodology. ### III-A Input An object detection approach needs to obtain information from distinct sources to warranty an adequate performance over different situations. Considering this fact, we decided to use an RGB camera and a lidar sensor to object detection. These two kinds of sensors have been used in several works from state of the art, mainly because each one supports the other in its functional disadvantages. One instance could be RGB cameras’ problem with lack of depth information or lidar’s issue with the loss of object details in the point cloud. Moreover, raw data information about these two sensors is available in diverse datasets like in [15] or [16]. ### III-B Object detection We used the two sensors’ information as inputs for the YoloV3 and the CMCDOT approaches. YoloV3 is an object detector that takes the RGB camera images to classify and locate the objects presented inside the image considering a probability. The main reason to have chosen this deep-learning approach is its real-time operation capability. On the other hand, The CMCDOT framework does not identify the object in the urban scene. However, The CMCDOT represents the environment around the Ego-car through an occupancy grid map. This map is a grid of cells, where each cell can identify occupancy states(i.e., static- object, dynamic-object, empty, and unknown) over time. Specifically, the static-object and dynamic-object states let us know more characteristics about the scene’s objects, such as their position, motion estimation, etc. Finally, the achievement of the occupancy grid map is also in real-time based on the lidar data. ### III-C Fusion model In this part, we merged the outcomes from YoloV3 and the CMCDOT approaches to have a single representation from the environment. However, the result achieved from these two approaches is not in the same frame. Therefore, we had to align the results applying projective transformations. Our proposal projected the occupancy grid map accomplished by CMCDOT onto the image processed by the YoloV3 approach. In [17], over section III-B, it is possible to find all the mathematical argumentation used to develop the projective transformations. Figure 2 shows the result obtained after aligning the outcome from YoloV3 and CMCDOT. Figure 2: Urban scene representation considering the outcomes from YoloV3 and CMCDOT approaches. The green rectangles represent the bounding boxes generated by YoloV3. The Dynamic/Static points are the information produced by the CMCDOT approach after the projective transformation. Finally, the red rectangles represent the fusion regions. We developed a fusion model that defines several regions of interest in the image to look for dynamic/static points inside them. We denominated those regions as fusion regions (see Fig. 3). Equation 1 describes the fusion model proposed. ${\quad f}_{m}\left({B}_{min,max},{p}_{i}\right)=\begin{cases}1,{x}_{min}<{x}_{i}<{x}_{max}\\\ \qquad and\quad{Y}_{high}<{y}_{i}<{Y}_{low}.\\\ 0,other\quad case.\end{cases}\\\ $ (1) where, $\begin{matrix}{Y}_{high}\quad=\quad\frac{((5*{y}_{max})-{y}_{min})}{4}\\\ \\\ {Y}_{low}\quad=\quad\frac{((3*{y}_{max})+{y}_{min})}{4}\end{matrix}$ According to equation 1, the fusion model ${f}_{m}()$ depends from the bounding boxes points(see Fig. 3) ${B}_{min}({x}_{min},{y}_{min})$, ${B}_{max}({x}_{min},{y}_{min})$, and the dynamic/static points(see Fig. 2) ${p}_{i}({x}_{i},{y}_{i})$. Furthermore, the ${f}_{m}()$ delimit the fusion regions(see Fig. 3) among ${x}_{min}$, ${x}_{max}$, ${Y}_{high}$, and ${Y}_{low}$. When ${f}_{m}()$ found some points ${p}_{i}$ inside the fusion region, it classifies that point-set with the same label of the object detected by YoloV3. Otherwise, ${f}_{m}()$ discards the fusion regions where it did not find some point ${p}_{i}$. Figure 3: Definition of a fusion region regarding the bounding boxes obtained. The cyan rectangle highlights a vehicle detected. The green points represent the main bounding box points, ${B}_{min}$ and ${B}_{max}$, got from YoloV3. ${Y}_{high}$ and ${Y}_{low}$(i.e., defined in Equation 1) are the high and low vertical thresholds used to determine the red rectangles representing the fusion regions. ### III-D Object information The outcome achieved in the fusion model part only classifies a point-set projected from an occupancy grid map. However, this point-set maintains a direct correspondence with the occupancy grid map’s information. Therefore, it is possible to obtain the motion estimation, position 2D, velocity 2D, and heading from the point set classified. We called this procedure Point-wise features processing (PFP). Equation 2 describes the information related by each point belonging to the point-set classified. $p_{i}^{c}=\left\\{x_{i},\quad y_{i},\quad x_{i}^{o},\quad y_{i}^{o},\quad vx_{i}^{o},\quad vy_{i}^{o}\right\\}$ (2) In equation 2, the character ${p}_{i}^{c}$ defines one point $i$ belonging to the point-set classified $c$. This point contains the coordinates ${x}_{i}$ and ${y}_{i}$ used in ${f}_{m}()$. Subsequently, the symbols ${x}_{i}^{o}$ and ${y}_{i}^{o}$ define the position 2D of the point ${p}_{i}^{c}$ over the occupancy grid map $o$. Finally, The denotations ${vx}_{i}^{o}$ and ${vy}_{i}^{o}$ represent the velocity 2D of ${p}_{i}^{c}$ over $o$. Those parameters also let us find the dynamic object’s heading in the scene. ${vx}_{i}^{o}$ and ${vy}_{i}^{o}$ are equal zero when the point-set belong to a static-object. Considering all the features contained in the points ${p}_{i}^{c}$ classifies by ${f}_{m}$, the PFP begins to look for more details of the objects detected. For instance, the PFP defines the object motion estimation considering the cardinal number from the dynamic/static points-sets found in the fusion region(see Fig. 2). The higher cardinal value will determine the motion feature. Eventually, to find the object position, the PFP consider all the values ${p}_{i}^{c}({x}_{i}^{o},{y}_{i}^{o})$ from the point-set to compute their median value ${p}_{m}^{c}({x}_{m}^{o},{y}_{m}^{o})$. Similarly, to find the dynamic object velocity, the PFP also contemplates all the values ${p}_{i}^{c}({vx}_{i}^{o},{vy}_{i}^{o})$ from the point-set to obtain a median value ${p}_{m}^{c}({vx}_{m}^{o},{vy}_{m}^{o})$. Finally, for a dynamic object, the PFP computes the object’s heading based on the arc tangent of ${vy}_{m}^{o}/{vx}_{m}^{o}$. ### III-E Result We show the results obtained from the object information part through a Graphical User Interface (GUI) and ROS messages. Figure 4 shows some vehicles detected by our proposal in the GUI. While the GUI shows the result, Our algorithm also publishes ROS messages describing the motion estimation plus the object classification(e.g., Dynamic car), position 2D, velocity 2D, and heading. The results published in ROS corresponding to each object detected in front of the Ego-car over time. Figure 4: Graphical user interface used to present the result achieved with our proposal. The cars detected inside the blue bounding boxes are static objects in the urban scene. On the other hand, the only dynamic object in the environment is the vehicle detected by the green bounding box. It is essential to highlight that we didn’t consider the object’s position, velocity, and heading in the experiment results. The main reason is that the dataset used as a benchmark doesn’t provide this type of information about the objects. ## IV EXPERIMENTS This section describes the datasets used, the experimental setup contemplated, and the results obtained with our object detection approach. ### IV-A Datasets We evaluated our approach using the KITTI [15] and the KITTI MOD [13] datasets. We used the training and test images from KITTI to train the YoloV3 approach. Moreover, in our proposal’s evaluation, we employed lidar data from one city category. Concerning the KITTI MOD dataset, we worked with it because it was necessary to recognize the objects’ motion based on the KITTI dataset. The KITTI MOD dataset has 5997 static vehicles and 2383 dynamic ones labeled. ### IV-B Experimental Setup To Evaluate the object detection and the motion estimation of our approach, we used ROS to publish several urban images from KITTI MOD with their corresponding lidar data from KITTI. We obtain this ordered image sequence and their lidar data in our algorithm through ROS messages. Inside that urban environment, all the objects are dynamic or static vehicles. This fact is because the KITTI MOD dataset recognizes only vehicles’ motion. Figure 5 shows an example of our test. Figure 5: Example of the experiment accomplished. The orange rectangle contains one of the dynamic vehicles in the urban scene. Otherwise, the magenta rectangle represents the static vehicles. Blue and green rectangles in the image illustrate the comparison between the objects labeled from the KITTI MOD dataset and the objects detected by our proposal. In Fig 5, it is possible to observe some dynamic and static vehicles around the Ego-car. Furthermore, the figure also shows the application of the mean average precision (mAP) evaluation in the experiment(i.e., blue and green labels in Fig 6). For the mAP evaluation, we considered the open-source tool developed in [17]. In the mAP evaluation, we examined all the vehicles inside a longitudinal distance of thirty meters from the Ego-car. The main reason is that we found in [18] that the YoloV3 approach has a better performance in that distance. In [8], also is contemplated a similar longitudinal distance for the object detections. ### IV-C Experimental results The result obtained based on our experiment setup are present in detail through Tables I-II and Figure 6. Table I show the performance evaluation results based on the precision, recall, and F1 score metrics. The four classes obtained during the experiment also include their motion estimation. Table I also reveals that the F1 score metric maintains a balance between the precision and recall values obtained in the three first classes. The class dynamicCar is the most significant example with an F1-score value of 73%. TABLE I: Performance result of our approach. Class | Presicion | Recall | F1-score ---|---|---|--- staticVan | 83 | 75 | 79 dynamicCar | 72 | 74 | 73 staticCar | 91 | 58 | 71 dynamicVan | 100 | 33 | 50 Figure 6 shows the performance evaluation of our proposal using the mean average precision (mAP). The graph also reports average precision (AP) achieved by each object in the test based on their class and motion estimation. It is possible to observe that the AP value between the classes dynamicCar and staticCar are near. On the other hand, in Table II we compare the mAP obtained by our approach against the MODNET [13] approach. Although we achieved an mAP nearby, our proposal also can obtain more characteristics from the object detected(i.e., position, velocity, and heading). It is possible to find all the information about the experiment results in https://gitlab.inria.fr/agomezhe/paper_results. Figure 6: Mean average precision (mAP) result achieved in our test. The figure shows the Average Precision (AP) values(i.e., in blue bars) obtained by each object detected during the experiment, considering their class and motion estimation. TABLE II: Quantitative evaluation on KITTI MOD data of our proposal. Method | mAP ---|--- MODNET[13] | 62.57 Ours | 55.14 Finally, Figure 7 shows a demonstration example of our proposal with results achieved. In this urban demonstration, we used sensor data from our autonomous vehicle platform. The main objective was to test our approach considering different urban situations under extreme weather conditions(i.e., sunny and rainy weather). It is possible to find a video with the demonstration results in https://youtu.be/Rd-0B0--mlc. Figure 7: Illustration of our proposal using the autonomous vehicle platform. The graph shows several green bounding boxes representing different dynamic objects around our autonomous vehicle platform. The blue bounding box present in the image exhibit only one static object. ## V CONCLUSIONS This paper considers detecting dynamic and static objects around an autonomous vehicle in an urban environment. However, our proposal is not only limited to object detection and its motion estimation. Furthermore, we also look for the position, velocity, and heading from the objects detected. We found all these characteristics of the objects detected in the scene, considering the fusion of the YoloV3 and CMCDOT approaches’ outcomes. That information lets to define the fusion regions and the point-wise features utilized in our approach. The results obtained show that our proposal is nearby to the performance achieved by the work used as a reference. Therefore, to improve our approach’s performance, future works are focus on taking some actions like updating the YoloV3 to YoloV4 object detector. Moreover, it will also be necessary to train the YoloV4 with a new balanced dataset. Finally, even when all our approach was optimized using a GPU, we will need to compensate our hardware disadvantage compared to the referenced work. ## ACKNOWLEDGMENT This work has been supported by the French Government in the scope of the FUI STAR project. We also would like to thank Özgür Erkent for his meaningful technical discussions and suggestions. ## References * [1] E. Thomas, C. McCrudden, Z. Wharton, and A. Behera, “Perception of autonomous vehicles by the modern society: a survey,” _IET Intelligent Transport Systems_ , vol. 14, no. 10, pp. 1228–1239, 2020. * [2] R. Hussain and S. Zeadally, “Autonomous cars: Research results, issues, and future challenges,” _IEEE Communications Surveys & Tutorials_, vol. 21, no. 2, pp. 1275–1313, 2018. * [3] J. Redmon and A. Farhadi, “Yolov3: An incremental improvement,” _arXiv preprint arXiv:1804.02767_ , 2018. * [4] L. Rummelhard, A. Nègre, and C. Laugier, “Conditional monte carlo dense occupancy tracker,” in _2015 IEEE 18th International Conference on Intelligent Transportation Systems_. IEEE, 2015, pp. 2485–2490. * [5] Z. Liang, M. Zhang, Z. Zhang, X. Zhao, and S. Pu, “Rangercnn: Towards fast and accurate 3d object detection with range image representation,” _arXiv preprint arXiv:2009.00206_ , 2020. * [6] E. Arnold, O. Y. Al-Jarrah, M. Dianati, S. Fallah, D. Oxtoby, and A. Mouzakitis, “A survey on 3d object detection methods for autonomous driving applications,” _IEEE Transactions on Intelligent Transportation Systems_ , vol. 20, no. 10, pp. 3782–3795, 2019. * [7] Z. Wang, Y. Wu, and Q. Niu, “Multi-sensor fusion in automated driving: A survey,” _IEEE Access_ , vol. 8, pp. 2847–2868, 2019. * [8] A. Rangesh and M. M. Trivedi, “No blind spots: Full-surround multi-object tracking for autonomous vehicles using cameras and lidars,” _IEEE Transactions on Intelligent Vehicles_ , vol. 4, no. 4, pp. 588–599, 2019. * [9] H. Zhu, K.-V. Yuen, L. Mihaylova, and H. Leung, “Overview of environment perception for intelligent vehicles,” _IEEE Transactions on Intelligent Transportation Systems_ , vol. 18, no. 10, pp. 2584–2601, 2017. * [10] Y. Pang and J. Cao, “Deep learning in object detection,” in _Deep Learning in Object Detection and Recognition_. Springer, 2019, pp. 19–57. * [11] Z.-Q. Zhao, P. Zheng, S.-t. Xu, and X. Wu, “Object detection with deep learning: A review,” _IEEE transactions on neural networks and learning systems_ , vol. 30, no. 11, pp. 3212–3232, 2019. * [12] F. Nobis, M. Geisslinger, M. Weber, J. Betz, and M. Lienkamp, “A deep learning-based radar and camera sensor fusion architecture for object detection,” in _2019 Sensor Data Fusion: Trends, Solutions, Applications (SDF)_. IEEE, 2019, pp. 1–7. * [13] M. Siam, H. Mahgoub, M. Zahran, S. Yogamani, M. Jagersand, and A. El-Sallab, “Modnet: Motion and appearance based moving object detection network for autonomous driving,” in _2018 21st International Conference on Intelligent Transportation Systems (ITSC)_. IEEE, 2018, pp. 2859–2864. * [14] M. Liang, B. Yang, Y. Chen, R. Hu, and R. Urtasun, “Multi-task multi-sensor fusion for 3d object detection,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 7345–7353. * [15] A. Geiger, P. Lenz, C. Stiller, and R. Urtasun, “”vision meets robotics: The kitti dataset”,” _International Journal of Robotics Research (IJRR)_ , 2013\. * [16] H. Caesar, V. Bankiti, A. H. Lang, S. Vora, V. E. Liong, Q. Xu, A. Krishnan, Y. Pan, G. Baldan, and O. Beijbom, “nuscenes: A multimodal dataset for autonomous driving,” in _Proceedings of the IEEE/CVF conference on computer vision and pattern recognition_ , 2020, pp. 11 621–11 631. * [17] A. E. G. Hernandez, Ö. Erkent, and C. Laugier, “Recognize moving objects around an autonomous vehicle considering a deep-learning detector model and dynamic bayesian occupancy,” in _2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)_. IEEE, 2020, pp. 414–420. * [18] J. Cartucho, R. Ventura, and M. Veloso, “Robust object recognition through symbiotic deep learning in mobile robots,” in _2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2018, pp. 2336–2341.
arxiv-papers
2021-07-27T09:42:18
2024-09-04T03:07:21.110201
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Andr\\'es G\\'omez, Thomas Genevois, Jerome Lussereau and Christian\n Laugier", "submitter": "Andr\\'es Eduardo G\\'omez Hernandez Mr", "url": "https://arxiv.org/abs/2107.12692" }
2107.12701
# End-To-End Real-Time Visual Perception Framework for Construction Automation Mohit Vohra1, Ashish Kumar1, Ravi Prakash1 and Laxmidhar Behera1,2 1Authors are with Indian Institute of Technology Kanpur, India, {mvohra, krashish, ravipr and lbehera}@iitk.ac.in. 2 Author is with TCS Innovation Labs, Noida, India ###### Abstract In this work, we present a robotic solution to automate the task of wall construction. To that end, we present an end-to-end visual perception framework that can quickly detect and localize bricks in a clutter. Further, we present a light computational method of brick pose estimation that incorporates the above information. The proposed detection network predicts a rotated box compared to YOLO and SSD, thereby maximizing the object’s region in the predicted box regions. In addition, precision (P), recall (R), and mean-average-precision (mAP) scores are reported to evaluate the proposed framework. We observed that for our task, the proposed scheme outperforms the upright bounding box detectors. Further, we deploy the proposed visual perception framework on a robotic system endowed with a UR5 robot manipulator and demonstrate that the system can successfully replicate a simplified version of the wall-building task in an autonomous mode. ## I Introduction Manufacturing and construction are one of the widespread and continuously growing industries. The former has seen a dramatic increase in production capacity due to the optimization of industrial automation, while the latter has adopted automation only marginally [1]. Construction automation is inherently quite challenging for several reasons. First, the workspace is highly unstructured. Therefore, very high precision and robust visual perception, motion planning, and navigation algorithms are required for autonomous solutions to adapt to different scenarios. Secondly, a mobile manipulator needs to move between multiple positions, compelling us to perform onboard computations for various algorithms. Therefore, limited memory, power, and computational resources make this task more challenging. The process of automation can have a broad impact on the construction industry. First, construction work can continue without pause, which ultimately shortens the construction period and increases economic benefits. Also, the essential benefits of construction automation are worker safety, quality, and job continuity. Towards this end, recently, Construction Robotics, a New York-based company, has developed a bricklaying robot called SAM100 (semi-automated mason) [2], which makes a wall six times faster than a human. However, their robot required a systematic stack of bricks at regular intervals, making this system semi-autonomous, as the name suggests. One of the primary construction tasks is to build a wall from a pile of randomly arranged bricks. To replicate the simplified version of the above work, humans must complete a sequence of operations: i) Select the appropriate brick from the pile, e.g., the topmost brick, ii) finding the optimal grasp pose for the brick, and iii) finally, placing the brick in its desired place, i.e., on the wall. Humans can do this work very quickly and efficiently. However, the robot must perform a complex set of underlying operations to complete the above steps autonomously [3]. (a) (b) Figure 1: (a) shows a simple scenario where a pile is located near the robotic system, (b) the robotic system mimics wall building task i.e. detects pile, selects a target brick and constructs a wall on its side in a fully autonomous way. In this paper, we aim to deploy a robotic solution for the task of construction automation in a constrained environment (Fig.1) with limited computational resources (single CPU with I7 processor, 4core, 8GB RAM ). We assume that all bricks are of equal size, and their dimensions are known. We further assume that the wall assembly area and brick piles are very close, exempting us from deploying any localization and navigation modules for robots. Thus, the main challenge in this task is to detect and localize bricks in the clutter while handling the multiple instances of the bricks. Once we have localized the bricks in a clutter, we will use the above information to estimate the brick pose. Following are the main contributions in this paper: * • A computationally efficient object detection network for the detection and localization of bricks in a clutter is presented in this paper. * • A light computational method for estimating brick pose using point cloud data is presented in this paper. * • All the modules are integrated into a robotic system to develop a fully autonomous system. * • Extensive experiments to validate the performance of our system. In the next section, we briefly provide a review of state-of-the-art algorithms related to the paper. In the section-III, we formulate the problem statement. The overall approach and its modules are explained in section-IV. In section-V, the experimental study of the algorithm is reported for various test cases. This paper is finally concluded in section-VI. ## II Related Works ### II-A Object Detection As mentioned in the previous section, the first stage of the construction process is the localization of the target object. In our case, the target object is referred to as a brick. In general, bricks are arranged randomly. Therefore, the brick must be localized before grasping. The process of brick localization falls under the category of the object detection algorithm. We perform a brick localization process in the image space. Several object detection algorithms exist in the literature. Here, we limit our discussion to only Conventional Neural Network (CNN) based methods. The RCNN [4] generates object proposals (rectangular regions) in the image plane, and a CNN is used to extract features from the proposed regions, followed by a classifier to classify the proposed regions into N different classes, where N may vary according to application. In RCNN, most of the time is consumed in proposal generation as this step is performed on CPU, and also inference time increases linearly with an increase in the number of proposals. SPPnets [5] were proposed to speed up the RCNN by extracting the features for the whole image at once and then cropping the feature map corresponding to the proposals. Due to the multistage nature of the above algorithm, joint training was required. Fast-RCNN [6] proposes an improved approach that is relatively faster and requires single-stage training. A further improved version of Faster-RCNN [7] was also proposed in which proposals are generated within the CNN, called a Region Proposal Network (RPN). The RPN was the key improvement in improving the overall algorithmic real-time performance. All the methods discussed above predict an upright bounding box around the detected object. In addition to the target object region, the predicted box may contain non-object regions or backgrounds. Hence, to minimize the background in the detected boxes, various solutions are present in the literature. For example, in [8], the author predicts a rotated bounding box from the set of prior rotated boxes (anchor boxes). Similarly, Mask-RCNN [9] can predict the bounding box and mask of the object simultaneously, which is known as instance detection and segmentation. All the algorithms mentioned above consists of two steps; i) generation of object proposals or anchor boxes (axis-aligned or rotated), ii) classification (or regressing) the proposals using a CNN with a backbone such as VGG [10], ResNet [11]. Thus the performance of the algorithm depends on the proposal generation process. On the other hand, authors of You Only Look Once (YOLO-v1) [12] have proposed a single network for object detection which divides the image into grid cells and directly predicts the fixed number of bounding boxes, corresponding confidence scores, and class probabilities for each grid cell. In the same direction, single shot multibox detector (SSD) [13] is another variant of a single-stage object detector. In this variant, multi- resolution object detection is performed, i.e., detecting the presence of an object and its class score at various stages of different spatial resolutions. ### II-B 6D Pose Estimation After brick localization, a grasp operation needs to be performed by the manipulator. Choosing an optimal grasp configuration is a non-trivial task and remains an open problem. The grasp configuration depends on the 6D pose of the brick. Several Neural-network based pose estimation methods exist in the literature [14], [15], but limited memory resources compel us to use computationally light pose-estimation methods. To this end, several algorithms exist to estimate the object’s 6D poses, which require a high degree of surface texture on the object. In our case, the estimation of brick poses is quite challenging due to their cubic shape (flat surfaces), which do not have surface textures. Therefore, the feature point matching technique [16] [17] cannot be used. Other approaches [18], [19] consider an earlier model of the object. These methods require a preprocessing step, followed by the correspondence matching process. The matching process is the most time- consuming component of such algorithms. Besides, point-to-point matching methods (ICP [20], GICP [21]) are based on local geometric properties. Therefore, these methods can be stuck in local minima when aligning the target model with the reference due to flat surfaces. ## III Problem Statement ### III-A Object Detection As mentioned in previous sections, the main challenge is to identify the bricks in a clutter. All state-of-the-art object detectors predict the upright or straight bounding box, which has three limitations: * • The bounding box corresponding to the rotated or tilted object contains a significant non-object region (Fig. 2(a)). Thus, it requires an additional step to extract object information, like object segmentation in the bounding box region. * • If two or more objects are very close to each other. The corresponding bounding boxes will have non-zero intersecting regions (Fig. 2(b)). Thus, additional steps are required to handle intersecting regions, as this region may contain clutter for one box or an object part for another box. * • If the intersecting regions are significant, after applying non-maximal- suppression (NMS), neighbor detection may be missed [22], as shown in Fig. 2(c). (a) Predicted Boxes (b) Boxes Overlap (c) After NMS Figure 2: Nearby predictions can be missed due to NMS To compete with the above limitations, we designed a CNN-based model to detect and localize bricks by predicting rotated boxes. An additional degree of freedom, i.e., the box’s angle, allows the network to predict the box with greater alignment with the target object. Since most of the area inside the rotated bounding box corresponds to the target object, we can directly use the region corresponding to the rotated bounding box to extract the target object’s information, avoiding any additional computations. A detailed description of the proposed model is given in Section-IV. ### III-B 6D Pose Estimation As mentioned earlier, the bricks used in the experiments have a flat and textureless surface. Therefore, feature matching methods for pose estimation are unreliable in our experiments, as the number of features is less and not very distinct. Since the bricks used in our experiments have a cuboidal shape, if we can estimate the pose of at least one surface of the brick, this information is sufficient to estimate the pose of the entire brick. The brick has six faces, and each face has a specific relative pose with a local brick frame. Hence to estimate the brick pose, we have to identify the brick surface (out of six surfaces), estimate the surface pose, and use relative transformations to get the complete brick pose. A brief description of the pose estimation method is given in the section - IV-C. ## IV The Proposed Framework Figure 3: A synthetically generated sample ### IV-A Dataset We collect $30$ images for each class of brick (e.g., blue and green) using Kinect. Images are collected, such that each image has an isolated brick with a different pose. A manual mask is generated for each image. Following [23], the raw images and the corresponding masks are used to synthesize the cluttered scenes. A dataset of $10$k training images and $5$k test images are generated. We generate ground truths for synthetic images such that a unique instance-ID, as opposed to semantic segmentation, is assigned for each brick instance. A random sample from the data set is shown in Fig. 3. Furthermore, for each mask instance, we generate a rotated box using the OpenCV API. Each image is divided into several grids, where each grid has a size of $16\times 16$ pixels. Thus if the raw image has a size of $480\times 640$, then the total number of the grids are $\frac{480}{16}\times\frac{640}{16}$, i.e., $30\times 40$. Further, each grid is represented by an $8D$ vector representing the three-class probabilities (blue brick, green brick, or background) and five bounding box parameters $x,y,w,h,\theta$. For each grid, class probabilities are assigned if the rotated bounding box’s centroid (corresponding to the blue brick, green brick) exists within that grid. If there is no centroid in the grid, then we will assign the probability of $1.0$ to the background label. Suppose a centroid exists within a grid. Corresponding bounding box parameters are $x,y,w,h,\theta$, where $x,y$ is the offset between the rotated bounding box center and the topmost grid corner. Parameters $w,h,\theta$ are width, height, and orientation of the bounding box, respectively. We scale the bounding box parameters in the range of ($0,1$), where the maximum value of offset is $16$ pixels. The box’s maximum dimension can be $480\times 640$ pixels, and the maximum orientation value is $3.14$ radians. Thus for each image, we have an output tensor of size $30\times 40\times 8$. Further, if multiple centroid points exist in a single grid, we select the centroid point corresponding to the mask, which has a larger fraction of the complete mask in that grid. Figure 4: Proposed Network ### IV-B Rotating Box Network Fig. 4 represents the network architecture. For each block, the size of the input and output feature map is mentioned. Also, we use the ReLU activation function after each layer. The SSD architecture inspires the proposed rotating box network architecture. In SSD, shallow layer features and depth layer features are used for final predictions. Similarly, in the proposed network, features from individual shallow layers are processed, concatenated, and passed through a series of fully convolutional layers for final prediction. Unlike SSDs, the proposed network prediction does not use any anchor boxes. Instead, it predicts an additional degree of freedom (angle of the box), and thus the predicted bounding boxes can align more accurately than the constrained bounding box. In order to train the network for predicting rotated boxes, the input to the network is the raw image, and the output of the network is a tensor of size $30\times 40\times 8$. Further, we use a cross-entropy loss for the class probabilities and a regression loss for the bounding box parameters. Overall loss for the network is the average of both losses. Further, to avoid any biasing in training because of the large number of non-object grids as compared to the object grids, we select positive to negative ratio = $1:2$ by following [13]. Output the model for the different arrangement of bricks in a variety of backgrounds is shown in Fig. 5. Figure 5: Network Predictions ### IV-C Pose Estimation To estimate the brick pose, as mentioned earlier, we have to calculate the pose of one of the brick surfaces and use relative transformation to extract the complete brick pose. For this task, we feed the current image (Fig. 6(a)) to the rotating box network. The region corresponding to the rotating box (Fig. 6(b)) is called the brick region, and the point cloud corresponding to the brick region is called the brick cloud. On the brick’s cloud, we apply the following steps: * • Apply RANSAC method for estimating a set of points (inliers) that fits a planar surface in the brick cloud data. * • Compute the centroid, major axis, and minor axis of the inliers. Together these three pieces of information represent the pose of the planar surface. To estimate the surface ID, we follow the following steps. * • Using [24], extract all boundary points in the inliers, which is marked in white color in Fig. 6(d). * • Apply RANSAC method for fitting the lines on the boundary points which are shown pink in Fig. 6(e). * • Compute all corner points, which are the intersecting point of two or more lines. * • Pair the corner points representing the same line [25], and the distance between two corner points gives the length of the edge. * • Since the brick dimensions are known in advance. Hence the length of the edges can be used to identify the surface, and we can use relative transformation to compute the 6D pose of the brick, as shown in Fig. 6(f). (a) Image (b) Rotating box (c) Point Cloud (d) Edges (e) Lines (f) 6D Pose Figure 6: Pose estimation pipeline ## V Experiments and Result ### V-A Experimental Setup For experimental evaluation, we use our robotic platform setup, as shown in Fig. 1(a). It consists of a UR5 robot manipulator with its controller box (internal computer) mounted on a ROBOTNIK Guardian mobile base and a host PC (external computer). The UR5 robot manipulator is a 6-DOF robotic arm designed to work safely alongside humans. We use an eye-in-hand approach, i.e., the image acquisition hardware, which consists of RGB-D Microsoft Kinect Sensor, is mounted on the manipulator. A suction-based gripper is used for grasping. Robot Operating System (ROS) is used to establish a communication link among the sensor, manipulator, and the gripper. (a) (b) (c) (d) (e) (f) (g) Figure 7: Sequence of actions executed in order to carry out a single step of wall construction ### V-B Overall Algorithmic Flow For the experiment, we follow a simple pattern (or wall pattern) such that we place a blue brick on the previously placed blue brick and a green brick over the previously placed green brick and keep on placing the bricks up to the height of $6$ layers. The system needs to place the brick correctly for wall construction, hence requiring the brick pose with high accuracy. Since in a dense clutter, network prediction for brick can include some portion of other bricks, directly processing the box regions for pose can give a noisy or less reliable brick pose. For the safer side, we perform the grasp operation with a noisy brick pose and place the brick in a separate area and again estimate the pose of single isolated brick. Fig. 7 refers to the sequence of steps executed to complete a single phase of the wall construction task. In the first stage, the Kinect sensor is positioned to have a clear view of the bricks clutter (Fig. 7(a)), and the current image is fed to the rotating bounding box network. We compute the planar surface and its pose (centroid, major-axis, and minor-axis) corresponding to each rotated box. We select the topmost pose from all the calculated poses, i.e., the pose at the top of the clutter. The required motion commands are generated to reach the selected pose for brick grasping in clutter (Fig. 7(b)). The grasped brick is placed in a separate area (Fig. 7(c)), and again the vision sensor is positioned in an appropriate position to have a clear view of a single isolated brick (Fig. 7(d)). At this instant, the current frame is fed to the network, and the output of the network is a class label and the bounding box parameters. The brick’s pose is estimated and required motion commands are generated to grasp the brick (Fig. 7(e)). In the final stage, the sensor is positioned in an appropriate position to have a view of the wall region (Fig. 7(f)). The current frame is fed to the network. Using the estimated bounding box, point cloud data, and grasped brick label (previous step), the brick’s final pose is estimated, where the brick is to be placed to form a wall (Fig. 7(g)). ### V-C Error Metrics The system’s overall wall-building performance depends entirely upon the performance of the visual perception system, i.e., the accuracy of brick detection. Therefore, we report the performance of the detection system in terms of precision ($P$) and recall ($R$). We have defined $P,C$ as: $P=\frac{NO}{TP},\ \ \ R=\frac{DB}{TB}$ (1) where, $NO$ Number of object pixels in the predicted box (rotated / upright) $TP$ Total number of object pixels in the predicted box (rotated / upright) $DB$ Total number of detected bricks $TB$ Total number of the bricks in the ground truth. ### V-D Quantitative Analysis We compare rotating box network with YOLO-v3 and SSD-lite. For fair comparison, all models are trained by choosing hyper-parameters as $epoch=60,mini-batch=4,lr=0.0001$ except SSD-lite which has a learning rate of $0.001$. We use Adam optimizer to tune the parameters of CNN. We divide the quantitative analysis in following two cases: #### V-D1 Upright Bounding Box Prediction In this case, we report Mean Average Precision (mAP) score, $P$ and $R$ of the proposed CNN model against SSD-lite and YOLO-v3 (Table-I). All the three models produces upright bounding boxes. Table I: | SSD-lite | YOLO-v3 | Proposed ---|---|---|--- $P$ | $0.608$ | $0.580$ | $0.638$ $R$ | $0.98$ | $0.84$ | $0.84$ mAP | $0.834$ | $0.827$ | $0.811$ #### V-D2 Rotated Bounding Box Prediction In this case, SSD-lite and YOLO-v3 produce regular bounding boxes, while the proposed CNN model produces rotated boxes. Since the mAP score of rotated boxes can not be compared directly with that of upright bounding boxes. Hence only $P$ and $R$ is reported (Table-II). The precision $P$ for rotating boxes network is significantly higher as compared to other networks, because of the one additional degree of freedom (angle of boxes), the network predicts bounding boxes that can align more accurately as compared to constrained bounding boxes (straight boxes), thus there will be less overlap between different boxes and most of the region inside the bounding box represents the same object which results in high precision. Table II: | SSD-lite | YOLO-v3 | Proposed ---|---|---|--- $P$ | $0.608$ | $0.580$ | $0.778$ $R$ | $0.98$ | $0.84$ | $0.999$ ### V-E Qualitative Analysis Predictions of all four networks under consideration are shown in Fig. 8. It can be noticed from Fig. 8(m) and 8(o), two green bricks present in the center of the frame are represented by a single bounding box, thus decreasing the recall value for Yolo-v3 and the proposed bounding box network. While SSD-lite (Fig. 8(n)) and the proposed rotating box network (Fig. 8(p)), both assign two different boxes for the two green bricks. Thus SSD-lite and our network have a higher recall. However, in SSD-lite, two predicted bounding boxes have a significant overlap area, thus having lower precision than the rotating box network. (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) (m) (n) (o) (p) (q) (r) (s) (t) Figure 8: From Column 1 to 4: YOLO-v3 predictions, SSD-lite predictions, Proposed Bounding box predictions, Rotating box predictions. ### V-F Task Evaluation To evaluate the system’s performance, we repeat the task of wall construction for $25$ rounds. For each round, the robotic system has to place the bricks up to the height of $6$ layers, and the wall pattern will remain the same, i.e., the blue brick on previously placed blue brick and green brick on previously placed green brick. For the experiments, the first layer of bricks is placed manually, and the system has to place the rest of the bricks, i.e., $2-6$ layers, according to the pattern. We count the number of bricks (or layers) for each round the robotic system has successfully placed on the wall. In the experiments, we define the brick placement as successful if the distance between the centroid of the currently placed brick and the centroid of the manually placed brick, when projected on the ground plane is $<0.1m$. Further, the Euler angle difference between the calculated pose of the currently placed brick and the manually placed brick should be less than $None$ for each axis. From our experiments, we observed that if none of the above criteria are satisfied, the wall becomes asymmetrical and collapses. The Table-III shows the performance of the system for $25$ rounds. The video link for the experiment is https://www.youtube.com/watch?v=FvsCv-Pt58c. Table III: Task Evaluation | layer-2 | layer-3 | layer-4 | layer-5 | layer-6 ---|---|---|---|---|--- Successful rounds (max 25) | 25 | 25 | 22 | 19 | 17 From Table-III, we observed that the robotic system has successfully placed layer-$2$ and layer-$3$ bricks in all $25$ rounds. However, accuracy decreases with the upper layers. This is because the new position of the brick on the wall is estimated by calculating the previously placed brick pose. Thus, if there is a slight error in brick placement in the previous step, this error is transferred to the current step. Thus, with higher layers, the error accumulates, resulting in lower accuracy. ## VI Conclusion An end-to-end visual perception framework is proposed. The framework consists of a CNN for predicting a rotated bounding box. The performance of the CNN detector has been demonstrated in various scenarios, which mainly include isolated and dense clutter of bricks. The proposed CNN module localizes the bricks in a clutter while simultaneously handling multiple instances of the bricks. The detection is free of the anchor-box technique, which improves the timing performance of the detection module. In order to compare our method quantitatively with state-of-the-art models, we reported Precision ($P$), Recall ($R$), and mAP scores for various test cases. We have compared the effectiveness of rotating bounding box predictions against upright bounding box detection (YOLO-v3, SSD-Lite). The proposed scheme outperforms the upright bounding box detection. It implies that rotating bounding boxes can align more accurately with the object’s convex-hull and thereby reduce the overlap with neighboring bounding boxes(if any). The framework has also been successfully deployed on a robotic system to construct a wall from bricks in fully autonomous operation. ## References * [1] K. Asadi and K. Han, “Real-time image-to-bim registration using perspective alignment for automated construction monitoring,” in Construction Research Congress, vol. 2018, pp. 388–397, 2018. * [2] S. Parkes, “Automated brick laying system and method of use thereof,” Jan. 31 2019\. US Patent App. 16/047,143. * [3] R. Prakash, M. Vohra, and L. Behera, “Learning optimal parameterized policy for high level strategies in a game setting,” in 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), pp. 1–6, IEEE, 2019. * [4] R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 580–587, 2014. * [5] K. He, X. Zhang, S. Ren, and J. Sun, “Spatial pyramid pooling in deep convolutional networks for visual recognition,” IEEE transactions on pattern analysis and machine intelligence, vol. 37, no. 9, pp. 1904–1916, 2015\. * [6] R. Girshick, “Fast r-cnn,” in Proceedings of the IEEE international conference on computer vision, pp. 1440–1448, 2015. * [7] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks,” in Advances in neural information processing systems, pp. 91–99, 2015. * [8] S. Li, Z. Zhang, B. Li, and C. Li, “Multiscale rotated bounding box-based deep learning method for detecting ship targets in remote sensing images,” Sensors, vol. 18, no. 8, p. 2702, 2018. * [9] K. He, G. Gkioxari, P. Dollár, and R. Girshick, “Mask r-cnn,” in Proceedings of the IEEE international conference on computer vision, pp. 2961–2969, 2017. * [10] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014. * [11] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016. * [12] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 779–788, 2016. * [13] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg, “Ssd: Single shot multibox detector,” in European conference on computer vision, pp. 21–37, Springer, 2016. * [14] B. Tekin, S. N. Sinha, and P. Fua, “Real-time seamless single shot 6d object pose prediction,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 292–301, 2018. * [15] Y. He, W. Sun, H. Huang, J. Liu, H. Fan, and J. Sun, “Pvn3d: A deep point-wise 3d keypoints voting network for 6dof pose estimation,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 11632–11641, 2020. * [16] R. B. Rusu, G. Bradski, R. Thibaux, and J. Hsu, “Fast 3d recognition and pose using the viewpoint feature histogram,” in 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 2155–2162, IEEE, 2010. * [17] J. P. S. do Monte Lima and V. Teichrieb, “An efficient global point cloud descriptor for object recognition and pose estimation,” in 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp. 56–63, IEEE, 2016. * [18] B. Drost, M. Ulrich, N. Navab, and S. Ilic, “Model globally, match locally: Efficient and robust 3d object recognition,” in 2010 IEEE computer society conference on computer vision and pattern recognition, pp. 998–1005, Ieee, 2010. * [19] S. Hinterstoisser, V. Lepetit, N. Rajkumar, and K. Konolige, “Going further with point pair features,” in European conference on computer vision, pp. 834–848, Springer, 2016. * [20] P. J. Besl and N. D. McKay, “Method for registration of 3-d shapes,” in Sensor fusion IV: control paradigms and data structures, vol. 1611, pp. 586–606, International Society for Optics and Photonics, 1992. * [21] A. Segal, D. Haehnel, and S. Thrun, “Generalized-icp.,” in Robotics: science and systems, vol. 2, p. 435, Seattle, WA, 2009. * [22] N. Bodla, B. Singh, R. Chellappa, and L. S. Davis, “Soft-nms–improving object detection with one line of code,” in Proceedings of the IEEE international conference on computer vision, pp. 5561–5569, 2017. * [23] A. Kumar and L. Behera, “Semi supervised deep quick instance detection and segmentation,” in 2019 International Conference on Robotics and Automation (ICRA), pp. 8325–8331, IEEE, 2019. * [24] M. Vohra, R. Prakash, and L. Behera, “Real-time grasp pose estimation for novel objects in densely cluttered environment,” in 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), pp. 1–6, IEEE, 2019. * [25] M. Vohra., R. Prakash., and L. Behera., “Edge and corner detection in unorganized point clouds for robotic pick and place applications,” in Proceedings of the 18th International Conference on Informatics in Control, Automation and Robotics - ICINCO,, pp. 245–253, INSTICC, SciTePress, 2021.
arxiv-papers
2021-07-27T09:58:07
2024-09-04T03:07:21.125781
{ "license": "Creative Commons - Attribution Share-Alike - https://creativecommons.org/licenses/by-sa/4.0/", "authors": "Mohit Vohra, Ashish Kumar, Ravi Prakash and Laxmidhar Behera", "submitter": "Mohit Vohra", "url": "https://arxiv.org/abs/2107.12701" }
2107.12703
# Dislocation assisted phase separation: a phase field study Arjun Varma R Prita Pant M. P. Gururajan [email protected] Department of Metallurgical Engineering and Materials Science, Indian Institute of Technology Bombay, Powai, Mumbai, Maharashtra 400076 INDIA ###### Abstract Defects play a key role in deciding the mechanisms and kinetics of phase transformations. In this paper, we show how dislocations influence phase separation in alloys with miscibility gap. Specifically, depending on the ratio of pipe mobility to bulk mobility, it is seen that even in a system with nominal compositions outside the spinodal limit, spinodal phase separation is possible. Surprisingly, phase separation through both nucleation and growth, and spinodal decomposition, is seen concurrently (for the case of intersecting dislocations). Finally, the prominent role played by dislocations in influencing the morphology of precipitates is explored. We show that these results agree qualitatively with recent experimental results in iron based systems obtained using Atom Probe Tomography (APT). ###### keywords: Segregation , Pipe diffusion , Precipitate morphology , Spinodal decomposition , Misfit , Nucleation and growth ††journal: Journal of LaTeX templates ## 1 Introduction It is well known that solutes in alloys segregate to elastically favourable sites near dislocations [1, 2, 3, 4] forming “solute atmospheres” which hinder the dislocation movement. The solute segregation to dislocations might depend on the character of the dislocation and the nature of the misfit (between solute and matrix), if only the elastic interaction is accounted for [5]. Solutes with dilatational misfit segregate to dislocations with edge character while solutes with non-dilatational misfit segregate to both edge and screw dislocations [6]. However, if the broken bonds at the dislocation core are accounted for, solute segregation is expected at dislocations of both character [7]. Segregation can also lead to nucleation and growth along dislocations as has been predicted [8, 9, 10], and, experimentally observed – see, for example, [11, 5, 12]. Recently, atom probe experiments in Fe-Mn system [13] have shown that dislocations can also act as sites of localized spinodal decomposition in systems with nominal alloy compositions outside the spinodal limit. In fact, in this system, namely, Fe-Mn, there have been recent modelling studies which show grain boundary induced spinodal decomposition even when the overall alloy composition is outside the spinodal limits [14, 15]. In this paper, we explore if dislocations can also induce phase separation by the spinodal mechanism in systems with nominal alloy compositions outside the spinodal limit. In the past, attempts have been made to investigate the effects of dislocations on phase transformation using phase field models [16, 17, 18, 19, 20, 21]. These models have shown that stationary and moving dislocations, in systems with average composition within the spinodal limit, can lead to faster kinetics and ordered microstructures. In this regard, the work of Hu and Chen [17] and Mianroodi et al [15] deserve special mention; both these works show that even in a system with overall composition outside the spinodal limit, segregation to the dislocations can take the composition along the dislocation to within the spinodal regime. However, in both these cases spinodal fluctuations along the dislocation line are not seen. This is in contrast to the spinodal decomposition along the dislocations observed experimentally by Da Silva et al. [13]. The work of Hu and Chen [17] is in 2-D. So, the question of spinodal fluctuations along the dislocation line does not arise. On the other hand, in Mianroodi et al, the simulations are done in 3-D [15]. However, faster diffusivity along the dislocation lines is not incorporated in these simulations. The diffusivity along the core of a dislocation can be two to three orders of magnitude higher than the bulk diffusivity [22], and hence, this can be expected to play a key role in the phase transformation mechanism and kinetics. In this paper, we show that faster diffusion along the dislocations is indeed essential for a system with alloy composition outside spinodal limits to show segregation-assisted spinodal decomposition along the dislocations. We use a phase field dislocation dynamics (PFDD) model. There exist several versions of PFDD models in the literature: see for example, [23, 24, 25, 26, 27, 28]. Our model is very similar to that of Hunter et al. [28]. We do not incorporate specific crystallographic geometries; however, dislocation-solute interactions and the segregation effects are known to depend primarily on the defect structure and their elastic field [7]. In fact, we show that our model is able to reproduce the experimentally observed: (i) segregation-assisted spinodal morphology, and (ii) non-spherical precipitate shapes at dislocation intersections, in iron based systems, albeit qualitatively. ## 2 Formulation and simulation details In this paper, we have combined phase field models of phase separation [17] and dislocation dynamics [27, 28]; we incorporate faster diffusion along the cores of the dislocations using the variable mobility methodology proposed by Zhu et al. [29]. In this section, since all these models are well known, we describe the formulation very briefly – for the sake of completeness. ### 2.1 Formulation We consider a binary system with dislocations; we describe the system using two order parameters, namely, composition ($c$) and slip ($\eta$). We assume the eigenstrain due to the solute misfit to be given by: $\epsilon^{0c}_{ij}=\epsilon^{*c}\delta_{ij}\beta(c)$ (1) where $\epsilon^{*c}$ is the magnitude of the eigenstrain, $\delta_{ij}$ is Kronecker delta and $\beta(c)$ is an interpolation function of c given by $\beta(c)=c^{3}(10-15c+6c^{2})$. In other words, we assume that the solute misfit is dilatational and is measured with respect to the matrix lattice parameter. The eigenstrain due to a dislocation is a pure shear strain [30] and is obtained as a tensor product of the Burgers vector ($\mathbf{b}$) and the slip plane normal ($\mathbf{n}$) of the dislocation; it is given as: $\epsilon^{0d}_{ij}=\sum_{\alpha=1}^{N}\left(\frac{b_{i}n_{j}+b_{j}n_{i}}{d}\right)\eta_{\alpha}$ (2) where $d$ is the interplanar spacing, $\alpha$ denotes the slip system and $N$ is the total number of slip systems. The stress and strain fields that go into the elastic strain energy component are calculated by solving the equation of mechanical equilibrium. We use the Green’s function approach [30] to solve the equation of mechanical equilibrium – assuming linear and isotropic elasticity; we also assume that the system is elastically homogeneous. The total free energy of the system, consists of, in addition to the elastic component, the chemical and the dislocation core energy components: $\displaystyle F(c,\eta)=$ $\displaystyle{N_{V}}\int\left(Ac^{2}(1-c)^{2}+\kappa\left|\nabla c\right|^{2}\right)\;dV$ $\displaystyle+\frac{1}{2}\int C_{ijkl}\epsilon^{el}_{ij}\epsilon^{el}_{kl}\;dV+\sum_{\alpha=1}^{N}\int B_{\alpha}sin^{2}(\pi\eta_{\alpha})\;dV$ (3) where $N_{V}$ is the number of atoms per unit volume, $V$ is the volume of the system, $A$ is a constant that determines the height of the bulk free energy density barrier between the two phases, $B_{\alpha}$ is the core energy coefficient for slip system $\alpha$, $\kappa$ is the gradient energy coefficient, $\epsilon^{el}_{ij}$ is the elastic strain (which, in turn, is related to the total strain $\epsilon^{t}$ and the eigenstrains through the relation $\epsilon^{t}_{ij}-\epsilon^{0c}_{ij}-\epsilon^{0d}_{ij}$), and $C_{ijkl}$ denotes the modulus tensor. Here, we have assumed that the interfacial energy between the two phases is isotropic. As can be seen from the total strain expression, the $c$ and $\eta$ fields are coupled by the elastic strain energy of the system. This interaction leads to the segregation of the solute atoms to the dislocations. We do not consider segregation due to the broken bonds at the core of the dislocations in this model. Note that we ignore the gradient energy term associated with $\eta$ in our formulation. The core width of the dislocations in the system is determined by the balance between the elastic and the core energies of the dislocation. Given the free energy functional, the Allen-Cahn equation for $\eta$ and the Cahn-Hilliard (CH) equation for $c$ can be used to study the microstructural evolution in the system. In this paper, we are interested in the evolution of the composition fields in the presence of the dislocations. We assume that the dislocations are stationary and hence do not evolve the $\eta$ order parameter – except at the beginning of the simulations to equilibrate the dislocation structure. Specifically, we use two different dislocation configurations – edge dislocation dipoles in one and two slip systems. The CH equation that described the composition evolution is given by: $\frac{\partial c}{\partial t}=\nabla\left[M(\eta)\cdot\nabla\mu^{c}\right]$ (4) where $M(\eta)$ is the (scalar) atomic mobility which is $\eta$ and hence, position dependent, and $\mu^{c}$ is the variational derivative of the free energy per atom with respect to the composition, and, is given by: $\mu^{c}(c)=2A(6c^{2}-6c+1)-2\kappa\nabla^{2}c-C_{ijkl}\epsilon^{el}_{kl}\delta_{ij}\epsilon^{*c}\beta^{\prime}(c)$ (5) where $\beta^{\prime}(c)=\frac{\partial\beta}{\partial c}$. In deriving the above expression, we have used the symmetry properties of the elastic moduli tensor $C_{ijkl}$. Let $M_{b}$ be the bulk mobility of solute atoms and let $M_{p}$ be the enhanced mobility along the dislocation core over and above the bulk mobility. We define the mobility $M$ in the simulation domain using the order parameters as follows: $M(\eta_{1},\eta_{2})=M_{b}+M_{p}\left\\{\mathrm{max}\left(|\eta_{1}(1-\eta_{1})|,|\eta_{2}(1-\eta_{2})|\right)\right\\}$ (6) where $\eta_{1}$ and $\eta_{2}$ are the two order parameters that describe slip in two different slip planes, labelled 1 and 2, respectively. The mobility of atoms given by Eq. 6 will be highest at points where $\eta_{1}=0.5$ and/or $\eta_{2}=0.5$. For simulations in which the dislocations exist only on a single slip system, in this expression, we substitute $\eta_{1}=\eta$ and $\eta_{2}=0$. We use a Fourier spectral technique to solve the CH equation (which implies periodic boundary conditions). The CH equation with the variable atomic mobility has severe time step constraints. Hence, we use the numerical technique proposed by Zhu et al. [29], using which, the final evolution equation in the Fourier space is given as: $\displaystyle c_{t+\delta t}=c_{t}+\delta t\left[\frac{ik\\{\\{M(\eta)\\{ik\mu^{c}(c_{n})\\}_{F}\\}_{R}\\}_{F}}{(1+2\zeta\delta t\kappa k^{4})}\right]$ (7) where $k=\sqrt{k_{x}^{2}+k_{y}^{2}+k_{z}^{2}}$ is the magnitude of the reciprocal space vector, the braces denoted by $\left\\{\cdot\right\\}_{R}$ and $\left\\{\cdot\right\\}_{F}$ indicate the terms in real and Fourier space respectively, $i=\sqrt{-1}$ and $\delta t$ is the time step. As indicated by Zhu et al. [29], the choice of $\zeta=\frac{1}{2}\left[\mathrm{max}(M(\eta))+\mathrm{min}(M(\eta))\right]$ is optimal. ### 2.2 Non-dimensionalisation All our simulations are carried out using non-dimensionalised parameters. Specifically, we use a characteristic length $L^{\prime}$ of 1Å, a characteristic energy of $E^{\prime}=0.7\times 10^{-21}\;\mathrm{J}$ and, a characteristic times of $T^{\prime}=200\;\mu\mathrm{s}$ to $T^{\prime}=200\;\mathrm{s}$. In dimensional terms, these choices correspond to a system of size $25.6\;\mathrm{nm}$ for 256 grid points, an interfacial energy of $100\;\mathrm{mJ/m^{2}}$, an Young’s modulus of $E=130$ GPa and a Poisson’s ratio of $\nu=0.3$ (isotropic material) and a bulk diffusivity of the order of $1\times 10^{-16}\;\mathrm{m^{2}/s}$ to $1\times 10^{-20}\;\mathrm{m^{2}/s}$. Finally, the used dislocation core energy coefficients imply edge dislocations of width $0.7b$ to $5.8b$, where $b$ is the magnitude of the Burgers vector. The coherent spinodal limits for the parameters chosen by us is 0.216 and 0.783. Our simulations start with a nominal composition well outside the spinodal limit – $c_{0}=0.11$ to $c_{0}=0.18$. The non-dimensionalised parameters and their values are listed Table 1. Parameter | Value ---|--- Spatial discretisation, $\Delta x=\Delta y=\Delta z$ | 1.0 Time step, $\delta t$ | 0.1 – 0.5 Elastic moduli: $C_{1111}$ | 175 Elastic moduli: $C_{1122}$ | 75 Elastic moduli: $C_{1212}$ | 50 Bulk free energy coefficient, $A$ | 1 Dislocation core energy coefficient, $B_{\alpha}$ | 0.31 – 2.52 Gradient energy coefficient, $\kappa$ | 1 Magnitude of eigenstrain, ${\epsilon^{\star}}^{c}$ | 0.01 Table 1: Non-dimensionalised values of parameters used in our simulations ## 3 Results and Discussion In this section, we show and discuss segregation induced nucleation, spinodal decomposition, and concurrent nucleation and spinodal decomposition. We rationalise these results in terms of the strength of the solute-dislocation interaction, the nominal alloy composition and the ratio of pipe to bulk mobilities. ### 3.1 Segregation induced nucleation In Figure 1(a), we show the $c=0.5$ isosurface for a system containing an edge dislocation dipole. In this and subsequent simulations, the edge dislocations are set 128 units apart in a system of size $256\times 64\times 256$; the nominal alloy composition and the dislocation core energy coefficient $B_{\alpha}$ are taken as $0.15$ and $0.63$ (unless stated otherwise). The Burgers vectors of these dislocations are along the positive $x$-direction of the simulation cell and the slip plane normals for both these dislocations are along the positive $y$-direction of the simulation cell. These two dislocations are aligned along the $z$-axis of the simulation cell; the sense vector for the dislocation on the left is the positive $z$-direction of the simulation cell and the line sense for the dislocation on the right is the negative $z$-direction of the simulation cell. Note that the strain fields of the positive edge dislocation (labelled ‘+’) and the negative edge dislocation (labelled ‘-’) are flipped; hence, the accumulation of the solute happens above and below the slip plane for the positive and negative edge dislocation, respectively. Since the results for the two dislocations are different only in terms of the sign of the strain fields; so, we only consider the positive edge dislocation for the rest of this discussion. Figure 1: (a) Segregation and nucleation along the dislocations in an edge dipole shown using $c=0.5$ isosurfaces aligned along the dislocations. (b) shows the $c=0.5$ contours for a positive edge dislocation (along the $z$-direction) in the $xy$-plane for different time steps, and, (c) shows the iso-surfaces for the $c=0.3$, $c=0.5$ and $c=0.9$ at t=1500. In this simulation, we assume that the bulk and pipe mobilities are the same. In Figure 1(b), we show the $c=0.5$ composition contour lines as a function of time in the ($xy$-)plane perpendicular to the dislocation line. In Figure 1(c), we show three composition contour lines, namely, $c=0.3$, $c=0.5$ and $c=0.9$ in the plane perpendicular to the dislocation line. From these figures, it is clear that there is (a) segregation to the dislocation which leads to precipitate nucleation and subsequent growth. Further, note that the shape of the composition profile is consistent with the cardioid profile given by [7]: $c=c_{0}\;exp\left(\frac{-Ksin\theta}{r}\right)$ (8) where $r$ is the radial distance from the dislocation line, $c_{0}$ is the far-field composition, and $K$ is a constant. These shapes are also in agreement with the shape of the precipitate that nucleates along an edge dislocation as shown in [4, 17]. Thus, when we do not assume faster pipe diffusion, we recover the results in the existing literature, which, in turn, serves as a benchmark for our model and implementation. ### 3.2 Spinodal decomposition induced by enhanced pipe diffusion Let us consider the same initial profile as in the previous section; however, let us increase the pipe mobility to be hundred times that of the bulk mobility. In Figure 2, we show the $c=0.5$ composition contour lines for this system. It is clear that the system undergoes phase separation via the spinodal mechanism along the dislocation line. As time progresses, there is also coarsening and coalescence. Thus, in contrast to Figure 1 where we saw cardioid shape, here, we see a morphologically discontinuous phase separated microstructure along the dislocation line at earlier times which becomes a nearly continuous morphology albeit with a wavy interface. Figure 2: The $c=0.5$ contours along the dislocation line for a system in which dislocation core mobility is one hundred times that of the bulk. In this figure, we show the evolution of composition only along the positive edge dislocation. The spinodal fluctuations along the dislocation line grow due to the higher diffusivity along the dislocation core. The phase separated regions in the form of blobs coalesce as shown in (c) and (d) creating a linearly elongated morphology along the dislocation line. In order to see the effect of the ratio of the pipe mobility to bulk mobility, we also carried out simulations where the atomic mobility was kept as ten and fifty times that of bulk mobility. These results are summarised in Figure 3 by plotting the area fraction in the left half of the simulation cell which contains the positive edge dislocation. We calculate the area fraction (in percentage – in the $xy$-plane) of the solute-rich phase along the dislocation line by counting the number of grid points with $c\geq 0.5$ as a fraction of the total number of grid points in the left half of the $xy$-plane. Figure 3: (a) Area fractions of the solute-rich phase formed near the dislocation line at $t=385$ for $\frac{M_{p}}{M_{b}}=50$ and $\frac{M_{p}}{M_{b}}=100$, (b) Area fraction at three different time steps for $\frac{M_{p}}{M_{b}}=10$ In Figure 3(a), we show the area fraction (which is a proxy for the morphology of the solute rich phase) along the dislocation line for the cases where the atomic mobility along the dislocation core is 100 and 50 times that of the bulk – for two different times, namely $t=200$ and $t=385$. Both $M=50$ and $M=100$ cases show wavy profiles, indicating the growth of the composition fluctuation by spinodal mechanism. However, the amplitudes are different; smaller the pipe mobility, smaller the amplitude of the profile; in fact, the profiles, but for the amplitude are almost the same. Since the bulk mobility is the same in both cases, the amount of solute reaching the dislocation at any given time is the same. Thus, the enhanced amplitude of fluctuation is solely due to the higher pipe mobility. From the classical theory of spinodal decomposition, it is known that the coherent spinodal limit can be obtained by solving the following equation [31]: $2A(6c^{2}-6c+1)+\frac{2(\epsilon^{*c})^{2}E}{1-\nu}=0$ (9) For our system, the coherent spinodal limit according to Eq. (9) is calculated as $c_{crit}=0.216$. Even for our initial composition of $c=0.15\pm 0.005$, which is well outside this spinodal limit, we observe that the solute- dislocation interaction is strong enough to segregate enough material along the dislocation and increase the local composition field above the coherent spinodal limit. As the composition along the dislocation enters the spinodal regime, there are also the so-called “up-hill” diffusion fluxes set-up along the dislocation line. From the classical theory of spinodal decomposition, it is also known that, at the early stages of the decomposition, at least, the rate of growth of the amplitude of a fluctuation of wavelength $\lambda$ is given by$A(\lambda,t)=A(\lambda,0)\exp[R(\lambda)t]$ [31] where $R(\lambda)$ is the amplification factor. This amplification factor is a function of mobility $R(\lambda)=-M\lambda^{2}\left[\frac{\partial^{2}g(c)}{\partial c^{2}}+2(\epsilon^{*c})^{2}E+2\kappa\lambda^{2}\right]$, where M is the mobility, and $g(c)$ is the bulk free energy density given by the double well potential. This expression assumes that the system under consideration is elastically isotropic. The composition fluctuation decays when $R(\lambda)$ is negative and grows when it is positive. Since the amplification factor is a function of the wavelength of the fluctuation, there is a critical wavelength $\lambda_{c}$ at which $R(\lambda)$ will be equal to zero. The critical wavelength $\lambda_{c}=\left\\{-\frac{8\pi^{2}\kappa}{\left[\frac{\partial^{2}g(c)}{\partial c^{2}}+2(\epsilon^{*c})^{2}E\right]}\right\\}^{\frac{1}{2}}$ and the maximally growing wavelength $\lambda_{max}=\frac{\lambda_{c}}{\sqrt{2}}$. That is, the energetic parameters of the system such as the (incipient) interfacial energy, the eigenstrains, and the elastic moduli determine the wavelengths of compositional fluctuations; on the other hand, the growth rate depends on the mobility. Thus, in Figure 3(a), the mobilities do not change the profile and only change their amplitude is consistent with the classical theory of spinodal decomposition. In Figure 3(b), we show the profile of the area fraction plot at different times for the case where the atomic mobility along the dislocation line is 10 times that of bulk mobility. Here, we see that with time, the morphology becomes more uniform and the waveiness is smoothened out. This can be understood in terms of the stability of the compositional cylinder (of cardioid cross-section) along the dislocation line. As shown by Nichols and Mullins [32], the morphological perturbations along the length of the cylinder (albeit, of circular cross-section) decay to material flow from the bulk. Thus, the spinodal fluctuations along the dislocation line, which tend to perturb the cylinder, will die, unless, the spinodal fluctuations grow faster than the rate at which bulk diffusion is trying to smoothen these morphologies. This is the reason why we see spinodal morphology only with higher mobilities. Thus, we see that in the case of dislocation assisted phase separation, the mechanism of phase separation can change from nucleation and growth to spinodal decomposition depending on the enhanced pipe mobility. Given that the pipe mobilities are typically two to three orders of magnitude higher, in systems that undergo spinodal decomposition, the dislocations can play a crucial role in the phase separation mechanism; more importantly, dislocations can promote phase separation even when the nominal alloy composition is outside the spinodal region. Thus, the spinodal phase separation in these systems is induced by segregation and is assisted by pipe diffusion. ### 3.3 Effect of dislocation network: concurrent nucleation and spinodal Our aim, in this subsection, is to understand the effect of dislocation networks. So, let us consider a system with two intersecting slip systems; in addition to the dipoles in the (010) plane (as in the previous cases), we introduce another dipole in the (001) plane (that is, with the slip plane normals in the positive $z$-direction) with the sense vectors of the dislocations along the positive and negative $y$-direction (for the dislocations at the left and right, respectively). In this case, we use $256\times 256\times 256$ grid points and the Burgers vectors are aligned along the $x$-direction. This configuration is shown in Figure 4(a). In Figure 4(a)-(d) we show the $c=0.5$ iso-surfaces at different times; in the figures (b)-(d), we show only one intersection for clarity. In this case also, the pipe mobility is 100 times the bulk mobility. Figure 4: Growth of spinodal fluctuations along two intersecting dislocations. The horizontal and vertical lines are drawn through the two dislocation cores, as a guide to the eye. The vertical and horizontal lines are parallel to the y and z axes respectively. At t=50, both pairs of dislocation intersections are shown for better understanding. The composition profile along the z direction through the dislocation core is shown in the inset. The initial overall composition in the simulation cell is $c=0.15\pm 0.005$. At $t=50$, there solute-rich phase nucleates at the intersection of the two dislocations. As time progresses, the composition along the other parts of the two intersecting dislocations cross the spinodal limit of $c^{crit}=0.216$. At $t=75$, there is phase separation along the dislocation lines via spinodal mechanism, and subsequently, there is growth and coalescence. In order to clearly show the concurrent nucleation and growth at the junction, and spinodal along the dislocations, we also show the composition profile along one of the dislocations in the inset. The composition profile in the initial stages clearly shows the nucleation of the second phase at the intersection. The composition along the rest of the dislocation reaches the coherent spinodal limit as time progresses, and, at $t=75$, the composition along the dislocation line is above the spinodal limit; hence, we observe growing composition fluctuations on both sides of the central precipitate. These fluctuations along the dislocation lead to solute rich second phase. When phase separation occurs, material is also added to the central precipitate by virtue of the faster atomic mobility along the dislocation core. In the composition profiles in Figure 4, the values above unity are due to Gibbs-Thomson effect. ### 3.4 Map of phase separation mechanisms Figure 5: The occurrence of spinodal dominated and segregation dominated morphologies are shown for different far field compositions ($c_{0}$) and core energy coefficients ($B_{\alpha}$) at a ratio of mobilities of (a) $\frac{M_{p}}{M_{b}}=100$ and (b) $\frac{M_{p}}{M_{b}}=300$. From the results and discussion so far, it is clear that the segregation (which is controlled, in our model, by the core energy coefficient), the available solute (which is determined by the overall alloy composition), and the pipe mobility. Figure 5 shows a map of phase separation mechanisms as a function of the core energy coefficient $B_{\alpha}$, overall alloy composition $c_{0}$ and mobility ratio $\frac{M_{p}}{M_{b}}$. We considered two different pipe mobilities of $\frac{M_{p}}{M_{b}}=100$ (Figure 5(a)), and, $\frac{M_{p}}{M_{b}}=300$ (Figure 5(b)). For increasing $B_{\alpha}$, the core width decreases, causing higher segregation of solute to dislocation by elastic interaction. Due to this, segregation assisted phase transformation occurs at smaller $c_{0}$ for higher $B_{\alpha}$. Phase separation occurs only in those cases where the perturbations caused by the pipe mobility grows at a faster rate as compared to material segregating from the bulk [32]. This is clear from Figure 5(b), in which there is a wider range of $c_{0}$ across which spinodal morphology dominates. ## 4 Comparison with experimental results Even though a direct comparison of our simulation results with experiments is not possible, a qualitative comparison is possible. In this section, we make two such comparisons. ### 4.1 Dislocation induced spinodal Figure 6: Comparison of (a) the morphology formed by localized spinodal decomposition in our simulation (with pipe-diffusion) ($t=385$) with (b) the atom probe results of [13] (scale bar represents a length of 40 nm). The morphology along the arrows indicated in (b) match well with the output from our simulations. (c) shows the atomic fraction of Mn plotted along the dislocation line. The dashed lines show the typical fluctuation values. The sub-figures (b) and (c) are cropped from Figure 1 of Da Silva et al [13] with the labels removed from the cropped area, and is shared under Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0/. In Figure 6, we show (a) the spinodally decomposed morphology along the dislocation line from our simulations; in (b) and (c), the atom probe results of localised spinodal flcutuations in the Fe-Mn system in which the overall alloy composition (9 at.% Mn) was outside the spinodal limits (15.8–25 at.% Mn) at 450 °C [13]. As can be seen, there are composition fluctuations measured along the dislocations in these experiments. The morphology of phase separated regions seen in our simulations is very similar to that observed in these atom probe results. Further, our results clearly show the role of faster diffusion along the dislocation cores in producing such morphologies; as shown in the simulations and explained using the linear stability analysis of Nichols and Mullins [32], if the bulk and dislocation pipe mobilities are assumed to be the same, this phenomenon will not be observed; this, we believe could indeed be the case with some of the previous simulation studies [15]. ### 4.2 Effect of dislocation network on precipitate morphology A precipitate that nucleates homogeneously in an isotropic system will grow with a spherical shape. However, the presence of elastic fields of defects in the system can alter this behaviour and can affect the shape of the precipitate. A recent APT study in maraging steel [33] has shown that precipitates formed in high dislocation density regions have a markedly different morphology as compared to the defect-free region. The Fe-Mo preipitates assume a near spherical shape in defect free regions and deviate from this shape as the precipitation happens in regions with dislocation networks. Figure 7: (a) shows the morphology of the precipitate formed at the intersection of two dislocations in our simulation. (b), (c) and (d) show the section contours of the precipitate along the $xy$, $yz$ and $zx$ planes, respectively. (e) shows the Mo iso-surfaces (11 at. %) depicting a precipitate in a Maraging steel, that nucleates in a region with high dislocation density (see [33]) In Figure 7(a), we show the morphology of the precipitate that nucleates at the dislocation intersection; as can be seen in Figure 7(b)-(d), the cross- sections along different planes are very different and the precipitate is highly non-spherical. In fact, we have verified that depending on the nature of the dislocations that intersect (positive-positive, negative-positive, positive-negative, and negative-negative), the cross-sections differ (see supplementary information). Thus, the protuberances in the precipitate shape are a result of the interaction of solutes with dislocation strain fields. Very similar morphologies are seen by Jacob et al. [33] in their APT studies of Fe-Mo precipitates: see Figure 7(e). While the protuberances in the experimental morphologies are very similar, we believe that the plate-like structure of the precipitate is a result of the intersection of a large number of dislocations. ## 5 Conclusions The following are the salient conclusions from our phase field simulations of segregation assisted and pipe-diffusion driven spinodal decomposition along dislocations. * 1. For a system with alloy composition well outside the spinodal limit, when there is faster mobility at the dislocation core, phase transformation occurs by spinodal decomposition along the dislocation line. The rate of growth of composition fluctuations increases with increasing pipe mobility. There is qualitative agreement between the spinodal morphology along the dislocation line obtained in our simulations with that of APT experiments for Fe-Mn systems [13]. * 2. We have identified the range of parameters, namely, dislocation-solute interaction strength (determined by $B_{\alpha}$), nominal alloy composition and the enhanced pipe mobility, a combination of which causes phase separation by spinodal decomposition. * 3. Concurrent nucleation and spinodal decomposition is possible in the case of systems with dislocation networks, where the intersections of dislocations act as energetically favourable sites for nucleation. The morphology of the precipitate at the dislocation intersection agrees well with the Mo-rich precipitates in maraging steels [33]. ## Acknolwedgements We thank (i) Mr Kevin Jacob, and, Professor Nagamani Jaya Balila for sharing their experimental results (Figure 7(e)) and for useful discussions; (ii) Professor Ferdinand Haider, Professor T A Abinandanan, and Mr. Abhinav Roy for discussions on various aspects of the formulation and numerical implementation; and, (iii) (a) Dendrite and Space-Time, IIT Bombay, (b) Spinode – the DST-FIST HPC facility, Dept. of ME & MS, IIT Bombay, and (c) C-DAC, Pune for high performance computing facilities. This project is funded by Science and Engineering Research Board, Dept. of Science and Technology, Govt. of India though the research grant CRG/2019/005060. ## References * [1] A. H. Cottrell, B. A. Bilby, Dislocation theory of yielding and strain ageing of Iron, Proceedings of the Physical Society: Section A 62 (1) (1949) 49–62. * [2] A. H. Cottrell, M. Jaswon, Distribution of solute atoms round a slow dislocation, Proceedings of the Royal Society of London A: Mathematical and Physical Sciences 199 (1056) (1949) 104–114. * [3] B. A. Bilby, On the interactions of dislocations and solute atoms, Proceedings of the Physical Society. Section A 63 (3) (1950) 191–200. * [4] W. G. Wolfer, M. Ashkin, Diffusion of vacancies and interstitials to edge dislocations, Journal of Applied Physics 47 (3) (1976) 791–800. * [5] P. Beaven, E. Butler, Precipitate nucleation on dislocations in Fe–N, Acta Metallurgica 28 (10) (1980) 1349–1359. * [6] A. W. Cochardt, G. Schoek, H. Wiedersich, Interaction between dislocations and interstitial atoms in body–centered cubic metals, Acta Metallurgica 3 (6) (1955) 533–537. * [7] P. M. Anderson, J. P. Hirth, J. Lothe, Theory of dislocations, Cambridge University Press, 2017. * [8] J. W. Cahn, Nucleation on dislocations, Acta Metallurgica 5 (3) (1957) 169–172. * [9] F. S. Ham, Stress-assisted precipitation on dislocations, Journal of Applied Physics 30 (6) (1959) 915–926. * [10] R. Gomez-Ramirez, G. Pound, Nucleation of a second solid phase along dislocations, Metallurgical Transactions 4 (6) (1973) 1563–1570. * [11] W. C. Dash, Copper precipitation on dislocations in Silicon, Journal of Applied Physics 27 (10) (1956) 1193–1195. * [12] Z. Feng, Y. Yang, B. Huang, M. Han, X. Luo, J. Ru, Precipitation process along dislocations in Al–Cu–Mg alloy during artificial aging, Materials Science and Engineering: A 528 (2) (2010) 706–714. * [13] A. K. Da Silva, D. Ponge, Z. Peng, G. Inden, Y. Lu, A. Breen, B. Gault, D. Raabe, Phase nucleation through confined spinodal fluctuations at crystal defects evidenced in Fe-Mn alloys, Nature Communications 9 (1) (2018) 1–11. * [14] R. D. Kamachali, A. K. da Silva, E. McEniry, D. Ponge, B. Gault, J. Neugebauer, D. Raabe, Segregation-assisted spinodal and transient spinodal phase separation at grain boundaries, npj Computational Materials 6 (1) (2020) 1–13. * [15] J. R. Mianroodi, P. Shanthraj, B. Svendsen, D. Raabe, Phase-field modeling of chemoelastic binodal/spinodal relations and solute segregation to defects in binary alloys, Materials 14 (7) (2021) 1787. * [16] F. Léonard, R. C. Desai, Spinodal decomposition and dislocation lines in thin films and bulk materials, Physical Review B 58 (13) (1998) 8277–8288. * [17] S. Y. Hu, L.-Q. Chen, Solute segregation and coherent nucleation and growth near a dislocation—a phase-field model integrating defect and phase microstructures, Acta Materialia 49 (3) (2001) 463–472. * [18] M. Haataja, F. Léonard, Influence of mobile dislocations on phase separation in binary alloys, Physical Review B 69 (8) (2004) 081201–(1–4). * [19] M. Haataja, J. Mahon, N. Provatas, F. Léonard, Scaling of domain size during spinodal decomposition: dislocation discreteness and mobility effects, Applied Physics Letters 87 (25) (2005) 251901–(1–3). * [20] N. Ma, C. Shen, S. Dregia, Y. Wang, Segregation and wetting transition at dislocations, Metallurgical and Materials Transactions A 37 (6) (2006) 1773–1783. * [21] Y.-S. Li, S.-X. Li, T.-Y. Zhang, Effect of dislocations on spinodal decomposition in Fe–Cr alloys, Journal of Nuclear Materials 395 (1-3) (2009) 120–130. * [22] M. Legros, G. Dehm, E. Arzt, T. J. Balk, Observation of giant diffusivity along dislocation cores, Science 319 (5870) (2008) 1646–1649. * [23] Y. U. Wang, Y. Jin, A. Cuitino, A. Khachaturyan, Nanoscale phase field microelasticity theory of dislocations: model and 3D simulations, Acta Materialia 49 (10) (2001) 1847–1857. * [24] D. Rodney, Y. Le Bouar, A. Finel, Phase field methods and dislocations, Acta Materialia 51 (1) (2003) 17–30. * [25] M. Koslowski, A. M. Cuitino, M. Ortiz, A phase-field theory of dislocation dynamics, strain hardening and hysteresis in ductile single crystals, Journal of the Mechanics and Physics of Solids 50 (12) (2002) 2597–2635. * [26] C. Shen, Y. Wang, Incorporation of $\gamma$-surface to phase field model of dislocations: simulating dislocation dissociation in FCC crystals, Acta Materialia 52 (3) (2004) 683–691. * [27] L. Lei, M. Koslowski, Mesoscale modeling of dislocations in molecular crystals, Philosophical Magazine 91 (6) (2011) 865–878. * [28] A. Hunter, I. J. Beyerlein, T. C. Germann, M. Koslowski, Influence of the stacking fault energy surface on partial dislocations in FCC metals with a three-dimensional phase field dislocations dynamics model, Physical Review B 84 (14) (2011) 144108. * [29] J. Zhu, L.-Q. Chen, J. Shen, V. Tikare, Coarsening kinetics from a variable–mobility Cahn-Hilliard equation: Application of a semi-implicit Fourier spectral method, Physical Review E 60 (4) (1999) 3564–3572. * [30] T. Mura, Micromechanics of defects in solids, Kluwer, 1987. * [31] J. W. Cahn, On spinodal decomposition in cubic crystals, Acta Metallurgica 10 (3) (1962) 179–183. * [32] F. A. Nichols, W. W. Mullins, Surface-(interface-) and volume-diffusion contributions to morphological changes driven by capillarity, Transactions of the Metallurgical Society of AIME 233 (10) (1965) 1840–1848. * [33] K. Jacob, A. Roy, M. P. Gururajan, B. Nagamani, Effect of dislocation networks on precipitate morphology in maraging steels, Available at SSRN 3799669. ## Supplementary information Figure 8: The morphology of the precipitate formed at the intersection of dislocations for (i) positive-positive (a-d), (ii) negative-negative (e-h) and (iii) positive-negative (i-l) dislocation combinations. The figures (b), (f) and (j) show the $xy$ section; (c), (g) and (k) show the $yz$ section; and (d), (h) and (l) show the $yz$ section of the precipitate.
arxiv-papers
2021-07-27T10:01:30
2024-09-04T03:07:21.142817
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Arjun Varma R and Prita Pant and M P Gururajan", "submitter": "Mogadalai P Gururajan", "url": "https://arxiv.org/abs/2107.12703" }
2107.12706
# Improving ClusterGAN Using Self-Augmented Information Maximization of Disentangling Latent Spaces Tanmoy Dam ${}^{\href https://orcid.org/0000-0003-3022-0971}$, Sreenatha G. Anavatti ${}^{\href https://orcid.org/; 0000-0002-4754-8191}$, Hussein A. Abbass, ${}^{\href https://orcid.org/0000-0002-8837-0748}$ School of Engineering and Information Technology, University of New South Wales Canberra, Australia. ###### Abstract Since their introduction in the last few years, conditional generative models have seen remarkable achievements. However, they often need the use of large amounts of labelled information. By using unsupervised conditional generation in conjunction with a clustering inference network, ClusterGAN has recently been able to achieve impressive clustering results. Since the real conditional distribution of data is ignored, the clustering inference network can only achieve inferior clustering performance by considering only uniform prior based generative samples. However, the true distribution is not necessarily balanced. Consequently, ClusterGAN fails to produce all modes, which results in sub-optimal clustering inference network performance. So, it is important to learn the prior, which tries to match the real distribution in an unsupervised way. In this paper, we propose self-augmentation information maximization improved ClusterGAN (SIMI-ClusterGAN) to learn the distinctive priors from the data directly. The proposed SIMI-ClusterGAN consists of four deep neural networks: self-augmentation prior network, generator, discriminator and clustering inference network. The proposed method has been validated using seven benchmark data sets and has shown improved performance over state-of-the art methods. To demonstrate the superiority of SIMI- ClusterGAN performance on imbalanced dataset, we have discussed two imbalanced conditions on MNIST datasets with one-class imbalance and three classes imbalanced cases. The results highlight the advantages of SIMI-ClusterGAN. ###### Index Terms: Clustering, ClusterGAN, Generative Adversarial Networks, Information Maximisation, Imbalanced Data. ## I introduction Clustering is a popular unsupervised representation learning method, which has been widely studied in computer vision and machine learning communities such as image segmentation [1], visual features representation learning [2], and 3D object recognition [3]. The lower dimensional representation of high dimensional semantics data has been described by many latent-space based clustering methods, such as DCN [4], DEC [5], Dual-AE [6], and ClusterGAN [7]. Latent space clustering methods have been developed based upon the clustering- assignment objective in the latent-space. Therefore, the objective still lies in the discriminative learning representation blending with data reconstruction loss. This discriminative lower dimensional representation can capture all discrete factors in the lower dimensional latent space such as data variations within the same group, which are the key factors for clustering objective. However, it fails to reconstruct the real data due to the clustering assignment objective. Hence, similarities based clustering methods (such as K-means) have been incorporated with latent space to determine the clustering assignments [4]. Further improvement using latent- space clustering objectives and pretrained reconstruction are employed to determine the optimal lower cluster assignment representation [8]. However, this is a very laborious task to obtain both optimal lower representation and a reconstruction of the real data at the same time. To obtain this representation, the high-dimensional data is first represented in lower dimensional latent space and then different distance-metric clustering objectives are applied on latent space to determine clustering assignments [5] [9]. Generative adversarial networks (GAN) are one of the most effective tools to learn an implicit function [10, 11, 12, 13] from complex real data distribution [14, 3, 15, 16, 17, 18, 7, 19]. The learning process is formulated as an adversarial game using the min-max principle. The generator network takes the sample from the noisy latent distribution to estimate the real distribution, while the discriminator network is trained to discriminate the real from fake samples, respectively. For learning complicated data distributions, generative models have been extensively studied in most circumstances. When it comes to downstream tasks like clustering, the estimation of the posterior distribution of latent inference from the data is an intractable problem in GAN models. Therefore, the researchers developed a mode-matching network for estimating downstream tasks [7, 20]. In a mode matching network, a clustering inference network estimates the multi-modal latent prior through bounding loss. Thus, an inference network works as a regularisation of the GAN objective where each mode is defined for each class of real data distribution. However, it is well-defined that mode matching network can’t be fully enforced the clustering objective on the generative samples when dealing with high-dimensional data [21, 22, 23] . Therefore, for high-dimensional data like CIFAR-10, STL-10, the mode matching network [7, 20] is dependent on the semantics of the data, which may not be directly related to the labels(class) information. In addition, in real-life scenarios, the classes of real distribution are not uniformly distributed. For example, the MNIST dataset contains ten distinctive classes, where mode matching methods try to estimate ten distinctive modes through ten uniform priors [7, 20]. Although the latent priors originate from ten different distributions, the uniform prior-based generative model can only create major classes. Thus, the inverting inference network fails to provide appropriate clustering performance. As a solution, we need to include regularisation that compel inference networks to accurately estimate downstream tasks and create all unique modes in imbalanced situations. To tackle both the issues, we propose a self augmented information maximization improved ClusterGAN (SIMI-ClusterGAN) in this paper. SIMI-ClusterGAN has four deep neural networks: self- augmentation prior network, generator, discriminator and clustering inference encoder. Prior network is used to learn the discrete representation of data in discrete space by self-augmentation maximization principle. This learned prior blends with continuous variable to form a discrete noise latent space. Then, generative network takes continuous-discrete Gaussian noise latent space prior to map in real data domain. Clustering inference encoder predicts the lower- level representation of the generated as well as real data through clustering assignment indices. To enforce the disentanglement clustering representation of real data, the weight sharing generator-encoder networks pair have been utilised. We propose three additional loss functions to modify the ClusterGAN objectives. These three losses are used to create distinctive latent-space to help maintaining diversity in generative samples in addition to improving the clustering performance. In summary, the main contributions of this work are as follows: * • We propose self-augmented mutual information maximization based disentangle categorical priors (one-hot encode)learning from the data. * • The learned discrete categorical priors with continuous Gaussian noise are utilised to form smooth disentangle noise latent spaces. This learned mixture of continuous-discrete disentangle latent spaces is used to generate the real class distribution of the data. * • Three additional loss functions are introduced to modify ClusterGAN objectives for improved performance. Theses loss functions account for reconstruction, prior bounding and cross modality. * • A comparison of the the proposed SIMI-ClusterGAN and other GAN clustering methods is presented to validate the superiority of the proposed method in clustering tasks. We have used seven datasets including CIFAR-10 and STL-10 to accommodate complex high-dimensional data. We further demonstrate the superiority of our proposed method for imbalanced dataset by comparing the performance with ClusterGAN under two different imbalanced conditions. ## II Related Work ### II-A Disentangle latent space clustering Most of the latent-space based approaches in practice have the encoder-decoder (Enc-Dec) structure where lower dimensional encoding latent code is used for clustering tasks [24, 25, 26, 5]. In deep embedding clustering (DEC) [5], an Enc-Dec structure with reconstruction loss has been considered to train the model parameters. Once pre-training has been done, then a clustering network is added over the Enc network for further training with clustering similarities loss. In improved DEC [26], to maintain the local structure in the latent space, reconstruction loss is also considered in the final stage. The whole learning process is jointly trained as in DEC [5]. The Deep clustering network(DCN) is developed based on the Enc-Dec and K-means clustering objective [25]. In order to maintain the local semantics in latent space, the reconstruction loss is adopted along with the K-means objective. However, the performance of the DCN method is still not seen to be adequate. The variation of disentangle factor in autoencoder based generative models can give explainable semantic latent code from the data. Most of the disentangle representations are associated with defining the separate latent spaces using variational factors [27, 28, 29, 30] in which a single-stage or two-stage learning procedure can be found. Single stage disentanglement mostly deals with variations of two factors [27, 31, 32, 33] or three factors [28, 29]. In all single-stage methods, the disentanglement has improved due to the partial knowledge of label information through cross-entropy loss. Meanwhile, two- stage disentanglement methods, such as $\beta$-TCVAE [34], $\beta$-VAE [35], factor-VAE [36], and joint continuous-discrete factors VAE [37] methods create separate latent spaces without knowledge of class-label information. These methods mostly deal with autoencoder structures with a Gaussian prior distribution in the encoded space. The disentanglement is accounted through reconstruction grade and regularisation of latent code factorization even though the real world data require more disentanglement’s factors (eg. labels), which can’t be obtained directly with continuous latent spaces. Consequently, joint VAE [37] came up with continuous-discrete factors of variations into the latent space. ### II-B Generative prior-based inverse latent space clustering The multi-modal prior based latent space clustering can be segregated into two ways, 1) by applying a mixture of continuous distributions, such as the GMM [38], and 2) by applying a combination of discrete and continuous distributions, such as the InfoGAN [20] and ClusterGAN[7]. The latter is the more popular of the two and is often accomplished by the concatenation of discrete and continuous random variables. In InfoGAN, the disentanglement of latent factor is maximised between the latent code and the generated data. The modification of infoGAN, known as ClusterGAN [7], works on the same principle except for the bounded non-smooth latent space. The non-smooth discrete disentangle latent space is based on mixture of continuous-discrete (one-hot code) latent variables. The one-hot code discrete variable is used to measure the clustering performance by the encoder inference network. However, the continuous-discrete latent space variables are unable to complete disentanglement (e.g. categories) in ClusterGAN. It is reasonable to assume that the cluster characteristics of real data will not be replicated in the generated data, resulting in incorrect coverage of clusters in the generated data, as described in [20]. To tackle such an issue, more disentanglement in latent space is observed in [23]. However, the proposed NEMGAN [23], that has the same ClusterGAN structure except a mode engineering network is used to learn the discrete prior from the data. The Mode network is updated by minimizing the KL divergence loss between mutual information data and mode network output. Thus, mode network output depends on mutual information of the data which is more relevant than the uniform discrete distribution of ClusterGAN. While updating the mode network, NEMGAN accounts for partial true label information. However, the performance is not significantly improved without partial information of true labels compared to the ClusterGAN. Therefore, NEMGAN is not a completely unsupervised method; instead, we would say it is a semi-supervised method. In SIMI-ClusterGAN, we have proposed a two-stage approach to improve ClusterGAN performance. For learning the discrete prior assignments from the data, the self-augmented information maximization principle is employed. Once the learned prior from the data is obtained, it is used to form continuous- discrete mixtures to improve our SIMI-ClusterGAN performance. Unlike NEMGAN, the clustering inference network is used to separate the continuous-discrete variable without any supervision. ## III Proposed approach This section begins with a brief introduction to the ClusterGAN algorithm. The discrete prior is then discovered by applying the SIM principle directly to the data. We created our novel SIMI-ClusterGAN approach by combining this learnt discrete prior with three additional losses. The architecture of the proposed method is depicted in Figure 1. Figure 1: The SIMI-ClusterGAN Architecture. $E_{\omega}$ and $G_{\theta}$ are sharing networks. ### III-A ClusterGAN Let, the given $i$-th sample of real data $\\{x_{i}^{r}\\}_{i=1}^{N}\in X\in p_{r}$, represent the $M$-discrete representable form by the function $Y=s(X)$, where $Y\in\\{y_{1},y_{2},...,y_{M}\\}\subseteq\textbf{c}$. Where, $\textbf{c}\in\\{c_{1},c_{2},...,c_{M}\\}$ is the ground truth classes. The ClusterGAN objective is estimate the $s(.)$ through adversarial GAN game principle. Generative adversarial networks (GAN) [10] are defined by two neural network(NN) components, the generative component(G) and the discriminator component(D), which are parameterised by $\theta$ and $\eta$, respectively. The generator $(G_{\theta})$ takes noise distribution to map real distribution, $G_{\theta}:Z\mapsto X$ whereas the discriminator $(D_{\eta})$ is assigned a probabilistic value for the data sample of being real vs fake data, $D_{\eta}:X\mapsto R$. The GAN game is working on a two players min-max game principle defined as follows, $\mathop{\min}\limits_{\theta}\mathop{\max}\limits_{\eta}\mathbb{E}_{x^{r}\sim p_{r}}[f(D_{\eta}(x^{r}))]+\mathbb{E}_{z\sim p_{z}}[f(1-D_{\eta}(G_{\theta}(z)))]$ (1) where, the real sample $(x^{r}\in X)$ belongs to real probabilities distribution $x^{r}\in p_{r}$. $z\in p_{z}$ is the latent space samples, which are drawn from a known prior distribution ($p_{z}$)(e.g. multivariate Gaussian distribution). $p_{g}$ is the generated sample distribution which defines $x^{g}=G_{\theta}(z)$ and $f$ is the standard GAN type selection function. For vanilla GAN, $f(x^{r})=logx^{r}$ and for Wasserstein GAN, $f(x^{r})=x^{r}$ [39]. The adversarial GAN objective is to learn the function $f(.)$ $(p_{r}=f(p_{z}))$ through density estimation [40]. #### III-A1 Continuous-discrete prior based disentanglement in ClusterGAN In ClusterGAN, the multi-modal latent space($z\in Z$) is defined by a mixture of continuous and discrete prior distribution to form a discrete smooth manifold. Generally, a discrete smooth manifold mixture is obtained by cascading the normal distribution with uniform categorical distribution, and its disentanglement in latent space is controlled through categorical distributions. To be more specific, the latent space prior represents $z=(z_{n},z_{M})$ where $z_{n}=\mathcal{N}({\mu=0,\sigma^{2}*I_{d_{n}}})$ and $z_{M}\sim\mathcal{U}\\{1,2,...,M\\}$, $\mathcal{U}\in R^{M}$ is the discrete uniform prior, which represents the number of $M$ classes present in the dataset. However, the variance$(\sigma)$ of the normal distribution ($\mathcal{N}$) is kept to a low value for the $G_{\theta}$ network so that all the discrete modes $(labels)$ can be generated with high purity. Hence, the sigma value [7] has been chosen to ($\sigma=0.10$) for all experiments in this paper. Thus, the continuous-discrete latent space ($z_{n}$) is bounded within $z\in(-0.6,0.6)<1$. This uniform discrete latent priors allow us to design an algorithm capable of detecting a number of clusters in the inverse generated space. #### III-A2 Inference Clustering Network in ClusterGAN Many previous methods [41, 42] are mainly focused on the inverse latent space to reconstruct $(z^{*})$ through an encoder inference $(E_{\omega})$ network. However, this bidirectional mapping can’t guarantee the reconstruction of the latent space due to a lack of consistency between the samples and the latent space. Due to the non-convex optimization nature of the problem, the reconstruction always suffers from different latent space embedding $z$. DeliGAN [38] has used different initialization to reconstruct the discrete latent space. Stochastic clipping of $z$ at each step is also found in [42]. However, none of the methods are related to the latent space based clustering. In ClusterGAN [7], the bounded discrete latent space is computed by inference autoencoder network $(E_{\omega})$. The generator takes the mixture of continuous-discrete latent space $(z=z_{n},z_{M})$ to generate $x^{g}$ and the encoder estimates back to the latent space $(\hat{z}^{g}_{n},\hat{z}^{g}_{M})=E_{\omega}(x^{g})$. The encoding cyclic loss for generated samples is computed by cross-entropy loss and reconstruction losses between $(z_{n},z_{M})$ and $(\hat{z}^{g}_{n},\hat{z}^{g}_{M})$. The generated samples cross entropy loss $(J_{ce})$ between $z_{M}$ and $\hat{z}^{g}_{M}$ is defined as follows, $J_{ce}=\operatorname{\mathbb{E}}_{z\sim p_{z}}[l(z_{M},E_{\omega}(G_{\theta}(z_{n},z_{M})))]$ (2) where, $l$ is associated with the cross-entropy loss. The reconstruction loss $(J_{mse})$ between $z_{n}$ and $\hat{z}^{g}_{n}$ is defined by the mean square error (MSE) as follows, $J_{mse}=\operatorname{\mathbb{E}}_{z\sim p_{z}}\parallel z_{n}-E_{\omega}(G_{\theta}(z_{n},z_{M}))\parallel_{2}$ (3) Finally, the three-player ClusGAN game directs attention to the following optimisation problem: $\begin{split}\mathop{\min}\limits_{\theta,\omega}\mathop{\max}\limits_{\eta}\operatorname{\mathbb{E}}_{x\sim p_{r}}[f(D(x^{r}))]+\operatorname{\mathbb{E}}_{z\sim p_{z}}[f(1-D(G(z)))]\\\ +\alpha_{cl}J_{ce}+\alpha_{mse}J_{mse}\end{split}$ (4) The regularisation coefficients ($\alpha_{cl},\alpha_{mse}$) control the disentanglement factors in the encoded latent space. To determine the clustering accuracy, the real data distribution samples pass through the $E_{\omega}$ network to predict continuous and discrete variables. Afterwards, the $K$-means [9] clustering algorithm is applied to concatenated continuous and discrete vectors to obtain clustering performance. For downstream tasks like clustering, the cluster characteristics of real data can’t be completely replicated through generated samples. This results in the disentanglement of encoded latent space, which may not be enough because the $E_{\omega}$ network has never been exposed to real distribution. As a result, adequate performance can’t be obtained with this learning strategy. To tackle this issue, we first learn the lower level representation by using the SIM principle. Afterwards, the learned prior is used to guide more disentanglement in encoded latent space by using three additional losses. Unlike NEMGAN [23], both the learning stages don’t consider any true level of information. ### III-B Self-augmented information maximization(SIM) for discrete prior learning: We use SIM principle to learn the discrete prior(${y_{1},y_{2},...,y_{M}}$) from the data directly. Our objective is estimate the $s(.)$ by maximised mutual information between $X\&Y$. According to Gomes et. al. [43], regularised information maximisation (RIM) maximizes the mutual information between the data and its discrete representation ($m=1,2,...,M$) by learning the prior network ($P_{\phi}(Y|X)$). Therefore, the regulariser based RIM objective function is defined as follows, $R_{\phi}-\beta_{p}I(X:Y)$ (5) where, $I(.)$ measures the mutual information between the data and the discrete representation. The reguliser constraint, $R_{\phi}$, updates the prior network parameters $\phi$. $\beta_{p}$ controls the reguliser and mutual information. The prior network objective is to maximise the conditional probabilities based on the similar representation of the data [43]. The independent conditional probabilities of given model, $P_{\phi}(y_{1},y_{2}...,y_{M}|X)$, are represented in the following form, ${P_{\phi}(y_{1},y_{2},...,y_{M}|X)=\prod_{m=1}^{M}P_{\phi}(y_{m}|X)}$ (6) Maximising Eq. 6 is to represent the $M$ discrete classes based on the mutual information between data. Hu. et. al. [44] suggested the regularisation $(R_{\phi})$ can be represented in a flexible formation, which is defined as a self-augmented training (SAT). The self-augmentation regularisation between data $x^{r}$ and its augmented variations $T(x^{r})$ is represented as follows, ${R_{SAT}({\phi;x^{r},T(x^{r}))}=-\sum_{m=1}^{M}\sum_{y_{m}=0}^{M-1}P_{\hat{\phi}}(y_{m}|x^{r})logP_{\phi}(y_{m}|T(x^{r}))}$ (7) where, $T(.)$ is a self augmentation function. $P_{\hat{\phi}}(y_{m}|x^{r})$ is the current prediction of data $x^{r}$ and $\hat{\phi}$ is the current update of $P$ network parameters. Equation 7 represents the ability of the augmented data $(T(x^{r}))$ to push closer to the conditional probabilities $P_{\phi}(y_{M}|x^{r})$. Generally, for image data, the augmentation is mostly dealt with an affine transformation such as random rotation, scaling and shearing [44]. The local perturbation of data can’t alter the invariant nature and the local perturbation based self-augmentation can be defined as follows, $T(x^{r})=x^{r}+l_{p}$ (8) where $l_{p}$ is the local perturbation which does not change the data representation in low dimensional regions/manifold [45]. The local perturbation regularisation method is based on the virtual adversarial training method [46] in which the local perturbation is defined as follows, $l_{p}=\operatorname*{arg\,max}_{\hat{l}_{p}}[R_{SAT}({\hat{\phi}};x^{r},x^{r}+l_{p}),\,\,\,\parallel{l_{p}}\parallel_{2}\leq\beta_{t}]$ (9) The local perturbation solution of Eq. 9 can be easily obtained from [46]. The discrete cluster representation of Eq. 5 can be reviewed in-terms of the difference in the mutual information between the entropy and the marginal conditional entropy [43] as follows, $R_{SAT}-\beta_{p}[H(Y)-\beta_{mu}H(Y|X)]$ (10) where, $H(Y)$ and $H(Y|X)$ represent the marginal entropy and conditionals entropy, respectively, which are calculated as follows, $\begin{split}H(Y)=h(P_{\phi}(y_{M}))=h(\frac{1}{N}\sum_{n=1}^{N}P_{\phi}(y_{M}|x^{r}_{n}))\\\ H(Y|X)=\frac{1}{N}\sum_{n=1}^{N}h(P_{\phi}(y_{M}|x^{r}_{n}))\end{split}$ (11) where, $h(.)$ is an entropy function. The marginal entropy and conditionals entropy are working together to represent the discrete representation ($y_{M}$) of the data. Hence, Eq. 10 is the final optimization problem that can give us discrete prior index ($y_{M}$) from the data. After obtaining the learned prior, it has to be represented in one-hot-code categorical priors($z_{M}$) in the proposed SIMI-ClusterGAN. The one-hot code (OHC) representation of $y_{M}$ is defined by the following form, $z_{M}=1_{M}(y_{M})=\begin{cases}$1$&\text{when , $y_{M}\in M$ }\\\ $0$&\text{when, $y_{M}\not\in M$}\end{cases}$ (12) ### III-C Inference network disentanglement representation in SIMI-ClusterGAN The generated samples ($x^{g}$) are only considered in the $(E_{\omega})$, to obtain cluster representations of the data in ClusterGAN. However, this can’t guarantee that representation of data always lies in the categories of the labels [7]. Hence, a suitable disentanglement is required to enforce the representation to remain at categories labels. At the same time, it also handles the mode diversity issue. The $G_{\theta}$ takes the continuous $(z_{n})$-discrete$(z_{M})$ mixtures prior noise to generate samples $x^{g}$ and then, the generated samples passing through the $E_{\omega}$ to estimate the $\hat{z}^{g}_{n}$ and $\hat{z}^{g}_{M}$ by the two equations 3 and 2, respectively. These two equations are known as cyclic loss in ClusterGAN objective Eq. 4. To estimate the posterior distribution from the real data $(x^{r})$, the $E_{\omega}$ encodes as ($\hat{z}^{r}_{n}$, $\hat{z}^{r}_{M}$). The $G_{\theta}$ takes the estimated categorical posterior $(\hat{z}^{r}_{M})$ with varying continuous distribution, $(z_{n})$, to generate realistic samples, $(\hat{x}^{r})$. The encoding and decoding distributions match can be achieved by two networks $E_{\omega}$ and $G_{\theta}$, respectively [47]. This $E_{\omega}-G_{\theta}$ reconstruction loss is defined as follows, $J_{rec}=\mathbb{E}_{x^{r}\sim p_{r}}\parallel x^{r}-(G_{\theta}(E_{\omega}(x^{r})))\parallel_{2}$ (13) This loss can be looked upon as the real-reconstructing loss between $E_{\omega}$ and $G_{\theta}$ pairs to force reconstruction levels disentanglement. The above cyclic losses and reconstruction losses are used to maintain the local level disentanglement between the real space, $(x^{r})$, and the generated space, $(x^{g})$. To enforce more disentanglement on the $E_{\omega}$, we have added one regularisation penalty on the bounded real discrete prior loss. We have used the same $E_{\omega}$ networks with sharing weights that will help to update the parameters on different constraints. To determine prior bounding loss, we draw samples from the real distribution, $x^{r}\in p_{r}$ and $E_{\omega}$ maps real samples into real disentangle representation variables, $\hat{z}^{r}_{n}$ and $\hat{z}^{r}_{M}$. The cross- entropy prior bounded loss is defined as follows, $J_{pce}=\mathbb{E}_{x^{r}\sim p_{r}}[l(z_{M},E_{\omega}(x^{r})]$ (14) Moreover, to generate diverse samples within the same prior discrete representation ($z_{M}$) [48], we have also introduced cross-modality loss by considering two generated samples from the $G_{\theta}$ network. To generate two samples $(x^{g},\hat{x}^{g})$ from $G_{\theta}$, two different variants latent codes have been used with the same prior ($z_{M}$). They are obtained by varying the continuous variable ($z_{n}$) only while maintaining $z_{M}$ fixed. The latent variables for cross-modality is represented as $(z_{1},z_{2})$, where $z_{1}=(z_{n},z_{M})$ and $z_{2}=(z^{\prime}_{n},\hat{z}^{r}_{M}=E_{\omega}(x^{r}))$. Cross-modality loss continues to generate diverse images and penalises the generator. Cross- modality is defined as follows, $J_{cm}=\mathbb{E}_{x^{r}\sim p_{r}}\mathbb{E}_{z\sim p_{z}}\parallel x_{g}-(G_{\theta}(z^{\prime}_{n},E_{\omega}(x^{r})))\parallel_{2}$ (15) ### III-D Final objective function of SIMI-ClusterGAN The proposed SIMI-ClusterGAN objective function incorporates all of the above defined losses along with ClusterGAN cyclic losses. Thus, the SIMI-ClusterGAN objective function is defined as follows, $\begin{split}\mathop{\min}\limits_{\theta,\omega}\mathop{\max}\limits_{\eta}\operatorname{\mathbb{E}}_{x^{r}\sim p_{r}}[f(D_{\eta}(x))]+\operatorname{\mathbb{E}}_{z\sim p_{z}}[f(1-D_{\eta}(G_{\theta}(z)))]\\\ +\alpha_{cl}J_{ce}+\alpha_{mse}J_{mse}+\alpha_{re}J_{rec}+\alpha_{pcl}J_{pce}+\alpha_{cm}J_{cm}\end{split}$ (16) where, the regularisation coefficients($\alpha_{re},\alpha_{pcl},\alpha_{cm}$) are used to maintain disentanglement of encoded latent space and diversify the generated samples. Algorithm 1 SIMI-ClusterGAN algorithm 0: training data($D^{tra}$)= ${\left\\{{{{x^{r}}\in R^{d}},{y\in R^{M}}}\right\\}^{S}}$, testing data($D^{tst}$)=${\left\\{{{{x^{r}}\in R^{d}},{y\in R^{M}}}\right\\}^{T}}$, $epoch_{1}$=$60$, $epoch_{2}$=$200$, $B_{p}$=$256$, $B_{m}$=$30$, $\beta_{p}=0.1$, $\beta_{t}=0.25$, $\beta_{mu}=4$, ADAM optimizer($\beta_{1}=0.5$ & $\beta_{2}=0.999$), $l_{r1}$= $0.002$ for $P_{\phi}$, $l_{r2}$= $0.0001$ for $D_{\eta}$, $G_{\theta}$, $E_{\omega}$, Critic iter($C_{iter}$)=1, $\lambda$ =10, regularisation factors $\alpha_{cl}=10,\alpha_{mse}=10,\alpha_{re}=1,\alpha_{pcl}=10$ and $\alpha_{cm}=1$ 0: $P_{\phi}$, $G_{\theta}$, $D_{\eta}$, $E_{\omega}$ 1: Phase 1: The Prior Learning Algorithm ($P_{\phi}$) 2: for $epoch\,\,\,\,in\,\,\,\,epoch_{1}$ do 3: Samples $x^{r}\in p_{r}$ drawn in a mini-batch $B_{p}$. 4: Calculate the self-augmentation distance by using equ.(9) 5: Maximize the discrete representation($y_{M}$) by optimizing the equ.(10) 6: end for 1: Phase 2: SIMI-ClusterGAN using the learned prior($P_{\phi}$) 2: for $epoch\,\,\,in\,\,\,epoch_{2}$ do 3: for iter in $C_{iter}$ do 4: Samples $x^{r}\in p_{r}$ drawn in a mini-batch $B_{m}$. 5: Calculate discrete prior assignment $y_{M}$ = $P_{\phi}(x^{r})$. 6: One hot code representation of learned prior, $z_{M}$ by using equation (12). 7: Samples $z_{n}\in p_{z}$ drawn in a mini-batch $B_{m}$. 8: the continuous-discrete mixture of latent space variable $z=(z_{n},z_{M})$. 9: $G_{\theta}(z)\rightarrow x^{g}$ 10: WGAN 1-GP stability applied on $D_{\eta}$ parameters. Discriminator parameters ($\eta$) are updated by the following equation, $D_{\eta}\rightarrow D_{\eta}(x^{r})-D_{\eta}(x^{g})+\lambda(||\nabla D_{\eta}(\hat{x}^{r})||-0)^{2}$ where, $\hat{x}^{r}=\alpha x^{r}+(1-\alpha)x^{g}$ 11: end for 12: Encodes the generated samples $E_{\omega}(x^{g})\rightarrow(\hat{z}^{g}_{n},\hat{z}^{g}_{M})$. 13: Calculate the cyclic loss by using equations(3) and (2). 14: The reconstruction loss($J_{rec}$) between $E_{\omega}-G_{\theta}$ networks pair is obtained by equation (13). 15: The prior bounded cross entropy loss ($J_{pce}$) is obtained by equation 14. 16: The cross-modality loss ($J_{cm}$) is obtained by equation 15. 17: The generator($G_{\theta}$) network parameters ($\theta$)are updated by the following form, $G_{\theta}\rightarrow D_{\eta}(x^{g})+\alpha_{cl}J_{cl}+\alpha_{mse}J_{mse}+\alpha_{cm}J_{cm}+\alpha_{re}J_{rec}$ 18: The inference($E_{\omega}$) network parameters ($\omega$) are updated by the following form, $E_{\omega}\rightarrow\alpha_{cl}J_{cl}+\alpha_{mse}J_{mse}+\alpha_{cm}J_{cm}+\alpha_{re}J_{rec}+\alpha_{pcl}J_{pce}$ 19: if $epoch_{2}\mathbin{\%}1==0$ then 20: /* Encode latent spaces for $D^{tst}$ */ 21: $E_{\omega}(x^{r}\in D^{tst})\rightarrow(\hat{z}_{n}^{r},\hat{z}_{M}^{r})$ 22: Apply K-means on $(\hat{z}_{n}^{r},\hat{z}_{M}^{r})$ to calculate ACC and NMI values. 23: end if 24: end for ## IV Results & Experiments We validate the proposed SIMI-ClusterGAN performance on several benchmark datasets. We used an imbalanced dataset under two imbalanced situations to verify the proposed method’s superiority over ClusterGAN. We also examine the extensive ablation studies of each component of the proposed method’s objective function to evaluate the clustering performance. ### IV-A Datasets SIMI-ClusterGAN clustering performance has been evaluated on several benchmark datasets such as MNIST, Fashion-MNIST, USPS, Pendigits, $10\times{{}_{-}}73k$, STL-10 [49] and CIFAR-10 [50] datasets. The information about these datasets and their corresponding latent space dimensions are provided in Table I. The SIMI-ClusterGAN algorithm is provided in Algorithm 1 TABLE I: Data and latent variable Dimensions Datasets | Samples | Labels | Dimensions $\in R^{d}$ | $z_{n}$ | $z_{M}$ ---|---|---|---|---|--- MNIST [51] | 70k | 10 | $1\times 28\times 28$ | 30 | 10 Fashion-MNIST [51] | 70k | 10 | $1\times 28\times 28$ | 30 | 10 USPS [6] | 9,298 | 10 | $1\times 16\times 16$ | 30 | 10 Pendigits [7] | 10992 | 10 | $1\times 16$ | 5 | 10 $10\times{\\_}73k$ [7] | 73233 | 8 | $1\times 720$ | 30 | 8 CIFAR-10 [44] | 60k | 10 | $3\times 32\times 32$ | 50 | 10 STL-10 [44] | 13k | 10 | $3\times 96\times 96$ | 100 | 10 ### IV-B Simulations Implementation Four different neural networks $P_{\phi},G_{\theta},D_{\eta},E_{\omega}$ have been developed for handling the four different tasks; prior assignment learning, generator, discriminator and clustering inference network, respectively. The $P_{\phi}$ is used to learn the prior indices from the data using the self-augmentation maximization principle. This prior assignment is used as the discrete one-hot code variable to train the improved clustering GAN. The data is normalised in the range of $[-1,1]$ for all datasets except STL-10 $[0,1]$. The tangent-hyperbolic and sigmoid activation functions are used in the last layer of the $G_{\theta}$ network. However, for learning the clustering prior from the data, we have used a $P_{\phi}$ network with three MLP hidden layers given by ($d-1200-1200-M$) for the MNIST, Fashion-MNIST, CIFAR-10, STL-10 datasets in which $d$ $\&$ $M$ represent input data dimension and cluster assignments index respectively. For lower dimensional data such as Pendigits, USPS, and $10\times{{}_{-}}73k$ , we have used the $P_{\phi}$ network as $d-256-256-M$. For MNIST and Fashion-MNIST, the conv-trans.conv layer with ReLU and LeakyReLU activation functions have been used in $G_{\theta},D_{\eta}$ and $E_{\omega}$ networks respectively [7]. The clustering network $E_{\omega}$, has the same structure of $D_{\eta}$ to estimate continuous($\hat{z}_{n}$) and discrete ($\hat{z}_{M}$) variables. For Pendigits, $10\times{{}_{-}}73k$ and USPS datasets, we have used the two layers MLP models for $G_{\theta},D_{\eta}$, and $E_{\omega}$. Our proposed SIMI-ClusterGAN method has two learning stages. First, the discrete prior learns $M$ categorical discretization representations from data by using the $P_{\phi}$ network. The learning hyper-parameters are set to be $\beta_{p}=0.1$, mutual information coefficient $\beta_{mu}=4$, perturbation coefficient $\beta_{t}=0.25$ while updating the $P_{\phi}$ network. We have used the ADAM optimizer with learning rate of $0.002$. Once the $M$ categorical representation is obtained then it is formulated into one-hot-code $(z_{M})\in R^{M}$ to create $M$ discrete priors [7]. We have added the Gaussian Normal distribution, $z_{n}=\mathcal{N}({\mu=0,\sigma^{2}*I_{dn}},\sigma=0.1)$, into $z_{M}$ to create the $M$ discrete non-smooth surfaces. The noise samples are drawn from the continuous and discrete mixture variables to generate the realistic samples. Moreover, the learning rate of $G_{\theta},D_{\eta}$, $E_{\omega}$ networks are set to $1e-4$. Similarly for $P_{\phi}$ network, we have adapted the ADAM optimiser with learning hyper-parameters $(\beta_{1}=0.5,\beta_{2}=0.999)$ [7, 40]. To determine the cluster labels from the real datasets, the $K-means$ [9] algorithm is applied to estimate encode latent space from the $E_{\omega}$ network [7]. The variation factors of each loss are controlled by five multiplication factors given by $\alpha_{cl}=10$ [7], $\alpha_{mse}=10$ [7], $\alpha_{re}=1$, $\alpha_{pcl}=10$ and $\alpha_{cm}=1$ . The simulations are implemented on PyTorch environment with NVIDIA GTX GPU. ### IV-C Clustering performance Evaluation TABLE II: Quantitative analysis of the clustering performance Datasets | MNIST | Fashion-MNIST | USPS | Pendigits | $10\times{{}_{-}}73k$ ---|---|---|---|---|--- Performance Index | Performance Index | Performance Index | Performance Index | Performance Index Models | ACC | NMI | ACC | NMI | ACC | NMI | ACC | NMI | ACC | NMI K-means [9] | 0.532 | 0.500 | 0.474 | 0.501 | 0.668 | 0.601 | 0.793 | 0.730 | 0.623 | 0.577 NMF [52] | 0.471 | 0.452 | 0.500 | 0.510 | 0.652 | 0.693 | 0.670 | 0.580 | 0.710 | 0.690 SC [53] | 0.656 | 0.731 | 0.660 | 0.704 | 0.649 | 0.794 | 0.700 | 0.690 | 0.400 | 0.290 AGGLO [54] | 0.640 | 0.650 | 0.550 | 0.570 | - | - | 0.700 | 0.690 | 0.630 | 0.580 DEC [5] | 0.863 | 0.834 | 0.518 | 0.546 | 0.762 | 0.767 | - | - | - | - DCN [4] | 0.802 | 0.786 | 0.563 | 0.608 | - | - | 0.720 | 0.690 | - | - JULE [25] | 0.964 | 0.913 | 0.563 | 0.608 | 0.950 | 0.913 | - | - | - | - DEPICT [55] | 0.965 | 0.917 | 0.392 | 0.392 | 0.899 | 0.906 | - | - | - | - SpectralNet [56] | 0.800 | 0.814 | - | - | - | - | - | - | - | - Dual-AE [6] | 0.978 | 0.941 | 0.662 | 0.645 | 0.869 | 0.857 | - | - | - | - InfoGAN [24] | 0.890 | 0.860 | 0.610 | 0.590 | - | - | 0.720 | 0.730 | 0.620 | 0.580 ClusterGAN [7] | 0.950 | 0.890 | 0.630 | 0.640 | $0.798^{*}$ | $0.703^{*}$ | 0.770 | 0.730 | 0.810 | 0.730 GAN with bp [7] | 0.950 | 0.900 | 0.560 | 0.530 | - | - | 0.760 | 0.710 | 0.650 | 0.59 CaTGAN [57] | 0.890 | 0.900 | 0.550 | 0.600 | - | - | - | - | - | - GANMM [58] | 0.640 | 0.610 | 0.340 | 0.270 | - | - | - | - | - | - NEMGAN_v [23] | 0.960 | 0.910 | 0.650 | 0.610 | - | - | - | - | - | - SIMI-ClusterGAN | 0.986 | 0.958 | 0.745 | 0.705 | 0.951 | 0.894 | 0.857 | 0.825 | 0.917 | 0.878 No available data : $(-)$, simulated :$*$ . We mainly focus on two popular evaluation indices given by accuracy (ACC) [5] and normalised mutual information (NMI) [5] for comparing the clustering performance. The ACC is defined as follows, $ACC=max_{\delta}\frac{\sum_{i=1}^{N}\boldsymbol{1}\left\\{c_{i}=\delta(y^{k}_{i})\right\\}}{N}$ (17) where, $c_{i}\in R^{M}$ is the $i$-th ground truth labels, $y^{k}_{i}$ is $i$-th predicted labels which is obtained by applying $K$-means [9] method on encoded latent-space($E_{\omega}$) [7] . The $\delta$ covers all potential one-to-one mappings between true and predicted labels of data. This measure identifies the best match between an unsupervised algorithm’s cluster prediction and a ground truth assignment. The Hungarian method efficiently computes the optimum mapping [59]. Similarly, NMI is defined as follows, $NMI=\frac{2\times I(Y;\textbf{c})}{H(Y)+H(\textbf{c})}$ (18) where, $I(Y;\textbf{c})$ is defined mutual information between predicted and ground truth labels. NMI determines similarity between the true class and the predicted class labels, which is bounded by $0$ (worst similarity) to $1$ (ultimate similarity). Table II represents the clustering results of SIMI-ClusterGAN and other state- of-the art methods on the five benchmark datasets which are mostly dealt with single channel image datasets and a tabular dataset. The best evolution matrices are highlighted in the table II with 5 runs [7]. It is clearly seen from the Table II that deep neural network based clustering methods attained better performance compared to traditional machine-learning approaches. In comparison, our proposed SIMI-ClusterGAN achieved significant performance improvement for all datasets. For the MNIST dataset, our proposed method obtained better performance than the second best results of Dual-AE (ACC: .978 vs 0.986, NMI: .941 vs .958). While learning discrete prior ($P_{\phi}$) from the Fashion-MNIST dataset, we have used the following affine distortion to maximize the mutual information between categories($Y_{M}$). The following transformations are adopted to learn the $P_{\phi}$ network parameters, * • Uniformly drawn samples along with random rotation by $\chi$ within $[-10^{\circ},10^{\circ}]$ * • Uniformly drawn samples along with $x$ axis and $y$-axis by scaling factor $[.3,1]$ * • Uniformly drawn samples along with $x$ axis and $y$-axis by random shearing $(-0.3,0.3)$ The performance has improved significantly due to random affine transformation on the data since our proposed method is heavily dependent on the learning of the prior. Besides the affine transformations of data, self-augmentation is also applied to learn prior for the proposed SIMI-ClusterGAN method. The $ACC$ and $NMI$ values are $0.721$ and $0.675$, which are much better than the ClusterGAN. Similarly, for $10\times{{}_{-}}73k$ dataset, our proposed method performance is improved significantly compared with ClusterGAN (ACC: 0.810 vs 0.917 , NMI: 0.730 vs 0.878 ). Specifically, for $16$-dimensional pendigits dataset, the K-means method outperformed all the GANs methods. But, our proposed SIMI-ClusterGAN obtained better performance on both evaluation indices (ACC:0.793 vs 0.857, NMI:0.730 vs 0.825). For the USPS dataset, the best NMI is obtained by JULE but our proposed method achieved the best results in ACC. The ClusterGAN method∗111https://github.com/zhampel/clusterGAN obtained ACC and NMI values as 0.798 and 0.703 respectively. (a) (b) Figure 2: Samples generated by SIMI-ClusterGAN for MNIST and Fashion-MNIST datasets. Each row represents each class. The generated classes maintained purity without mixtures of other classes (a) Sandal (b) Sneaker Figure 3: Samples generated by ClusterGAN for Fashion-MNIST dataset All the distinctive classes are fully achieved by SIMI-ClusterGAN method. It is observed from Figure 2 that the SIMI-ClusterGAN is able to generate all the modes without supervision with higher accuracy. For MNIST dataset, all the distinctive classes are represented in each row of Figure 2(a).Similarly, for Fashion-MNIST, our proposed method is able to generate all the classes without supervision as shown in Figure 2(b). For fair comparisons of our proposed method with ClusterGAN, we have plotted two distinctive generated classes(”Sandal” and ”Sneaker”) for better understandings. ClusterGAN is not able to generate two distinctive classes without purity, as can be seen in Figure 3. As shown in Figure 4,however, the proposed SIMI-ClusterGAN is capable of generating two different classes with a high degree of purity. (a) Sandal (b) Sneaker Figure 4: Samples generated by SIMI-ClusterGAN for Fashion-MNIST dataset ### IV-D Complex high-dimensional dataset performance We evaluate the proposed SIMI-ClusterGAN clustering performance on complex coloured image datasets: CIFAR-10 and STL-10. For learning the clustering prior, the colour image can’t be directly used in the $P_{\phi}$ network because associated raw pixels of images are colour dominant [44]. Therefore, for learning the prior clustering assignments, we have used 50-layer pretrained features extractor from raw data [44, 60]. We are not directly using the class information to $P_{\phi}$ network. Instead, the well-separated lower dimensional features are used to get the class assignment prior. For both the cases, the extracted features size is $2048$. Once, the prior assignment network is learned from extracted features data, the learned prior is used to train SIMI-ClusterGAN. The clustering performance of feature space data is listed in the Table III. It is clearly observed from the table III that our proposed method has outperformed other state-of-the-art methods. The uniform prior based ClusterGAN accuracy performance for CIFAR-10 is obtained as $15.9$. This is because the clustering loss in clustering inference network is focused on the generated samples’ semantics instead of categories of data [7]. The ClusterGAN accuracy performance for STL-10 dataset is $12.6$. Similarly for the STL-10 dataset, our proposed method SIMI-ClusterGAN obtained better results. TABLE III: Quantitative clustering performance for High-dimensional datasets | CIFAR-10 | STL-10 ---|---|--- Methods | ACC | NMI | ACC | NMI K-means[44] | 0.344 | - | 0.856 | - DAE+KMeans[44] | 0.442 | - | 0.722 | - DEC[44] | 0.469 | - | 0.781 | - Linear RIM[44] | 0.403 | - | 0.735 | - Deep RIM[44] | 0.403 | - | 0.925 | - Linear IMSAT[44] | 0.407 | - | 0.917 | - IMSAT(RPT)[44] | 0.455 | - | 0.928 | - IMSAT(VAT)[44] | 0.456 | - | 0.941 | - VADE [61] | - | - | 0.844 | - DDG [6] | - | - | 0.905 | - Sarfaraz [62] | - | - | 0.952 | - ClusterGAN | $0.159^{*}$ | $0.025^{*}$ | $0.126^{*}$ | $0.096^{*}$ SIMI-ClusterGAN | 0.512 | 0.412 | 0.954 | 0.861 Embedding feature-space clustering [44], simulated :$*$ . | | | | (a) ClusterGAN (b) SIMI-ClusterGAN Figure 5: Encoding latent space visualisation for CIFAR-10 datset where colors are used to differentiate between distinct types of classes. When dealing with high-dimensional datasets such as CIFAR10 and STL-10, the disentanglement at $E_{\omega}$ is very important in determining the accuracy of clustering. In order to facilitate comprehension, the superiority of the SIMI-ClusterGAN over the ClusterGAN is displayed in Figure 5, which shows estimated encoded latent spaces from both methods in comparison to each other. Due to the joint learning framework of $E_{\omega}-G_{\theta}$ networks in the ClusterGAN method, $E_{\omega}$ is more reliable on generated sample semantics than focusing on downstream tasks like clustering. When we incorporate prior learning with three additional losses, the encoded latent spaces are well separated from ClusterGAN, which will lead to a significant improvement in clustering performance. Similar phenomena are also being observed for the STL-10 dataset. The encoded latent representation for the STL-10 dataset is depicted in Fig 6 where both clustering methods’ results are shown. (a) ClusterGAN (b) SIMI-ClusterGAN Figure 6: Encoding latent space visualisation for STL-10 datset where colors are used to differentiate between distinct types of classes. ### IV-E Latent space interpolation The one-hot code $(z_{M})$ variable of the proposed SIMI-ClusterGAN method represents the cluster information in the data. The continuous variable ($z_{n}$) is controlling the variation of Gaussian representation in the latent space. In addition, we have also used the interpolation between different classes while varying two discrete variables $z_{M}^{1}$, $z_{M}^{2}$. The new continuous-discrete latent space vector is represented by $z=(z_{n},\tau z_{M}^{1}+(1-\tau)z_{M}^{2})$ where $\tau\in[0,1]$, and $z_{n}$ is fixed. The smooth transition between one class to another class is depicted in Figure 7 for the two datasets MNIST and Fashion-MNIST. (a) MNIST (b) Fashion-MNIST Figure 7: Latent space interpolation between classes ### IV-F Ablation studies We have extensively analysed the proposed SIMI-ClusterGAN components in the following subsections. #### IV-F1 different losses in SIMI-ClusterGAN We also evaluate each loss function in the proposed SIMI-ClusterGAN objective function. The performance on Fashion-MNIST data by SIMI-ClusterGAN is reported in Table IV. In Table IV, the first loss is related when only the generated samples are passed to clustering inference network [7]. The uniform distribution based prior learning is not adequate to improve the clustering performance while using only generated samples. The performance is below the ClusterGAN performance. While considering the reconstruction loss into proposed objective function, the performance has improved significantly. All losses have an individual impact on the clustering performance to get accurate categories in fully unsupervised way. Figure 8 depicts the encoding latent space in 2D for Fashion-MNIST dataset. Figure 8(a) depicts the raw-data in 2D encoding latent space. Considering the generated samples to the encoding network, the t-SNE [63] plot of encoded latent space is illustrated in Figure 8(b) which gives better representation than the raw-data. In addition, the encoding space gets better separated while considering the reconstruction loss into the proposed objective function. As illustrated in the Fig 8(d), the SIMI-ClusterGAN gives better discrimination on encoding space while considering all the losses into proposed objective function. (a) Raw-data (b) $J_{ce}+J_{mse}$ (c) $J_{ce}+J_{mse}+J_{rec}$ (d) $J_{ce}+J_{mse}+J_{rec}+J_{cm}+J_{pce}$ Figure 8: Visualisation of individual loss performance through t-SNE [63] TABLE IV: Effects of different losses on clustering performance of Fashion-MNIST dataset Dataset | Fashion-MNIST ---|--- NMI | ACC $J_{ce}$ \+ $J_{mse}$ | 0.5796 | 0.5853 $J_{ce}$ \+ $J_{mse}$ \+ $J_{rec}$ | 0.6580 | 0.6996 $J_{ce}$ \+ $J_{mse}$ \+ $J_{rec}$ +$J_{cm}$ | 0.6620 | 0.7056 all losses | 0.7053 | 0.7459 #### IV-F2 Variations of $\sigma$ in $z_{n}$ A non-smooth latent variable is formed when the continuous variable($z_{n}$) is mixed with the discrete variables($z_{M}$). Because the non-smooth bounded prior has an effect on clustering performance, it is thus necessary to assess the performance of clustering while changing the variance($\sigma$) of the continuous variable($z_{n}$). Therefore, we have illustrated the clustering performance on the Figure 9 when $\sigma$ is varied incrementally by $0.3$. When the variance is at its highest ($\sigma=1.0$), ClusterGAN suffers a significant performance drop. Our suggested SIMI-ClusterGAN, in contrast to ClusterGAN, has no performance issues. Therefore, SIMI-ClusterGAN has a more robust performance than ClusterGAN. (a) ACC (b) NMI Figure 9: Varying $\sigma$ in $z_{n}$ #### IV-F3 Uniform Prior based SIMI-ClusterGAN We also examined the clustering performance of our proposed method with the ClusterGAN when the $P_{\phi}$ network is not involved in the adversarial game. Thus, the SIMI-ClusterGAN prior comes from uniform distribution, as it is like ClusterGAN. Table V depicts the quantitative performance comparison between ClusterGAN and SIMI-ClusterGAN. It is clearly observed from the Table V that SIMI-ClusterGAN produces more disentanglement’s by considering the real data distribution into $E_{\omega}$ network. However, for CIFAR-10 dataset, the adequate performance can’t be obtained by considering uniform prior distribution. When the $E_{\omega}-G_{\theta}$ networks work together to learn, the $E_{\omega}$ focus is on semantics of the data rather than clustering. Therefore, prior learning is required for forcing $E_{\omega}$ network to match the real data distribution. TABLE V: Uniform prior based SIMI-ClusterGAN performance Methods | MNIST | CIFAR10 ---|---|--- | ACC | NMI | ACC | NMI ClusterGAN | 0.950 | 0.890 | 0.159 | 0.025 SIMI-ClusterGAN \$P_{\phi}$ | 0.972 | 0.921 | 0.228 | 0.067 ### IV-G Imbalanced Dataset Performance We have also validated the performance of the proposed method with ClusterGAN under two different imbalanced conditions: single class imbalance and multi- class imbalance. MNIST dataset has been considered in which two class imbalanced settings have been tested. For single class imbalanced settings, $0.1$ fraction of zero samples (‘digit-0’) and remaining all the samples have been taken for training whereas all the test samples($10K$) are used for testing the clustering performance. Similarly for multi-class imbalanced settings, three imbalanced classes are ‘digit-1’, ‘digit-3’and ‘digit-5’with fraction of $0.1,0.3\ $, and $\,0.5$. Similar to the one class-imbalanced case, all the testing data samples are used to test the clustering inference network. The performance of the proposed SIMI-ClusterGAN is shown in the Table VI. It is clearly observed from the Table VI that our proposed method out- performs uniform prior based ClusterGAN performance. For better understanding of $E_{\omega}$ performance for both the methods, we have visualised encoding latent space is shown in Figure 10. It is clearly observed from the figure that our proposed method gives better separable decision boundary than the ClusterGAN. TABLE VI: Imbalanced Clustering Performance Methods | MNIST ---|--- | 1-Class | 3-Classes | ACC | NMI | ACC | NMI ClusterGAN | 0.892 | 0.836 | 0.812 | 0.787 SIMI-ClusterGAN | 0.969 | 0.923 | 0.949 | 0.909 (a) ClusterGAN (b) SIMI-ClusterGAN Figure 10: Encoding latent space visualisation by t-SNE[63] for one class imbalanced condition For three classes imbalanced conditions, both the methods failed to generate the minor ‘digit-1’which is shown in the Figure 11. However, for other two minor classes (‘digit-3’and ‘digit-5’), proposed SIMI-ClusterGAN is able to generate pure classes. For better visual understanding, we have plotted with two minor classes data in Figure 13 in which ‘50’samples were generated for each class. It is clearly observed from the Figure 13 that our proposed method is able to generate both classes with high purity. However, ClusterGAN, generated mixture of samples of ‘digit-3’and ‘digit-5’and $50$ samples were generated for digit-8. We have also visualised encoding latent space in 2D for both the methods in Figure 12. (a) ClusterGAN (b) SIMI-ClusterGAN Figure 11: Samples generated by ClusterGAN and SIMI-ClusterGAN under three classes imbalanced condition. (a) ClusterGAN (b) SIMI-ClusterGAN Figure 12: Encoding latent space visualisation by t-SNE[63] for three classes imbalanced condition (a) ClusterGAN:’digit-3’ and ’digit-5’ (b) SIMI-ClusterGAN: ’digit-3’ and ’digit-5’ Figure 13: Two minor classes generated by ClusterGAN and SIMI-ClusterGAN ## V conclusion In this paper, we have proposed a SIMI-ClusterGAN which is the modification of uniform prior latent space based ClusterGAN method. The proposed method consists of four networks, a prior network, a generator, a discriminator and a clustering inference network. The proposed method is followed by two stage learning methods: learning categorical prior from the data directly and then the learned prior is used to modify clustering performance through adversarial training between conditional generator and discriminator. The simulation results indicate that the proposed SIMI-ClusterGAN achieved better performance than the state-of-the-art methods. The effectiveness of each loss has been studied through an ablation study. It is also observed that the proposed method can handle imbalanced conditions. However, if the data distribution is highly imbalanced in nature, the SIM-based $P_{\phi}$ won’t be able to capture how the real data is distributed. Consequently, SIMI-ClusterGAN fails to generate the minority classes. Rather than relying on two-stage techniques, we will instead leverage self-supervised losses[64] to develop a single-stage learning technique that simultaneously updates prior and clustering inference networks. ## References * [1] K.-S. Chuang, H.-L. Tzeng, S. Chen, J. Wu, and T.-J. Chen, “Fuzzy c-means clustering with spatial information for image segmentation,” _computerized medical imaging and graphics_ , vol. 30, no. 1, pp. 9–15, 2006\. * [2] M. Caron, P. Bojanowski, A. Joulin, and M. Douze, “Deep clustering for unsupervised learning of visual features,” in _Proceedings of the European Conference on Computer Vision (ECCV)_ , 2018, pp. 132–149. * [3] P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, P.-A. Manzagol, and L. Bottou, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion.” _Journal of machine learning research_ , vol. 11, no. 12, 2010. * [4] B. Yang, X. Fu, N. D. Sidiropoulos, and M. Hong, “Towards k-means-friendly spaces: Simultaneous deep learning and clustering,” in _international conference on machine learning_ , 2017, pp. 3861–3870. * [5] J. Xie, R. Girshick, and A. Farhadi, “Unsupervised deep embedding for clustering analysis,” in _International conference on machine learning_ , 2016, pp. 478–487. * [6] X. Yang, C. Deng, F. Zheng, J. Yan, and W. Liu, “Deep spectral clustering using dual autoencoder network,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 4066–4075. * [7] S. Mukherjee, H. Asnani, E. Lin, and S. Kannan, “Clustergan: Latent space clustering in generative adversarial networks,” in _Proceedings of the AAAI Conference on Artificial Intelligence_ , vol. 33, 2019, pp. 4610–4617. * [8] E. Min, X. Guo, Q. Liu, G. Zhang, J. Cui, and J. Long, “A survey of clustering with deep learning: From the perspective of network architecture,” _IEEE Access_ , vol. 6, pp. 39 501–39 514, 2018. * [9] J. MacQueen _et al._ , “Some methods for classification and analysis of multivariate observations,” in _Proceedings of the fifth Berkeley symposium on mathematical statistics and probability_ , vol. 1, no. 14. Oakland, CA, USA, 1967, pp. 281–297. * [10] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in _Advances in neural information processing systems_ , 2014, pp. 2672–2680. * [11] L. Ma, Y. Ma, Q. Lin, J. Ji, C. A. C. Coello, and M. Gong, “Snegan: Signed network embedding by using generative adversarial nets,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2020. * [12] J. He, L. Shen, Y. Yao, H. Wang, G. Zhao, X. Gu, and W. Ding, “Finger vein image deblurring using neighbors-based binary-gan (nb-gan),” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2021. * [13] Q. Li, H. Qu, Z. Liu, N. Zhou, W. Sun, S. Sigg, and J. Li, “Af-dcgan: Amplitude feature deep convolutional gan for fingerprint construction in indoor localization systems,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2019. * [14] P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros, “Image-to-image translation with conditional adversarial networks,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2017, pp. 1125–1134. * [15] A. v. d. Oord, S. Dieleman, H. Zen, K. Simonyan, O. Vinyals, A. Graves, N. Kalchbrenner, A. Senior, and K. Kavukcuoglu, “Wavenet: A generative model for raw audio,” _arXiv preprint arXiv:1609.03499_ , 2016. * [16] H. Tang, D. Xu, Y. Yan, J. J. Corso, P. H. Torr, and N. Sebe, “Multi-channel attention selection gans for guided image-to-image translation,” _arXiv preprint arXiv:2002.01048_ , 2020. * [17] L. Jing and Y. Tian, “Self-supervised visual feature learning with deep neural networks: A survey,” _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , 2020. * [18] C.-H. Liu, H. Chang, and T. Park, “Da-cgan: A framework for indoor radio design using a dimension-aware conditional generative adversarial network,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops_ , 2020, pp. 498–499. * [19] C. Zheng, S. Yang, J. M. Parra-Ullauri, A. Garcia-Dominguez, and N. Bencomo, “Reward-reinforced generative adversarial networks for multi-agent systems,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , 2021. * [20] X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever, and P. Abbeel, “Infogan: Interpretable representation learning by information maximizing generative adversarial nets,” in _Advances in neural information processing systems_ , 2016, pp. 2172–2180. * [21] S. Arora, A. Risteski, and Y. Zhang, “Do gans learn the distribution? some theory and empirics,” in _International Conference on Learning Representations_ , 2018. * [22] T. Karras, T. Aila, S. Laine, and J. Lehtinen, “Progressive growing of gans for improved quality, stability, and variation,” in _International Conference on Learning Representations_ , 2018. * [23] D. Mishra, J. Aravind, and A. Prathosh, “Effect of the latent structure on clustering with gans,” _IEEE Signal Processing Letters_ , 2020. * [24] J. Chang, L. Wang, G. Meng, S. Xiang, and C. Pan, “Deep adaptive image clustering,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 5879–5887. * [25] J. Yang, D. Parikh, and D. Batra, “Joint unsupervised learning of deep representations and image clusters,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2016, pp. 5147–5156. * [26] X. Guo, L. Gao, X. Liu, and J. Yin, “Improved deep embedded clustering with local structure preservation.” in _IJCAI_ , 2017, pp. 1753–1759. * [27] M. F. Mathieu, J. J. Zhao, J. Zhao, A. Ramesh, P. Sprechmann, and Y. LeCun, “Disentangling factors of variation in deep representation using adversarial training,” in _Advances in neural information processing systems_ , 2016, pp. 5040–5048. * [28] A. Gonzalez-Garcia, J. Van De Weijer, and Y. Bengio, “Image-to-image translation for cross-domain disentanglement,” in _Advances in neural information processing systems_ , 2018, pp. 1287–1298. * [29] M. Tschannen, O. Bachem, and M. Lucic, “Recent advances in autoencoder-based representation learning,” _arXiv preprint arXiv:1812.05069_ , 2018. * [30] Z. Pan, W. Yu, B. Wang, H. Xie, V. S. Sheng, J. Lei, and S. Kwong, “Loss functions of generative adversarial networks (gans): Opportunities and challenges,” _IEEE Transactions on Emerging Topics in Computational Intelligence_ , vol. 4, no. 4, pp. 500–522, 2020. * [31] N. Hadad, L. Wolf, and M. Shahar, “A two-step disentanglement method,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2018, pp. 772–780. * [32] M. Patacchiola, P. Fox-Roberts, and E. Rosten, “Y-autoencoders: disentangling latent representations via sequential-encoding,” _arXiv preprint arXiv:1907.10949_ , 2019. * [33] M. Ye and J. Shen, “Probabilistic structural latent representation for unsupervised embedding,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2020, pp. 5457–5466. * [34] R. T. Chen, X. Li, R. B. Grosse, and D. K. Duvenaud, “Isolating sources of disentanglement in variational autoencoders,” in _Advances in Neural Information Processing Systems_ , 2018, pp. 2610–2620. * [35] I. Higgins, L. Matthey, A. Pal, C. Burgess, X. Glorot, M. Botvinick, S. Mohamed, and A. Lerchner, “beta-vae: Learning basic visual concepts with a constrained variational framework,” 2016. * [36] H. Kim and A. Mnih, “Disentangling by factorising,” _arXiv preprint arXiv:1802.05983_ , 2018. * [37] E. Dupont, “Learning disentangled joint continuous and discrete representations,” in _Advances in Neural Information Processing Systems_ , 2018, pp. 710–720. * [38] S. Gurumurthy, R. Kiran Sarvadevabhatla, and R. Venkatesh Babu, “Deligan: Generative adversarial networks for diverse and limited data,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2017, pp. 166–174. * [39] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Courville, “Improved training of wasserstein gans,” in _Advances in neural information processing systems_ , 2017, pp. 5767–5777. * [40] T. Dam, M. M. Ferdaus, S. G. Anavatti, S. Jayavelu, and H. A. Abbass, “Does adversarial oversampling help us?” in _Proceedings of the 30th ACM International Conference on Information & Knowledge Management_, 2021, pp. 2970–2973. * [41] A. Creswell and A. A. Bharath, “Inverting the generator of a generative adversarial network,” _IEEE transactions on neural networks and learning systems_ , vol. 30, no. 7, pp. 1967–1974, 2018. * [42] Z. C. Lipton and S. Tripathi, “Precise recovery of latent vectors from generative adversarial networks,” _arXiv preprint arXiv:1702.04782_ , 2017\. * [43] A. Krause, P. Perona, and R. G. Gomes, “Discriminative clustering by regularized information maximization,” in _Advances in neural information processing systems_ , 2010, pp. 775–783. * [44] W. Hu, T. Miyato, S. Tokui, E. Matsumoto, and M. Sugiyama, “Learning discrete representations via information maximizing self-augmented training,” _arXiv preprint arXiv:1702.08720_ , 2017. * [45] Y. Grandvalet and Y. Bengio, “Semi-supervised learning by entropy minimization,” in _Advances in neural information processing systems_ , 2005, pp. 529–536. * [46] T. Miyato, S.-i. Maeda, M. Koyama, K. Nakae, and S. Ishii, “Distributional smoothing with virtual adversarial training,” _arXiv preprint arXiv:1507.00677_ , 2015. * [47] J. Zhao, Y. Kim, K. Zhang, A. Rush, and Y. LeCun, “Adversarially regularized autoencoders,” in _International Conference on Machine Learning_. PMLR, 2018, pp. 5902–5911. * [48] Q. Mao, H.-Y. Lee, H.-Y. Tseng, S. Ma, and M.-H. Yang, “Mode seeking generative adversarial networks for diverse image synthesis,” in _Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 1429–1437. * [49] A. Coates, A. Ng, and H. Lee, “An analysis of single-layer networks in unsupervised feature learning,” in _Proceedings of the fourteenth international conference on artificial intelligence and statistics_ , 2011, pp. 215–223. * [50] A. Krizhevsky, G. Hinton _et al._ , “Learning multiple layers of features from tiny images,” 2009. * [51] H. Xiao, K. Rasul, and R. Vollgraf, “Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms,” _arXiv preprint arXiv:1708.07747_ , 2017. * [52] D. D. Lee and H. S. Seung, “Learning the parts of objects by non-negative matrix factorization,” _Nature_ , vol. 401, no. 6755, pp. 788–791, 1999\. * [53] J. Shi and J. Malik, “Normalized cuts and image segmentation,” _IEEE Transactions on pattern analysis and machine intelligence_ , vol. 22, no. 8, pp. 888–905, 2000. * [54] W. Zhang, X. Wang, D. Zhao, and X. Tang, “Graph degree linkage: Agglomerative clustering on a directed graph,” in _European Conference on Computer Vision_. Springer, 2012, pp. 428–441. * [55] K. Ghasedi Dizaji, A. Herandi, C. Deng, W. Cai, and H. Huang, “Deep clustering via joint convolutional autoencoder embedding and relative entropy minimization,” in _Proceedings of the IEEE international conference on computer vision_ , 2017, pp. 5736–5745. * [56] U. Shaham, K. Stanton, H. Li, B. Nadler, R. Basri, and Y. Kluger, “Spectralnet: Spectral clustering using deep neural networks,” _arXiv preprint arXiv:1801.01587_ , 2018. * [57] J. T. Springenberg, “Unsupervised and semi-supervised learning with categorical generative adversarial networks,” _arXiv preprint arXiv:1511.06390_ , 2015. * [58] Y. Yu and W.-J. Zhou, “Mixture of gans for clustering.” in _IJCAI_ , 2018, pp. 3047–3053. * [59] H. W. Kuhn, “The hungarian method for the assignment problem,” _Naval research logistics quarterly_ , vol. 2, no. 1-2, pp. 83–97, 1955. * [60] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of the IEEE conference on computer vision and pattern recognition_ , 2016, pp. 770–778. * [61] Z. Jiang, Y. Zheng, H. Tan, B. Tang, and H. Zhou, “Variational deep embedding: an unsupervised and generative approach to clustering,” in _Proceedings of the 26th International Joint Conference on Artificial Intelligence_ , 2017, pp. 1965–1972. * [62] S. Sarfraz, V. Sharma, and R. Stiefelhagen, “Efficient parameter-free clustering using first neighbor relations,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition_ , 2019, pp. 8934–8943. * [63] L. Van der Maaten and G. Hinton, “Visualizing data using t-sne.” _Journal of machine learning research_ , vol. 9, no. 11, 2008. * [64] Y. Li, P. Hu, Z. Liu, D. Peng, J. T. Zhou, and X. Peng, “Contrastive clustering,” in _2021 AAAI Conference on Artificial Intelligence (AAAI)_ , 2021.
arxiv-papers
2021-07-27T10:04:32
2024-09-04T03:07:21.161372
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Tanmoy Dam, Sreenatha G. Anavatti, Hussein A. Abbass", "submitter": "Tanmoy Dam", "url": "https://arxiv.org/abs/2107.12706" }
2107.12707
# DV-Det: Efficient 3D Point Cloud Object Detection with Dynamic Voxelization Zhaoyu Su Pin Siang Tan Yu-Hsing Wang DESR Laboratory Department of Civil and Environmental Engineering Hong Kong University of Science and Technology {zsuad, pstan}@connect.ust.hk; [email protected] ###### Abstract In this work, we propose a novel two-stage framework for the efficient 3D point cloud object detection. Instead of transforming point clouds into 2D bird eye view projections, we parse the raw point cloud data directly in the 3D space yet achieve impressive efficiency and accuracy. To achieve this goal, we propose dynamic voxelization, a method that voxellizes points at local scale on-the-fly. By doing so, we preserve the point cloud geometry with 3D voxels, and therefore waive the dependence on expensive MLPs to learn from point coordinates. On the other hand, we inherently still follow the same processing pattern as point-wise methods (e.g., PointNet) and no longer suffer from the quantization issue like conventional convolutions. For further speed optimization, we propose the grid-based downsampling and voxelization method, and provide different CUDA implementations to accommodate to the discrepant requirements during training and inference phases. We highlight our efficiency on KITTI 3D object detection dataset with $75$ FPS and on Waymo Open dataset with $25$ FPS inference speed with satisfactory accuracy. ## 1 Introduction Algorithms for point cloud detection are receiving increasing attention nowadays thanks to the blooming of robotics and the autonomous driving industry. Different from the detection algorithms on 2D images, detection on 3D point cloud is a non-trivial task due to the high sparsity and unstructured property of point clouds. Meanwhile, detection algorithms are expected to run at the real-time speed, while they are usually deployed on the edge devices with limited computation resources, which induces exigent demand for the computation efficiency. The existing point cloud detection methods can be roughly classified into two groups: grid based methods and point-wise methods. Grid based methods basically follow the same pattern as the 2D image cases: they transform the point cloud into regular grid representations like 3D voxels[1, 20, 29, 22] or 2D bird eye view (BEV) projections[9, 24, 23], and then use 3D or 2D convolutional neural networks (CNNs) to extract the features and obtain bounding box predictions. However, the transformation from the point cloud to regular grids leads to the information loss, and due to the quantization issue, the feature maps at high-level CNN layers often lack the precise regional feature representations (Fig.1 a), which is essential for an accurate bounding box regression. On the other hand, developed from the pioneering work PointNet[14, 15], more and more point-wise methods are proposed recently, which directly take raw 3D LiDAR points as input and learn point-wise feature representations from point coordinates via multi-layer perceptrons (MLPs)[13, 19, 27]. As shown in Fig.1 b, point-wise methods no longer suffer from the quantization problem as conventional convolutions, but this comes at a price: learning representations from unstructured point coordinates is a hard task, and therefore, heavy MLPs architectures with expensive computational cost are usually involved in these methods, leading to relatively slow inference speed. There have been attempts that try to combine grid based methods and point-wise methods, e.g., in PV-RCNN[18] , these two methods are leveraged in an alternate pattern at the framework level to achieve the best performance. Despite the impressive accuracy, heavy MPLs still remain in [18], while the inference speed is still limited. Currently, the mainstream point cloud detection methods run at a speed of 20 FPS for the KITTI dataset (few can reach 45 FPS111Without TensorRT optimization.[9]) on a powerful dedicated GPU, with $90\degree$ horizontal front-view FOV. This is apparently not sufficient for the full $360\degree$ FOV scenario with a LiDAR sampling rate of 20Hz in reality, not to mention the limited computation hardware resources on the edge devices. In this work, we propose a new method that combines the advantages from both grid based methods and point-wise methods at the perceptron level. As shown in Fig.1 c, given a point cloud, we first extract key-points and gather neighbouring points around each key-point just like the point-wise methods. However, instead of learning from point coordinates with MLPs, we leverage local-scale 3D voxels to preserve the 3D geometry and then learn features with 3D convolutions. By doing so, we waive the requirements for the expensive MLPs and tackle the quantization issue as well. Just like other point-wise methods, we also face the same problem: how to extract key-points from hundreds of thousands of input points efficiently. In addition, we also need to figure out how to construct 3D voxels on-the-fly during the network propagation at real-time. To this end, we propose the grid based downsampling and hierarchical point-wise convolution with dynamic voxelization, to take the place of commonly adopted farthest point sampling (FPS) + k-nearest-neighbours (k-NN) combination, which is time consuming and memory-hungry. In addition, as a two-stage detection framework, we also develop location-aware RoI pooling, a light-weight pooling method that is 3$\times$ faster and 4$\times$ more memory efficient than the previous work without losing accuracy significantly. Moreover, for further performance improvement, we adopt 3D IoU loss[28] for bounding box regression. We develop an efficient algorithm for 3D IoU loss calculation, which is fully based on the native TensorFlow operations and can be implemented with less than 200 lines of Python code. The tedious back propagation calculation of 3D IoU can just be left to the deep learning frameworks and no longer has to be manually implemented. Powered by all the innovations above, we propose DV-Det, a two-stage detection framework for efficient 3D object detection from point clouds. Our method achieves the impressive 75 FPS inference speed on the KITTI dataset[4] and 25 FPS on the Waymo Open Dataset [21], while still maintains satisfactory accuracy performance. Figure 1: Comparison between different sampling strategies and network architectures. (a) Global voxelization for most of the grid based methods, notice the severe quantization issue at layer 2. (b) Point-wise method, commonly used for the point-wise MLPs based methods like PointNet; (c) Our proposed point-wise convolution based on the dynamic voxelization operation. ## 2 Related Works ### 2.1 Point-wise Based 3D Detection The point-wise 3D detection methods has gained a lot of attention after the success of PointNet [14], and PointNet is still the most widely adopted perceptron unit in many point-wise detection methods. Frustum-PointNet[13] is the first work to apply PointNet into 3D detection, it crops 3D frustums based on the detection results from 2D images, and then use PointNet to parse the frustums point cloud data. STD[27] employs PointNet++[15] as the backbone for features extraction, and uses PointsPool for efficient proposal refinement. Similarly, [19, 29] also leverages PointNet++ to generate RoI proposals directly from the input point clouds, while [12] uses a voting strategy for better feature aggregation returned from PointNet++. However, PointNet (including its variants) relies on the MLPs (functioning like a sub-network in each layer) to learn the geometrical features from the point coordinates, and it is therefore a computationally intensive method. Hence, the point-wise methods mentioned above usually run only at $\sim$10 FPS on the KITTI dataset with a dedicated GPU. ### 2.2 Grid Based 3D Detection Convolutions are particularly good at dealing with data organised in regular grids. By converting the unstructured point cloud into 3D voxels, the geometry of points is preserved within the arrangement of voxels, and therefore, it no longer has to be learnt from point coordinates like PointNet. In previous works[20, 22, 6], 3D point clouds are converted into 3D voxel representations, and 3D sparse convolutions[5] are used as backbones for feature extractions. By converting the 3D points into 2D bird eye view (BEV) projections[9, 23, 24], most of the methods originally proposed for detection on 2D images can be transferred to the 3D seamlessly. However, converting the entire point cloud into 2D projections means the permanent loss of 3D geometry information, and therefore, the existing 2D BEV based methods usually show relatively low accuracy on the benchmark datasets, especially for the hard cases only with few points. There are also works that adopt similar implementation, and fuse the LiDAR point cloud with 2D camera images at the feature map level[10, 11], but the interpretation of high-resolution camera images is a difficult task, which usually leads to unsatisfactory inference speed. ### 2.3 Rethink About Existing Methods Point-wise methods are able to learn precise point-wise feature representations, however, their dependencies on MLPs often lead to heavy network architectures. Meanwhile, expensive operations like k-NN and FPS are also involved for point downsampling and feature aggregation, which further drags down the inference efficiency. On the other hand, the grid based methods are more efficient, but due to the feature dilution issue, feature maps at high-level network layers often possess low resolution, which obstructs the network learning precise local feautre representations. E.g., in work [20], although the RoI proposals have already been predicted at the bottle-neck of its U-Net [17] style network architecture, but the feature maps are still upsampled to provide accurate enough information for the RoI-pooling in second stage. In this work, we propose a novel method which maintains precise feature representations like point-wise methods without the requirement for complicated MLPs, while avoids the general issues existing in the grid base methods at the same time. ## 3 Proposed Method Learning from point coordinates with MLPs is too expensive for a rapid detection framework to adopt, therefore, we stick to the grid based convolution approach as our basic perceptron unit. However, instead of converting the entire point cloud into 3D voxels, we adopt similar strategy as point-wise methods: we only construct local-scale 3D voxels around the key- points of the point cloud, and parse 3D features with dense 3D convolution. In this way, we fuse the point-wise methods and grid based methods at the perceptron level, and achieve remarkable efficiency improvement. Nevertheless, just like other point-wise methods, we are facing the same problem: how to select key-points from a point cloud with hundreds of thousands of points. Moreover, we also need to construct the 3D convolution kernels on-the-fly during the forward propagation efficiently enough to achieve the real-time performance. In this section, we will give our answers to these two questions in section 3.1 and 3.2 respectively, followed by the illustrations to our Location-Aware RoI pooling in section 3.3 and 3D IoU loss function in section 3.4. Figure 2: Visualization of the proposed two-stage DV-Det framework. In the first stage, raw 3D points are processed by point-wise convolutional layers with dynamic voxelization to extract features and obtain 3D bounding-box proposals. In the second stage, the proposals are refined based on the Location-Aware RoI pooling method to get the final prediction results. ### 3.1 Grid Based Point Downsampling Farthest point sampling (FPS) is the most widely adopted algorithm for point cloud downsampling[14], however, as an algorithm with complexity $O(n^{2})$, it runs very slowly for point cloud at large scales, making it a straggler in the real-time detection framework. On the other hand, random downsampling is efficient enough with $O(n)$ complexity, but it is sensitive to the local point density and often leads to unstable performance[7]. In this work, we propose the grid based point downsampling method, which runs almost as efficiently as random sampling, while keeps similar functionalities as FPS. Specifically, for a point cloud $S=\\{(p_{i},f_{i}):i=1,2,...,N\\}$, where $p_{i}\in\mathbb{R}^{3}$ is the point coordinate, $f_{i}\in\mathbb{R}^{c}$ is the point-wise feature with channel $c$ and $N$ is the total number of points, given the downsampling resolution $r$, we first divide the entire point cloud into 3D regular grids with grid length $r$ as shown in Fig.3 a. For every point $p_{i}$ in ${P}$ with coordinate $[p_{i}^{x},p_{i}^{y},p_{i}^{z}]$, we obtain its corresponding grid index as $[\lfloor\frac{p_{i}^{x}}{r}\rfloor,\lfloor\frac{p_{i}^{y}}{r}\rfloor,\lfloor\frac{p_{i}^{z}}{r}\rfloor]$, which indicates the grid that point will fall into. Next, we randomly select one point in each grid as our downsampling output, unless the grid is not occupied by any points. This strategy may sound straightforward, but not the implementation, especially for the balance between the time and space complexity. Therefore, we adopt different implementations for inference and training phase separately due to their different needs for speed and memory efficiency. For the inference purpose, speed matters more than memory efficiency, and therefore, our implementation creates a 3D grid buffer with size $\lfloor\frac{W}{r}\rfloor\times\lfloor\frac{L}{r}\rfloor\times\lfloor\frac{H}{r}\rfloor$ first, where the $W$, $L$ and $H$ stand for the dimensions of the input point cloud; then, we calculate the grid index for every point which are fitted into the corresponding grid buffer location. Each grid buffer location is writable for only once, which means its value cannot be modified once it has been occupied, so that the other points with the same grid index will not overwrite the same buffer again. With this setup, we achieve the $O(n)$ complexity, but the speed also comes at a price: the 3D grid buffer has to be pre-allocated in the memory space first. Fortunately, it usually will not be a problem for most of the cases, e.g., for Waymo Open Dataset with input range of 150m $\times$ 150m $\times$ 6m, when the $r$ is 0.1m, the total RAM consumption by our inference implementation is around 500MB (with float32), while the speed is 5$\times$ faster than our training implementation (introduced below). Another good news is that we can reuse the same downsampling results in the subsequent model layers, as long as the downsampling ratio $r$ remains unchanged. By contrast, in the training implementation, we aim at fitting as large batch size as possible into GPU, while the time consumption is less important. Following this principle, we calculate the grid index $[\lfloor\frac{p_{i}^{x}}{r}\rfloor,\lfloor\frac{p_{i}^{y}}{r}\rfloor,\lfloor\frac{p_{i}^{z}}{r}\rfloor]$ for every point first, then sort the points according to their grid indexes, and collect the points with unique grid indexes as the final downsampling results. By doing so, we waive the requirement for the memory-hungry grid buffer implementation. Since the sorting operation is involved here, the approximate complexity is $O(nlogn)$, not as ideal as $O(n)$, but still much faster than the FPS. Figure 3: Visualization of grid based point downsampling (a) and dynamic voxelization (b). ### 3.2 Hierarchical Convolution with Dynamic Voxelization The purpose of our hierarchical point-wise convolution is to combine the advantages of both conventional convolutions and the point-wise operations. Instead of applying these two techniques in an alternate way like PV-RCNN[18], in this work, we directly deploy 3D convolutions in a point-wise fashion. Specifically, after the extraction of key-points via downsampling, we first construct local-scale 3D voxels around each key-point with our proposed dynamic voxelization operation, then we parse the point-wise 3D voxel data with dense 3D convolution to obtain the feature representations. #### 3.2.1 Dynamic Voxelization Given the input point cloud $S_{1}=\\{(p_{1}^{i},f_{1}^{i}):i=1,2,...,N_{1}\\}$, $p_{1}^{i}\in\mathbb{R}^{3}$, $f_{1}^{i}\in\mathbb{R}^{c_{1}}$, with the subscript "1" suggesting it is the first layer in the network, we first downsample $\\{p_{1}^{i}\\}$ using our grid-based downsampling with the downsampling resolution $r_{1}$, and get the downsampled key point set $\\{p_{2}^{i}:i=1,2,...,N_{2},N_{2}\leq N_{1}\\}\subseteq\\{p_{1}^{i}:i=1,2,...,N_{1}\\}$. Next, for every $p_{2}^{i}$, we query its neighbouring points in $S_{1}$ within a fixed radius $R_{1}$: $S_{1}^{i}=\\{(p_{1}^{j},f_{1}^{j}):j=1,2,...,N_{1}^{i}|\left\lVert p_{1}^{j}-p_{2}^{i}\right\rVert\leq R_{1}\\}$, and then fit $S_{1}^{i}$ into the 3D regular voxels with resolution $k\times k\times k$. By doing so, we convert the original $S_{1}$ into a set of point-wise 3D voxels: $V_{1}=\\{(p_{2}^{i},v_{1}^{i}),i=1,2,...,N_{2}\\}$, where $v_{1}^{i}\in\mathbb{R}^{k\times k\times k\times c_{1}}$ encodes the local point cloud geometry around the key point $p_{2}^{i}$. The key of our dynamic voxelization lies on how to construct the 3D voxels $v^{i}$ for each key-point $p^{i}$. However, even after the grid based downsampling operation, the total number of remaining key-points is still considerable ($\sim$ 100k at most), and to perform local-scale voxelization with so many key-points in real-time, we propose the grid based voxelization operation. As suggested by its name, grid based voxelization basically shares a similar implementation as our grid based downsampling operation. As shown in Fig.3 b, given the kernel radius $R$ and kernel resolution $k$, we divide the point cloud into regular grids with resolution $2R/k$ (defined as kernel resolution in this context), and for any given kernel centroid and query radius $R$, we fit interior points into the $k\times k\times k$ 3D voxels. In regard to the voxels occupied by multiple points, the average-pooling strategy is used. To accelerate this process, we only need to go through the points that lies in the grids which overlap with the kernel area, meanwhile, we also apply different implementations separately to fulfill the different preferences during training and inference phases, and readers may refer to the source code for more details. A similar idea to our dynamic convolution is also introduced in [8], however, the voxelization is only performed once for all the layers before the network propagation in [8], therefore, all the layers in the network always share the same receptive field and there is no concept of hierarchy. By contrast, in our work, the voxelization is performed on-the-fly in every convolutional layer with highly efficient implementations, and therefore the receptive field dynamically changes along the model depth. #### 3.2.2 Point-wise 3D Convolution As for the convolution part, taking the first convolutional layer as an example, we convolve the point-wise 3D voxel $v_{1}^{i}$ with dense 3D kernel $W_{1}\in\mathbb{R}^{k\times k\times k\times c_{1}\times c_{2}}$. $W_{1}$ has the same $k\times k\times k$ resolution as $v_{1}^{i}$, while $c_{1}$ and $c_{2}$ are the input and output feature channels respectively. After convolution, we have $f_{2}^{i}=v_{1}^{i}*W_{1}$, and $f_{2}^{i}\in\mathbb{R}^{c_{2}}$. Finally, we obtain a new point set $S_{2}=\\{(p_{2}^{i},f_{2}^{i}):i=1,2,...,N_{2}\\}$, which can be treated as the input of another successive convolutional layer. Since the convolution output features are closely associated with the point coordinates, the output $f^{i}$ now exactly represents the features at location $p_{i}$ , instead of a large pooling area, like conventional convolutions in Fig.1 a. A hierarchical arrangement of point-wise convolutional layers shapes our backbone and region proposal network (RPN) as shown in the Fig.2. ### 3.3 Location-Aware RoI Pooling As a two-stage detection framework, RoI pooling plays an essential part in the second refinement stage. However, to perform efficient yet accurate RoI pooling still remains an open problem for 3D point cloud detection. The concept of RoI pooling was officially introduced in [20], and later on was adopted in the successive works[18]. Figure 4: Location-Aware RoI pooling illustrated in 2D with two proposals and pooling resolution of 2$\times$2\. With LA-RoI pooling, our network can capture the tiny variance between to the two proposals that are very close to each other. But how to efficiently aggregate the point-wise features into RoI pooling grids still remains a problem. In [18], features in each pooling grid are learnt from additional convolutions, e.g., for RoI pooling with grid resolution of $6\times 6\times 6$, a total number of 216 convolution calculations are involved, and that is for one single RoI only, therefore, it is unaffordable to an efficient detection framework. To this end, we propose the Location-Aware RoI Pooling method. As shown in Fig.4, during the pooling operation, we assign additional weight to the input point-wise features according to their Euclidean distances to the pooling grid centre. Specifically, given a 3D RoI of dimension $W\times L\times H$ and the target pooling grid resolution $k$, we first gather all the interior point- wise features $\\{f_{i}\\}$ within a certain pooling grid $g$ among the $k\times k\times k$ grids; next, we calculate representative features $f_{g}$ as: $f_{g}=\frac{1}{n}\sum_{i=1}^{n}{w_{i}f_{i}};w_{i}=e^{1-\frac{d_{i}}{r}};r=max\\{\frac{W}{k},\frac{L}{k},\frac{H}{k}\\}$ (1) where $d_{i}$ is the Euclidean distance between the feature point $f_{i}$ and the grid centre $g$, $r$ is the maximum dimension of pooling grid among $W$, $L$ and $H$ orientations. We normalize $f_{g}$ by the total number of interior points $n$ in each pooling grid, so that the scale of $f_{g}$ will not be heavily affected by $n$. In practice, the largest value of $n$ is set as 5, which means for each grid $g$, only at most 5 interior point-wise features $f_{i}$ are taken into consideration, and the redundant points are simply omitted. By doing so, we are able to capture the tiny location perturbations between different RoIs, while avoid the expensive convolution computations. Input : Predicted bounding box $B^{p}$ and the corresponding ground truth $B_{g}$: $B^{p}=(x^{p},y^{p},z^{p},w^{p},l^{p},h^{p},r^{p})$, $B^{g}=(x^{g},y^{g},z^{g},w^{g},l^{g},h^{g},r^{g})$ Output : The 3D IoU loss between $B^{p}$ and $B^{g}$: $L_{IoU}$ 1:Convert $B_{p}$ and $B_{g}$ to BEV representation: $B^{p}_{bev}=(x^{p},y^{p},w^{p},l^{p},r^{p})$, $B^{g}_{bev}=(x^{g},y^{g},w^{g},l^{g},r^{g})$ 2:Get the vertices of $B^{p}_{bev}$ and $B^{g}_{bev}$. For $i\in\\{1,2,3,4\\}$: $\mathbf{V}_{i}^{p}=[(-1)^{i}w^{p}/2,(-1)^{i-1}l^{p}/2]+[x^{p},y^{p}]$; $\mathbf{V}_{i}^{g}=[(-1)^{i}w^{g}/2,(-1)^{i-1}l^{g}/2]+[x^{g},y^{g}]$ 3:Get the perspective coordinates of $\mathbf{V}^{p}$ regarding its relative position to $B^{g}_{bev}$ as $\mathbf{V}^{p\rightarrow{g}}$: $\mathbf{V}^{p\rightarrow{g}}=\mathbf{R}_{(r^{p}-r^{g})}[\mathbf{V}^{p}]^{T}+[x^{p}-x^{g},y^{p}-y^{g}]$ ($\mathbf{R}_{*}$ is the rotation transformation regarding angle $*$) 4:Get the edge extensions of $B^{p}_{bev}$ with vertices $\mathbf{V}^{p\rightarrow{g}}$. For $i\in\\{1,2,3,4\\}$: $y=(-1)^{i}\frac{\mathbf{V}_{i}^{p\rightarrow{g}}[1]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[1]}{{\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}}x+(-1)^{i-1}\frac{\mathbf{V}_{i-1}^{p\rightarrow{g}}[1]\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i}^{p\rightarrow{g}}[1]\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}{{\mathbf{V}_{i}^{p\rightarrow{g}}[0]-\mathbf{V}_{i-1}^{p\rightarrow{g}}[0]}}$ 5:Get all the intersections $\\{\mathbf{I}_{j}^{g}\\},j\in\\{1,2,...,16\\}$ between $B^{p}_{bev}$ and $B^{g}_{bev}$ by setting $x$ as $\pm\frac{1}{2}w^{g}$ or setting $y$ as $\pm\frac{1}{2}l^{g}$ in Step 4 (the superscript $g$ indicates $\mathbf{I}^{g}$ is represented based on its relative position to $B^{g}_{bev}$) 6:Concatenate $\mathbf{I}^{g}$, $\mathbf{V}^{p\rightarrow{g}}$ and $\mathbf{V}^{g}$ as $\mathbf{P}^{g}$={$\mathbf{I}^{g}$, $\mathbf{V}^{p\rightarrow{g}}$,$\mathbf{V}^{g}$}, filter out the points in $\mathbf{P}^{g}$ that are outside $B^{g}_{bev}$, and that leads to $\mathbf{P}^{g}=\\{\mathbf{P}_{k}^{g}|k\in\\{1,2,...,24\\}\cap\left\lVert\mathbf{P}_{k}^{g}[0]\right\rVert\leq\frac{1}{2}w^{g}\cap\left\lVert\mathbf{P}_{k}^{g}[1]\right\rVert\leq\frac{1}{2}l^{g}\\}$ 7:Similar to Step 3, get the perspective coordinates of $\mathbf{P}^{g}$ regarding its relative position to $B^{p}_{bev}$ as $\mathbf{P}^{g\rightarrow{p}}$ 8:Repeat Step 6 to filter out the points in $\mathbf{P}^{g\rightarrow{p}}$ that are outside $B^{p}_{bev}$, and that returns a new set $\mathbf{P}\subset{\mathbf{P}^{g\rightarrow{p}}}$, which are the vertices of the polygon intersection area between $B^{p}_{bev}$ and $B^{g}_{bev}$ 9:Sort the points in $\mathbf{P}$ counterclock-wisely and calculate the area of the intersection polygon using Shoelace algorithm: $A=\frac{1}{2}\left|(\sum\limits_{i=1}^{n-1}\mathbf{P}_{i}[0]\mathbf{P}_{i+1}[1])+\mathbf{P}_{n}[0]\mathbf{P}_{1}[1]-(\sum\limits_{i=1}^{n-1}\mathbf{P}_{i+1}[0]\mathbf{P}_{i}[1])-\mathbf{P}_{1}[0]\mathbf{P}_{n}[1]\right|$ 10:Get the intersection height $H$ between $B^{p}$ and $B^{g}$, then calculate the 3D IoU as: $IoU_{3D}=\frac{A\times H}{w^{p}\times l^{p}\times h^{p}+w^{g}\times l^{g}\times h^{g}-A\times H}$, and $L_{IoU}=1-IoU_{3D}$ ALGORITHM 1 3D IoU Loss Calculation ### 3.4 Loss Functions As a two-stage model, we use multi-task loss functions to train our model in both stages. During the first stage, we try to differentiate foreground points from the point cloud and generate RoI proposals for every foreground points at the same time. As for loss function for the RoI regression optimization, we use the 3D IoU loss[28] as our optimization target, instead of the commonly adopted smooth-L1 loss. 3D IoU Loss. The IoU loss has been proven to be more suitable for detection tasks than smooth-L1 loss[28, 16], as it naturally reflects the bias between a predicted bounding box and its corresponding ground truth. The calculation itself for 3D IoU is not difficult, but as a loss function, being differentiable is a prerequisite and it is not an easy task. In previous works[28], the back propagation of 3D IoU has to be implemented manually with C++/CUDA extensions, which can be tedious and fallible. To tackle this problem, here we propose an efficient algorithm for 3D IoU calculation, which is fully based on the native operations supported by the modern deep learning framework like TensorFlow and PyTorch. This means that we no long have to implement the back propagation manually and can safely leave this task to the auto differentiation functions of modern deep learning frameworks. Concretely, given a pair of predicted bounding boxes $B^{p}=(x^{p},y^{p},z^{p},w^{p},l^{p},h^{p},r^{p})$ and the corresponding ground truth $B^{g}=(x^{g},y^{g},z^{g},w^{g},l^{g},h^{g},r^{g})$, where $[x^{*},y^{*},z^{*}]$ is the geometry centroid of bounding box $*$; $w^{*}$, $l^{*}$ and $h^{*}$ are the 3D dimensions and $r^{*}$ is the rotation angle around $z(yaw)$ axis (assuming only have rotations along $z$ axis), we calculate the 3D IoU loss according to the algorithm 1. The key of our algorithm lies on how to obtain the intersections efficiently between two bounding boxes on 2D BEV plane, and to achieve this goal, we transform the vertex coordinates of two bounding boxes based on their relative positions to each other via rotations and translations. By doing so, the intersections can be easily determined by setting restrictions on $x$, $y$ coordinates, and more importantly, our algorithm can be executed in batch-wise pattern without looping through every bounding box, which ensures its usability in applications. The multi-task loss function we use for the firs stage optimization is: $L_{stage1}=L_{cls}+\alpha L_{iou}+\beta L_{rot}$ (2) where $L_{cls}$ is the focal loss for foreground classification and $L_{i}ou$ is the 3D IoU loss. $L_{rot}$ is the smooth-L1 loss for rotation angle regression and $L_{rot}=$smooth-L1$(\sin{(r_{p}-r_{g})})$, which prevents $L_{iou}$ mixing up the $w$ and $l$ dimension. As for the second stage, the loss function is defined as follow: $L_{stage2}=L_{conf}+\alpha L_{iou}+\beta L_{rot}+\gamma L_{flip}$ (3) where $L_{conf}$ is the loss for IoU guided confidence score [pvrcnn], while $L_{iou}$ and $L_{rot}$ follow the same definitions as before. $L_{flip}$ is the cross-entropy loss for binary classification, which decides whether the predicted bounding box shall be rotated by 180°. The reason why $L_{flip}$ is needed is that $L_{rot}$ only regulates on the $\sin$ value of $r_{p}-r_{g}$, and the network cannot differentiate the correct orientation of bounding boxes basing on $L_{rot}$ alone. In practice, we set $\alpha=2$, $\beta=\gamma=0.5$. $L_{cls}$ and $L_{conf}$ are calculated for all the output points, while $L_{iou}$, $L_{rot}$ and $L_{flip}$ are only calculated for the foreground points. ## 4 Experiments ### 4.1 Implementation Details Network Architecture. As shown in Fig.2, our backbone network is based on the hierarchical point-wise convolutional layers with dynamic voxelization. The backbone is composed of four convolution blocks, and each block includes two point-wise convolutional layers. The downsampling resolution $r$ is set as 0.1m, 0.2m, 0.4m, 0.8m for each block, and the kernel resolution $k$ is 3 for all the blocks with the number of feature channels 16, 32, 64 and 128. The output features from each block are then concatenated and fed into the second stage as input to the LA-RoI pooling layer. The LA-RoI pooling transforms the point-wise features into $5\times 5\times 5$ dense 3D voxels, and pass them to the dense $3\times 3\times 3$ 3D convolutions. We apply “valid” padding strategy for the 3D convolution and the voxel dimensions are reduced to $1\times 1\times 1$ after two successive dense convolutional layers. Finally, we feed these features into MLPs to return the final predictions. Training and Inference Setup. We train our DV-Det in an end-to-end fashion from scratch on the KITTI 3D object detection dataset[4] and Waymo Open dataset[21]. The model is trained on 16 NVIDIA RTX 2080 Ti GPUs with 80 training epochs and the learning rate of 0.01. Batch size is set as 64 for KITTI dataset and 32 for Waymo dataset. In the second stage, we resample the negative and positive proposals with a ratio of 2:1 and IoU threshold of 0.5. During training phase, the input data are augmented with random rotations along $z$ axis between range $[-\frac{\pi}{4},\frac{\pi}{4}]$ and random scaling along three axes in range $[0.95,1.05]$. Following the practice in [18, 22], we also randomly "paste" ground truth objects collected from different scenes (within the same dataset) to enrich the training data. We train our model with the "training" implementations of grid based downsampling and dynamic voxelization, and run inference with the "inference" implementations. ### 4.2 Evaluation on KITTI Dataset We first evaluate our performance on the KITTI 3D object detection dataset, which comprises two partitions: training dataset (7,481 samples) and testing dataset (7,518 samples). We further divide the training partition into two sets: train set with 3,712 samples and val set with 3,769 samples. In training phase, we utilize 80% of the samples in the train+val combination as training data, and leave the rest 20% for validation. We evaluate the performance based on the testing dataset from the KITTI official online evaluation server, and report our accuracy on car and cyclist class in Table 1. We only compare with the pure point cloud based methods, and we divide the existing methods into two categories: "3D Perceptron" are the methods that parse the point cloud in 3D space using perceptrons like 3D convolution or PointNet; "BEV" are the methods that convert 3D point cloud onto 2D BEV plane, the process data with 2D convolutions. We notice that all of the existing 3D perceptron based methods have a inference speed less than 25 FPS on a dedicated GPU, and considering the 90°front-view FOV in KITTI dataset, we can hardly say they are ready for the real-world applications. On the other hand, BEV based methods run at considerably faster speed than the 3D perceptrons based methods, however, converting 3D point cloud into 2D BEV projections means the permanent loss of 3D spatial information, and that usually leads to unsatisfactory performance on hard examples. By contrast, our method achieves remarkable 75 FPS on the KITTI dataset, which is 3$\times$ faster than the state-of-the-art 3D perceptron based method. Meanwhile, compared with the existing BEV based methods, we overperform them regarding all the evaluation metrics and achieve 45% faster inference speed than the widely adopted PointPillar method. | Method | Speed | Car - 3D Detection | Car - BEV Detection | Cyclist - 3D Detection | Cyclist - BEV Detection ---|---|---|---|---|---|--- | (FPS) | Easy | Mod. | Hard | Easy | Mod. | Hard | Easy | Mod. | Hard | Easy | Mod. | Hard 3D Perceptron | Point-RCNN†[19] | $\sim$10 | 86.96 | 75.64 | 70.70 | 92.13 | 87.39 | 82.72 | 74.96 | 58.82 | 52.53 | 82.56 | 67.24 | 60.28 STD†[27] | $<$20 | 87.95 | 79.71 | 75.09 | 94.74 | 89.19 | 86.42 | 78.69 | 61.59 | 55.30 | 81.36 | 67.23 | 59.35 Fast Point-RCNN†[2] | $\sim$20 | 85.29 | 77.40 | 70.24 | 90.87 | 87.84 | 80.52 | - | - | - | - | - | - PV-RCNN†[18] | $\sim$15 | 90.25 | 81.43 | 76.82 | 94.98 | 90.65 | 86.14 | 78.60 | 63.71 | 57.65 | 82.49 | 68.89 | 62.41 SECOND[22] | $\sim$30 | 83.34 | 72.55 | 65.82 | 89.39 | 83.77 | 78.59 | 71.33 | 52.08 | 45.83 | 76.50 | 56.05 | 49.45 Voxel-RCNN†[3] | $\sim$25 | 90.90 | 81.62 | 77.06 | - | - | - | - | - | - | - | - | - SA-SSD[6] | $\sim$25 | 88.75 | 79.79 | 74.16 | 95.03 | 91.03 | 85.96 | - | - | - | - | - | - 3DSSD[26] | $\sim$25 | 88.36 | 79.57 | 74.55 | - | - | - | 82.48 | 64.10 | 56.90 | - | - | - BEV | PIXOR[25] | $\sim$10 | - | - | - | 81.70 | 77.05 | 72.95 | - | - | - | - | - | - HDNET[23] | $\sim$25 | - | - | - | 89.14 | 86.57 | 78.32 | - | - | - | - | - | - PointPillars[9] | $\sim$45 | 82.58 | 74.31 | 68.99 | 90.07 | 86.56 | 82.81 | 77.10 | 58.65 | 51.92 | 79.90 | 62.73 | 55.58 | DV-Det (Ours)† | $\sim$75 | 85.32 | 76.74 | 70.02 | 91.53 | 87.65 | 83.27 | 77.94 | 58.77 | 52.49 | 80.92 | 63.08 | 57.32 $\dagger$ Two-stage model Table 1: Performance comparison on the KITTI testing dataset based on the mean Average Precision (mAP) with 40 recall positions. ### 4.3 Evaluation on Waymo Open Dataset Apart from the KITTI dataset, we also test our model on the Waymo Open Dataset to give a comprehensive evaluation. We train our model based on 798 training sequences with $\sim$158k point cloud scenes, and test our performance on 202 validation sequences with $\sim$40k point cloud scenes. Different from KITTI dataset, Waymo Open Dataset possesses a full 360°view angle with denser point cloud point cloud, which asks for more efficient models to achieve the real- time processing speed. We evaluate our method based on the official tools released by Waymo. The mAP performance of DV-Det is reported in Table 2 for vehicle detection with IoU threshold of 0.7, and we only consider the examples with difficulty LEVEL_1 (objects possess more than 5 LiDAR points). Method | Speed | 3D mAP (IoU=0.7) | BEV mAP (IoU=0.7) ---|---|---|--- (FPS) | Overall | 0-30m | 30-50m | 50m-Inf | Overall | 0-30m | 30-50m | 50m-Inf PV-RCNN[19] | $<$5 | 70.30 | 91.92 | 69.21 | 42.17 | 82.96 | 97.53 | 82.99 | 64.97 Voxel-RCNN[3] | $<$10 | 75.59 | 92.49 | 74.09 | 53.15 | 88.19 | 97.62 | 87.34 | 77.70 PointPillar[9] | $\sim$15 | 56.62 | 81.01 | 51.75 | 27.94 | 75.57 | 92.10 | 74.06 | 55.47 DV-Det (Ours) | $\sim$25 | 63.42 | 85.72 | 55.89 | 30.73 | 78.38 | 95.12 | 76.93 | 59.36 Table 2: Performance (mAP) comparison on the Waymo Open Dataset with 202 validation sequences for vehicle class. Our DV-Det is overperformed by the state-of-the-art 3D perceptron based methods like Voxel-RCNN regarding the detection accuracy, but our method can run at a speed of 25 FPS, which is even faster than the 2D BEV methods like PointPillar with obviously higher accuracy. ## 5 Conclusion We present the DV-Det, a novel two-stage framework for efficient 3D object detection from point clouds. Our method combines the advantages from both point-wise methods and grid based methods, and as a pure 3D point cloud based method, DV-Det overperforms the 2D BEV based methods by a large margin regarding both efficiency and accuracy for the first time. With innovations like grid based point downsampling and dynamic voxelization techniques, we achieve satisfactory performance on KITTI and Waymo benchmark dataset. We hope our method can be inspiring and encourage more future works. ## References * [1] Xiaozhi Chen, Huimin Ma, Ji Wan, Bo Li, and Tian Xia. Multi-view 3d object detection network for autonomous driving. 2017\. * [2] Yilun Chen, Shu Liu, Xiaoyong Shen, and Jiaya Jia. Fast point r-cnn. pages 9775–9784, 2019. * [3] Jiajun Deng, Shaoshuai Shi, Peiwei Li, Wengang Zhou, Yanyong Zhang, and Houqiang Li. Voxel r-cnn: Towards high performance voxel-based 3d object detection. arXiv preprint arXiv:2012.15712, 2020. * [4] Andreas Geiger, Philip Lenz, and Raquel Urtasun. Are we ready for autonomous driving? the kitti vision benchmark suite. pages 3354–3361, 2012. * [5] Benjamin Graham and Laurens van der Maaten. Submanifold sparse convolutional networks. 6 2017. * [6] Chenhang He, Hui Zeng, Jianqiang Huang, Xian-Sheng Hua, and Lei Zhang. Structure aware single-stage 3d object detection from point cloud. pages 11873–11882, 2020. * [7] Qingyong Hu, Bo Yang, Linhai Xie, Stefano Rosa, Yulan Guo, Zhihua Wang, Niki Trigoni, and Andrew Markham. Randla-net: Efficient semantic segmentation of large-scale point clouds. pages 11108–11117, 2020. * [8] Binh-Son Hua, Minh-Khoi Tran, and Sai-Kit Yeung. Pointwise convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 984–993, 2018. * [9] Alex H. Lang, Sourabh Vora, Holger Caesar, Lubing Zhou, Jiong Yang, and Oscar Beijbom. Pointpillars: Fast encoders for object detection from point clouds. 2019\. * [10] Ming Liang, Bin Yang, Yun Chen, Rui Hu, and Raquel Urtasun. Multi-task multi-sensor fusion for 3d object detection. 2019\. * [11] Ming Liang, Bin Yang, Shenlong Wang, and Raquel Urtasun. Deep continuous fusion for multi-sensor 3d object detection. In Proceedings of the European Conference on Computer Vision (ECCV), pages 641–656, 2018. * [12] Charles R Qi, Or Litany, Kaiming He, and Leonidas J Guibas. Deep hough voting for 3d object detection in point clouds. pages 9277–9286, 2019. * [13] Charles R Qi, Wei Liu, Chenxia Wu, Hao Su, and Leonidas J Guibas. Frustum pointnets for 3d object detection from rgb-d data. pages 918–927, 2018. * [14] Charles R. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. Pointnet: Deep learning on point sets for 3d classification and segmentation. volume 2017-Janua, pages 77–85, 2017. * [15] Charles R. Qi, Li Yi, Hao Su, and Leonidas J. Guibas. Pointnet++: Deep hierarchical feature learning on point sets in a metric space. 2017\. * [16] Hamid Rezatofighi, Nathan Tsoi, JunYoung Gwak, Amir Sadeghian, Ian Reid, and Silvio Savarese. Generalized intersection over union: A metric and a loss for bounding box regression. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 658–666, 2019. * [17] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-net: Convolutional networks for biomedical image segmentation. volume 9351, pages 234–241, 5 2015. * [18] Shaoshuai Shi, Chaoxu Guo, Li Jiang, Zhe Wang, Jianping Shi, Xiaogang Wang, and Hongsheng Li. Pv-rcnn: Point-voxel feature set abstraction for 3d object detection. pages 10529–10538, 2020. * [19] Shaoshuai Shi, Xiaogang Wang, and Hongsheng Li. Pointrcnn: 3d object proposal generation and detection from point cloud. 2019\. * [20] Shaoshuai Shi, Zhe Wang, Jianping Shi, Xiaogang Wang, and Hongsheng Li. Part-a2 net: 3d part-aware and aggregation neural network for object detection. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2019. * [21] Pei Sun, Henrik Kretzschmar, Xerxes Dotiwalla, Aurelien Chouard, Vijaysai Patnaik, Paul Tsui, James Guo, Yin Zhou, Yuning Chai, Benjamin Caine, et al. Scalability in perception for autonomous driving: Waymo open dataset. pages 2446–2454, 2020. * [22] Yan Yan, Yuxing Mao, and Bo Li. Second: Sparsely embedded convolutional detection. Sensors, 18:3337, 2018. * [23] Bin Yang, Ming Liang, and Raquel Urtasun. Hdnet: Exploiting hd maps for 3d object detection. In Conference on Robot Learning, pages 146–155. PMLR, 2018. * [24] Bin Yang, Wenjie Luo, and Raquel Urtasun. Pixor: Real-time 3d object detection from point clouds. In Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pages 7652–7660, 2018. * [25] Bin Yang, Wenjie Luo, and Raquel Urtasun. Pixor: Real-time 3d object detection from point clouds. 2018\. * [26] Zetong Yang, Yanan Sun, Shu Liu, and Jiaya Jia. 3dssd: Point-based 3d single stage object detector. pages 11040–11048, 2020. * [27] Zetong Yang, Yanan Sun, Shu Liu, Xiaoyong Shen, and Jiaya Jia. Std: Sparse-to-dense 3d object detector for point cloud. pages 1951–1960, 2019. * [28] Dingfu Zhou, Jin Fang, Xibin Song, Chenye Guan, Junbo Yin, Yuchao Dai, and Ruigang Yang. Iou loss for 2d/3d object detection. pages 85–94, 2019. * [29] Yin Zhou and Oncel Tuzel. Voxelnet: End-to-end learning for point cloud based 3d object detection. pages 4490–4499, 2018.
arxiv-papers
2021-07-27T10:07:39
2024-09-04T03:07:21.175630
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Zhaoyu Su, Pin Siang Tan, Yu-Hsing Wang", "submitter": "Zhaoyu Su", "url": "https://arxiv.org/abs/2107.12707" }
2107.12710
# End-to-End Spectro-Temporal Graph Attention Networks for Speaker Verification Anti-Spoofing and Speech Deepfake Detection ###### Abstract Artefacts that serve to distinguish bona fide speech from spoofed or deepfake speech are known to reside in specific sub-bands and temporal segments. Various approaches can be used to capture and model such artefacts, however, none works well across a spectrum of diverse spoofing attacks. Reliable detection then often depends upon the fusion of multiple detection systems, each tuned to detect different forms of attack. In this paper we show that better performance can be achieved when the fusion is performed within the model itself and when the representation is learned automatically from raw waveform inputs. The principal contribution is a spectro-temporal graph attention network (GAT) which learns the relationship between cues spanning different sub-bands and temporal intervals. Using a model-level graph fusion of spectral (S) and temporal (T) sub-graphs and a graph pooling strategy to improve discrimination, the proposed RawGAT-ST model achieves an equal error rate of 1.06% for the ASVspoof 2019 logical access database. This is one of the best results reported to date and is reproducible using an open source implementation. ## 1 Introduction It is well known that cues indicative of spoofing attacks reside in specific sub-bands or temporal segments [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13]. Prior work [10, 9, 14, 11, 12] showed that these can be learned automatically using a model with either spectral or temporal attention. Our most recent work [13] showed the merit of graph attention networks (GATs) to learn the relationships between cues located in different sub-bands or different temporal intervals. We observed that different attention mechanisms spanning either the spectral or the temporal domain, work more or less well for different sets of spoofing attack and that the benefit of both can be exploited through their fusion at the score level. We also found that neither model works as well on its own for the full set of diverse spoofing attacks in the ASVspoof 2019 logical access database. Motivated by psychoacoustics studies [15, 16, 17, 18] which show the power of the human auditory system to select simultaneously the most discriminative spectral bands and temporal segments for a given task, and inspired by the power of GATs to model complex relationships embedded within graph representations, we have explored fusion within the model itself (earlier fusion). The idea is to extend the modelling of relationships between _either_ different sub-bands _or_ different temporal segments using separate models and attention mechanisms to the modelling of relationships spanning different spectro-temporal intervals using a GAT with combined spectro-temporal attention (GAT-ST). The approach facilitates the aggregation of complementary, discriminative information simultaneously in both domains. In a further extension to our past work, the GAT-ST reported in this paper operates directly upon the raw waveform. Such a fully end-to-end approach is designed to maximise the potential of capturing discriminative cues in both spectral and temporal domains. Inspired by work in speaker verification [19, 20, 21, 22] and in building upon our end-to-end anti-spoofing solution reported in [12], the proposed RawGAT-ST model uses a one-dimensional sinc convolution layer to ingest raw audio. The principal contributions of this paper hence include: * • a fully end-to-end architecture comprising feature representation learning and a GAT; * • a novel spectro-temporal GAT which learns the relationships between cues at different sub-band and temporal intervals; * • a new graph pooling strategy to reduce the graph dimension and to improve discrimination; * • an exploration of different model-level, graph fusion strategies. The remainder of this paper is organized as follows. Section 2 describes related works. Section 3 provides an introduction to GATs and describes how they can be applied to anti-spoofing. The proposed RawGAT-ST model is described in Section 4. Experiments and results are presented in Sections 5 and 6. Finally, the paper is concluded in Section 7. ## 2 Related works In recent years, graph neural networks (GNNs) [23, 24, 25, 26, 27] have attracted growing attention, especially variants such as graph convolution networks (GCNs) [28] or GATs [29]. A number of studies have shown the utility and appeal of graph modeling [30, 31, 32, 33] for various speech processing tasks. Zhang et al. [30] applied GCNs to a few-shot audio classification task to derive an attention vector which helps to improve the discrimination between different audio examples. Jung et al. [32] demonstrated the use of GATs as a back-end classifier to model the relationships between enrollment and test utterances for a speaker verification task. Panagiotis et al. [33] used GCNs to exploit the spatial correlations between the different channels (nodes) for a multi-channel speech enhancement problem. Our previous work [13] demonstrated how GATs can be used to model spoofing attack artefacts. This is achieved using a self attention mechanism to emphasize the most informative sub-bands or temporal intervals and the relationships between them. We applied GATs separately to model the relationships in either spectral (GAT-S) or temporal (GAT-T) domains and demonstrated their complementarity through a score-level fusion (i.e., _late_ fusion). Our hypothesis is that the integration of these two models (i.e., _early_ fusion) has better potential to leverage complementary information (spectral and temporal) and further boost performance while using a _single_ model. We present a summary of our original GAT-S/T approach in the next section. The new contribution is described in Section 4. Figure 1: The proposed RawGAT-ST model architecture. The top-left spectral attention block captures discriminative spectral information. The top-right temporal attention block captures discriminative temporal information. Fusion is performed at the model level (middle ellipse). The bottom block comprises the spectro-temporal graph attention model. Figure 2: An illustration of the proposed graph-based process including a graph attention layer and a graph pooling layer for an input graph with 4 nodes. $\textrm{h}_{n}\in\mathbb{R}^{d}$ represents the node representation $n\in N$. The graph attention layer estimates attention weights $\alpha$ between each node pair, aggregating node information, and projecting to a new representation space $\textrm{o}_{n}\in\mathbb{R}^{d^{\prime}}$ with lower output dimensionality $d^{\prime}$. The graph pooling layer reduces the number of nodes to improve discrimination. ## 3 Graph attention networks for anti-spoofing The work in [13] demonstrated the use of GATs to model the relationships between artefacts in different sub-bands or temporal intervals. The GAT learning process is illustrated in Algorithm 1 and is described in the following. A graph is defined as: $\mathcal{G}(N,\mathcal{E},\textrm{{h}}),$ (1) where $N$ is the set of nodes, $\mathcal{E}$ represents the edges between all possible node connections, including self-connections. $\mathcal{G}$ is formed from a higher-level feature representation h (e.g. the output feature map of a residual network), where $\textbf{{h}}\in\mathbb{R}^{N\times d}$. The number of nodes in the set $N$ is the number of spectral sub-bands remaining after temporal averaging applied to each channel or, conversely, the number of temporal frames after spectral averaging. The feature dimensionality of each node $d$ is equal to the number of channels in the feature map. The GAT layer operates upon an input graph $\mathcal{G}$ to produce an output graph $\mathcal{G^{\prime}}$. It aggregates neighboring nodes using learnable weights via a self-attention mechanism. Node features are projected onto another representation learned from the minimisation of a training loss function using an affine transform (dense layer). Nodes are aggregated with attention weights which reflect the connective strength (relationship) between a given node pair. The output graph $\mathcal{G^{\prime}}$ comprises a set of nodes o, where each node $\textrm{o}_{n}$ is derived according to: $\textrm{o}_{n}=\textrm{SeLU}(\textrm{BN}(W_{\textrm{att}}(m_{n})+W_{\textrm{res}}({{\textrm{h}}}_{n}))),$ (2) where SeLU refers to a scaled exponential linear unit [34] activation function, BN refers to batch normalisation [35], ${m}_{n}$ is the aggregated information for node $n$, and $\textrm{h}_{n}\in\mathbb{R}^{d}$ represents the feature vector of node $n\in N$. Each output node $\textrm{o}_{n}\in\mathbb{R}^{d^{\prime}}$ has a target dimensionality $d^{\prime}<d$. $W_{\textrm{att}}$ projects the aggregated information for each node $n$ to the target dimensionality $d^{\prime}$. $W_{\textrm{res}}$ projects the residual (skip) connection output to the same dimension. The information from neighboring nodes is aggregated via self-attention according to: $m_{n}=\sum_{u\in\mathcal{M}(n)\cup\\{n\\}}\alpha_{u,n}{\textrm{h}}_{u},$ (3) where $\mathcal{M}(n)$ refers to the set of neighbouring nodes for node $n$, and $\alpha_{u,n}$ refers to the attention weight between nodes $u$ and $n$. The GAT layer assigns learnable self-attention weights $\alpha$ to each edge. Weights reflect how informative one node is of another, where higher weights imply a higher connective strength. The attention weights are derived according to: $\alpha_{u,n}=\frac{{\operatorname{exp}}(W_{\textrm{map}}({\textrm{h}}_{n}\odot{\textrm{h}}_{u}))}{\sum_{w\in\mathcal{M}(n)\cup\\{n\\}}{\operatorname{exp}}(W_{\textrm{map}}({\textrm{h}}_{n}\odot{\textrm{h}}_{w}))},$ (4) where $W_{\textrm{map}}\in\mathbb{R}^{d}$ is the learnable map applied to the dot product and where $\odot$ denotes element-wise multiplication. Input: $\mathcal{G}$ ( N, $\mathcal{E}$, h) $\textrm{h}_{n}$ $\in$ $\mathbb{R}^{d}$, $n\in N$ for _$n$ $\in$ $N$_ do $\forall u\in\mathcal{M}(n)\cup\\{n\\}$, $\mathcal{M}(n)$ (set of nodes neighboring n ) $\alpha_{u,n}$ $\leftarrow$ softmax$(W_{\textrm{map}}(\textrm{h}_{n}\odot\textrm{h}_{u}))$ $m_{n}$ $\leftarrow$ $\sum_{u}{\alpha_{u,n}\textrm{h}_{u}}$, node aggregation w.r.t Eq. 3 $\textrm{o}_{n}$ $\leftarrow$ SeLU$(\textrm{BN}(W_{\textrm{att}}(m_{n})+W_{\textrm{res}}(\textrm{h}_{n})))$, $\textrm{o}_{n}$ $\in$ $\mathbb{R}^{d^{\prime}}$ end for Output: $\mathcal{G^{\prime}}$ $\leftarrow$ o Algorithm 1 The GAT learning process ## 4 RawGAT-ST model for anti-spoofing and speech deepfake detection In this section, we introduce the proposed raw GAT with spectro-temporal attention (RawGAT-ST) model. It comprises four stages: i) learning higher- level semantic feature representations in truly end-to-end fashion by operating on the raw waveform; ii) a novel graph attention module with spectro-temporal attention; iii) a new graph pooling layer for discriminative node selection; iv) model-level fusion. The architecture is illustrated in Fig. 1 whereas a summary of the network configuration is shown in Table 1. ### 4.1 Front-end (higher-level) feature representation In contrast to our prior work [13] which used hand-crafted features, the RawGAT-ST model operates directly upon the raw waveform [12, 36]. The literature shows that solutions based upon a bank of sinc filters are particularly effective in terms of both convergence stability and performance [20, 37, 12]. Accordingly, we use a sinc convolution layer for front-end feature learning similar to that reported in our previous work [12]. It performs time-domain convolution of the raw waveform with a set of parameterized sinc functions which correspond to rectangular band-pass filters [38, 39]. The centre frequencies of each filter in the filterbank are set according to a mel-scale. For all work reported in this paper, rather than learning cut-in and cut-off frequencies of each sinc filter, we used fixed cut-in and cut-off frequencies to alleviate over-fitting to training data. The output of the sinc layer is transformed to a time-frequency representation by adding one additional channel dimension. The result is fed to a 2-dimensional (2D) residual network [40] to learn higher-level feature representations $\textbf{S}\in\mathbb{R}^{C\times F\times T}$ where $C$, $F$ and $T$ refers to the number of channels, frequency bins and time samples respectively. We use a residual neural network identical to that reported in [12], except for the use of a 2D CNN instead of 1D CNN. A summary of the configuration is shown in Table 1. Each residual block layer consists of batch normalization (BN) with SeLU activation units, 2D convolution and a final max- pooling layer for data downsampling. Table 1: The details of RawGAT-ST model architecture. Numbers denoted in Sinc layer & Conv layer refers to (filter size, stride, number of filters). The output size are refers to (CNN channels, Freq, Time). Separate GAT layers are use for spectral and temporal attention blocks. Layer | Input: 64600 samples | Output shape ---|---|--- Sinc layer | Conv-1D(129,1,70) | (70,64472) | add channel (TF representation) | (1,70,64472) | Maxpool-2D(3) | (1,23,21490) | BN & SeLU | Res block | $\left\\{\begin{array}[]{c}\text{Conv-2D((2,3),1,32)}\\\ \text{BN \& SeLU }\\\ \text{Conv-2D((2,3),1,32)}\\\ \text{Maxpool-2D((1,3))}\\\ \end{array}\right\\}\times$ | 2 | (32,23,2387) Res block | $\left\\{\begin{array}[]{c}\text{Conv-2D((2,3),1,64)}\\\ \text{BN \& SeLU }\\\ \text{Conv-2D((2,3),1,64)}\\\ \text{Maxpool-2D((1,3))}\\\ \end{array}\right\\}\times$ | 4 | (64,23,29) Spectral-attention | Temporal-attention $\textrm{max}_{\textrm{T}}(\textrm{abs}())=(64,23)$ | $\textrm{max}_{\textrm{F}}(\textrm{abs}())=(64,29)$ GAT layer =(32,23) | GAT layer =(32,29) Graph pooling=(32,14) | Graph pooling=(32,23) Projection=(32,12) | Projection=(32,12) | element-wise addition | (32,12) Fusion layer | element-wise multiplication | (32,12) | concatenation (along feature dim) | (64,12) Spectro- | GAT layer | (16,12) temporal | Graph pooling | (16,7) attention | Projection (along feature dim) | (1,7) Output | FC(2) | 2 Figure 3: An illustration of the graph pooling layer [41]. The input graph $\textbf{X}\in\mathbb{R}^{N\times d}$ has $4$ nodes and feature dimensionality $d=4$. $q\in\mathbb{R}^{d\times 1}$ is a learnable projection vector. Projection scores $y$ are obtained from the dot product between $q$ and the input feature vector $X_{n}$ for each node. The indices $idx$ corresponding to the nodes with the top-k highest projection scores are used to form a new pooled graph $\textrm{{X}}^{\prime}$ from the element-wise multiplication of ${\textbf{{X}}_{n_{idx}}}$ with $\textrm{sigmoid}({y_{n_{idx}}})$ (Eq. 8). ### 4.2 Spectro-temporal attention The new approach to bring spectro-temporal graph attention to a single model is a core contribution of this work. An overview of the proposed RawGAT-ST model architecture is illustrated in Fig. 1. The input to the RawGAT-ST is a higher-level feature map (top of Fig. 1). The RawGAT-ST model itself comprises three principal blocks, each of which contains a single GAT layer: a spectral attention block (top-left of Fig. 1); a temporal attention block (top-right); a final spectro-temporal attention block (bottom). The spectral and temporal attention blocks have the goal of identifying spectral and temporal cues. The third, spectro-temporal attention block operates upon the pair of resulting graphs to model the relationships spanning both domains. All three blocks contain GAT and graph pooling layers. The operation of both processes is illustrated in Fig. 2. The GAT layer operates upon an input graph $\mathcal{G}(N,\mathcal{E},\textrm{h})$ and produces an output graph $\mathcal{G^{\prime}}(N,\mathcal{E},\textrm{o})$ by aggregating node information using self-attention weights between node pairs. The example in Fig. 2 shows the operation upon a 4-node input graph where the GAT layer reduces the node dimension from $d$ to $d^{\prime}$. This process is first applied separately with attention to either spectral or temporal domains to model the relationships between spectral or temporal artefacts present in the different sub-band or temporal intervals. Both spectral and temporal blocks operate upon the higher-level feature map $\textbf{S}\in\mathbb{R}^{C\times F\times T}$. The spectral and temporal attention blocks first collapse temporal and spectral information respectively to a single dimension via max-pooling before the GAT layer. For the spectral attention block, max-pooling is applied to absolute values across the temporal dimension thereby giving a spectral feature map $\textrm{{f}}\in\mathbb{R}^{C\times F}$: $\textbf{f}=\max_{\textrm{T}}(\textrm{abs}(\textbf{S})),\vspace{0.2cm}$ (5) The temporal attention block operates instead across the spectral dimension giving a temporal feature map $\textrm{{t}}\in\mathbb{R}^{C\times T}$: $\textbf{t}=\max_{\textrm{F}}(\textrm{abs}(\textbf{S})),$ (6) Since S is derived from temporal data and hence contains both positive and negative values, use of absolute values in Eqs. 5 and 6 prevents meaningful negative-valued data from being discarded. Graphs $\mathcal{G}_{\textrm{{f}}}\in\mathbb{R}^{N_{\textbf{f}}\times d}$ and $\mathcal{G}_{\textrm{{t}}}\in\mathbb{R}^{N_{\textbf{t}}\times d}$ are then constructed from the transpose of f and t feature maps, respectively. $\mathcal{G}_{\textrm{{f}}}$ contains a set of $23$ nodes (the number of spectral bins) whereas $\mathcal{G}_{\textrm{{t}}}$ contains a set of $29$ nodes (the number of temporal segments). Both graphs have a common dimensionality of $d=64$. Separate GAT layers are then applied to both $\mathcal{G}_{\textrm{{f}}}$ and $\mathcal{G}_{\textrm{{t}}}$ to model the relationships between different sub-bands and temporal segments thereby producing a pair of new output graphs $\mathcal{G}_{\textrm{{f}}}^{{}^{\prime}}\in\mathbb{R}^{N_{\textbf{f}}\times d^{\prime}}$ and $\mathcal{G}_{\textrm{{t}}}^{{}^{\prime}}\in\mathbb{R}^{N_{\textbf{t}}\times d^{\prime}}$ with a common, reduced output feature dimensionality $d^{\prime}=32$. ### 4.3 Graph pooling As illustrated in Fig. 1, a graph pooling layer is included in all three GAT blocks. Graph pooling generates more discriminative graphs by selecting a subset of the most informative nodes. In the example illustrated in Fig. 2 the graph pooling layer reduces the number of nodes from 4 to 3. The approach is based upon the graph pooling layer in the recently proposed Graph U-Net architecture [41]. An example is illustrated in Fig. 3. The process is described in the following. Graph pooling uses a learnable projection vector $q\in\mathbb{R}^{d\times 1}$. The dot-product between the input feature vector for each node $X_{n}\in\mathbb{R}^{1\times d}$ where, $n\in N$, and $q$ gives projection scores $y_{n}$: $y_{n}=X_{n}\cdot q,\vspace{0.1cm}$ (7) Nodes in the input graph X corresponding to the top-$k$-hot vector $y^{\prime}$ are then retained according to element-wise multiplication: $\textrm{{X}}^{\prime}={\textrm{X}_{n_{idx}}}\odot\textrm{sigmoid}({y_{n_{idx}}}),$ (8) where the pooling ratio $k$ is a hyperparameter, and where $\textrm{X}_{n_{idx}}$ and ${y_{n_{idx}}}$ are the node features and projection scores selected corresponding to the highest top-$k$ indices, $idx$. All other nodes are purged. The complete process is illustrated in Fig. 3 for an input graph X with $4$ nodes, each of dimension $d=4$. Finally, pooled graph representations $\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and $\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$ are generated from the original spectral $\mathcal{G^{\prime}}_{\textrm{{f}}}$ and temporal $\mathcal{G^{\prime}}_{\textrm{{t}}}$ output graphs, respectively. Since spectral and temporal pooled graphs $\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and $\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$ have different number of nodes, $14$ for $\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ and $23$ for $\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$. Hence, both graph nodes are projected into the same dimensional space using an affine-transform to match the input node dimensionality of the fusion layer. ### 4.4 Model-level fusion Model-level fusion (ellipse in Fig. 1) is used to exploit complementary information captured by the spectral and temporal attention graphs. We studied three different approaches to model-level fusion : $\mathcal{G}_{{\textbf{ft}}}=\left\\{\begin{aligned} \mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\oplus&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\\\ \mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\odot&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\\\ \mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}&\ ||&\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}\end{aligned}\right.$ (9) where the fused graph $\mathcal{G}_{\textbf{ft}}\in\mathbb{R}^{{N_{\textbf{ft}}}\times{d_{\textbf{ft}}}}$ is generated from one of the fusion approaches in Eq. 9. It acts to combine the spectral pooled graph $\mathcal{G^{\prime}}_{{\textrm{{f}}}_{\textrm{pooled}}}$ with the temporal pooled graph $\mathcal{G^{\prime}}_{{\textrm{{t}}}_{\textrm{pooled}}}$. A fused graph $\mathcal{G}_{\textbf{ft}}$ contains a set of $12$ nodes and feature dimensionality $d_{\textbf{ft}}=32$. The three different operators in Eq. 9 are element-wise addition $\oplus$, multiplication $\odot$ and concatenation $||$. A third GAT layer is then applied to $\mathcal{G}_{{\textbf{ft}}}$ to produce output graph $\mathcal{G^{\prime}}_{\textbf{ft}}\in\mathbb{R}^{N_{\textbf{ft}}\times d^{\prime}_{\textbf{ft}}}$, where $d^{\prime}_{\textbf{ft}}=16$ is the output feature dimensionality. Graph pooling is then applied one last time to generate a pooled graph $\mathcal{G^{\prime}}_{\textbf{ft}_{\textrm{pooled}}}$. The final two-class prediction (bona fide or spoofed) is then obtained using projection and output layers. ## 5 Experimental setup Described in this section are the database, metrics and baseline systems used for our experiments, together with specific implementation details of the RawGAT-ST model. ### 5.1 Database and evaluation metric Experiments were performed on the ASVspoof 2019 logical access (LA) database [42, 43]. It has three independent partitions: train; development; evaluation. Spoofed speech is generated using a set of different speech synthesis and voice conversion algorithms [42]. The training and development partitions were created with a set of 6 different attacks (A01-A06), whereas the evaluation set was created with a set of 13 attacks (A07-A19). We used the minimum normalised tandem detection cost function (t-DCF) [44, 45] as a primary metric but also report results in terms of the pooled equal error rate (EER) [46]. ### 5.2 Baseline The baseline is an end-to-end RawNet2 system [12]. It is among the best- performing, reproducible solutions. The first sinc layer is initialised with a bank of 128 mel-scaled filters. Each filter has an impulse response of 129 samples ( 8 ms duration) which is convolved with the raw waveform. The latter are truncated or concatenated to give segments of approximately $4$ seconds duration (64,600 samples). It is followed by a residual network and a gated recurrent unit (GRU) to predict whether the input audio is bona fide or spoofed speech. Full details of the baseline system are available in [12]. Our temporal and spectral GAT systems introduced in [13] are not used as baselines in this work since they are not E2E systems; unlike the spectro- temporal GAT system introduced in this paper, they operate upon hand-crafted features. Nonetheless, we do report results for E2E temporal and spectral GAT solutions which are based upon the appropriate sub-blocks illustrated in Fig. 1. Use of these temporal and spectral GAT variants is necessary in order that differences in performance can be attributed solely to use of the proposed spectro-temporal GAT model and not also from differences in the first network layer. Details are described in Section 6.2. ### 5.3 RawGAT-ST implementation In contrast to the baseline RawNet2 system and in order to reduce computational complexity, we reduced the number of filters in the first layer to $70$. To improve generalisation, we added channel masking in similar fashion to the frequency masking [47, 14, 48] to mask (set to zero) the output of a random selection of contiguous sinc channels during training. The same channel mask is applied to all training data within each mini-batch. The number of masked channels is chosen from a uniform distribution between $0$ and $F_{\textrm{mask}}$, where $F_{\textrm{mask}}=14$ is the maximum number of masked channels selected based on minimum validation loss. While attention helps the model to focus on the most discriminative spectral sub-bands and temporal segments, channel masking improves generalization by ensuring that information at all sub-bands and segments is used at least to some extent. In contrast to usual practice, we also use fewer filters ($32$ and $64$) in the first and second residual blocks to further protect generalisation to unseen attacks [49]. Graph pooling is applied with empirically selected pooling ratios of $k$ = 0.64, 0.81, and 0.64 for spectral, temporal and spectro- temporal attention blocks respectively. The complete architecture is trained using the ASVspoof 2019 LA training partition to minimise a weighted cross entropy (WCE) loss function, where the ratio of weights assigned to bonafide and spoofed trials are 9:1 to manage the data imbalance in the training set. We used the standard Adam optimiser [50] with a mini-batch size of $10$ and a fixed learning rate of $0.0001$ and train for $300$ epochs. The feature extractor and back-end classifier are jointly optimised using back-propagation [51]. The best model was selected based on the minimum validation loss (loss on development set). The spectro-temporal GAT model has only 0.44M parameters and is comparatively light weight compared to the baseline as well as other state of the art systems. All experiments were performed on a single GeForce RTX 3090 GPU and reproducible with the same random seed and GPU environment using an open source implementation 111https://github.com/eurecom-asp/RawGAT-ST-antispoofing. ## 6 Experimental Results In this section, we present our results, an ablation study and a comparison of our results to those of existing, state-of-the-art single systems. Table 2: Results for the ASVspoof 2019 logical access (LA) database in terms of min t-DCF for each attack in the evaluation partition (A07-A19). Pooled min t-DCF (P1) and pooled EER (P2) are shown in the last two columns. Results shown for the end-to-end RawNet2 baseline system and the three RawGAT-ST based systems introduced in this paper. System | A07 | A08 | A09 | A10 | A11 | A12 | A13 | A14 | A15 | A16 | A17 | A18 | A19 | P1 | P2 ---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|--- RawNet2-baseline [12, 13] | .098 | .179 | .073 | .089 | .042 | .088 | .020 | .013 | .073 | .046 | .240 | .629 | .058 | 0.1547 | 5.54 RawGAT-ST-add | .011 | .030 | .004 | .016 | .009 | .019 | .007 | .007 | .014 | .027 | .053 | .104 | .023 | 0.0373 | 1.15 RawGAT-ST-concat | .021 | .027 | .003 | .027 | .008 | .029 | .015 | .008 | .022 | .029 | .046 | .120 | .022 | 0.0388 | 1.23 RawGAT-ST-mul | .010 | .016 | .002 | .012 | .010 | .010 | .010 | .009 | .009 | .023 | .055 | .080 | .024 | 0.0335 | 1.06 ### 6.1 Results Results are illustrated in Table 2, where the last two columns P1 and P2 indicate pooled min t-DCF and pooled EER results for the baseline system (RawNet2) and three different configurations of the new RawGAT-ST system. The variants involve the use of different spectro-temporal fusion strategies. Whereas all RawGAT-ST systems outperform the baseline by a substantial margin, the best result is obtained using the RawGAT-ST-mul system for which the t-DCF is 0.0335 (cf. 0.1547 for the baseline) and the EER is 1.06% (5.54%). These results show that all RawGAT-ST systems are effective in exploiting spectro-temporal attention and to model the relationships between different spectro-temporal estimates, thereby improving the discrimination between spoofed and bona fide inputs. We now seek to demonstrate the merit of early fusion at the model level, rather than late fusion at the score level. This is done by way of ablation experiments. ### 6.2 Ablation study Only through ablation experiments can we properly demonstrate the merit of the RawGAT-ST approach; we cannot use results from our previous work [13] since they were generated using hand-crafted features. Through ablation, we essentially remove one of the blocks or operations in the full RawGAT-ST architecture illustrated in Fig. 1. The remaining blocks and operations are then used as before. Results are illustrated in Table 3. The middle row highlighted in boldface is the RawGAT-ST-mul result that is also illustrated in Table 2. Ablation of the spectral GAT attention block (top left in Fig. 1) leaves the system being capable of exploiting only temporal attention. Without spectral attention (first row of Table 3), performance degrades by 34% relative to the full system (0.0514 cf. 0.0335). The degradation without temporal attention (0.0385) is less severe (13% relative), indicating the greater importance of spectral attention versus temporal attention, even if both are beneficial. Last, we demonstrate the benefit of graph pooling by ablating the pooling layers in all three blocks. The relative degradation in performance of 58% (0.0788 cf. 0.0335) is even more substantial and shows the benefit of using graph pooling to concentrate on the most informative node features. Table 3: Results for ablation studies System | min-tDCF | EER ---|---|--- w/o spectral attention | 0.0514 | 1.87 w/o temporal attention | 0.0385 | 1.13 w/ spectro-temporal attention | 0.0335 | 1.06 w/o graph pooling | 0.0788 | 2.47 ### 6.3 Performance comparison Illustrated in Table 4 is a comparison of performance for the proposed RawGAT- ST system and competing single systems reported in the literature [52]. The comparison shows that our system which uses GATs with self attention outperforms alternative attention approaches such as: Convolutional Block Attention Module (CBAM); Squeeze-and-Excitation (SE); Dual attention module with pooling and convolution operations. Furthermore, to the best of our knowledge, our approach is the best single model system reported in the literature to date. Our system is also one of only two that operates on the raw signal. With only 0.44M parameters, the proposed RawGAT-ST system is also among the least complex; only the Res-TSSDNet (0.35M) [36] and LCNN-LSTM-sum (0.27M) [53] have fewer parameters, while our system performs better. Despite the simplicity, the RawGAT-ST system outperforms our previous best temporal GAT system with late score fusion [13] (row 12 in Table 4) by 63% and 77% relative in terms of min t-DCF and EER respectively. This result also points towards the benefit of operating directly upon the raw signal in fully end-to- end fashion. Table 4: Performance for the ASVspoof 2019 evaluation partition in terms of pooled min t-DCF and pooled EER for different state-of-the-art single systems and the best performing RawGAT-ST-mul system (boldface). Only the top two RawGAT-ST and Res-TSSDNet systems operate directly upon raw inputs; all others use some form of hand-crafted representations. System | front-end | min-tDCF | EER ---|---|---|--- RawGAT-ST (mul) | Raw-audio | 0.0335 | 1.06 Res-TSSDNet [36] | Raw-audio | 0.0481 | 1.64 MCG-Res2Net50+CE [54] | CQT | 0.0520 | 1.78 ResNet18-LMCL-FM [14] | LFB | 0.0520 | 1.81 LCNN-LSTM-sum [53] | LFCC | 0.0524 | 1.92 Capsule network [55] | LFCC | 0.0538 | 1.97 Resnet18-OC-softmax [56] | LFCC | 0.0590 | 2.19 MLCG-Res2Net50+CE [54] | CQT | 0.0690 | 2.15 SE-Res2Net50 [57] | CQT | 0.0743 | 2.50 LCNN-Dual attention [58] | LFCC | 0.0777 | 2.76 Resnet18-AM-Softmax [56] | LFCC | 0.0820 | 3.26 ResNet18-GAT-T [13] | LFB | 0.0894 | 4.71 GMM [11] | LFCC | 0.0904 | 3.50 ResNet18-GAT-S [13] | LFB | 0.0914 | 4.48 PC-DARTS [59] | LFCC | 0.0914 | 4.96 Siamese CNN [60] | LFCC | 0.0930 | 3.79 LCNN-4CBAM [58] | LFCC | 0.0939 | 3.67 LCNN+CE [61] | DASC-CQT | 0.0940 | 3.13 LCNN [62] | LFCC | 0.1000 | 5.06 LCNN+CE [63] | CQT | 0.1020 | 4.07 ResNet [64] | CQT-MMPS | 0.1190 | 3.72 ## 7 Conclusions Inspired from previous findings which show that different attention mechanisms work more or less well for different forms of spoofing attack, we report in this paper a novel graph neural network approach to anti-spoofing and speech deepfake detection based on model-level spectro-temporal attention. The RawGAT-ST solution utilises a self attention mechanism to learn the relationships between different spectro-temporal estimates and the most discriminative nodes within the resulting graph. The proposed solution also operates directly upon the raw waveform, without the use of hand-crafted features, and is among the least complex of all solutions reported thus far. Experimental results for the standard ASVspoof 2019 logical access database show the success of our approach and are the best reported to date by a substantial margin. Results for an ablation study show that spectral attention is more important than temporal attention, but that both are beneficial, and that graph pooling improves performance substantially. Last, a comparison of different systems, working either on the raw signal or hand-crafted inputs show the benefit of a fully end-to-end approach. We foresee a number of directions with potential to improve performance further. These ideas include the use of learnable pooling ratios to optimise the number of node features retained after graph pooling and the use of a learnable weighted selective fusion module to dynamically select the most discriminative features from spectral and temporal attention networks. Working with the latest ASVspoof 2021 challenge database [65], these ideas are the focus of our ongoing work. ## 8 Acknowledgements This work is supported by the VoicePersonae project funded by the French Agence Nationale de la Recherche (ANR) and the Japan Science and Technology Agency (JST). ## References * [1] M. Sahidullah, T. Kinnunen, and C. Hanilci, “A comparison of features for synthetic speech detection,” in Proc. of the International Speech Communication Association (INTERSPEECH), 2015, pp. 2087–2091. * [2] K. Sriskandaraja, V. Sethu, P. Ngoc Le, and E. Ambikairajah, “Investigation of sub-band discriminative information between spoofed and genuine speech,” in Proc. INTERSPEECH, 2016, pp. 1710–1714. * [3] M. Witkowski, S. Kacprzak, P. Zelasko, K. Kowalczyk, and J. Galka, “Audio replay attack detection using high-frequency features.,” in Proc. INTERSPEECH, 2017, pp. 27–31. * [4] P. Nagarsheth, E. Khoury, K. Patil, and M. Garland, “Replay attack detection using DNN for channel discrimination.,” in Proc. INTERSPEECH, 2017, pp. 97–101. * [5] L. Lin, R. Wang, and Y. Diqun, “A replay speech detection algorithm based on sub-band analysis,” in International Conference on Intelligent Information Processing (IIP), Nanning, China, 2018, pp. 337–345. * [6] B. Chettri, D. Stoller, V. Morfi, M. A. M. Ramírez, E. Benetos, and B. L Sturm, “Ensemble models for spoofing detection in automatic speaker verification,” in Proc. INTERSPEECH, 2019, pp. 1118–1112. * [7] J. Yang, R. K Das, and H. Li, “Significance of subband features for synthetic speech detection,” IEEE Transactions on Information Forensics and Security, 2019. * [8] S. Garg, S. Bhilare, and V. Kanhangad, “Subband analysis for performance improvement of replay attack detection in speaker verification systems,” in International Conference on Identity, Security, and Behavior Analysis (ISBA), 2019. * [9] B. Chettri, T. Kinnunen, and E. Benetos, “Subband modeling for spoofing detection in automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2020. * [10] H. Tak, J. Patino, A. Nautsch, N. Evans, and M. Todisco, “An explainability study of the constant Q cepstral coefficient spoofing countermeasure for automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2020, pp. 333–340. * [11] H. Tak, J. Patino, A. Nautsch, et al., “Spoofing Attack Detection using the Non-linear Fusion of Sub-band Classifiers,” in Proc. INTERSPEECH, 2020, pp. 1106–1110. * [12] H. Tak, J. Patino, M. Todisco, A. Nautsch, N. Evans, and A. Larcher, “End-to-end anti-spoofing with rawnet2,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021. * [13] H. Tak, J.-w. Jung, J. Patino, M. Todisco, and N. Evans, “Graph attention networks for anti-spoofing,” in Proc. INTERSPEECH, 2021. * [14] T. Chen, A. Kumar, P. Nagarsheth, G. Sivaraman, and E. Khoury, “Generalization of audio deepfake detection,” in Proc. Speaker Odyssey Workshop, 2020, pp. 132–137. * [15] J. Youngberg and S. Boll, “Constant-q signal analysis and synthesis,” in Proc. ICASSP, 1978, pp. 375–378. * [16] J. Brown, “Calculation of a constant Q spectral transform,” Journal of the Acoustical Society of America (JASA), vol. 89, no. 1, pp. 425–434, 1991. * [17] C. Schörkhuber, A. Klapuri, N. Holighaus, and M. Dörfler, “A matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution,” in Proc. Audio Engineering Society International Conference on Semantic Audio, London, UK, 2014. * [18] M. Todisco, H. Delgado, and N. Evans, “A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients,” in Proc. Speaker Odyssey Workshop, 2016, pp. 249–252. * [19] J. Jung, H. Heo, I. Yang, H. Shim, and H. Yu, “Avoiding speaker overfitting in end-to-end dnns using raw waveform for text-independent speaker verification,” in Proc. INTERSPEECH, 2018, pp. 3583–3587. * [20] M. Ravanelli and Y. Bengio, “Speaker recognition from raw waveform with sincnet,” in IEEE Proc. Spoken Language Technology Workshop (SLT), 2018, pp. 1021–1028. * [21] M. R Kamble, H. B Sailor, H. A Patil, and H. Li, “Advances in anti-spoofing: from the perspective of asvspoof challenges,” APSIPA Transactions on Signal and Information Processing, vol. 9, 2020. * [22] J.-w. Jung, S.-b. Kim, H.-j. Shim, J.-h. Kim, and H.-J. Yu, “Improved RawNet with Filter-wise Rescaling for Text-independent Speaker Verification using Raw Waveforms,” in Proc. INTERSPEECH, 2020, pp. 1496–1500. * [23] M. Gori, G. Monfardini, and F. Scarselli, “A new model for learning in graph domains,” in Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005. IEEE, 2005, vol. 2, pp. 729–734. * [24] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner, and G. Monfardini, “The graph neural network model,” IEEE transactions on neural networks, vol. 20, no. 1, pp. 61–80, 2009. * [25] M. M Bronstein, J. Bruna, Y. LeCun, A. Szlam, and P. Vandergheynst, “Geometric deep learning: going beyond euclidean data,” IEEE Signal Processing Magazine, vol. 34, no. 4, pp. 18–42, 2017\. * [26] W. L Hamilton, R. Ying, and J. Leskovec, “Inductive representation learning on large graphs,” in Proc. Conference on Neural Information Processing Systems (NIPS), 2017, pp. 1025–1035. * [27] Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and S Yu Philip, “A comprehensive survey on graph neural networks,” IEEE transactions on neural networks and learning systems, vol. 32, no. 1, pp. 4–24, 2020. * [28] T. N. Kipf and M. Welling, “Semi-supervised classification with graph convolutional networks,” in International Conference on Learning Representations (ICLR), 2017\. * [29] P. Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio, “Graph attention networks,” in Proc. ICLR, 2018. * [30] S. Zhang, Y. Qin, K. Sun, and Y. Lin, “Few-shot audio classification with attentional graph neural networks.,” in INTERSPEECH, 2019, pp. 3649–3653. * [31] R. Liu, B. Sisman, and H. Li, “Graphspeech: Syntax-aware graph attention network for neural speech synthesis,” in Proc. ICASSP, 2021. * [32] J.-w. Jung, H.-S. Heo, H.-J. Yu, and J. S. Chung, “Graph attention networks for speaker verification,” in Proc. ICASSP, 2021. * [33] P. Tzirakis, A. Kumar, and J. Donley, “Multi-channel speech enhancement using graph neural networks,” in Proc. ICASSP, 2021, pp. 3415–3419. * [34] G. Klambauer, T. Unterthiner, A. Mayr, and S. Hochreiter, “Self-normalizing neural networks,” in Proc. NIPS, 2017, pp. 972–981. * [35] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” in International Conference on Machine Learning (ICML), 2015, pp. 448–456. * [36] G. Hua, A. Beng jin teoh, and H. Zhang, “Towards end-to-end synthetic speech detection,” IEEE Signal Processing Letters, 2021. * [37] J.-w. Jung, H.-S. Heo, J.-h. Kim, H.-j. Shim, and H.-J. Yu, “Rawnet: Advanced end-to-end deep neural network using raw waveforms for text-independent speaker verification,” in Proc. INTERSPEECH, 2019, pp. 1268–1272. * [38] T. F Quatieri, Discrete-time speech signal processing: principles and practice, Pearson Education, 2006. * [39] J. R Deller Jr, J. G Proakis, and J. H Hansen, Discrete time processing of speech signals, Prentice Hall PTR, 1993. * [40] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. CVPR, 2016, pp. 770–778. * [41] H. Gao and S. Ji, “Graph u-nets,” in international conference on machine learning (PMLR), 2019, pp. 2083–2092. * [42] X. Wang, J. Yamagishi, M. Todisco, H. Delgado, A. Nautsch, N. Evans, M. Sahidullah, V. Vestman, T. Kinnunen, K. A Lee, et al., “ASVspoof 2019: a large-scale public database of synthetized, converted and replayed speech,” Computer Speech & Language (CSL), vol. 64, 2020, 101114\. * [43] M. Todisco, X. Wang, V. Vestman, M. Sahidullah, H. Delgado, A. Nautsch, et al., “ASVspoof 2019: Future horizons in spoofed and fake audio detection,” in Proc. INTERSPEECH, 2019, pp. 1008–1012. * [44] T. Kinnunen, K. Lee, H. Delgado, N. Evans, M. Todisco, J. Sahidullah, M.and Yamagishi, and D. A Reynolds, “t-DCF: A detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification,” in Proc. Speaker Odyssey Workshop, 2018, pp. 312–319. * [45] T. Kinnunen, H. Delgado, N. Evans, K. A. Lee, V. Vestman, A. Nautsch, M. Todisco, X. Wang, M. Sahidullah, J. Yamagishi, and D. A. Reynolds, “Tandem assessment of spoofing countermeasures and automatic speaker verification: Fundamentals,” IEEE/ACM Transactions on Audio Speech and Language Processing (TASLP), vol. 28, pp. 2195 – 2210, 2020. * [46] N. Brümmer and E. de Villiers, “The BOSARIS toolkit user guide: Theory, algorithms and code for binary classifier score processing,” 2011. * [47] D. S Park, W. Chan, Y. Zhang, C.-C. Chiu, B. Zoph, E. D Cubuk, and Q. V Le, “Specaugment: A simple data augmentation method for automatic speech recognition,” in Proc. INTERSPEECH, 2019, pp. 2613–2617. * [48] H. Wang, Y. Zou, and W. Wang, “Specaugment++: A hidden space data augmentation method for acoustic scene classification,” in Proc. INTERSPEECH, 2021. * [49] P. Parasu, J. Epps, K. Sriskandaraja, and G. Suthokumar, “Investigating light-resnet architecture for spoofing detection under mismatched conditions,” in Proc. INTERSPEECH, 2020, pp. 1111–1115. * [50] D. P Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014. * [51] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016, http://www.deeplearningbook.org. * [52] A. Nautsch, X. Wang, N. Evans, T. Kinnunen, V. Vestman, M. Todisco, H. Delgado, M. Sahidullah, J. Yamagishi, and K. A. Lee, “ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech,” IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), vol. 3, 2021. * [53] X. Wang and J. Yamagishi, “A comparative study on recent neural spoofing countermeasures for synthetic speech detection,” in Proc. INTERSPEECH, 2021. * [54] X. Li, X. Wu, H. Lu, X. Liu, and H. Meng, “Channel-wise gated res2net: Towards robust detection of synthetic speech attacks,” in Proc. INTERSPEECH, 2021. * [55] A. Luo, E. Li, Y. Liu, X. Kang, and Z J. Wang, “A capsule network based approach for detection of audio spoofing attacks,” in Proc. ICASSP, 2021, pp. 6359–6363. * [56] Y. Zhang, F. Jiang, and Z. Duan, “One-class learning towards synthetic voice spoofing detection,” IEEE Signal Processing Letters, vol. 28, pp. 937–941, 2021. * [57] X. Li, N. Li, C. Weng, X. Liu, D. Su, D. Yu, and H. Meng, “Replay and synthetic speech detection with res2net architecture,” in Proc. ICASSP, 2021, pp. 6354–6358. * [58] X. Ma, T. Liang, S. Zhang, S. Huang, and L. He, “Improved lightcnn with attention modules for asv spoofing detection,” in 2021 IEEE International Conference on Multimedia and Expo (ICME), 2021, pp. 1–6. * [59] W. Ge, M. Panariello, J. Patino, M. Todisco, and N. Evans, “Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection,” in Proc. INTERSPEECH, 2021. * [60] Z. Lei, Y. Yang, C. Liu, and J. Ye, “Siamese convolutional neural network using gaussian probability feature for spoofing speech detection,” in Proc. INTERSPEECH, 2020, pp. 1116–1120. * [61] R. K. Das, J. Yang, and H. Li, “Data augmentation with signal companding for detection of logical access attacks,” in Proc. ICASSP, 2021, pp. 6349–6353. * [62] G. Lavrentyeva, S. Novoselov, A. Tseren, et al., “STC antispoofing systems for the ASVspoof2019 challenge,” in Proc. INTERSPEECH, 2019, pp. 1033–1037. * [63] Z. Wu, R. K. Das, J. Yang, and H. Li, “Light convolutional neural network with feature genuinization for detection of synthetic speech attacks,” in Proc. INTERSPEECH, 2020, pp. 1101–1105. * [64] J. Yang, H. Wang, R. K. Das, and Y. Qian, “Modified magnitude-phase spectrum information for spoofing detection,” IEEE/ACM TASLP, vol. 29, pp. 1065–1078, 2021. * [65] J. Yamagishi, X. Wang, M. Todisco, M. Sahidullah, J. Patino, A. Nautsch, X. Liu, K. A. Lee, T. Kinnunen, N. Evans, and H. Delgado, “ASVspoof2021: accelerating progress in spoofed and deep fake speech detection,” in Proc. ASVspoof 2021 Workshop, 2021.
arxiv-papers
2021-07-27T10:11:41
2024-09-04T03:07:21.194041
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Hemlata Tak, Jee-weon Jung, Jose Patino, Madhu Kamble, Massimiliano\n Todisco and Nicholas Evans", "submitter": "Hemlata Tak", "url": "https://arxiv.org/abs/2107.12710" }
2107.12712
††thanks: These authors contributed equally to this work††thanks: These authors contributed equally to this work††thanks: These authors contributed equally to this work # Gapless Spin Liquid Behavior in A Kagome Heisenberg Antiferromagnet with Randomly Distributed Hexagons of Alternate Bonds Jiabin Liu Wuhan National High Magnetic Field Center and School of Physics, Huazhong University of Science and Technology, 430074 Wuhan, China Long Yuan Wuhan National High Magnetic Field Center and School of Physics, Huazhong University of Science and Technology, 430074 Wuhan, China Xuan Li Institute of Physics, Chinese Academy of Sciences, P.O. Box 603, Beijing 100190, China University of Chinese Academy of Sciences, Beijing 100049, China Boqiang Li Wuhan National High Magnetic Field Center and School of Physics, Huazhong University of Science and Technology, 430074 Wuhan, China Kan Zhao School of Physics, Beihang University, Beijing 100191, China Haijun Liao [email protected] Institute of Physics, Chinese Academy of Sciences, P.O. Box 603, Beijing 100190, China Songshan Lake Materials Laboratory, Dongguan, Guangdong 523808, China Yuesheng Li [email protected] Wuhan National High Magnetic Field Center and School of Physics, Huazhong University of Science and Technology, 430074 Wuhan, China ###### Abstract We demonstrate that the new single crystal of YCu3[OH(D)]6.5Br2.5 (YCOB) is a kagome Heisenberg antiferromagnet (KHA) without evident orphan spins ($\ll$ 0.8%). The site mixing between polar OH- and non-polar Br- causes local distortions of Cu-O-Cu exchange paths, and gives rise to 70(2)% of randomly distributed hexagons of alternate bonds ($\sim$ $J_{1}-\Delta J$ and $J_{1}+\Delta J$) and the rest of almost uniform hexagons ($\sim$ $J_{1}$) on the kagome lattice. Simulations of the random exchange model with $\Delta J$/$J_{1}$ = 0.7(1) show good agreement with the experimental observations, including the weak upturn seen in susceptibility and the slight polarization in magnetization. Despite the average antiferromagnetic coupling of $J_{1}$ $\sim$ 60 K, no conventional freezing is observed down to $T$ $\sim$ 0.001$J_{1}$, and the raw specific heat exhibits a nearly quadratic temperature dependence below 1 K $\sim$ 0.02$J_{1}$, phenomenologically consistent with a gapless (spin gap $\leq$ 0.025$J_{1}$) Dirac quantum spin liquid (QSL). Our result sheds new light on the theoretical understanding of the randomness-relevant gapless QSL behavior in YCOB, as well as in other relevant materials. ## I Introduction The search for quantum spin liquid (QSL) has become one of the central topics in the fields spanning experiment and theory since Anderson’s initial proposal [1]. QSLs are intimately related to the realizing of the topological quantum computation [2] and the understanding of the high temperature superconductivity [3] due to exotic fractional excitations [4] and other emergent properties [5, 6, 7, 8]. The $S$ = $\frac{1}{2}$ kagome Heisenberg antiferromagnet (KHA) [9, 10, 11, 12, 13, 14, 15, 16, 17] is one of the most promising candidates hosting QSLs. Despite recent progress, the precise nature of the QSL in the KHA remains elusive. Previous density-matrix renormalization group (DMRG) studies imply a fully gapped $\mathbb{Z}_{2}$ QSL ground state (GS) [16, 17], but variational Monte Carlo [11, 18, 19], tensor network [12], and more recent DMRG [13] calculations suggest a gapless Dirac QSL. Experimentally, many prominent $S$ = $\frac{1}{2}$ KHAs have been extensively studied, including ZnCu3(OH)6Cl2 (herbertsmithite) [20, 21, 22, 23, 24, 25, 26, 27, 28], $\alpha$-Cu3Zn(OH)6Cl2 (kapellasite) [29, 30], Cu3Zn(OH)6FBr [31, 32], [NH4]2[C7H14N][V7O6F18] [33, 34], (CH3NH3)2NaTi3F12 [35], ZnCu3(OH)6SO4 [36, 37, 38], etc. They show no conventional magnetic transitions down to the lowest measuring temperature, despite the strong exchange couplings. However, most of these candidates suffer from 4–27% of magnetic defects [28, 30, 25, 31, 34, 35, 36]. Orphan spins created by these magnetic defects contribute a pronounced Curie-like tail of magnetic susceptibility [22, 34] and Schottky- like anomaly of specific heat [23, 34] at low temperatures ($\leq$ 100 K), and thus prevent us from probing the intrinsic low-energy properties [39]. Therefore, achieving ultrahigh-quality materials is still the key challenge for the study of kagome QSLs [6]. Recently, a new kagome QSL candidate, nondeuterated YCu3(OH)6.5Br2.5, had been successfully synthesized [40] by Chen _et al._ The magnetic Cu2+ ($S$ = $\frac{1}{2}$) ions were expected to fully occupy the regular kagome sites, and be free from the site mixing with other nonmagnetic ions [40]. Despite the strong antiferromagnetic coupling, YCu3[OH(D)]6.5Br2.5 (YCOB) exhibits no magnetic transition down to 50 mK [40, 41]. However, the low-energy magnetism of this promising QSL candidate YCOB remains poorly understood. In this paper, we report a comprehensive study of the frustrated magnetism on the high-quality single crystal of YCOB, including sub-kelvin thermodynamic & electron spin resonance (ESR) measurements and microscopic modeling by density functional theory (DFT) and state-of-the-art quantum many-body computations. The nonsymmetric distribution of OH-/Br- pushes 70(2)% of Y3+ away from its ideal position, and gives rise to two alternate local distortions of the Cu-O- Cu superexchange paths ($\sim$ $J_{1}-\Delta J$ and $J_{1}+\Delta J$) around the hexagons on the kagome lattice, whereas the rest of symmetric local environments result in nearly uniform hexagons ($\sim$ $J_{1}$). Through fitting the magnetic susceptibilities, we find a profound fluctuation of the exchange couplings, $\Delta J$/$J_{1}$ $\sim$ 0.7. The weak upturn in the low-$T$ susceptibility and the slight polarization in magnetization originate from the local moments induced by the bond randomness. Despite the average antiferromagnetic interaction of $J_{1}$ $\sim$ 60 K, no magnetic freezing is found down to 50 mK [41] $\sim$ 0.001$J_{1}$. Below $\sim$ 0.02$J_{1}$, the specific heat exhibits a nearly quadratic temperature dependence, which is phenomenologically consistent with the predictions of a gapless U(1) Dirac QSL or a $\mathbb{Z}_{2}$ QSL with a gap less than 0.025$J_{1}$. We argue that the bond randomness is a critical ingredient for the gapless QSL behavior observed in YCOB, as well as in other relevant materials. Figure 1: (Color online) (a) The experimental lattice structure of YCOB. (b, c) Optimized crystal structures for supercells containing the symmetric (s) and nonsymmetric (n) environments, respectively. The nonsymmetric environments (probability $\sim$ 70%) cause the deviations of Y3+ from its ideal positions (green arrows) and the alternate superexchanges (alternate $\angle$CuOCu are marked in c) along the hexagons on the kagome lattice of Cu2+. (d) Sketch of the model no.2 with $\sim$ 30% of uniform hexagons (green) and $\sim$ 70% of randomly distributed hexagons of alternate bonds (blue and red). Real part of the ac susceptibilities measured on YCOB along the $ab$ plane (e) and $c$ axis (f), respectively. The dashed and solid lines present the dc susceptibilities measured at 0.01 T under zero-field cooling (ZFC) and field cooling (FC), respectively. ## II Experimental Details We performed a recrystallization in a temperature gradient of $\sim$ 2 ∘C/cm for a month, and obtained transparent green single crystals of YCOB (typical size 3$\times$3$\times$0.3 mm) (see Appendix A). Magnetization up to 14 T and dc/ac susceptibilities down to 1.8 K were measured in a physical property measurement system (PPMS) and a magnetic property measurement system, respectively. The specific heat down to 0.36 K 111The Schottky anomaly of the H and D nuclear spins can appear in $C_{\mathrm{p}}$ below $\sim$ 0.2 K [41, 86, 36], and the temperature of 0.36 K $\sim$ 0.006$J_{1}$ is low enough for YCOB that the entropy flattens out at $S_{\mathrm{m}}$ $<$ 1.3%$R$ln 2 [see Fig. 15(d)]. was measured in a PPMS using a 3He refrigerator. The ESR spectra were measured on continuous wave spectrometers at x-band frequencies ($\sim$ 9.7 GHz). Figure 2: (a) Magnetization measured at 2 K on the YCOB single crystal with the magnetic fields applied parallel and perpendicular to the $c$ axis. The green lines present the Brillouin fits [see Eq. (5)]. (b) Raw specific heat of YCOB measured in selected magnetic fields applied along the $c$ axis, with the lines showing the calculated Schottky functions for 0.8% of free spins [see Eq. (6)]. (c) The difference between the zero- and nonzero-field specific heat. The dashed lines show the calculations of 0.8% of free spins, whereas the solid lines present the 21-site FLD calculations of the random model no.2 that is valid above $\sim$ 0.1$J_{1}$ $\sim$ 7 K. (d) Magnetic susceptibilities of YCOB measured at 1 T applied along the $ab$ plane and $c$ axis (cross). The hollow scatters show the data obtained by subtracting the Brillouin functions for 0.75% and 0.80% of “free spins” (colored lines) from the corresponding raw susceptibilities. The DFT$+U$ calculations were performed in the Vienna Ab initio Simulation Package (VASP) [43, 44] (see Appendix B). We carried out the finite- temperature Lanczos diagonalization (FLD) simulations for the thermodynamic properties of YCOB, as well as the local susceptibility $\chi_{i}^{\mathrm{loc}}$ and correlation function. The FLD calculations were conducted on the 18-, 21-, 24-, and 27- site KHA clusters with periodic boundary conditions (PBC), we excluded the thermodynamic data calculated below $T_{\mathrm{min}}$ in the main text, where the finite-size effect is significant (see Appendix C). We fit the experimental data by minimizing the residual function, $R_{p}=\sqrt{\frac{1}{N_{0}}\sum_{i}(\frac{X_{i}^{\mathrm{obs}}-X_{i}^{\mathrm{cal}}}{\sigma_{i}^{\mathrm{obs}}})^{2}},$ (1) where $N_{0}$, $X_{i}^{\mathrm{obs}}$ and $\sigma_{i}^{\mathrm{obs}}$ are the number of the data points, the observed value and its standard deviation, respectively, whereas $X_{i}^{\mathrm{cal}}$ is the calculated value. The international system of units is used throughout this work. ## III Results and Discussion ### III.1 Exchange Hamiltonian Fig. 1(a) shows the crystal structure of YCOB, where the magnetic Cu2+ ($S$ = $\frac{1}{2}$) ions occupy the 3$f$ Wyckoff position of the space group $P$3̄$m$1, and form the kagome lattice [see Fig. 1(d)]. The site mixing between the magnetic Cu2+ (ionic radius $r_{\mathrm{Cu}^{2+}}$ = 0.73 Å) and other nonmagnetic ions, i.e., Y3+ ($r_{\mathrm{Y}^{3+}}$ = 0.90 Å), H(D)+, O2-, Br-, is unlikely due to the large chemical differences, which has been confirmed by single-crystal x-ray diffraction (XRD) [40, 41]. From the Curie-Weiss fitting, we get the Curie-Weiss temperatures $\theta_{\perp}$ = $-$57.5(4) K and $\theta_{\parallel}$ = $-$58.7(3) K (see Figs. 3 and 7), which indicate a strong antiferromagnetic exchange coupling, $J_{1}$ $\sim$ 60 K [40]. A weak upturn is found in the susceptibilities below $\sim$ 30 K $\sim$ 0.5$J_{1}$ [see Figs. 1(e) and 1(f)], which speaks against the simplest nearest-neighbor (NN) KHA model (see Fig. 3) 222Because the ideal NN KHA exhibits a broad peak in susceptibility at $T_{\mathrm{p}}$ $\sim$ 0.154$J_{1}$ $\sim$ 9 K, and suggests the existence of net magnetic moments. Unlike many other kagome QSL candidates [22, 36], e.g., ZnCu3(OH)6Cl2, the model of conventional orphan spins fails to explain all the low-$T$ thermodynamic observations (see Fig. 2), which suggests the concentration of orphan spins is much lower than 0.8% in YCOB (see Appendix C). Therefore, the low-$T$ behaviors are governed by the intrinsic properties of the specific KHA of YCOB, which deviates from the ideal NN KHA. To understand the frustrated magnetism of the KHA YCOB, we consider the following spin-1/2 Hamiltonian in an applied magnetic field of $\mathbf{H}$, $\mathcal{H}=\sum_{\langle ij\rangle}J_{1,ij}\mathbf{S}_{i}\cdot\mathbf{S}_{j}-\mu_{0}\mu_{\mathrm{B}}\mathbf{H}\cdot\mathbf{g}\cdot\sum_{i}\mathbf{S}_{i}+\mathcal{H^{\prime}},$ (2) where $\mathbf{g}$ is the diagonal matrix of $g$ factor with $g_{\perp}$ = 2.18(1) and $g_{\parallel}$ = 2.19(1) determined by fitting the magnetic susceptibility data (see Fig. 3), and $\mathcal{H^{\prime}}$ represents symmetry-allowed perturbations, including the Dzyaloshinsky-Moriya (DM) interaction [46, 47], further-neighbor couplings [48], XXZ anisotropy [49], etc. Figure 3: (Color online) Combined fits to the raw susceptibilities measured on YCOB along the $ab$ plane (a) and $c$ axis (b), respectively, using models nos.1 (ideal KHA) and 2 (with randomly distributed hexagons of alternate bonds). The dashed lines show the Curie-Weiss fits above 150 K. The inset of (a) presents the deviation $R_{p}$ of using model no.2, with the dotted white line showing the optimized parameters. The vertical dashed line presents the occupancy fraction of Y1 from XRD, $f_{\mathrm{Y}1}$ = 0.30(2), and the horizontal line displays the bond randomness ($\Delta J$/$J_{1}$) calculated by DFT$+U$ in the OH-OH configuration [Fig. 1 (c)]. The circle shows the optimized value, $\Delta J$/$J_{1}$ = 0.7(1). The upper inset of (b) presents the magnetization measured at 2 K, with showing the 18- and 21-site FLD calculations of model no.2. The dashed straight line marks a linear dependence. The lower inset of (b) displays the measured magnetic anisotropy ($\chi_{\parallel}$/$\chi_{\perp}$). Starting with the simplest NN KHA (see Fig. 3 for model no.1), we fit the magnetic susceptibilities ($\chi_{\perp}$ and $\chi_{\parallel}$) measured on YCOB above $\sim$ 0.1$J_{1}$ $\sim$ 7 K, and find $J_{1}$ = 61.6 K with the least $R_{p}$ $\sim$ 3.3 [50]. However, the weak upturn of $\chi_{\perp}$ and $\chi_{\parallel}$ below $\sim$ 30 K is poorly understood (see Fig. 3). The measured magnetic anisotropy, $\chi_{\parallel}$/$\chi_{\perp}$, only increases by $\sim$ 4% from $T$ $\sim$ $J_{1}$ down to 1.8 K $\sim$ 0.03$J_{1}$ [see the lower inset of Fig. 3(b)], suggesting that the interaction anisotropy isn’t critical in YCOB due to the weak spin-orbit coupling of the 3$d$ electrons. Based on the DFT+$U$ calculation, we find that both further-neighbor and interlayer exchange couplings are negligible, which are less than 4% of $J_{1}$ (highly similar to the sibling YCu3(OH)6Cl3 [47]). Therefore, we mainly restrict ourselves to the effective models with only NN Heisenberg couplings at this stage. In YCOB, the site mixing between OH- and Br- occurs around the ideal Y3+ site (Wyckoff position 1$b$ at the center of each hexagon on the kagome lattice of Cu2+), based on the XRD [40, 41]. Although OH- and Br- have the same net charge, OH- is polar, and causes local distortions that may have a strong influence on the exchange couplings. To go beyond the average structure from XRD, we performed the DFT calculations by constructing various OH/Br configurations (with H) to simulate this site mixing. In the symmetric (e.g., Br-Br) configurations, the center of inversion is located at 1$b$ [see Fig. 1(b)], and Y3+ occupies its ideal position with a statistical probability $f_{\mathrm{Y}1}$ = 30(2)% from XRD (see Table 1) [40]. In contrast, the other nonsymmetric OH/Br configurations, e.g., OH-OH, push Y3+ away from its ideal position, $\Delta z_{\mathrm{Y}2}$ $\sim$ 0.1$c$ $\sim$ 0.6Å, well consistent with the XRD result [see Figs. 1(a) and 1(c)]. More importantly, the nonsymmetric configurations give rise to the alternate bond angles $\angle$CuOCu along the hexagons of the kagome lattice [see Fig. 1(c)]. Therefore, $1-f_{\mathrm{Y}1}$ = 70(2)% of randomly distributed hexagons with alternate bonds ($\sim$ $J_{1}-\Delta J$ and $J_{1}+\Delta J$) should be expected on the kagome lattice of YCOB [see Fig. 1(d)] [51]. Figure 4: (Color online) (a) ESR intensities of YCOB. The color lines present the Curie-Weiss fits, and the inset shows the ESR spectrum measured at 6 K along the $c$ axis. (b) Magnetic specific heat calculated by using model no.2 ($\Delta J$/$J_{1}$ = 0.7) on various size KHA clusters, with the experimental total specific heat for comparison. (c) Raw specific heat of YCOB measured at 0 T. The blue and black lines present the power-law and quadratic behaviors, respectively. The inset shows the Brillouin zone of the mean-field Ansatz on the kagome lattice, and the circles mark the positions of the Dirac nodes. (d) Raw specific heat measured in selected magnetic fields applied along the $c$ axis. The thin and thick lines display the fittings below 1 K, using the U(1) and $\mathbb{Z}_{2}$ mean-field Ansatz, respectively. (e) Band structure of the U(1) Dirac QSL at $h$ = 0. The field of 6 T splits the zero-field bands (green) into the spin-up ($\uparrow$, blue) and spin-down ($\downarrow$, red) bands. (f) Band structure of the $\mathbb{Z}_{2}[0,\pi]\beta$ QSL in the Nambu representation at $h$ = 0. The zero-field spin gap is marked. We further conduct the DFT$+U$ calculation to estimate the exchange couplings for YCOB, and find that the fluctuation of these alternate bonds, $\Delta J$/$J_{1}$, is strong, ranging from 0 to $\sim$ 1.3 (see Appendix B). According to the simplified model of the crystal structure [see Fig. 1(a)], we construct a simple KHA model (no.2) with $1-f_{\mathrm{Y}1}$ = 70% of randomly distributed hexagons of alternate bonds and the rest of almost uniform hexagons on the kagome lattice, as illustrated in Fig. 1(d). The real situation of YCOB may be more complicated, but one always seeks to explain the bulk of experimental observations within the minimum model that captures the essential physics. Using the model no.2, we are able to fit the experimental susceptibilities very well at $J_{1}$ = 50(1) K and $\Delta J$/$J_{1}$ = 0.7(1) with a significantly reduced $R_{p}$ = 1.4(1) (see Fig. 3). The finite-size effect is trivial in the model no.2 [see Figs. 3 and 4(b)], and both the weak upturn below $\sim$ 0.5$J_{1}$ and the broad hump at $\sim$ $J_{1}$ can be excellently reproduced. In contrast, the complete and continuous randomness of $J_{1}$ and $g$ with a Lorentzian distribution [52, 53] fails to fit the experimental susceptibilities (see Fig. 13). Besides that, the model no.2 also well simulates the slight polarization seen in the low-$T$ magnetization without any parameter tuning [the upper inset of Fig. 3(b)]. These observations strongly support the formation of effective $\sim$ 0.8% (see Fig. 2) of local moments due to the bond randomness (see Fig. 4) [54, 55, 56, 57]. The temperature dependence of the ESR intensity shows a Curie-Weiss behavior with the Curie-Weiss temperatures, $\theta_{\perp}^{\mathrm{ESR}}$ = $-$12(2) K and $\theta_{\parallel}^{\mathrm{ESR}}$ = $-$16(4) K [Figs. 4(a) and 9(d)], suggesting the ESR lines may originate from the nearly free local moments induced by the bond randomness [58]. Moreover, the ESR spectra of YCOB are so narrow that the hyperfine structures are clearly visible (see Fig. 8), implying that the weak coupling between the randomness-induced moments may be nearly isotropic Heisenberg [46]. It is worth to note that the nearly free local moments induced by bond randomness in YCOB are from the nontrivial many-body correlations and random- singlet physics (see Fig. 4) [57, 54, 59, 58], which is essentially different from the trivial “orphan” spins observed in other existing kagome QSL candidate materials. Above 0.02$J_{1}$ $\sim$ 1 K, the theory of the scaling collapse recently proposed by Kimchi et al. [60] is applicable to YCOB, confirming the formation of random-singlet state. However, below $\sim$ 1 K the raw zero-field specific heat shows a power-law behavior $C_{\mathrm{p}}$ $\propto$ $T^{\alpha}$ with $\alpha$ = 2.31(1) $>$ 1 [Fig. 4(c)] and the existing theories obviously fail (see Fig. 16). ### III.2 Sub-Kelvin specific heat and mean-field Ansatz Below $\sim$ 2 K, the lattice contribution is completely negligible [see Figs. 14(a) and 14(b)] in the Mott insulator YCOB with room-$T$ resistance larger than 20 M$\Omega$ parallel and perpendicular to the $c$ axis, and thus the raw specific heat directly measures the intrinsic magnetic properties that are sensitive to the low-energy ($\leq$ 3%$J_{1}$) density of states. Despite the strong antiferromagnetic exchange coupling of $J_{1}$ $\sim$ 60 K, no conventional magnetic freezing is evidenced, as there is neither splitting of zero-field-cooling and field-cooling dc susceptibilities nor frequency dependence of the ac susceptibilities down to 1.8 K ($\sim$ 0.03$J_{1}$) [see Figs. 1(e) and 1(f)] [40]. No sharp “$\lambda$” specific heat peak was observed down to 0.36 K ($\sim$ 0.006$J_{1}$) [see Fig. 4(c)]. Moreover, our recent thermal conductivity measurements show no sign of phase transitions down to $\sim$ 80 mK [61]. These observations consistently show that YCOB is a very promising (randomness-induced) QSL candidate without evident orphan spins, and thus one is able to explore in depth its intrinsic GS nature. Thereby, we analysis the experimental results by using the three most promising mean-field QSLs classified by the Projective Symmetry Group method [62, 11, 63], including the uniform RVB [11], U(1) Dirac [11], and $\mathbb{Z}_{2}[0,\pi]\beta$ [63] states. The inherent exchange randomness should influence the GS nature of the spin system of YCOB. In contrast to the ideal KHA, the simulated GS of the random model indeed exhibits the signature of random-singlet or valence bond glass phase [56, 57]. The pair of NN spins with the strong exchange interaction ($J_{1}+\Delta J$) tends to form a singlet with extremely strong local correlation $\langle\bm{S}_{i}\cdot\bm{S}_{j}\rangle$ $\sim$ $-0.7$ (see Fig. 4). However, the fraction of such singlets is still very low due to the strong frustration of the kagome lattice [58], even in the presence of strong exchange randomness [see Fig. 4(a)]. Therefore, the picture of mobile spinons is still applicable [57], and the mean-field Ansatz can nevertheless serve as a simple and phenomenological model for understanding the complicated GS nature of YCOB, despite the possible distribution of hopping strength (not as a direct function of the detailed distribution of the exchange couplings, see Fig. 4). The distribution of hopping strength due to bond randomness might be general in almost all of the well-studied spin-liquid candidate compounds, $\kappa$-(ET)2Cu2(CN)3, EtMe3Sb[Pd(dmit)2]2, ZnCu3(OH)6Cl2, etc. [58]. Figure 5: (Color online) Local susceptibility at each kagome site (see Ref. [55] for the definition) and correlation functions calculated for the 27-site samples of model no.2 with bond randomness (a) and the ideal KHA model no.1 (b), at $T$ = 0.1$J_{1}$ 444$T$ = 0.1$J_{1}$ is low enough, as the correlation functions of both systems are nearly constant. and $\mu_{0}H$ = 0 T. The dashed lines display the cluster with PBC. The uniform RVB state gives rise to a linear temperature dependence of specific heat that obviously contradicts the observations in YCOB [see Fig. 17(d)]. The zero-field specific heat of YCOB shows a nearly quadratic behavior [see Fig. 4(c)], $C_{\mathrm{p}}\sim\gamma_{2}T^{2}$ with $\gamma_{2}$ = 0.11(1) JK-3/mol-Cu, which is consistent with the U(1) Dirac state [11], with the NN hopping parameter $\chi_{1}$ = $\frac{k_{\mathrm{B}}}{J_{1}}\sqrt{\frac{6\sqrt{3}\zeta(3)R}{\pi\gamma_{2}}}$ = 0.29(1) and the Fermi velocity $v_{\mathrm{F}}$ = $\frac{aJ_{1}\chi_{1}}{\sqrt{2}\hbar}$ = 1.07(5)$\times$103 m/s [11]. The resulted $\chi_{1}$ is slightly larger than the self-consistent mean-field value 0.221 [64]. The mean-field theory fails to strictly impose the single- occupancy constraint [65, 7], and the unphysical states may result in the overestimated coefficient $\gamma_{2}$(MF) = 0.188 JK-3/mol-Cu. This failure gets more severer when a magnetic field is applied (see below). For the U(1) Dirac state, the applied magnetic field tends to form Fermi pockets [see Fig. 4(e)], increase the low-energy density of states and thus low-$T$ specific heat, which qualitatively accounts for the observations [see Fig. 4(d)]. However, the fermionic spinon with the effective magnetic moment $\mu_{\mathrm{eff}}$ $\sim$ $\mu_{\mathrm{B}}$ causes a much stronger dependence on the field in the mean-field theory, and can’t fit well the specific heat measured in nonzero fields below $\sim$ 1 K [see Fig. 17(h)]. A remedy is to set $\mu_{\mathrm{eff}}$ as an adjustable parameter, and we get $\mu_{\mathrm{eff}}$ $\sim$ 0.43$\mu_{\mathrm{B}}$ [see Fig. 4(d)] 555The significant decrease of the effective magnetic moment from $\mu_{\mathrm{B}}$ may originate from the unphysical states due to the rough treatment of the single-occupied condition, which is another issue beyond the mean-field theory worth of further research.. Moreover, the crossings of different specific heat curves measured in different magnetic fields are also well captured by this U(1) Dirac scenario [Fig. 4(d)]. The real material of YCOB with bond randomness should have a distribution of hopping strength on the kagome lattice [see Fig. 4(a)], which might slightly renormalize the band structure and the dispersion around the Dirac nodes and account for the observation of $\alpha$ = 2.31(1) $\neq$ 2. In the neighborhood of the U(1) Dirac state, the $\mathbb{Z}_{2}[0,\pi]\beta$ QSL was proposed as the GS of the KHA as well [16, 17, 63]. Therefore, we also fit the specific heat of YCOB by using the mean-field Ansatz of the $\mathbb{Z}_{2}[0,\pi]\beta$ state [63], and obtain a similar band structure with a small zero-field spin (triplet) gap of $\sim$ 0.025$J_{1}$ [see Fig. 4(f)] that is smaller than the DMRG value $\sim$ 0.05$J_{1}$ [16]. The applied magnetic field tends to close the gap, form Fermi pockets, and thus increase the low-$T$ specific heat [see Fig. 4(d)]. Similarly, by fitting we obtain the reduced $\mu_{\mathrm{eff}}$ $\sim$ 0.48$\mu_{\mathrm{B}}$. Finally, it is worth to note that the spin gap should be slightly overestimated, because the calculated data drops faster than the experimental one at $\sim$ 0.4 K as $T$ $\rightarrow$ 0 K at 0 T [see Fig. 4(d)]. ### III.3 Discussion In the sibling YCu3(OH)6Cl3, no obvious antisite mixing of OH/Cl has been reported, the center of inversion is located at 1$b$, Y3+ almost fully occupies its ideal position, i.e., $f_{\mathrm{Y}1}$ $\sim$ 1 [67], and a long-range magnetic transition occurs at $T_{\mathrm{N}}$ = 12 K $\sim$ 0.15$J_{1}$ [68, 69, 70] possibly due to the DM interaction [47]. In contrast, a gapless QSL behavior is observed in YCOB (similar to Ref. [41]) with profound antisite mixing and thus bond randomness. Therefore, we believe that the bond randomness is a critical ingredient for stabilizing the quantum paramagnetic state. Both the susceptibility and specific heat of model no.2 indeed exhibit no sign of magnetic transition [see Figs. 3 and 4(b)], and a randomness-relevant gapless QSL state has been theoretically proposed in KHAs with a broad range of bond randomness [54]. Since QSLs are typically fragile in the ideal cases [12, 15], the bond randomness caused by site mixing may make the gapless QSL behavior more robust against various inevitable perturbations in real materials, e.g., ZnCu3(OH)6Cl2 and YbMgGaO4 [71, 72]. Our study shows that YCOB is a rare KHA where the bond randomness and its influence to the QSL behavior might be precisely modelled. ## IV Conclusions And Outlook We have characterized the magnetic properties of large YCOB single crystals that are grown for the first time. The exchange Hamiltonian is refined by magnetic susceptibilities on the orientated single crystals. We find the bond randomness is significant, and plays an important role in the QSL behavior. No conventional magnetic transition is found, and the specific heat exhibits a nearly quadratic temperature dependence below 1 K $\sim$ 0.02$J_{1}$, which are phenomenologically consistent with the predictions of a gapless U(1) Dirac QSL or a $\mathbb{Z}_{2}$ QSL with a gap less than 0.025$J_{1}$. The exact GS nature of YCOB might be further identified by the Knight shift in nuclear magnetic resonance, and by measuring inelastic neutron scattering and muon spin relaxation spectra. Future investigations of spin dynamics and correlations of YCOB are warranted and made possible through the availability of high-quality single crystals. ###### Acknowledgements. We thank Tao Xiang, X. Hong, and C. Hess for helpful discussion and J. Schnack for providing their FLD data. The authors were supported by the National Key Research and Development Project of China, grant 2017YFA0302901, the Youth Innovation Promotion Association CAS, grant 2021004, and the Strategic Priority Research Program of Chinese Academy of Sciences, grant XDB33000000. This work was supported by the Fundamental Research Funds for the Central Universities, HUST: 2020kfyXJJS054. ## Appendix A Single crystal growth, structural, thermodynamic, and electron spin resonance characterizations We grew single crystals of YCu3(OH)6.5Br2.5 (YCH) and YCu3(OD0.6H0.4)6.5Br2.5 (YCD) in two ways. At first, we synthesized the crystals in a Teflon-lined stainless steel autoclave (TSA) using the hydrothermal technique [40] reported by Chen et al. The high-purity D2O ($\geq$ 99.9%, Shanghai Titan Scientific Co., Ltd) was used instead of H2O when we synthesized YCD. Crystals with a maximum size of 1.2$\times$1.2$\times$0.15 mm (mass $\sim$ 0.9 mg) were obtained, as shown in Fig. 6(a). To improve the quality and size of the single crystals, we performed a recrystallization process in a two-zone gradient tube furnace (GTF) with a temperature gradient of $\sim$ 2 ∘C/cm. The starting materials of Cu(NO3)2$\cdot$3H2O (2.416 g, 10 mmol), Y(NO3)3$\cdot$6H2O (7.662 g, 20 mmol), KBr (7.140 g, 60 mmol), and 4 mL D2O were mixed together and charged into a fused quartz tube (inside diameter 14 mm, outside diameter 20 mm, a length of $\sim$ 30 cm). The tube was sealed, mounted vertically, and then heated to 230 ∘C in a box furnace. The temperature was maintained for 3 days and then decreased to room temperatures. The pre-reacted tube was mounted horizontally into the two-zone gradient furnace. Both the hot and cold ends were simultaneously heated to 225 and 165 ∘C, respectively, for 6 hours. The furnace and all growth parameters were left undisturbed for 30 days, and then both ends were simultaneously cooled down to room temperatures. Transparent green single crystals with shining surfaces and a typical size of 3.1$\times$2.4$\times$0.25 mm (mass $\sim$ 7.4 mg) were obtained [see Fig. 6(b)]. Back-scattering Laue x-ray diffraction (XRD) measurements (LAUESYS_V_674, Photonic Science & Engineering Ltd) were carried out for both TSA and GTF single crystals. The GTF crystals show obviously sharper Laue photographs [please compare Fig. 6(b) to Fig. 6(a)], implying that the quality of the single crystals has been considerably improved by the above recrystallization process. Figure 6: Laue XRD patterns on the $ab$ plane of (a) the largest TSA (the upper inset) and (b) typical GTF (the upper inset) crystals. The thicknesses of typical TSA and GTF crystals are shown in the lower insets of (a) and (b), respectively. The crystal structure was obtained from the refinements of the XRD (Mo $K_{\alpha}$, $\lambda$ = 0.71073 Å, XtaLAB mini II, Rigaku Corporation) data measured on selected YCH and YCD crystals with proper sizes. We started with the crystal structure previously reported in Ref. [40], and got a very similar refined structure (see Table 1). From the refinements we find that YCH(D) has a structural composition YCu3[OH(D)]6Br2[OH(D)]${}_{1-x^{\prime}}$Br${}_{x^{\prime}}$ with $x^{\prime}$ = 0.43–0.47. In comparison, a slightly larger value $x^{\prime}$ = 0.51 had been reported in Ref. [40]. Henceforth, we use the approximate composition YCu3[OH(D)]6.5Br2.5 throughout this paper. Figure 7: Inverse dc susceptibilities ($H/M$) of aligned GTF single crystals of YCD (total mass 21.8 mg) measured at 1 T applied perpendicular (a) and parallel (b) to the $c$ axis, with those of TSA crystals of YCD (net weight: 23.0 mg) and YCH (net weight: 23.8 mg) for comparison. The dashed lines present the linear (Curie-Weiss) fits to the GTF data above 150 K. (c) Specific heat of a GTF single crystal of YCD (mass 5.90 mg) measured at 0 T, with those of TSA crystals of YCD (net weight: 1.90 mg) and YCH (net weight: 1.82 mg) for comparison. No substantial sample dependence of the thermodynamic properties was observed. The dc magnetization and ac susceptibilities (1.8 $\leq$ $T$ $\leq$ 350 K and 0 $\leq$ $\mu_{0}H$ $\leq$ 7 T) were measured by a magnetic property measurement system (MPMS, Quantum Design) using well-aligned (by Laue XRD) single-crystal samples of $\sim$ 23 mg, whereas the magnetization up to 14 T was measured by a vibrating sample magnetometer in a physical property measurement system (PPMS, Quantum Design). At high temperatures the magnetization of the compound is weak, and we carefully chose a quartz holder without evident background. As shown in Fig. 7(a) and 7(b), our susceptibilities follow the Curie-Weiss law between $\sim$ 120 and 350 K (the maximum measured temperature), with the Curie-Weiss temperatures $\theta_{\perp}$ = $-57.5(4)$ K and $\theta_{\parallel}$ = $-58.7(3)$ K along the $ab$ plane and $c$ axis, respectively. In comparison, Chen et al. reported a slightly larger magnitude of the Curie-Weiss temperature of $-74$ K from fitting their isotropic susceptibility measured in diamagnetic gelatine capsules below $\sim$ 280 K [40]. The specific heat (1.8 $\leq$ $T$ $\leq$ 220 K) was measured at a magnetic field of 0 $\leq$ $\mu_{0}H_{\parallel}$ $\leq$ 9 T applied along the $c$ axis using the single-crystal samples in a PPMS. The specific heat measurements on a selected GTF single crystal (mass 4.00 mg) between 0.36 and 2 K were conducted in a 3He refrigerator. N-grease was used to facilitate thermal contact between the crystal and the puck, and the sample coupling was better than 98%. The contributions of the grease and puck under different applied fields were measured independently and subtracted from the data. Table 1: Structure refinements from single-crystal XRD data measured on selected YCH and YCD crystals at 300 K. crystals | YCH (#1) | YCH (#2) | YCD (#1) | YCD (#2) ---|---|---|---|--- size (mm) | 0.22 $\times$ 0.22 $\times$ 0.08 | 0.19 $\times$ 0.19 $\times$ 0.08 | 0.21 $\times$ 0.21 $\times$ 0.04 | 0.11 $\times$ 0.11 $\times$ 0.06 molar mass (g/mol) | 588.0(1.3) | 586.8(1.3) | 589.5(1.3) | 590.7(1.3) space group | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164) | $P$3̄$m$1 (No. 164) $a$ (= $b$, Å) | 6.6647(3) | 6.6704(5) | 6.6576(4) | 6.667(1) $c$ (Å) | 6.0093(3) | 6.0014(4) | 6.0151(3) | 6.004(1) cell volume (Å3), $Z$ = 1 | 231.16(3) | 231.26(5) | 230.89(4) | 231.1(1) Y1 (1$b$): occupancy $f_{\mathrm{Y}1}$ | 0.30(2) | 0.30(2) | 0.30(2) | 0.30(2) 100$\times U_{iso}$ | 0.8(2) | 1.4(2) | 0.9(2) | 0.4(2) Y2 (2$c$): occupancy $f_{\mathrm{Y}2}$ | 0.35(1) | 0.35(1) | 0.35(1) | 0.35(1) $z$ | 0.374(2) | 0.374(2) | 0.373(2) | 0.373(2) 100$\times U_{iso}$ | 0.8(2) | 1.4(2) | 0.9(2) | 0.4(2) Cu (3$f$, occupancy = 1): 100*$U_{iso}$ | 0.8(1) | 1.7(1) | 0.8(1) | 0.3(1) Br1 (2$d$, occupancy = 1): $z$ | 0.8566(6) | 0.8566(6) | 0.8560(5) | 0.8566(7) 100$\times U_{iso}$ | 1.8(1) | 2.6(1) | 1.8(1) | 1.4(1) O1 (6$i$, occupancy = 1): $x$ ($x$ = 0.5$y$) | 0.1896(9) | 0.1885(9) | 0.1894(8) | 0.189(1) $z$ | 0.372(3) | 0.362(2) | 0.366(2) | 0.378(3) 100$\times U_{iso}$ | 1.0(3) | 1.4(4) | 1.0(3) | 1.5(5) Br2 (1$a$): occupancy $f_{\mathrm{Br}2}$ | 0.47(2) | 0.45(2) | 0.43(2) | 0.45(2) 100$\times U_{iso}$ | 2.3(2) | 2.8(4) | 2.5(3) | 1.6(4) O2 (1$a$): occupancy $f_{\mathrm{O}2}$ | 0.53(2) | 0.55(2) | 0.57(2) | 0.55(2) 100$\times U_{iso}$ | 2.3(2) | 2.8(4) | 2.5(3) | 1.6(4) $h$ range | $-9\rightarrow 9$ | $-9\rightarrow 9$ | $-8\rightarrow 9$ | $-7\rightarrow 8$ $k$ range | $-8\rightarrow 11$ | $-8\rightarrow 11$ | $-9\rightarrow 11$ | $-9\rightarrow 11$ $l$ range | $-8\rightarrow 10$ | $-3\rightarrow 10$ | $-8\rightarrow 10$ | $-8\rightarrow 10$ reflections ($I$ $>$ 0) | 954 | 795 | 841 | 560 reflections ($I$ $>$ 3$\sigma$($I$)) | 837 | 674 | 740 | 492 $R$($F$) ($I$ $>$ 3$\sigma$($I$)) | 3.8% | 6.7% | 7.1% | 9.7% $R_{w}$($F$) ($I$ $>$ 3$\sigma$($I$)) | 3.3% | 4.8% | 6.1% | 6.6% No significant sample dependence of thermodynamic properties was observed among GTF YCD, TSA YCD, and TSA YCH single crystals (see Fig. 7). Therefore, we focused on the measurements on the highly-quality GTF YCD (mentioned as YCOB) single crystals below and also throughout the main text. The YCOB crystals are good insulators and have resistance larger than 20 M$\Omega$ measured parallel and perpendicular to the $c$ axis at room temperatures. Above $\sim$ 120 K, the inverse susceptibilities of YCOB show a linear temperature dependence following the Curie-Weiss law along both the $ab$ plane and $c$ axis [see Fig. 7(a) and 7(b)]. We obtain the lengths of the magnetic moments $g_{\perp}\mu_{\mathrm{B}}\sqrt{S(S+1)}$ = $\sqrt{3k_{\mathrm{B}}C_{\perp}/(N_{\mathrm{A}}\mu_{0})}$ = 1.898(1)$\mu_{\mathrm{B}}$ and $g_{\parallel}\mu_{\mathrm{B}}\sqrt{S(S+1)}$ = $\sqrt{3k_{\mathrm{B}}C_{\parallel}/(N_{\mathrm{A}}\mu_{0})}$ = 1.882(1)$\mu_{\mathrm{B}}$ from the fitted Curie constants $C_{\perp}$ = 5.661(7) Kcm3 per mol Cu and $C_{\parallel}$ = 5.568(4) Kcm3 per mol Cu, respectively. By fixing $S$ = $\frac{1}{2}$, we further get $g_{\perp}$ = 2.192(1) and $g_{\parallel}$ = 2.174(1). Moreover, the antiferromagnetic exchange energy can be roughly estimated as $J_{1}$ $\sim$ $-3\theta_{\perp}/$[4$S$($S$+1)] $\sim$ $-3\theta_{\parallel}/$[4$S$($S$+1)] $\sim$ 60 K. The first derivative electron spin resonance (ESR) absorption spectra were measured at 6–300 K on the aligned single-crystal samples of YCOB (total mass $\sim$ 22 mg) with the magnetic field applied parallel and perpendicular to the $c$ axis, respectively, using continuous wave spectrometers (CIQTEK EPR200-Plus and Bruker EMXmicro-6/1) at x-band frequencies ($\nu$ $\sim$ 9.7 GHz) equipped with 4He refrigerators. The single-crystal samples of YCOB were washed with high-purity water and ethanol repeatedly and in succession, and the absence of any obvious impurity phase was confirmed by using a microscope, before the ESR measurements. The ESR spectra measured at various temperatures are so narrow that the distinctive hyperfine structure is clearly visible (see Fig. 8) [73, 74]. The similar ESR lines usually appear in Cu2+-based complexes with weak couplings [74]. However, in most of the existing strongly-correlated 3$d$ magnets, e.g., ZnCu3(OH)6Cl2 [46] and $\alpha$-CrOOH [75], broad single ESR lines are typically observed due to the magnetic anisotropy. As shown in Fig. 8, the ESR signals are still robust even at room temperatures, with the maximum strength of $\sim$ 1 ($\mu$V) at the microwave power of 0.2 mW, modulation amplitude of 0.4 mT, and magnification of 10. The integrated intensity of YCOB is about 1% of that of ZnCu3(OH)6Cl2 reference powder, roughly consistent with the estimated concentration ($\sim$ 0.8%) of the local moments [see Fig. 8 (c)]. Moreover, the integrated ESR intensity roughly follows a Curie-Weiss behavior with the Curie-Weiss temperature of $\sim$ $-$14 K, instead of the bulk susceptibility [see Figs. 9 (c) and 9(d)]. These observations suggest that the narrow ESR signals of YCOB should mainly originate from the nearly free local moments induced by the bond randomness on the kagome lattice (see main text). In contrast, the sibling YCu3(OH)6Cl3 without evident bond randomness shows a very broad ESR signal with the linewidth of $\sim$ 7 T [47]. Therefore, the possible broad ESR lines from the strongly-coupled ($J_{1}$ $\sim$ 60 K) Cu spins of YCOB may not be well captured by our x-band (maximum applied field of $\sim$ 1 T) ESR spectrometers. The single-ion hyperfine Hamiltonian of the Cu2+ ($S$ = $\frac{1}{2}$, $I$ = $\frac{3}{2}$) ions that is invariant under the $D_{3d}$ point group symmetry can be written as [73, 74] $\mathcal{H}_{\mathrm{hp}}=-\mu_{0}\mu_{\mathrm{B}}\mathbf{H}\cdot\mathbf{g}\cdot\mathbf{S}+\mathbf{I}\cdot\mathbf{A}\cdot\mathbf{S}\\\ \tiny=\left(\begin{array}[]{cccccccc}\frac{3}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&0&\frac{i}{2}G_{\perp}&0&0&0\\\ 0&\frac{1}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&\frac{\sqrt{3}}{2}A_{\perp}&\frac{i}{2}G_{\perp}&0&0\\\ 0&0&-\frac{1}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&A_{\perp}&\frac{i}{2}G_{\perp}&0\\\ 0&0&0&-\frac{3}{4}A_{\parallel}-\frac{1}{2}G_{\parallel}&0&0&\frac{\sqrt{3}}{2}A_{\perp}&\frac{i}{2}G_{\perp}\\\ -\frac{i}{2}G_{\perp}&\frac{\sqrt{3}}{2}A_{\perp}&0&0&-\frac{3}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0&0&0\\\ 0&-\frac{i}{2}G_{\perp}&A_{\perp}&0&0&-\frac{1}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0&0\\\ 0&0&-\frac{i}{2}G_{\perp}&\frac{\sqrt{3}}{2}A_{\perp}&0&0&\frac{1}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}&0\\\ 0&0&0&-\frac{i}{2}G_{\perp}&0&0&0&\frac{3}{4}A_{\parallel}+\frac{1}{2}G_{\parallel}\\\ \end{array}\right),$ (3) under the subspace of $|S^{z}=\frac{1}{2},I^{z}=\frac{3}{2}\rangle,~{}|\frac{1}{2},\frac{1}{2}\rangle,~{}|\frac{1}{2},-\frac{1}{2}\rangle,~{}|\frac{1}{2},-\frac{3}{2}\rangle,~{}|-\frac{1}{2},\frac{3}{2}\rangle,~{}|-\frac{1}{2},\frac{1}{2}\rangle,~{}|-\frac{1}{2},-\frac{1}{2}\rangle,~{}|-\frac{1}{2},-\frac{3}{2}\rangle$. Here, $\mathbf{H}$ = $H$[0 $\sin\theta$ $\cos\theta$] is the applied magnetic field, $G_{\parallel}$ = $\mu_{0}\mu_{\mathrm{B}}Hg_{\parallel}\cos\theta$ and $G_{\perp}$ = $\mu_{0}\mu_{\mathrm{B}}Hg_{\perp}\sin\theta$ are the Zeeman terms. The eight eigenstates of Supplementary Eq. (3) are represented as $|E^{\eta}_{j}\rangle$ ($j$ = 1, 2, …, 8) with increasing eigenenergies. Due to $A_{\eta}$ $\ll$ $\mu_{0}\mu_{\mathrm{B}}H_{\mathrm{res}}^{\eta}g_{\eta}$, these eigenstates give rise to four ESR modes with $E^{\eta}_{9-j^{\prime}}-E^{\eta}_{j^{\prime}}$ = $h\nu$ and nonzero transition probabilities $\propto$ $|\langle E^{\eta}_{9-j^{\prime}}|2S^{x}|E^{\eta}_{j^{\prime}}\rangle|^{2}$ $\sim$ 1, where $j^{\prime}$ = 1, 2, 3, 4. These four ESR modes are governed by the transitions, $|\frac{1}{2},I^{z}\rangle\rightarrow|-\frac{1}{2},I^{z}\rangle$ ($I^{z}$ = $-\frac{3}{2}$, $-\frac{1}{2}$, $\frac{1}{2}$, $\frac{3}{2}$), similar to other Cu2+-based magnets [74]. Therefore, we fit the experimental ESR spectra (see Fig. 8) using, $\frac{dI_{\mathrm{abs}}^{\eta}}{\mu_{0}dH}=\frac{16I_{0}^{\eta}\Delta H_{\eta}}{\pi\mu_{0}^{2}}\sum_{j^{\prime}=1}^{4}\frac{f_{j^{\prime}}^{\eta}(H_{j^{\prime}}^{\eta}-H)}{[4(H_{j^{\prime}}^{\eta}-H)^{2}+\Delta H_{\eta}^{2}]^{2}},$ (4) where $f_{j^{\prime}}^{\eta}$ $>$ 0 is the spectrum weight of each ESR mode with $\sum_{j^{\prime}=1}^{4}f_{j^{\prime}}^{\eta}$ $\equiv$ 1, $\mu_{0}\Delta H_{\eta}$ is the line width that is presumed to be independent of $j^{\prime}$ for simplicity, and $I_{0}^{\eta}$ is the total integrated intensity that is proportional to the dynamical susceptibility in the direction perpendicular to the applied field, $I_{0}^{\eta}$ $\propto$ $\chi_{\eta^{\prime}}^{\prime\prime}$(q $\rightarrow$ 0, $\omega$) [46]. The fitted ESR fields are almost temperature-independent [see Figs. 9(a) and 9(b)]. From fitting the ESR fields both parallel ($\eta$ = $\parallel$) and perpendicular ($\eta$ = $\perp$) to the $c$ axis, we obtain all the single-ion parameters, $g_{\perp}$ = 2.205(4), $g_{\parallel}$ = 2.211(4), $|A_{\perp}|$ = 15.8(2) mK and $|A_{\parallel}|$ = 16.7(2) mK. Figure 8: The ESR spectra measured parallel (a) and perpendicular (b) to the $c$ axis. The solid lines show the four-Lorentzian fits [see Eq. (4)], and the dashed lines present the calculated ESR fields (see Fig. 9). (c) The x-band ESR spectra measured at 20 K on single-crystal samples of TSA YCH (23.8 mg) and YCD (23.0 mg), with the spectrum of the ZnCu3(OH)6Cl2 powder ($\sim$ 20 mg) for comparison. Figure 9: ESR fields obtained from fitting the ESR spectra measured along the $ab$ plane (a) and $c$ axis (b), respectively (see Fig. 8). The dashed lines show the combined fit. (c) Scaling of the ESR intensities, $\chi^{\mathrm{ESR}}(H\perp c)$ and $\chi^{\mathrm{ESR}}(H\parallel c)$, with the bulk susceptibilities (thick lines), $\chi^{\mathrm{b}}_{\parallel}$ and $\chi^{\mathrm{b}}_{\perp}$, respectively. The thin dashed and solid lines present the Curie-Weiss fits with zero (i.e., Curie tails) and adjustable Curie-Weiss temperatures, respectively. (d) Inverse (integrated) ESR intensities. ## Appendix B DFT + $U$ calculations Although our single-crystal XRD measurements (see above), as well as the reported electron-microprobe analysis [40], show obvious site-mixing disorder of OH- and Br-, neither global symmetry reduction nor antisite mixing between Cu2+ and other nonmagnetic ions is probed in YCOB. To go beyond the average structure from single-crystal XRD and investigate the influence of this structural disorder on the magnetism, we conducted the density functional theory (DFT) + $U$ simulation, which had been widely used in other Cu2+-based magnets, e.g., volborthite Cu3V2O7(OH)2$\cdot$2H2O [76], kapellasite Cu3Zn(OH)6Cl2, and haydeeite Cu3Mg(OH)6Cl2 [77]. Similar to YbMgGaO4 [78], we constructed three OH/Br configurations to simulate the site mixing, and optimized their geometry using DFT calculations (see Fig. 10). All possible nearest-neighbor (NN) environments of 1$b$ position are included in the three configurations (see Fig. 10), and the further enlarging of supercells sharply increases the computational cost. All our DFT + $U$ calculations were performed in the VASP code [43, 44] with the generalized gradient approximation (GGA) [79]. The 6$\times$6$\times$6 k-mesh was used, and residual forces were below 0.006 eV/Å in the fully optimized structures. The lattice parameters were fixed to the experimental values, $a$ = $b$ = 6.6647 Å and $c$ = 6.0093 Å. The random distribution of OH- and Br- takes place around the 1$a$ positions, which are adjacent to the hexagons on the kagome lattice of magnetic Cu2+ ions (see Fig. 10). The polar OH- ions easily make the local environments of 1$b$ positions (i.e., the Y1 sites, located at the centers of the hexagons) nonsymmetric, and drive Y3+ away from its ideal 1$b$ position, i.e., $|\Delta z_{\mathrm{Y}2}|$ $>$ 0\. Our DFT calculation gives $|\Delta z_{\mathrm{Y}1}|$ = 0 in the symmetric Br-Br [see Fig. 10 (a)] stacking, and $|\Delta z_{\mathrm{Y}2}|$ $\sim$ 0.6 and 0.4 Å in the nonsymmetric OH-OH [see Fig. 10 (b)] and Br-OH-Br [see Fig. 10 (c)] cases, respectively, which are well consistent with the XRD results of $|\Delta z_{\mathrm{Y}1}|$ = 0 and $|\Delta z_{\mathrm{Y}2}|$ $\sim$ 0.7 Å (Table 1). Furthermore, we find that both $\angle$CuOCu and Cu-O, which are closely relevant to the exchange integrals, are sensitively dependent on the OH/Br distribution (see Table 2). When the local environment of the 1$b$ Wyckoff position gets nonsymmetric, the configuration of two alternate superexchanges along the hexagon is naturally expected, according to the structural symmetry [see Figs. 10 (b) and 10(c)]. Figure 10: Optimized crystal structures for different stacking sequences of Br/OH, (a) symmetric Br-Br [2YCu3(OH)6Br3, supercell: 2$\times$1$\times$1 unit cells, total energy $-$31.2 eV/Cu], nonsymmetric (b) OH-OH [2YCu3(OH)7Br2, 2$\times$1$\times$1, total energy $-$33.9 eV/Cu] and (c) Br-OH-Br [4YCu3(OH)6.5Br2.5, 2$\times$1$\times$2, total energy $-$32.5 eV/Cu]. The indices of Cu2+ (blue ball) spins and superexchanges are marked. It is worth to note that the symmetric OH-HO configuration (total energy $-$33.6 eV/Cu) isn’t energetically favorable compared to the nonsymmetric one (see b, total energy $-$33.9 eV/Cu). Table 2: Optimized bond angles of $\angle$CuOCu and bond lengths of Cu-O for different stacking sequences, as well as the NN exchange couplings calculated by DFT + $U$ (see Table 3). supercells | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling | $\angle$CuOCu | Cu-O | coupling ---|---|---|---|---|---|---|---|---|---|---|---|--- Br-Br | 115.5∘ | 1.97Å | $J_{1\mathrm{a}}$=56K | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ OH-OH | 116.0∘ | 1.97Å | $J_{1\mathrm{b}1}$=94K | 112.7∘ | 1.99Å | $J_{1\mathrm{b}2}$=38K | $-$ | $-$ | $-$ | $-$ | $-$ | $-$ Br-OH-Br | 116.6∘ | 1.99Å | $J_{1\mathrm{c}1}$=93K | 108.2∘ | 2.02Å | $J_{1\mathrm{c}2}=-$11K | 117.0∘ | 1.95Å | $J_{1\mathrm{c}3}$=101K | 116.8∘ | 1.96Å | $J_{1\mathrm{c}4}$=95K Table 3: Collinear magnetic states and their energy differences from the fully ferromagnetic state. From fitting these energy differences, we obtain the exchange couplings, including NN $J_{1}$, second-neighbor $J_{2}$, and interlayer $J_{\perp}$. The least-squares standard deviation is defined as $\sigma$ = $\sqrt{\frac{1}{N_{0}}\sum_{i}(X_{i}^{\mathrm{DFT}}-X_{i}^{\mathrm{fit}})^{2}}$, where $X_{i}^{\mathrm{DFT}}$ and $X_{i}^{\mathrm{fit}}$ are the DFT and fitted values, respectively, $N_{0}$ is the number of the data points. Br-Br, $St$ = $\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}\rangle$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\mid\uparrow\uparrow\downarrow\uparrow\uparrow\uparrow\rangle$ ---|---|---|---|---|---|---|--- DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 232.7 | 234.4 | 117.7 | 231.4 | 229.3 | 174.4 | 116.9 least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 233.2 | 234.1 | 117.5 | 230.8 | 229.9 | 174.9 | 115.7 exchange couplings and standard deviation | $J_{1\mathrm{a}}$ = 56.2 K, $J_{2\mathrm{a}}$ = 2.0 K, $J_{3\mathrm{a}}$ = $-$0.4 K, $J_{d\mathrm{a}}$ = 1.2 K, and $\sigma_{\mathrm{a}}$ = 0.6 K OH-OH, $St$ = $\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}\rangle$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\downarrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\uparrow\uparrow\rangle$ | $\mid\uparrow\downarrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\mid\uparrow\uparrow\downarrow\uparrow\uparrow\uparrow\rangle$ ---|---|---|---|---|---|---|--- DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 265.7 | 264.4 | 132.0 | 263.0 | 260.9 | 224.8 | 132.2 least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 265.9 | 264.7 | 131.7 | 262.5 | 261.3 | 224.8 | 131.7 exchange couplings and standard deviation | $J_{1\mathrm{b}1}$ = 94 K, $J_{1\mathrm{b}2}$ = 38 K, $J_{2\mathrm{b}}$ = 0.5 K, $J_{3\mathrm{b}}$ = $-$0.6 K, $J_{d\mathrm{b}}$ = $-$0.6 K, and $\sigma_{\mathrm{b}}$ = 0.3 K Br-OH-Br, $St$ = | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow$ | $\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow$ | $\mid\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow$ | $\mid\downarrow\uparrow\uparrow\uparrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow$ | $\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow$ ---|---|---|---|---|---|---|--- $\mid S_{1}^{z}S_{2}^{z}S_{3}^{z}S_{4}^{z}S_{5}^{z}S_{6}^{z}S_{7}^{z}S_{8}^{z}S_{9}^{z}S_{10}^{z}S_{11}^{z}S_{12}^{z}\rangle$ | $\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\downarrow\uparrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\uparrow\downarrow\downarrow\uparrow\downarrow\downarrow\rangle$ | $\uparrow\downarrow\uparrow\downarrow\uparrow\uparrow\rangle$ | $\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow\rangle$ | $\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$ | $\uparrow\uparrow\downarrow\downarrow\downarrow\uparrow\rangle$ DFT + $U$, $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 172.7 | 400.4 | 570.3 | 565.1 | 398.6 | 194.6 | 209.5 least-squares fitted $E$($\mid\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\uparrow\rangle$)$-E$($St$) (K) | 171.3 | 399.0 | 571.7 | 565.1 | 399.0 | 194.1 | 209.0 exchange couplings and standard deviation | $J_{1\mathrm{c}1}$ = 93 K, $J_{1\mathrm{c}2}$ = $-$11 K, $J_{1\mathrm{c}3}$ = 101 K, $J_{1\mathrm{c}4}$ = 95 K | $J_{2\mathrm{c}}$ = 1.3 K, $J_{\perp\mathrm{c}}$ = 0.7 K, and $\sigma_{\mathrm{c}}$ = 0.9 K Starting with the optimized crystal structures, we further calculated the exchange couplings from the energy differences between the fully ferromagnetic state and various collinear states. The exchange integrals monotonically decrease with the increasing of the Coulomb repulsion $U_{\mathrm{eff}}$ [76, 77, 47]. For YCOB, we fixed $U_{\mathrm{eff}}$ = 8.72 eV in all GGA + $U$ calculations, and obtained the average $\bar{J}_{1}$ = (2$J_{1\mathrm{a}}$+$J_{1\mathrm{b}1}$+$J_{1\mathrm{b}2}$+$J_{1\mathrm{c}1}$+$J_{1\mathrm{c}2}$+$J_{1\mathrm{c}3}$+$J_{1\mathrm{c}4}$)/8 = 65 K (see Table 3), in good agreement with the experimental result of $|\theta_{\perp}|$ $\sim$ $|\theta_{\parallel}|$ $\sim$ 60 K. From fitting these energy differences, we obtain the exchange couplings for each stacking sequence of Br/OH (see Table 3). Based on the above DFT + $U$ calculations, the following conclusions can be drawn: (1) In YCOB, all the long-distance couplings beyond NNs are negligible, $|J_{2}|$/$\bar{J}_{1}$ $<$ 4%, $|J_{3}|$/$\bar{J}_{1}$ $<$ 2%, $|J_{d}|$/$\bar{J}_{1}$ $<$ 2%, and $|J_{\perp}|$/$\bar{J}_{1}$ $<$ 2% (see Table 3), due to the spatial localization of the 3$d$ electrons (highly similar to YCu3(OH)6Cl3 [47]). This significantly simplifies the exchange model for YCOB. (2) The antisite disorder of OH/Br strongly influences the NN exchange couplings ($J_{1}$), and causes the alternation of two NN exchanges along the randomly distributed (1$-f_{\mathrm{Y}1}$$\sim$ 70%) nonsymmetric hexagons of the kagome lattice, ($J_{1\mathrm{c}3}-J_{1\mathrm{c}4}$)/($J_{1\mathrm{c}3}+J_{1\mathrm{c}4}$) $\sim$ 0.03, ($J_{1\mathrm{b}1}-J_{1\mathrm{b}2}$)/($J_{1\mathrm{b}1}+J_{1\mathrm{b}2}$) $\sim$ 0.43, and ($J_{1\mathrm{c}1}-J_{1\mathrm{c}2}$)/($J_{1\mathrm{c}1}+J_{1\mathrm{c}2}$) $\sim$ 1.26. (3) There exist no orphan spins, even in the presence of the mixing between OH and Br. The antisite disorder occurs around the high-symmetry Wyckoff position, 1$a$, and thus the weaker and stronger bonds alternate along the hexagon in the nonsymmetric environment. Although one of the alternate $\angle$CuOCu may be profoundly reduced to $\sim$ 108.2∘ (see Table 2), and the strength of the coupling can be surprisingly weak, e.g., $|J_{1\mathrm{c}2}|$ $\sim$ 11 K, there exist no orphan Cu2+ spins that are weakly coupled to all the other ones. Similar to the case of the nonmagnetic impurities in the kagome Heisenberg antiferromagnet (KHA) [55, 56, 57], nearly free local moments can nevertheless be induced by the bond randomness in YCOB, which accounts for almost all of the low-temperature observations (see main text for model no.2), including the weak upturn seen in susceptibilities, the slight polarization in magnetization, and the very narrow ESR signals (see above). ## Appendix C Refinement of the exchange Hamiltonian. In this section, we make great efforts to determine the exchange Hamiltonian of the KHA YCOB. At present, we have collected both susceptibility and specific heat data of YCOB, which can be used to refine the spin Hamiltonian. However, it is still extremely challenging to extract precisely the magnetic contribution from the total specific heat above $\sim$ 10 K (see Appendix D), in the absence of nonmagnetic reference compounds. Therefore, below we mainly focus on the magnetic susceptibilities of the YCOB single crystal measured both parallel and perpendicular to the $c$ axis. ### C.1 No evident orphan spins. In YCOB, the significant antisite disorder between magnetic Cu2+ and other nonmagnetic ions, i.e., Y3+, H(D)+, O2-, Br- is expected to be prohibited owing to the large differences in ionic charges and radii, and thus orphan spins should be negligible without any obvious impurity phases [40, 41]. Following the method previously used in the KHA herbertsmithite [22], we try to reproduce the magnetization measured at 2 K and up to 14 T ($\mu_{\mathrm{B}}g_{\eta}\mu_{0}H$ $\sim$ 0.35$J_{1}$) parallel and perpendicular to the $c$ axis, by a combination of a Brillouin function for “free” spins and a linear magnetization for “intrinsic” kagome spins [see Fig. 2(a)], $M_{\eta}=\frac{f_{\eta}g_{\eta}N_{\mathrm{A}}\mu_{\mathrm{B}}}{2}\frac{\exp(\frac{\mu_{\mathrm{B}}g_{\eta}\mu_{0}H}{k_{\mathrm{B}}T})-1}{\exp(\frac{\mu_{\mathrm{B}}g_{\eta}\mu_{0}H}{k_{\mathrm{B}}T})+1}+\chi_{i}^{\eta}H,$ (5) where $f_{\eta}$ and $\chi_{i}^{\eta}$ are fitting parameters for the fraction of free spins and nonsaturated “intrinsic” susceptibilities, respectively. We obtain $f_{\parallel}$ = 0.80%, $\chi_{i}^{\parallel}$ = 0.048 cm3/mol-Cu and $f_{\perp}$ = 0.75%, $\chi_{i}^{\perp}$ = 0.043 cm3/mol-Cu parallel and perpendicular to the $c$ axis, respectively. However, when the formalism of the free spins is extended to the specific heat, we find obvious inconsistency. The specific heat contributed by free spins is given by, $C_{f}(\mu_{0}H_{\parallel})=f_{\parallel}R\frac{[\frac{\Delta E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]^{2}\exp[\frac{\Delta E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]}{\\{\exp[\frac{\Delta E(\mu_{0}H_{\parallel})}{k_{\mathrm{B}}T}]+1\\}^{2}},$ (6) where $\Delta E(\mu_{0}H_{\parallel})$ = $\mu_{\mathrm{B}}g_{\eta}\mu_{0}H_{\parallel}$ is the energy gap between two Zeeman levels of free spins under the magnetic field of $H_{\parallel}$ applied along the $c$ axis. At 2 T, the calculated $C_{f}$/$T$ displays an obvious peak at $T$ = 0.9 K [see the green line in Fig. 2(b)], while the total measured one ($C_{\mathrm{p}}$/$T$) shows no sign of peaks below 1.5 K. Moreover, at 0.36 K the Schottky specific heat $C_{f}$/$T$ = 0.067 JK-2/mol-Cu calculated at 0.4 T is even larger than the total ones, 0.038 and 0.043 JK-2/mol-Cu measured at 0 and 2 T, respectively [Fig. 2(b)]. In the model widely used in other frustrated magnets, e.g., ZnCu3(OH)6Cl2 [23] and [NH4]2[C7H14N][V7O6F18] [34], both the lattice and “intrinsic” magnetic specific heat is believed to be independent of applied magnetic field up to $\sim$ 9 T, and thus their contributions are expected to be completely canceled out in the subtracted data, $\Delta C_{\mathrm{p}}$/$T$ = [$C_{\mathrm{p}}(\mathrm{0~{}T})-C_{\mathrm{p}}(\mu_{0}H_{\parallel})$]/$T$, as shown in Fig. 2(c). However, the Schottky model [$C_{f}(\mathrm{0~{}T})-C_{f}(\mu_{0}H_{\parallel})$]/$T$, see Eq. (6) for $C_{f}$] with $f_{\parallel}$ = 0.80% clearly fails to capture the subtracted data of YCOB, with a rather large residual $R_{p}$ = 32.3 $\gg$ 1 [see Eq. (1) for the definition of $R_{p}$]. Following Refs. [23, 34], we also treat both $f_{\parallel}$ and $\Delta E(\mu_{0}H_{\parallel})$ as adjustable parameters, and obtain $f_{\parallel}$ = 0.04, $\Delta E$(0 T) = 7.4 K, $\Delta E$(2 T) = 7.7 K, $\Delta E$(6 T) = 9.5 K, and $\Delta E$(9 T) = 11.4 K with the least $R_{p}$ = 17.4 $\gg$ 1\. In sharp contrast to ZnCu3(OH)6Cl2 [23], [NH4]2[C7H14N][V7O6F18] [34], and ZnCu3(OH)6SO4 [36], etc., the fitted $\Delta E(\mu_{0}H_{\parallel})$ in YCOB clearly deviates far from the expected Zeeman energy gap of free spins. The above inconsistency unambiguously demonstrates that the concentration of orphan spins is much lower than 0.8%. The slight polarization and weak upturn observed in the low-$T$ (below 0.2$J_{1}$) magnetization and susceptibilities, respectively, should be governed by the “intrinsic” magnetic properties of the KHA YCOB. Based on the DFT + $U$ calculations discussed in Appendix B, the site mixing between OH and Br causes two alternate exchanges along 70% of the hexagons on the kagome lattice, and leads to the random model no.2, which resolves the above inconsistency naturally [see main text for the reproduction of the weak upturn and slight polarization, and see Fig. 2(c) for the simulations of the specific heat differences above $\sim$ 7 K $\sim$ 0.1$J_{1}$]. Even when the Brillouin function for 0.8% of the free spins is subtracted from the raw susceptibilities [see Fig. 2(d)], we find that the final refinement results keep almost unchanged 666The main changes are the increases of the fitted $J_{1}$ and least $R_{p}$ by $\sim$ 2 K and $\sim$ 0.6, respectively, after the subtraction., as the difference is really trivial above $T_{\mathrm{min}}$ = 6 K (see Fig. 13). Therefore, we use the experimental raw susceptibilities to refine the exchange Hamiltonian below. ### C.2 Finite-temperature Lanczos diagonalization (FLD) method Figure 11: Calculated magnetic susceptibility (a) and specific heat (b) of the 27-site NN-KHA cluster as function of normalized temperature ($T/J_{1}$) at zero field, with the reported 42-site FLD results [50] for comparison. The size effect is negligible at $T$ $\geq$ 0.1$J_{1}$. The inset of (a) shows the 27-site KHA cluster with the Heisenberg exchange interactions (colored arrows). Calculated magnetic susceptibility (c) and specific heat (d) of the 24-, 21-, and 18-site NN-KHA clusters as function of normalized temperature at zero field, with the reported 24-site ED [81], 39- and 42-site FLD [50] results for comparison. The inset of (c) displays the 21-site KHA cluster. The size effect of susceptibility is negligible at $T$ $\geq$ 0.2$J_{1}$, whereas the specific heat shows size effect below $\sim$ 0.3$J_{1}$. Figure 12: (a, b) Least-$R_{p}$ fits to the experimental raw susceptibilities with different fixed fluctuations of exchange couplings, $\Delta J$/$J_{1}$, at $f_{\mathrm{Y}1}$ = 0.3 experimentally determined by XRD, above 6 K. The FLD calculations on various size random KHA clusters are conducted, and the finite-size effect is almost negligible at $\Delta J$/$J_{1}$ $\geq$ 0.7 (see a and b). For clarity, we present here only the low-$T$ data, please see main text for the full temperature range. Figure 13: (a, b) Calculated susceptibilities of the 18-site NN-KHA clusters with the Lorentzian distribution of the NN Heisenberg interactions. (c, d) Calculated susceptibilities of the 27-site NN-KHA clusters with the Lorentzian distribution of the $g$ factors. The experimental raw data of YCOB measured perpendicular and parallel to the $c$ axis are shown by gray circles, the data subtracted by the Brillouin functions for $\sim$ 0.8% of free spins are displayed by black squares, and the dashed lines mark the lower valid bounds of the 18- and 27-site FLD simulations $T_{\mathrm{min}}$ = 0.2$J_{1}$ and 0.1$J_{1}$, respectively, in the ideal KHA case. The insets of (a, c) display the randomness strength dependence of the deviation $R_{p}$ (fit to data above $T_{\mathrm{min}}$). We carried out FLD calculations for the thermodynamic properties on the 18-, 21-, 24-, and 27-site kagome clusters with periodic boundary conditions (PBC) [82, 75] [insets of Fig. 11(a) and 11(c)]. 40 Lanczos steps and 10 different randomly chosen states were used in all our FLD calculations. The finite-size effect of susceptibility turns out to be negligible above $T_{\mathrm{min}}$ = 0.1$J_{1}$ $\sim$ 7 K and 0.2$J_{1}$ $\sim$ 12 K for the 27- and 21-(18-, 24-) site FLD calculations, respectively, with the error less than $\sim$ 1% compared to the reported 42-site results [50] (see Fig. 11). In our 27-site FLD calculations, $S^{z}\equiv\sum_{j}S_{j}^{z}$ symmetry of the system was used, and the exact diagonalization calculations were conduced in the subspaces of $|S^{z}|$ $\geq$ 23/2 [50]. No obvious difference between two independent 27-site FLD calculations is found [see Fig. 11(a) and 11(b)]. In the ideal $S$ = $\frac{1}{2}$ NN-KHA case, broad peaks of our calculated magnetic susceptibility and specific heat appear at $T_{\mathbf{p}}$($\chi$) = 0.154(4)$J_{1}$ and $T_{\mathbf{p}}$($C$) = 0.670(2)$J_{1}$, respectively, which are well consistent with the previously reported results [50]. The ideal $S$ = $\frac{1}{2}$ NN-KHA model can’t capture precisely the magnetic susceptibilities measured on YCOB below $T$ $\sim$ 0.6$J_{1}$ $\sim$ 40 K [see Figs. 11(a)]. To better understand the thermodynamic observations, we consider a more complicated spin Hamiltonian with bond randomness. In this section, we first fixed the NN exchange coupling at $J_{1}$ = 1, and calculated the thermodynamic quantities with varying strength of the perturbations. Thereupon, we simultaneously fit the magnetic susceptibilities of YCOB measured both parallel and perpendicular to the $c$ axis above $T_{\mathrm{min}}$ through fine-tuning $J_{1}$ and $g$ by minimizing the following loss function [see Eq. (1)]. ### C.3 Bond randomness. Based on the crystal structure determined by XRD (see Table 1), as well as our DFT + $U$ calculations (see Appendix B), we constructed the model no.2 with randomly distributed hexagons of alternate bonds (see main text), and performed the FLD calculations on the 18-, 21-, 24-, and 27-site clusters with PBC. The calculated thermodynamic data are evaluated over 80, 80, 40, and 36 independent samples for the 18-, 21-, 24-, and 27-site FLD calculations, respectively, that have led to fully converged results of the random KHA ($X_{i}^{\mathrm{cal}}$) (see Fig. 12). The fluctuation of the bonds ($\Delta J$/$J_{1}$) gradually induces local moments, which account for the growth of the upturn in susceptibility and the decrease of the finite-size effect of the FLD calculations. At $\Delta J$/$J_{1}$ $\geq$ 0.7, the finite-size effect almost disappears and our FLD simulations get very convincing even at low temperatures ($T\sim$ 0.1$J_{1}$). Both the weak upturn below $\sim$ 0.5$J_{1}$ and broad hump at $\sim$ $J_{1}$ seen in susceptibilities can be excellently reproduced by this model (see Fig. 12). If the local symmetries of the bond randomness aren’t taken into account and conventional Lorentzian distributions of the exchange couplings and $g$ factors are introduced (the average values are $\langle J_{1}\rangle$ and $\langle g\rangle$, and the full widths at half maximum are $\Delta J_{1}$ and $\Delta g$) [83, 78, 8, 52, 84, 53], there’s no way one can better fit the magnetic susceptibilities measured on YCOB, and the residual $R_{p}$ increases monotonically with the complete and continuous randomness (see Figs. 13). Because the complete and continuous randomness fails to reproduce the characteristic hump seen in susceptibilities at $\sim$ $J_{1}$. The above analysis further validates our microscopic exchange model no.2 based on the crystal structure and DFT + $U$ calculations for YCOB. ## Appendix D Magnetic specific heat and entropy. Figure 14: (a, b) Temperature dependence of the total specific heat ($C_{\mathrm{p}}$, per mol Cu2+) measured on the YCOB single crystal at 0 T. The red lines show the least-$R_{p}$ fit using the fixed model nos.1 (pure NN- KHA, see a) and 2 (with randomly distributed hexagons of alternate bonds, see b) and the green lines present the resulted lattice contributions ($C_{\mathrm{la}}$). (c) Magnetic specific heat of YCOB, with $C_{\mathrm{p}}$ for comparison. The violet and olive lines display the specific heat calculated by using models nos.1 ($C_{\mathrm{nn}}$) and 2 ($C_{\mathrm{ra}}$), respectively. Figure 15: (a) Magnetic specific heat of YCOB ($C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$) obtained by subtracting the refined lattice contributions from the total one (see Fig. 14). The colored lines represent the specific heat calculated by using the model nos. 1 and 2 (see main text). (b) The magnetic specific heat of YCOB ($C_{\mathrm{m1}}$) with the colored lines showing the power-law fits. The raw $C_{\mathrm{p}}$ data are shown for comparison. (c) The corresponding $C_{\mathrm{m1}}$ vs $T^{-1}$ plot with the colored lines showing the exponential fits below 0.4 K. (d) Magnetic entropy of YCOB, $S_{\mathrm{m1}}$ and $S_{\mathrm{m2}}$, obtained from integrating $C_{\mathrm{m1}}/T$ and $C_{\mathrm{m2}}/T$, respectively. Above $\sim$ 10 K, extracting precise magnetic specific heat from the total measured one is an extremely challenging task, in the absence of nonmagnetic reference compounds. Recently, a relatively convincing method had been reported in the frustrated magnets YCu3(OH)6Cl3 [47] and $\alpha$-CrOOH(D) [75]. In this method, one first fits the total measured specific heat by using a combination of a typical Debye-Einstein lattice model and the fixed FLD result (the spin Hamiltonian determined by magnetization/susceptibility measurements is fixed) well above $T_{\mathrm{min}}$. After subtracting the refined Debye-Einstein lattice contribution, one obtains the magnetic specific heat in the full temperature range. In the case of YCOB, we use the 27-site FLD specific heat results calculated from the pure NN-KHA ($C_{\mathrm{nn}}$, $J_{1}$ = 61.9 K, model no.1) and random Hamiltonians($C_{\mathrm{ra}}$, $J_{1}$ = 50 K and $\Delta J$ = 0.7$J_{1}$, model no.2), and choose to fit the total measured specific heat above 30 K through tuning the Debye and Einstein temperatures [see Figs. 14(a) and 14(b)]. Each unit cell of YCOB has $\sim$ 19.5 atoms (see Table 1), and thus 3 acoustic and $\sim$ 55.5 optical vibration modes. Therefore, we use the similar Debye-Einstein function previously reported in Ref. [75] for YCOB, $3C_{\mathrm{la}}=\frac{9RT^{3}}{\Theta_{\mathrm{D}}^{3}}\int_{0}^{\frac{\Theta_{\mathrm{D}}}{T}}\frac{\xi^{4}e^{\xi}}{(e^{\xi}-1)^{2}}\mathrm{d}\xi\\\ +\frac{R}{T^{2}}\sum_{n=1}^{5}\frac{w_{n}\Theta_{\mathrm{E}n}^{2}e^{\frac{\Theta_{\mathrm{E}n}}{T}}}{(e^{\frac{\Theta_{\mathrm{E}n}}{T}}-1)^{2}},$ (7) where $\Theta_{\mathrm{D}}$ and $\Theta_{\mathrm{E}n}$ are fitting parameters. From fitting, we obtain two series of very similar Debye and Einstein temperatures [$\Theta_{\mathrm{D}}$ and $\Theta_{\mathrm{E}n}$ ($n$ = 1, 2, 3, 4, 5), listed in Figs. 14(a) and 14(b)] by fixing $w_{1}$, $w_{2}$, $w_{3}$, $w_{4}$, $w_{5}$ = 6, 9, 9, 12, 19.5, respectively. We further calculate (extrapolate) the Debye-Einstein lattice specific heat using Eq. (7) in the full temperature range [see Figs. 14(a) and 14(b)], and get the magnetic specific heat by removing the lattice contributions [47]. As shown in Fig. 14(c), the resulted magnetic specific heat, $C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$, indeed show little dependence upon the starting KHA model below $\sim$ 6 K. To be completely unbiased, we never use the specific heat data above 2 K to refine the spin Hamiltonian throughout this work. Figure 16: (a, c) Temperature dependence of magnetic specific heat $C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$ under various magnetic fields applied along the $c$ axis. Above $\sim$ 1.2 K, the zero-field data roughly show powder-law behaviors, $C_{\mathrm{m1}}$/$T$ $\sim$ $T^{-0.47}$ (a) and $C_{\mathrm{m2}}$/$T$ $\sim$ $T^{-0.33}$ (c), respectively. The orange lines mark the quadratic behavior $C_{\mathrm{m}}$/$T$ $\propto$ $T$. (b, d) Data collapse in YCOB observed above $\sim$ 1.2 K. There is no difference between $C_{\mathrm{m1}}$ and $C_{\mathrm{m2}}$ below $\sim$ 6 K, and thus we only show $C_{\mathrm{m1}}$ in Figs. 15(b) and 15(c). Below 2 K, the lattice specific heat is completely negligible, which is more than two orders of magnitude smaller than the total $C_{\mathrm{p}}$ measured on YCOB [see Figs. 14(a) and 14(b)]. The (magnetic) specific heat of YCOB shows a power-law behavior, $C_{\mathrm{m}}$ $\propto$ $T^{\alpha}$ at $T$ $<$ 1 K [see Fig. 15(b)]. Alternatively, one could fit the low-temperature specific heat assuming an exponential behavior, $C_{\mathrm{m}}$ $\propto$ $\exp(-\Delta_{\mathrm{g}}/T)$, but such a fit extends only up to 0.4 K with a very small gap $\Delta_{\mathrm{g}}$ $\leq$ 0.9 K = 0.015$J_{1}$ [see Fig. 15(c)]. Below $\sim$ 1 K, the temperature dependence of magnetic entropy flattens out at $S_{\mathrm{m}}$ $\leq$ 1.3%$R\ln 2$ [see Fig. 15(d)], suggesting that we are indeed accessing the GS properties. The final increase of the magnetic entropy of using model no.2 from 0.36 to 220 K is more close to the expected value of $R\ln 2$ based on the third law of thermodynamics than those of using other models, possibly further confirming the validation of the random model no.2 in YCOB. ## Appendix E Scaling plot of specific heat. Recently, Kimchi et al. have developed a theory for the scaling collapse based on an emergent random-singlet regime in frustrated disordered quantum spin systems [60]. This theory is applicable to lots of spin-$\frac{1}{2}$ quantum magnets including LiZn2Mo3O8 and ZnCu3(OH)6Cl2, where the low-$T$ specific heat behaves as $C$($H,T$)/$T$ $\sim$ $H^{-\gamma}F_{q}$($T$/$H$). Here, $F_{q}$ is a general scaling function [60]. Above $\sim$ 0.02$J_{1}$ $\sim$ 1.2 K, the temperature and field dependence of the magnetic heat capacity of YCOB are highly similar to those of LiZn2Mo3O8 (see Fig. 16) [60], and indeed show a scaling collapse with a familiar $\gamma$ $\sim$ 0.33–0.47 (see Fig. 16) owing to the bond randomness. However, below $\sim$ 0.02$J_{1}$ $\sim$ 1.2 K the zero-field magnetic specific heat of YCOB $C_{\mathrm{m}}$/$T$ increases with the temperature, $C_{\mathrm{m}}$/$T$ $\sim$ $T^{1.31(1)}$ [see Fig. 15(b)], giving rise to a negative $\gamma$ = $-$1.31(1). However, the theory for the scaling collapse is based on the non- universal exponent 0 $\leq$ $\gamma$ $\leq$ 1, and thus obviously isn’t applicable to YCOB below the crossover temperature of $\sim$ 0.02$J_{1}$ $\sim$ 1.2 K [see Figs. 16(b) and 16(d)]. ## Appendix F Mean-field Ansatz of various spin-liquid states. In this section, we try to understand the specific heat behavior of YCOB below $\sim$ 2 K, where the lattice contribution is completely negligible and the raw measured data directly reflect the GS properties of the spin system. Since no conventional magnetic transition is found in YCOB, we start with the effective mean-field models (i.e. mean-field Ansatz) of various QSLs, including the uniform resonating-valence-bond (RVB), U(1) Dirac, and $\mathbb{Z}_{2}$ states on the kagome lattice. Figure 17: (a, e, i) Kagome lattice with showing the sign structures of hopping terms in a unit cell. Red and blue solid lines present the first- neighbor $\nu_{jl}$ = 1 and $-$1, whereas the red and blue dashed lines (i) present the second-neighbor $\nu_{jl^{\prime}}$ = 1 and $-$1, respectively. (b, f, j) The first Brillouin zone for the uniform RVB, U(1) Dirac, and $\mathbb{Z}_{2}[0,\pi]\beta$ QSL states. The outer hexagons show the first Brillouin zone for the kagome lattice with the arrows showing the [$h$, 0, 0] and [0, $k$, 0] directions. The black circles mark the positions of the Dirac nodes in (f). (c, g, k) The band structures of the uniform RVB, U(1) Dirac, and $\mathbb{Z}_{2}[0,\pi]\beta$ QSL states along the [0, $k$, 0] direction at $h$ = 0. The calculated band structures in 0 and 6 T are shown by the blue and red lines, respectively. In the cases of (c) uniform RVB and (g) U(1) Dirac QSLs, the spin-up and -down bands of spinons are degenerate in zero field (the flat band marked in blue is fourfold degenerate in g), and are split in an applied magnetic field (the flat bands marked in red are still doubly degenerate in g). In the case of $\mathbb{Z}_{2}[0,\pi]\beta$ state (k), the applied field shifts the energy levels up by $\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$. (d, h, l) Low-$T$ specific heat of YCOB measured in magnetic fields applied along the $c$ axis, with colored lines showing the calculations using the mean-field Ansatz of uniform RVB, U(1) Dirac, and $\mathbb{Z}_{2}[0,\pi]\beta$ states. The solid lines display the fits with the adjustable effective magnetic moment $\mu_{\mathrm{eff}}$ $\sim$ 0.5$\mu_{\mathrm{B}}$, whereas the dashed lines show the results with the fixed $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$. ### F.1 Uniform resonating-valence-bond state. The simplest mean-field Hamiltonian is the so-called uniform RVB state and is given by [11], $\mathcal{H}_{\mathrm{uniform}}=-J_{1}[\lambda_{3}\sum_{j\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\chi_{1}\sum_{\langle jl\rangle,\sigma}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.})]\\\ -\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (8) where $\sigma$ = $\uparrow$ ($+$1) and $\downarrow$ ($-$1) represents spin-up and -down fermionic spinons, respectively, $\mu_{\mathrm{eff}}$ is the effective spin-$\frac{1}{2}$ moments, and $\chi_{1}$ is the first-neighbor hopping term [see Fig. 17(a)]. The chemical potential $\lambda_{3}$ in both the uniform RVB and U(1) Dirac scenarios are self-consistently determined by the constraint, $\sum_{j}(\sum_{\sigma}\langle f_{j\sigma}^{{\dagger}}f_{j\sigma}\rangle-1)$ = 0, at each temperature and in each applied magnetic field [11], and $J_{1}$ = 60 K is fixed in this section. It is worth mentioning that the above constraint isn’t strict enough to impose the single-occupancy constraint $\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}$ = 1 [7]. Therefore, in the framework of the mean-field theory many unphysical states can contribute to extra density of states and thus specific heat, which may account for the reduced specific heat coefficient $\gamma_{2}$ and effect magnetic moment $\mu_{\mathrm{eff}}$ observed in YCOB (see below). Below $\sim$ 1 K, the zero-field specific heat of YCOB exhibits a nearly quadratic temperature dependence, $C_{\mathrm{\mathrm{p}}}$ = 0.142(1)$T^{2.31(1)}$ (JK-1/mol-Cu), which contradicts with the uniform RVB state. A linear temperature dependence of specific heat is expected in the uniform RVB state, because of the large Fermi surface [see Fig. 17(c)]. The applied magnetic field up to $\sim$ 6 T only slightly changes the density of states around Fermi surface, and thus the calculated field dependence of specific heat is extremely weak [see Fig. 17(d)]. In contrast, the specific heat measured on YCOB shows a clear magnetic field dependence [see Fig. 17(d)], and thus unambiguously precludes the uniform RVB scenario. ### F.2 U(1) Dirac spin liquid. Similarly, the mean-field Ansatz of the U(1) SL state is given by [11], $\mathcal{H}_{\mathrm{U(1)}}=-J_{1}[\lambda_{3}\sum_{j,\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\chi_{1}\sum_{\langle jl\rangle,\sigma}\nu_{jl}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.})]\\\ -\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (9) where $\nu_{jl}$ $\equiv$ $\pm$1 presents the sign structure of hopping terms [see Fig. 17(e)]. Our calculated band structure is identical to that reported in Ref. [11], and the temperature and field dependence of low-$T$ specific heat in both $\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$ $\ll$ $k_{\mathrm{B}}T$ $\ll$ $\chi_{1}J_{1}$ and $k_{\mathrm{B}}T$ $\ll$ $\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}$ $\ll$ $\chi_{1}J_{1}$ limits are reproduced. At 0 T, the low-$T$ specific heat of U(1) SL state behaves as $C_{\mathrm{p}}$ = $\frac{72\zeta(3)\pi k_{\mathrm{B}}^{3}A}{(2\pi\hbar v_{\mathrm{F}})}T^{2}$ (JK-1/mol-Cu) [11], where $v_{\mathrm{F}}$ = $\frac{a\chi_{1}J_{1}}{\sqrt{2}\hbar}$ is the Fermi velocity and $A$ = $\frac{\sqrt{3}N_{\mathrm{A}}a^{2}}{6}$ = 7.72$\times$104 m2/mol-Cu is the area of the two-dimensional system. From fitting the specific heat using the quadratic-temperature function below $\sim$ 1 K, we obtain $C_{\mathrm{p}}\sim\gamma_{2}T^{2}$ with $\gamma_{2}$ = 0.11(1) JK-3/mol-Cu at 0 T, and thus $v_{\mathrm{F}}$ = 1.07(5)$\times$103 m/s, in YCOB. The resulted $\chi_{1}$ = 0.29(1) is roughly consistent with the mean-field value of $\chi_{1}(\mathrm{MF})$ = 0.221 found by Hastings [64], and thus supports the U(1) Dirac scenario in YCOB. The mean-field theory gives a slightly overestimated specific heat coefficient $\gamma_{2}(\mathrm{MF})$ = $\frac{6\sqrt{3}\zeta(3)k_{\mathrm{B}}^{3}N_{\mathrm{A}}}{\pi J_{1}^{2}[\chi_{1}(\mathrm{MF})]^{2}}$ = 0.188 JK-3/mol-Cu, possibly owing to the unphysical states (see above). When a magnetic field is applied, the band structure tends to form Fermi pockets around the Dirac nodes in the reciprocal space [see Fig. 17(g)]. Therefore, both low-energy density of states and thus low-$T$ specific heat increase with the strength of the magnetic field. The spinons with the free electron moment $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$ will cause a stronger dependence of specific heat upon the magnetic field, and obviously can’t explain the observations, resulting in a large $R_{p}$ = 127 [see Fig. 17(h)]. A remedy is to set $\mu_{\mathrm{eff}}$ an adjustable parameter. From fitting all the low-$T$ ($<$ 1 K) specific heat data of YCOB simultaneously, we obtain $\chi_{1}$ = 0.27 and a significantly reduced moment $\mu_{\mathrm{eff}}$ = 0.43$\mu_{\mathrm{B}}$ with the least $R_{p}$ = 20.4 [see Fig. 17(h)]. ### F.3 $\mathbb{Z}_{2}[0,\pi]\beta$ spin liquid. Finally, we check the $\mathbb{Z}_{2}$ scenario for YCOB, and use the mean- field Hamiltonian previously reported in Ref. [63], $\mathcal{H}_{\mathbb{Z}_{2}}=-J_{1}[\sum_{j}(\lambda_{3}\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{j\sigma}+\lambda_{1}f_{j\uparrow}^{{\dagger}}f_{j\downarrow}^{{\dagger}}+\mathrm{H.c.})\\\ +\chi_{1}\sum_{\langle jl\rangle,\sigma}\nu_{jl}(f_{j\sigma}^{{\dagger}}f_{l\sigma}+\mathrm{H.c.}\\\ +\sum_{\langle\langle jl^{\prime}\rangle\rangle}\nu_{jl}(\chi_{2}\sum_{\sigma}f_{j\sigma}^{{\dagger}}f_{l^{\prime}\sigma}+\Delta_{2}\sum_{\sigma}\sigma f_{j\sigma}^{{\dagger}}f_{l^{\prime}\bar{\sigma}}^{{\dagger}}+\mathrm{H.c.})]\\\ -\mu_{0}H_{\parallel}\mu_{\mathrm{eff}}\sum_{j,\sigma}\sigma f_{j\sigma}^{{\dagger}}f_{j\sigma},$ (10) where $\lambda_{1}$ and $\lambda_{3}$ are single-ion chemical potentials self- consistently determined by $\sum_{j}\langle f_{j\uparrow}^{{\dagger}}f_{j\downarrow}^{{\dagger}}\rangle$ = $\sum_{j}\langle f_{j\uparrow}f_{j\downarrow}\rangle$ = 0 and $\sum_{j}(\sum_{\sigma}\langle f_{j\sigma}^{{\dagger}}f_{j\sigma}\rangle-1)$ = 0, and the mean-field Ansatz up to the second neighbors in a unit cell is shown in Fig. 17(i). By setting the mean-field parameters $\chi_{2}$ = $\Delta_{2}$ = 0, we naturally go back to the U(1) Dirac scenario [see Eq. (9)], and reproduce the band structure 777It is worth mentioning that there is a flip for the spin-down band since we use the Nambu representation in the $\mathbb{Z}_{2}[0,\pi]\beta$ scenario. and observable quantities (e.g., specific heat) of the U(1) Dirac QSL. When both $\chi_{2}$ and $\Delta_{2}$ are small, the $\mathbb{Z}_{2}[0,\pi]\beta$ state is in the neighborhood of the U(1) Dirac SL state, and has a small gap due to the singlet-pairing term $\Delta_{2}$ $\neq$ 0 around the wave vectors of the previous U(1) Dirac nodes. Similarly, from fitting the specific heat data below $\sim$ 1 K we obtain $\chi_{1}$ = 0.176, $\chi_{2}$ = 0.043, $\Delta_{2}$ = 0.013, and $\mu_{\mathrm{eff}}$ = 0.48$\mu_{\mathrm{B}}$ with the least $R_{p}$ = 7.9 [see Fig. 17(l)]. The $\Delta_{2}$ term opens a small spin (triplet) gap $\sim$ 0.14$\chi_{1}J_{1}$ $\sim$ 0.025$J_{1}$ in the band structure [see Fig. 17(k)]. When $\mu_{\mathrm{eff}}$ = $\mu_{\mathrm{B}}$ is fixed, we get $\chi_{1}$ = 0.160, $\chi_{2}$ = 0.11, and $\Delta_{2}$ = 0.014, with $R_{p}$ = 32.4 [see Fig. 17(l)]. ## References * Anderson [1973] P. W. Anderson, Resonating valence bonds: A new kind of insulator?, Mater. Res. Bull. 8, 153 (1973). * Nayak _et al._ [2008] C. Nayak, S. H. Simon, A. Stern, M. Freedman, and S. Das Sarma, Non-Abelian anyons and topological quantum computation, Rev. Mod. Phys. 80, 1083 (2008). * Anderson [1987] P. W. Anderson, The resonating valence bond state in La2CuO4 and superconductivity, Science 235, 1196 (1987). * Kasahara _et al._ [2018] Y. Kasahara, T. Ohnishi, Y. Mizukami, O. Tanaka, S. Ma, K. Sugii, N. Kurita, H. Tanaka, J. Nasu, Y. Motome, T. Shibauchi, and Y. Matsuda, Majorana quantization and half-integer thermal quantum Hall effect in a Kitaev spin liquid, Nature 559, 227 (2018). * Balents [2010] L. Balents, Spin liquids in frustrated magnets, Nature 464, 199 (2010). * Broholm _et al._ [2020] C. Broholm, R. J. Cava, S. A. Kivelson, D. G. Nocera, M. R. Norman, and T. Senthil, Quantum spin liquids, Science 367, eaay0668 (2020). * Zhou _et al._ [2017] Y. Zhou, K. Kanoda, and T.-K. Ng, Quantum spin liquid states, Rev. Mod. Phys. 89, 025003 (2017). * Li [2019] Y. Li, YbMgGaO4: A triangular-lattice quantum spin liquid candidate, Adv. Quantum Technol. 2, 1900089 (2019). * Elser [1989] V. Elser, Nuclear antiferromagnetism in a registered ${}^{3}\mathrm{He}$ solid, Phys. Rev. Lett. 62, 2405 (1989). * Waldtmann _et al._ [1998] C. Waldtmann, H.-U. Everts, B. Bernu, C. Lhuillier, P. Sindzingre, P. Lecheminant, and L. Pierre, First excitations of the spin 1/2 Heisenberg antiferromagnet on the kagomé lattice, Eur. Phys. J. B 2, 501 (1998). * Ran _et al._ [2007] Y. Ran, M. Hermele, P. A. Lee, and X.-G. Wen, Projected-wave-function study of the spin-$1/2$ Heisenberg model on the kagomé lattice, Phys. Rev. Lett. 98, 117205 (2007). * Liao _et al._ [2017] H. J. Liao, Z. Y. Xie, J. Chen, Z. Y. Liu, H. D. Xie, R. Z. Huang, B. Normand, and T. Xiang, Gapless spin-liquid ground state in the $S$ =1/2 kagome antiferromagnet, Phys. Rev. Lett. 118, 137202 (2017). * He _et al._ [2017] Y.-C. He, M. P. Zaletel, M. Oshikawa, and F. Pollmann, Signatures of Dirac cones in a DMRG study of the kagome Heisenberg model, Phys. Rev. X 7, 031020 (2017). * Zhu _et al._ [2018] W. Zhu, X. Chen, Y.-C. He, and W. Witczak-Krempa, Entanglement signatures of emergent Dirac fermions: Kagome spin liquid and quantum criticality, Sci. Adv. 4, eaat5535 (2018). * Lee _et al._ [2018] C.-Y. Lee, B. Normand, and Y.-J. Kao, Gapless spin liquid in the kagome Heisenberg antiferromagnet with Dzyaloshinskii-Moriya interactions, Phys. Rev. B 98, 224414 (2018). * Yan _et al._ [2011] S. Yan, D. A. Huse, and S. R. White, Spin-liquid ground state of the $S$ = 1/2 kagome Heisenberg antiferromagnet, Science 332, 1173 (2011). * Depenbrock _et al._ [2012] S. Depenbrock, I. P. McCulloch, and U. Schollwöck, Nature of the spin-liquid ground state of the $S$ = 1/2 Heisenberg model on the kagome lattice, Phys. Rev. Lett. 109, 067201 (2012). * Iqbal _et al._ [2013] Y. Iqbal, F. Becca, S. Sorella, and D. Poilblanc, Gapless spin-liquid phase in the kagome spin-$\frac{1}{2}$ Heisenberg antiferromagnet, Phys. Rev. B 87, 060405 (2013). * Iqbal _et al._ [2014] Y. Iqbal, D. Poilblanc, and F. Becca, Vanishing spin gap in a competing spin-liquid phase in the kagome Heisenberg antiferromagnet, Phys. Rev. B 89, 020407 (2014). * Shores _et al._ [2005] M. P. Shores, E. A. Nytko, B. M. Bartlett, and D. G. Nocera, A structurally perfect $S$ = 1/2 kagomé antiferromagnet, J. Am. Chem. Soc. 127, 13462 (2005). * Helton _et al._ [2007] J. S. Helton, K. Matan, M. P. Shores, E. A. Nytko, B. M. Bartlett, Y. Yoshida, Y. Takano, A. Suslov, Y. Qiu, J.-H. Chung, D. G. Nocera, and Y. S. Lee, Spin dynamics of the spin-1/2 kagome lattice antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. Lett. 98, 107204 (2007). * Bert _et al._ [2007] F. Bert, S. Nakamae, F. Ladieu, D. L’Hôte, P. Bonville, F. Duc, J.-C. Trombe, and P. Mendels, Low temperature magnetization of the $S$ = $\frac{1}{2}$ kagome antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. B 76, 132411 (2007). * de Vries _et al._ [2008] M. A. de Vries, K. V. Kamenev, W. A. Kockelmann, J. Sanchez-Benitez, and A. Harrison, Magnetic ground state of an experimental $S$ = 1/2 kagome antiferromagnet, Phys. Rev. Lett. 100, 157205 (2008). * Han _et al._ [2012a] T.-H. Han, J. S. Helton, S. Chu, D. G. Nocera, J. A. Rodriguez-Rivera, C. Broholm, and Y. S. Lee, Fractionalized excitations in the spin-liquid state of a kagome-lattice antiferromagnet, Nature 492, 406 (2012a). * Han _et al._ [2016] T.-H. Han, M. R. Norman, J.-J. Wen, J. A. Rodriguez-Rivera, J. S. Helton, C. Broholm, and Y. S. Lee, Correlated impurities and intrinsic spin-liquid physics in the kagome material herbertsmithite, Phys. Rev. B 94, 060409 (2016). * Olariu _et al._ [2008] A. Olariu, P. Mendels, F. Bert, F. Duc, J. C. Trombe, M. A. de Vries, and A. Harrison, 17O NMR study of the intrinsic magnetic susceptibility and spin dynamics of the quantum kagome antiferromagnet ZnCu3(OH)6Cl2, Phys. Rev. Lett. 100, 087202 (2008). * Fu _et al._ [2015] M. Fu, T. Imai, T.-H. Han, and Y. S. Lee, Evidence for a gapped spin-liquid ground state in a kagome Heisenberg antiferromagnet, Science 350, 655 (2015). * Khuntia _et al._ [2020] P. Khuntia, M. Velazquez, Q. Barthélemy, F. Bert, E. Kermarrec, A. Legros, B. Bernu, L. Messio, A. Zorko, and P. Mendels, Gapless ground state in the archetypal quantum kagome antiferromagnet ZnCu3(OH)6Cl2, Nat. Phys. 16, 469 (2020). * Fåk _et al._ [2012] B. Fåk, E. Kermarrec, L. Messio, B. Bernu, C. Lhuillier, F. Bert, P. Mendels, B. Koteswararao, F. Bouquet, J. Ollivier, A. D. Hillier, A. Amato, R. H. Colman, and A. S. Wills, Kapellasite: A kagome quantum spin liquid with competing interactions, Phys. Rev. Lett. 109, 037208 (2012). * Kermarrec _et al._ [2014] E. Kermarrec, A. Zorko, F. Bert, R. H. Colman, B. Koteswararao, F. Bouquet, P. Bonville, A. Hillier, A. Amato, J. van Tol, A. Ozarowski, A. S. Wills, and P. Mendels, Spin dynamics and disorder effects in the $S$ = $\frac{1}{2}$ kagome Heisenberg spin-liquid phase of kapellasite, Phys. Rev. B 90, 205103 (2014). * Feng _et al._ [2017] Z. Feng, Z. Li, X. Meng, W. Yi, Y. Wei, J. Zhang, Y.-C. Wang, W. Jiang, Z. Liu, and S. Li, Gapped spin-1/2 spinon excitations in a new kagome quantum spin liquid compound Cu3Zn(OH)6FBr, Chin. Phys. Lett. 34, 077502 (2017). * Fu _et al._ [2021] Y. Fu, M.-L. Lin, L. Wang, Q. Liu, L. Huang, W. Jiang, Z. Hao, C. Liu, H. Zhang, X. Shi, J. Zhang, J. Dai, D. Yu, F. Ye, P. A. Lee, P.-H. Tan, and J.-W. Mei, Dynamic fingerprint of fractionalized excitations in single-crystalline Cu3Zn(OH)6FBr, Nat. Commun. 12, 3048 (2021). * Aidoudi _et al._ [2011] F. H. Aidoudi, D. W. Aldous, R. J. Goff, A. M. Z. Slawin, J. Paul Attfield, R. E. Morris, and P. Lightfoot, An ionothermally prepared $S$ = 1/2 vanadium oxyfluoride kagome lattice, Nat. Chem. 3, 801 (2011). * Clark _et al._ [2013] L. Clark, J. C. Orain, F. Bert, M. A. De Vries, F. H. Aidoudi, R. E. Morris, P. Lightfoot, J. S. Lord, M. T. F. Telling, P. Bonville, J. P. Attfield, P. Mendels, and A. Harrison, Gapless spin liquid ground state in the $S$ = 1/2 vanadium oxyfluoride kagome antiferromagnet [NH4]2[C7H14N][V7O6F18], Phys. Rev. Lett. 110, 207208 (2013). * Jiang _et al._ [2020] N. Jiang, A. Ramanathan, J. Bacsa, and H. S. L. Pierre, Synthesis of a $d^{1}$-titanium fluoride kagome lattice antiferromagnet, Nat. Chem. 12, 691 (2020). * Li _et al._ [2014] Y. Li, B. Pan, S. Li, W. Tong, L. Ling, Z. Yang, J. Wang, Z. Chen, Z. Wu, and Q. Zhang, Gapless quantum spin liquid in the $S$ = 1/2 anisotropic kagome antiferromagnet ZnCu3(OH)6SO4, New J. Phys. 16, 93011 (2014). * Gomilšek _et al._ [2017] M. Gomilšek, M. Klanjšek, R. Žitko, M. Pregelj, F. Bert, P. Mendels, Y. Li, Q. M. Zhang, and A. Zorko, Field-induced instability of a gapless spin liquid with a spinon Fermi surface, Phys. Rev. Lett. 119, 137205 (2017). * Gomilšek _et al._ [2019] M. Gomilšek, R. Žitko, M. Klanjšek, M. Pregelj, C. Baines, Y. Li, Q. M. Zhang, and A. Zorko, Kondo screening in a charge-insulating spinon metal, Nat. Phys. 15, 754 (2019). * Norman [2016] M. R. Norman, Colloquium: Herbertsmithite and the search for the quantum spin liquid, Rev. Mod. Phys. 88, 041002 (2016). * Chen _et al._ [2020] X.-H. Chen, Y.-X. Huang, Y. Pan, and J.-X. Mi, Quantum spin liquid candidate YCu3(OH)6Br2[Brx(OH)1-x] ($x$ $\approx$ 0.51): With an almost perfect kagomé layer, J. Magn. Magn. Mater. 512, 167066 (2020). * Zeng _et al._ [2021] Z. Zeng, X. Ma, S. Wu, H.-F. Li, Z. Tao, X. Lu, X.-h. Chen, J.-X. Mi, S. Song, G. Cao, G. Che, K. Li, G. Li, H. Luo, Z. Y. Meng, and S. Li, Possible dirac quantum spin liquid in a kagome quantum antiferromagnet YCu3(OH)6Br2[Brx(OH)1-x], arXiv preprint arXiv:2107.11942 (2021). * Note [1] The Schottky anomaly of the H and D nuclear spins can appear in $C_{\mathrm{p}}$ below $\sim$ 0.2 K [41, 86, 36], and the temperature of 0.36 K $\sim$ 0.006$J_{1}$ is low enough for YCOB that the entropy flattens out at $S_{\mathrm{m}}$ $<$ 1.3%$R$ln 2 [see Fig. 15(d)]. * Kresse and Furthmüller [1996a] G. Kresse and J. Furthmüller, Efficiency of ab-initio total energy calculations for metals and semiconductors using a plane-wave basis set, Comput. Mater. Sci. 6, 15 (1996a). * Kresse and Furthmüller [1996b] G. Kresse and J. Furthmüller, Efficient iterative schemes for ab initio total-energy calculations using a plane-wave basis set, Phys. Rev. B 54, 11169 (1996b). * Note [2] Because the ideal NN KHA exhibits a broad peak in susceptibility at $T_{\mathrm{p}}$ $\sim$ 0.154$J_{1}$ $\sim$ 9 K. * Zorko _et al._ [2008] A. Zorko, S. Nellutla, J. van Tol, L. C. Brunel, F. Bert, F. Duc, J.-C. Trombe, M. A. de Vries, A. Harrison, and P. Mendels, Dzyaloshinsky-Moriya anisotropy in the spin-1/2 kagome compound ZnCu3(OH)6Cl2, Phys. Rev. Lett. 101, 026405 (2008). * Arh _et al._ [2020] T. Arh, M. Gomilšek, P. Prelovšek, M. Pregelj, M. Klanjšek, A. Ozarowski, S. J. Clark, T. Lancaster, W. Sun, J.-X. Mi, and A. Zorko, Origin of magnetic ordering in a structurally perfect quantum kagome antiferromagnet, Phys. Rev. Lett. 125, 027203 (2020). * Li [2021] T. Li, A continuous family of fully frustrated Heisenberg models on the Kagome lattice, EPL 133, 47001 (2021). * Han _et al._ [2012b] T. Han, S. Chu, and Y. S. Lee, Refining the spin Hamiltonian in the spin-$\frac{1}{2}$ kagome lattice antiferromagnet ZnCu3(OH)6Cl2 using single crystals, Phys. Rev. Lett. 108, 157202 (2012b). * Schnack _et al._ [2018] J. Schnack, J. Schulenburg, and J. Richter, Magnetism of the $N$ = 42 kagome lattice antiferromagnet, Phys. Rev. B 98, 094423 (2018). * Mizuno _et al._ [1998] Y. Mizuno, T. Tohyama, S. Maekawa, T. Osafune, N. Motoyama, H. Eisaki, and S. Uchida, Electronic states and magnetic properties of edge-sharing cu-o chains, Phys. Rev. B 57, 5326 (1998). * Li _et al._ [2020] Y. Li, S. Bachus, H. Deng, W. Schmidt, H. Thoma, V. Hutanu, Y. Tokiwa, A. A. Tsirlin, and P. Gegenwart, Partial up-up-down order with the continuously distributed order parameter in the triangular antiferromagnet TmMgGaO4, Phys. Rev. X 10, 011007 (2020). * Li _et al._ [2021] Y. Li, Q.-Y. Li, W. Li, T. Liu, D. J. Voneshen, P. K. Biswas, and D. Adroja, Spin dynamics and Griffiths singularity in the random quantum Ising magnet PrTiNbO6, npj Quantum Mater. 6, 34 (2021). * Kawamura _et al._ [2014] H. Kawamura, K. Watanabe, and T. Shimokawa, Quantum spin-liquid behavior in the spin-1/2 random-bond Heisenberg antiferromagnet on the kagome lattice, J. Phys. Soc. Jpn. 83, 103704 (2014). * Gregor and Motrunich [2008] K. Gregor and O. I. Motrunich, Nonmagnetic impurities in the spin-1/2 kagome antiferromagnet, Phys. Rev. B 77, 184423 (2008). * Rousochatzakis _et al._ [2009] I. Rousochatzakis, S. R. Manmana, A. M. Läuchli, B. Normand, and F. Mila, Dzyaloshinskii-Moriya anisotropy and nonmagnetic impurities in the $s$ = $\frac{1}{2}$ kagome system ZnCu3(OH)6Cl2, Phys. Rev. B 79, 214415 (2009). * Singh [2010] R. R. P. Singh, Valence bond glass phase in dilute kagome antiferromagnets, Phys. Rev. Lett. 104, 177203 (2010). * Shimokawa _et al._ [2015] T. Shimokawa, K. Watanabe, and H. Kawamura, Static and dynamical spin correlations of the $S=\frac{1}{2}$ random-bond antiferromagnetic Heisenberg model on the triangular and kagome lattices, Phys. Rev. B 92, 134407 (2015). * Watanabe _et al._ [2014] H. Watanabe, K.and Kawamura, T. Shimokawa, and T. Sakai, Quantum spin-liquid behavior in the spin-1/2 random Heisenberg antiferromagnet on the triangular lattice, J. Phys. Soc. Jpn. 83, 034714 (2014). * Kimchi _et al._ [2018a] I. Kimchi, J. P. Sheckelton, T. M. Mcqueen, and P. A. Lee, Scaling and data collapse from local moments in frustrated disordered quantum spin systems, Nat. Commun. 9, 4367 (2018a). * [61] X. Hong, Y. Li, C. Hess, _et al._ , (in preparation) . * Wen [2002] X.-G. Wen, Quantum orders and symmetric spin liquids, Phys. Rev. B 65, 165113 (2002). * Lu _et al._ [2011] Y.-M. Lu, Y. Ran, and P. A. Lee, $\mathbb{Z}_{2}$ spin liquids in the $S=\frac{1}{2}$ Heisenberg model on the kagome lattice: A projective symmetry-group study of Schwinger fermion mean-field states, Phys. Rev. B 83, 224413 (2011). * Hastings [2000] M. B. Hastings, Dirac structure, RVB, and Goldstone modes in the kagomé antiferromagnet, Phys. Rev. B 63, 014413 (2000). * Motrunich [2005] O. I. Motrunich, Variational study of triangular lattice spin-$\frac{1}{2}$ model with ring exchanges and spin liquid state in $\kappa-$(ET)2Cu2(CN)3, Phys. Rev. B 72, 045105 (2005). * Note [3] The significant decrease of the effective magnetic moment from $\mu_{\mathrm{B}}$ may originate from the unphysical states due to the rough treatment of the single-occupied condition, which is another issue beyond the mean-field theory worth of further research. * Sun _et al._ [2016] W. Sun, Y.-X. Huang, S. Nokhrin, Y. Pan, and J.-X. Mi, Perfect kagome lattices in YCu3(OH)6Cl3: a new candidate for the quantum spin liquid state, J. Mater. Chem. C 4, 8772 (2016). * Barthélemy _et al._ [2019] Q. Barthélemy, P. Puphal, K. M. Zoch, C. Krellner, H. Luetkens, C. Baines, D. Sheptyakov, E. Kermarrec, P. Mendels, and F. Bert, Local study of the insulating quantum kagome antiferromagnets YCu3(OH)6OxCl3-x ($x$ = 0, 1/3), Phys. Rev. Materials 3, 074401 (2019). * Zorko _et al._ [2019a] A. Zorko, M. Pregelj, M. Klanjšek, M. Gomilšek, Z. Jagličič, J. S. Lord, J. A. T. Verezhak, T. Shang, W. Sun, and J. X. Mi, Coexistence of magnetic order and persistent spin dynamics in a quantum kagome antiferromagnet with no intersite mixing, Phys. Rev. B 99, 214441 (2019a). * Zorko _et al._ [2019b] A. Zorko, M. Pregelj, M. Gomilšek, M. Klanjšek, O. Zaharko, W. Sun, and J. X. Mi, Negative-vector-chirality 120∘ spin structure in the defect- and distortion-free quantum kagome antiferromagnet YCu3(OH)6Cl3, Phys. Rev. B 100, 144420 (2019b). * Zhu _et al._ [2017] Z. Zhu, P. A. Maksimov, S. R. White, and A. L. Chernyshev, Disorder-induced mimicry of a spin liquid in YbMgGaO4, Phys. Rev. Lett. 119, 157201 (2017). * Kimchi _et al._ [2018b] I. Kimchi, A. Nahum, and T. Senthil, Valence bonds in random quantum magnets: Theory and application to YbMgGaO4, Phys. Rev. X 8, 031028 (2018b). * Abragam and Bleaney [2012] A. Abragam and B. Bleaney, _Electron paramagnetic resonance of transition ions_ (OUP Oxford, 2012). * Valko _et al._ [1990] M. Valko, P. Pelikán, S. Biskupič, and M. Mazúr, ESR spectra of copper-(II) complexes in the solids, Chem. Papers 44, 805 (1990). * Liu _et al._ [2021] J. Liu, B. Liu, L. Yuan, B. Li, L. Xie, X. Chen, H. Zhang, D. Xu, W. Tong, J. Wang, and Y. Li, Frustrated magnetism of the triangular-lattice antiferromagnets $\alpha$-CrOOH and $\alpha$-CrOOD, New J. Phys. 23, 033040 (2021). * Janson _et al._ [2016] O. Janson, S. Furukawa, T. Momoi, P. Sindzingre, J. Richter, and K. Held, Magnetic behavior of volborthite Cu3V2O7(OH)2$\cdot$2H2O determined by coupled trimers rather than frustrated chains, Phys. Rev. Lett. 117, 037206 (2016). * Janson _et al._ [2008] O. Janson, J. Richter, and H. Rosner, Modified kagome physics in the natural spin-$1/2$ kagome lattice systems: Kapellasite Cu3Zn(OH)6Cl2 and haydeeite Cu3Mg(OH)6Cl2, Phys. Rev. Lett. 101, 106403 (2008). * Li _et al._ [2017] Y. Li, D. Adroja, R. I. Bewley, D. Voneshen, A. A. Tsirlin, P. Gegenwart, and Q. Zhang, Crystalline electric-field randomness in the triangular lattice spin-liquid YbMgGaO4, Phys. Rev. Lett. 118, 107202 (2017). * Perdew _et al._ [1996] J. P. Perdew, K. Burke, and M. Ernzerhof, Generalized gradient approximation made simple, Phys. Rev. Lett. 77, 3865 (1996). * Note [4] The main changes are the increases of the fitted $J_{1}$ and least $R_{p}$ by $\sim$ 2 K and $\sim$ 0.6, respectively, after the subtraction. * Misguich and Sindzingre [2007] G. Misguich and P. Sindzingre, Magnetic susceptibility and specific heat of the spin-$\frac{1}{2}$ Heisenberg model on the kagome lattice and experimental data on ZnCu3(OH)6Cl2, Eur. Phys. J. B 59, 305 (2007). * Jaklič and Prelovšek [1994] J. Jaklič and P. Prelovšek, Lanczos method for the calculation of finite-temperature quantities in correlated systems, Phys. Rev. B 49, 5065 (1994). * Li _et al._ [2015] Y. Li, H. Liao, Z. Zhang, S. Li, F. Jin, L. Ling, L. Zhang, Y. Zou, L. Pi, Z. Yang, J. Wang, Z. Wu, and Q. Zhang, Gapless quantum spin liquid ground state in the two-dimensional spin-1/2 triangular antiferromagnet YbMgGaO4, Sci. Rep. 5, 16419 (2015). * Li _et al._ [2018] Y. Li, S. Bachus, Y. Tokiwa, A. A. Tsirlin, and P. Gegenwart, Gapped ground state in the zigzag pseudospin-1/2 quantum antiferromagnetic chain compound PrTiNbO6, Phys. Rev. B 97, 184434 (2018). * Note [5] It is worth mentioning that there is a flip for the spin-down band since we use the Nambu representation in the $\mathbb{Z}_{2}[0,\pi]\beta$ scenario. * Yamashita _et al._ [2011] S. Yamashita, T. Yamamoto, Y. Nakazawa, M. Tamura, and R. Kato, Gapless spin liquid of an organic triangular compound evidenced by thermodynamic measurements, Nat. Commun. 2, 275 (2011).
arxiv-papers
2021-07-27T10:14:04
2024-09-04T03:07:21.213068
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Jiabin Liu and Long Yuan and Xuan Li and Boqiang Li and Kan Zhao and\n Haijun Liao and Yuesheng Li", "submitter": "Yuesheng Li", "url": "https://arxiv.org/abs/2107.12712" }
2107.12719
\begin@twocolumnfalse Authors’ post-print accepted for publication/published in the IEEE Access (Mar. 2022). 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: <https://doi.org/10.1109/ACCESS.2022.3166906> URL: <https://ieeexplore.ieee.org/document/9756023> Cite: A. Xompero, S. Donaher, V. Iashin, F. Palermo, G. Solak, C. Coppola, R. Ishikawa, Y. Nagao, R. Hachiuma, Q. Liu, F. Feng, C. Lan, R. H. M. Chan, G. Christmann, J. Song, G. Neeharika, C. K. T. Reddy, D. Jain, B. U. Rehman, A. Cavallaro, "The CORSMAL benchmark for the prediction of the properties of containers," in IEEE Access, Early Access. \end@twocolumnfalse Received March 11, accepted March 26, 2022. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. The CORSMAL benchmark for the prediction of the properties of containers Alessio Xompero1, Santiago Donaher1, Vladimir Iashin2, Francesca Palermo1, Gökhan Solak1, Claudio Coppola1, Reina Ishikawa3, Yuichi Nagao3, Ryo Hachiuma3, Qi Liu4, Fan Feng4, Chuanlin Lan4, Rosa H. M. Chan4, Guilherme Christmann5, Jyun-Ting Song5, Gonuguntla Neeharika6, Chinnakotla K. T. Reddy6, Dinesh Jain7, Bakhtawar Ur Rehman8, Andrea Cavallaro1 [1]Centre for Intelligent Sensing, Queen Mary University of London, London E1 4NS, U.K. [2]Tampere University, 33100 Tampere, Finland [3]Keio University, Kanagawa 223-8522, Japan [4]City University of Hong Kong, Hong Kong [5]National Taiwan Normal University, Taipei 106, Taiwan [6]IIT Bhubaneswar, Bhubaneswar 751013, India [7]IIT Hyderabad, Hyderabad 502285, India [8]Islamabad 44000, Pakistan This work was supported by the CHIST-ERA program through the Project CORSMAL under U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/S031715/1. This work involved human subjects or animals in its research. Approval of all ethical and experimental procedures and protocols was granted by the Queen Mary Ethics of Research Committee under Application No. QMREC2344a. Xompero : CORSMAL Benchmark for Prediction of Properties of Containers Xompero : CORSMAL Benchmark for Prediction of Properties of Containers Corresponding author: Alessio Xompero (e-mail: [email protected]). The contactless estimation of the weight of a container and the amount of its content manipulated by a person are key pre-requisites for safe human-to-robot handovers. However, opaqueness and transparencies of the container and the content, and variability of materials, shapes, and sizes, make this estimation difficult. In this paper, we present a range of methods and an open framework to benchmark acoustic and visual perception for the estimation of the capacity of a container, and the type, mass, and amount of its content. The framework includes a dataset, specific tasks and performance measures. We conduct an in-depth comparative analysis of methods that used this framework and audio-only or vision-only baselines designed from related works. Based on this analysis, we can conclude that audio-only and audio-visual classifiers are suitable for the estimation of the type and amount of the content using different types of convolutional neural networks, combined with either recurrent neural networks or a majority voting strategy, whereas computer vision methods are suitable to determine the capacity of the container using regression and geometric approaches. Classifying the content type and level using only audio achieves a weighted average F1-score up to 81% and 97%, respectively. Estimating the container capacity with vision-only approaches and estimating the filling mass with audio-visual multi-stage approaches reach up to 65% weighted average capacity and mass scores. These results show that there is still room for improvement on the design of new methods. These new methods can be ranked and compared on the individual leaderboards provided by our open framework. Acoustic signal processing, image and video signal processing, audio-visual classification, object properties recognition § INTRODUCTION People interact daily with household containers, such as cups, drinking glasses, mugs, bottles, and food boxes. Methods to estimate the physical properties (e.g., weight and shape) of these containers could support human-robot cooperation [1, 2, 3, 4, 5], video annotation and captioning. Methods should generalize to unknown container instances and operate with only limited prior knowledge, such as generic categories of containers and contents [6, 1, 7]. However, the material, texture, transparency, and shape vary considerably across containers and may change with the content. Furthermore, the content may not be visible due to the opaqueness of the container or because of hand occlusions. For these reasons, predicting the physical properties of containers is a challenging task. The combination of sensing modalities, namely RGB images, depth, and audio, may help to overcome challenges such as noisy scenarios, already filled containers with absence of sound, occlusions, or transparent objects whose depth data may be highly inaccurate [8]. The contributions of this paper include: * A novel framework for the comparison of methods that estimate the physical properties of containers and their content, when a person manipulates the container (see Fig. <ref>); * The definition of three tasks, such as the classification of the content amount, the classification of the content type, and the estimation of the container capacity, and related performances measures, including the indirect filling mass estimation based on the three tasks, for the framework; * The design of 12 audio-only baselines and one vision-only baseline for the tasks of classifying the content level and the content type based on related approaches from the literature; * A formal review, a comparative analysis, and an in-depth discussion of methods that used the framework to address this problem; * The results of an international benchmarking challenge[<https://corsmal.eecs.qmul.ac.uk/challenge2020.html>]. The multi-modal, multi-sensor system used to record a person manipulating a container and its content. The system includes two third-person view cameras (at the two sides of the robot), a first-person view camera mounted on the robot, a first-person view from the body-worn camera on the person and a 8-microphone circular array (placed next to the robot arm). The paper is organized as follows. Section <ref> discusses related works. Section <ref> presents the benchmarking framework, including a multi-modal dataset, tasks for the estimation of the container and content properties, and corresponding performance measures. Section <ref> reviews the methods that used the framework for the tasks of filling type and level classification. Section <ref> reviews the methods that used the framework for the task of container capacity estimation. Section <ref> discusses and compares the results of the methods under analysis. Section <ref> concludes the paper and discusses future research direction. § RELATED WORK In this section, we discuss the object properties that are commonly estimated in the literature. We then review methods that recognize the content type, estimate the amount of content in a container, or estimate the container capacity, based on their approaches and input modalities. Most of the works in the literature focus on object recognition, object shape and size reconstruction in 3D, as well as pose estimation of a variety of objects using visual data and objects standing on a surface [9, 10, 11, 12, 13, 14, 15, 16]. Object properties, such as transparency, are often tackled independently with ad-hoc designed approaches for 3D shape reconstruction, object localization in 3D, or 6D pose estimation [8, 17, 18, 19]. Recognizing different high-level properties, such as the type and amount of multiple filling materials, the capacity of the container, and the overall weight of the object (i.e., the container with its content) is not yet well-investigated. Recognizing the content type within a container is addressed only for general food recognition using visual information [20, 21, 22]. Audio modality is commonly used for the recognition of general environmental sounds using the combination of traditional features and machine learning classifiers – e.g., k-Nearest Neighbour kNN [23], Support Vector Machine (SVM) [24], and Random Forest (RF) [25] –, or deep learning approaches – e.g., convolutional neural networks (CNNs) [26]. Examples of traditional acoustic features are spectrograms, zero-crossing rate (ZCR), Mel-frequency Cepstrum Coefficients (MFCCs), chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid features (tonnetz) [27, 28, 29, 30]. However, there are no unimodal or audio-visual approaches that recognize the content type during the manipulation of different containers held by person and together with other physical properties. Methods that used the CORSMAL framework for filling level, filling type, and container capacity estimation. Methods are evaluated on the CORSMAL Container Manipulation dataset. Ref. FL FT CC 1cDescription App JLT L Gr A R D Temp. M1 STFT + FCNN C – – 2*M2 [31] MFCCs + CNN C – – CNN with region of interest and bounding box size R – – 1 1 2*M3 [32] Spectrogram + object-specific MLP selected via majority voting of per-frame object detection across multiple views C 4 – Gaussian processes R – – 4 – 3*M4 [33] Multi-channel spectrogram + CNN + LSTM C – – Multi-channel spectrogram + CNN + majority voting C – – Point cloud + 3D cuboid approximation G – – 1 1 3*M5 [34] R(2+1)D+GRU (video), CNN+GRU (audio), A34F+RF (audio), Late fusion (averaging) C 1 – CNN+GRU (audio), A34F+RF (audio), Late fusion (averaging) C – – Energy minimization + 3D cylinder approximation G – – 2 – 3*M6 [35] Cropped, resized, reshaped spectrogram + kNN/SVM/RF C – – Cropped and resized spectrogram + CNN C – – Cropped and resized spectrogram + Hierarchy of 3 CNNs C – – 13l.95KEY – FL: filling level estimation, FT: filling type estimation, CC: container capacity estimation, App: approach, JLT: joint filling type and level classification, A: audio, R: number of used RGB views, D: number of views used with depth data, L: liquids, Gr: granular materials, Temp.: temporal, C: classification, R: regression, G: projective geometry, CNN: convolutional neural network, STFT: short-term Fourier transform, FCNN: fully connected neural network, MLP: multi-layer perceptron, LSTM: Long-Short Term Memory, GRU: Gated Recurrent Unit, kNN: k-Nearest Neighbour, SVM: support vector machine. RF: random forest, A34F: 34 audio features [36] consisting of zero crossing rate, energy, entropy of energy, spectral centroid, spectral spread, spectral entropy, spectral flux, spectral rolloff, Mel-frequency Cepstrum Coefficients (MFFCs), chroma vector and chroma deviation. For content level estimation, some methods regress or classify the property using CNNs and a single image [37, 7], or use temporal information from sequences of RGB or RGB-D data to track the change in the amount during a mechanical action [38, 39, 40]. Other methods use the sound signals generated by the contact of the content with a container during a manipulation [41, 42, 43, 44]. For example, the level of unknown liquids within containers standing on a surface is regressed or classified by using approaches such as Kalman Filter and recurrent neural networks with edge features or spectrograms [39, 40, 44]. For the estimation of the capacity of a container, one work trained a CNN using an RGB image of one or more containers standing on a surface [37]. However, all of these approaches are often designed and evaluated on scenarios with only standing containers, and with limited variability in the data. Unlike previous works, in the next sections we present an open framework for the estimation of multiple physical properties of containers and contents as they are manipulated by a person. We also discuss methods that used this framework based on the modalities used as input, the features extracted, and the type of approach (regression, classification, or geometry-based) [31, 34, 33, 32, 35] (see Table <ref>). § BENCHMARKING FRAMEWORK §.§ Containers, fillings, scenarios The dataset includes audio-visual-inertial recordings of people manipulating a range of containers that vary in shape, size, material, transparency, and deformability, and a set of contents under different scenarios with increasing level of difficulty due to the type of occlusions. CORSMAL Containers Manipulation [45] is a dataset consisting of 1,140 audio-visual recordings with 12 human subjects manipulating 15 containers, split into 5 cups, 5 drinking glasses, and 5 food boxes. These containers are made of different materials, such as plastic, glass, and cardboard. Each container can be empty or filled with water, rice or pasta at two different levels of fullness: 50% and 90% with respect to the capacity of the container. The combination of containers and contents results in a total of 95 configurations acquired for three scenarios with an increasing level of difficulty caused by occlusions or subject motions. In the first scenario, the subject sits in front of the robot, while a container is on a table. The subject either pours the content into the empty container, while avoiding touching the container, or shakes an already filled food box. Afterwards, the subject initiates the handover of the container to the robot. In the second scenario, the subject sits in front of the robot, while holding a container before starting the manipulation. In the third scenario, a container is held by the subject while standing to the side of the robot, potentially visible only on the third-person camera view. After the manipulation, the subject takes a few steps and initiates the handover of the container in front of the robot. Each scenario is recorded with two different backgrounds and under two different lighting conditions. The first background condition involves a plain tabletop with the subject wearing a texture-less t-shirt, while the second background condition involves the table covered with a graphics-printed tablecloth and the subject wearing a patterned shirt. The first lighting condition is based on artificial illumination as provided by lights mounted on the ceiling of the room. The second lighting condition uses two controlled artificial lights placed at the sides of the robot and illuminating the area where the manipulation is happening. Each subject executed the 95 configurations for each scenario and for each background/illumination condition[Ethical approval (QMREC2344a) obtained at Queen Mary University of London. Consent from the subjects was collected before data collection.]. axis x line*=bottom, axis y line*=left, enlarge x limits=false, bar width=3pt, ymin=0, ymax=3000, ylabel=Mass (g), label style=font=, tick label style=font=, +[ybar, black, fill=white, draw opacity=0.5] table[x=CoID,y=E]; +[ybar, black, fill=ts2, draw opacity=0.5] table[x=CoID,y=P5]; +[ybar, black, fill=ts3, draw opacity=0.5] table[x=CoID,y=P9]; +[ybar, black, fill=gray, draw opacity=0.5] table[x=CoID,y=R5]; +[ybar, black, fill=ts5, draw opacity=0.5] table[x=CoID,y=W5]; +[ybar, black, fill=ts6, draw opacity=0.5] table[x=CoID,y=R9]; +[ybar, black, fill=ts7, draw opacity=0.5] table[x=CoID,y=W9]; [inner sep=0pt] (flute1) at (0.9,-0.9) [inner sep=0pt] (flute1) at (2.7,-0.9) [inner sep=0pt] (flute1) at (4.5,-0.9) [inner sep=0pt] (flute1) at (6.3,-0.9) [inner sep=0pt] (flute1) at (8.1,-0.9) [inner sep=0pt] (flute1) at (9.9,-0.9) [inner sep=0pt] (flute1) at (11.7,-0.9) [inner sep=0pt] (flute1) at (13.5,-0.9) [inner sep=0pt] (flute1) at (15.3,-0.9) The mass of objects (container and content) in the training set of the CORSMAL Containers Manipulation dataset. The class empty corresponds to the mass of the container, which is known. 2pt[gray,fill=white] (0,0) rectangle (1.ex,1.ex); Empty, 2pt[gray,fill=ts2] (0,0) rectangle (1.ex,1.ex); P5, 2pt[gray,fill=ts3] (0,0) rectangle (1.ex,1.ex); P9, 2pt[gray,fill=gray] (0,0) rectangle (1.ex,1.ex); R5, 2pt[gray,fill=ts5] (0,0) rectangle (1.ex,1.ex); W5, 2pt[gray,fill=ts6] (0,0) rectangle (1.ex,1.ex); R9, 2pt[gray,fill=ts7] (0,0) rectangle (1.ex,1.ex); W9, §.§ Sensor data and annotation The dataset was acquired with 4 multi-sensor devices, Intel RealSense D435i, and an 8-element circular microphone array. Each D435i device has 3 cameras and provides spatially aligned RGB, narrow-baseline stereo infrared, and depth images at 30 Hz with 1280x720 pixels resolution. One D435i is mounted on a robot arm that does not move during the acquisition and provides a more realistic view of the operating area from the robot perspective. Another D435i is chest mount by the person to provide a first-person view, while the remaining two devices are placed at the sides of the robot arm as third-person views that look at the operating area. The microphone array is placed on a table and consists of 8 Boya BY-M1 omnidirectional Lavelier microphones arranged in a circular shape of radius 15 cm. Audio signals are sampled synchronously at 44.1 kHz with a multi-channel audio recorder. All signals are software-synchronized with a rate of 30 Hz. The calibration information (intrinsic and extrinsic parameters) for each D435i and the inertial measurements of the D435i used as a body-worn camera are also provided. The annotation of the data includes the capacity of the container, the content type, the content level, the mass of the container, the mass of the content, the maximum width and height (and depth for boxes) of each object. Fig. <ref> shows the total object mass across containers and their contents. The dataset is split into training set (684 recordings of 9 containers), public test set (228 recordings of 3 containers), and private test set (228 recordings of 3 containers). The containers for each set are evenly distributed among the three categories. The annotations of the container capacity, content type and level, and the masses of the container and content are provided publicly only for the training set. §.§ Tasks and performance scores We define three tasks for the framework, namely the classification of the amount of content (Task 1), the classification of the content type (Task 2), and the estimation of the capacity of the container (Task 3). We refer to the amount of content as filling level and to the type of content as filling type. In Task 1, a container is either empty or filled with an unknown content at 50% or 90% of its capacity. There are three classes: empty, half-full, full. For each configuration $j$, the goal is to classify the filling level ($\lambda^j$). In Task 2, containers are either empty or filled with an unknown content. There are four filling type classes: none, pasta, rice, water. For each configuration $j$, the goal is to classify the type of filling, if any ($\tau^j$). For these two tasks, we compute precision, recall, and F1-score for each class $k$ across all the configurations belonging to class $k$, $J_k$. Precision is the number of true positives over the total number of true positives and false positives for each class $k$ ($P_k$). Recall is the number of true positives over the total number of true positives and false negatives for each class $k$ ($R_k$). F1-score is the harmonic mean of precision and recall for each class $k$ and defined as \begin{equation} F_k = 2\frac{P_k R_k}{P_k + R_k}. \end{equation} We then compute the weighted average F1-score, $\bar{F}_1$, across the $K$ classes, \begin{equation} \bar{F}_1 =\sum_{k=1}^K \frac{J_k F_k}{J}, \label{eq:wafs} \end{equation} where $J=\sum_{k=1}^K J_k$ is the total number of configuration. Note that $K=3$ for filling level classification, whereas $K=4$ for filling type classification. In Task 3, containers vary in shape and size. For each configuration $j$, the goal is to estimate the capacity of the container ($\gamma^j \in \mathbb{R}_{>0}$, in milliliters). For capacity estimation, we compute the relative absolute error between the estimated capacity, $\tilde{\gamma}^j$, and the annotated capacity, $\gamma^j$, for each configuration, $j$, \begin{equation} \varepsilon^j = \frac{|\tilde{\gamma}^j - \gamma^j |}{\gamma^j}. \label{eq:ware} \end{equation} We then compute the average capacity score, $\bar{C}$, as \begin{equation} \bar{C} = \frac{1}{J} \sum_{j=1}^J \mathds{1} e^{-\varepsilon^j}, \label{eq:acs} \end{equation} where the value of the indicator function $\mathds{1} \in \{0,1\}$ is 0 only when the capacity (mass) of the container in configuration $j$ is not estimated. The weight of the object, $\omega \in \mathbb{R}_{>0}$ (in Newtons), is the sum of the mass of the (empty) container, $m_c \in \mathbb{R}_{>0}$ (in grams), and the mass of the (unknown) filling, $m_f \in \mathbb{R}_{>0}$ (in grams), multiplied by the gravitational earth acceleration, $g=9.81$ m/s$^{-2}$, \begin{equation} \omega = (m_c + m_f) g. \label{eq:objweight} \end{equation} While we do not require the mass of the empty container to be estimated, we expect methods to estimate the capacity of the container and to determine the type and amount of filling to estimate the mass of the filling. For each configuration $j$, we then compute the filling mass as \begin{equation} m_f^j = \lambda^j \gamma^j D(\tau^j), \label{eq:fillingmass} \end{equation} where $D(\cdot)$ selects a pre-computed density based on the classified filling type. The density of pasta and rice is computed from the annotation of the filling mass, capacity of the container, and filling level for each container. Density of water is 1 g/mL. For filling mass estimation, we compute the relative absolute error between the estimated, $\tilde{m}_{f}^j$, and the annotated filling mass, $m_{f}^j$, for each configuration, $j$, unless the annotated mass is zero (empty filling level), \begin{equation} \epsilon^j = \begin{cases} 0, & \text{if } m_{f}^j = 0 \land \tilde{m}_{f}^j=0, \\ \tilde{m}_{f}^j, & \text{if } m_{f}^j = 0 \land \tilde{m}_{f}^j \neq 0, \\ \frac{|\tilde{m}_{f}^j - m_{f}^j |}{m_{f}^j}, & \text{otherwise}. \end{cases} \label{eq:ware2} \end{equation} Similarly to the average capacity score, we compute the average filling mass score, $\bar{M}$. Note that we will present the scores as percentages when discussing the results in the comparative analysis. §.§ Baselines CORSMAL provides along with the framework 12 audio-only baselines and one video-only baseline for the tasks of filling level and filling type classification. The audio-only baselines[Baselines for audio-based classification of the content properties are available at: <https://github.com/CORSMAL/CCM_ML_baselines>] jointly classify filling type and level using traditional acoustic features, such as ZCR, MFCCs, tonnetz, or spectrograms, combined with either of three machine learning classifiers (kNN, SVM, RF). Note that for MFCCs, the 1$^\text{st}$ to 13$^\text{th}$ coefficients are used, whereas the 0$^\text{th}$ coefficient is discarded. Three baselines use as input the mean and standard deviation of the MFCCs and ZCR features across multiple audio frames [46]. Three other baselines extract a feature vector consisting of 193 coefficients from the mean and standard deviation of the MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonnetz across multiple audio frames [27, 28, 29, 30]. For simplicity, we refer to this set of acoustic features as AF193 in the rest of the paper. Three other baselines use spectrograms, which are cropped, resized and reshaped into a vector of dimension 9,216, as input to the classifiers [35]. To remove redundant information, three additional baselines perform dimensionality reduction with Principal Component Analysis (PCA) on the reshaped spectrograms, retaining only the first 128 components. The vision-only baseline uses two CNNs to perform an independent classification of filling level and filling type from a single RGB image. We re-trained ResNet-18 architectures [47] using a subset of frames[Data available at: <https://corsmal.eecs.qmul.ac.uk/filling.html>] selected within the video recordings of the training set of the CORSMAL Containers Manipulation and cropped to a rectangular area around the container [7]. On the test sets, the baseline is applied to each camera view independently: an image crop is extracted from the last frame using Mask R-CNN [9] and the segmentation mask with the most confident class between cup and wine glass is selected. The output classes of the two CNNs include an additional class, opaque, to handle cases where containers are not transparent and vision alone fails to determine the content type and level [7, 37]. § FILLING LEVEL AND TYPE CLASSIFICATION Six methods used the framework to address the tasks of filling level classification (Task 1) and filling type classification (Task 2) either independently, e.g., when only one of the two properties is necessary for the target application, or jointly, e.g., when both properties are necessary for accurately estimating the total object weight. For simplicity, we refer to the 6 methods as M1, M2 [31], M3 [32], M4 [33], M5 [34] and M6 [35] for the rest of the paper. For filling type classification, audio is preferred as input modality and methods used either only CNNs, CNN with RNN, or CNN followed by majority voting as classification approaches [31, 33, 34]. For filling level classification, some methods used visual data in combination with audio data [34, 32]. Hand-crafted and/or learned acoustic features are used by the methods. Traditional acoustic features, such as MFCCs, spectral characteristics, ZCR, chroma vector and deviation, are computed from short-term windows. Long-term features can be obtained by summarizing the short-term features from longer windows of the input audio signal and by including additional statistics, such as mean and standard deviation. Learned features are extracted by CNNs from multi-channel or mono-channel audio signals that are post-processed into spectrograms or log-Mel spectrograms [33, 34]. To handle audio signals of different duration, long audio signals can be truncated to a pre-defined duration and zero-padding is added to shorter signals [31, 33]. The fully connected neural network of M1 has 5 layers and uses STFT features as input. The network is trained with the Adam optimizer [48] and dropout [49] on the last hidden layer to reduce overfitting. The filling type classifier of M2 uses 40 normalized and concatenated MFCCs features that are extracted with 20 ms windows at 22 kHz, with a maximum duration of 30 s [31]. The CNN has 2 convolutional layers and 1 fully connected layer (86,876 trainable parameters). M4 [33] used all the 8 audio signals from the microphone array to compute log Mel-scaled spectrograms with STFT and 64 filter banks for filling type and filling level classification. A sliding window over the cropped spectrogram with 75% overlap forms overlapping audio frames consisting of 3D tensors, where the third dimension is given by the 8 audio channels. Each window is provided as input to a CNN consisting of 5 blocks, each with 2 convolutional and 1 batch normalization layers followed by a max-pooling layer. The CNN is complemented by 3 fully connected layers for the filling type classification of each audio frame and followed by the majority voting. The CNN has a total of 13 layers with 4,472,580 trainable parameters. The same extracted features are also used as input to the three stacked Long Short-Term Memory (LSTM) [50] units for the filling level classification. The three stacked LSTMs are trained with a set of 100 audio frames and contain 256 hidden states, resulting in 2,366,211 trainable parameters. The multi-layer perceptrons (MLPs) of M3 [32] are trained for either filling level or filling type classification, and specifically only for each object category (cup, drinking glass, food box). Each MLP has 3 layers with 3,096 nodes in the first hidden layer and 512 in the last hidden layer. The total number of trainable parameters is 20,762,288. The MLPs takes as input a spectrogram computed from a multi-channel sound signal re-sampled at 16,600 Hz and converted into mono-channel by averaging the samples across channels. Only the last 32,000 samples are retained and converted into a spectrogram via Discrete Fourier Transform. To select which MLP to use at inference time, regions of interest (ROIs) are detected in all frames of the image sequences of all four views in the CORSMAL Containers Manipulation dataset by using YOLOv4 [51] pre-trained on MS COCO [52]. The category (cup, drinking glass, food box) is determined by a majority voting of randomly sampled frames (65% of all frames). Both traditional and learned acoustic features are used by M5 [34] for filling type classification, whereas visual features are extracted in addition to the acoustic features for filling level classification. Multiple classifiers, each associated with each feature, are used to output the class probabilities. Then, the probabilities are averaged across the classifiers to determine the final class. For the acoustic features, the multi-channel input audio signal is converted into a mono-channel by averaging the samples across channels. MFCCs, energy, spectral characteristics, and their statistics (mean and standard deviation) are computed from 50 ms windows of the input signal as short-term traditional features. The features are concatenated in a 136-dimensional vector used as input to a RF classifier. The number of trees of the RF classifier is automatically set during training by selecting the value between $(10, 25, 50, 100, 200, 500)$ that achieves the highest accuracy in validation. For the learned features, the mono-channel signal is re-sampled at 16 kHz and converted into log-Mel spectrograms from 960 ms windows of the re-sampled signal. Each spectrogram is provided as input to a VGG-based model [53] that is pre-trained on a large dataset (e.g., AudioSet [54]) and computes a 128-dimensional feature vector. The learned features are then provided as input to a GRU model [55] that has 5 layers and a hidden layer of size 512 to handle the intrinsic temporal relations of the signals. The model has a total of 7,291,395 trainable parameters. Visual features are extracted from the image sequences of all camera views by using R(2+1)D [56], a spatio-temporal CNN that is based on residual connections [47] and 18 (2+1)D convolutional layers that approximate 3D convolution by a 2D convolution (spatial) followed by a 1D convolution (temporal). R(2+1)D is pre-trained for action recognition on Kinetics 400 [57], takes as input a fixed window of 16 RGB frames of 112$\times$112 pixel resolution, and outputs a 512-dimensional feature vector. Long temporal relations between the features of each window are estimated by using a RNN with a GRU model that has 3 layers and a hidden dimension of size 512 (4,729,347 trainable parameters). The GRU models from each camera view are jointly trained and their logits are summed together before applying the final softmax to obtain the class probabilities from the visual input. For filling type classification, the probabilities resulting from the last hidden state of the GRU network and those resulting from the RF are averaged. For filling level classification, the probabilities resulting from the RF classifier and the GRU models for both the audio and visual features are averaged together to compute the final class. The RF classifier and all the GRU models are trained independently for filling type classification and filling level classification by using 3-fold validation strategy. Jointly estimating the filling type and level can avoid infeasible cases, such as an empty water or half-full none. Different traditional classifiers and existing CNNs that use spectrograms as input have been analyzed and compared in Donaher et al.'s work [35], especially when different containers are manipulated by a person with different content types, such as both liquids and granular materials. Because of the different container types and corresponding manipulation, the authors of M6 [35] decomposed the problem into two steps, namely action recognition and content classification and devised three independent CNNs. The first CNN (action classifier) identifies the manipulation performed by the human, i.e., shaking or pouring, and the other two CNNs are task-specific and determine the filling type and level. The CNN for action recognition (pouring, shaking, unknown) has 4 convolutional, 2 max-pooling, and 3 fully connected layers; the CNN for the specific action of pouring has 6 convolutional, 3 max-pooling, and 3 fully connected layers; and the CNN for the specific action of shaking has 4 convolutional, 2 max-pooling, and 2 fully connected layers. The choice of which task-specific network should be used is conditioned by the decision of the first CNN. When the action classifier does not distinguish between pouring or shaking, the approach associates the unknown case to the class empty. § CAPACITY ESTIMATION We categorize the methods as regression [31, 32] and geometric-based approaches [33, 34]. These methods use either RGB, RGB and depth data, or multiple RGB images from the CORSMAL Containers Manipulation dataset. Regression approaches use CNNs [31] or distribution fitting via Gaussian processes [32]. The CNN architecture of M2 has 4 convolutional layers, each followed by batch normalization [58], and 3 fully connected layers (532,175 trainable parameters) [31]. The CNN takes as input a ROI and its normalized relative size, and then regresses the capacity of the container limited to 4,000 mL, accordingly to the range of capacities in the dataset. The ROI is computed from the contour features of a depth image selected from the frame with the most visible pixels of the frontal, fixed view and assuming a maximum depth of 700 mm. M4 [32] used Gaussian processes to regress the container capacity, depending on the container category. To model multiple multi-variate Gaussian functions for each container category, the container type is recognized by detecting multiple ROIs in all frames of all image sequences as done for filling type and level classification. Geometric-based approaches approximate the container to a primitive shape in 3D, such as cuboid or cylinder[33, 8, 34]. The shape is represented as a point cloud obtained directly from RGB-D data or computed via energy-based minimization to fit the points to the real shape of the object as observed in the RGB images of a wide-baseline stereo camera and constrained by the object masks [8, 34]. The capacity is then computed as a by-product, e.g., by finding the minimum and maximum values for each coordinate in 3D [33] or using volume formulas specific for the primitive shape [34]. The approximated primitives can lead to inaccurate capacities: a cuboid representation could result in an overestimated capacity and hence re-scaling would be necessary [33]; a cylinder representation may not generalize to different shapes than rotationally symmetric objects. To handle occlusions caused by the human hand manipulating a container, M5 [33] selects the RGB-D frame with a single silhouette having the largest number of pixels and post-processes the point cloud to deal with inaccuracies in the segmentation. Capacity estimations computed at different frames of the image sequences in the stereo views are then averaged, assuming that the container is fully visible. § EXPERIMENT RESULTS AND DISCUSSION We compare and analyze the performance of the 6 methods and the 13 baselines on the public test set, the private test set, and their combination on the CORSMAL Containers Manipulation dataset [45]. Illustrative comparison of M6 [35] (left) and M4 [33] (right) for filling type ($\tau^j$) and level classification ($\lambda^j$). The two methods take as input only an audio signal that is converted into a spectrogram representation. During training, the initial and final part of the audio signal (gray areas) are removed based on the manual annotations and to focus only on the action. Note that M4 [33] (right) computes MFCC features from overlapping audio frames (shadow gray areas on the spectrogram). KEY – CNN: convolutional neural network, FC: fully connected layer, LSTM: Long-Short Term Memory, MFCC: Mel Frequency Cepstral Coefficients. §.§ Implementation details The CNN of M2 for filling type classification is trained with the SGD optimizer, a fixed learning rate of 0.00025 and momentum of 0.9, and a batch size of 16. M4 sets the frame length to 25 ms, the hop-length to 10 ms, and the number of samples for the Fast Fourier Transform to 512 for computing the STFT. During training, M4 crops audio signals based on manual annotations of the starting and ending of the manipulation. The network for filling level classification of M4 is trained by using cross-entropy loss and the Adam optimizer [48] with a learning rate of 0.00001 and a mini-batch size of 32 for 200 epochs. §.§ Filling level classification Table <ref> compares the performance of all baselines and methods except M2. M4, M5 and M6 achieve the highest accuracy with 80.84, 79.65, and 78.65 $\bar{F}_1$ on the combined test set, respectively. This performance is almost twice higher than M1 and M3 and shows that using only audio as input modality is sufficient to achieve an accuracy higher than 75 $\bar{F}_1$. M5 uses both audio and visual data, but the similar performance to M4 and M6 suggests that audio features are dominant in determining the classification decision. M6 is the best performing in the private test set (81.46 $\bar{F}_1$), whereas M4 is the best performing in the public test set (82.63 $\bar{F}_1$). Interestingly, both methods selected a fixed portion of the audio signal, transformed into a spectrogram, where the manipulation of the container by the human subject was more likely to occur (see Fig. <ref>). However, the three CNNs of M6 use the full trimmed spectrograms as input, whereas the CNN+LSTM of M4 uses portions of the log-Mel spectrogram, which are obtained with a temporal sliding window. Both are shown to be valid methods assuming that the whole audio signal is available and the manipulation is completed. Filling level classification results (Task 1). Baselines and state-of-the-art methods (MX with X ranges from 1 to 6) are ranked by their score in the combined test set. Method 5cInput modality 3cTest set A R1 R2 R3 R4 Public Private Combined Mask + RN 25.12 21.99 23.68 Mask + RN 36.52 25.52 31.46 Spect. + PCA + SVM 30.08 31.99 31.64 Random – – – – – 33.35 41.86 37.62 Spect. + PCA + kNN 39.03 37.16 38.31 Mask + RN 48.90 26.73 39.00 M3 [32] 44.31 42.70 43.53 Spect. + PCA + RF 46.79 42.46 44.66 Spect. + RF 45.43 45.59 45.49 Mask + RN 58.51 32.93 47.00 M1 50.73 47.08 48.71 Spect. + SVM 47.66 51.54 49.67 AF193 + kNN 55.49 53.22 54.47 Spect. + kNN 59.15 53.47 56.38 ZCR + MFCCs + kNN 63.63 54.97 59.35 AF193 + SVM 60.77 58.57 60.09 ZCR + MFCCs + SVM 66.27 57.19 61.87 AF193 + RF 64.18 63.94 64.74 ZCR + MFCCs + RF 70.04 63.11 66.80 M4 [33] 82.63 74.43 78.56 M5 [34] 78.14 81.16 79.65 M6 [35] 80.22 81.46 80.84 9lBold font: result of the best performing method. 9l0.85KEY – A: audio, RX: RGB for view X (1,2,3,4), Mask + RN: Mask R-CNN + ResNet-18, ZCR: zero crossing rate, MFCCs: Mel-frequency cepstrum coefficients, Spect.: spectrogram, RF: random forest, SVM: support vector machine, kNN: k-nearest neighbor, PCA: principal component analysis, AF193: 193 audio features consisting of MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid. axis on top, axis x line*=bottom, ylabel=True label, xlabel=Mask + RN, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, colorbar style= yticklabel style= /pgf/number format/.cd, fixed zerofill, tick label style=font=, [matrix plot*,mesh/cols=3, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, Confusion matrices of filling level classification for all methods across all the containers of the public and private testing splits of the CORSMAL Container Manipulation dataset [45]. Note that the counting for each cell is normalized by the total number of true labels for each class (colorbar). KEY –E: empty; H: half-full; F: full, Mask + RN: Mask R-CNN + ResNet-18. The confusion matrices in Fig. <ref> show that M4 and M6 do not confuse the class empty, whereas M5 mis-classifies some empty configurations as half-full. Not surprisingly, most of the confusions occur between the classes half-full and full for all methods. M4 and M5 are more accurate than M6 in recognizing the class half-full, but M6 is more accurate in recognizing the class full. M3 mis-classifies the true class empty as half-full for 40% of the times and as full for 33% of the times, and the class full is confused with half-full for 75% of the times. M3 recognizes the container categories cup, drinking glass and food box with 92%, 73%, and 88% accuracy, respectively, in the training set. Errors in the category recognition may lead to wrong classifications by the selected category-specific MLP-based classifier, which is also trained with limited and selected data. The CNN of M1 made erroneous predictions across all classes, except for empty that was never predicted as half-full but only confused with full. The vision-only baseline (using the first camera view, on the left side of the robot arm) confused 81% of the times the class empty with half-full in addition to mis-classification between half-full and full, making the performance of the baseline only 10 $\bar{F}_1$ points higher than a random classifier (37.62 $\bar{F}_1$). axis on top, axis x line*=bottom, ylabel=True label, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, axis on top, axis x line*=bottom, y dir=reverse, point meta min=0, point meta max=1, tick label style=font=, label style=font=, colorbar style= yticklabel style= /pgf/number format/.cd, fixed zerofill, tick label style=font=, [matrix plot*,mesh/cols=4, point meta=explicit] table [meta=z] ; axis x line*=top, axis y line*=right, y dir=reverse, xlabel=Predicted label, axis on top, point meta min=0, point meta max=1, tick label style=font=, label style=font=, Confusion matrices of filling type classification for all methods across all the containers of the public and private testing splits of the CORSMAL Containers Manipulation dataset [45]. Note that each cell is normalized by the total number of true labels for each class (colorbar). KEY – E: empty; P: pasta; R: rice; W: water. Filling type classification results (Task 2). Baselines and state-of-the-art methods (MX with X ranges from 1 to 6) are ranked by their score in the combined test set. Method 5cInput modality 3cTest set A R1 R2 R3 R4 Public Private Combined Mask + RN 14.12 11.23 12.70 Mask + RN 21.14 9.04 15.63 Mask + RN 28.75 15.54 22.90 Mask + RN 30.85 13.04 23.05 Spect. + PCA + SVM 20.57 27.60 24.20 Random – – – – – 21.24 27.52 24.38 Spect. + PCA + kNN 24.47 28.34 26.53 Spect. + PCA + RF 28.75 37.79 33.32 Spect. + SVM 39.39 41.81 40.61 M3 [32] 41.77 41.90 41.83 Spect. + RF 47.98 47.68 47.82 Spect. + kNN 60.50 68.58 64.55 AF193 + SVM 64.92 79.72 72.86 M1 78.58 71.75 75.24 AF193 + kNN 76.84 75.96 76.41 ZCR + MFCCs + SVM 84.23 71.96 78.67 ZCR + MFCCs + kNN 88.19 79.23 83.73 M2 [31] 81.97 91.67 86.89 AF193 + RF 88.36 87.46 87.88 ZCR + MFCCs + RF 92.97 89.74 91.31 M5 [34] 93.83 94.70 94.26 M6 [35] 95.12 93.92 94.50 M4 [33] 97.83 96.08 96.95 9lBold font: result of the best performing method. 9l.85KEY – A: audio, RX: RGB for view X (1,2,3,4), Mask + RN: Mask R-CNN + ResNet-18, ZCR: zero crossing rate, MFCCs: Mel-frequency cepstrum coefficients, Spect.: spectrogram, RF: random forest, SVM: support vector machine, kNN: k-nearest neighbor, PCA: principal component analysis, AF193: 193 audio features consisting of MFCCs, chromogram, Mel-scaled spectrogram, spectral contrast, and tonal centroid. §.§ Filling type classification Table <ref> shows that M4, M6, and M5 are the best performing methods with 96.95 $\bar{F}_1$, 94.50 $\bar{F}_1$, 94.26 $\bar{F}_1$ scores on the combined test set (as for filling level classification). Audio is the used modality by all the methods except M3 that conditions the selection of the audio-based classifier to the recognition of the container category from visual data. As for filling level classification (43.53 $\bar{F}_1$), selecting which classifier to use is likely to be the main source of error for the classifications of M3 (41.83 $\bar{F}_1$), whereas using only audio is sufficient to achieve performance close to 100 $\bar{F}_1$ score. If the audio modality was not available, both filling level and filling type classifications would be very challenging using only visual data. M1 and M2 achieve 75.24 $\bar{F}_1$ and 86.89 $\bar{F}_1$, respectively, but about 20 and 10 percentage points (pp) lower than M4, respectively. The table also shows that the performance of the baselines varies from random results to almost the same performance as the best performing M4. Using the spectrogram as an input feature (either after reshaping the spectrogram into a vector or after applying PCA to select the first 128 components) to any of the three classifiers, namely kNN, SVM, or RF, is the worst choice. On the combined test set, the lowest performance is obtained by Spectrogram + PCA + SVM with 24.20 $\bar{F}_1$, whereas the highest performance is obtained by Spectrogram + kNN with 64.55 $\bar{F}_1$. Classic audio features, such as MFCCs and ZCR, are more discriminative and sufficient to achieve performance higher than 78 $\bar{F}_1$ for the three classifiers. Simply using ZCR and MFCCs with RF can achieve 91.31 $\bar{F}_1$, which is close to the performance of the three top methods (M5, M6, M4) that are using CNNs and LSTMs. On the contrary, the performance decreases when using a larger set of features, such as tonal centroid, spectral contrast, chromogram, Mel-scaled spectrogram, and MFCCs. Fig. <ref> shows the confusion matrices of the methods. M4 made a few mis-classifications for the class rice with none and pasta, and for the class water with none. M6 confused 4% pasta with rice, 4% rice with pasta, 7% pasta with water, and 2% water with none. The confusion between water and none could be expected due to the low volume of the sound produced by the water, whereas the confusion of water with rice might be caused by the glass material of the container and background noise. The largest confusion for M5 is given by the erroneous prediction of rice with pasta (13%). As for filling level classification, M1 and M3 have large mis-classifications across different classes, with M3 that could not predict water for any audio input. §.§ Capacity estimation We compare the results of M2, M3, M4, and M5, in terms of the average capacity score. We also report the results of a pseudo-random generator (Random) that samples the predictions from a uniform distribution in the interval $[50, 4000]$ based on the Mersenne Twister algorithm [59]. We then analyze and discuss the statistics of the absolute error in predicting the container capacity for each testing container as well as for each filling type and level. Table <ref> shows that M2 achieves the best score with 66.92 $\bar{C}$, 67.67 $\bar{C}$, and 67.30 $\bar{C}$ for the public test set, private test set, and the combined test set, respectively, when using only depth data from the fixed frontal view. All methods achieve a performance score that is twice higher than the random solution (24.58 $\bar{C}$ for the combined test set): M4 has the lowest score (54.79 $\bar{C}$), whereas M5 and M3 obtain 60.57 $\bar{C}$ and 62.57 $\bar{C}$, respectively. Fig. <ref> shows the statistics (median, 25$^\text{th}$ and 75$^\text{th}$ quartiles, and the lower and upper whiskers[The lower whisker is the smallest data value which is larger than 0.25-quartile $-1.5\Delta$, where $\Delta$ is the difference between 0.75-quartile and 0.25-quartile. The upper whisker is the largest data value which is smaller than 0.25-quartile$+1.5\Delta$. See documentation at: <https://anorien.csc.warwick.ac.uk/mirrors/CTAN/graphics/pgf/contrib/pgfplots/doc/pgfplots.pdf>.]) of the relative absolute errors for each container in the test sets of the dataset. M2 has the lowest median error for all containers, except for the private containers C14 and C15. The variation of the error across configurations is either smaller than the variation of the other methods or lower than the median value of the other methods. M5 is more consistent in estimating the same container shape and capacity for most of the configurations related to containers C12 and C15. M5 also have the largest variations for C10 and C14; M3 for C12 and C15; and M4 for C11. Interestingly, M3 have a median error lower than M4 and M5 for C13 and achieve the lowest median error with a small variation across configurations for C14. However, we can observe that in general the relative absolute error across containers is around or higher than 0.5. Container capacity estimation results (Task 3). Methods ranked by the average capacity score on the combined test set. Method 8cInput modality 3cTest set R1 D1 R2 D2 R3 D3 R4 D4 Public Private Combined Random – – – – – – – – 31.63 17.53 24.58 M4 [33] 57.19 52.38 54.79 M5 [34] 60.56 60.58 60.57 M3 [32] 63.00 62.14 62.57 M2 [31] 66.92 67.67 67.30 12lBold font: result of the best performing method. 12l0.9KEY – RGB (R) or depth (D) modality for view X (1,2,3,4) every non boxed x axis/.style=, boxplot/every box/.style=solid,ultra thin,black, boxplot/every whisker/.style=solid,ultra thin,black, boxplot/every median/.style=solid,very thick, red, title style=at=(0.5,0.98), xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, ylabel=Relative absolute error, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C10]; +[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C10]; +[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C10]; +[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C10]; xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none, boxplot/box extend=0.5] table[y=C11]; +[boxplot, boxplot/draw position=2,mark=none, boxplot/box extend=0.5] table[y=C11]; +[boxplot, boxplot/draw position=3,mark=none, boxplot/box extend=0.5] table[y=C11]; +[boxplot, boxplot/draw position=4,mark=none, boxplot/box extend=0.5] table[y=C11]; xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, ylabel=Relative absolute error, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C12]; +[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C12]; +[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C12]; +[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C12]; xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C13]; +[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C13]; +[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C13]; +[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C13]; xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, ylabel=Relative absolute error, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C14]; +[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C14]; +[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C14]; +[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C14]; xmin=0.5, xmax=4.5, tick label style=font=, boxplot/draw direction=y, label style=font=, title style=at=(0.5,0.9),font=, +[boxplot, boxplot/draw position=1,mark=none,boxplot/box extend=0.5] table[y=C15]; +[boxplot, boxplot/draw position=2,mark=none,boxplot/box extend=0.5] table[y=C15]; +[boxplot, boxplot/draw position=3,mark=none,boxplot/box extend=0.5] table[y=C15]; +[boxplot, boxplot/draw position=4,mark=none,boxplot/box extend=0.5] table[y=C15]; Comparison of statistics of the absolute error in estimating the container capacity for each testing container between M2 [31], M3 [32], M4 [33], and M5 [34]. Statistics of the box plot includes the median (red line), the 25th and 75th quartile, and the lower and upper whiskers. Note that outliers in the data are not shown. Note also the different scale for the y-axis. KEY – CX: container (C) index (X), where X is in the range [10,15]. In addition to the comparison across containers, Fig. <ref> shows the relative absolute errors grouped by filling type and level for each method. Most of the errors are in the interval [0.3,0.8], and the methods have similar amount of variations between the 25$^\text{th}$ and 75$^\text{th}$ quartiles, but differences are in the median error and the upper whisker error (excluding outliers). M2 achieves the lowest median error (always lower than half of the real container capacity) and smaller variations (25$^\text{th}$-75$^\text{th}$ quartiles), whereas M3 have similar results for rice full. M4 has the largest errors for empty, pasta half-full, pasta full, rice half-full, and rice full. M5 has the largest errors for water half-full and water full. §.§ Analysis per scenario and container Table <ref> analyzes and compares the performance scores of the methods grouped by scenario and containers for all the three tasks. For filling level classification on the testing containers, the $\bar{F}_1$ of M4, M5, and M6 increases from scenario 1 to scenario 3, showing how audio information is robust despite the increasing difficulty due to the in-hand manipulation (scenario 2 and 3) and larger distance (scenario 3). However, the performance of M6 decreases by almost 2 pp from scenario 1 (78.52 $\bar{F}_1$) to scenario 2 (76.92 $\bar{F}_1$). The performance of M1 is affected by the in-hand manipulation and distance, decreasing from 52.90 $\bar{F}_1$ in scenario 1 to 45.46 $\bar{F}_1$ in scenario 3. M3 achieves the highest accuracy for scenario 2 (51.34 $\bar{F}_1$), increasing by 11.51 pp compared to scenario 1 (39.83 $\bar{F}_1$), but decreasing to 35.92 $\bar{F}_1$ in scenario 3 (likely caused by the errors in recognizing the container category). For filling type classification, the performance of M4, M5, and M6 is higher than 90 $\bar{F}_1$ across the scenarios, but the trend is the opposite of filling level classification. M5 and M6 decrease in $\bar{F}_1$ from scenario 1 to scenario 3, whereas M4 achieves the highest accuracy in scenario 2 (98.07 $\bar{F}_1$). M3 and M1 show the same behavior for filling level and type classification with a large decrease in scenario 3 by 15.31 pp and 22.16 pp compared to scenario 1, respectively. For capacity estimation, M3 and M4 are less affected by the variations across the scenarios, whereas M2 is the best performing in scenario 1 (68.81 $\bar{C}$) and scenario 2 (73.70 $\bar{C}$) but decreases by 9.42 pp in scenario 3 compared to scenario 1. M2 is based only on the frontal depth view, where the subject is not visible for most of the time. This challenges the method to detect the object in the pre-defined depth range. M5 is affected by the increasing challenges across scenarios, decreasing from 66.51 $\bar{C}$ in scenario 1 to 55.68 $\bar{C}$ in scenario 3. This shows the limitations of the underline approach [8] that was designed for objects free of occlusions and standing upright on a surface. every non boxed x axis/.style=, boxplot/every box/.style=solid,ultra thin,black, boxplot/every whisker/.style=solid,ultra thin,black, boxplot/every median/.style=solid,very thick, red, title style=at=(0.5,0.98), axis x line=box, xmin=0.5, xmax=34.5, tick label style=font=, boxplot/draw direction=y, ylabel=Relative absolute error, label style=font=, title style=font=, +[boxplot, boxplot/draw position=1,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E]; +[boxplot, boxplot/draw position=2,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E]; +[boxplot, boxplot/draw position=3,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E]; +[boxplot, boxplot/draw position=4,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=E]; +[boxplot, boxplot/draw position=6,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5]; +[boxplot, boxplot/draw position=7,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5]; +[boxplot, boxplot/draw position=8,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5]; +[boxplot, boxplot/draw position=9,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P5]; +[boxplot, boxplot/draw position=11,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9]; +[boxplot, boxplot/draw position=12,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9]; +[boxplot, boxplot/draw position=13,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9]; +[boxplot, boxplot/draw position=14,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=P9]; +[boxplot, boxplot/draw position=16,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5]; +[boxplot, boxplot/draw position=17,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5]; +[boxplot, boxplot/draw position=18,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5]; +[boxplot, boxplot/draw position=19,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R5]; +[boxplot, boxplot/draw position=21,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9]; +[boxplot, boxplot/draw position=22,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9]; +[boxplot, boxplot/draw position=23,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9]; +[boxplot, boxplot/draw position=24,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=R9]; +[boxplot, boxplot/draw position=26,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5]; +[boxplot, boxplot/draw position=27,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5]; +[boxplot, boxplot/draw position=28,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5]; +[boxplot, boxplot/draw position=29,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W5]; +[boxplot, boxplot/draw position=31,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9]; +[boxplot, boxplot/draw position=32,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9]; +[boxplot, boxplot/draw position=33,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9]; +[boxplot, boxplot/draw position=34,mark=*, mark options=white,scale=0.5,boxplot/box extend=0.5] table[y=W9]; axis x line=bottom, xmin=0.5, xmax=34.5, xticklabel shift=8, tick label style=font=, xticklabels=Empty,Pasta half-full, Pasta full,Rice half-full, Rice full,Water half-full, Water full, typeset ticklabels with strut, label style=font=, Comparison of the absolute error in estimating the container capacity between M2 [31], M3 [32], M4 [33], and M5 [34] for the different combinations of filling type and level in the combined public and private test set of the CORSMAL Containers Manipulation dataset. Statistics of the box plot includes the median (red line), the 25th and 75th percentiles, and the minimum and maximum error.. Comparison of the task performance scores between methods for each scenario and for each testing container. Method S1 S2 S3 C10 C11 C12 C13 C14 C15 M1 52.90 47.37 45.46 48.69 46.78 58.27 41.43 38.89 62.58 M3 [32] 39.83 51.34 35.92 35.24 36.59 22.86 33.74 33.74 26.33 M4 [33] 75.41 77.70 82.54 92.85 89.25 46.67 86.85 74.16 45.92 M5 [34] 75.87 80.89 82.03 83.12 90.48 41.26 88.09 90.36 47.68 M6 [35] 78.52 76.92 86.84 83.12 88.10 64.98 89.16 78.28 74.99 M1 81.22 77.01 66.06 86.42 69.33 79.67 87.38 55.60 72.77 M2 [31] 90.68 84.57 85.41 77.29 80.60 91.58 94.02 94.09 85.03 M3 [32] 44.06 51.21 28.75 21.72 26.54 86.98 20.33 34.13 79.45 M4 [33] 97.35 98.07 95.45 97.63 98.82 96.72 100.00 97.66 87.96 M5 [34] 96.70 94.76 91.32 96.44 97.62 84.81 97.63 98.81 84.45 M6 [35] 96.70 95.43 91.27 91.58 96.41 98.33 97.62 85.61 100.00 M2 [31] 68.81 73.70 59.39 66.02 69.14 65.08 79.75 61.12 59.94 M3 [32] 64.33 60.41 62.96 60.99 66.21 61.30 71.90 76.75 28.02 M4 [33] 55.45 55.34 53.57 59.62 61.70 47.47 53.77 58.29 42.17 M5 [34] 66.51 59.51 55.68 60.71 62.43 57.71 53.37 54.75 78.82 11lKEY – S: scenario, C: container, T: task. The performance across containers varies between the methods. Testing containers 12 and 15 are the most challenging for M3, M4, M5, M6, when classifying the filling level, whereas M1 achieves its best performance on both containers. M4 and M5 have the largest decrease with the score in the interval [40,50] $\bar{F}_1$ compared to the interval [75-93] $\bar{F}_1$ for the other containers. M6 outperforms all the other methods with 64.98 $\bar{F}_1$ and 74.99 $\bar{F}_1$ for containers 12 and 15. For filling type classification, M3 obtains 86.98 $\bar{F}_1$ and 79.45 $\bar{F}_1$ for containers 12 and 15, respectively, and less than 30 $\bar{F}_1$ on the other containers. Because of the dataset structure, M3 can recognize the box class and the filling type for that class, but the method cannot easily distinguish filling type and level for drinking glasses and cups. Overall, other methods achieve a score higher than 70 $\bar{F}_1$ across containers. M4 achieves 100 $\bar{F}_1$ on container 13 and M6 on container 15. M4 is the best performing for containers 10 and 11, whereas M5 is the best for container 14. Containers 12 and 15 are the most challenging for M5; container 14 for M6; container 15 for M4; containers 10, 11, and 15 for M2. M1 ranges between 55.60 $\bar{F}_1$ and 87.38 $\bar{F}_1$ across containers, with the drinking glasses being the most challenging and obtaining 69.33 $\bar{F}_1$ for container 11 and 55.60 $\bar{F}_1$ for container 14. For capacity estimation, M2 achieves the best performance on containers 10 (66.02 $\bar{C}$), 11 (69.14 $\bar{C}$), 12 (65.02 $\bar{C}$), and 13 (79.75 $\bar{C}$), M3 on container 14 (76.75 $\bar{C}$), and M5 on container 15 (78.82 $\bar{C}$). M3 achieves higher average capacity score on the private cup and drinking glass than the public containers, but the score drops to 28.02 $\bar{C}$ for the container 15. M4 performs worse on the private testing containers than the public testing containers, with the lowest scores on the boxes (containers 12 and 15). M5 also performs worse for the drinking glass and cups in the private test set than the public test set. Surprisingly, the best score of M5 is on the box container 15 (78.82 $\bar{C}$) despite the modeled shape is a 3D cylinder. Comparison of the filling mass estimation results. Methods are ranked by their score on the combined test sets of the CORSMAL Containers Manipulation dataset. Note that scores are weighed by the number of tasks addressed by the methods. Method 3cTask 3cTest set T1 T2 T3 Public Private Combined M6 [35] 28.25 21.89 25.07 M1 29.25 23.21 26.23 mylightgrayRandom 38.47 31.65 35.06 M2 [31] 38.56 39.80 39.18 M3 [32] 52.80 51.14 53.47 M4 [33] 63.32 61.01 62.16 M5 [34] 64.98 65.15 65.06 §.§ Filling mass estimation We discuss the overall performance of the methods based on their results on estimating the filling mass. Methods that estimated either of the physical properties in our framework (e.g., M1, M2, and M6) are complemented by the random estimation of the missing physical properties to compute the filling mass[Note that for the organized challenge, the score is weighted by the number of completed tasks. We report the results in the same manner.]. Table <ref> shows that methods addressing only filling type and level classification achieve a lower score than a random guess for each task. Given the multiplicative formula of the filling mass estimation (see Eq. <ref>), even a few errors in these classification tasks can lead to a low score in the filling mass estimation, especially when combined with the random estimation of the container capacity. However, improving the capacity estimation is an important aspect to achieve more accurate results (and higher score) for the filling mass estimation (see M2). M3, M4, and M5 addressed all three tasks and achieved 53.47 $\bar{M}$, 62.16 $\bar{M}$, and 65.06 $\bar{M}$, respectively. Overall, methods perform better on the public test set than the private test set, except for M2 and M5 that achieve similar performance in the two test sets. We can observe that the more accurate predictions in the container capacity help M3 to obtain 53.47 $\bar{M}$ despite the classification errors for filling level and type. The high classification accuracy on filling level and type, combined with a similar score for the capacity estimations with respect to M3, makes M4 and M5 the best performing in filling mass estimation. The similar scores for container capacity and filling mass estimation shows how important it is to accurately predict the capacity in order to correctly estimate the filling mass. § CONCLUSION We presented the open CORSMAL framework to benchmark methods for estimating the physical properties of different containers while they are manipulated by a person with different content types. The framework includes a dataset, a set of tasks and performance measures, and several baselines that use either audio or visual input. The framework supports the contactless estimation of the weight of the container, including its content (if any), despite variations in the physical properties across containers and occlusions caused by the hand manipulation. We performed an in-depth comparative analysis of the baselines and state-of-the-art methods that used the framework. The analysis showed that using only audio as input is sufficient to achieve a weighted average F1-score above 80% for filling type and level classification, but the high performance could be limited to the sensor types and setup of the CORSMAL Container Manipulation dataset. Methods that use audio alone are robust to changes in the container type, size, and shape, as well as pose during the manipulation. Moreover, filling type and level estimation can benefit from each other to avoid unfeasible solutions [35]. Container capacity is the most challenging physical property to estimate with all methods affected by large errors and a maximum score of 65%. Performance on this task also affects the successive estimation of the filling mass. The design of a method that can generalize across the different containers and scenarios, especially for container capacity estimation and partially for filling level classification, is still challenging. Future directions involve the exploration of fusion and learning methods with both acoustic and visual modalities to support the contactless estimation of the physical properties of containers and their content. The CORSMAL framework is open for further submissions and support the research in this upcoming area[<https://corsmal.eecs.qmul.ac.uk/challenge.html>]. § ACKNOWLEDGMENT We would like to thank Ricardo Sanchez-Matilla and Riccardo Mazzon for their contribution in the design and collection of the data, and the performance measures definition. [1] R. Sanchez-Matilla, K. Chatzilygeroudis, A. Modas, N. Ferreira Duarte, A. Xompero, P. Frossard, A. Billard, and A. Cavallaro, “Benchmark for human-to-robot handovers of unseen containers with unknown filling,” IEEE Robotics Autom. Lett., vol. 5, no. 2, Apr. 2020. [2] J. R. Medina, F. Duvallet, M. Karnam, and A. Billard, “A human-inspired controller for fluid human-robot handovers,” in Proc. IEEE-RAS Int. Conf. Humanoid Robots, Cancun, Mexico, 15–17 Nov. 2016. [3] P. Rosenberger, A. Cosgun, R. Newbury, J. Kwan, V. Ortenzi, P. Corke, and M. Grafinger, “Object-independent human-to-robot handovers using real time robotic vision,” IEEE Robotics Autom. Lett., vol. 6, no. 1, pp. 17–23, Jan. 2021. [4] V. Ortenzi, A. Cosgun, T. Pardi, W. P. Chan, E. Croft, and D. Kulić, “Object handovers: A review for robotics,” IEEE Trans. Robotics, pp. 1–19, [5] W. Yang, C. Paxton, A. Mousavian, Y. Chao, M. Cakmak, and D. Fox, “Reactive human-to-robot handovers of arbitrary objects,” in IEEE Int. Conf. Robotics Autom., Xi'an, China, 30 May5 Jun. 2021. [6] H. Liang, C. Zhou, S. Li, X. Ma, N. Hendrich, T. Gerkmann, F.-C. Sun, and J. Zhang, “Robust robotic pouring using audition and haptics,” in IEEE Int. Conf. Intell. Robot Syst., Las Vegas, NV, USA, 24 Oct. 2020–24 Jan. 2021. [7] A. Modas, A. Xompero, R. Sanchez-Matilla, P. Frossard, and A. Cavallaro, “Improving filling level classification with adversarial training,” in IEEE Int. Conf. Image Process., Anchorage, Alaska, USA, 19–22 Sep. [8] A. Xompero, R. Sanchez-Matilla, A. Modas, P. Frossard, and A. Cavallaro, “Multi-view shape estimation of transparent containers,” in IEEE Int. Conf. Acoustics, Speech Signal Process., Barcelona, Spain, 4-8 May 2020. [9] K. He, G. Gkioxari, P. Dollár, and R. B. Girshick, “Mask R-CNN,” in IEEE Int. Conf. Comput. Vis., Venice, Italy, 22–29 Oct. 2017. [10] H. Wang, S. Sridhar, J. Huang, J. Valentin, S. Song, and L. J. Guibas, “Normalized object coordinate space for category-level 6D object pose and size estimation,” in IEEE Conf. Comput. Vis. Pattern Recognit., Long Beach, CA, USA, 16–20 Jun. 2019. [11] H. Yang and L. Carlone, “In perfect shape: certifiably optimal 3D shape reconstruction from 2D landmarks,” in IEEE Conf. Comput. Vis. Pattern Recognit., Seattle, Washington, USA, 16-18 Jun. 2020. [12] A. Ahmadyan, L. Zhang, J. Wei, A. Ablavatski, and M. Grundmann, “Objectron: A large scale dataset of object-centric videos in the wild with pose annotations,” in IEEE Conf. Comput. Vis. Pattern Recognit., Virtual, 19-25 Jun. 2021. [13] X. Chen, Z. Dong, J. Song, A. Geiger, and O. Hilliges, “Category level object pose estimation via neural analysis-by-synthesis,” in Eur. Conf. Comput. Vis., Virtual, 23–28 Aug. 2020. [14] D. Chen, J. Li, Z. Wang, and K. Xu, “Learning canonical shape space for category-level 6D object pose and size estimation,” in IEEE Conf. Comput. Vis. Pattern Recognit., Virtual, 14–19 Jun. 2020. [15] T. Hodaň, F. Michel, E. Brachmann, W. Kehl, A. Glent Buch, D. Kraft, B. Drost, J. Vidal, S. Ihrke, X. Zabulis, C. Sahin, F. Manhardt, F. Tombari, T.-K. Kim, J. Matas, and C. Rother, “BOP: Benchmark for 6D object pose estimation,” in Eur. Conf. Comput. Vis., Munich, Germany, 8–14 Sep. [16] R. Kaskman, S. Zakharov, I. Shugurov, and S. Ilic, “Homebreweddb: RGB-D dataset for 6D pose estimation of 3D objects,” in IEEE Int. Conf. Comput. Vis. Workshops, Seoul, Korea, 27 Oct.2 Nov. 2019. [17] X. Liu, R. Jonschkowski, A. Angelova, and K. Konolige, “Keypose: Multi-view 3D labeling and keypoint estimation for transparent objects,” in IEEE Conf. Comput. Vis. Pattern Recognit., Virtual, 14–19 Jun. 2020. [18] S. Sajjan, M. Moore, M. Pan, G. Nagaraja, J. Lee, A. Zeng, and S. Song, “ClearGrasp: 3D shape estimation of transparent objects for manipulation,” in IEEE Int. Conf. Robotics Autom., Paris, France, 31 May31 Aug. 2020. [19] C. J. Philips, M. Lecce, and K. Daniilidis, “Seeing glassware: from edge detection to pose estimation and shape recovery,” in Robotics: Science and Syst., Ann Arbor, Michigan, USA, 18-22 Jun. 2016. [20] L. Bossard, M. Guillaumin, and L. Van Gool, “Food-101 – mining discriminative components with random forests,” in Eur. Conf. Comput. Vis., Zurich, Switzerland, 16–12 Sep. 2014. [21] Y. Kawano and K. Yanai, “FoodCam-256: A large-scale real-time mobile food recognition system employing high-dimensional features and compression of classifier weights,” in ACM Int. Conf. Multimedia, Orlando, Florida, USA, 3–7 Nov. 2014. [22] H. Zhao, K. Yap, and A. C. Kot, “Fusion learning using semantics and graph convolutional network for visual food recognition,” in IEEE Winter Conf. Appl. Comput. Vis., Virtual, 5–9 Jan. 2021. [23] T. Cover and P. Hart, “Nearest neighbor pattern classification,” IEEE Trans. Inf. Theory, vol. 13, pp. 21–27, 1967. [24] C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, pp. 273–297, 1995. [25] L. Breiman, “Random forests,” Machine Learning, vol. 45, pp. 5–32, [26] K. J. Piczak, “ESC: Dataset for environmental sound classification,” in ACM Int. Conf. Multimedia, Brisbane Australia, 26–30 Oct. 2015. [27] V. Vivek, S. Vidhya, and P. MadhanMohan, “Acoustic scene classification in hearing aid using deep learning,” in Int. Conf. Comm.Signal Proc., Chennai, India, 28–30 Jul. 2020. [28] S. Yang and W. Deliang, “Robust speaker identification using auditory features and computational auditory scene analysis,” in IEEE Int. Conf. Acoustics, Speech Signal Process., Las Vegas, Nevada, USA, 30 Mar.4 Apr. 2008. [29] G. Deepanway and K. Maheshkumar, “Music genre recognition using deep neural networks and transfer learning,” in INTERSPEECH, Hyderabad, India, 2–6 Sep. 2018. [30] R. Shashidhar, P. Sudarshan, and S.-B. Puneeth, “Audio visual speech recognition using feed forward neural network architecture,” in IEEE Int. Conf. for Innovation in Technology, Bengaluru, India, 6–8 Nov. 2020. [31] G. Christmann and J.-T. Song, “2020 CORSMAL Challenge - Team NTNU-ERCReport,” 2020. [Online]. Available: [32] Q. Liu, F. Feng, C. Lan, and R. H. M. Chan, “VA2Mass: Towards the fluid filling mass estimation via integration of vision & audio learning,” in IEEE Conf. Pattern Recognit. Workshops and Challenges, Virtual, 10–15 Jan. 2021. [33] R. Ishikawa, Y. Nagao, R. Hachiuma, and H. Saito, “Audio-visual hybrid approach for filling mass estimation,” in IEEE Conf. Pattern Recognit. Workshops and Challenges, Virtual, 10–15 Jan. 2021. [34] V. Iashin, F. Palermo, G. Solak, and C. Coppola, “Top-1 CORSMAL challenge 2020 submission: Filling mass estimation using multi-modal observations of human-robot handovers,” in IEEE Conf. Pattern Recognit. Workshops and Challenges, Virtual, 10–15 Jan. 2021. [35] S. Donaher, A. Xompero, and A. Cavallaro, “Audio classification of the content of food containers and drinking glasses,” in Europ. Signal Proc. Conf., Virtual, 23–27 Aug. 2021. [36] T. Giannakopoulos, “pyaudioanalysis: An open-source python library for audio signal analysis,” PLoS ONE, vol. 10, no. 12, p. 1–17, Jan. 2015. [37] R. Mottaghi, C. Schenck, D. Fox, and A. Farhadi, “See the glass half full: Reasoning about liquid containers, their volume and content,” in IEEE Int. Conf. Comput. Vis., Venice, Italy, 22–29 Oct. 2017. [38] C. Schenck and D. Fox, “Reasoning about liquids via closed-loop simulation,” in Robotics: Science and Syst., Cambridge, Massachusetts, USA, 12–16 Jul. 2017. [39] C. Do, T. Schubert, and W. Burgard, “A probabilistic approach to liquid level detection in cups using an RGB-D camera,” in IEEE Int. Conf. Intell. Robot Syst., Daejeon, Korea, 9–14 Oct. 2016. [40] C. Do and W. Burgard, “Accurate pouring with an autonomous robot using an RGB-D camera,” in Int. Conf. Intell. Auton. Syst., Baden-Baden, Germany, 12–16 Jul. 2018. [41] S. Griffith, V. Sukhoy, T. Wegter, and A. Stoytchev, “Object categorization in the sink : Learning behavior – grounded object categories with water,” in IEEE Int. Conf. Robotics Autom., Minneapolis, MN, USA, 14–18 May [42] S. Ikeno, R. Watanabe, R. Okazaki, T. Hachisu, M. Sato, and H. Kajimoto, “Change in the amount poured as a result of vibration when pouring a liquid,” in Int. AsiaHaptics Conf., Tsukuba, Japan, 18–20 Nov. 2014. [43] S. Clarke, T. Rhodes, C. Atkeson, and O. Kroemer, “Learning audio feedback for estimating amount and flow of granular material,” in Proc. Conf. Robot Learn., Zürich, Switzerland, 29–31 Oct. 2018. [44] H. Liang, S. Li, X. Ma, N. Hendrich, T. Gerkmann, F. Sun, and J. Zhang, “Making sense of audio vibration for liquid height estimation in robotic pouring,” in IEEE Int. Conf. Intell. Robot Syst., Macau, China, Nov. [45] A. Xompero, R. Sanchez-Matilla, R. Mazzon, and A. Cavallaro, “CORSMAL Containers Manipulation,” 2020, (1.0) [Data set]. Queen Mary University of London. [Online]. Available: [46] K. J. Piczak, “Environmental sound classification with convolutional neural networks,” in Proc. Int. Workshop Mach. Learning Signal Process., Boston, MA, USA, 17–20 Sep. 2015. [47] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in IEEE Conf. Comput. Vis. Pattern Recognit., Las Vegas, NV, USA, 27–30 Jun. 2016. [48] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in Int. Conf. Learning Represent., San Diego, CA, USA, 7–9 May 2015. [49] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting,” J. Mach. Learn. Res., vol. 15, pp. 1929–1958, 2014. [50] S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 11 1997. [51] A. Bochkovskiy, C. Wang, and H. M. Liao, “YOLOv4: Optimal speed and accuracy of object detection,” arXiv:2004.10934 [cs.CV], 2020. [52] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick, “Microsoft COCO: Common objects in context,” in Eur. Conf. Comput. Vis., Munich, Germany, 8–14 Sep. [53] S. Hershey, S. Chaudhuri, D. P. W. Ellis, J. F. Gemmeke, A. Jansen, R. C. Moore, M. Plakal, D. Platt, R. A. Saurous, and B. Seybold, “CNN architectures for large-scale audio classification,” in IEEE Int. Conf. Acoustics, Speech Signal Process., New Orleans, LA, USA, 5–9Mar. [54] J. F. Gemmeke, D. P. W. Ellis, D. Freedman, A. Jansen, W. Lawrence, R. C. Moore, M. Plakal, and M. Ritter, “Audio Set: An ontology and human-labeled dataset for audio events,” in IEEE Int. Conf. Acoustics, Speech Signal Process., New Orleans, LA, 2017. [55] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” in Adv. Neural Inf. Process. Syst. Workshop Deep Learning and Representation Learning, Montreal, Canada, 12 Dec. 2014. [56] D. Tran, H. Wang, L. Torresani, J. Ray, Y. LeCun, and M. Paluri, “A closer look at spatiotemporal convolutions for action recognition,” in IEEE Conf. Comput. Vis. Pattern Recognit., Salt Lake City, Utah, USA, 18–22 Jun. [57] W. Kay, J. Carreira, K. Simonyan, B. Zhang, C. Hillier, S. Vijayanarasimhan, F. Viola, T. Green, T. Back, P. Natsev, M. Suleyman, and A. Zisserman, “The Kinetics human action video dataset,” arXiv:1705.06950 [cs.CV], 2017. [58] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” in Int. Conf. Mach. Learning., Jul. 2015. [59] M. Matsumoto and T. Nishimura, “Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator,” ACM Trans. Model. Comput. Simul., vol. 8, no. 1, p. 3–30, Jan. 1998.
arxiv-papers
2021-07-27T10:36:19
2024-09-04T03:07:21.241964
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Alessio Xompero, Santiago Donaher, Vladimir Iashin, Francesca Palermo,\n G\\\"okhan Solak, Claudio Coppola, Reina Ishikawa, Yuichi Nagao, Ryo Hachiuma,\n Qi Liu, Fan Feng, Chuanlin Lan, Rosa H. M. Chan, Guilherme Christmann,\n Jyun-Ting Song, Gonuguntla Neeharika, Chinnakotla Krishna Teja Reddy, Dinesh\n Jain, Bakhtawar Ur Rehman, Andrea Cavallaro", "submitter": "Alessio Xompero", "url": "https://arxiv.org/abs/2107.12719" }
2107.12728
rmkRemark On the dynamics of nano-frames Preprint of the article published in International Journal of Engineering Science 160, March 2021, 103433 Andrea Francesco Russillo, Giuseppe Failla, Gioacchino Alotta, Francesco Marotti de Sciarra, Raffaele Barretta https://doi.org/10.1016/j.ijengsci.2020.103433 ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ ###### Abstract In this paper, size-dependent dynamic responses of small-size frames are modelled by stress-driven nonlocal elasticity and assessed by a consistent finite-element methodology. Starting from uncoupled axial and bending differential equations, the exact dynamic stiffness matrix of a two-node stress-driven nonlocal beam element is evaluated in a closed form. The relevant global dynamic stiffness matrix of an arbitrarily-shaped small-size frame, where every member is made of a single element, is built by a standard finite-element assembly procedure. The Wittrick-Williams algorithm is applied to calculate natural frequencies and modes. The developed methodology, exploiting the one conceived for straight beams in [International Journal of Engineering Science 115, 14-27 (2017)], is suitable for investigating size- dependent free vibrations of small-size systems of current applicative interest in Nano-Engineering, such as carbon nanotube networks and polymer- metal micro-trusses. ###### keywords: Nonlocal integral elasticity Stress-driven model Free vibrations Dynamic stiffness matrix Wittrick-Williams algorithm Carbon nanotubes Nano-engineered material networks [orcid=https://orcid.org/0000-0002-8535-0581] [1] 1][email protected] [cor1]Corresponding author ## 1 Introduction Small-size structures as carbon nanotube networks (Zhang et al., 2018), 3D-printed polymer-metal micro-trusses (Juarez et al., 2018) and ceramic nanolattices (Meza et al., 2014) are attracting a considerable interest for remarkable features not obtainable by standard materials. Properties as high- thermal conductivity, excellent mechanical strength, electrical conductivity, high-strain sensitivity and large surface area make carbon nanotube networks (Zhang et al., 2018) ideally suitable for the next generation of thermal management (Fasano et al., 2015) and electronic nanodevices (Lee et al., 2016), strain sensors (Chao et al., 2020) and hydrogen storage (Ozturk et al., 2015; Bi et al., 2020). Polymer-metal micro-trusses exhibit enhanced strength, conductivity and electrochemical properties, while ceramic nanolattices feature highest strength- and stiffness-to-weight ratios (Zhang et al., 2020b). In view of promising applications in a large number of fields of Engineering Science, great attention is currently devoted to small-size structures (Ghayesh and Farajpour, 2019); for an insight, typical geometries currently under investigation are shown in Figure 1. There exist accurate yet computationally very demanding mechanical models of small-size structures, e.g. those involving molecular dynamics simulation for carbon nanotube networks (Barretta et al., 2017; Genoese et al., 2017). On the other hand, several studies have focused on developing analytical or numerical models of small-size continua, which may provide rigorous insight into the essential mechanics of the system and be readily implementable for design and optimization at a relatively-low computational effort. For this purpose, a typical approach is the formulation of continua enriched with nonlocal terms capable of capturing size effects that, instead, cannot be described by the free-scale local continuum approach. Now, nonlocal theories represent a rather established approach to investigate small-size continua. Among others, typical examples are Eringen’s integral theory (Eringen, 1972, 1983), strain-gradient theories (Aifantis, 1999, 2003, 2009, 2011; Askes and Aifantis, 2011; Challamel et al., 2016; Polizzotto, 2014, 2015), micropolar “Cosserat” theory (Lakes, 1991), peridynamic theory (Silling, 2000; Silling et al., 2007) and mechanically-based approaches involving long-range interactions among non- adjacent volumes (Di Paola et al., 2010). Surveys of progress regarding nonlocal elasticity and generalized continua can be found in (Romano and Diaco, 2020) and (Romano et al., 2016), respectively. Most of the existing nonlocal theories have developed nonlocal models of $1$D and $2$D structures, whose statics and dynamics have been investigated under various boundary conditions in a considerable number of studies, such as: (Akgöz and Civalek, 2013; Attia and Abdel Rahman, 2018; Challamel, 2018; Dastjerdi and Akgöz, 2019; Di Paola et al., 2009, 2013; Farajpour et al., 2018; Fuschi et al., 2019; Ghayesh et al., 2019; Gholipour and Ghayesh, 2020; Karami and Janghorban, 2020; Khaniki, 2019; Li et al., 2018, 2020; Malikan et al., 2020; Numanoğlu et al., 2018; Pinnola et al., 2020a; She et al., 2019; Srividhya et al., 2018; Zhang and Liu, 2020). In this context, an effective approach is the so-called stress-driven nonlocal model, relying on the idea that elastic deformation fields are output of convolution integrals between stress fields and appropriate averaging kernel (Romano and Barretta, 2017a). Nonlocal integral convolution, endowed with the special bi-exponential kernel, can be conveniently replaced with a higher-order differential equation supplemented with non-standard constitutive boundary conditions. The stress- driven theory leads to well-posed structural problems (Romano and Barretta, 2017b), does not exhibit paradoxical results typical of alternative nonlocal beam models (Challamel and Wang, 2008; Demir and Civalek, 2017; Fernández-Sáez et al., 2016) and, in the last few years, has gained increasing popularity for consistency, robustness and ease of implementation. Stress-driven nonlocal theory of elasticity has been applied to several problems of nanomechanics, as witnessed by recent contributions regarding buckling (Oskouie et al., 2018b; Darban et al., 2020), bending (Oskouie et al., 2018a, c; Zhang et al., 2020a; Roghani and Rouhi, ), axial (Barretta et al., 2019a) and torsional responses (Barretta et al., 2018) of nano-beams and elastostatic behaviour of nano- plates (Barretta et al., 2019b; Farajpour et al., 2020). Nonlocal finite-element formulations have been proposed, in general to discretize single beams or rods (Marotti de Sciarra, 2014; Aria and Friswell, 2019; Alotta et al., 2014, 2017a, 2017b). A very recent study, however, has posed the issue of addressing the dynamics of small-size 2D frames/trusses (Numanoğlu and Civalek, 2019), made by assembling nonlocal beams/rods. Eringen’s differential law has been adopted and the principle of virtual work has been used to derive separate stiffness and mass matrices of a two-node nonlocal element. Typical shape functions of a two-node local element have been exploited, with bending modelled by Bernoulli-Euler kinematic theory. A further recent contribution in this field has been given by Hozhabrossadati et al. (2020), who developed a two-node six-degree-of-freedom beam element for free-vibrations of 3D nano-grids. Separate stiffness and mass matrices have been derived treating axial, bending and torsional responses by Eringen’s differential law and weighted residual method. However, the studies by Numanoğlu and Civalek (2019) and Hozhabrossadati et al. (2020), dealing with dynamics of nanostructural systems via nonlocal finite elements, are based on Eringen’s differential formulation which leads to mechanical paradoxes and unviable elastic responses (Peddieson et al., 2003), a conclusion acknowledged by the community of Engineering Science (Fernández-Sáez et al., 2016). Lack of alternative technically significant contributions on the matter may also be attributed to the fact that not all size-dependent theories allow for formulating stiffness, mass matrices and nodal forces to be assembled in $2$D and $3$D frames/trusses. As a matter of fact, there is a great interest in developing accurate and computationally- effective nonlocal models of complex nanostructures in view of their increasing relevance in several engineering fields: carbon nanotube networks (Zhang et al., 2018), polymer-metal micro-trusses (Juarez et al., 2018), ceramic nanolattices (Meza et al., 2014). Various examples of nano/micro-scale hierarchical lattice structures and cellular nanostructures have been pointed out by Numanoğlu and Civalek (2019) along with several related applications. (a) (b) Figure 1: Typical advanced materials and structures in Engineering Science: (a) carbon nanotube network (Zhang et al., 2018), (b) polymer-metal micro- truss (Juarez et al., 2018). This paper proposes an effective approach to model and assess the dynamic behaviour of complex small-size frames, exploiting the treatment by Romano and Barretta (2017a) confined to straight nano-beams. Key novelties are as follows. 1. 1. Adoption of a well-posed and experimentally consistent stress-driven nonlocal formulation to capture size effects within the members of the structure, assuming uncoupled axial and bending motions (small displacements). 2. 2. Derivation of the exact dynamic stiffness matrix of a two-node stress-driven nonlocal element, from which the global dynamic stiffness matrix of the structure can be readily built by a standard finite-element assembly procedure. Upon constructing the global dynamic stiffness matrix, all natural frequencies and related modes of the structure are calculated using the Wittrick-Williams (WW) algorithm. The formulation applies not only to frames, but also to trusses. It is presented for 2D frames and is readily extendable to 3D networks of nanotechnological interest. The main advantages of the proposed approach are summarized as follows. The stress-driven methodology is not affected by inconsistencies and paradoxes corresponding to alternative nonlocal models (Romano et al., 2017). The dynamic-stiffness approach captures the exact dynamic response, using a single two-node beam element for every frame member without any internal mesh. Further, the WW algorithm provides all natural frequencies exactly, without missing anyone and including multiple ones. The paper is organized as follows. The stress-driven nonlocal formulation for axial and bending motions is described in Section 2. The exact dynamic stiffness matrix of two-node stress-driven nonlocal truss and beam elements is established in Section 3. In addition, the assembly procedure to build the global dynamic stiffness matrix of arbitrarily-shaped small-size frames is illustrated therein. The implementation of the WW algorithm is discussed in Section 4. Numerical applications are presented in Section 5, investigating the role of size effects on the free-vibration responses of small-size 2D structures of current technical interest. ## 2 Stress-driven nonlocal integral elasticity This Section introduces fundamental equations governing axial and bending vibrations of a nonlocal beam, according to the stress-driven model recently introduced by Romano and Barretta (2017a, b). Specifically, axial and bending responses are uncoupled on the assumption of small displacements. Consider a plane beam of length $L$, uniform cross section of area $A$ and moment of inertia $I$, as shown in Fig. 2. Let $E$ be the local elastic stiffness at the macroscopic scale. Figure 2: Stress-driven nonlocal beam in axial and bending vibrations. According to the stress-driven model, the uniaxial strain-stress relationship reads: $\varepsilon(x,t)=\frac{1}{E}\int_{0}^{L}\Phi(|x-\zeta|)\sigma(\zeta,t)d\zeta$ (1) where $\varepsilon$ is the elastic longitudinal strain, $\sigma$ is the normal stress, $\Phi(|x-\zeta|)$ is a scalar function known as attenuation function assumed to fullfil positivity, symmetric and limit impulsivity. First, let us focus on the axial response of the beam in Fig. (2). On the assumption that cross sections remain plane and normal to the longitudinal axis, from Eq. (1) the following equation can be derived between longitudinal generalized strain $\gamma$ and axial force $N$ (Barretta et al., 2019a): $\gamma(x,t)=\frac{1}{EA}\int_{0}^{L}\Phi(|x-\zeta|)N(\zeta,t)d\zeta$ (2) being $\gamma(x,t)=u^{(1)}(x,t)$ (3) where $u$ is the axial displacement and superscript $(k)$ means $k^{\mathrm{th}}$ derivative w.r.t. the spatial coordinate $x$. As in recent works (Romano and Barretta, 2017a, b; Barretta et al., 2019a), $\Phi$ is taken as the following bi-exponential function: $\Phi(x,\zeta)=\frac{1}{2L_{c}}\exp\left(-\frac{|x-\zeta|}{L_{c}}\right)$ (4) where $L_{c}=\lambda\cdot L$ is the characteristic length, being $\lambda$ a material-dependent parameter. Eq. (4) fulfils the requirements of symmetry and positivity. Moreover, Eq. (4) satisfies the property of limit impulsivity, i.e. reverts to the Dirac’s delta function for $\lambda\rightarrow 0$, so that Eq. (2) reduces to the standard local constitutive law of linear elasticity at internal points of the structural domain. The choice of Eq. (4) for $\Phi$ is motivated by the fact that, using integration by parts, the integral constitutive law (2) can be now reverted to the following equivalent differential equation: $N(x,t)=-EA\cdot L_{c}^{2}\left(\gamma^{(2)}(x,t)-\frac{1}{L_{c}^{2}}\gamma(x,t)\right)$ (5) with the additional constitutive BCs $\displaystyle\gamma^{(1)}(0,t)=\frac{1}{L_{c}}\gamma(0,t)$ (6a,b) $\displaystyle\gamma^{(1)}(L,t)=-\frac{1}{L_{c}}\gamma(L,t)$ Next, consider the equilibrium equation governing the axial vibration response (see Fig. 3a) $N^{(1)}(x,t)+p_{x}(x,t)-\rho A\ddot{u}(x,t)=0$ (7) where $\rho$ is the volume mass density of the material, $p_{x}(x,t)$ is the external transversal force per unit length. Combining Eq. (7) with Eq. (5) leads to the following partial differential equation governing axial vibrations of a stress-driven nonlocal beam: $-EA\cdot L_{c}^{2}\left(u^{(4)}(x,t)-\frac{1}{L_{c}^{2}}u^{(2)}(x,t)\right)+p_{x}(x,t)-\rho A\ddot{u}(x,t)=0$ (8) Eq. (8) is a partial differential equation in the unknown time-dependent axial displacement $u$, to be solved enforcing the two classical static/kinematic BCs and the additional constitutive BCs (6a,b) together with the initial conditions. As $\lambda\rightarrow 0$, Eq. (8) reverts to the classical partial differential equation governing axial vibrations of the local beam. Further, for the purposes of this study, it is of interest to formulate the equations governing bending vibrations of the stress-driven nonlocal beam. Assuming the Bernoulli-Euler beam model, Eq. (1) leads to the following nonlocal relation between elastic curvature $\chi$ and bending moment interaction $M$ (Romano and Barretta, 2017a, b) $\chi(x,t)=\frac{1}{EI}\int_{0}^{L}\Phi(|x-\zeta|)M(\zeta,t)d\zeta$ (9) In Eq. (9) $\chi(x,t)=-v^{(2)}(x,t),\qquad\theta(x,t)=-v^{(1)}(x,t)$ (10a,b) where $v$ is the deflection in the $y$ direction, $\theta$ is the rotation (positive counterclockwise). Again, using the bi-exponential function (4) in Eq. (9) and integrating by parts leads to the equivalent differential problem of Eq. (9): $M(x)=-EI\cdot L_{c}^{2}\left(\chi^{(2)}(x)-\frac{1}{L_{c}^{2}}\chi(x)\right)$ (11) with the additional constitutive BCs $\displaystyle\chi^{(1)}(0,t)=\frac{1}{L_{c}}\chi(0,t)$ (12a,b) $\displaystyle\chi^{(1)}(L,t)=-\frac{1}{L_{c}}\chi(L,t)$ Figure 3: Equilibrium of a beam segment: axial problem (a), bending problem (b). Next, consider that the bending vibration response of a Bernoulli-Euler beam is governed by the differential condition of equilibrium $M^{(2)}(x,t)+p_{y}(x,t)-\rho A\ddot{v}(x,t)=0$ (13) where $p_{y}(x,t)$ is the external transverse force per unit length; further, $M^{(1)}(x,t)=T(x,t)$ (14) as shown in Fig. 3b. Combining Eq. (11) and Eq. (13) leads to the following equation governing bending vibrations of a stress-driven nonlocal beam: $EI\cdot L_{c}^{2}\left(v^{(6)}(x,t)-\frac{1}{L_{c}^{2}}v^{(4)}(x,t)\right)+p_{y}(x,t)-\rho A\ddot{v}(x,t)=0$ (15) Eq. (15) is a partial differential equation in the unknown time-dependent deflection $v$, to be solved enforcing the classical four static/kinematic BCs and the two constitutive BCs (12a,b) (Romano and Barretta, 2017a, b), together with the initial conditions. Note that, as $\lambda\rightarrow 0$, Eq. (15) reverts to the classical partial differential equation governing the local Bernoulli-Euler beam. Eq. (8) and Eq. (15) are the basis to derive the exact dynamic stiffness of a two-node stress-driven nonlocal beam element, as explained in the next Section. ## 3 Exact dynamic stiffness matrix of stress-driven nonlocal beam elements Let us consider the stress-driven nonlocal beam in Fig. 4, acted upon by harmonic forces/moments at the ends. Figure 4: Nodal forces and displacements of a two-node stress-driven nonlocal beam element. Beam ends are referred to as “nodes” with three degrees of freedom each and the beam as a two-node stress-driven nonlocal beam element. Denoting by $u(x,t)=U(x)\mathrm{e}^{\mathrm{i}\omega t}$, $v(x,t)=V(x)\mathrm{e}^{\mathrm{i}\omega t}$, $\theta(x,t)=\Theta(x)\mathrm{e}^{\mathrm{i}\omega t}$, …, axial and bending response variables, be $\mathbf{F}\mathrm{e}^{\mathrm{i}\omega t}=[-N(0)\;N(L)\;-T(0)\;-M(0)\;T(L)\;M(L)]^{\mathrm{T}}\mathrm{e}^{\mathrm{i}\omega t}$ the vector of nodal forces and $\mathbf{U}\mathrm{e}^{\mathrm{i}\omega t}=[U(0)\;U(L)\;V(0)\;\Theta(0)\;V(L)\;\Theta(L)]^{\mathrm{T}}\mathrm{e}^{\mathrm{i}\omega t}$ the corresponding vector of nodal displacements. For generality, the dynamic stiffness matrix of the two-node stress-driven nonlocal beam element is sought in terms of dimensionless frequencies (Banerjee and Williams, 1996; Banerjee, 1998, 2001, 2003). Thus, the equations of motion (8) and (15) governing steady-state responses under harmonic forces/moments at beam ends and the associated constitutive BCs (6a,b) and (12a,b) are rewritten as ($\omega$ – dependence of the response variables is omitted for brevity): $(\mathcal{L}_{a}+\overline{\omega}_{a}^{2}\mathcal{I})[U]=0\,,\qquad\textrm{with}\qquad\mathcal{L}_{a}:=-\lambda^{2}\frac{{\mathrm{d}^{4}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}}}{\mathrm{d}\xi^{2}}\,,\quad\xi\in[0,1]$ (16) $\displaystyle\left.\frac{\mathrm{d}\Gamma}{\mathrm{d}\xi}\right\rvert_{\xi=0}=\frac{1}{\lambda}\Gamma(0)$ (17a,b) $\displaystyle\left.\frac{\mathrm{d}\Gamma}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\Gamma(1)$ $(\mathcal{L}_{b}+\overline{\omega}_{b}^{4}\mathcal{I})[V]=0\,,\qquad\textrm{with}\qquad\mathcal{L}_{b}:=\lambda^{2}\frac{{\mathrm{d}^{6}}}{\mathrm{d}\xi^{6}}-\frac{{\mathrm{d}^{4}}}{\mathrm{d}\xi^{4}}\,,\quad\xi\in[0,1]$ (18) $\displaystyle\left.\frac{\mathrm{d}X}{\mathrm{d}\xi}\right\rvert_{\xi=0}=\frac{1}{\lambda}X(0)$ (19a,b) $\displaystyle\left.\frac{\mathrm{d}X}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-\frac{1}{\lambda}X(1)$ where $\,\xi=x/L\,$, $\,\lambda=L_{c}/L\,$, $\,\overline{\omega}_{a}=[\rho A(\omega L)^{2}/EA]^{1/2}\,$, $\,\overline{\omega}_{b}=[\rho A(\omega L^{2})^{2}/EI]^{1/4}\,$ and $\,\mathcal{I}\,$ is the identity map. Further, in Eq. (16) through Eqs. (19a,b), the notation $\mathrm{d}^{k}/\mathrm{d}\xi^{k}$ distinguishes the derivative w.r.t. to the dimensionless spatial coordinate $\xi$ from the derivative w.r.t. to $x$, indicated by the superscript $(k)$. Upon enforcing the constitutive BCs (17a,b) and (19a,b), the exact solutions of Eq. (16) and Eq. (18) can be obtained in the following analytical forms: $\displaystyle U(\xi)=\sum_{k=1}^{2}c_{a,k}f_{k}(\xi)$ (20) $\displaystyle V(\xi)=\sum_{k=1}^{4}c_{b,k}g_{k}(\xi)$ (21) where $c_{a,k}$ for $k=1,2$ and $c_{b,k}$ for $k=1,...,4$ are integration constants depending on the classical static/kinematic BCs. Further, $f_{k}(\xi)=f_{k}(\xi,\overline{\omega}_{a})$ and $g_{k}(\xi)=g_{k}(\xi,\overline{\omega}_{b})$ are closed analytical functions depending on frequency and parameters of the stress-driven nonlocal beam, reported in Appendix A for brevity. Now, from Eq. (20) and Eq. (21) and taking into account Eqs. (10a,b), Eq. (11) and Eq. (14) for the bending response, as well as Eq. (3) and Eq. (5) for the axial response, the whole set of response variables can be cast as functions of the integration constants $\mathbf{c}_{a}=[c_{a,1}\;c_{a,2}]^{T}$ and $\mathbf{c}_{b}=[c_{b,1}\;c_{b,2}\;c_{b,3}\;c_{b,4}]^{T}$, i.e. $\displaystyle U=U(\xi,\mathbf{c}_{a})$ (22a-f) $\displaystyle N=-\frac{EA\cdot\lambda^{2}}{L}\left(\frac{{\mathrm{d}^{3}U}}{\mathrm{d}\xi^{3}}-\frac{1}{\lambda^{2}}\frac{\mathrm{d}U}{\mathrm{d}\xi}\right)=N(\xi,\mathbf{c}_{a})$ $\displaystyle V=V(\xi,\mathbf{c}_{b})$ $\displaystyle\Theta=-\frac{\mathrm{d}V}{\mathrm{d}\xi}=\Theta(\xi,\mathbf{c}_{b})$ $\displaystyle M=\frac{EI\cdot\lambda^{2}}{L^{2}}\left(\frac{{\mathrm{d}^{4}V}}{\mathrm{d}\xi^{4}}-\frac{1}{\lambda^{2}}\frac{{\mathrm{d}^{2}V}}{\mathrm{d}\xi^{2}}\right)=M(\xi,\mathbf{c}_{b})$ $\displaystyle T=\frac{EI\cdot\lambda^{2}}{L^{3}}\left(\frac{{\mathrm{d}^{5}V}}{\mathrm{d}\xi^{5}}-\frac{1}{\lambda^{2}}\frac{{\mathrm{d}^{3}V}}{\mathrm{d}\xi^{3}}\right)=T(\xi,\mathbf{c}_{b})$ Computing Eqs. (22a-f) at $\xi=0$ and $\xi=1$, the following expressions are obtained for the vectors of nodal displacements and forces: $\displaystyle\mathbf{U}=\mathbf{A}\mathbf{c}$ (23) $\displaystyle\mathbf{F}=\mathbf{B}\mathbf{c}$ (24) where $\mathbf{c}=[\mathbf{c}_{a}\;\mathbf{c}_{b}]^{\mathrm{T}}$. Next, using Eq. (23) to calculate $\mathbf{c}=\mathbf{A}^{-1}\mathbf{U}$ and replacing for $\mathbf{c}$ in Eq. (24) lead to (Banerjee, 1997) $\mathbf{B}\mathbf{A}^{-1}\mathbf{U}=\mathbf{D}\mathbf{U}=\mathbf{F}$ (25) where $\mathbf{D}(\omega)=\begin{bmatrix}\mathbf{D}_{a}(\overline{\omega}_{a}(\omega))&\mathbf{0}\\\ \mathbf{0}&\mathbf{D}_{b}(\overline{\omega}_{b}(\omega))\\\ \end{bmatrix}$ (26) being $\mathbf{D}_{a}$ and $\mathbf{D}_{b}$ the block matrices associated with axial and bending responses, respectively. The matrix $\mathbf{D}$ in Eq. (26) is the dynamic stiffness matrix of the two-node stress-driven nonlocal beam element in Fig. 3. Remarkably, it is available in a closed analytical form, as the inverse matrix $\mathbf{A}^{-1}$ in Eq. (25) can be obtained symbolically from the inverses of the two separate block matrices associated with axial and bending responses (Failla, 2016). The matrix $\mathbf{D}$ is exact, because is based on the exact solutions of the equations of motion (16) and (18) along with the related constitutive BCs (17a,b) and (19a,b). Indeed, no approximations have been made in building the solutions (20) and (21). An alternative approach to derive the exact dynamic stiffness matrix of the two-node stress-driven nonlocal beam element in Fig. 4 relies on the principle of virtual work. Consider Eq. (16) governing the steady-state axial vibrations under harmonic axial forces at the beam ends (see Fig. 4). The identity of internal and external works reads ($\overline{\omega}_{a}$ – dependence of response variables and virtual axial displacement/longitudinal generalized strain is omitted for brevity) $L\int_{0}^{1}\left(-\lambda^{2}\frac{{\mathrm{d}^{3}U}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}U}{\mathrm{d}\xi}\right)\delta\Gamma~{}~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}U\delta U~{}~{}\mathrm{d}\xi=\widetilde{F}_{a,1}\delta U_{1}+\widetilde{F}_{a,2}\delta U_{2}$ (27) where $\delta U_{k}$ for $k=1,2$ are virtual nodal displacements, $\delta U$ and $\delta\Gamma=\mathrm{d}\delta U/\mathrm{d}\xi$ the corresponding virtual axial displacement and longitudinal generalized strain along the beam; further, $\widetilde{F}_{a,k}=(L^{2}/EA)F_{a,k}$ for $k=1,2$. Now, exact expression of the axial displacement $U$ is $U(\xi)=\sum_{j=1}^{2}U_{j}\psi_{j}(\xi)$ (28) where $U_{j}$ are the nodal displacements associated with the applied nodal forces $\widetilde{F}_{a,k}$ and $\psi_{j}$ are frequency-dependent, exact shape functions obtained from Eq. (20) enforcing the following BCs (omitting $\overline{\omega}_{a}$ – dependence for brevity) $\displaystyle U(0)=1\qquad U(1)=0$ $\displaystyle\rightarrow$ $\displaystyle\psi_{1}(\xi)$ (29) $\displaystyle U(0)=0\qquad U(1)=1$ $\displaystyle\rightarrow$ $\displaystyle\psi_{2}(\xi)$ The boundary value problem (29) requires inverting a $2\times 2$ matrix to calculate the integration constants $c_{a,k}$ in Eq. (20) and the matrix inversion can be readily implemented in a closed form. Replacing Eq. (28) in Eq. (27) and enforcing the identity of internal and external works for any virtual nodal displacements leads to $\displaystyle\sum_{j=1}^{2}\left(L\int_{0}^{1}\left(-\lambda^{2}\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{3}\psi_{j}}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}~{}\mathrm{d}\xi\right)U_{j}-\sum_{j=1}^{2}\left(\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi\right)U_{j}=\widetilde{F}_{a,1}\psi_{i}(0)$ (30) $\displaystyle+\widetilde{F}_{a,2}\psi_{i}(1)$ where $\psi_{1}(1)=\psi_{2}(0)=0$ on the r.h.s. Eq. (30) can be written in matrix form as $\widetilde{\mathbf{D}}_{a}(\overline{\omega}_{a})\mathbf{U}_{a}=\widetilde{\mathbf{F}}_{a}$ (31) where $\mathbf{U}_{a}=\begin{bmatrix}U_{1}&U_{2}\end{bmatrix}^{\mathrm{T}}$, $\widetilde{\mathbf{F}}_{a}=\begin{bmatrix}\widetilde{F}_{a,1}&\widetilde{F}_{a,2}\end{bmatrix}^{\mathrm{T}}$ and $\widetilde{\mathbf{D}}_{a}$ is a $2\times 2$ matrix with elements $(\widetilde{\mathbf{D}}_{a})_{ij}=L\int_{0}^{1}\left(-\lambda^{2}\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{3}\psi_{j}}}{\mathrm{d}\xi^{3}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi$ (32) Being $\widetilde{\mathbf{F}}_{a}=(L^{2}/EA)\mathbf{F}_{a}$ for $\mathbf{F}_{a}=\begin{bmatrix}F_{a,1}&F_{a,2}\end{bmatrix}^{\mathrm{T}}$, we finally obtain $\mathbf{D}_{a}(\overline{\omega}_{a})\mathbf{U}_{a}=\mathbf{F}_{a}$ (33) where $\mathbf{D}_{a}$ is the dynamic stiffness matrix of the rod. Next, consider Eq. (18) governing the steady-state bending vibrations under transverse forces/moments applied at the beam ends (Fig. 4). The identity of internal and external works reads ($\overline{\omega}_{b}$ – dependence of response variables and virtual deflection/curvature is omitted for conciseness) $\displaystyle L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{4}V}}{\mathrm{d}\xi^{4}}-\frac{{\mathrm{d}^{2}V}}{\mathrm{d}\xi^{2}}\right)\delta X~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}V\delta V~{}~{}\mathrm{d}\xi=\widetilde{F}_{b,1}\delta V_{1}+\widetilde{F}_{b,2}\delta V_{2}+\widetilde{F}_{b,3}\delta V_{3}+\widetilde{F}_{b,4}\delta V_{4}$ (34) where $\delta V_{k}$ for $k=1,...,4$ are virtual nodal displacements, $\delta V$ and $\delta X=-\mathrm{d}^{2}\delta V/\mathrm{d}\xi^{2}$ the corresponding virtual deflection and curvature along the beam; further, $\widetilde{F}_{b,k}=(L^{4}/EI)F_{b,k}$ for $k=1,3$ and $\widetilde{F}_{b,k}=(L^{3}/EI)F_{b,k}$ for $k=2,4$, hence: $\underbrace{\begin{bmatrix}\widetilde{F}_{b,1}\\\ \widetilde{F}_{b,2}\\\ \widetilde{F}_{b,3}\\\ \widetilde{F}_{b,4}\end{bmatrix}}_{\widetilde{\mathbf{F}}_{b}}=\underbrace{\begin{bmatrix}\frac{L^{4}}{EI}&0&0&0\\\ 0&\frac{L^{3}}{EI}&0&0\\\ 0&0&\frac{L^{4}}{EI}&0\\\ 0&0&0&\frac{L^{3}}{EI}\end{bmatrix}}_{\mathbf{T}}\underbrace{\begin{bmatrix}F_{b,1}\\\ F_{b,2}\\\ F_{b,3}\\\ F_{b,4}\\\ \end{bmatrix}}_{\mathbf{F}_{b}}$ (35) The exact expression of the deflection $V$ is $\displaystyle V(\xi)=\sum_{j=1}^{4}V_{j}\beta_{j}(\xi)$ (36) $V_{j}$ are the nodal displacements associated with the applied nodal forces/moments $F_{b,k}$ and $\beta_{j}$ are frequency-dependent, exact shape functions obtained from Eq. (21) by enforcing the following BCs (again, omitting $\overline{\omega}_{b}$ – dependence for brevity) $\displaystyle U(0)=1\qquad\Theta(0)=0\qquad U(1)=0\qquad\Theta(1)=0$ $\displaystyle\rightarrow$ $\displaystyle\beta_{1}(\xi)$ (37) $\displaystyle U(0)=0\qquad\Theta(0)=1\qquad U(1)=0\qquad\Theta(1)=0$ $\displaystyle\rightarrow$ $\displaystyle\beta_{2}(\xi)$ $\displaystyle U(0)=0\qquad\Theta(0)=0\qquad U(1)=1\qquad\Theta(1)=0$ $\displaystyle\rightarrow$ $\displaystyle\beta_{3}(\xi)$ $\displaystyle U(0)=0\qquad\Theta(0)=0\qquad U(1)=0\qquad\Theta(1)=1$ $\displaystyle\rightarrow$ $\displaystyle\beta_{4}(\xi)$ The boundary value problem (37) requires inverting a $4\times 4$ matrix to calculate the integration constants $c_{b,k}$ in Eq. (21), and the matrix inversion can be readily implemented in closed form (Failla, 2016). Replacing Eq. (36) in Eq. (34) and enforcing the identity of internal and external works for any virtual nodal displacements yields $\displaystyle\sum_{j=1}^{4}\left(L\int_{0}^{1}-\lambda^{2}\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{4}\beta_{j}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}~{}\mathrm{d}\xi\right)V_{j}-\sum_{j=1}^{4}\left(\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi\right)V_{j}=\widetilde{F}_{b,1}\beta_{i}(0)$ (38) $\displaystyle-\widetilde{F}_{b,2}\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}+\widetilde{F}_{b,3}\beta_{i}(1)-\widetilde{F}_{b,4}\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}$ being $\beta_{i}(0)=\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}=0$ and $\beta_{i}(1)=\left.\frac{\mathrm{d}\beta_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}=0$ except for $\beta_{1}(0)=1$, $\left.\frac{\mathrm{d}\beta_{2}}{\mathrm{d}\xi}\right\rvert_{\xi=0}=-1$, $\beta_{3}(1)=1$, $\left.\frac{\mathrm{d}\beta_{4}}{\mathrm{d}\xi}\right\rvert_{\xi=1}=-1$. Eq. (38) can be written in matrix form as $\widetilde{\mathbf{D}}_{b}(\overline{\omega}_{b})\mathbf{U}_{b}=\widetilde{\mathbf{F}}_{b}$ (39) where $\mathbf{U}_{b}=\begin{bmatrix}V_{1}&V_{2}&V_{3}&V_{4}\end{bmatrix}^{\mathrm{T}}$, $\widetilde{\mathbf{F}}_{b}=\begin{bmatrix}\widetilde{F}_{b,1}&\widetilde{F}_{b,2}&\widetilde{F}_{b,3}&\widetilde{F}_{b,4}\end{bmatrix}^{\mathrm{T}}$ and $\widetilde{\mathbf{D}}_{b}$ is a $4\times 4$ matrix whose elements are $(\widetilde{\mathbf{D}}_{b})_{ij}=L\int_{0}^{1}-\lambda^{2}\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{4}\beta_{j}}}{\mathrm{d}\xi^{4}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi$ (40) From Eq. (40) and taking into account Eq. (35), we finally obtain $\mathbf{D}_{b}(\overline{\omega}_{b})\mathbf{U}_{b}=\mathbf{F}_{b}$ (41) being $\mathbf{D}_{b}(\overline{\omega}_{b})=\mathbf{T}^{-1}\widetilde{\mathbf{D}}_{b}$ (42) where $\mathbf{T}^{-1}$ is trivially computable. Now, assembling Eq. (32) and Eq. (40) for axial and bending vibrations yields $\mathbf{D}\mathbf{U}=\mathbf{F}\qquad\mathbf{D}(\omega)=\begin{bmatrix}\mathbf{D}_{a}(\overline{\omega}_{a})&\mathbf{0}\\\ \mathbf{0}&\mathbf{D}_{b}(\overline{\omega}_{b})\end{bmatrix}$ (43) where $\mathbf{U}=\begin{bmatrix}U_{1}&U_{2}&V_{1}&V_{2}&V_{3}&V_{4}\end{bmatrix}^{\mathrm{T}}\qquad\mathbf{F}=\begin{bmatrix}F_{a,1}&F_{a,2}&F_{b,1}&F_{b,2}&F_{b,3}&F_{b,4}\end{bmatrix}^{\mathrm{T}}$ (44a,b) Remarkably, upon calculating the integrals (32) and (40) by standard numerical methods, the matrix $\mathbf{D}$ in Eq. (43) is found to coincide with the dynamic stiffness matrix $\mathbf{D}$ in Eq. (26). It is noteworthy that all elements of the dynamic stiffness matrix $\mathbf{D}$ are real. Further, $\mathbf{D}$ is symmetric. Indeed, performing integration by parts of Eq. (32) yields $(\widetilde{\mathbf{D}}_{a})_{ij}=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi-\left.\lambda^{2}L\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{0}^{1}$ (45) The shape functions $\psi_{i}$ fulfil Eqs. (17a,b), i.e. $\left.\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}=\frac{1}{\lambda}\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\qquad\left.\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\right\rvert_{\xi=1}$ (46a,b) Therefore, in view of Eq. (46a,b) in Eq. (45) takes the form $\displaystyle(\widetilde{\mathbf{D}}_{a})_{ij}$ $\displaystyle=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\psi_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\psi_{j}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi-\overline{\omega}_{a}^{2}L\int_{0}^{1}\psi_{i}\psi_{j}~{}~{}\mathrm{d}\xi$ (47) $\displaystyle+\lambda L\left(\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\right.\left.+\left.\frac{\mathrm{d}\psi_{i}}{\mathrm{d}\xi}\frac{\mathrm{d}\psi_{j}}{\mathrm{d}\xi}\right\rvert_{\xi=1}\right)$ Eq. (47) implies that $(\mathbf{D}_{a})_{ij}=(\mathbf{D}_{a})_{ji}$, i.e the symmetry of the dynamic stiffness matrix associated with the axial response. Likewise, performing integration by parts of Eq. (40) yields $(\widetilde{\mathbf{D}}_{b})_{ij}=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\frac{{\mathrm{d}^{3}\beta_{j}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi-\left.\lambda^{2}L\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{0}^{1}$ (48) Again, since the shape functions $\beta_{i}$ satisfy Eqs. (19a,b), i.e. $\left.\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{\xi=0}=\frac{1}{\lambda}\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}\qquad\left.\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\right\rvert_{\xi=1}=-\frac{1}{\lambda}\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}$ (49a,b) Eq. (48) can be written as $\displaystyle(\widetilde{\mathbf{D}}_{b})_{ij}$ $\displaystyle=L\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\beta_{i}}}{\mathrm{d}\xi^{3}}\frac{{\mathrm{d}^{3}\beta_{j}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi-\overline{\omega}_{b}^{4}L\int_{0}^{1}\beta_{i}\beta_{j}~{}~{}\mathrm{d}\xi$ (50) $\displaystyle+\lambda L\left(\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}\right.\left.+\left.\frac{{\mathrm{d}^{2}\beta_{i}}}{\mathrm{d}\xi^{2}}\frac{{\mathrm{d}^{2}\beta_{j}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}\right)$ Eq. (50) demonstrates that $(\mathbf{D}_{b})_{ij}=(\mathbf{D}_{b})_{ji}$, that is the dynamic stiffness matrix associated with the bending response is symmetric. At this stage, a few remarks are in order. The dynamic stiffness matrix $\mathbf{D}$ of the two-node stress-driven beam element in Fig. 4 can be used to build the global dynamic stiffness matrix of an arbitrarily-shaped frame. For this, a standard finite-element assembly procedure can be implemented. It is noteworthy that every frame member is modelled exactly by a single element. The size of the global dynamic stiffness matrix depends only on the total number of degrees of freedom of the frame nodes (“beam-to-column” nodes), as no meshing is required within every frame member. The global dynamic stiffness matrix is exact because is exact the dynamic stiffness matrix of every frame member. The exact natural frequencies and related modes can be calculated by the WW algorithm, using the implementation described in Section 4. The frequency response of the frame, acted upon by harmonic forces/moments at the nodes (Banerjee, 1997), can be calculated upon inverting the global dynamic stiffness matrix. This can be done numerically, for every frequency of interest. The proposed framework can be generalized to build the global dynamic stiffness matrix of 3D frames. This requires formulating the exact dynamic stiffness matrix of a two-node stress-driven nonlocal beam element, where each node features six degrees of freedom including torsional rotation. It is noticed that the stress-driven nonlocal constitutive law for torsional behaviour and associated constitutive BCs, formulated by Barretta et al. (2018), lead to a partial differential equation governing torsional vibrations that mirror Eq. (8) for axial vibrations. Therefore, under the assumption of small displacements, the exact dynamic stiffness matrix of the two-node, twelve-degree-of-freedom stress-driven nonlocal beam element will involve separate block matrices pertinent to axial, bending and torsional responses. Again, the global dynamic stiffness matrix will be obtainable by a standard finite-element assembly procedure. The global dynamic stiffness matrix of an arbitrarily-shaped truss can be built based on the dynamic stiffness matrix of a two-node rod, which can be readily derived from Eq. (25) upon eliminating rows and columns associated with the bending response. For trusses as well, the exact natural frequencies and modes can be computed by the WW algorithm, as described in Section 4. Both 2D and 3D dimensional truss structures can be modelled. The proposed framework represents an exact approach to the dynamics of small- size frames/trusses, where size effects are modelled by the stress-driven nonlocal model. Here, the assumption is that the nonlocality introduces a coupling between the responses at different points that belong to the same frame/truss member, to an extent depending on the internal length $\lambda$. Recognize that this assumption is made also in the previous works on small- size frames/trusses (Numanoğlu and Civalek, 2019; Hozhabrossadati et al., 2020), where Eringen’s differential model (1983) was used to build stiffness and mass matrices of a two-node nonlocal finite element. The differential operators $\,\mathcal{L}_{a}\,$ and $\,\mathcal{L}_{b}\,$ in Eq. (16) and Eq. (18), governing axial and bending free vibrations of the two- node stress-driven nonlocal beam element in Fig. 4, are self-adjoint. That is, $\displaystyle\int_{0}^{1}\mathcal{L}_{a}[U_{m}]U_{n}~{}~{}\mathrm{d}\xi=\int_{0}^{1}\mathcal{L}_{a}[U_{n}]U_{m}~{}~{}\mathrm{d}\xi$ (51) $\displaystyle\int_{0}^{1}\mathcal{L}_{b}[V_{m}]V_{n}~{}~{}\mathrm{d}\xi=\int_{0}^{1}\mathcal{L}_{b}[V_{n}]V_{m}~{}~{}\mathrm{d}\xi$ (52) with $U_{m}$, $U_{n}$, $V_{m}$, $V_{n}$ eigenfunctions fulfilling the constitutive BCs (17a,b)-(19a,b) and the static/kinematic BCs. Eq. (51) can be demonstrated writing Eq. (16) for the $m^{\mathrm{th}}$ eigenfunction $U_{m}(\xi)$, multiplying by the $n^{\mathrm{th}}$ eigenfunction $U_{n}(\xi)$ and integrating Eq. (16) over $[0,1]$, performing integration by parts (as to derive Eq. (45)) and enforcing the constitutive BCs (17a,b) along with the static/kinematic BCs. Eq. (52) can be proven likewise, starting from Eq. (18). Furthermore, the self-adjoint differential operators $\mathcal{L}_{a}$ and $\mathcal{L}_{b}$ feature properly-defined Green’s functions, given by: $G_{a}(\xi,\xi_{0})=g_{a,1}+g_{a,2}\xi+g_{a,3}\lambda^{2}\mathrm{e}^{-\frac{\xi}{\lambda}}+g_{a,4}\lambda^{2}\mathrm{e}^{\frac{\xi}{\lambda}}+\left[\xi_{0}-\xi+\frac{\lambda}{2}\left(\mathrm{e}^{\frac{\xi-\xi_{0}}{\lambda}}-\mathrm{e}^{-\frac{\xi-\xi_{0}}{\lambda}}\right)\right]\mathcal{H}(\xi-\xi_{0})$ (53) $\displaystyle G_{b}(\xi,\xi_{0})=$ $\displaystyle~{}~{}g_{b,1}+g_{b,2}\xi+g_{b,3}\xi^{2}+g_{b,4}\xi^{3}+g_{b,5}\lambda^{4}\mathrm{e}^{-\frac{\xi}{\lambda}}+g_{b,6}\lambda^{4}\mathrm{e}^{\frac{\xi}{\lambda}}+\frac{1}{6}\left[\vphantom{\frac{\xi-\xi_{0}}{\lambda}}-(\xi-\xi_{0})^{3}+6\lambda^{2}(\xi-\xi_{0})\right.$ (54) $\displaystyle\left.+6\lambda^{3}\sinh\left(\frac{\xi-\xi_{0}}{\lambda}\right)\right]\mathcal{H}(\xi-\xi_{0})$ where $g_{a,i}$ (for $i=1,...,4$) and $g_{b,i}$ (for $i=1,...,6$) are integration constants to be evaluated depending on static/kinematic BCs and $\mathcal{H}$ is the unit-step function defined by $\mathcal{H}(\xi-\xi_{0})=\left\\{\begin{aligned} &1&&\text{if}~{}\xi>\xi_{0}\\\ &0&&\text{if}~{}\xi<\xi_{0}\end{aligned}\right.$ (55) The Green’s functions (53) and (54) are real functions, obtained as solutions of the equations: $\displaystyle\mathcal{L}_{a}[U]+\delta(\xi-\xi_{0})=0$ (56) $\displaystyle\mathcal{L}_{b}[V]+\delta(\xi-\xi_{0})=0$ (57) Specifically, Eq.(53) and Eq.(54) are built applying direct and inverse Laplace transform to Eq.(55) and Eq.(56) respectively (for a similar approach, see (Wang and Qiao, 2007)). Since $\mathcal{L}_{a}$ and $\mathcal{L}_{b}$ are self-adjoint, the (real) Green’s functions are symmetric. Accordingly, the free-vibration problem of the two-node stress-driven nonlocal beam element features an infinite sequence of real eigenvalues (natural frequencies) with associated eigenfunctions, which form an infinite system of functions satisfying the orthogonality conditions (Courant and Hilbert, 1953): $\displaystyle L\int_{0}^{1}\rho AU_{m}U_{n}~{}\mathrm{d}\xi=\delta_{mn}$ (58) $\displaystyle L\int_{0}^{1}\rho AV_{m}V_{n}~{}\mathrm{d}\xi=\delta_{mn}$ (59) with $\delta_{mn}$ Kronecker delta. Existence of an infinite sequence of real natural frequencies and associated eigenfunctions follows also for the free-vibration problem of an arbitrarily- shaped frame whose members are two-node stress-driven nonlocal beam elements. Indeed, as motivated below, the free-vibration problem of such a frame is still governed by self-adjoint differential operators with associated properly-defined, real and symmetric Green’s functions. * - As for self-adjointness, see the work by Náprstek and Fischer (2015) proving that, upon enforcing the classical equilibrium equations at the nodes, the free-vibration problem of an arbitrarily-shaped frame is still governed by self-adjoint differential operators, if the free-vibration problem of every frame member is governed by self-adjoint differential operators. * - As for the calculation of the Green’s functions, notice that they can be obtained exactly by a static finite-element analysis of the frame, acted upon by a concentrated force applied at an arbitrary point within one of its members. For this purpose, exact static stiffness matrices and exact static load vectors of the two-node stress-driven nonlocal beam elements can be assembled by a standard finite-element assembly procedure. The exact static stiffness matrix can be obtained mirroring the approach here devised for deriving the exact dynamic stiffness matrix. The exact static load vector of the beam element loaded by an arbitrarily-placed concentrated force can be constructed based on the Green’s functions (53)-(54) using a standard method to evaluate the corresponding nodal forces (e.g., see the procedure by Failla (2016) for dynamic problems, applicable also in a static framework). The so- computed Green’s functions are real and symmetric as a result of self- adjointess. Additionally, it is noteworthy that existence and uniqueness of the frequency response can be demonstrated for forced-vibration problems governed by self- adjoint operators and associated real, symmetric Green functions (Courant and Hilbert, 1953). Specifically, the frequency response exists and is unique if the forcing frequency is not a natural frequency of the system, which avoids resonance. Accordingly, existence and uniqueness hold true also for the frequency response of the two-node stress-driven nonlocal beam element or a frame whose members are two-node stress-driven nonlocal beam elements. The conclusions drawn above are valid for any BCs and prove the well-posedness of the stress-driven nonlocal formulation for elastodynamic problems, including free- and forced-vibration ones. On the other hand, the well- posedness of the stress-driven nonlocal formulation for elastostatic problems was already proved by Romano and Barretta (2017a), for any BCs as well. In the next Section, natural frequencies and modes of arbitrarily-shaped frames whose members are two-node stress-driven nonlocal beam elements will be calculated by the WW algorithm. ## 4 Wittrick-Williams algorithm for small-size trusses and frames It is known that the WW algorithm calculates all the natural frequencies of a frame whose exact global dynamic stiffness matrix $\mathbf{D}_{G}(\omega)$ is available (Wittrick and Williams, 1971; Banerjee, 1997). The unique and distinctive feature of the WW algorithm is that all the natural frequencies are obtained exactly, without missing anyone and including multiple ones (Williams and Wittrick, 1970; Wittrick and Williams, 1973; Williams and Anderson, 1986; Banerjee and Williams, 1992; Su and Banerjee, 2015). For this reason, the WW algorithm is the benchmark to investigate the exact free- vibration response of frame. The basis of the WW algorithm is the calculation of the number of natural frequencies $J(\omega)$ below a trial frequency $\omega$, based on which upper and lower bounds can be determined on every target natural frequency and made to approach each other by the bisection method. Specifically, $J(\omega)$ is given as (Wittrick and Williams, 1971) $J(\omega)=J_{0}(\omega)+s[\mathbf{D}_{G}(\omega)]$ (60) where $J_{0}(\omega)$ is the number of natural frequencies of the component frame members with fixed ends (“clamped-clamped” frequencies); further, $s[\mathbf{D}_{G}(\omega)]$ is the number of negative entries on the leading diagonal of the upper triangular matrix obtained by applying the Gaussian elimination procedure to $\mathbf{D}_{G}(\omega)$. Here, the objective is to apply the WW algorithm for small-size frames where every member is modelled as the two-node stress-driven nonlocal beam element with exact dynamic stiffness matrix (26). For this purpose, $s[\mathbf{D}_{G}(\omega)]$ in Eq. (60) can be obtained from the exact global dynamic stiffness matrix $\mathbf{D}_{G}(\omega)$, built upon assembling the dynamic stiffness matrices (26) of the frame members by a standard finite- element assembly procedure, see Section 3. Further, taking into account that axial and bending vibration responses of the single frame member are uncoupled (see Eq. (26)), $J_{0}(\omega)$ in Eq. (60) can be written as $J_{0}(\omega)=\sum_{k=1}^{n}J^{(a)}_{0,k}(\omega)+J^{(b)}_{0,k}(\omega)$ (61) where $n$ is the number of the frame members, $J^{(a)}_{0,k}(\omega)$, $J^{(b)}_{0,k}(\omega)$ denote the numbers of “clamped-clamped” frequencies smaller than $\omega$ of the $k^{\mathrm{th}}$ frame member, for axial and bending vibrations respectively. Now, for consistency with the whole formulation in Section 3, the calculation of $s[\mathbf{D}_{G}(\omega)]$, $J^{(a)}_{0,k}(\omega)$ and $J^{(b)}_{0,k}(\omega)$ is performed using dimensionless frequencies $\overline{\omega}_{a}$ and $\overline{\omega}_{b}$ corresponding to the trial frequency $\omega$. This is straightforward in the calculation of $s[\mathbf{D}_{G}(\omega)]$, see Eq. (26) for the dynamic stiffness matrix $\mathbf{D}$ of every frame member. On the other hand, the general expressions for $J^{(a)}_{0,k}(\overline{\omega}_{a})$ and $J^{(b)}_{0,k}(\overline{\omega}_{b})$ are $J^{(a)}_{0,k}(\overline{\omega}_{a})=\sum_{r=1}^{\infty}\min\left\\{1;\left\lfloor\frac{\overline{\omega}_{a}}{\overline{\omega}^{(a)}_{k,r}}\right\rfloor\right\\};\qquad\qquad J^{(b)}_{0,k}(\overline{\omega}_{b})=\sum_{r=1}^{\infty}\min\left\\{1;\left\lfloor\frac{\overline{\omega}_{b}}{\overline{\omega}^{(b)}_{k,r}}\right\rfloor\right\\}$ (62a,b) where $\overline{\omega}^{(\diamondsuit)}_{k,r}$ (with $\diamondsuit=a,b$) is the $r^{\mathrm{th}}$ dimensionless “clamped-clamped” frequency of the $k^{\mathrm{th}}$ frame member with either axial or bending vibrations ($\overline{\omega}^{(\diamondsuit)}_{k,1}\leq\overline{\omega}^{(\diamondsuit)}_{k,2}\leq\dots\leq\overline{\omega}^{(\diamondsuit)}_{k,r}\leq\overline{\omega}^{(\diamondsuit)}_{k,r+1}\leq\dots$). For the stress-driven nonlocal beam under study, $\overline{\omega}^{(\diamondsuit)}_{k,r}$ shall be obtained as roots of a characteristic equation given as determinant of matrix $\mathbf{A}$ in Eq. (23). Specifically, two separate characteristic equations can be obtained from the determinants of the block matrices $\mathbf{A}_{a}$ and $\mathbf{A}_{b}$ associated with axial and bending vibrations: $\displaystyle\det{\mathbf{A}_{a}(\overline{\omega}_{a})}=g_{1}(0,\overline{\omega}_{b})g_{2}(1,\overline{\omega}_{b})-g_{1}(1,\overline{\omega}_{b})g_{2}(0,\overline{\omega}_{b})$ (63) $\displaystyle\det{\mathbf{A}_{b}(\overline{\omega}_{b})}=\sum_{i,j,h,k=1}^{4}g_{i}(0,\overline{\omega}_{b})\cdot g_{j}(1,\overline{\omega}_{b})\cdot\left.\frac{\partial g_{h}(\xi,\overline{\omega}_{b})}{\partial\xi}\right\rvert_{\xi=0}\cdot\left.\frac{\partial g_{k}(\xi,\overline{\omega}_{b})}{\partial\xi}\right\rvert_{\xi=1}\epsilon_{ijhk}$ (64) being $\epsilon_{ijhk}$ the $4^{\mathrm{th}}$-dimensional Levi-Civita tensor defined as $\epsilon_{ijhk}=\left\\{\begin{aligned} &1&&\text{if}~{}(i,j,k,h)=(1,2,3,4),(2,3,4,1),(3,4,1,2)~{}\text{or}~{}(4,1,2,3)\\\ -&1&&\text{if}~{}(i,j,k,h)=(4,3,2,1),(3,2,1,4),(2,1,4,3)~{}\text{or}~{}(1,4,3,2)\\\ &0&&\text{if two or more indices are equal}\end{aligned}\right.$ (65) It is noticed that the roots of Eq. (63) and Eq. (64) cannot be obtained in analytical form but are readily obtainable by a numerical root-finding algorithm. Indeed, whenever roots of the characteristic equation are not available in analytical form, the implementation of the WW algorithm involves the numerical calculation of the roots in order to evaluate $J_{0}(\omega)$, e.g. see (Banerjee and Williams, 1985). Table 1 reports the first 20 dimensionless “clamped-clamped” frequencies of the two-node stress-driven nonlocal beam element in Figure 4, for various values of the internal length $\lambda$, as computed by Mathematica (Wolfram Research, Inc., 2017). Additional frequencies are not included in Table 1 for conciseness. Table 1: First 20 dimensionless frequencies of clamped-clamped two-node stress-driven nonlocal beam element: (a) axial vibrations, (b) bending vibrations $\lambda$ | 0 | 0.01 | 0.10 ---|---|---|--- | 3.14159 | 3.17488 | 3.63694 | 6.28319 | 6.35908 | 8.07878 | 9.42478 | 9.56186 | 13.86928 | 12.56637 | 12.79240 | 21.29970 | 15.70796 | 16.05973 | 30.51843 | 18.84956 | 19.37271 | 41.60268 | 21.99115 | 22.73997 | 54.59429 | 25.13274 | 26.16990 | 69.51703 | 28.27433 | 29.67060 | 86.38503 | 31.41593 | 33.24986 | 105.20705 (a) $\lambda$ | 0 | 0.01 | 0.10 ---|---|---|--- | 4.71239 | 4.78036 | 5.46176 | 7.85398 | 7.94458 | 9.61519 | 10.99557 | 11.13962 | 14.37222 | 14.13717 | 14.34978 | 19.73479 | 17.27876 | 17.58029 | 25.67782 | 20.42035 | 20.83533 | 32.16655 | 23.56194 | 24.11894 | 39.16664 | 26.70354 | 27.43498 | 46.64714 | 29.84513 | 30.78710 | 54.58095 | 32.98672 | 34.17872 | 62.94445 (b) ## 5 Numerical applications Here, two applications are presented. For a first insight, natural frequencies and modes of a single small-size beam will be calculated by the proposed approach and validated by comparison with approximate ones obtained by an alternative solution method. Secondly, the proposed approach will be applied to a small-size structure. ### 5.1 Example A Consider the small-size cantilever beam in Fig. 5, with the following parameters: $E=427\hskip 1.5pt\text{GPa}$, $L=20\hskip 1.5pt\text{nm}$, $A=2\hskip 1.5pt\text{$\text{nm}^{2}$}$ (rectangular cross section with $b=1\hskip 1.5pt\text{nm}$ and $h=2\hskip 1.5pt\text{nm}$), $\rho=3200\hskip 1.5pt\text{kg$\text{m}^{-3}$}$. The proposed approach is implemented to investigate axial and bending vibrations. Specifically, the exact dynamic stiffness matrix $\mathbf{D}(\omega)$ of the beam is constructed using a single element and the WW algorithm described in Section 4 is applied to calculate exact natural frequencies and modes. For validation, they are compared with approximate frequency/modes obtained by a linear eigenvalue problem formulated by the Rayleigh-Ritz method (Meirovitch, 1997), using Chebyshëv polynomials as trial functions. Details on the implementation of the Rayleigh-Ritz method are given in Appendix B. Figure 5: Small-size cantilever beam. Tables 2 and 3 report the first $10$ natural frequencies of axial and bending vibrations, assuming $\lambda=0.1$ as internal length of the stress-driven nonlocal model. As the number $N$ of Chebyshëv polynomials increases, the approximate natural frequencies obtained by the Rayleigh-Ritz method converge to the exact ones calculated by the proposed approach, with accuracy up to the first four digits after the comma. For completeness, Tables 2 and 3 include also the numbers of $J_{0}$ and $s[\mathbf{D}]$ corresponding to each natural frequency, as calculated by the WW algorithm. Table 2: Natural frequencies for axial vibrations of cantilever beam in Fig. 5. Rayleigh-Ritz method | Proposed approach ---|--- $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $J_{0}$ | $s[\mathbf{D}]$ $N=15$ | $N=20$ | $N=25$ | $N=30$ 153.55326 | 153.55326 | 153.55326 | 153.55326 | 153.55326 | 0 | 1 496.47072 | 496.47072 | 496.47072 | 496.47072 | 496.47072 | 1 | 1 935.15490 | 935.15490 | 935.15490 | 935.15490 | 935.15490 | 2 | 1 1507.35332 | 1507.35332 | 1507.35332 | 1507.35332 | 1507.35332 | 3 | 1 2234.00705 | 2234.00701 | 2234.00701 | 2234.00701 | 2234.00701 | 4 | 1 3126.45565 | 3126.44056 | 3126.44056 | 3126.44056 | 3126.44056 | 5 | 1 4191.19849 | 4190.85881 | 4190.85880 | 4190.85880 | 4190.85880 | 6 | 1 5446.24457 | 5430.76615 | 5430.76561 | 5430.76561 | 5430.76561 | 7 | 1 6923.28272 | 6848.28865 | 6848.21510 | 6848.21510 | 6848.21510 | 8 | 1 9171.87686 | 8445.24453 | 8444.45914 | 8444.45902 | 8444.45902 | 9 | 1 Table 3: Natural frequencies for bending vibrations of cantilever beam in Fig. 5. Rayleigh-Ritz method | Proposed approach ---|--- $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $\omega$ (GHz) | $J_{0}$ | $s[\mathbf{D}]$ $N=15$ | $N=20$ | $N=25$ | $N=30$ 10.34411 | 10.34411 | 10.34411 | 10.34411 | 10.34411 | 0 | 1 69.34614 | 69.34614 | 69.34614 | 69.34614 | 69.34614 | 0 | 2 216.98244 | 216.98244 | 216.98244 | 216.98244 | 216.98244 | 1 | 2 486.95413 | 486.95413 | 486.95413 | 486.95413 | 486.95413 | 2 | 2 924.34254 | 924.34242 | 924.34242 | 924.34242 | 924.34242 | 3 | 2 1576.81346 | 1576.71498 | 1576.71498 | 1576.71498 | 1576.71497 | 4 | 2 2493.86913 | 2492.72293 | 2492.72281 | 2492.72281 | 2492.72281 | 5 | 2 3777.69185 | 3721.45057 | 3721.44739 | 3721.44739 | 3721.44738 | 6 | 2 5522.11124 | 5312.63783 | 5312.14577 | 5312.14577 | 5312.14575 | 7 | 2 9394.99642 | 7317.91183 | 7314.14894 | 7314.14767 | 7314.14765 | 8 | 2 Figures 6 and 7 show the eigenfunctions corresponding to the first four modes for axial and bending vibrations, calculated by the proposed approach and Rayleigh-Ritz method. The agreement is excellent, substantiating the correctness of the proposed strategy. Figure 6: First four eigenfunctions for axial vibrations of the cantilever beam in Fig. 5: Proposed approach (continuous line), Rayleigh-Ritz method (dots). Figure 7: First four eigenfunctions for bending vibrations of the cantilever beam in Fig. 5: Proposed approach (continuous line), Rayleigh-Ritz method (dots). ### 5.2 Example B Consider the small-size 2D structures in Fig. 8. The two structures feature the same external constraints but two different assumptions are made on the internal nodes, i.e. truss (Fig. 8a) and frame (Fig. 8b) nodal connections are considered. For numerical purposes, reference parameters are: $E=427\hskip 1.5pt\text{GPa}$, $L=20\hskip 1.5pt\text{nm}$, $A=2\hskip 1.5pt\text{$\text{nm}^{2}$}$ (rectangular cross section with $b=1\hskip 1.5pt\text{nm}$ and $h=2\hskip 1.5pt\text{nm}$), $\rho=3200\hskip 1.5pt\text{kg$\text{m}^{-3}$}$. Figure 8: Small-size 2D structures: (a) truss; (b) frame. To investigate the free-vibration response in presence of size effects, every structural member is modelled by a single stress-driven nonlocal two-node beam element, whose exact dynamic stiffness matrix is $\mathbf{D}$ given by Eq. (26) for the frame or its block matrix $\mathbf{D}_{a}$ for the truss. On building the global dynamic stiffness matrix by a standard finite-element assembly procedure, exact natural frequencies and modes are calculated by the WW algorithm described in Section 4. Size effects are investigated considering different values of the internal length $\lambda$ of the stress-driven nonlocal model. Table 4: Natural frequencies, $J_{0}$ and $s[\mathbf{D}_{G}]$ for truss in Fig. 8a. $\lambda$ | 0 | 0.01 | 0.10 ---|---|---|--- | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | 27.43821 | 0 | 1 | 27.57524 | 0 | 1 | 28.92544 | 0 | 1 | 58.27909 | 0 | 2 | 58.56994 | 0 | 2 | 61.51358 | 0 | 2 | 63.87465 | 0 | 4 | 64.20284 | 0 | 4 | 67.53415 | 0 | 4 | 63.87465 | 0 | 4 | 64.20284 | 0 | 4 | 67.53415 | 0 | 4 | 72.19697 | 0 | 5 | 72.56269 | 0 | 5 | 76.27531 | 0 | 5 | 75.49053 | 0 | 6 | 75.86652 | 0 | 6 | 79.78619 | 0 | 6 | 89.90719 | 0 | 7 | 90.34393 | 0 | 7 | 94.99763 | 0 | 7 | 101.00278 | 0 | 9 | 101.47942 | 0 | 9 | 106.72088 | 0 | 9 | 101.00278 | 0 | 9 | 101.47942 | 0 | 9 | 106.72088 | 0 | 9 | 130.70334 | 0 | 10 | 131.39556 | 0 | 10 | 139.26081 | 0 | 10 | 144.39394 | 0 | 11 | 145.13719 | 0 | 11 | 153.55326 | 0 | 11 | 161.97629 | 0 | 13 | 162.98630 | 0 | 13 | 174.80492 | 0 | 13 | 161.97629 | 0 | 13 | 162.98630 | 0 | 13 | 174.80492 | 0 | 13 | 170.78182 | 0 | 14 | 171.94402 | 0 | 14 | 185.74609 | 0 | 14 | 176.32509 | 0 | 15 | 177.47886 | 0 | 15 | 191.44679 | 0 | 15 | 184.61555 | 0 | 17 | 185.96370 | 0 | 17 | 202.32571 | 0 | 17 | 184.61555 | 0 | 17 | 185.96370 | 0 | 17 | 202.32571 | 0 | 17 | 191.85137 | 0 | 18 | 193.44083 | 0 | 18 | 212.98799 | 0 | 18 | 209.44418 | 8 | 11 | 211.20072 | 8 | 11 | 232.47553 | 0 | 19 | 216.59091 | 8 | 12 | 217.73242 | 8 | 12 | 234.52643 | 0 | 20 For a first insight, the truss model in Fig. 8a is considered. Table 4 shows the first 20 natural frequencies computed by the proposed approach, along with the numbers $J_{0}$ and $s[\mathbf{D}_{G}]$ corresponding to each natural frequency calculated by the WW algorithm. Results in Table 4 suggest some interesting comments. The first is that the natural frequencies increase with the internal length $\lambda$, meaning that increasing nonlocality induces stiffening. This is in agreement with previous results obtained for the static response using the stress-driven nonlocal approach (Romano and Barretta, 2017a, b; Romano et al., 2017); as for size effects in general, it is to be noticed that experimental evidence of stiffening size effects exists in the literature for small-size specimens, see for instance the work by Lam et al. (2003). A second observation is that the natural frequencies tend to those of the classical local model as the internal length $\lambda$ decreases, as expected. Finally, it is noteworthy that some of the natural frequencies reported in Table 4 are double roots of the characteristic equation, confirming that the WW algorithm is capable of detecting all natural frequencies, including multiple ones. The mode shapes associated with some of the natural frequencies in Table 4 are illustrated in Fig. 9. (a) $1^{\mathrm{st}}$ mode (b) $2^{\mathrm{nd}}$ mode (c) $5^{\mathrm{th}}$ mode (d) $6^{\mathrm{th}}$ mode Figure 9: Mode shapes for truss in Fig. 8a, for $\lambda=0.10$. They appear meaningful based on engineering judgement and exhibit typical symmetric or anti-symmetric shapes, as is typical the case in vibrating structures. Next, the frame in Fig. 8b is investigated. Table 5 reports the first 20 natural frequencies obtained by the proposed approach along with the pertinent numbers $J_{0}$ and $s[\mathbf{D}_{G}]$. Comments mirrors those on Table 4. That is, the natural frequencies increase with the internal length $\lambda$, i.e. increasing nonlocality induces stiffening effects in the free-vibration response, while the local natural frequencies are retrieved for vanishing $\lambda$. For a final insight, Fig. 11 illustrates the frequency response for the horizontal displacement of the top-right node, when a harmonic horizontal force $1e^{i\omega t}$ (expressed in nN) is applied at the same node of the frame. As expected, the resonance peaks of the frequency response occur at the natural frequencies reported in Table 5 for various internal lengths $\lambda$’s. The results in Fig. 11 substantiate the correctness of the proposed approach. Table 5: Natural frequencies, $J_{0}$ and $s[\mathbf{D}_{G}]$ for frame in Fig. 8b. $\lambda$ | 0 | 0.01 | 0.10 ---|---|---|--- | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | $\omega~{}(\hskip 1.5pt\text{GHz})$ | $J_{0}$ | $s[\mathbf{D}_{G}]$ | 18.06966 | 0 | 1 | 18.20830 | 0 | 1 | 19.74251 | 0 | 1 | 21.43257 | 0 | 2 | 21.66017 | 0 | 2 | 24.85028 | 0 | 2 | 21.82279 | 0 | 3 | 22.07537 | 0 | 3 | 25.64302 | 0 | 3 | 24.23064 | 0 | 4 | 24.55413 | 0 | 4 | 28.90690 | 0 | 4 | 24.64898 | 0 | 5 | 24.99159 | 0 | 5 | 29.58275 | 0 | 5 | 25.11337 | 0 | 6 | 25.48482 | 0 | 6 | 30.54844 | 0 | 6 | 26.38111 | 0 | 7 | 26.75646 | 0 | 7 | 31.37600 | 0 | 7 | 27.73741 | 0 | 8 | 28.01785 | 0 | 8 | 32.04594 | 0 | 8 | 29.36164 | 0 | 9 | 29.97324 | 0 | 9 | 33.37855 | 0 | 9 | 30.50700 | 8 | 2 | 30.63232 | 8 | 2 | 37.90881 | 0 | 10 | 33.07618 | 8 | 3 | 33.39250 | 8 | 3 | 39.42049 | 0 | 11 | 36.73234 | 8 | 4 | 37.08584 | 8 | 4 | 42.08654 | 8 | 4 | 36.90634 | 8 | 5 | 37.29529 | 8 | 5 | 42.64020 | 8 | 5 | 37.22135 | 8 | 6 | 37.67109 | 8 | 6 | 44.91988 | 8 | 6 | 39.65386 | 8 | 7 | 40.09235 | 8 | 7 | 46.64787 | 8 | 7 | 40.83422 | 8 | 8 | 41.28685 | 8 | 8 | 48.15536 | 8 | 8 | 41.20524 | 8 | 9 | 41.74052 | 8 | 9 | 49.12239 | 8 | 9 | 42.17990 | 8 | 10 | 42.71746 | 8 | 10 | 49.56440 | 8 | 10 | 44.39416 | 8 | 11 | 44.97509 | 8 | 11 | 52.63650 | 8 | 11 | 45.49144 | 8 | 12 | 46.10350 | 8 | 12 | 54.30830 | 8 | 12 Mode shapes associated with some of the natural frequencies in Table 5, reported in Fig. 10, exhibit symmetry and anti-symmetry as expected in vibrating structures. (a) $1^{\mathrm{st}}$ mode (b) $2^{\mathrm{nd}}$ mode (c) $3^{\mathrm{rd}}$ mode (d) $5^{\mathrm{th}}$ mode Figure 10: Mode shapes for frame in Fig. 8b, for $\lambda=0.10$. Figure 11: Frequency response function for horizontal displacement of top- right node of frame in Fig. 8b, for various internal lengths: (a) $\lambda=0$, (b) $\lambda=0.01$, (c) $\lambda=0.10$. ## 6 Closing remarks A novel approach to the dynamics of small-size frames has been proposed, resorting to the analysis presented in (Romano and Barretta, 2017a) within special framework of straight beams. On adopting a stress-driven nonlocal formulation to account for size effects, the exact dynamic stiffness matrix of a two-node nonlocal element has been analytically derived in a closed form, which can readily be used to construct, by a standard finite-element assembly procedure, the global dynamic stiffness matrix of complex small-size frames. The Wittrick-Williams algorithm has been applied to calculate all natural frequencies and related modes. The formulation has been presented for 2D structures, but can be generalized to 3D ones. The proposed approach provides, to the best of authors’ knowledge, a first example of two-node nonlocal element, whose dynamics is treated exactly using the dynamic-stiffness matrix approach. That is, every member of the frame can be modelled by a single, exact element without any internal mesh. The stress- driven approach offers a consistent nonlocal description of size effects that does overcome theoretical flaws of alternative nonlocal formulations. Finally, using the Wittrick-Williams technique guarantees that all natural frequencies can be calculated without missing anyone and including multiple ones. It is believed that the proposed methodology provides an effective and robust tool to assess scale effects in nano-frames, within the general framework of nonlocal mechanics. ## Appendix A This Appendix reports closed analytical expressions of functions $f_{k}$ and $g_{k}$ involved in Eq. (20) and Eq. (21) of the main text. First, notice that the solution of the $4^{\mathrm{th}}$ order differential equation (16) takes the general expression: $U(\xi)=\sum_{k=1}^{2}c_{a,k}\mathrm{e}^{\sqrt{r_{k}}\xi}+c_{a,k+2}\mathrm{e}^{-\sqrt{r_{k}}\xi}$ (66) where $c_{a,k}$ (for $k=1,...,4$) are integration constants and $\pm\sqrt{r_{k}}$ (for $k=1,...,2$) are the roots of the characteristic polynomial of Eq. (16), obtained in the following form on assuming the solution $U=\mathrm{e}^{y\xi}$ and setting $y^{2}=r$: $-\lambda^{2}r^{2}+r+\overline{\omega}_{a}^{2}=0$ (67) Enforcing the constitutive BCs (17a,b), (66) reverts to Eq. (20) where functions $f_{k}$ are: $\displaystyle f_{1}(\xi)=\mathcal{A}_{1}\mathrm{e}^{-r_{1}\xi}+\mathcal{A}_{2}\mathrm{e}^{-r_{2}\xi}+\mathrm{e}^{r_{1}\xi}$ (68) $\displaystyle f_{2}(\xi)=\mathcal{A}_{3}\mathrm{e}^{-r_{1}\xi}+\mathcal{A}_{4}\mathrm{e}^{-r_{2}\xi}+\mathrm{e}^{r_{2}\xi}$ In Eq. (68), symbols $A_{k}$ (for $k=1,...,4$) and $r_{k}$ (for $k=1,2$) $\displaystyle\mathcal{A}_{1}=\mathcal{O}_{1}^{-1}\mathrm{e}^{r_{1}}\left(\lambda^{2}\mathrm{e}^{r_{1}+r_{2}}r_{1}r_{2}-\lambda^{2}r_{1}r_{2}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{1}+\lambda r_{1}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{2}+\lambda r_{2}+\mathrm{e}^{r_{1}+r_{2}}-1\right)$ (69) $\displaystyle\mathcal{A}_{2}=-(r_{2}\mathcal{O}_{1})^{-1}\mathrm{e}^{r_{2}}r_{1}\left(\lambda^{2}\mathrm{e}^{2r_{1}}r_{1}^{2}-\lambda^{2}r_{1}^{2}+2\lambda\mathrm{e}^{2r_{1}}r_{1}+2\lambda r_{1}+\mathrm{e}^{2r_{1}}-1\right)$ $\displaystyle\mathcal{A}_{3}=(r_{1}\mathcal{O}_{1})^{-1}\mathrm{e}^{r_{1}}r_{2}\left(\lambda^{2}\mathrm{e}^{2r_{2}}r_{2}^{2}-\lambda^{2}r_{2}^{2}+2\lambda\mathrm{e}^{2r_{2}}r_{2}+2\lambda r_{2}+\mathrm{e}^{2r_{2}}-1\right)$ $\displaystyle\mathcal{A}_{4}=-\mathcal{O}_{1}^{-1}\mathrm{e}^{r_{2}}\left(\lambda^{2}\mathrm{e}^{r_{1}+r_{2}}r_{1}r_{2}-\lambda^{2}r_{1}r_{2}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{1}+\lambda r_{1}+\lambda\mathrm{e}^{r_{1}+r_{2}}r_{2}+\lambda r_{2}+\mathrm{e}^{r_{1}+r_{2}}-1\right)$ with $\mathcal{O}_{1}=\lambda^{2}\mathrm{e}^{p_{1}}p_{1}p_{2}-\lambda^{2}\mathrm{e}^{p_{2}}p_{1}p_{2}-\lambda\mathrm{e}^{p_{1}}p_{1}-\lambda\mathrm{e}^{p_{2}}p_{1}+\lambda\mathrm{e}^{p_{1}}p_{2}+\lambda\mathrm{e}^{p_{2}}p_{2}-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{2}}$ (70) Further, recognize that the solution of the $6^{\mathrm{th}}$ order differential equation (18) takes the general expression (e.g., see Pinnola et al. (2020b)): $V(\xi)=\sum_{k=1}^{3}c_{b,k}\mathrm{e}^{\sqrt{p_{k}}\xi}+c_{b,k+3}\mathrm{e}^{-\sqrt{p_{k}}\xi}$ (71) where $c_{b,k}$ (for $k=1,...,6$) are integration constants and $\pm\sqrt{p_{k}}$ (for $k=1,...,3$) are the roots of the characteristic polynomial of Eq. (18), obtained in the following form on assuming the solution $V=\mathrm{e}^{y\xi}$ and setting $y^{2}=p$: $\lambda^{2}p^{3}-p^{2}+\overline{\omega}_{b}^{4}=0$ (72) Enforcing the constitutive BCs (19a,b), (71) becomes Eq. (21) where functions $g_{k}$ are: $\displaystyle g_{1}(\xi)=\mathrm{e}^{p_{1}\xi}+\mathcal{B}_{1}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{2}\mathrm{e}^{-p_{3}\xi}$ (73) $\displaystyle g_{2}(\xi)=\mathrm{e}^{p_{2}\xi}+\mathcal{B}_{3}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{4}\mathrm{e}^{-p_{3}\xi}$ $\displaystyle g_{3}(\xi)=\mathrm{e}^{p_{3}\xi}+\mathcal{B}_{5}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{6}\mathrm{e}^{-p_{3}\xi}$ $\displaystyle g_{4}(\xi)=\mathrm{e}^{-p_{1}\xi}+\mathcal{B}_{7}\mathrm{e}^{-p_{2}\xi}+\mathcal{B}_{8}\mathrm{e}^{-p_{3}\xi}$ In Eq. (73), symbols $\mathcal{B}_{k}$ (for $k=1,...,8$) and $p_{k}$ (for $k=1,...,3$) denote: $\displaystyle\mathcal{B}_{1}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}}p_{1}^{2}\left(\mathrm{e}^{p_{1}+p_{3}}p_{1}p_{3}\lambda^{2}-p_{1}p_{3}\lambda^{2}+\mathrm{e}^{p_{1}+p_{3}}p_{1}\lambda+p_{1}\lambda+\mathrm{e}^{p_{1}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{1}+p_{3}}-1\right)$ (74) $\displaystyle\mathcal{B}_{2}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}}p_{1}^{2}\left(\mathrm{e}^{p_{1}+p_{2}}p_{1}p_{2}\lambda^{2}-p_{1}p_{2}\lambda^{2}+\mathrm{e}^{p_{1}+p_{2}}p_{1}\lambda+p_{1}\lambda+\mathrm{e}^{p_{1}+p_{2}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{1}+p_{2}}-1\right)$ $\displaystyle\mathcal{B}_{3}=-\mathcal{O}_{2}^{-1}\mathrm{e}^{p_{2}}\left(\mathrm{e}^{p_{2}+p_{3}}p_{2}p_{3}\lambda^{2}-p_{2}p_{3}\lambda^{2}+\mathrm{e}^{p_{2}+p_{3}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{2}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{2}+p_{3}}-1\right)$ $\displaystyle\mathcal{B}_{4}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}}p_{2}^{2}\left(\mathrm{e}^{2p_{2}}\lambda^{2}p_{2}^{2}-\lambda^{2}p_{2}^{2}+2\mathrm{e}^{2p_{2}}\lambda p_{2}+2\lambda p_{2}+\mathrm{e}^{2p_{2}}-1\right)$ $\displaystyle\mathcal{B}_{5}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}}p_{3}^{2}\left(\mathrm{e}^{2p_{3}}\lambda^{2}p_{3}^{2}-\lambda^{2}p_{3}^{2}+2\mathrm{e}^{2p_{3}}\lambda p_{3}+2\lambda p_{3}+\mathrm{e}^{2p_{3}}-1\right)$ $\displaystyle\mathcal{B}_{6}=\mathcal{O}_{2}^{-1}\mathrm{e}^{p_{3}}\left(\mathrm{e}^{p_{2}+p_{3}}p_{2}p_{3}\lambda^{2}-p_{2}p_{3}\lambda^{2}+\mathrm{e}^{p_{2}+p_{3}}p_{2}\lambda+p_{2}\lambda+\mathrm{e}^{p_{2}+p_{3}}p_{3}\lambda+p_{3}\lambda+\mathrm{e}^{p_{2}+p_{3}}-1\right)$ $\displaystyle\mathcal{B}_{7}=-(p_{2}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{2}-p_{1}}p_{1}^{2}\left(\mathrm{e}^{p_{1}}p_{1}p_{3}\lambda^{2}-\mathrm{e}^{p_{3}}p_{1}p_{3}\lambda^{2}-\mathrm{e}^{p_{1}}p_{1}\lambda-\mathrm{e}^{p_{3}}p_{1}\lambda+\mathrm{e}^{p_{1}}p_{3}\lambda+\mathrm{e}^{p_{3}}p_{3}\lambda-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{3}}\right)$ $\displaystyle\mathcal{B}_{8}=(p_{3}^{2}\mathcal{O}_{2})^{-1}\mathrm{e}^{p_{3}-p_{1}}p_{1}^{2}\left(\mathrm{e}^{p_{1}}p_{1}p_{2}\lambda^{2}-\mathrm{e}^{p_{2}}p_{1}p_{2}\lambda^{2}-\mathrm{e}^{p_{1}}p_{1}\lambda-\mathrm{e}^{p_{2}}p_{1}\lambda+\mathrm{e}^{p_{1}}p_{2}\lambda+\mathrm{e}^{p_{2}}p_{2}\lambda-\mathrm{e}^{p_{1}}+\mathrm{e}^{p_{2}}\right)$ being $\mathcal{O}_{2}=\mathrm{e}^{p_{2}}p_{2}p_{3}\lambda^{2}-\mathrm{e}^{p_{3}}p_{2}p_{3}\lambda^{2}-\mathrm{e}^{p_{2}}p_{2}\lambda-\mathrm{e}^{p_{3}}p_{2}\lambda+\mathrm{e}^{p_{2}}p_{3}\lambda+\mathrm{e}^{p_{3}}p_{3}\lambda-\mathrm{e}^{p_{2}}+\mathrm{e}^{p_{3}}$ (75) ## Appendix B This Appendix describes the formulation of the eigenvalue problem for the free vibrations of stress-driven nonlocal beams, according to the Rayleigh-Ritz method (Meirovitch, 1997) using Chebyshëv polynomials (Mason and Handscomb, 2002) as trial functions. For axial vibrations, the Rayleigh’s quotient is defined by $\overline{\omega}_{a}^{2}=R(U)=\frac{\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{4}U}}{\mathrm{d}\xi^{4}}U-\frac{{\mathrm{d}^{2}U}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi}{\int_{0}^{1}U^{2}~{}\mathrm{d}\xi}$ (76) where $U$ is an eigenfunction. Next, integrate by parts the numerator of Eq. (76), enforce the constitutive BCs (17a,b) along with the static BCs and assume that $U(\xi)$ is written as an expansion of $N$ shifted Chebyshëv polynomials of the first kind: $U(\xi)=\mathbf{c}^{\mathrm{T}}\boldsymbol{\phi}(\xi)$ (77) where $\mathbf{c}=\begin{bmatrix}c_{0}&\dots&c_{N}\end{bmatrix}^{\mathrm{T}}$ is the vector of constants and $\boldsymbol{\phi}(\xi)$ is the vector $\boldsymbol{\phi}(\xi)=\begin{bmatrix}T_{0}(-1+2\xi)&\dots&T_{N}(-1+2\xi)\end{bmatrix}^{\mathrm{T}}$ (78) being $T_{j}$ the $j^{\mathrm{th}}$ Chebyshëv polynomial defined by the following recurrence relation (Mason and Handscomb, 2002): $T_{j}(x)=2xT_{j-1}(x)-T_{j-2}(x),\qquad j=2,3,...$ (79) with $T_{0}(x)=1$ and $T_{1}(x)=x$. Using Eq. (77), the stationary condition of the Rayleigh’s quotient implies that $\frac{\partial R(\mathbf{c})}{\partial\mathbf{c}}=\mathbf{0}$ (80) Eq. (80) leads to following generalized eigenproblem: $\left(\mathbf{A}_{a}-\overline{\omega}_{a}^{2}\mathbf{B}\right)\mathbf{c}=\mathbf{0}$ (81) where $\mathbf{A}_{a}=\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}+\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right)~{}\mathrm{d}\xi+\lambda\left(\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=0}+\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\otimes\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=1}\right)$ (82) and $\mathbf{B}=\int_{0}^{1}\boldsymbol{\phi}\otimes\boldsymbol{\phi}~{}\mathrm{d}\xi$ (83) In a similar fashion, the generalized eigenproblem is derived for bending responses. In this case, the Rayleigh’s quotient is defined by $\overline{\omega}_{b}^{4}=R(V)=\frac{\int_{0}^{1}\left(-\lambda^{2}\frac{{\mathrm{d}^{6}V}}{\mathrm{d}\xi^{6}}V+\frac{{\mathrm{d}^{5}V}}{\mathrm{d}\xi^{5}}V\right)~{}\mathrm{d}\xi}{\int_{0}^{1}V^{2}~{}\mathrm{d}\xi}$ (84) with $V$ an eigenfunction. Again, the numerator of Eq. (76) is integrated by part, the constitutive BCs (19a,b) along with static BCs are enforced and $V(\xi)$ is written as an expansion of $N$ shifted Chebyshëv polynomials of the first kind: $V(\xi)=\mathbf{c}^{\mathrm{T}}\boldsymbol{\phi}(\xi)$ (85) where $\mathbf{c}=\begin{bmatrix}c_{0}&\dots&c_{N}\end{bmatrix}^{\mathrm{T}}$ is the vector of constants and $\boldsymbol{\phi}(\xi)$ is the vector (78). Finally, replacing (84) for $R$ in Eq. (80) leads to the following eigenproblem $\left(\mathbf{A}_{b}-\overline{\omega}_{b}^{4}\mathbf{B}\right)\mathbf{c}=\mathbf{0}$ (86) where $\mathbf{A}_{b}=\int_{0}^{1}\left(\lambda^{2}\frac{{\mathrm{d}^{3}\boldsymbol{\phi}}}{\mathrm{d}\xi^{3}}\otimes\frac{{\mathrm{d}^{3}\boldsymbol{\phi}}}{\mathrm{d}\xi^{3}}+\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right)~{}\mathrm{d}\xi+\lambda\left(\left.\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=0}+\left.\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\otimes\frac{{\mathrm{d}^{2}\boldsymbol{\phi}}}{\mathrm{d}\xi^{2}}\right\rvert_{\xi=1}\right)$ (87) and $\mathbf{B}$ is given by Eq. (83). It has to be noticed that, in the formulation of both eigenvalue problems (81) and (86), kinematic BCs can be suitably enforced on the trial functions using the method of Lagrange multipliers (Canales and Mantari, 2016). This leads to the following eigenvalue problems: $\left(\begin{bmatrix}\mathbf{A}_{a}&\mathbf{L}_{a}\\\ \mathbf{L}_{a}^{\mathrm{T}}&\mathbf{0}\end{bmatrix}-\overline{\omega}_{a}^{2}\begin{bmatrix}\mathbf{B}&\mathbf{0}\\\ \mathbf{0}&\mathbf{0}\end{bmatrix}\right)\begin{bmatrix}\mathbf{c}\\\ \boldsymbol{\mu}\end{bmatrix}=\mathbf{0}\qquad\left(\begin{bmatrix}\mathbf{A}_{b}&\mathbf{L}_{b}\\\ \mathbf{L}_{b}^{\mathrm{T}}&\mathbf{0}\end{bmatrix}-\overline{\omega}_{b}^{4}\begin{bmatrix}\mathbf{B}&\mathbf{0}\\\ \mathbf{0}&\mathbf{0}\end{bmatrix}\right)\begin{bmatrix}\mathbf{c}\\\ \boldsymbol{\mu}\end{bmatrix}=\mathbf{0}$ (87a,b) with $\mathbf{L}_{a}$ and $\mathbf{L}_{b}$ involving the trial functions computed at beam ends according to kinematic BCs. For instance, for a cantilever beam: $\mathbf{L}_{a}=\begin{bmatrix}\boldsymbol{\phi}(0)\end{bmatrix}\qquad\mathbf{L}_{b}=\begin{bmatrix}\boldsymbol{\phi}(0)&\left.\frac{\mathrm{d}\boldsymbol{\phi}}{\mathrm{d}\xi}\right\rvert_{\xi=0}\end{bmatrix}$ (88a,b) Acknowledgment \- Financial supports from MIUR in the framework of the Project PRIN 2017 - code 2017J4EAYB Multiscale Innovative Materials and Structures (MIMS) - University of Naples Federico II Research Unit is gratefully acknowledged. ## References * Aifantis (1999) Aifantis, E., 1999. Gradient deformation models at nano, micro, and macro scales. Journal of Engineering Materials and Technology, Transactions of the ASME 121, 189–202. * Aifantis (2003) Aifantis, E.C., 2003. Update on a class of gradient theories. Mechanics of materials 35, 259–280. * Aifantis (2009) Aifantis, E.C., 2009. Exploring the applicability of gradient elasticity to certain micro/nano reliability problems. Microsystem Technologies 15, 109–115. * Aifantis (2011) Aifantis, E.C., 2011. On the gradient approach–relation to eringen’s nonlocal theory. International Journal of Engineering Science 49, 1367–1377. * Akgöz and Civalek (2013) Akgöz, B., Civalek, Ö., 2013\. A size-dependent shear deformation beam model based on the strain gradient elasticity theory. International Journal of Engineering Science 70, 1–14. * Alotta et al. (2017a) Alotta, G., Failla, G., Pinnola, F., 2017a. Stochastic analysis of a nonlocal fractional viscoelastic bar forced by gaussian white noise. ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems, Part B: Mechanical Engineering 3. * Alotta et al. (2014) Alotta, G., Failla, G., Zingales, M., 2014. Finite element method for a nonlocal timoshenko beam model. Finite Elements in Analysis and Design 89, 77–92. * Alotta et al. (2017b) Alotta, G., Failla, G., Zingales, M., 2017b. Finite-element formulation of a nonlocal hereditary fractional-order timoshenko beam. Journal of Engineering Mechanics 143, D4015001. * Aria and Friswell (2019) Aria, A., Friswell, M., 2019\. A nonlocal finite element model for buckling and vibration of functionally graded nanobeams. Composites Part B: Engineering 166, 233–246. * Askes and Aifantis (2011) Askes, H., Aifantis, E.C., 2011\. Gradient elasticity in statics and dynamics: an overview of formulations, length scale identification procedures, finite element implementations and new results. International Journal of Solids and Structures 48, 1962–1990. * Attia and Abdel Rahman (2018) Attia, M.A., Abdel Rahman, A.A., 2018\. On vibrations of functionally graded viscoelastic nanobeams with surface effects. International Journal of Engineering Science 127, 1 – 32. * Banerjee (1997) Banerjee, J., 1997. Dynamic stiffness formulation for structural elements: a general approach. Computers & structures 63, 101–103. * Banerjee (1998) Banerjee, J., 1998. Free vibration of axially loaded composite timoshenko beams using the dynamic stiffness matrix method. Computers & Structures 69, 197 – 208. * Banerjee (2001) Banerjee, J., 2001. Frequency equation and mode shape formulae for composite timoshenko beams. Composite Structures 51, 381 – 388. * Banerjee and Williams (1985) Banerjee, J., Williams, F., 1985\. Exact bernoulli–euler dynamic stiffness matrix for a range of tapered beams. International Journal for Numerical Methods in Engineering 21, 2289–2302. * Banerjee and Williams (1992) Banerjee, J., Williams, F., 1992\. Coupled bending-torsional dynamic stiffness matrix for timoshenko beam elements. Computers & Structures 42, 301–310. * Banerjee and Williams (1996) Banerjee, J., Williams, F., 1996\. Exact dynamic stiffness matrix for composite timoshenko beams with applications. Journal of Sound and Vibration 194, 573 – 585. * Banerjee (2003) Banerjee, J.R., 2003. Dynamic Stiffness Formulation and Its Application for a Combined Beam and a Two Degree-of-Freedom System . Journal of Vibration and Acoustics 125, 351–358. * Barretta et al. (2017) Barretta, R., Brčić, M., Čanađija, M., Luciano, R., Marotti de Sciarra, F., 2017. Application of gradient elasticity to armchair carbon nanotubes: Size effects and constitutive parameters assessment. European Journal of Mechanics - A/Solids 65, 1 – 13. * Barretta et al. (2019a) Barretta, R., Faghidian, S.A., Luciano, R., 2019a. Longitudinal vibrations of nano-rods by stress-driven integral elasticity. Mechanics of Advanced Materials and Structures 26, 1307–1315. * Barretta et al. (2018) Barretta, R., Faghidian, S.A., Luciano, R., Medaglia, C., Penna, R., 2018. Stress-driven two-phase integral elasticity for torsion of nano-beams. Composites Part B: Engineering 145, 62–69. * Barretta et al. (2019b) Barretta, R., Faghidian, S.A., Marotti de Sciarra, F., 2019b. Stress-driven nonlocal integral elasticity for axisymmetric nano-plates. International Journal of Engineering Science 136, 38 – 52. * Bi et al. (2020) Bi, L., Yin, J., Huang, X., Wang, Y., Yang, Z., 2020\. Graphene pillared with hybrid fullerene and nanotube as a novel 3d framework for hydrogen storage: A dft and gcmc study. International Journal of Hydrogen Energy 45, 17637 – 17648. * Canales and Mantari (2016) Canales, F., Mantari, J., 2016\. Buckling and free vibration of laminated beams with arbitrary boundary conditions using a refined hsdt. Composites Part B: Engineering 100, 136 – 145. * Challamel (2018) Challamel, N., 2018. Static and dynamic behaviour of nonlocal elastic bar using integral strain-based and peridynamic models. Comptes Rendus Mécanique 346, 320–335. * Challamel et al. (2016) Challamel, N., Wang, C., Elishakoff, I., 2016. Nonlocal or gradient elasticity macroscopic models: a question of concentrated or distributed microstructure. Mechanics Research Communications 71, 25–31. * Challamel and Wang (2008) Challamel, N., Wang, C.M., 2008\. The small length scale effect for a non-local cantilever beam: a paradox solved. Nanotechnology 19, 345703\. * Chao et al. (2020) Chao, M., Wang, Y., Ma, D., Wu, X., Zhang, W., Zhang, L., Wan, P., 2020. Wearable mxene nanocomposites-based strain sensor with tile-like stacked hierarchical microstructure for broad-range ultrasensitive sensing. Nano Energy 78, 105187\. * Courant and Hilbert (1953) Courant, R., Hilbert, D., 1953\. Methods of Mathematical Physics. Interscience Publishers. * Darban et al. (2020) Darban, H., Luciano, R., Caporale, A., Fabbrocino, F., 2020\. Higher modes of buckling in shear deformable nanobeams. International Journal of Engineering Science 154, 103338. * Dastjerdi and Akgöz (2019) Dastjerdi, S., Akgöz, B., 2019\. On the statics of fullerene structures. International Journal of Engineering Science 142, 125 – 144. * Demir and Civalek (2017) Demir, Ç., Civalek, Ö., 2017\. On the analysis of microbeams. International Journal of Engineering Science 121, 14–33. * Di Paola et al. (2009) Di Paola, M., Failla, G., Zingales, M., 2009. Physically-based approach to the mechanics of strong non-local linear elasticity theory. Journal of Elasticity 97, 103–130. * Di Paola et al. (2010) Di Paola, M., Failla, G., Zingales, M., 2010. The mechanically-based approach to 3d non-local linear elasticity theory: Long-range central interactions. International Journal of Solids and Structures 47, 2347 – 2358. * Di Paola et al. (2013) Di Paola, M., Failla, G., Zingales, M., 2013. Non-local stiffness and damping models for shear-deformable beams. European Journal of Mechanics-A/Solids 40, 69–83. * Eringen (1983) Eringen, A., 1983. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. Journal of Applied Physics 54, 4703–4710. * Eringen (1972) Eringen, A.C., 1972. Linear theory of nonlocal elasticity and dispersion of plane waves. International Journal of Engineering Science 10, 425–435. * Failla (2016) Failla, G., 2016. An exact generalised function approach to frequency response analysis of beams and plane frames with the inclusion of viscoelastic damping. Journal of Sound and Vibration 360, 171 – 202. * Farajpour et al. (2018) Farajpour, A., Ghayesh, M.H., Farokhi, H., 2018. A review on the mechanics of nanostructures. International Journal of Engineering Science 133, 231 – 263. * Farajpour et al. (2020) Farajpour, A., Howard, C.Q., Robertson, W.S., 2020. On size-dependent mechanics of nanoplates. International Journal of Engineering Science 156, 103368. * Fasano et al. (2015) Fasano, M., Bozorg Bigdeli, M., Vaziri Sereshk, M.R., Chiavazzo, E., Asinari, P., 2015. Thermal transmittance of carbon nanotube networks: Guidelines for novel thermal storage systems and polymeric material of thermal interest. Renewable and Sustainable Energy Reviews 41, 1028 – 1036. * Fernández-Sáez et al. (2016) Fernández-Sáez, J., Zaera, R., Loya, J., Reddy, J., 2016\. Bending of euler–bernoulli beams using eringen’s integral formulation: a paradox resolved. International Journal of Engineering Science 99, 107–116. * Fuschi et al. (2019) Fuschi, P., Pisano, A., Polizzotto, C., 2019. Size effects of small-scale beams in bending addressed with a strain-difference based nonlocal elasticity theory. International Journal of Mechanical Sciences 151, 661–671. * Genoese et al. (2017) Genoese, A., Genoese, A., Rizzi, N.L., Salerno, G., 2017\. On the derivation of the elastic properties of lattice nanostructures: The case of graphene sheets. Composites Part B: Engineering 115, 316 – 329. * Ghayesh and Farajpour (2019) Ghayesh, M.H., Farajpour, A., 2019\. A review on the mechanics of functionally graded nanoscale and microscale structures. International Journal of Engineering Science 137, 8 – 36. * Ghayesh et al. (2019) Ghayesh, M.H., Farajpour, A., Farokhi, H., 2019. Viscoelastically coupled mechanics of fluid-conveying microtubes. International Journal of Engineering Science 145, 103139. * Gholipour and Ghayesh (2020) Gholipour, A., Ghayesh, M.H., 2020\. Nonlinear coupled mechanics of functionally graded nanobeams. International Journal of Engineering Science 150, 103221. * Hozhabrossadati et al. (2020) Hozhabrossadati, S.M., Challamel, N., Rezaiee-Pajand, M., Sani, A.A., 2020\. Free vibration of a nanogrid based on eringen’s stress gradient model. Mechanics Based Design of Structures and Machines , 1–19. * Juarez et al. (2018) Juarez, T., Schroer, A., Schwaiger, R., Hodge, A.M., 2018\. Evaluating sputter deposited metal coatings on 3d printed polymer micro-truss structures. Materials & Design 140, 442 – 450. * Karami and Janghorban (2020) Karami, B., Janghorban, M., 2020\. On the mechanics of functionally graded nanoshells. International Journal of Engineering Science 153, 103309. * Khaniki (2019) Khaniki, H.B., 2019. On vibrations of fg nanobeams. International Journal of Engineering Science 135, 23 – 36. * Lakes (1991) Lakes, R., 1991. Experimental Micro Mechanics Methods for Conventional and Negative Poisson’s Ratio Cellular Solids as Cosserat Continua. Journal of Engineering Materials and Technology 113, 148–155. doi:10.1115/1.2903371. * Lam et al. (2003) Lam, D., Yang, F., Chong, A., Wang, J., Tong, P., 2003\. Experiments and theory in strain gradient elasticity. Journal of the Mechanics and Physics of Solids 51, 1477 – 1508. * Lee et al. (2016) Lee, D., Lee, B.H., Yoon, J., Ahn, D.C., Park, J.Y., Hur, J., Kim, M.S., Jeon, S.B., Kang, M.H., Kim, K., Lim, M., Choi, S.J., Choi, Y.K., 2016. Three-dimensional fin-structured semiconducting carbon nanotube network transistor. ACS Nano 10, 10894 – 10900. * Li et al. (2020) Li, L., Lin, R., Ng, T.Y., 2020. Contribution of nonlocality to surface elasticity. International Journal of Engineering Science 152, 103311. * Li et al. (2018) Li, L., Tang, H., Hu, Y., 2018\. The effect of thickness on the mechanics of nanobeams. International Journal of Engineering Science 123, 81 – 91. * Malikan et al. (2020) Malikan, M., Krasheninnikov, M., Eremeyev, V.A., 2020. Torsional stability capacity of a nano-composite shell based on a nonlocal strain gradient shell model under a three-dimensional magnetic field. International Journal of Engineering Science 148, 103210. * Mason and Handscomb (2002) Mason, J., Handscomb, D., 2002\. Chebyshev Polynomials. CRC Press. * Meirovitch (1997) Meirovitch, L., 1997. Principles and Techniques of Vibrations. Prentice Hall. * Meza et al. (2014) Meza, L.R., Das, S., Greer, J.R., 2014. Strong, lightweight, and recoverable three-dimensional ceramic nanolattices. Science 345, 1322–1326. * Náprstek and Fischer (2015) Náprstek, J., Fischer, C., 2015\. Static and dynamic analysis of beam assemblies using a differential system on an oriented graph. Computers & Structures 155, 28–41. * Numanoğlu et al. (2018) Numanoğlu, H.M., Akgöz, B., Civalek, Ö., 2018. On dynamic analysis of nanorods. International Journal of Engineering Science 130, 33–50. * Numanoğlu and Civalek (2019) Numanoğlu, H.M., Civalek, Ö., 2019\. On the dynamics of small-sized structures. International Journal of Engineering Science 145, 103164. * Oskouie et al. (2018a) Oskouie, M.F., Ansari, R., Rouhi, H., 2018a. Bending of euler-bernoulli nanobeams based on the strain- and stress-driven nonlocal integral models: a numerical approach. Acta Mechanica Sinica 34, 871 – 882. * Oskouie et al. (2018b) Oskouie, M.F., Ansari, R., Rouhi, H., 2018b. A numerical study on the buckling and vibration of nanobeams based on the strain- and stress-driven nonlocal integral models. International Journal of Computational Materials Science and Engineering 7, 1850016. * Oskouie et al. (2018c) Oskouie, M.F., Ansari, R., Rouhi, H., 2018c. Stress-driven nonlocal and strain gradient formulations of timoshenko nanobeams. European Physical Journal Plus 133, 336. * Ozturk et al. (2015) Ozturk, Z., Baykasoglu, C., Celebi, A.T., Kirca, M., Mugan, A., To, A.C., 2015\. Hydrogen storage in heat welded random cnt network structures. International Journal of Hydrogen Energy 40, 403 – 411. * Peddieson et al. (2003) Peddieson, J., Buchanan, G.R., McNitt, R.P., 2003. Application of nonlocal continuum models to nanotechnology. International journal of engineering science 41, 305–312. * Pinnola et al. (2020a) Pinnola, F., Faghidian, S.A., Barretta, R., Marotti de Sciarra, F., 2020a. Variationally consistent dynamics of nonlocal gradient elastic beams. International Journal of Engineering Science 149, 103220. * Pinnola et al. (2020b) Pinnola, F.P., Vaccaro, M.S., Barretta, R., Marotti de Sciarra, F., 2020b. Random vibrations of stress-driven nonlocal beams with external damping. Meccanica doi:https://doi.org/10.1007/s11012-020-01181-7. * Polizzotto (2014) Polizzotto, C., 2014. Stress gradient versus strain gradient constitutive models within elasticity. International Journal of Solids and Structures 51, 1809–1818. * Polizzotto (2015) Polizzotto, C., 2015. A unifying variational framework for stress gradient and strain gradient elasticity theories. European Journal of Mechanics-A/Solids 49, 430–440. * (73) Roghani, M., Rouhi, H., . Nonlinear stress-driven nonlocal formulation of timoshenko beams made of fgms. Continuum Mechanics and Thermodynamics doi:https://doi.org/10.1007/s00161-020-00906-z. * Romano and Barretta (2017a) Romano, G., Barretta, R., 2017a. Nonlocal elasticity in nanobeams: the stress-driven integral model. International Journal of Engineering Science 115, 14–27. * Romano and Barretta (2017b) Romano, G., Barretta, R., 2017b. Stress-driven versus strain-driven nonlocal integral model for elastic nano-beams. Composites Part B: Engineering 114, 184 – 188. * Romano et al. (2016) Romano, G., Barretta, R., Diaco, M., 2016. Micromorphic continua: non-redundant formulations. Continuum Mechanics and Thermodynamics 28, 1659 – 1670. * Romano et al. (2017) Romano, G., Barretta, R., Diaco, M., Marotti de Sciarra, F., 2017\. Constitutive boundary conditions and paradoxes in nonlocal elastic nanobeams. International Journal of Mechanical Sciences 121, 151 – 156. * Romano and Diaco (2020) Romano, G., Diaco, M., 2020\. On formulation of nonlocal elasticity problems. Meccanica doi:https://doi.org/10.1007/s11012-020-01183-5. * Marotti de Sciarra (2014) Marotti de Sciarra, F., 2014. Finite element modelling of nonlocal beams. Physica E: Low-Dimensional Systems and Nanostructures 59, 144–149. * She et al. (2019) She, G.L., Yuan, F.G., Karami, B., Ren, Y.R., Xiao, W.S., 2019. On nonlinear bending behavior of fg porous curved nanotubes. International Journal of Engineering Science 135, 58 – 74. * Silling (2000) Silling, S., 2000. Reformulation of elasticity theory for discontinuities and long-range forces. Journal of the Mechanics and Physics of Solids 48, 175 – 209. * Silling et al. (2007) Silling, S.A., Epton, M., Weckner, O., Xu, J., Askari, E., 2007. Peridynamic states and constitutive modelings. Journal of Elasticity 88, 151–184. * Srividhya et al. (2018) Srividhya, S., Raghu, P., Rajagopal, A., Reddy, J., 2018\. Nonlocal nonlinear analysis of functionally graded plates using third-order shear deformation theory. International Journal of Engineering Science 125, 1 – 22. * Su and Banerjee (2015) Su, H., Banerjee, J., 2015. Development of dynamic stiffness method for free vibration of functionally graded timoshenko beams. Computers & Structures 147, 107 – 116. * Wang and Qiao (2007) Wang, J., Qiao, P., 2007. Vibration of beams with arbitrary discontinuities and boundary conditions. Journal of Sound and Vibration 308, 12–27. * Williams and Anderson (1986) Williams, F., Anderson, M., 1986\. Inclusion of elastically connected members in exact buckling and frequency calculations. Computers & structures 22, 395–397. * Williams and Wittrick (1970) Williams, F., Wittrick, W., 1970\. An automatic computational procedure for calculating natural frequencies of skeletal structures. International Journal of Mechanical Sciences 12, 781–791. * Wittrick and Williams (1971) Wittrick, W., Williams, F., 1971\. A general algorithm for computing natural frequencies of elastic structures. The Quarterly Journal of Mechanics and Applied Mathematics 24, 263–284. * Wittrick and Williams (1973) Wittrick, W., Williams, F., 1973\. An algorithm for computing critical buckling loads of elastic structures. Journal of Structural Mechanics 1, 497–518. * Wolfram Research, Inc. (2017) Wolfram Research, Inc., 2017. Mathematica, Version 11.2. Champaign, IL. * Zhang et al. (2018) Zhang, C., Akbarzadeh, A., Kang, W., Wang, J., Mirabolghasemi, A., 2018. Nano-architected metamaterials: Carbon nanotube-based nanotrusses. Carbon 131, 38 – 46. * Zhang et al. (2020a) Zhang, P., Qing, H., Gao, C.F., 2020a. Exact solutions for bending of timoshenko curved nanobeams made of functionally graded materials based on stress-driven nonlocal integral model. Composite Structures 245, 112362\. * Zhang and Liu (2020) Zhang, Q., Liu, H., 2020. On the dynamic response of porous functionally graded microbeam under moving load. International Journal of Engineering Science 153, 103317. * Zhang et al. (2020b) Zhang, X., Wang, Y., Ding, B., Li, X., 2020b. Design, fabrication, and mechanics of 3d micro-/nanolattices. Small 16, 1902842\.
arxiv-papers
2021-07-27T10:59:25
2024-09-04T03:07:21.261836
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Andrea Francesco Russillo, Giuseppe Failla, Gioacchino Alotta,\n Francesco Marotti de Sciarra, Raffaele Barretta", "submitter": "Raffaele Barretta", "url": "https://arxiv.org/abs/2107.12728" }
2107.12731
Limit behaviour of Eringen’s two-phase elastic beams Preprint of the article published in European Journal of Mechanics - A/Solids 89, August–October 2021, 104315 Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de Sciarra, Raffaele Barretta https://doi.org/10.1016/j.euromechsol.2021.104315 ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ ###### Abstract In this paper, the bending behaviour of small-scale Bernoulli-Euler beams is investigated by Eringen’s two-phase local/nonlocal theory of elasticity. Bending moments are expressed in terms of elastic curvatures by a convex combination of local and nonlocal contributions, that is a combination with non-negative scalar coefficients summing to unity. The nonlocal contribution is the convolution integral of the elastic curvature field with a suitable averaging kernel characterized by a scale parameter. The relevant structural problem, well-posed for non-vanishing local phases, is preliminarily formulated and exact elastic solutions of some simple beam problems are recalled. Limit behaviours of the obtained elastic solutions, analytically evaluated, studied and diagrammed, do not fulfill equilibrium requirements and kinematic boundary conditions. Accordingly, unlike alleged claims in literature, such asymptotic fields cannot be assumed as solutions of the purely nonlocal theory of beam elasticity. This conclusion agrees with the known result which the elastic equilibrium problem of beams of engineering interest formulated by Eringen’s purely nonlocal theory admits no solution. ###### keywords: Purely nonlocal elasticity , Local/nonlocal mixture , Nanobeams , Well- posedness , Constitutive boundary conditions ## 1 Introduction Over the past decades, growing interest in nanotechnological applications has required a deep knowledge of mechanical behavior of micro- and nano-structures conceived as basic components of smaller and smaller electro-mechanical devices. Among the wide variety of micro/nano-electro-mechanical systems there are biosensors (Soukarié et al., 2020), actuators (Lu et al., 2019), resonators (Chorsi and Chorsi, 2018), DNA switches (Chao et al., 2020), porous structures (Jankowski et al., 2020; Malikan et al., 2020b), valves/pumps (Banejad et al., 2020), advanced and composite structures (Sedighi et al., 2017; Żur et. al, 2020), energy harvesters (Ghayesh and Farokhi, 2020). Micro/nano-structures exhibit technically significant size effects which therefore have to be taken into account to accurately model and design new- generation small-scale devices (Ghayesh and Farajpour, 2019). To this end, nonlocal continuum mechanics (Polizzotto, 2001, 2002; Bažant and Jirásek, 2002; Borino et al., 2003) has been conveniently exploited by the scientific community to simulate complex scale phenomena in place of atomistic approaches which are computationally expensive. One of the first theories of nonlocal elasticity is the strain-driven model introduced by Eringen (1983) in the wake of seminal contributions by Rogula (1965); Kröner et al. (1967); Rogula (1982). According to the strain-driven model, the nonlocal stress field is the convolution integral between elastic strain and an averaging kernel depending on a characteristic length. Originally exploited by Eringen to deal with screw dislocations and surface waves, when applied to structural problems involving bounded domains, Eringen’s strain-driven model leads to ill-posed structural problems due to incompatibility between nonlocal and equilibrium requirements (Romano et al., 2017a). An effective strategy to get well-posed problems consists in formulating a new nonlocal model in which the roles of stresses and strains are swapped (Romano et al., 2017b). The stress-driven nonlocal approach has been successfully applied to a wide range of problems of nanotechnological interest (see e.g. Barretta et al., 2018b; Roghani, 2020; Zhang, 2020; Barretta et al., 2018c; Pinnola, 2020; Oskouie et al., 2018; Barretta et al., 2019). Another possible strategy to overcome ill-posedness of strain-driven model consists in formulating a two-phase local/nonlocal model, first introduced in (Eringen, 1972, 1987) and recently applied in (Pisano and Fuschi, 2003; Khodabakhshi and Reddy, 2015; Wang et al., 2016; Eptaimeros et al., 2016; Barretta et al., 2018a). In particular, the mixture strain-driven model is based on a convex combination of local and nonlocal phases by means of a mixture parameter, where the nonlocal phase is the Eringen’s integral convolution. Based on two parameters, the two-phase theory is able to model a lot of structural problems. However, ill-posedness is eliminated only for positive mixture parameters (Romano et al., 2017b). Indeed, for vanishing local phases, Eringen’s purely nonlocal strain-driven law is recovered, and hence inconsistencies are expected to occur for structural nonlocal solutions of the limiting elastic equilibrium problem. In this regard, inaccurate conclusions on the matter are still present in current literature (see e.g. Mikhasev and Nobili, 2020; Mikhasev, 2021) by improperly defining limiting cases of free vibration problems as solutions of elastodynamic problems based on purely nonlocal strain-driven continuum model which admits no solution (Romano et al., 2017a; Fernández-Sáez and Zaera, 2017; Fathi and Ghassemi, 2017; Vila et al., 2017; Zhang, 2017; Zhu and Li, 2017; Karami et al., 2018; Barretta et al., 2018b; Pisano et al., 2021). Inconsistencies of limiting solutions of structural problems based on Eringen’s two-phase theory will be definitely provided in the present research. The plan is the following. The two-phase integral model for slender beams is recalled in Sec.2 and the equivalent differential problem is also provided. The purely nonlocal strain-driven law is then derived and discussed in Sec.3. Exact structural solutions based on two-phase theory are given in Sec.4 for simple applicative cases. Analytical limiting solutions, presented in Sec.5, are shown to be in contrast with equilibrium and kinematic boundary conditions. Consequently, such fields cannot be assumed as solutions of structural problems formulated according to Eringen’s purely nonlocal strain- driven model which is thus confirmed as inapplicable to nanocontinua of technical interest. ## 2 Two-phase local/nonlocal theory for elastic beams Let us consider a slender straight beam under flexure of length $\,L\,$. Beam and bending axes are denoted by $\,x\,$ and $\,y\,$ respectively. According to Bernoulli-Euler theory, the total curvature field $\,\chi:[0,L]\mapsto\Re\,$ associated with the transverse displacement field $\,v:[0,L]\mapsto\Re\,$ is expressed by111 The symbol $\,\partial_{x}^{n}\,$ denotes $\,n$-times differentiation along the beam axis $\,x\,$. $\chi=\partial_{x}^{2}v=\chi^{el}+\chi^{nel}$ (1) with $\,\chi^{el}\,$ elastic curvature and $\,\chi^{nel}\,$ all other non- elastic curvature fields. Stress fields are described by bending moments $\,M:[0,L]\mapsto\Re\,$ which have to fulfill the differential equation of equilibrium $\partial_{x}^{2}M=q$ (2) with $\,q:[0,L]\mapsto\Re\,$ transversely distributed loading. According to the two-phase elasticity model (Eringen, 1972), the bending moment $\,M\,$ is convex combination of the source field $\,s:=K\chi^{el}\,$ and of the convolution between the source $\,s\,$ and a suitable averaging kernel $\,\phi_{c}\,$ $M(x)=\alpha\>s(x)+(1-\alpha)\>\int_{0}^{L}{\phi_{c}(x,\xi)\>s(\xi)\>d\xi}$ (3) where $\,K\,$ is the local elastic bending stiffness, i.e. second moment of the field of Euler-Young elastic moduli $\,E\,$ on beam cross section. The relation in Eq.(3) is a Fredholm integral equation of the second kind (Tricomi, 1957; Polyanin and Manzhirov, 2008) in the unknown source field $\,s\,$, with $\,0\leq\alpha\leq 1\,$ mixture parameter and $c>0$ nonlocal scale parameter. The purely nonlocal law $\displaystyle\,M(x)=\int_{0}^{L}{\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}\,$ is got by setting $\,\alpha=0\,$, while for $\,\alpha=1\,$ the purely local relation $\,M=K\chi^{el}\,$ is recovered. The averaging kernel is assumed to be the bi-exponential function $\phi_{c}(x)=\frac{1}{2c}\exp\biggl{(}-\frac{|x|}{c}\biggr{)}\,$ (4) fulfilling symmetry, positivity and limit impulsivity (Eringen, 1983). An equivalent differential formulation (Romano et al., 2017a) of the two-phase model Eq.(3) can be got by observing that the special kernel in Eq.(4) is the Green’s function of the linear differential operator $\,\mathcal{L}_{x}\,$ defined by $\mathcal{L}_{x}:=1-c^{2}\,\partial_{x}^{2}$ (5) Now, rewriting Eq.(3) as follows $\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\>\int_{0}^{L}{\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}$ (6) and applying the differential operator $\,\mathcal{L}_{x}\,$ to Eq.(6), we get $\mathcal{L}_{x}\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\>K\chi^{el}(x)$ (7) which is the differential equation equivalent to the two-phase model in Eq.(3). Indeed, denoting by $\,\boldsymbol{\delta}\,$ the Dirac unit impulse, since $\,\mathcal{L}_{x}\phi_{c}(x,\xi)\,=\boldsymbol{\delta}(x,\xi)\,$, we may write $\mathcal{L}_{x}\big{(}M-\alpha\>K\chi^{el}\big{)}(x)=(1-\alpha)\int_{0}^{L}{\mathcal{L}_{x}\phi_{c}(x,\xi)\>K\chi^{el}(\xi)\>d\xi}=(1-\alpha)K\chi^{el}(x)$ (8) As proven in (Romano et al., 2017a), the special kernel in Eq.(4) satisfies the following homogeneous boundary conditions $\left\\{\begin{aligned} &\mathcal{B}_{0}\phi_{c}\,|_{0}=0\\\ &\mathcal{B}_{L}\phi_{c}\,|_{L}=0\end{aligned}\right.$ (9) where $\,\mathcal{B}_{0}:=1-c\,\partial_{x}\,$ and $\,\mathcal{B}_{L}:=1+c\,\partial_{x}\,$ are differential operators defined at the boundary. By applying $\,\mathcal{B}_{0}\,$ and $\,\mathcal{B}_{L}\,$ to Eq.(6) we get $\left\\{\begin{aligned} &\mathcal{B}_{0}\big{(}M-\alpha\>K\chi^{el}\big{)}\,|_{0}=0\\\ &\mathcal{B}_{L}\big{(}M-\alpha\>K\chi^{el}\big{)}\,|_{L}=0\end{aligned}\right.$ (10) which are the constitutive boundary conditions associated with Eq.(7). Finally, the equivalent differential problem in Eqs.(7)-(10) can be explicitly formulated as follows $\frac{M(x)}{c^{2}}-\,\partial_{x}^{2}M(x)=\frac{(K\chi^{el})(x)}{c^{2}}-\alpha\>\partial_{x}^{2}(K\chi^{el})(x)$ (11) $\left\\{\begin{aligned} &\partial_{x}M(0)-\frac{1}{c}\,M(0)=\alpha\>\bigg{(}\partial_{x}(K\chi^{el})(0)-\frac{(K\chi^{el})(0)}{c}\bigg{)}\,\\\ &\partial_{x}M(L)+\frac{1}{c}\,M(L)=\alpha\>\bigg{(}\partial_{x}(K\chi^{el})(L)+\frac{(K\chi^{el})(L)}{c}\bigg{)}\end{aligned}\right.$ (12) ## 3 Limiting case: purely nonlocal elasticity For vanishing mixture parameter $\,\alpha=0\,$, the purely nonlocal elasticity model is recovered, that is $M(x)=\int_{0}^{L}{\phi_{c}(x,\xi)\>(K\chi^{el})(\xi)\>d\xi}$ (13) which is the Eringen’s purely nonlocal strain-driven law. Remark. For any value of $\,c>0\,$, the integral convolution Eq.(13) admits a unique solution (or no solution) if and only if the following constitutive boundary conditions are satisfied by the bending field (Romano et al., 2017a) $\left\\{\begin{aligned} &\partial_{x}M(0)-\frac{1}{c}\,M(0)=0\\\ &\partial_{x}M(L)+\frac{1}{c}\,M(L)=0\end{aligned}\right.$ (14) Fulfillment of Eq.(14) ensures that differential equation (Eq.(15)) provides the unique solution of the nonlocal problem (Romano et al., 2017a) $\frac{M(x)}{c^{2}}-\,\partial_{x}^{2}M(x)=\frac{(K\chi^{el})(x)}{c^{2}}$ (15) As proven in (Romano et al., 2017a), constitutive boundary conditions Eqs.(14) are incompatible with equilibrium requirements, since they relate bending and shearing fields through the characteristic nonlocal length $\,c\,$. The two- phase model eliminates ill-posedness for $\,\alpha>0\,$. Indeed, left-hand sides of Eq.(12) are known expressions (generally polynomial), unless of $\,n\,$ integration constants, with $\,n\,$ redundancy degree. Hence, the laws in Eq.(12) are non-homogeneous boundary conditions imposed on the elastic curvature and its first derivative and no incompatibility arises with kinematic boundary constraints since they act on displacement fields and its first derivatives. However, as $\,\alpha\to 0\,$ the two-phase strain-driven law will tend to an ill-posed theory and then inconsistencies of limiting solutions are expected to occur. Predicted singularities for $\,\alpha\to 0\,$ will be investigated in detail in the sequel. ## 4 Case-studies and exact structural solutions This section provides exact closed-form solutions of the elastic equilibrium problem of inflected beams using Eringen’s two-phase model Eqs.(11)-(12). The solution procedure is summarized as follows. * 1. Step 1. Solution of the differential equilibrium condition in Eq.(2) equipped with standard natural boundary conditions to get the bending moment as functions of $n$ integration constants, with $n$ standing for redundancy degree. For statically determinate beams, the equilibrated bending field is univocally determined by equilibrium requirements. * 2. Step 2. Inserting the obtained bending field $\,M\,$ in the equivalent differential problem governed by Eqs.(11)-(12) to get the nonlocal elastic curvature field $\,\chi^{el}\,$. * 3. Step 3. Detection of nonlocal displacement field $v$ by solving Eq.(1) with prescription of $\,3+n\,$ standard essential boundary conditions. The solution procedure above is applied to solve the nonlocal elastostatic problems below. The non-elastic curvature $\,\chi^{nel}\,$ is assumed to vanish, so that, by virtue Eq.(1), total and elastic curvatures are coincident $\,\chi=\chi^{el}\,$. Cantilever under concentrated couple at free end. Let us consider a cantilever of length $\,L\,$ and uniform bending stiffness $\,K\,$ under a concentrated couple $\,\mathcal{M}\,$ applied at free end. The bending moment field $\,M\,$ is obtained by the differential equilibrium equation $\,\partial_{x}^{2}M=0\,$ equipped with standard natural boundary conditions $\,M(L)=\mathcal{M}\,$ and $\,\partial_{x}M(L)=0\,$, so that Eq.(11) becomes $\frac{\mathcal{M}}{c^{2}}=\frac{K\chi^{el}(x)}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}(x)$ (16) supplemented with the constitutive boundary conditions $\left\\{\begin{aligned} &-\mathcal{M}\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\ &\mathcal{M}\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$ (17) Solving the differential problem in Eqs.(16)-(17) provides the elastic curvature $\,\chi^{el}\,$. Also, Eq.(1) with prescription of standard essential boundary conditions $\,v(0)=0\,$ and $\,\partial_{x}v(0)=0\,$, gives the nonlocal displacement field $\begin{split}v(x)=&\,\frac{\mathcal{M}x^{2}}{2K}-\frac{\mathcal{M}}{\psi_{1}K}\,c\,(\alpha-1)\,e^{-\frac{x}{c\sqrt{\alpha}}}\big{(}(x-c\sqrt{\alpha})\,e^{\frac{L+x}{c\sqrt{\alpha}}}+\,c\,\sqrt{\alpha}\,e^{\frac{L}{c\sqrt{\alpha}}}\\\ &-e^{\frac{x}{c\sqrt{\alpha}}}(c\,\sqrt{\alpha}+x)+c\,\sqrt{\alpha}e^{\frac{2x}{c\sqrt{\alpha}}}\big{)}\end{split}$ (18) with $\begin{split}\psi_{1}=(\sqrt{\alpha}+1)\,e^{\frac{L}{c\sqrt{\alpha}}}+\sqrt{\alpha}-1\end{split}$ (19) Cantilever under concentrated force at free end. Let us consider a cantilever of length $\,L\,$ and uniform bending stiffness $\,K\,$ under a concentrated force $\,F\,$ applied at free end. The equilibrated bending moment field $\,M\,$ is defined by $\,\partial_{x}^{2}M=0\,$ with prescription of standard natural boundary conditions $\,M(L)=0\,$ and $\,\partial_{x}M(L)=-F\,$, so that Eq.(11) becomes $\frac{F(L-x)}{c^{2}}=\frac{K\chi^{el}(x)}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}(x)$ (20) equipped with the constitutive boundary conditions $\left\\{\begin{aligned} &-Fc- FL\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\ &-Fc\,=\alpha\>K\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$ (21) The unknown elastic curvature $\,\chi^{el}\,$ is obtained by solving the differential problem in Eqs.(20)-(21). Then, Eq.(1) with prescription of standard essential boundary conditions provides the following nonlocal displacement field $\begin{split}v(x)=\,&\frac{Fx^{2}\,(3L-x)}{6K}+\frac{(\alpha-1)\,c\,F}{\psi K}\,e^{-\frac{x}{\sqrt{\alpha}c}}\,(\sqrt{\alpha}\,\psi_{1}\,c^{2}\,(e^{\frac{x}{\sqrt{\alpha}c}}-1)\,(e^{\frac{L}{\sqrt{\alpha}c}}+e^{\frac{x}{\sqrt{\alpha}c}})\\\ &-\psi_{2}\,L\,x\,e^{\frac{x}{\sqrt{\alpha}c}}+\,\psi_{3}\,c)\end{split}$ (22) with $\begin{split}&\psi=(\sqrt{\alpha}+1)^{2}\,e^{\frac{2L}{\sqrt{\alpha}c}}-(\sqrt{\alpha}-1)^{2}\\\ &\psi_{2}=\sqrt{\alpha}+(\sqrt{\alpha}+1)\,e^{\frac{2L}{\sqrt{\alpha}c}}-1\\\ &\psi_{3}=-(\sqrt{\alpha}+1)\,\sqrt{\alpha}\,L\,e^{\frac{2L}{\sqrt{\alpha}c}}+(\alpha-\sqrt{\alpha})\,L\,e^{\frac{2x}{\sqrt{\alpha}c}}-2\sqrt{\alpha}\,x\,e^{\frac{L+x}{\sqrt{\alpha}c}}+\\\ &(\sqrt{\alpha}+1)(\sqrt{\alpha}L-x)\,e^{\frac{2L+x}{\sqrt{\alpha}c}}-(\sqrt{\alpha}-1)\,e^{\frac{x}{\sqrt{\alpha}c}}(\sqrt{\alpha}L+x)\end{split}$ (23) Simply supported beam under uniformly distributed loading. Let us consider a simply supported beam of length $\,L\,$ and uniform bending stiffness $\,K\,$ under uniformly distributed loading $\,q\,$. Bending moment field $\,M\,$ is determined by differential equilibrium equation $\,\partial_{x}^{2}M=q\,$ equipped with natural boundary conditions $\,M(0)=0\,$ and $\,M(L)=0\,$, so that Eq.(11) becomes $\frac{qx(x-L)}{2c^{2}}-\,q=\frac{K\chi^{el}}{c^{2}}-\alpha\>K\partial_{x}^{2}\chi^{el}$ (24) supplemented with constitutive boundary conditions $\left\\{\begin{aligned} &-c\,\frac{qL}{2}\,=\alpha\,K\>\bigg{(}c\,\partial_{x}\chi^{el}(0)-\chi^{el}(0)\bigg{)}\,\\\ &c\,\frac{qL}{2}\,=\alpha\,K\>\bigg{(}c\,\partial_{x}\chi^{el}(L)+\chi^{el}(L)\bigg{)}\end{aligned}\right.$ (25) The elastic curvature $\,\chi^{el}\,$ is obtained from Eqs.(24)-(25); then, Eq.(1) together with essential boundary conditions $\,v(0)=0\,$ and $\,v(L)=0\,$, provides the nonlocal displacement field $\begin{split}v(x)=\,&\frac{qx\,(L^{3}-2Lx^{2}+x^{3})}{24K}-\frac{(\alpha-1)\,c^{2}\,q}{2\psi_{1}K}\,e^{-\frac{x}{\sqrt{\alpha}\,c}}\,(-e^{\frac{x}{\sqrt{\alpha}\,c}}\,(2\,\alpha^{3/2}\,c^{2}+L\,(\sqrt{\alpha}c\\\ &-\sqrt{\alpha}\,x+x)+(\sqrt{\alpha}-1)\,x^{2})+\,e^{\frac{L+x}{\sqrt{\alpha}c}}\,(-2\,\alpha^{3/2}\,c^{2}+L\,(-\sqrt{\alpha}\,c+\sqrt{\alpha}\,x\\\ &+x)-(\sqrt{\alpha}+1)\,x^{2})+\sqrt{\alpha}\,c\,e^{\frac{L}{\sqrt{\alpha}c}}\,(2\,\alpha\,c+L)+\sqrt{\alpha}\,c\,(2\,\alpha\,c+L)\,e^{\frac{2x}{\sqrt{\alpha}\,c}})\end{split}$ (26) Doubly clamped beam under uniformly distributed loading. Let us consider a doubly clamped beam of length $\,L\,$ and uniform bending stiffness $\,K\,$ under uniformly distributed loading $\,q\,$. The bending moment field $\,M\,$ obtained by the differential equilibrium equation $\,\partial_{x}^{2}M=q\,$ is a function of two integration constants, $\,a_{1}\,$ and $\,a_{2}\,$. Hence, Eq.(11) in terms of displacement field $\,v\,$ becomes $\frac{qx^{2}}{2}+a_{1}x+a_{2}-c^{2}q=K\partial_{x}^{2}v-\alpha\>c^{2}\,K\partial_{x}^{4}v$ (27) supplemented with constitutive and kinematic boundary conditions $\left\\{\begin{aligned} &c\,a_{1}-a_{2}=\alpha K\,(c\,\partial_{x}^{3}v(0)-\partial_{x}^{2}v(0))\\\ &c\,(qL+a_{1})+\frac{qL^{2}}{2}+a_{1}L+a_{2}=\alpha K\,(c\,\partial_{x}^{3}v(L)+\partial_{x}^{2}v(L))\\\ &v(0)=0\\\ &\partial_{x}v(0)=0\\\ &v(L)=0\\\ &\partial_{x}v(L)=0\end{aligned}\right.$ (28) By solving the differential problem in Eqs.(27)-(28) the nonlocal displacement field is given by $\begin{split}v(x)=\,&\frac{q\,x^{2}\,(L-x)^{2}}{24K}+\frac{c\,(\alpha-1)\,q}{12\,\psi_{4}\,K}(12\,c^{2}+6c\,L+L^{2})\,e^{-\frac{x}{\sqrt{\alpha}c}}(\sqrt{\alpha}\,c\,L\,e^{\frac{L}{\sqrt{\alpha}c}}\\\ &-e^{\frac{L+x}{\sqrt{\alpha}c}}(\sqrt{\alpha}\,cL- Lx+x^{2})+e^{\frac{x}{\sqrt{\alpha}c}}(-\sqrt{\alpha}\,cL- Lx+x^{2})+\sqrt{\alpha}\,c\,L\,e^{\frac{2x}{\sqrt{\alpha}c}})\end{split}$ (29) with $\psi_{4}=\,L\,(-\sqrt{\alpha}-(\sqrt{\alpha}+1)\,e^{\frac{L}{\sqrt{\alpha}c}}+1)+2\,(\alpha-1)\,c\,(e^{\frac{L}{\sqrt{\alpha}c}}-1)$ (30) ## 5 Inconsistency of limiting solutions As enlightened by theoretical outcomes in Sect.3, no solution can be found to Eq.(3) for a vanishing mixture parameter, i.e.: $\,\alpha=0\,$. Indeed, for any value $\,c>0\,$, constitutive boundary conditions in Eq.(12) can be satisfied by equilibrated bending moments only for a strictly positive mixture parameter. Hence, inconsistencies of two-phase solutions are expected to occur as $\,\alpha\to 0\,$. In the following, analytical limiting responses of case-studies in Sec.4 are provided. Non-dimensional variables are used in parametric plots by introducing the non-dimensional abscissa $\,\xi=x/L\,$, the nonlocal parameter $\,\lambda=c/L\,$ and the following non-dimensional limiting displacement fields $\bar{v_{l}}=v_{l}\frac{K}{FL^{3}}\quad or\quad\bar{v_{l}}=v_{l}\frac{K}{\mathcal{M}L^{2}}\quad or\quad\bar{v_{l}}=v_{l}\frac{K}{qL^{4}}$ (31) Cantilever under concentrated couple at free end. Computing the limit as $\,\alpha\to 0\,$ of Eq.(18), we get the following limiting displacement field $v_{l}(x)=\frac{\mathcal{M}}{K}\bigg{(}\frac{x^{2}}{2}+c\,x\bigg{)}$ (32) The displacement field in Eq.(32) is clearly in contrast with essential boundary conditions prescribed by constraints. Indeed, except for the local case $\,\lambda=0^{+}\,$, kinematic inconsistency is apparent in parametric plots of displacement (Fig.1) and rotation fields (Fig.2) obtained from derivation of Eq.(32). Figure 1: Cantilever under concentrated couple at free end: displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 2: Cantilever under concentrated couple at free end: rotation $\,\bar{\varphi_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Double derivation of Eq.(32) leads to the limiting elastic bending curvature $\,\chi_{l}\,$ that inserted into the integral convolution in Eq.(3) (with $\,\alpha=0\,$) should provide the equilibrated bending moment. Moreover, since the redundancy degree is zero, equilibrated bending interaction is the uniform field univocally determined by equilibrium conditions. As clearly shown by parametric plots in Fig.3, the limiting elastic nonlocal curvature $\,\chi_{l}\,$ provides a bending moment which is not equilibrated; indeed, it is not uniform and not equal to the applied couple, except for the asymptotic local bending moment which is equilibrated for $\,\xi\in\,]0,1[\,$. A further derivation leads to shear force field which is not vanishing (see Fig.4), except for $\,\lambda=0^{+}\,$ with $\,\xi\in\,]0,1[\,$. Figure 3: Cantilever under concentrated couple at free end: bending moment $\,\bar{M_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 4: Cantilever under concentrated couple at free end: shear force $\,\bar{T_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Cantilever under concentrated force at free end. Computing the limit as $\,\alpha\to 0\,$ of Eq.(22), we get the following limiting displacement field $v_{l}(x)=\frac{F}{K}\bigg{(}L\,\frac{x^{2}}{2}-\frac{x^{3}}{6}+c^{2}\,x+L\,c\,x\bigg{)}$ (33) Kinematic inconsistencies are clearly shown in parametric plots of displacement and rotation fields as a function of $\,\lambda\,$, except for the local case $\,\lambda=0^{+}\,$ (see Figs.5-6). Double derivation of Eq.(33) leads to the limiting bending curvature that inserted into the integral convolution in Eq.(3), for $\,\alpha=0\,$, provides a bending moment field which is not compatible with differential and boundary equilibrium requirements. Figure 5: Cantilever under concentrated force at free end: displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 6: Cantilever under concentrated force at free end: rotation $\,\bar{\varphi_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Indeed, since the redundancy degree is zero, the equilibrated bending moment is the linear field univocally determined by equilibrium conditions. Instead, as clearly shown by parametric plots in Fig.7, the limiting elastic bending curvature $\,\chi_{l}\,$ provides a bending moment which is not equilibrated since it is not linear and does not vanish at free-end of the cantilever, except for the asymptotic local bending moment which is equilibrated for $\,\xi\in\,]0,1]\,$. A further derivation leads to the shear force field which is not equal to the value of the applied force (see Fig.8) and hence, it is not uniform (except for $\,\lambda=0^{+}\,$ with $\,\xi\in\,]0,1[\,$), i.e.: the emerging distributed loading is not vanishing. Figure 7: Cantilever under concentrated force at free end: bending moment $\,\bar{M_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 8: Cantilever under concentrated force at free end: shear force $\,\bar{T_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Simply supported beam under uniformly distributed loading. Computing the limit as $\,\alpha\to 0\,$ of Eq.(26), we get the following limiting displacement $v_{l}(x)=\frac{q}{K}\bigg{(}\frac{x^{4}}{24}-\frac{Lx^{3}}{12}-\frac{c^{2}x^{2}}{2}+\frac{L^{3}x}{24}(12\lambda^{2}+1)\bigg{)}$ (34) Parametric plots of displacement and rotation fields as function of $\,\lambda\,$ are shown in Figs.9-10. Double derivation of Eq.(34) leads to the limiting bending curvature that inserted into the integral convolution in Eq.(3) (for $\,\alpha=0\,$) provides the static fields shown in Figs.11-12. The bending moment field is clearly incompatible with natural boundary conditions and the shear force field is not linear, i.e.: the emerging distributed loading is not uniform (see Fig.13). Hence, the interaction fields for $\,\lambda>0\,$ are not compatible with differential and boundary equilibrium requirements. Figure 9: Simply supported beam under uniformly distributed loading: displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 10: Simply supported beam under uniformly distributed loading: rotation $\,\bar{\varphi_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 11: Simply supported beam under uniformly distributed loading: bending moment $\,\bar{M_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 12: Simply supported beam under uniformly distributed loading: shear force $\,\bar{T_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 13: Simply supported beam under uniformly distributed loading: emerging loading $\,\bar{q_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Doubly clamped beam under uniformly distributed loading. The limiting displacement field as $\,\alpha\to 0\,$ of Eq.(29) is given by $v_{l}(x)=\frac{q}{K}\left(\frac{x^{4}}{24}-\frac{Lx^{3}}{12}-\frac{c^{2}x^{2}}{2}+\frac{c\left(12\lambda^{2}+6\lambda+1\right)L^{2}x}{12(2\lambda+1)}+\frac{L^{2}x^{2}}{24(2\lambda+1)}\right)$ (35) The displacement field in Eq.(35) is in contrast with essential boundary conditions prescribed by constraints. These kinematic inconsistencies are clearly shown in parametric plots of displacement and rotation fields (see Figs.14-15). Double derivation of Eq.(33) leads to the limiting nonlocal elastic curvature that is used to compute the integral convolution in Eq.(3), for $\,\alpha=0\,$, to get the bending moment field depicted in Fig.16. A further derivation leads to shear force field which is not linear (see Fig.17) and the emerging distributed loading is not uniform and not equal to the applied one (see Fig.18). Hence, limiting solutions of the elastostatic problem do not satisfy kinematic compatibility and equilibrium requirements, except for the asymptotic local displacement and rotation fields $\,\forall\xi\in\,[0,1]\,$ and for the asymptotic local bending and shearing fields for $\,\xi\in\,]0,1[\,$. Figure 14: Doubly clamped beam under uniformly distributed loading: displacement $\,\bar{v_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 15: Doubly clamped beam under uniformly distributed loading: rotation $\,\bar{\varphi_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 16: Doubly clamped beam under uniformly distributed loading: bending moment $\,\bar{M_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 17: Doubly clamped beam under uniformly distributed loading: shear force $\,\bar{T_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. Figure 18: Doubly clamped beam under uniformly distributed loading: emerging loading $\,\bar{q_{l}}\,$ versus $\,\xi\,$ for $\,\lambda\in\\{0^{+},0.1,0.2,0.3,0.4,0.5\\}\,$. ## 6 Closing remarks The bending behaviour of elastic beams has been investigated by Eringen’s two- phase integral theory. Exact closed-form solutions of simple structural problems of applicative interest have been preliminarily provided in terms of mixture and nonlocal parameters. Then, relevant asymptotic fields (as the mixture parameter tends to zero) have been evaluated and studied. It has been proven that such fields are in contrast with kinematic boundary conditions and equilibrium requirements for any nonlocal parameter value. Accordingly, limiting responses of Eringen’s two-phase formulation cannot be used as solutions of the ill-posed Eringen purely nonlocal structural problem. Therefore, inaccurate outcomes contributed in current literature (see e.g. Mikhasev and Nobili, 2020; Mikhasev, 2021), regarding the well-posedness of limiting elastodynamic problems based on Eringen’s two-phase continuum theory, should be amended consequently. Acknowledgment \- Financial support from the MIUR in the framework of the Project PRIN 2017 - code 2017J4EAYB _Multiscale Innovative Materials and Structures (MIMS)_ ; University of Naples Federico II Research Unit - is gratefully acknowledged. ## References * Banejad et al. (2020) Banejad, A., Passandideh-Fard, M., Niknam, H., Mirshojaeian Hosseini, M.J., Mousavi Shaegh, S.A., 2020. Design, fabrication and experimental characterization of whole-thermoplastic microvalves and micropumps having micromilled liquid channels of rectangular and half-elliptical cross-sections. Sensors and Actuators A 301, 111713. * Barretta et al. (2018a) Barretta, R., Fabbrocino, F., Luciano, R., Marotti de Sciarra, F., 2018a. Closed-form solutions in stress-driven two-phase integral elasticity for bending of functionally graded nano-beams. Physica E: Low-dimensional Systems and Nanostructures 97, 13–30. * Barretta et al. (2018b) Barretta, R., Čanadija, M., Feo, L., Luciano, R., Marotti de Sciarra, F., Penna, R., 2018b. Exact solutions of inflected functionally graded nano-beams in integral elasticity. Composites Part B 142, 273-286. * Barretta et al. (2018c) Barretta, R., Diaco, M., Feo, L., Luciano, R., Marotti de Sciarra, F., Penna, R., 2018c. Stress-driven integral elastic theory for torsion of nano-beams. Mechanics Research Communications 87, 35-41. * Barretta et al. (2019) Barretta, R., Marotti de Sciarra, F., Vaccaro, M.S., 2019. On nonlocal mechanics of curved elastic beams. International Journal of Engineering Science 144, 103140. * Bažant and Jirásek (2002) Bažant, Z.P., Jirásek, M., 2002. Nonlocal integral formulation of plasticity and damage: survey of progress. Journal of Engineering Mechanics - ASCE, 128, 1119-1149. * Borino et al. (2003) Borino, G., Failla, B., Parrinello, F., 2003. A symmetric nonlocal damage theory. International Journal of Solids and Structures 40, 3621-3645. * Chao et al. (2020) Chao, M., Wang, Y., Ma, D., Wu, X., Zhang, W., Zhang, L., Wan, P., 2020. Wearable mxene nanocomposites-based strain sensor with tile-like stacked hierarchical microstructure for broad-range ultrasensitive sensing. Nano Energy 78, 105187. * Chorsi and Chorsi (2018) Chorsi, M.T. , Chorsi, H.T., 2018. Modeling and analysis of MEMS disk resonators. Microsystem Technologies 24 (6), 2517–2528 . * Eringen (1972) Eringen, A. C., 1972. Linear theory of nonlocal elasticity and dispersion of plane waves. International Journal of Engineering Science 10(5), 425-435. * Eringen (1983) Eringen, A. C., 1983. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. Journal of Applied Physics 54, 4703. * Eringen (1987) Eringen, A. C., 1987. Theory of nonlocal elasticity and some applications. Res Mechanica 21, 313-342. * Eptaimeros et al. (2016) Eptaimeros, K.G., Koutsoumaris, C.C., Tsamasphyros, G.J., 2016. Nonlocal integral approach to the dynamical response of nano-beams. Int J Mech Sci 115–116, 68–80 . * Fathi and Ghassemi (2017) Fathi, M., Ghassemi, A. (2017). The effects of surface stress and nonlocal small scale on the uniaxial and biaxial buckling of the rectangular piezoelectric nanoplate based on the two variable-refined plate theory. Journal of the Brazilian Society of Mechanical Sciences and Engineering 39 3203-3216. * Fernández-Sáez and Zaera (2017) Fernández-Sáez, J., Zaera, R., 2017. Vibrations of Bernoulli-Euler beams using the two-phase nonlocal elasticity theory. International Journal of Engineering Science 119, 232-248. * Ghayesh and Farajpour (2019) Ghayesh, M.H., Farajpour, A., 2019. A review on the mechanics of functionally graded nanoscale and microscale structures. International Journal of Engineering Science 137, 8-36. * Ghayesh and Farokhi (2020) Ghayesh, M.H., Farokhi, H., 2020. Nonlinear broadband performance of energy harvesters. Int J Eng Sci 147, 103202 * Jankowski et al. (2020) Jankowski, P., Żur, K.K., Kim, J., Reddy, J.N., 2020. On the bifurcation buckling and vibration of porous nanobeams. Composite Structures 250, 112632. * Karami et al. (2018) Karami, B., Shahsavari, D., Janghorban, M., Li, L., 2018. Wave dispersion of mounted graphene with initial stress. Thin-Walled Structures 122, 102-111. * Kiani (2021) Kiani, K., Żur, K.K., 2021. Vibrations of double-nanorod-systems with defects using nonlocal-integralsurface energy-based formulations. Composite Structures 256, 113028. * Khodabakhshi and Reddy (2015) Khodabakhshi, P., Reddy, J.N., 2015. A unified integro-differential nonlocal model. International Journal of Engineering Science 95, 60-75. * Kröner et al. (1967) Kröner, E., 1967. Elasticity theory of materials with long range cohesive forces. International Journal of Solids and Structures 3(5), 731-742. * Lu et al. (2019) Lu, P., Veletić, M., Laasmaa, M., Vendelin, M., Louch, W.E., Steinar Halvorsen P., Bergsland, J., Balasingham, I., 2019. Multi-nodal nano-actuator pacemaker for energy-efficient stimulation of cardiomyocytes. Nano Communication Networks 22, 100270. * Malikan et al. (2020b) Malikan, M., Eremeyev, V.A., Żur, K.K., 2020. Effect of axial porosities on flexomagnetic response of in-plane compressed piezomagnetic nanobeams. Symmetry 12(12), 1935. * Mikhasev and Nobili (2020) Mikhasev, G., Nobili, A., 2020. On the solution of the purely nonlocal theory of beam elasticity as a limiting case of the two-phase theory. International Journal of Solids and Structures 190, 47–57. * Mikhasev (2021) Mikhasev, G., 2021. Free high-frequency vibrations of nonlocally elastic beam with varying cross-section area. Continuum Mechanics and Thermodynamics. https://doi.org/10.1007/s00161-021-00977-6 * Oskouie et al. (2018) Oskouie, M. F., Ansari, R., Rouhi, H., 2018. Bending of Euler-Bernoulli nanobeams based on the strain-driven and stress-driven nonlocal integral models: a numerical approach. Acta Mechanica Sinica. Doi: 10.1007/s10409-018-0757-0 * Pinnola (2020) Pinnola, F.P., Vaccaro, M.S., Barretta, R., Marotti de Sciarra, F., 2020. Random vibrations of stress-driven nonlocal beams with external damping. Meccanica URL https: //doi.org/10.1007/s11012-020-01181-7. * Pisano and Fuschi (2003) Pisano, A.A., Fuschi, P., 2003. Closed form solution for a nonlocal elastic bar in tension. International Journal of Solids and Structures 40, 13-23. * Pisano et al. (2021) Pisano, A.A., Fuschi, P., Polizzotto, C., 2021. Integral and differential approaches to Eringen’s nonlocal elasticity models accounting for boundary effects with applications to beams in bending. ZAMM - Journal of Applied Mathematics and Mechanics. https://doi.org/10.1002/zamm.202000152 * Polizzotto (2001) Polizzotto, C., 2001. Nonlocal elasticity and related variational principles. International Journal of Solids and Structures 38, 7359-7380. * Polizzotto (2002) Polizzotto, C., 2002. Thermodynamics and continuum fracture mechanics for nonlocal-elastic plastic materials. European Journal of Mechanics A/Solids 21, 85-103. * Polyanin and Manzhirov (2008) Polyanin, A.D., Manzhirov A.V., 2008. Handbook of integral equations. 2nd ed. Boca Raton, FL: Chapman & Hall/CRC. * Roghani (2020) Roghani, M., Rouhi, H., 2020. Nonlinear stress-driven nonlocal formulation of timoshenko beams made of fgms. Continuum Mechanics and Thermodynamics. https://doi.org/10. 1007/s00161-020-00906-z * Rogula (1965) Rogula, D., 1965. Influence of spatial acoustic dispersion on dynamical properties of dislocations. Bulletin de l’Académie Polonaise des Sciences, Séries des Sciences Techniques 13, 337-343 . * Rogula (1982) Rogula, D., 1982. Introduction to nonlocal theory of material media. In D. Rogula (Ed.), Nonlocal theory of material media, CISM courses and lectures (vol. 268, pp. 125-222). Wien: Springer. * Romano et al. (2017a) Romano, G., Barretta, R., Diaco, M., Marotti de Sciarra, F., 2017a. Constitutive boundary conditions and paradoxes in nonlocal elastic nano-beams. International Journal of Mechanical Sciences 121, 151-156. * Romano et al. (2017b) Romano, G., Barretta, R., Diaco, M., 2017b. On nonlocal integral models for elastic nano-beams. International Journal of Mechanical Sciences 131-132, 490-499. * Sedighi et al. (2017) Sedighi, H.M., Malikan, M., Valipour, A., Żur, K.K., 2020. Nonlocal vibration of carbon/boron-nitride nano-hetero-structure in thermal and magnetic fields by means of nonlinear finite element method. Journal of Computational Design and Engineering 7(5), 591–602. * Soukarié et al. (2020) Soukarié, D., Ecochard, V., Salomé, L., 2020. Dna-based nanobiosensors for monitoring of water quality. Int. J. Hyg. Environ. Health 226, 113485. * Tricomi (1957) Tricomi, F.G., 1957. Integral Equations. Interscience, New-York, USA. Reprinted by Dover Books on Mathematics, 1985. * Vila et al. (2017) Vila, J., Fernández-Sáez, J., Zaera, R., 2017. Nonlinear continuum models for the dynamic behavior of 1D microstructured solids. International Journal of Solids and Structures 117, 111-122. * Wang et al. (2016) Wang, Y., Zhu, X., Dai, H., 2016. Exact solutions for the static bending of Euler-Bernoulli beams using Eringen two-phase local/nonlocal model. AIP Advances 6(8), 085114. Doi:10.1063/1.4961695 * Zhang (2017) Zhang, Y., 2017. Frequency spectra of nonlocal Timoshenko beams and an effective method of determining nonlocal effect. International Journal of Mechanical Sciences 128-129, 572-582. * Zhang (2020) Zhang, J.Q., Qing, H., Gao, C.F., 2020. Exact and asymptotic bending analysis of microbeams under different boundary conditions using stress-derived nonlocal integral model. Z. Angew. Math. Mech. 100(1), e201900148. * Zhu and Li (2017) Zhu, X., Li, L., 2017. Closed form solution for a nonlocal strain gradient rod in tension. International Journal of Engineering Science 119, 16-28. * Żur et. al (2020) Żur, K.K., Arefi, M., Kimc, J., Reddy, J.N., 2020. Free vibration and buckling analyses of magneto-electro-elastic FGM nanoplates based on nonlocal modified higher-order sinusoidal shear deformation theory. Composites Part B 182, 107601.
arxiv-papers
2021-07-27T11:08:45
2024-09-04T03:07:21.278017
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de\n Sciarra, Raffaele Barretta", "submitter": "Raffaele Barretta", "url": "https://arxiv.org/abs/2107.12731" }
2107.12732
# Towards Black-box Attacks on Deep Learning Apps Hongchen Cao ShanghaiTech University [email protected] Shuai Li The Hong Kong Polytechnic University [email protected] Yuming Zhou Ming Fan Nanjing University [email protected] Xi’an Jiaotong University [email protected] Xuejiao Zhao Nanyang Technological University [email protected] Yutian Tang ShanghaiTech University [email protected] ###### Abstract Deep learning is a powerful weapon to boost application performance in various fields, including face recognition, object detection, image classification, natural language understanding, and recommendation system. With the rapid increase in the computing power of mobile devices, developers can embed deep learning models into their apps for building more competitive products with more accurate and faster responses. Although there are several works of adversarial attacks against deep learning models in apps, they all need information about the models’ internals (i.e., structures, weights) or need to modify the models. In this paper, we propose an effective black-box approach by training substitute models to spoof the deep learning systems inside the apps. We evaluate our approach on 10 real-world deep-learning apps from Google Play to perform black-box adversarial attacks. Through the study, we find three factors that can affect the performance of attacks. Our approach can reach a relatively high attack success rate of 66.60% on average. Compared with other adversarial attacks on mobile deep learning models, in terms of the average attack success rates, our approach outperforms counterparts by 27.63%. ###### Index Terms: Black-box attacks, Deep Learning apps, Android ## I Introduction The explosive progress of deep learning techniques makes an increasing number of app developers pay attention to this technology. Deep learning apps reach a certain scale in the market and keep growing rapidly [1]. To lower the threshold for developers to utilize and deploy deep learning models on their apps, companies (i.e., Google) develop deep learning frameworks, including Tensorflow Lite [2], Pytorch Mobile [3], Caffe2 Mobile [4], MindSpore Lite [5], Core ML [6] and so on. To build a deep learning app, mainstream platforms offer two common deploying strategies, on-device deployment and on-cloud deployment [7]. On-cloud deployment allows developers to deploy their models on the remote server, and collect the runtime inputs from app users. Then, the inputs are processed by the remote server. Finally, the results are returned to app users. However, the efficiency of this method is often limited by the network quality and power usage [8]. Even worse, on-cloud deployment has potential risks of user privacy leakage [9]. Therefore, lots of developers turn to the on-device deployment strategy. Motivation. The aforementioned mainstream mobile deep learning frameworks and deployment platforms rarely provide developers with solutions or APIs to protect their deep learning models. Unprotected deep learning models are widely used in apps in various fields such as finance, health, and self- driving [10]. This may lead to potential user data leakage, commercial information theft, and the malfunction of important functional modules of the app (e.g. a polluted face recoginition model fails to recoginize an authorized user). State-of-art. Although some studies [11] focus on attacks on mobile deep learning models, their approaches are often white-box, which means that the attacker can know or even modify the structure (the number, type, and arrangement of layers) and weights (parameters of each layer) of the model. These white-box attacks rely on the source of victim models, which can be extracted by decompressing the victim app. However, a recent study shows that developers are more likely to use encryption or hash code to protect their models [10]. It means that the knowledge of a model (i.e., structure and weights) inside the app is always unknown, which nullifies these white-box attacks. Work [12] claims to be a black-box attack method towards deep learning models. However, they still require knowledge of the structure or weight of the model. Such information is commonly unknown in the real world, especially for commercial apps. Our solution. In this paper, we developed a practical pipeline that covers data preparation, student model (i.e., a substitute model to mimic the behavior of the victim model) learning, and adversarial examples generation. Our black-box attack approach can bypass many existing model protection measures. First, we instrument a DummyActivity to the victim app to invoke the deep learning model (a.k.a teacher model) adopted by the victim app. The raw data fetched from the Internet or public dataset are fed into the teacher model through the DummyActivity to generate the corresponding labels (See Sec. III-A). Next, a substitute model (a.k.a. student model), which is selected to mimic the behavior of the teacher model, is then trained with the labeled data (See Sec. III-B). Last, adversarial attack algorithms are applied to the student model, and the generated adversarial examples are leveraged to attack the teacher model in the victim app (See Sec. III-C). Contributions. In summary, our main contributions are described as follows: $\bullet$ We propose a black-box attack pipeline, from the model collection to adversarial example generation, to attack deep learning apps. $\bullet$ We conduct a series of experiments to evaluate how different factors affect the attack success rate, including the structure of the student models, the scale of the teaching dataset, and the adversarial attack algorithms; and $\bullet$ We propose a series of strategies to defend against the proposed attacks. We release the source code and data on the online artefact [13]. ## II Background ### II-A On-device Deep Learning Model Developers are increasingly using deep learning models to implement face recognition [14], image classification [15], object detection [15], natural language understanding [16], speech recognition [17], and recommendation systems [18] in their apps. To meet the needs of app developers, vendors build deep learning frameworks for mobile platforms, such as TensorFlow Lite [2] and PyTorch Mobile [3]. They also provide platforms (e.g. TensorFlow Hub [19], MindSpore Model [20]) to share pre-trained deep learning models for mobile apps. There are two common deploying strategies, on-device deployment and on-cloud deployment. Developers nowadays are inclined to use the on-device method to deploy deep learning models. On the one hand, the hardware of modern mobile devices is qualified to complete computationally intensive deep learning tasks. As the CPU and GPU of modern mobile devices have stronger computing power, on-device inference can be completed promptly. The neural processing units (NPU) in mobile devices further expand the feasibility of on-device deployment of deep learning models [21]. On the other hand, deep learning frameworks provide simple and easy-to-use APIs to invoke the model for inference tasks. For example, as shown in List. 1, Interpreter defined in the TensorFlow Lite is used to load the model and run inference. file_of_a_tflite_model represents the file path of the deep learning model. input presents the user’s input and output represents the result of the inference which is a vector. Based on the output, the app can give a response to the user. For example, the user feeds an image of a rose as input into the Interpreter. After inference, the output is assigned to a one- hot vector like [0, 0, 1, 0, …, 0]. According to pre-determined rules from developers, the vector is then interpreted into a human-readable format such as a string ”rose”. Listing 1: TensorFlow Lite API ⬇ 1# TensorFlow Lite 2Interpreter interpreter = new Interpreter(file_of_a_tflite_model); 3interpreter.run(input, output); In the apps, developers can define the locations of their deep learning models. A common practice is to store the models in the assets folder (/assets/) of the apk (Android Package, which is the binary format of an app). Data including user input, output vector, and training dataset are invisible to users. Although models in some deep learning apps can be directly extracted by decompiling the apk, lots of them still cannot be fetched even with the state-of-art tools [10]. Therefore, the information about the structures and weights of these deep learning models is unknown to attackers. ### II-B Black-box Attack Since the information about the victim is always unknown, attacks must be performed in a black-box manner. A black-box attack is not a specific attack technique but describes an attack scenario. In this scenario, the attackers have no internal knowledge of the victim, and cannot modify the internal structure and other attributes of the victim. In our context, the attackers have no internal knowledge of the deep learning model in the victim app and cannot modify the internal attributes of the model. The attackers can only query the model and get its prediction. ### II-C Adversarial Attack Deep learning models are vulnerable to adversarial attacks. The adversarial attack utilizes adversarial examples to spoof the deep learning models. An adversarial example is generated by adding tiny perturbations to the input data. It can be represented as $x_{adv}=x+\epsilon*p$, where $x_{adv}$ is the adversarial example, $x$ is the input data, $p$ is the perturbations and $\epsilon$ is the multiplier to control the degree of the perturbations [22, 12]. An adversarial attack can be briefly summarized in the following example. With a deep learning model for image classification $M(x)$ and an input image $x$, $y_{true}$ is the label of $x$ ($y_{true}=M(x)$). Attackers can generate an adversarial example $x^{\prime}$ by adding infinitesimal perturbations that a human being cannot distinguish from the original image $x$. But the adversarial example $x^{\prime}$ can spoof the victim deep learning model to make an incorrect prediction ($M(x^{\prime})\neq y_{true}$). (a) orignal input (b) adversarial example Figure 1: Comparsion for orignal input and adversarial example Figure 2: Overview of adversarial attack pipeline For example, Fig. 1(a) is the original input image, which is labeled as ’rose’ by a deep learning model $M$. After applying adversarial attacks to it, an adversarial example is generated as shown in Fig. 1(b), which is labeled as ”tulips” by $M$. ## III Methodology Before introducing the details of our approach, we first define two key concepts used in our work: teacher model and student model. A teacher model is the deep learning model that is used in the victim app. A student model can be considered as a substitute or imitator of the teacher model. A qualified student model can imitate the teacher’s behaviors well. With the same input, the student and the teacher model are supposed to output the same prediction. A well-behaved student model can guarantee that the adversarial examples generated can be directly transferred to the teacher model. Our black-box attack pipeline, as illustrated in Fig. 2, consists of three procedures: teaching dataset preparation, student model learning, and adversarial examples generation. $\bullet$ Input: The input of our pipeline is a deep learning app and an unlabeled dataset. The dataset is either crawled from the web or a public dataset that is related to the app’s task. For example, the dataset for an app whose task is flower classification can be images of different kinds of flowers. $\bullet$ Teaching dataset preparation: Given a deep learning app, we first locate and learn how the deep learning model is invoked by tracking the official APIs from deep learning frameworks in the app. Then, we instrument a DummyActivity, in which the teacher model is invoked, to the victim app with Soot [23, 24]. Next, we feed the unlabeled dataset into the DummyActivity to generate the corresponding labels (see Sec. III-A). $\bullet$ Student model learning: To imitate the teacher model, we select mainstream deep learning models with the same task as the student model candidates. With the labeled teaching dataset generated, a student model can be trained to imitate the teacher model (see Sec. III-B). $\bullet$ Adversarial examples generation: With the trained student model, adversarial examples can be generated with adversarial attack algorithms (see Sec. III-C). $\bullet$ Output: The output of the whole pipeline is a set of adversarial examples, which are used to attack the victim app. ### III-A Teaching Dataset Preparation For a deep learning app, we identify some basic attributes of the teacher model in the app. These attributes mainly consist of the type of its task, the name of classes it predicts, and the formatting requirement of the input. $\bullet$Type of task and Name of classes : Determining the task of the deep learning model is a prerequisite for collecting a suitable dataset. The name of the output (i.e., classes) of the deep learning model can further help narrow the selection range of the dataset. This information can be obtained by trying the app. $\bullet$Formatting requirement of the input : The input format of the deep learning model is determined by the model developer. These formatting requirements include size (e.g., 128*128), data type (e.g., int8, float32), and so forth. By reverse engineering the app, these requirements can be obtained manually. For a plant identifier app, its task is image classification. Its names of classes can be the names of plants (e.g, lily, plane tree). Its formatting requirement of the input can be a 255$\times$255$\times$3 RGB image. Based on this information, we search a public dataset $D$ from the web. However, it is common that no public related dataset is available for real- world apps. There are two options to collect the dataset for such apps. The first is to use a pre-trained student model without fine-tuning by the teaching dataset, which is simple and fast. The second is to crawl the related data from the Internet. We compare these two options with experiments in Sec. IV-C. Since the input format of the deep learning model is determined by the model developer, the collected dataset needs to be preprocessed to make it meet the specific formatting requirements. Based on the previously obtained information about the input formatting requirements, the input data can be manipulated (e.g., zoom in size, update figure accuracy) to meet the input formatting requirements. The dataset we crawled is unlabeled. However, to better imitate the teacher model, we need to train the student model with a labeled dataset. Therefore, we need to extract the labels of the dataset with the teacher model. For a black-box attack, it can be unrealistic to directly retrieve the teacher model from the app. Therefore, we perform the following steps to transfer an unlabeled dataset $D$ into a labeled one $D^{\prime}$: $\bullet$ STEP 1: We collect the API patterns of mainstream mobile deep learning model deployment frameworks. The corresponding APIs can be found in the official docs (i.e., Tensorflow Lite inference [25], Pytorch Mobile inference [26]). $\bullet$ STEP 2: We use Soot to locate the signatures of these APIs in the app. $\bullet$ STEP 3: We instrument DummyActivity into the app with Soot and load the deep learning model inside the onCreate() method of DummyActivity with the same API found in STEP 2. $\bullet$ STEP 4: We pass the dataset $D$ to the inference API and output the corresponding labels with logs. $\bullet$ STEP 5: We leverage the Android Debug Bridge (ADB) to launch our DummyActivity (i.e., am start -n DummyActivity) to trigger the teacher model. As a result, we can obtain the corresponding labels for the inputs. Example. The Mushroom Identifier app (com.gabotechindustries.mushroomIdentifier) detects and identifies mushrooms in the picture and predicts their categories. This app has a class called ”Xception”. List. 2 summarizes how this app invokes the deep learning model in ”Xception” with the APIs provided by TensorFlow Lite. Listing 2: API pattern of invoking the deep learning model ⬇ 1public class Xception { 2 public Xception(…, final String str, …) { 3 … 4 final Interpreter.Options options = new Interpreter.Options(); 5 this.tflite = new Interpreter(map, options);} 6} 7public abstract class AIActivity extends CameraActivity { 8 protected void onCreate(…) { 9 this.xception = new Xception(…, ”xception103.tflite”, …);} 10} As illustrated in List. 3, we embed the extracted pattern (in List. 2) into DummyActivity. Then, we instrument the DummayActivity to the app. Listing 3: Instrumented DummyActivity ⬇ 1class DummyActivity extends AppCompatActivity { 2 public void onCreate(Bundle savedInstanceState) { 3 … 4 // Init and run the Interpreter 5 Interpreter interpreter = new Interpreter(”xception103.tflite”); 6 interpreter.run(input, output); 7 int maxIdx = output.indexOf(output.max());//Get label 8 Log.i(”DummyActivity”,maxIdx.toString());//Output label 9 } 10 … 11} After instrumenting the DummyActivity to the app, we launch the DummyActivity with an ADB command (i.e., am start -n DummyActivity). As a result, the corresponding labels of $D$ can be obtained. The labeled dataset $D^{\prime}$ is then leveraged to train the student model. ### III-B Student Model Learning Selection criteria for student model. The adversarial examples generated based on the student model are used to attack the teacher model. The selection criteria of the student model is that it should be able to complete the same task as the teacher model. Different student models can result in different attack success rates. We discuss this correlation in Sec. IV-B. Student model learning. In our approach, the student model can be trained in a supervised way with the teaching dataset generated in the previous step. In supervised learning, the model is trained on a labeled dataset, where the labels are used to evaluate the model’s prediction accuracy. To improve the prediction accuracy, the model needs to adjust the weights in the process of training. The adjusting strategy relies on the error between the model’s predictions and the ground truths(i.e., labels). The loss function is used to calculate this error. For example, the CrossEntropyLoss is widely used in image classification [27]. Example. Recall the app in Sec. III-A, its task is to identify mushrooms in an input image and predict their categories. Thus, the selected student model must be a model related to image classification. The image classification model VGGll [28] can be used as the student model to be trained with the labeled teaching dataset generated in Sec. III-A. Note that a general image classification model can be trained to identify mushrooms with a suitable dataset. ### III-C Adversarial Examples Generation With the trained student model in the previous step, the next step is to use the student model to generate adversarial examples that can spoof the teacher model. The adversarial examples are proved to have the property of transferability [29] which means that the adversarial examples generated for one model through an attack algorithm can also attack another model. Motivated by this, adversarial attack algorithms are utilized to generate adversarial examples based on the student model, and these generated adversarial examples can be directly applied to attack the teacher model in the victim app. Note that different domains (e.g., NLP, computer vision) require different adversarial attack algorithms. For example, in computer vision, the following algorithms can be representative: FGSM [22], RFGSM [30], FFGSM [31], MIFGSM [32], PGD [33], TPGD [34], and BIM [35]. Different attack algorithms can result in different attack performances. We discuss this correlation in Sec. IV-D. Figure 3: Distributions of attack success rate for differnet models ### III-D Robustness Evaluation Given a teacher model, the teaching dataset is divided into training and testing sets. The training set is used to train the student model and the testing set is used to generate adversarial examples. Compared with current methods [12] that use a very limited number of attack examples, our evaluation set is much larger and thus our results are more convincing. Suppose there are total $M$ inputs in the testing set for a deep learning app. $T$ (out of $M$) inputs can be correctly classified by the teacher model. These $T$ inputs are used to generate adversarial examples since it is inappropriate to generate an adversarial example when the input cannot be correctly recognized by the teacher model. Then we generate $T$ adversarial examples with the student model through an existing attack algorithm (e.g., FGSM [22]). These adversarial examples are then fed to the teacher model to obtain the prediction results. An attack is considered to be successful if the adversarial example is misclassified by the teacher model. If $Q$ out of $T$ adversarial examples are misclassified by the teacher model, then the attack success rate is: $p=\frac{Q}{T}$ (1) The quality of the student model is key to reach a high attack success rate. A qualified student model can imitate the behavior of the teacher model well and generate adversarial examples with higher transferability. These adversarial examples are more likely to spoof the teacher model [29]. Therefore, we conduct experiments to investigate the influence factors on the attack success rate of the student model, including the scale of the teaching dataset and the model structure of the student model. To further evaluate the effectiveness of our method, we conduct one control experiment that uses a random pre-trained model to generate adversarial examples termed as ‘blind attack’ (see Sec. IV-E). ## IV Evaluation ### IV-A Experiment Settings In the following experiments, We reuse 10 deep learning apps in the work of Huang et al. [12] so that we can compare our approach with theirs. Considering the workload of training student models and applying different attack methods to generate adversarial examples, it is not trivial to experiment on 10 apps. For example, one teaching dataset is ImageNet Large Scale Visual Recognition Challenge 2012 (ILSVRC2012) [36] whose size is above 138GB and the number of images is about 14 million. This takes more than a week for a computer with 8 NVIDIA Tesla K40s. Table I: 10 selected apps ID | App Name | Functionalities ---|---|--- 1 | Fresh Fruits | Identify if the fruit is rotten 2 | Image Checker | Image classifier based on ImageNet 3 | Tencent Map | Identify road condition 4 | Baidu Image | Identify flowers 5 | My Pokemon | Identify pokemon 6 | Palm Doctor | Identify skin cancer 7 | QQ browser | Identify plants 8 | Taobao | Identify products 9 | iQIYI | Identify actors 10 | Bei Ke | Identify scenes The selected apps are listed in Table.I. For convenience, in the following experiments, every app is represented by its ID instead of name. Deep learning functionalities of each app are also listed, which are useful for finding suitable dataset. Research questions (RQ) 1 to 3 discuss the relationship between attack performance and student structure (RQ1), teaching dataset size (RQ2), and hyper-parameter of attack algorithm (RQ3). We compare the attack success rates between our approach with [12] in RQ4. All these experiments111In the process of training student models, we set optimizer to SGD [37], loss function to CrossEntropyLoss [38], learning rate to 0.001, and epoch to 30. are conducted in a Linux box with Nvidia(R) GeForce RTX(TM) 3080 GPU and 128G RAM. ### IV-B RQ1: How the structure of the student model influences the attack rate. (a) Relationship of attack success rate and teaching dataset size (b) Relationship of student model accuracy and teaching dataset size Figure 4: Performance of attack and student model when varying teaching dataset size Motivation. The stronger the student model’s ability to imitate the teacher model is, the higher the final attack success rate is. Since the internal information of the teacher model is unknown, choosing the most similar student model by comparing weights and structure can be impossible. Therefore, in this RQ, we intend to explore how the structure of the student model influences the attack rate and analyze the underlying reasons. The attack rate is defined in Sec. III-D. Approach. This RQ explores how the structure of the student model influences the attack rate, so only one teacher model and only one attack algorithm are needed. In this RQ, we randomly select one app (i.e., No. 1). The deep learning model inside the app is considered as the teacher model, MIFGSM as the attack algorithm. The teaching dataset is a dataset from Kaggle [39] with 13.6K images. The teaching dataset is shuffled and then divided into training and testing sets at 4:1. We carefully select 16 student models that are qualified for this image classification task. These student models are grouped into four categories with the decrease of their model sizes and complexity: * • VGGs [28]: VGG11, VGG13, VGG16, VGG19; * • Resnets [40]: Resnet18, Resnet34, Resnet50, Resnet101, Resnet152; * • Densenets [41]: Densenet161, Densenet169, Densenet201; and * • Small nets: MobilenetV2 [42], ShufflenetV2 [43], Squeezenet [44], Googlenet [45]. Among the above four categories, VGGs have the highest complexity in terms of the number of weights, which is 3-4 times that of Resnets and Densenets, and 20-30 times that of Small nets. Resnets and Densenets have similar sizes and complexity. Result. Fig. 3 shows the comparison of attack performance among four student model categories. The abscissa represents attack success rates in percentage, and the ordinate gives four categories. In every single box, the triangle represents the mean of attack success rate and the line represents the median. The leftmost and rightmost edges represent minimum and maximum attack success rates in the corresponding categories. The attack success rates are divided into three segments. The first watershed is between Small nets and Resnets, the average attack success rate of Small nets is 29.4%, the minimum is 23.97% ($Q:T=637:2657$, where $Q$ and $T$ are defined in Sec. III-D), and the maximum is 32.86% ($873:2657$). The second watershed is between Densenets and VGGS. Densenets and Resnets who have similar model complexities also have similar attack success rates. Densenets’ average attack success rate is 37.82%, the minimum is 36.88% ($980:2657$), and the maximum is 38.92% ($1034:2657$). Resnets’ average attack success rate is 35.28%, the minimum is 33.68% ($895:2657$), and the maximum is 37.79% ($1004:2657$). The most successful student models are VGGs. Their average attack success rate is 51.44%, the minimum is 47.42% ($1260:2657$), and the maximum is 56.57% ($1503:2657$). Throughout the experiment, we found that a more sophisticated student model has a better opportunity and flexibility to adjust its weights to better imitate the teacher model. The better the student model imitates, the stronger the transferability of the adversarial examples generated by the student model is. Num. of apps. Due to page restriction, we only present the result of one app. We also perform the same experiments on other apps and observe the same trend on them. Answer to RQ1 To better imitate the teacher model and reach a higher attack success rate, a student model with a more complex structure is a better choice. Among 16 models in 4 categories, VGGs have a relatively high average attack success rate compared with other student model candidates. ### IV-C RQ2: How the scale of the teaching dataset can influence the attack rate. Figure 5: Relationship between attack success rate and paramater eps Motivation. Training a student model on a large teaching dataset consumes lots of time and computing resources. The size of the teaching dataset can influence the prediction accuracy of the student model. The prediction accuracy reflects how well the student model imitates the teacher model. Thus, this RQ explores how the scale of the teaching dataset can influence the attack rate. Approach. As this RQ explores how the scale of the teaching dataset influences the attack success rate, so only one teacher model, one attack algorithm, and one structure of the student model are needed. In this RQ, we randomly select one app (i.e., No.4) as the teacher model, MIFGSM as the attack algorithm, and VGG11 trained on a teaching dataset from TensorFlow [46] with 3.6K images as the student model. The teaching dataset is shuffled and then divided into training and testing sets at 4:1. The attack success rate and student model accuracy of each student model is evaluated on the same testing set. training sets are obtained from the left part of the teaching dataset. Note that without training, the method degenerated to ‘blind attack’. Result. Fig. 4(a) shows the relationship between the size of the teaching dataset (i.e., abscissa in Fig. 4(a)) and attack success rate (i.e., ordinate in Fig. 4(a)). For example, point (10, 28.28) represents that the attack success rate of the student model trained on the teaching dataset with 367 images (10% of original size) is 28.28%. Compared with the models trained on our teaching dataset (black points), the performance of blind attack (blue points) is 2-4 times worse. It proves that a teaching dataset generated by our pipeline is indispensable. To better reflect the relationship, trend line is based on a logarithmic function $y=a\cdot ln(b+x)+c$, where $a$, $b$ and $c$ control how well the trend line fits the scattered points. The trend line shows that the attack success rate increases rapidly and gradually stabilizes with the teaching dataset increases. With the increase of the scale of the teaching dataset, the student model can further adjust its weights, resulting in better imitation of the teacher model and higher transferability of generated adversarial examples. The reason for the gradual stabilization of the trend line needs to be explained with the help of Fig. 4(b). The abscissa in Fig. 4(b) represents the teaching dataset size, which is the percentage of the original dataset, and the ordinate represents the accuracy of the student model in percentage. For example, point (20, 86.02) represents that the prediction accuracy of the student model trained on the teaching dataset with 687 images (20% of original size) is 86.02%. Compared with other cases, a model without training (i.e., (0, 19.59) in Fig. 4(b)) has a poor performance. (20, 86.02) is a key point, after which the accuracy of the student model becomes stable. Higher accuracy means a higher model similarity between the student model and the teacher model. The key point (20, 86.02) in Fig. 4(b) represents that the imitation ability of the student model is close to its upper bound. Therefore, further increasing the teaching dataset brings negligible improvement in terms of the attack success rate. This is why the growth of attack success rate in Fig. 4(a) becomes stable after this key point. Num. of apps. Same as RQ1, we perform the same experiments on other apps and observe the same trend on other apps. Answer to RQ2 A teaching dataset generated by our pipeline is necessary for a high attack success rate. The accuracy of the student model increases as the size of the teaching dataset grows. The accuracy of the student model reflects how well it imitates the teacher model. When the accuracy of the student model reaches around 85%-90%, its imitation ability is close to the upper bound. Therefore, blindly increasing the teaching dataset contribute less to the attack performance. ### IV-D RQ3: How the hyper-parameter of attack algorithms influences the attack performance. (a) MIFGSM with $eps=4/255$ (b) MIFGSM with $eps=8/255$ (c) MIFGSM with $eps=12/255$ (d) MIFGSM with $eps=16/255$ (e) MIFGSM with $eps=20/255$ (f) BIM with $eps=4/255$ (g) BIM with $eps=8/255$ (h) BIM with $eps=12/255$ (i) BIM with $eps=16/255$ (j) BIM with $eps=20/255$ (k) PGD with $eps=4/255$ (l) PGD with $eps=8/255$ (m) PGD with $eps=12/255$ (n) PGD with $eps=16/255$ (o) PGD with $eps=20/255$ Figure 6: Comparison between adversarial example generated with different eps Motivation. The attack performance is evaluated on both the attack success rate and the degree of the added perturbation to the original input. A key property of the adversarial example is that it is generated by adding tiny perturbations to the original input. If perturbations are too large, they can be noticed by human beings. If the perturbations are too small, the attack success rate reduces. The following experiment explores how the hyper- parameters of attack algorithms can influence attack performance. Approach. This RQ explores how the hyper-parameters of attack algorithms influences the attack performance, so only one teacher model and one student model are needed. In this RQ, we randomly select one app (i.e., No.1) as the teacher model, VGG11 trained on a teaching dataset from Kaggle [39] with 13.6K images as the student model. The important hyper-parameter eps controls the degree of image perturbation in all seven attack algorithms (FGSM, BIM, RFGSM, PGD, FFGSM, TPGD, MIFGSM). eps varies from $4/255$ to $20/255$ with step $4/255$. The initial value $eps=4/255$ is a default value used by the author of these 7 attack algorithms [32, 22, 30, 31, 33, 34, 35]. We set the end value to $eps=20/255$. Although larger $eps$ can bring a higher attack success rate, the perturbations of the image also become larger. A higher degree of perturbations brings a more significant difference between the original input image and the adversarial example. As a result, people can distinguish the difference between the original input and the adversarial example. To ensure the degree of the perturbations is minuscule, the maximum of eps is set to $20/255$. This reduces the upper bound of the success rate but can ensure perturbations to be unperceivable. Result. As shown in Fig. 5, the attack success rate of FGSM ranges from 23.22% ($617:2657$) to 48.74% ($1295:2657$), RFGSM ranges from 1.96% ($52:2657$) to 48.85% ($1298:2657$), FFGSM ranges from 22.28% ($592:2657$) to 51.79% ($1376:2657$), TPGD ranges from 21.11% ($561:2657$) to 40.72% ($1082:2657$), MIFGSM ranges from 34.25% ($910:2657$) to 71.47% ($1899:2657$), BIM ranges from 34.36% ($913:2657$) to 62.93% ($1672:2657$), and PGD ($914:2657$) ranges from 34.40% ($1668:2657$) to 62.97%. All algorithms reach its highest attack succes rate with $eps=20/255$. Fig. 5 also indicates that different attack algorithms have different sensitivity to the adjustment of eps. However, $eps=8/255$ is an important watershed for all seven attack algorithms. When $eps\leq 8/255$, the attack success rate decrease rapidly. This is because that the perturbations are too minuscule to spoof the teacher model. Another important watershed is $eps=16/255$. As shown in Fig. 6, when $eps\geq 16/255$ ($4^{th}$ and $5^{th}$ colomun in Fig. 6) the adversarial examples have relatively large perturbations. Such perturbation can be detected by human beings, which causes the adversarial example unqualified. Since attack performance is determined by the success rate and the degree of perturbation, we evaluate the performance on both sides. $\bullet$ Attack success rate. MIFGSM shows the highest attack success rate through all 7 attack algorithms, reaching 71.47% when $eps=20/255$. Also, it can maintain a relatively rapid growth rate after the first watershed $eps=8/255$. The reason for its strong attack capability is that the adversarial examples generated by it are more transferable. Compared with other FGSM based attack algorithms, the highest attack success rates of FFGSM, RFGSM, and FGSM are 51.79%, 48.85%, and 48.74%, respectively. The reason why MIFGSM outperforms other algorithms is that it invites the momentum term into the iterative process [32]. $\bullet$ Degree of perturbation. Although the attack success rate of MIFGSM keeps increasing quickly after both watersheds, the perturbations in adversarial examples become detectable by the human visual system when $eps\geq 16/255$. This behavior is common among all 4 FGSM based attack algorithms, so adjusting eps to $16/255$ or higher is not recommended when using this type of algorithm. For BIM and PGD, the highest attack success rates of them are the same (62.93%). Although the attack success rate is less than MIFGSM’s, the degree of perturbation in their generated adversarial example is much smaller than MIFGSM. Therefore BIM and PGD with $eps\geq 16/255$ are recommended. Num. of apps. Same as RQ1, we perform the same experiments on other apps and observe the same trend on other apps. Answer to RQ3 An ideal eps interval is [8/255, 16/255]. Keeping eps in this interval can guarantee a higher attack success rate with limited added perturbation. ### IV-E RQ4: Comparison among our approach, ModelAttacker and blind attack Motivation. We compare the performance among our approach, ModelAttacker proposed by Huang et al. [12] and blind attack on 10 apps in Table. I. The experiment settings of ModelAttacker and blind attack are as same as our approach. Approach. The attack success rates of all apps in Table. I are tested with the best student model structure, the most cost-effective teaching dataset size, and attack algorithms with a suitable value of eps (defined in Sec. IV-D). Teaching dataset. The teaching datasets for most apps are fetched from public datasets, including Kaggle-Fruit [39] (No. 1), ILSVRC2012 [36] (No. 2, 8, 10), Kaggle-Road [47] (No. 3), Tendorflow-Flowers [46] (No. 4), Kaggle-Pokemon [48] (No. 5), and HAM10000 [49] (No. 6). For the other 2 apps (No. 7, 9), the teaching datasets are crawled from Google Images [50]. These datasets are available in our online artefact [13]. Each teaching dataset is shuffled and then divided into training and testing sets at 4:1. Student model. Based on the result of RQ1, we select VGG11 as the student model for all 10 apps. Attack algorithm. Based on the result of RQ3, we select MIFGSM as the attack algorithm and set $eps$ to $12/255$. Result. As shown in Fig. 7, the height of the first bar for each app represents our attack success rate, the second is for ModelAttacker, and the third is for the blind attack. Apps with No.4,5,6,7,10 can be attacked by the blind attack so the other 5 apps do not have the bars to show the results of blind attack. Figure 7: Comparison among our approach, ModelAttacker and blind attack The range of our attack success rate is from 34.98% to 91.10% and on average is 66.60%. Our approach does not need the weights and structures of deep learning models inside the victim apps. Although with these constraints, our approach still gets a higher attack success rate for 8 of 10 apps compared with ModelAttacker. Specifically, the attack success rate of our approach is 8.27% to 50.03% higher than ModelAttacker, and on average is 36.79% higher than ModelAttacker. For the left 2 apps, ModelAttacker can reach a higher attack success rate. This is because that they can compare the similarity between the victim model (i.e., teacher model) and their substitute model (i.e., student model) with the knowledge of weights and structure of the teacher model [12]. However, our approach is a black box attack so the weights and structure of the teacher model are unknown. Compared with blind attack which is the common basic black-box attack method, our approach can attack all 10 apps successfully while the blind attack can only attack 5 of them. Meanwhile, the attack success rate of our approach is at least 2.6 times higher than the blind attack. Answer to RQ4 Our approach can indeed effectively attack 10 selected deep learning apps, thus providing a new perspective and method for evaluating app reliability. Compared with existing methods, we can reach a relatively high attack success rate of 66.60% on average, outperforming others by 27.63%. ## V Discussion ### V-A Threats to Validity To minimize the bias of the results, all three experiments in this paper vary a single variable while fixing other variables to evaluate its impact on attack performance. Different from other studies on deep learning apps [11, 12], our experiments are based on a larger dataset and generate a considerable number of adversarial examples for the victim app in each experiment. Considering the workload of training, we select 10 apps that are also used by [12] to evaluate our approaches. Since the success rates of attacks are based on these apps, we do not attempt to generalize our results to all deep learning apps. ### V-B Limitations Our study has two limitations. The main limitation is that our approach only suitable for non-obfuscated apps. To get the teaching dataset from a teacher model inside the app, we have to locate and learn how the model is loaded and used in the app. However, if protection techniques, such as code obfuscation, are applied to the app, it can be hard to find the API patterns. Another limitation is that the pipeline developed in this paper focuses on computer vision apps. On the one hand, the existing studies [12, 11] on adversarial attacks are mainly in this field. It can be easy to compare our work with other approaches. On the other hand, adversarial attacks in other deep learning fields lack a widely accepted evaluation standard. Without widely adopted and convincing criteria, it can be unfair to compare the results of our approach with others [51, 52]. Thus, we only consider computer vision apps in our experiments. ### V-C Consequences of Proposed Attacks From the perspective of a malicious attacker, the adversarial examples can threaten users’ property, privacy, and even safety. Dong et al. [53] applied adversarial examples to a real-world face recognition system successfully. As a popular way to unlock devices, the breach of the face recognition system means users’ privacy is at risk of leakage. Although it is not easy to use adversarial examples in the real world, relevant research has made progress [54, 55, 56]. The threat of adversarial examples is worthy of attention. ### V-D Countermeasure According to the study by Sun et al. [10], only 59% of deep learning apps have protection methods for their models. To fill this gap, we propose several protection methods for both deep learning models and deep learning apps. Deep learning model protection scheme. To protect the deep learning model inside an app from black-box attacks, there are two practical solutions: $\bullet$ Using self-developed deep learning models instead of open-source models can reduce the probability of being attacked. For a self-developed deep learning model, it can be hard to find or train a qualified student model to imitate the teacher model. Without a qualified student model, it can be hard to reach a high attack success rate; and $\bullet$ Training the deep learning model on a private dataset instead of a public dataset can reduce the success rate of being attacked. The size of the teaching dataset is critical for training a qualified student model (See Sec. IV-C). If the deep learning model inside the app is trained on a public dataset, the attacker can find the same dataset with ease. A student model can gain a powerful imitating ability by being trained on the same dataset as the teacher model. As a result, the adversarial examples generated on the student model can spoof the teacher model with a high success rate. Deep learning app protection scheme. Using a self-developed deep learning model and collecting a private dataset is time-consuming and costly. There are also some common techniques to protect deep learning apps from being attacked [10, 11, 12]: $\bullet$ Code obfuscation can prevent attackers from finding out how the apps invoke the deep learning models. As a result, attackers cannot generate a labeled teaching dataset by instrumenting a DummyActivity. Thus, the attack method degenerates to the blind attack with a low attack success rate; $\bullet$ Hash code can prevent attackers from modifying the model inside the victim app. Li et al. [11] use images with special patterns to fool the models by adding specific layers into deep learning models inside apps. With hash code, such backdoor attacks can be detected with ease; and $\bullet$ Encryption can prevent attackers from knowing the structure and weights of the model. It is a fundamental method to protect the deep learning model inside the app. Without the knowledge of the victim model’s structure and weights, attackers can only rely on black-box attack methods, which can be time-consuming (i.e., finding dataset, training the student model). ## VI Related Work ### VI-A Substitute-based adversarial attacks To overcome black-box attacks’ unreachability to the internals of victim deep learning models, attackers can train a local model to mimic the victim model, which is called substitute training. With the in-depth study of black-box attacks on deep learning models, substitute-based adversarial attacks have received a lot of attention. Cui et al. [57] proposed an algorithm to generate the substitute model of CNN models by using knowledge distillation and boost the attacking success rate by 20%. Gao et al. [58] integrated linear augmentation into substitute training and achieved success rates of 97.7% and 92.8% in MNIST and GTSRB classifiers. In addition, some researchers studied substitute attacks from a data perspective. Wang et al. [59] proposed a substitute training approach that designs the distribution of data used in the knowledge stealing process. Zhou et al. [60] proposed a data-free substitute training method (DaST) to obtain substitute models by utilizing generative adversarial networks (GANs). However, the research on how to apply substitute- based adversarial attacks to the apps and the analysis of their performance is lacking. This paper fills the blank in this direction. ### VI-B Deep Learning Model Security of Apps Previous works on the security of deep learning models in mobile apps mainly focus on how to obtain information about the structure and weights of the model. Sun et al. [10] developed a pipeline that can analyze the model structure and weights and revealed that many deep learning models can not be extracted directly from mobile apps by decompiling the apks. Huang et al. [12] developed a pipeline to find the most similar model on TensorFlow Hub and then use it to generate adversarial examples. However, they still need to know the information of layers in the model to calculate similarity, which is used to find the most similar model on TensorFlow Hub for launching attacks. Different from Huang et al.’s work [12], we do not require the knowledge of the structure and weights of the model. Li et al. [11] proved the possibility to perform backdoor attacks on deep learning models and succeeded to use images with unique patterns to fool the models. To perform such attacks, Li et al. [11] modified the internal structure of the model inside the app. Whereas, as a black-box approach, we do not need to alter anything inside the deep learning model. Different from existing works, our work focuses on investigating the security of the deep learning models in mobile apps in a complete black-box manner. Our work offers a new perspective and shed the light on security research in deep learning models for mobile. ### VI-C Adversarial Attacks and Defenses to Deep Learning Model Adversarial attacks show their power in spoofing deep learning models related to computer vision. Researches on image classification attack methods account for a large part. The most popular technique is adversarial image perturbations (AIP) [61]. Dai et al. [62] developed an attack method based on genetic algorithms and gradient descent, which demonstrates that the Graph Neural Network models are vulnerable to these attacks. Stepan Komkov and Aleksandr Petiushko [63] proposed a reproducible technique to attack a real- world Face ID system. Baluja et al. [64] developed an Adversarial Transformation Network (ATN) to generate adversarial examples. It reaches a high success rate on MNIST-digit classifiers and Google ImageNet classifiers. As adversarial attacks pose a huge threat to deep learning models, researches on how to protect models from such attacks have also drawn wide attention. Li et al. [65] presented the gradient leaking hypothesis to motivate effective defense strategies. Liao et al. [66] proposed a high-level representation guided denoiser (HGD) as a defense for deep learning models related to image classification. Zhou et al. [67] proposed a defense method to improve the robustness of DNN-based image ranking systems. Cissé et al [68] proposed Parseval networks to improve robustness to adversarial examples. Alexandre et al. [69] used a Randomized Adversarial Training method to improve the robustness of deep learning neural networks. However, even though there are a lot of researches on the adversarial attack and defense methods of deep learning models, research on this topic about mobile apps is scant. Our work proves that a black-box attack on the deep learning model inside the apps is feasible and provides a new perspective to evaluate the robustness of deep learning apps. ## VII Conclusion In this paper, we propose a practical black-box attack approach on deep learning apps and develop a corresponding pipeline. The experiment on 10 apps shows that the average attack success rate reaches 66.60%. Compared with existing adversarial attacks on deep learning apps, our approach outperforms counterparts by 27.63%. We also discuss how student model structure, teaching dataset size, and hyper-parameters of attack algorithms can affect attack performance. ## References * [1] M. Xu, J. Liu, Y. Liu, F. X. Lin, Y. Liu, and X. Liu, “A first look at deep learning apps on smartphones,” in _Proceedings of WWW_ , 2019, pp. 2125–2136. * [2] “Tensorflow lite,” https://tensorflow.google.cn/lite/. * [3] “Pytorch mobile,” https://pytorch.org/mobile/home/. * [4] “Caffe2 mobile,” https://caffe2.ai/docs/mobile-integration.html. * [5] “Mindspore lite,” https://www.mindspore.cn/lite/en. * [6] “Coreml,” https://developer.apple.com/machine-learning/core-ml/. * [7] “Firebase-cloud vs on-device,” https://firebase.google.com/docs/ml#cloud_vs_on-device. * [8] A. McIntosh, S. Hassan, and A. Hindle, “What can android mobile app developers do about the energy consumption of machine learning?” _Empirical Software Engineering_ , vol. 24, no. 2, pp. 562–601, 2019. * [9] C. Kumar, R. Ryan, and M. Shao, “Adversary for social good: Protecting familial privacy through joint adversarial attacks,” in _Proceedings of AAAI_ , 2020, pp. 11 304–11 311. * [10] Z. Sun, R. Sun, L. Lu, and A. Mislove, “Mind your weight(s): A large-scale study on insufficient machine learning model protection in mobile apps,” in _Proceedings of the 30th USENIX Security Symposium_ , ser. Processings of USENIX Security, August 2021, pp. 1–17. * [11] Y. Li, J. Hua, H. Wang, C. Chen, and Y. Liu, “Deeppayload: Black-box backdoor attack on deep learning models through neural payload injection,” in _Proceedings of ICSE-SEIP_ , 2021, pp. 1–12. * [12] Y. Huang, H. Hu, and C. Chen, “Robustness of on-device models: Adversarial attack to deep learning models on android apps,” in _Proceedings of ICSE-SEIP_ , 2021, pp. 1–12. * [13] “Online artefact,” https://sites.google.com/view/blackbox-attack-on-dl-apps/home. * [14] X. Yin, X. Yu, K. Sohn, X. Liu, and M. Chandraker, “Feature transfer learning for face recognition with under-represented data,” in _Proceedings of CVPR_ , 2019, pp. 5704–5713. * [15] D. Zoran, M. Chrzanowski, P. Huang, S. Gowal, A. Mott, and P. Kohli, “Towards robust image classification using sequential attention models,” in _Proceedings of CVPR_ , 2020, pp. 9480–9489. * [16] J. Chen, C. Chen, Z. Xing, X. Xu, L. Zhut, G. Li, and J. Wang, “Unblind your apps: Predicting natural-language labels for mobile gui components by deep learning,” in _Proceedings of ICSE_ , 2020, pp. 322–334. * [17] P. Dong, S. Wang, W. Niu, C. Zhang, S. Lin, Z. Li, Y. Gong, B. Ren, X. Lin, and D. Tao, “Rtmobile: Beyond real-time mobile acceleration of rnns for speech recognition,” in _Proceedings of DAC_ , 2020, pp. 1–6. * [18] Q. Wang, H. Yin, T. Chen, Z. Huang, H. Wang, Y. Zhao, and N. Q. V. Hung, “Next point-of-interest recommendation on resource-constrained mobile devices,” in _Proceedings of WWW_ , 2020, pp. 906–916. * [19] “Tensorflow hub,” https://www.tensorflow.org/hub. * [20] “Mindspore,” https://www.mindspore.cn/lite/models/en. * [21] T. Tan and G. Cao, “Fastva: Deep learning video analytics through edge processing and npu in mobile,” in _Proceedings of INFOCOM_ , 2020, pp. 1947–1956. * [22] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” in _Proceedings of ICLR_ , 2015, pp. 1–11. * [23] “Soot:a java optimization framework,” https://github.com/soot-oss/soot. * [24] “Flowdroid,” https://github.com/secure-software-engineering/FlowDroid. * [25] “Tensorflow lite inference,” https://tensorflow.google.cn/lite/guide/inference#load_and_run_a_model_in_java. * [26] “Pytorch mobile inference,” https://pytorch.org/mobile/android/#api-docs. * [27] H. Takeda, S. Yoshida, and M. Muneyasu, “Learning from noisy labeled data using symmetric cross-entropy loss for image classification,” in _Proceedings on GCCE_ , 2020, pp. 709–711. * [28] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in _Proceedings of ICLR_ , 2015, pp. 1–14. * [29] Y. Liu, X. Chen, C. Liu, and D. Song, “Delving into transferable adversarial examples and black-box attacks,” in _Proceedings of ICLR_ , 2017, pp. 1–14. * [30] F. Tramèr, A. Kurakin, N. Papernot, I. J. Goodfellow, D. Boneh, and P. D. McDaniel, “Ensemble adversarial training: Attacks and defenses,” in _Proceedings of ICLR_ , 2018, pp. 1–22. * [31] H. Kim, “Torchattacks: A pytorch repository for adversarial attacks,” _arXiv preprint arXiv:2010.01950_ , pp. 1–6, 2020. * [32] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks with momentum,” in _Proceedings of CVPR_ , 2018, pp. 9185–9193. * [33] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models resistant to adversarial attacks,” in _Proceedings of ICLR_ , 2018, pp. 1–28. * [34] H. Zhang, Y. Yu, J. Jiao, E. P. Xing, L. E. Ghaoui, and M. I. Jordan, “Theoretically principled trade-off between robustness and accuracy,” in _Proceedings of ICML_ , 2019, pp. 7472–7482. * [35] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” in _Proceedings of ICLR_ , 2017, pp. 1–15. * [36] “Imagenet,” http://www.image-net.org/challenges/LSVRC/2012/index. * [37] “Pytorch sgd,” https://pytorch.org/docs/master/generated/torch.optim.SGD.html. * [38] “Pytorch crossentropyloss,” https://pytorch.org/docs/stable/generated/torch.nn.CrossEntropyLoss.html. * [39] “Kaggle dataset-fruit,” https://www.kaggle.com/sriramr/fruits-fresh-and-rotten-for-classification. * [40] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in _Proceedings of CVPR_ , 2016, pp. 770–778. * [41] G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, “Densely connected convolutional networks,” in _Proceedings of CVPR_ , 2017, pp. 4700–4708. * [42] M. Sandler, A. G. Howard, M. Zhu, A. Zhmoginov, and L. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in _Proceedings of CVPR_ , 2018, pp. 4510–4520. * [43] N. Ma, X. Zhang, H.-T. Zheng, and J. Sun, “Shufflenet v2: Practical guidelines for efficient cnn architecture design,” in _Proceedings of ECCV_ , 2018, pp. 116–131. * [44] F. N. Iandola, S. Han, M. W. Moskewicz, K. Ashraf, W. J. Dally, and K. Keutzer, “Squeezenet: Alexnet-level accuracy with 50x fewer parameters and¡ 0.5 mb model size,” _arXiv preprint arXiv:1602.07360_ , pp. 1–13, 2016. * [45] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in _Proceedings of CVPR_ , 2015, pp. 1–9. * [46] “Tensorflow dataset,” https://www.tensorflow.org/datasets/catalog/tf_flowers. * [47] “Kaggle dataset-road,” https://www.kaggle.com/virenbr11/pothole-and-plain-rode-images. * [48] “Kaggle dataset-pokemon,” https://www.kaggle.com/lantian773030/pokemonclassification. * [49] “Ham10000,” https://dataverse.harvard.edu/dataset.xhtml?persistentId=doi:10.7910/DVN/DBW86T. * [50] “Google images,” https://images.google.com/. * [51] J. Dong, Z. Guan, L. Wu, X. Du, and M. Guizani, “A sentence-level text adversarial attack algorithm against iiot based smart grid,” _Computer Networks_ , pp. 1–11, 2021. * [52] X. Wang, H. Jin, and K. He, “Natural language adversarial attacks and defenses in word level,” _arXiv preprint arXiv:1909.06723_ , pp. 1–16, 2019. * [53] Y. Dong, H. Su, B. Wu, Z. Li, W. Liu, T. Zhang, and J. Zhu, “Efficient decision-based black-box adversarial attacks on face recognition,” in _Proceedings of CVPR_ , 2019, pp. 7714–7722. * [54] L. Sun, M. Tan, and Z. Zhou, “A survey of practical adversarial example attacks,” _Cybersecur._ , pp. 1–9, 2018. * [55] A. Boloor, X. He, C. D. Gill, Y. Vorobeychik, and X. Zhang, “Simple physical adversarial examples against end-to-end autonomous driving models,” in _Proceedings of ICESS_ , 2019, pp. 1–7. * [56] X. Xu, J. Chen, J. Xiao, L. Gao, F. Shen, and H. T. Shen, “What machines see is not what they get: Fooling scene text recognition models with adversarial text images,” in _Proceedings of CVPR_ , 2020, pp. 12 304–12 314. * [57] W. Cui, X. Li, J. Huang, W. Wang, S. Wang, and J. Chen, “Substitute model generation for black-box adversarial attack based on knowledge distillation,” in _Proceedings of ICIP_ , 2020, pp. 648–652. * [58] X. Gao, Y.-a. Tan, H. Jiang, Q. Zhang, and X. Kuang, “Boosting targeted black-box attacks via ensemble substitute training and linear augmentation,” _Applied Sciences_ , pp. 1–14, 2019. * [59] W. Wang, B. Yin, T. Yao, L. Zhang, Y. Fu, S. Ding, J. Li, F. Huang, and X. Xue, “Delving into data: Effectively substitute training for black-box attack,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , 2021, pp. 4761–4770. * [60] M. Zhou, J. Wu, Y. Liu, S. Liu, and C. Zhu, “Dast: Data-free substitute training for adversarial attacks,” in _Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)_ , 2020, pp. 234–243. * [61] S. J. Oh, M. Fritz, and B. Schiele, “Adversarial image perturbation for privacy protection a game theory perspective,” in _Proceedings of ICCV_ , 2017, pp. 1491–1500. * [62] H. Dai, H. Li, T. Tian, X. Huang, L. Wang, J. Zhu, and L. Song, “Adversarial attack on graph structured data,” in _Proceedings of ICML_ , 2018, pp. 1115–1124. * [63] S. Komkov and A. Petiushko, “Advhat: Real-world adversarial attack on arcface face ID system,” _CoRR_ , pp. 1–9, 2019. * [64] S. Baluja and I. Fischer, “Learning to attack: Adversarial transformation networks,” in _Proceedings of AAAI_ , 2018, pp. 1–13. * [65] Y. Li, S. Cheng, H. Su, and J. Zhu, “Defense against adversarial attacks via controlling gradient leaking on embedded manifolds,” in _Proceedings of ECCV_ , 2020, pp. 753–769. * [66] F. Liao, M. Liang, Y. Dong, T. Pang, X. Hu, and J. Zhu, “Defense against adversarial attacks using high-level representation guided denoiser,” in _Proceedings of CVPR_ , 2018, pp. 1778–1787. * [67] M. Zhou, Z. Niu, L. Wang, Q. Zhang, and G. Hua, “Adversarial ranking attack and defense,” in _Proceedings of ECCV_ , 2020, pp. 781–799. * [68] M. Cissé, P. Bojanowski, E. Grave, Y. N. Dauphin, and N. Usunier, “Parseval networks: Improving robustness to adversarial examples,” in _Proceedings of ICML_ , 2017, pp. 854–863. * [69] A. Araujo, R. Pinot, B. Négrevergne, L. Meunier, Y. Chevaleyre, F. Yger, and J. Atif, “Robust neural networks using randomized adversarial training,” _CoRR_ , pp. 1–9, 2019.
arxiv-papers
2021-07-27T11:15:46
2024-09-04T03:07:21.290118
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Hongchen Cao, Shuai Li, Yuming Zhou, Ming Fan, Xuejiao Zhao and Yutian\n Tang", "submitter": "Hongchen Cao", "url": "https://arxiv.org/abs/2107.12732" }
2107.12733
Stress-driven two-phase integral elasticity for Timoshenko curved beams Preprint of the article published in Proceedings of the Institution of Mechanical Engineers, Part N: Journal of Nanomaterials, Nanoengineering and Nanosystems 235(1-2), February 2021, 52-63 Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de Sciarra, Marko Canadija, Raffaele Barretta https://doi.org/10.1177/2397791421990514 ⓒ 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ ###### Abstract In this research, the size-dependent static behaviour of elastic curved stubby beams is investigated by Timoshenko kinematics. Stress-driven two-phase integral elasticity is adopted to model size effects which soften or stiffen classical local responses. The corresponding governing equations of nonlocal elasticity are established and discussed, non-classical boundary conditions are detected and an effective coordinate-free solution procedure is proposed. The presented mixture approach is elucidated by solving simple curved small- scale beams of current interest in Nanotechnology. The contributed results could be useful for design and optimization of modern sensors and actuators. ###### keywords: Curved beams, size effects, integral elasticity, stress-driven mixture model, nanotechnology, MEMS/NEMS Raffaele Barretta Department of Structures for Engineering and Architecture University of Naples Federico II, via Claudio 21, 80125 - Naples, Italy. ## 1 Introduction Analysis and modelling of scale phenomena in micro- and nano-structures is a subject of current interest in Engineering Science (Farajpour et al., 2018). Development of simple and computationally convenient methodologies for design and optimization of modern devices (Tran et al., 2018; Basutkar, 2019a; Caplins et al., 2019; Ogi et al., 2019; Natsuki, 2019; Basutkar, 2019b; Ghayesh and Farokhi, 2020) and nanocomposites (Pourasghar and Chen, 2019; Eyvazian et al., 2020; Omari et al., 2020) has been the main motivation of numerous investigations. Crucial point is to take in due account small-scale effects which are technically significant and cannot be overlooked (Rafii- Tabar et al., 2016). Assessment of size effects can be advantageously performed by making recourse to tools and techniques of nonlocal continuum mechanics rather than time consuming atomistic approaches (Ghavanloo, 2019). Seminal treatments on nonlocal theory of elasticity, based on integro- differential formulations, were mainly conceived to be applied to engineering problems involving dislocations and waves (Rogula, 1965, 1976, 1982; Eringen, 1972). Basic concepts of nonlocal mechanics can be consulted in the paper by Bazant and Jirásek (2002). Strain-driven integral formulations were reverted by Eringen (1983) to more convenient sets of differential equations due to tacit and rapid vanishing of nonlocal fields governing relevant convolutions defined in unbounded domains. Such a mathematical scenario has been recently proven to be not permissible if strain-driven integral equations of pure elasticity are exploited in order to describe size effects in small-scale structures of technical interest. This issue has been comprehensively discussed by Romano et al. (2017a) and recently acknowledged by the scientific community, see e.g. (Sidhardh et al., 2020; Zhang et al., 2020; Dilena et al., 2019; Shahsavari et al., 2018; Vila et al., 2017). Several proposals have been contributed in literature to bypass the apparent conflict between equilibrium and non-classical constitutive boundary conditions associated with the strain- driven integral convolution. An example is the integral approach illustrated and applied to nanorods by Maneshi et al. (2020), framed in the research field of nonlocal models providing compensation of boundary effects (Pijaudier-Cabot and Bazánt, 1987; Borino et al., 2003; Polizzotto et al., 2004; Koutsoumaris et al., 2017; Fuschi et al., 2019). As applied by Polizzotto (2001), Eringen’s integral approach can be amended by considering a strain-driven two-phase (local/nonlocal) mixture (Eringen, 1987) which leads to well-posed elastostatic problems, provided that the local contribution is not vanishing (Romano et al., 2017b). The strain-driven mixture has been exploited by various authors (Khodabakhshi and Reddy, 2015; Wang et al., 2016; Fernández- Sáez and Zaera, 2017) to model straight structures in several papers and recently by Zhang et al. (2019) to study circular curved beams. Total remedy to difficulties and singularity of Eringen’s formulations in structural mechanics are overcome if the stress-driven integral methodology (Romano and Barretta, 2017) is adopted for modelling size effects. The well-posed approach has been recently extended by Barretta et al. (2018) to capture both softening and stiffening elastic responses characterizing small structural scales by proposing for straight beams a stress-driven two-phase (local/nonlocal) mixture which is non-singular for any local fraction. Motivation of the present paper is to generalize the aforementioned stress- driven mixture formulation to stubby curved beams which are basic structural components of modern micro- and nano-systems. The proposed methodology is valid for arbitrary geometry of beam axis and provides the following special treatments involving: 1. 1. stress-driven integral slender (Bernoulli-Euler) beams (Barretta et al., 2019b); 2. 2. stress-driven integral stubby (Timoshenko) beams with uniform geometric curvature of the structural axis (Zhang et al., 2020). While the strategies contributed by Barretta et al. (2019b); Zhang et al. (2020) are able to capture hardening structural behaviours for increasing nonlocal parameter, the approach developed in the present paper is conveniently able to model also softening elastic responses. Accordingly, the proposed model can be applied to a wider class of applicative problems in nanomechanics. The plan is the following. Timoshenko kinematic assumptions and ensuing equilibrium equations of curved beams are provided in the next section using a coordinate-free variational approach. Classical local constitutive equations of elasticity for stubby beams are recalled and extended in the section named: ”Stress-driven mixture model” to tackle two-phase local/nonlocal materials. The associated elastostatic problem is formulated and tackled by a simple solution procedure illustrated in the section entitled: ”Elastic equilibrium of Timoshenko curved nanobeams”. Selected case- studies of nanotechnological interest are then investigated and discussed. Closing remarks are outlined in the last section. ## 2 Kinematics and equilibrium of Timoshenko curved beams Let us consider a Timoshenko curved beam of length $L$ and denote by $\boldsymbol{\gamma}$ a regular curve of the plane $\,\boldsymbol{\pi}\,$ describing the beam axis and parameterized by the curvilinear abscissa $s\in[0,L]$. Figure 1: Sketch of a Timoshenko beam with local triad and kinematic parameters. At each point of the axis is associated a cross-section modeled by a two- dimensional domain $\Omega$. Denoting by $\,(\bullet)^{\prime}\,$ the derivative with respect to $s$, the tangent unit vectors field is defined as $\textbf{t}:=\boldsymbol{\gamma}^{\prime}$ (1) By applying the orthogonal linear transformation R , which performs the rotation by $\pi/2$ counterclockwise in the plane $\,\boldsymbol{\pi}\,$, the transversal unit vectors field is obtained as $\textbf{t}_{\bot}:=\textbf{R}\textbf{t}$ (2) Then, we introduce the uniform unit vectors field $\,\textbf{k}:=\textbf{t}\times\textbf{t}_{\bot}\,$. Since the curve $\boldsymbol{\gamma}$ is assumed to be regular, the vector $\textbf{t}^{\prime}$ is defined at each abscissa $s$. Thus, introducing the scalar geometric curvature of the beam axis $\,c:=\|\textbf{t}^{\prime}\|\,$, the normal unit vector is defined by $\,\mathbf{n}:=\textbf{t}^{\prime}/c\,$. Vectors $\,\textbf{t}_{\bot}\,$ and $\,\mathbf{n}\,$ are related as (Romano, 2002) $\,\textbf{t}_{\bot}=(\textbf{t}_{\bot}\cdot\mathbf{n})\,\mathbf{n}\,$. The kinematic hypothesis of the Timoshenko beam model is that cross-sections are hinged to the beam axis; thus, denoting by $\,V\,$ the linear space of translations, the velocity $\,\mathbf{v}:[0,\textrm{L}]\mapsto V\,$ of the beam axis and the angular velocity of cross sections $\,\omega:[0,\textrm{L}]\mapsto\Re\,$ are independent parameters describing the beam kinematics. The tangent deformation field kinematically compatible with $\mathbf{w}=\\{\mathbf{v},\>\omega\\}$ is composed of axial strain, shear strain and flexural curvature scalar fields, i.e. $\\{\varepsilon_{\mathbf{w}},\gamma_{\mathbf{w}},\chi_{\mathbf{w}}\\}:[0,L]\mapsto\Re$. $\mathbf{D}_{\mathbf{w}}=\begin{vmatrix}\varepsilon_{\mathbf{w}}\\\ \gamma_{\mathbf{w}}\\\ \chi_{\mathbf{w}}\end{vmatrix}=\begin{vmatrix}\mathbf{v}^{\prime}\cdot\textbf{t}\\\ (\mathbf{v}^{\prime}\cdot\textbf{t}_{\bot})-\omega\\\ \omega^{\prime}\end{vmatrix}$ (3) By duality with the tangent deformation field $\mathbf{D}_{\mathbf{w}}$, the stress $\,\boldsymbol{\sigma}\,$ in a Timoshenko beam is composed of axial force, shear force and bending moment scalar fields, that is $\\{N,T,M\\}:[0,L]\mapsto\Re\,$. $\boldsymbol{\sigma}=\begin{vmatrix}N\\\ T\\\ M\end{vmatrix}$ (4) Equilibrium is expressed by the variational condition that the external virtual power of the force system l is equal to the internal virtual power of the stress $\,\boldsymbol{\sigma}\,$, for any virtual translation velocity and angular velocity, i.e. $\delta\mathbf{w}=\\{\delta\mathbf{v},\>\delta\omega\\}$, fulfilling homogeneous kinematic boundary conditions $\displaystyle{\langle}\kern 1.00006pt\textbf{{l}},\delta\mathbf{w}\kern 1.00006pt{\rangle}=\int_{0}^{L}\boldsymbol{\sigma}(s)\cdot\mathbf{D}_{\delta\mathbf{w}}(s)\,ds$ (5) Integrating by parts Eq. (5) we get vector differential equation and boundary conditions ruling equilibrium between stress $\,\boldsymbol{\sigma}\,$ and external force system l which is composed of a distributed vector loading $\,\mathbf{p}:[0,L]\mapsto V\,$, distributed bending couples $\,m:[0,L]\mapsto\Re\,$, boundary concentrated forces $\,{\mathbf{F}}_{0}\in V\,$ and $\,{\mathbf{F}}_{L}\in V\,$ and boundary concentrated bending couples $\,\mathcal{M}_{0}\in\Re\,$ and $\,\mathcal{M}_{L}\in\Re\,$. Then, projecting the vector differential equation of equilibrium along t and $\textbf{t}_{\bot}$ directions we get the following differential problem in $\,[0,\textrm{L}]\,$ $\left\\{\begin{aligned} &N^{\prime}-T\,\textbf{t}_{\bot}\cdot\textbf{t}^{\prime}=-\mathbf{p}\cdot\textbf{t}\,\\\ &T^{\prime}-N\,\textbf{t}\cdot\textbf{t}_{\bot}^{\prime}=-\mathbf{p}\cdot\textbf{t}_{\bot}\,\\\ &T+M^{\prime}=-m\end{aligned}\right.$ (6) equipped with the boundary conditions at $\,s=0\,$ and $\,s=L\,$ $\left\\{\begin{aligned} -(N\textbf{t}+T\textbf{t}_{\bot})(0)\cdot\delta\mathbf{v}(0)&={\mathbf{F}}_{0}(0)\cdot\delta\mathbf{v}(0)\,\\\ (N\textbf{t}+T\textbf{t}_{\bot})(L)\cdot\delta\mathbf{v}(L)&={\mathbf{F}}_{0}(L)\cdot\delta\mathbf{v}(L)\,\\\ -M(0)\;\delta\omega(0)&=\mathcal{M}_{0}\;\delta\omega(0)\,\\\ M(L)\;\delta\omega(L)&=\mathcal{M}_{L}\;\delta\omega(L)\,\end{aligned}\right.$ (7) From Eqs. (7), natural static boundary conditions follow from essential kinematic boundary conditions related to the assigned constraints. When essential boundary conditions are not prescribed, i.e. virtual translation velocity $\,\delta\mathbf{v}\,$ and angular velocity $\,\delta\omega\,$ are arbitrary, the corresponding natural static conditions from Eqs. (7) are: $\left\\{\begin{aligned} -(N\textbf{t}+T\textbf{t}_{\bot})(0)&={\mathbf{F}}_{0}(0)\,\\\ (N\textbf{t}+T\textbf{t}_{\bot})(L)&={\mathbf{F}}_{0}(L)\,\\\ -M(0)&=\mathcal{M}_{0}\,\\\ M(L)&=\mathcal{M}_{L}\end{aligned}\right.$ (8) Explicit prescriptions of essential and natural boundary conditions for usual constraints adopted in structural mechanics are provided in the section named ”Case-studies”. ## 3 Stress-driven mixture model In this section we will first recall the classical theory of local elasticity for a Timoshenko curved beam. Let us denote by $\,E\,$ and $\,G\,$ Euler-Young and shear moduli, respectively. $\,A\,$ stands for cross-sectional area and $\,J_{c}\,$ is the moment of inertia along the bending axis $\eta$ which is identified by the direction of the transversal unit vector $\,\textbf{t}_{\bot}\,$, that is: $J_{c}=\int_{\Omega}\eta^{2}\frac{1}{1-c\,\eta\>(\textbf{n}\cdot\textbf{t}_{\bot})}\,dA\,$ (9) The constitutive equations of local elasticity for curved beams are expressed following the treatments by Winkler (1858); Baldacci (1983), generalized by the presence of $\textbf{n}\cdot\textbf{t}_{\bot}$, that is $\left\\{\begin{aligned} \varepsilon_{l}(s)&=\frac{1}{EA}\biggr{[}N+\frac{\textit{c}\,M}{\textbf{n}\cdot\textbf{t}_{\bot}}\biggr{]}(s)\,\\\ \chi_{l}(s)&=\frac{M}{EJ_{c}}(s)+(\textbf{n}\cdot\textbf{t}_{\bot})\frac{\textit{c}}{EA}\biggr{[}N+\frac{\textit{c}\,M}{\textbf{n}\cdot\textbf{t}_{\bot}}\biggr{]}(s)\,\\\ \gamma_{l}(s)&=\bigg{[}\frac{T}{GK_{r}}\bigg{]}(s)\end{aligned}\right.$ (10) where the equilibrium differential equation $T+M^{\prime}=-m$ has been considered in Eq. (10)3, assuming vanishing distributed bending couples. $K_{r}$ in Eq. (10)3 is the shear stiffness for a curved beam defined as follows $K_{r}^{-1}=\int_{\Omega}\frac{r^{2}}{{[r-\eta(\textbf{n}\cdot\textbf{t}_{\bot})]}^{2}\>b^{2}}\bigg{[}\frac{S_{c}}{J_{c}}-\frac{A^{*}}{(\textbf{n}\cdot\textbf{t}_{\bot})rA}\bigg{]}^{2}\,dA$ (11) where $r=1/c$ is the curvature radius and $S_{c}$ is the static moment of $A^{*}$, that is $S_{c}:=\int_{\Omega^{*}}\frac{\eta}{1-c\,\eta\>(\textbf{n}\cdot\textbf{t}_{\bot})}\,dA^{*}$ (12) For a Timoshenko curved nanobeam the nonlocal elastic deformation fields are expressed by the stress-driven mixture model consisting in a convex combination of the local response in Eq. (10) and a nonlocal response obtained by a convolution between the local field and a scalar averaging kernel $\,\phi:\Re\mapsto[0;+\infty[$. Let preliminarily inticate with i and f the vectors collecting source and output fields, i.e.: $\textbf{i}=\\{\varepsilon_{l},\chi_{l},\gamma_{l}\\};\>\textbf{f}=\\{\varepsilon,\chi,\gamma\\}$. Then, by denoting with $0\leq m\leq 1$ the mixture parameter and with $l_{c}$ a positive nonlocal length parameter, the stress-driven mixture model is expressed as follows $\textbf{f}(s)=m\>\textbf{i}(s)+(1-m)\>\int_{0}^{L}{\phi_{\l_{c}}(s,\xi)\>\textbf{i}(\xi)\>d\xi}$ (13) which is a Fredholm integral equation of the second kind in the unknown source field i. The averaging kernel is assumed to be the special bi-exponential function adopted by Eringen (1983), that is $\phi_{\l_{c}}(s)=\frac{1}{2\l_{c}}\exp(-\frac{|s|}{\l_{c}})\,$ (14) By extending to Timoshenko curved beams the Mixture equivalence by Romano et al. (2017b, Lemma 2), it can be proved that the integral convolutions in Eq. (13) is equivalent to the following differential equation $\frac{\textbf{f}(s)}{\l_{c}^{2}}-\,\partial_{s}^{2}\textbf{f}(s)=\frac{\textbf{i}(s)}{\l_{c}^{2}}-m\>\partial_{s}^{2}\textbf{i}(s)$ (15) equipped with the constitutive boundary conditions $\left\\{\begin{aligned} &\partial_{s}\textbf{f}(0)=\frac{1}{\l_{c}}\,\textbf{f}(0)+m\>\bigg{(}\partial_{s}\textbf{i}(0)-\frac{\textbf{i}(0)}{\l_{c}}\bigg{)}\,\\\ &\partial_{s}\textbf{f}(L)=-\frac{1}{\l_{c}}\,\textbf{f}(L)+m\>\bigg{(}\partial_{s}\textbf{i}(L)+\frac{\textbf{i}(L)}{\l_{c}}\bigg{)}\end{aligned}\right.$ (16) The stress-driven mixture model in Eq. (13) is purely nonlocal when $m=0$ and purely local when $m=1$. Since the model is based on two parameters (i.e. mixture and nonlocal length parameters) it is able to provide softening or stiffening responses as shown in the section ”Case-studies” and therefore can effectively model a wide range of nano-engineering problems. ## 4 Elastic equilibrium of Timoshenko curved nanobeams Let us consider the linearized, plane and curved Timoshenko beam model and denote by $\,\textbf{u}:[0,\textrm{L}]\mapsto V\,$ the displacement vector field of the structural axis and by $\,\varphi:[0,\textrm{L}]\mapsto\Re\,$ the scalar field of rotations of cross-sections. From Eq. (3), the kinematically compatible deformation field $\,\mathbf{D}_{\textbf{w}}\,$ associated with $\textbf{w}=\\{\textbf{u},\varphi\\}$ is composed of axial strain $\varepsilon_{\textbf{w}}:[0,L]\mapsto\Re$, shear strain $\gamma_{\textbf{w}}:[0,L]\mapsto\Re$ and flexural curvature $\chi_{\textbf{w}}:[0,L]\mapsto\Re$ scalar fields. $\mathbf{D}_{\textbf{w}}=\begin{vmatrix}\varepsilon_{\textbf{w}}\\\ \gamma_{\textbf{w}}\\\ \chi_{\textbf{w}}\end{vmatrix}=\begin{vmatrix}\textbf{u}^{\prime}\cdot\textbf{t}\\\ (\textbf{u}^{\prime}\cdot\textbf{t}_{\bot})-\varphi\\\ \varphi^{\prime}\end{vmatrix}$ (17) Hence, by virtue of Eq. (17)3, the scalar field of rotations is expressed by the following integration formula $\varphi(s)=\varphi(0)+\int_{0}^{s}\chi_{\textbf{w}}(\xi)\,d\xi\,$ (18) Let us consider the subsequent additive decomposition where Eq. (17)${}_{1,2}\,$ is taken into account $\textbf{u}^{\prime}=(\textbf{u}^{\prime}\cdot\textbf{t})\,\textbf{t}+(\textbf{u}^{\prime}\cdot\textbf{t}_{\bot})\,\textbf{t}_{\bot}=\varepsilon_{\textbf{w}}\,\textbf{t}+(\gamma_{\textbf{w}}+\varphi)\,\textbf{t}_{\bot}\,$ (19) with $\,\varphi\,$ given by Eq. (18). By integrating the previous equation, the displacements field u can be expressed as follows $\begin{split}\textbf{u}(s)&=\textbf{u}(0)+\int_{0}^{s}\textbf{u}^{\prime}d\xi\,\\\ &=\textbf{u}(0)+\int_{0}^{s}[\varepsilon_{\textbf{w}}(\xi)\,\textbf{t}(\xi)+(\gamma_{\textbf{w}}(\xi)+\varphi(\xi))\,\textbf{t}_{\bot}(\xi)]\,d\xi\,\end{split}$ (20) Thus, the local-nonlocal mixture elastostatic problem of a Timoshenko curved beam is composed of the differential equilibrium equations (6) equipped with the boundary conditions (7), the constitutive equations provided by the integral convolutions in Eq. (13) (or by the equivalent differential problem in Eqs. (15)-(16)) and the kinematic compatibility condition expressed by Eqs. (18) and (20). The integration constants $\,\varphi(0)\in\Re\,$ and $\,\textbf{u}(0)\in V\,$ are univocally evaluated by prescribing essential kinematic boundary conditions. ## 5 Case-studies The procedure to solve the elastostatic problem of a Timoshenko nonlocal curved beam is now illustrated with reference to some cases of applicative interest in Nanotechnology. A silicon carbide nanobeam, with Euler-Young modulus $E=427\>$ [GPa] and Poisson ratio $\nu=0.2$ is considered. The beam axis is assumed to be a circle arc of radius $r=10\>$ [nm] so that the beam length is $L=r\,\pi/2$. The cross-section is a rectangular domain $\Omega$ of base $b=5~{}$[nm] and height $h=2L/3$. In the present section, the following non-dimensional nonlocal parameter is adopted $\lambda=\frac{l_{c}}{L}$ (21) where $l_{c}$ is the nonlocal characteristic length parameter. A simple procedure is proposed in order to solve the elastostatic problem of the curved nanobeam introduced above and to investigate size-dependent responses. It consists of the following steps. * • Step 1. Solution of the differential equilibrium problem in Eqs. (6)-(7) to obtain the stress fields composed of axial force $N$, shear force $T$ and bending moment $M$ as functions of $n$ integration constants, with $n$ standing for redundancy degree. For statically determinate beams for which $n=0$, the stress fields are univocally determined by equilibrium requirements. * • Step 2. Evaluation of nonlocal strain fields by applying the nonlocal stress- driven mixture model in Eq. (13) or by solving the equivalent differential problem governed by Eqs. (15)-(16). * • Step 3. Detection of curved nanobeam nonlocal displacements u and rotations $\varphi$ fields by imposing $3+n$ essential kinematic boundary conditions. Note that in the case-studies presented in this section, total deformations and elastic deformation fields are assumed to be coincident. Cantilever beam under point-force at free end The curved nanobeam introduced above is clamped at the abscissa $\,s=0\,$ and subjected to a force $\,F=10\,$ [nN] applied at free end, as shown in Fig. 2. Hence, the essential kinematic boundary conditions are $\textbf{u}(0)=\mathbf{o}\,\qquad\varphi(0)=0\,$ (22) From Eqs. (7) and (22) follows that natural static boundary conditions are expressed by $\begin{cases}N(L)&=0\\\ T(L)&=F\\\ M(L)&=0\end{cases}$ (23) Figure 2: Cantilever curved nanobeam. Since the redundancy degree $\,n\,$ is vanishing, by following $Step~{}1$ the stress fields of axial force $N$, shear force $T$ and bending moment $M$ are univocally determined by equilibrium requirements in Eqs. (6)-(7) and their parametric expressions are provided below: $\begin{cases}&N(s)=F\,\cos\big{(}s/r\big{)}\\\ &T(s)=F\,\sin\big{(}s/r\big{)}\\\ &M(s)=F\,r\cos\big{(}s/r\big{)}\end{cases}$ (24) Transversal displacements $u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$, axial displacements $u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations $\varphi$ are obtained by following $Steps~{}2$-$\,3$ and then plotted as fuction of $s\in[0,L]$ as shown in Figs. 6 \- 8. In particular Figs. 6 \- 8 represent displacements and rotations of the nanocantilever for increasing values of the nonlocal parameter $\lambda$, for fixed values of the mixture parameter. As also shown by numerical results in Tab. 1, the response stiffens for increasing values of the nonlocal parameter $\lambda$ and exhibits a softening behavior by increasing the mixture parameter $m$. Slider and roller supported beam under uniformly distributed loading The curved nanobeam has a slider and a roller supports, at $s=0$ and $s=L$ respectively. It is subjected to a uniformly distributed vertical loading $\,q=2\,$ [nN/nm] directed upwards as shown in Fig. 3. Now, the essential kinematic boundary conditions are $\textbf{u}(0)\cdot\textbf{t}(0)=0\,\qquad\varphi(0)=0\,\qquad\textbf{u}(L)\cdot\textbf{t}(L)=0\,$ (25) From Eqs. (7) and (22) follows that natural static boundary conditions are expressed by $\left\\{\begin{split}T(0)&=0\,\\\ T(L)&=0\,\\\ M(L)&=0\,\end{split}\right.$ (26) Figure 3: Curved nanobeam with slider and roller supports. Since the beam is statically determinate, the stress fields $\,N\,,T\,,M\,$ are univocally obtained by equilibrium conditions and their parametric expressions as function of the arch length are shown as follows: $\begin{cases}&N(s)=q\,r\sin^{2}\big{(}s/r\big{)}\\\ &T(s)=-\frac{1}{2}q\,r\sin\big{(}2s/r\big{)}\\\ &M(s)=-\frac{1}{2}q\,r^{2}\cos^{2}\big{(}s/r\big{)}\end{cases}$ (27) Then, the transversal displacements $u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$, axial displacements $u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations $\varphi$ are obtained by following $Steps~{}2$-$\,3$ and represented in Figs. 9 \- 11 as function of $\lambda$ for fixed values of the mixture parameters $m$. Numerical results in terms of displacements and rotations are provided in Tab. 2. Clamped and roller supported beam under uniformly distributed loading Let us consider a curved nanobeam with clamped and roller supported ends, at $s=0$ and $s=L$ respectively. It is subjected to a uniformly distributed vertical loading $\,q=5\,$ [nN/nm] directed upwards as shown in Fig. 4. Hence, the essential kinematic boundary conditions are $\textbf{u}(0)=0\,\qquad\varphi(0)=0\,\qquad\textbf{u}(L)\cdot\textbf{t}(L)=0\,$ (28) From Eqs. (7) and (28) the corrisponding natural static boundary conditions take the form $\left\\{\begin{split}T(L)&=0\,\\\ M(L)&=0\,\end{split}\right.$ (29) Figure 4: Clamped and roller supported curved nanobeam. Axial force $N$, shear force $T$ and bending moment $M$ are solutions of the differential equilibrium problem in Eqs. (6)-(29) and since the redundancy degree is $n=1$, the stress fields are functions of one integration costant. Parametric nonlocal strain fields are obtained by the integral stress-driven mixture model in Eq. (13) or by solving the equivalent differential problem in Eqs. (15)-(16). Then, nonlocal displacements u and rotations $\varphi$ are detected by imposing the $3+n$ essential kinematic boundary conditions in Eq. (28). The static fields of axial force $\,\textbf{R}N\textbf{t}=N\textbf{t}_{\bot}\,$, shear force $\,T\textbf{t}_{\bot}\,$ and bending moment $\,\textbf{R}M\textbf{k}=-M\textbf{t}_{\bot}\,$, parameterized in terms of the arch length $s$, are graphically represented in Figs. 12, 13, 14, respectively. A schematic sketch of cross section with the local triad and the vectors $\textbf{R}M\textbf{k}\,$ and $\textbf{R}N\textbf{t}$ is depicted in Fig. 5. Figure 5: Sketch of cross section with local triad and bending $\textbf{R}M\textbf{k}\,$ and axial $\textbf{R}N\textbf{t}$ vectors. Transversal displacements $u_{t_{\bot}}=\textbf{u}\cdot\textbf{t}_{\bot}$, axial displacements $u_{t}=\textbf{u}\cdot\textbf{t}$ and bending rotations $\varphi$ are plotted versus $s\in[0,L]$ in Figs. 15 \- 17. As it is shown in the parametric plots, the response stiffens for increasing nonlocal parameter $\lambda$ and exhibits a softening behavior by increasing the mixture parameter $m$. This trend is also confirmed by numerical results provided in Tab. 3. Remark. It is worth noting that for vanishing geometric curvature and mixture parameters, solution procedures and results of the case-studies illustrated in this section are coincident with the ones provided by Barretta et. al(B, 2018) for straight Timoshenko nanobeams. An alternative solution methodolody for straight thick nonlocal beams based on Laplace trasform has been recently proposed by Zhang et al.(ZhangJ, 2019). (a) (b) Figure 6: Cantilever beam: nonlocal transversal displacement $u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 7: Cantilever beam: nonlocal axial displacement $u_{\textbf{t}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 8: Cantilever beam: nonlocal bending rotation $\varphi$ [-] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 9: Slider and roller supported beam: nonlocal transversal displacement $u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 10: Slider and roller supported beam: nonlocal axial displacement $u_{\textbf{t}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 11: Slider and roller supported beam: nonlocal bending rotation $\varphi$ [-] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. Figure 12: Clamped and roller supported beam: plot of the vector field $\textbf{R}N\textbf{t}=N\textbf{t}_{\bot}$ [10 nN] in the Cartesian plane x [nm], y [nm] for $\lambda=0.5$ and $m=0.3$. Figure 13: Clamped and roller supported beam: plot of the vector field $T\textbf{t}_{\bot}$ [10 nN] in the Cartesian plane x [nm], y [nm] for $\lambda=0.5$ and $m=0.3$. Figure 14: Clamped and roller supported beam: plot of the vector field $\textbf{R}M\textbf{k}=-M\textbf{t}_{\bot}$ [20 nN nm] in the Cartesian plane x [nm], y [nm] for $\lambda=0.5$ and $m=0.3$. (a) (b) Figure 15: Clamped and roller supported beam: nonlocal transversal displacement $u_{\textbf{t}_{\bot}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 16: Clamped and roller supported beam: nonlocal axial displacement $u_{\textbf{t}}$ [nm] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. (a) (b) Figure 17: Clamped and roller supported beam: nonlocal bending rotation $\varphi$ [-] versus $s\in[0,L]$ [nm] as fuction of $\lambda$. $\lambda$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $u_{t}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(L)\>[10^{-2}nm]$ ---|---|---|---|--- | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ 0,1 | 4,131 | 4,289 | -2,633 | -2,732 | 3,808 | 3,916 | 4,899 | 5,085 0,2 | 3,744 | 4,068 | -2,406 | -2,602 | 3,528 | 3,756 | 4,450 | 4,829 0,3 | 3,414 | 3,879 | -2,209 | -2,490 | 3,264 | 3,605 | 4,066 | 4,609 0,4 | 3,149 | 3,728 | -2,048 | -2,398 | 3,037 | 3,475 | 3,756 | 4,432 0,5 | 2,939 | 3,608 | -1,916 | -2,323 | 2,847 | 3,367 | 3,509 | 4,291 0,6 | 2,770 | 3,511 | -1,809 | -2,261 | 2,690 | 3,277 | 3,308 | 4,176 0,7 | 2,632 | 3,432 | -1,721 | -2,211 | 2,558 | 3,202 | 3,145 | 4,083 0,8 | 2,518 | 3,367 | -1,647 | -2,169 | 2,447 | 3,138 | 3,008 | 4,005 0,9 | 2,422 | 3,312 | -1,584 | -2,133 | 2,352 | 3,084 | 2,894 | 3,939 Table 1: Cantilever beam: numerical outcomes. $\lambda$ | $u_{\bot}(0)\>[10^{-2}nm]$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(0)\>[10^{-2}nm]$ ---|---|---|---|--- | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ 0,1 | 3,665 | 3,809 | -3,527 | -3,652 | -3,945 | -4,073 | 3,665 | 3,809 0,2 | 3,321 | 3,613 | -3,196 | -3,463 | -3,652 | -3,905 | 3,321 | 3,613 0,3 | 3,030 | 3,447 | -2,911 | -3,300 | -3,383 | -3,751 | 3,030 | 3,447 0,4 | 2,798 | 3,314 | -2,683 | -3,170 | -3,152 | -3,619 | 2,798 | 3,314 0,5 | 2,613 | 3,208 | -2,502 | -3,067 | -2,959 | -3,509 | 2,613 | 3,208 0,6 | 2,464 | 3,123 | -2,357 | -2,984 | -2,797 | -3,417 | 2,464 | 3,123 0,7 | 2,342 | 3,054 | -2,239 | -2,916 | -2,662 | -3,339 | 2,342 | 3,054 0,8 | 2,241 | 2,996 | -2,141 | -2,860 | -2,547 | -3,274 | 2,241 | 2,996 0,9 | 2,156 | 2,947 | -2,058 | -2,813 | -2,450 | -3,218 | 2,156 | 2,947 Table 2: Slider and roller supported beam: numerical outcomes. $\lambda$ | $u_{\bot}(L)\>[10^{-2}nm]$ | $\varphi(L)\>[10^{-3}]$ | $u^{tot}_{max}(s^{*})\>[10^{-2}nm]$ | $u^{tot}_{max}(s^{*})\>[10^{-2}nm]$ ---|---|---|---|--- | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ | $m=0.3$ | $m=0.6$ 0,1 | -1,036 | -1,135 | -1,658 | -1,751 | 1,136 $s^{*}$ = 5,892 | 1,241 $s^{*}$ = 5,738 0,2 | -0,815 | -1,010 | -1,474 | -1,648 | 0,921 $s^{*}$ = 6,041 | 1,117 $s^{*}$ = 5,788 0,3 | -0,667 | -0,926 | -1,330 | -1,568 | 0,787 $s^{*}$ = 6,063 | 1,041 $s^{*}$ = 5,774 0,4 | -0,574 | -0,874 | -1,221 | -1,506 | 0,703 $s^{*}$ = 6,042 | 0,993 $s^{*}$ = 5,750 0,5 | -0,515 | -0,840 | -1,137 | -1,458 | 0,648 $s^{*}$ = 6,009 | 0,962 $s^{*}$ = 5,727 0,6 | -0,477 | -0,818 | -1,072 | -1,421 | 0,609 $s^{*}$ = 5,974 | 0,940 $s^{*}$ = 5,707 0,7 | -0,450 | -0,802 | -1,020 | -1,391 | 0,580 $s^{*}$ = 5,940 | 0,923 $s^{*}$ = 5,691 0,8 | -0,431 | -0,791 | -0,977 | -1,366 | 0,559 $s^{*}$ = 5,910 | 0,911 $s^{*}$ = 5,678 0,9 | -0,418 | -0,784 | -0,942 | -1,346 | 0,542 $s^{*}$ = 5,884 | 0,902 $s^{*}$ = 5,667 Table 3: Clamped and roller supported beam: numerical outcomes. ## 6 Closing remarks The stress-driven mixture model of elasticity developed by Barretta et al. (2018) for straight structures has been generalized in the present paper to model and assess size effects in small-scale curved stubby beams. The relevant elastostatic problem has been preliminarily formulated by making recourse to Timoshenko kinematic theory, shown to be mathematically well-posed and analytically addressed by a simple and effective coordinate-free solution procedure. Selected case-studies of current interest in nano-mechanics have been studied and corresponding closed-form solutions have been detected by exploiting the aforementioned solution technique. Advantageously, the presented approach, driven by two parameters, has been proven to be able to simulate both softening and stiffening responses when compared with classical local structural behaviours. Thus, the new methodology is technically appropriate for design and optimize the size-dependent nonlocal behaviour of a wide class of new-generation technological devices, such as Micro- and Nano-Electro-Mechanical Systems (M/NEMS) composed of small-scale curved beams. ## Acknowledgments Financial supports from the MIUR in the framework of the Project PRIN 2017 (code 2017J4EAYB _Multiscale Innovative Materials and Structures (MIMS)_ ; University of Naples Federico II Research Unit) is gratefully acknowledged. ## References * Farajpour et al. (2018) Farajpour A, Ghayesh MH and Farokhi H. A review on the mechanics of nanostructures. _International Journal of Engineering Science_ 2018; 133:231–263. * Tran et al. (2018) Tran N, Ghayesh MH and Arjomandi M. Ambient vibration energy harvesters: a review on nonlinear techniques for performance enhancement. _International Journal of Engineering Science_ 2018; 127:162–185. * Basutkar (2019a) Basutkar R. Analytical modelling of a nanoscale series-connected bimorph piezoelectric energy harvester incorporating the flexoelectric effect. _International Journal of Engineering Science_ 2019; 139:42–61. * Caplins et al. (2019) Caplins BW, Holm JD and Keller RR. Transmission imaging with a programmable detector in a scanning electron microscope. _Ultramicroscopy_ 2019; 196:40–48. * Ogi et al. (2019) Ogi H, Iwagami S, Nagakubo A, Taniguchi T and Ono T. Nano-plate biosensor array using ultrafast heat transport through proteins. _Sensors and Actuators B: Chemical_ 2019; 278:15–20. * Natsuki (2019) Natsuki T and Urakami K. Analysis of vibration frequency of carbon nanotubes used as nano-force sensors considering clamped boundary condition. _Electronics_ 2019; 8(10):1082. * Basutkar (2019b) Basutkar R. Analytical modelling of a nanoscale series-connected bimorph piezoelectric energy harvester incorporating the flexoelectric effect. _International Journal of Engineering Science_ 2019; 139:42–61. * Ghayesh and Farokhi (2020) Ghayesh MH and Farokhi H. Nonlinear broadband performance of energy harvesters. _International Journal of Engineering Science_ 2020; 147:103202. * Eyvazian et al. (2020) Eyvazian A, Shahsavari D and Karami B. On the dynamic of graphene reinforced nanocomposite cylindrical shells subjected to a moving harmonic load. _International Journal of Engineering Science_ 2020; 154:103339. * Pourasghar and Chen (2019) Pourasghar A and Chen Z. Effect of hyperbolic heat conduction on the linear and nonlinear vibration of CNT reinforced size-dependent functionally graded microbeams. _International Journal of Engineering Science_ 2019; 137:57–72. https://doi.org/10.1016/j.ijengsci.2019.02.002 * Omari et al. (2020) Omari MA, Almagableh A, Sevostianov I, Ashhab MS and Yaseen AB. Modeling of the viscoelastic properties of thermoset vinyl ester nanocomposite using artificial neural network. _International Journal of Engineering Science_ 2020; 150:103242. https://doi.org/10.1016/j.ijengsci.2020.103242 * Rafii-Tabar et al. (2016) Rafii-Tabar H, Ghavanloo E and Fazelzadeh SA. Nonlocal continuum-based modeling of mechanical characteristics of nanoscopic structures. _Phys. Rep._ 2016; 638:1–97. * Ghavanloo (2019) Ghavanloo E, Rafii-Tabar H and Fazelzadeh SA. Computational continuum mechanics of nanoscopic structures, nonlocal elasticity approaches. Springer, 2019. https://doi.org/10.1007/978-3-030-11650-7 * Eringen (1983) Eringen AC. On differential equations of nonlocal elasticity and solutions of screw dislocation and surface waves. _Journal of Applied Physics_ 1983; 54:4703. * Rogula (1965) Rogula D. Influence of spatial acoustic dispersion on dynamical properties of dislocations. Bull. _Acad. Pol. Sci., Ser. Sci. Tech._ 1965; 13:337–385. * Rogula (1976) Rogula D. Nonlocal theories of material systems. Ossolineum, Wrocław, Poland, 1976. * Rogula (1982) Rogula D. Introduction to nonlocal theory of material media. Nonlocal theory of material media, CISM courses and lectures. D. Rogula, ed., Springer, Wien, 1982; 268:125-222. https://doi.org/10.1007/978-3-7091-2890-9 * Eringen (1972) Eringen AC. Linear theory of nonlocal elasticity and dispersion of plane waves. _International Journal of Engineering Science_ 1972; 10(5):425–435. * Bazant and Jirásek (2002) Bazant ZP and Jirásek M. Nonlocal integral formulation of plasticity and damage: survey of progress. _J. Eng. Mech. ASCE_ 2002; 128:1119–1149. * Romano et al. (2017a) Romano G, Barretta R, Diaco M and Marotti de Sciarra F. Constitutive boundary conditions and paradoxes in nonlocal elastic nano-beams. _International Journal of Mechanical Sciences_ 2017; 121:151–156. * Zhang et al. (2020) Zhang P, Qing H and Gao C-F. Exact solutions for bending of Timoshenko curved nanobeams made of functionally graded materials based on stress-driven nonlocal integral model. _Composite Structures_ 2020; 245:112362. * Sidhardh et al. (2020) Sidhardh S, Patnaik S and Semperlotti F. Geometrically nonlinear response of a fractional-order nonlocal model of elasticity. _International Journal of Non-Linear Mechanics_ 2020; 125:103529. * Dilena et al. (2019) Dilena M, Fedele Dell’Oste M, Fernández-Sáez J, Morassi A and Zaera R. Mass detection in nanobeams from bending resonant frequency shifts. _Mechanical Systems and Signal Processing_ 2019; 116:261–276. * Shahsavari et al. (2018) Shahsavari D, Karami B, Fahham HR and Li L. On the shear buckling of porous nanoplates using a new size-dependent quasi-3D shear deformation theory. _Acta Mechanica_ 2018; 229(11):4549–4573. * Vila et al. (2017) Vila J, Fernández-Sáez J and Zaera R. Nonlinear continuum models for the dynamic behavior of 1D microstructured solids. _Int. J. Solid Struct._ 2017; 117:111–122. * Maneshi et al. (2020) Maneshi MA, Ghavanloo E, Fazelzadeh SA. Well-posed nonlocal elasticity model for finite domains and its application to the mechanical behavior of nanorods. _Acta Mechanica_ 2020\. https://doi.org/10.1007/s00707-020-02749-w * Fuschi et al. (2019) Fuschi P, Pisano AA and Polizzotto C. Size effects of small-scale beams in bending addressed with a strain-difference based nonlocal elasticity theory. _International Journal of Mechanical Sciences_ 2019; 151:661–671. * Pijaudier-Cabot and Bazánt (1987) Pijaudier-Cabot G and Bazánt ZP. Nonlocal damage theory. _J Eng Mech_ 1987; 113:1512–1533. * Borino et al. (2003) Borino G, Failla B and Parrinello F. A symmetric nonlocal damage theory. _Int J Solids Struct_ 2003; 40(13-14):3621–3645. * Polizzotto et al. (2004) Polizzotto C, Fuschi P and Pisano AA. A strain-difference-based nonlocal elasticity model. _Int J Solids Struct_ 2004; 41(9-10):2383–2401. * Koutsoumaris et al. (2017) Koutsoumaris CC, Eptaimeros KG and Tsamasphyros GJ. A different approach to Eringen’s nonlocal integral stress model with applications for beams. _Int J Solids Struct_ 2017; 112:222–238. * Polizzotto (2001) C. Polizzotto. Nonlocal elasticity and related variational principles. _Int J Solids Struct_ 2001; 38:7359. * Eringen (1987) Eringen AC. Theory of nonlocal elasticity and some applications. _Res Mechanica_ 1987; 21:313–342. * Romano et al. (2017b) Romano G, Barretta R and Diaco M. On nonlocal integral models for elastic nano-beams. _International Journal of Mechanical Sciences_ 2017; 131-132:490–499. * Wang et al. (2016) Wang Y, Zhu X and Dai H. Exact solutions for the static bending of Euler-Bernoulli beams using Eringen two-phase local/nonlocal model. _AIP Advances_ 2016; 6(8):085114. https://doi.org/10.1063/1.4961695 * Khodabakhshi and Reddy (2015) Khodabakhshi P and Reddy JN. A unified integro-differential nonlocal model. _Int J Eng Sci_ 2015; 95:60–75. * Fernández-Sáez and Zaera (2017) Fernández-Sáez J and Zaera R. Vibrations of Bernoulli-Euler beams using the two-phase nonlocal elasticity theory. _Int J Eng Sci_ 2017; 119:232–248. * Zhang et al. (2019) Zhang P, Qing H and Gao C. Theoretical analysis for static bending of circular Euler-Bernoulli beam using local and Eringen’s nonlocal integral mixed model. _ZAMM_ 2019; 99(8):e201800329 https://doi.org/10.1002/zamm.201800329 * Romano and Barretta (2017) Romano G and Barretta R. Nonlocal elasticity in nanobeams: the stress-driven integral model. _International Journal of Engineering Science_ 2017; 115:14–27. * B (2018) Barretta R, Luciano R, Marotti de Sciarra F and Ruta G. Stress-driven nonlocal integral model for Timoshenko elastic nano-beams. _European Journal of Mechanics / A Solids_ 2018; 72:275–286. * ZhangJ (2019) Zhang J, Qing H and Gao C. Exact and asymptotic bending analysis of microbeams under different boundary conditions using stress‐derived nonlocal integral model. _Zamm-Zeitschrift Fur Angewandte Mathematik Und Mechanik_ 2019; DOI:10.1002/zamm.201900148. * Barretta et al. (2018) Barretta R, Fabbrocino F, Luciano R and Marotti de Sciarra F. Closed-form solutions in stress-driven two-phase integral elasticity for bending of functionally graded nano-beams. _Physica E: Low-dimensional Systems and Nanostructures_ 2018; 97:13–30. * Barretta et al. (2019b) Barretta R, Marotti de Sciarra F and Vaccaro MS. On nonlocal mechanics of curved elastic beams. _International Journal of Engineering Science_ 2019; 144:103140. * Romano (2002) Romano G. Scienza delle Costruzioni. Tomo I. Benevento: Hevelius 2002. * Baldacci (1983) Baldacci R. Scienza delle Costruzioni, Volume II. Torino: UTET 1983. * Winkler (1858) Winkler E. Formänderung und Festigkeit gekrümmter Körper, insbesondere der Ringe Civilingenieur 4, 232-246, 1858.
arxiv-papers
2021-07-27T11:21:02
2024-09-04T03:07:21.305597
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Marzia Sara Vaccaro, Francesco Paolo Pinnola, Francesco Marotti de\n Sciarra, Marko Canadija, Raffaele Barretta", "submitter": "Raffaele Barretta", "url": "https://arxiv.org/abs/2107.12733" }
2107.12734
# ENHANCE (ENriching Health data by ANnotations of Crowd and Experts): A case study for skin lesion classification Ralf Raumanns [email protected] Fontys University of Applied Science, Eindhoven, The Netherlands Eindhoven University of Technology, Eindhoven, The Netherlands Gerard Schouten [email protected] Fontys University of Applied Science, Eindhoven, The Netherlands Eindhoven University of Technology, Eindhoven, The Netherlands Max Joosten [email protected] Eindhoven University of Technology, Eindhoven, The Netherlands Josien P. W. Pluim [email protected] Eindhoven University of Technology, Eindhoven, The Netherlands Veronika Cheplygina [email protected] IT University of Copenhagen, Denmark ###### Abstract We present ENHANCE, an open dataset with multiple annotations to complement the existing ISIC and PH2 skin lesion classification datasets. This dataset contains annotations of visual ABC (asymmetry, border, color) features from non-expert annotation sources: undergraduate students, crowd workers from Amazon MTurk and classic image processing algorithms. In this paper we first analyze the correlations between the annotations and the diagnostic label of the lesion, as well as study the agreement between different annotation sources. Overall we find weak correlations of non-expert annotations with the diagnostic label, and low agreement between different annotation sources. Next we study multi-task learning (MTL) with the annotations as additional labels, and show that non-expert annotations improve the diagnostic performance of (ensembles of) state-of-the-art convolutional neural networks. We hope that our dataset can be used in and inspires further research into multiple annotations and/or MTL. All data and models are available on: https://github.com/raumannsr/ENHANCE. Keywords: Open data, Crowdsourcing, Multi-task learning, Skin cancer, Ensembles, Overfitting ## 1 Introduction Machine learning offers many opportunities, but medical imaging datasets, for example for skin lesion diagnosis, are limited, and overfitting can occur. To illustrate, Winkler and colleagues found that superimposed scale bars (Winkler et al., 2021) or skin markings (Winkler et al., 2019) in dermoscopic images may impair the diagnostic performance of the convolutional neural network (CNN) when unintentionally overfitting these artifacts during model training. A promising approach to generalize better in small sample size settings is multi-task learning (MTL), where the model has to learn different tasks simultaneously. This approach showed improved performance in various medical applications, for example, for breast lesions (Shi et al., 2019; Liu et al., 2018). However, when moving from single-task to multi-task models, we need additional annotations. Applying MTL is challenging because datasets typically do not have such additional annotations. Furthermore, building a medical image dataset from scratch with expert annotations is time-consuming and costly. We present a dataset of additional annotations for skin lesion diagnosis based on non-expert annotations on three dermatoscopic criteria: asymmetry, border and color (so-called ABC criteria). In dermatology, the use of the ABCDE (asymmetry, border, color, diameter, and evolution or elevation) rule is widespread. However, scoring the diameter (D) and evolution or elevation (E) are more complex tasks and therefore less suitable for non-expert annotation. The term non-expert is defined here as annotations provided by three different annotation sources: undergraduate students, crowd workers from Amazon MTurk and automated annotations through classic image processing algorithms. We study the quality of non-expert annotations from different viewpoints. Firstly, we determine the discriminative power of ABC features for diagnosis. We show to what extent the ABC annotations correlate to the diagnosis, and we study how we can use ABC annotations to improve the performance of a CNN. Secondly, the inter agreement level for A, B and C feature between the different annotation sources. The study extends our research on the topic (Raumanns et al., 2020) by using automated annotations as well as comparing the performance on three open source CNN architectures, in particular: VGG-16 (Simonyan and Zisserman, 2015), Inception v3 (Szegedy et al., 2016) and ResNet50 (He et al., 2016) encoders. Further, we investigate whether MTL is also beneficial for automated annotations and show that the performance benefits from using multiple annotations in MTL. Besides addressing the lack of expert annotations using non-expert ones, we make the dataset with collected ABC annotations and code open, eliminating obstacles for future research. More specifically, the investigation addresses the following research questions: 1. 1. What is the correlation between the ABC annotations and the diagnostic label? 2. 2. How can we use the ABC annotations to improve the performance of a CNN? 3. 3. What is the inter agreement level for A, B and C feature between the different annotation sources? 4. 4. How can CNN performance benefit from using multiple annotations? Our results give valuable insights into the quality of non-expert annotations. Using the collected non-expert annotations in three different CNNs, we show that these are of added value for the performance of the models. This suggests that the use of non-expert annotations might be promising for application in similar domains. ## 2 Related Work The shortage of publicly available medical datasets suitable for machine learning is a widely shared problem. Less suitable datasets are small and contain few attributes. Several initiatives have been launched to disseminate and make more medical datasets accessible to alleviate this shortcoming. For example, Tschandl et al. (2018) released the HAM10000 (“Human Against Machine with 10000 training images”) dataset containing dermatoscopic images from different populations. Pacheco et al. (2020) released a skin lesion benchmark composed of clinical images collected from smartphone devices and a set of patient clinical data containing up to 21 features. In machine learning, we usually concentrate on training a single-task model, focusing on a single output. These single-task models have been successful in medical imaging, but there is a potential to make them even more generalizable, thereby preventing overfitting by using MTL that share representations between related tasks. More specific MTL uses inductive transfer with domain-specific information to improve model generalization (Caruana, 1997). MTL has been successfully in various applications in medical imaging. Hussein et al. (2019) presented a framework for the malignancy determination of lung nodules based on an MTL method using features provided by experts (radiologists). Dhungel et al. (2017) used automatically extracted features in a two-step training process for mass classification in mammograms using a CNN and Random Forest model. Murthy et al. (2017) included shape information in classifying glioma nuclei and showed that they could improve CNN performance compared to a baseline model. Recently we (Raumanns et al., 2020) found that MTL ensembles with the VGG-16 encoder, combined with crowdsourced features, lead to improved generalization for skin lesion classification. For more background information on MTL in deep learning, we refer the reader to an overview written by Ruder (2017). In this work, we further investigate the use of non-expert annotations for skin lesion classification by comparing non-expert annotations and using them as additional output in three different multi-task models based on commonly employed CNN architectures. Note that the MTL approach allows using ABC annotations on the output side of the network, different from traditional approaches such as Giotis et al. (2013); Cheplygina and Pluim (2018), where they are used as classifier inputs. ## 3 Dataset creation This section describes the two public image datasets that we used and details the annotation procedures used to collect additional annotations for these datasets. ### 3.1 Image datasets We used two publicly available datasets of dermoscopic images, the training set of the ISIC 2017 challenge dataset (Codella et al., 2017) and the PH2 dataset (Mendonca et al., 2015). A summary of the both datasets is provided in Table 1. There are no other meta-data available than the characteristics presented. #### 3.1.1 ISIC dataset The ISIC 2017 challenge was to develop lesion segmentation and lesion classification algorithms. The training dataset contains 2000 dermoscopic images with lesions of three classes: 374 melanoma, 1372 nevi, and 254 seborrheic keratosis lesions. Next to the diagnostic labels, the dataset also contains age and sex for some of the patients, binary lesion segmentation masks, and superpixel segmentation masks (the result of dividing a lesion image with the help of the SLIC algorithm (Achanta et al., 2012)). #### 3.1.2 PH2 dataset The PH2 dataset was acquired at the Dermatology Service of Hospital Pedro Hispano, Matosinhos, Portugal. The objective was to create an open dataset to help comparative studies on dermoscopic images’ segmentation and classification algorithms. The PH2 dataset contains 200 dermoscopic images, of which 80 common nevi, 80 atypical nevi, and 40 melanoma lesions. The dataset also contains information related to histology and diagnosis, and expert annotations of lesion characteristics including color, asymmetry, and pigment network. Table 1: Summary of the lesion characteristics in the ISIC and PH2 datasets. A dash (-) means that the information was not provided. Characteristics | | ISIC | PH2 ---|---|---|--- Diagnosis | Benign nevi | 1372 | 160 | Melanoma | 374 | 40 | Seborrheic keratosis | 254 | 0 Patient sex | Female | 871 | - | Male | 900 | - | Not provided | 229 | 200 Age group | 0-10 | 4 | - | 10-20 | 147 | - | 20-30 | 136 | - | 30-40 | 225 | - | 40-50 | 305 | - | 50-60 | 270 | - | 60-70 | 307 | - | 70-80 | 213 | - | 80-90 | 137 | - | Not provided | 256 | 200 Fitzpatrick phototype | II or III | - | 200 | Not provided | 2000 | 0 Expert annotations | Asymmetry | 0 | 200 | Border | 0 | 0 | Color | 0 | 200 ### 3.2 Annotations We collected annotations from three types of sources: 1. 1. Students of the undergraduate biomedical engineering program at TU Eindhoven, 2. 2. Crowd workers on the Amazon Mechanical Turk platform, and 3. 3. Classical image processing algorithms. Each source assessed the ABC attributes (Abbasi et al., 2004) as are commonly used by dermatologists: A for asymmetrical shape, B for border irregularity, and C for color of the assessed lesion. Figure 1: The left part shows examples of skin lesions and corresponding masks (black-white image). The top two lesions are from the PH2 dataset; the bottom two are from the ISIC dataset. The right part shows examples of scores from different annotation sources are also given. The student and crowd annotations indicate that at least three different annotators assessed each image. When training algorithms, multiple annotations per image were combined as follows: we normalized the annotation scores per annotator (resulting in standardized data with mean 0 and standard deviation 1) and then averaged these standardized scores per lesion. Early experiments by (Cheplygina and Pluim, 2018) showed that this was a justifiable strategy. #### 3.2.1 Student annotations Undergraduate students without prior knowledge of rating dermoscopic images gathered annotations following a similar protocol as in (Cheplygina and Pluim, 2018), in the context of a medical image analysis course. Each group annotated visual features of 100 images. The students were not blinded to the diagnostic labels, as ISIC is a public dataset. Each group could decide which visual features they wanted to focus on, and the type of annotation scale they wanted to use. However, each visual feature had to be annotated by at least three students from the group. All groups annotated at least some of the ABC features, resulting in 1631 images with asymmetry, border, and color annotations. As we only included the PH2 dataset in the current study after this educational activity was finished, the students did not annotate images from the PH2 dataset. #### 3.2.2 Crowd annotations Crowd workers on Amazon Mechanical Turk received instructions of how to rate the ABC features based on three examples. Figures 8, 9 and 10 in (Appendix D. Amazon MTurk annotation) illustrate how the annotation task is presented to crowd workers. The annotation scales were as follows: * • Asymmetry: Zero for symmetrical, one of half-symmetrical, two for asymmetrical. * • Border: The degree of irregularities in the skin lesion’s edge for the border score, with a maximum score of eight. A score of eight indicates irregularities in the entire edge, a score of four in the half-edge, and a zero score indicates no irregularities. * • Color: The number of the following colors being present in the lesion: light brown, dark brown, white, blue-gray, black, and red. We requested three different crowd workers to annotate each image. The diagnostic labels were not provided, but due to the public nature of the dataset, could be potentially be known. Only workers who had done more than 500 approved tasks previously with an approval rate higher than 90% could participate. We paid the workers $0.05 per task. The workers annotated 1250 lesions from ISIC, and all 200 lesions from PH2 with asymmetry, border, and color annotations. #### 3.2.3 Automated annotations We used classical image processing algorithms from the literature (Kasmi and Mokrani (2016), Jaworek-Korjakowska (2015) and Achanta et al. (2012)) to automatically extract asymmetry, border and color features. We implemented these algorithms based on the papers, as code was not provided. We explain the different steps of the automated asymmetry, border and color algorithms in Appendix C. Automatic annotation. Note that we used the provided segmentation masks, and we observed a wide variation of mask boundary definitions: ranging from precisely defined to more loose boundary ones, including clipped boundaries, therefore not every algorithm could be applied to all images. Table 2 summarizes the number of collected annotations for each annotation source and type. Table 2: Summary of collected annotations. | ISIC | PH2 ---|---|--- Automated | | | Asymmetry (AutoA) | 197011footnotemark: 1 | 16511footnotemark: 1 | Border (AutoB) | 199611footnotemark: 1 | 0 | Color (AutoC) | 2000 | 200 | Crowd | | | Asymmetry (CrowdA) | 1250 | 200 | Border (CrowdB) | 1250 | 200 | Color (CrowdC) | 1250 | 200 | Student | | | Asymmetry (StudA) | 1631 | 0 | Border (StudB) | 1631 | 0 | Color (StudC) | 1631 | 0 | Expert | | | Asymmetry (ExpA) | 0 | 200 | Border (ExpB) | 0 | 0 | Color (ExpC) | 0 | 200 | ## 4 Experiments To investigate the added value of our annotations, we address a binary classification problem: healthy (nevi) vs abnormal (melanoma and seborrheic keratosis). ### 4.1 Annotation analysis To gain insight into the characteristics of the collected annotations, we use visual representations that provide detail and overview at the same time. In particular, we created raincloud plots (Allen et al., 2019) with A, B, and C annotations for each annotation source. We compared the agreement level between the three types of annotation sources. We first averaged the image’s scores separately for A, B, and C annotations and then standardized these mean scores, resulting in z-scores. Based on the z-scores, we calculated the agreement level using Pearson correlations. To quantitatively measure how related the annotation sources and the diagnostic labels (abnormal and healthy) are, we computed the Pearson’s correlation coefficient between them for all collected annotations for the ISIC and the PH2 dataset. We interpret the Pearson’s correlation coefficient $\rho$ as follows: weak correlation for $0\leq\rho<0.3$, moderate correlation for $0.3\leq\rho<0.5$, strong correlation for $0.5\leq\rho<1$. ### 4.2 Multi-task learning To understand how the collected annotations can contribute to training deep learning algorithms, we performed several experiments where we compared a baseline model which is trained only on the diagnosis, and a MTL model which is trained on both the diagnosis and one or more of the collected ISIC based ABC annotations (Fig. 2). We compared these for three different CNN architectures: VGG-16 (Simonyan and Zisserman, 2015), Inception v3 (Szegedy et al., 2016), and ResNet50 (He et al., 2016). Figure 2: Architecture of baseline (top) and MTL (bottom) models. All models are on top of the VGG-16, Inception v3 or ResNet50 convolutional base. The baseline model extends the convolutional base with two fully connected layers with a sigmoid activation function. During training, we use class weights to pay more attention to samples from the underrepresented class. We use cross-entropy as a loss function. All choices for the baseline model were made based on only the training and validation set. We fine-tune the baseline model until the performance on the validation dataset was within the performance of the ISIC 2017 challenge. The multi-task model extends the convolutional base with three fully connected layers. The model has two outputs with different network heads: one head is the classification output, the other represents the visual feature (such as asymmetry). We use a customized mean squared error loss $L_{MTL}$ and a last layer linear mapping for the annotation-regression task. We used a vector $a_{i}$ in which we store per lesion whether or not an annotation is available. If an annotation is present, then $a_{i}$ is equal to 1; otherwise, $a_{i}$ is 0. This vector is used in a custom loss function that calculates the mean squared error. In case no annotation is available, it does not affect the weights, and the error is not propagated. For the binary classification task, we used a cross-entropy loss $L_{c}$ and sigmoid activation function of the nodes. The contribution of the losses is equal – we did not optimize the weighting parameter, but early experiments showed that the contribution of the classification loss should not be too low. The resulting loss values are summed and minimized during network training. For our MTL models, the loss function (1) is as follows: $\displaystyle L_{MTL}=0.5({\frac{1}{A}}{\sum_{i=1}^{N}}a_{i}(y_{i}-\hat{y_{i}})^{2})+0.5L_{c}$ (1) where $A$ denotes the number of available annotations, $N$ represents the number of lesions, and $y_{i}$ and $\hat{y_{i}}$ denotes respectively the prediction and the expected outcome for lesion $i$. To investigate the value of the additional annotations, we compare baseline networks with multi-task networks to which we add one of the following nine types of annotations individually: * • Asymmetry: AutoA, CrowdA, StudA * • Border: AutoB, CrowdB, StudB * • Color: AutoC, CrowdC, StudC We also combine the networks above into ensembles, by averaging the network predictions with equal weights (earlier experiments (Raumanns et al., 2020) showed limited effectiveness of optimizing the weights). We tested the following three ensembles: * • StudA + StudB + StudC (named studABC) * • CrowdA + CrowdB + CrowdC (named crowdABC) * • AutoA + AutoB + AutoC (named autoABC) Finally, we trained the ResNet50 MTL models with synthetic annotations. We replaced the original A, B and C scores with uniformly randomized ones in the range [0.0, 1.0] and combined them into ensembles. The experimental procedure is as follows: we trained all CNN models using 70% as training, 17.5% as validation and 12.5% as test proportions, in a five-fold cross-validation approach. We trained all layers, including the convolutional base, starting with the pre-trained ImageNet weights. For training, we used 30 epochs with a batch size of 20 using the default backpropagation algorithm RMSprop (Tieleman and Hinton, 2012) as the optimizer, with a learning rate of $2.0\mathrm{e}{-5}$. To determine a reasonable learning rate, we evaluated six learning rates on the baseline VGG-16 model (varying over 2 orders of magnitude, between 1.0e-3 and 1.0e-5). We did not vary the learning rate across the different model architectures to keep the number of experiments reasonable while still having a systematic comparison. A description of all hyperparameters is available in Table 6 (Appendix B. Hyperparameters). We performed the ensemble of the predictions of multi-task models through averaging; we based the lesion’s classification on the predictions of the three multi-task models, with each model’s prediction having an equal weight (a third). We compared the average area under the receiver operating characteristic curve (AUC) of the baseline model to the average AUC scores of the different multi- task models and ensembles. The average AUC score was calculated per experiment, taking the average of the AUC score of each fold. We realized our deep learning models in Keras using the TensorFlow backend (Géron, 2019). ## 5 Results ### 5.1 Correlations between annotations and the diagnostic label The first research question is whether annotations for ABC criteria are discriminative for diagnosis. We show the distributions of asymmetry, border and color versus the label (normal or abnormal) for each annotation source in Fig. 3 (ISIC) and Fig. 4 (PH2). Table 3 lists Pearson correlation coefficient measures between annotation type and diagnostic label for ISIC annotations. Figure 3: Raincloud plots of automated, crowd, and student ISIC annotations. Diagnostic label 1 stands for abnormal, label 0 for healthy lesions. Figure 4: Raincloud plots of automated, crowd, and expert PH2 annotations. Diagnostic label 1 corresponds to abnormal lesions. Table 3: Pearson correlation coefficient measures between annotation type and diagnostic label Type | A | B | C ---|---|---|--- Automated | 0.046 | 0.071 | -0.122 Crowd | 0.166 | -0.017 | 0.103 Student | 0.151 | 0.161 | 0.230 The distributions of the A, B and C scores for each diagnostic label overlap considerably. StudA, StudB, StudC, CrowdA, and CrowdC sample medians for abnormal lesions were greater than sample medians for normal ones. AutoA, AutoB, AutoC, and CrowdB sample medians for abnormal and normal lesion are almost identical, although the underlying nature of raw AutoA observations is different. The width of the AutoA annotations belonging to the normal distribution is greater than those of the abnormal distribution. The data of ExpA are right-skewed for normal lesions and left-skewed for abnormal ones; their normal and abnormal distributions do not overlap. CrowdA for normal lesions is unimodal; the data is centered around the middle. CrowdA for abnormal lesions is bimodal. The CrowdA’s abnormal and normal distributions partially overlap. AutoA’s distributions for abnormal and normal lesions overlap considerably, and the sample median for abnormal is greater than the sample median for normal ones. The distributions of ExpC, CrowdC and AutoC are multimodal. The ExpC’s abnormal and normal distributions partially overlap. CrowdC’s and AutoC’s distribution for abnormal and normal lesions considerably overlap. The Pearson’s coefficient (Table 3) indicates there is no correlation between the crowd-B annotations and the diagnostic label. No correlation also applies to the AutoA and AutoB annotations. We see a weak correlation between all three types of student annotations (StudA, StudB, and StudC), the AutoC annotations and the diagnostic label. ### 5.2 Inter agreement level between the different annotation sources The second research question examined the level of agreement between annotation sources for the A, B and C criteria. In order to answer this question, the results of the analysis of agreement level using Pearson correlations were examined. Figure 5 illustrates these correlations graphically. --- --- --- Figure 5: Pearson’s correlation coefficient measures for A, B and C features For asymmetry, we observed a moderate positive correlation between student and crowd annotations. For color, we observed a weak correlation between all annotation sources. We observed no correlation between the different sources for border annotations. ### 5.3 Effect on CNN performance for multiple annotations usage Our last research question examines the performance benefit of using multiple annotations in a multi-task model. We used the annotations together with skin lesion images for training multi-task CNNs. We explored how they affect the model’s performance compared to a baseline model without using annotations. Figure 6: AUCs of baseline and multi-task models (asymmetry, border and color) per CNN architecture. The AUCs of the baseline and multi-task models are shown in Fig. 6 (the numerical results are also available in Appendix A. AUC performances). Table 4 compares the AUCs of the ensembles based on randomized annotations and original annotations. Table 4: Mean AUCx100 performances of ResNet50 MTL ensembles trained with original and randomized annotations Annotations | autoABC | crowdABC | studABC ---|---|---|--- Original | 87.1 ± 1.9 | 86.3 ± 2.4 | 86.1 ± 2.1 Randomized | 85.0 ± 2.4 | 84.4 ± 2.8 | 84.6 ± 2.4 The AUC values for each CNN architecture are close together. The Inception v3 CNN outperformed the ResNet50 and VGG-16 architectures for all three features, but for studA, autoA and autoB multi-task models, ResNet50 performs slightly better. The three ensembles show improved performance when compared to the other models in the same architecture. The best performing model is the autoABC ResNet50 ensemble model. For VGG-16 and ResNet50 the multi-task models outperform the baseline models. For Inception v3 only studC, studABC, crowdA, crowdB, crowdABC, autoA and autoABC models outperform the baseline model. Table 4 shows that ResNet50 MTL ensembles trained with retrieved annotations perform better than ensembles with randomized annotations. ## 6 Discussion ### 6.1 Summary of results #### 6.1.1 At most moderate correlations between annotations and the diagnostic label In general, the acquired non-expert annotations (especially the student annotations) show a weak correlation with the diagnostic label (Table 3). At the same time, automated annotations show only a correlation for the color feature. Results in a study by Giotis et al. (2013) support this. They show that the color feature has a discriminative power, but the border feature not. In their study, they did not assess asymmetry. #### 6.1.2 Weak to moderate inter agreement level between the different annotation sources We observed low agreement between student and crowd for asymmetry and color scores and comparable agreement level between automated and non-expert color features. In contrast, we observed disagreement for the border feature between non-experts and automated scores. Based on these agreement levels, annotating the asymmetry and color seems more straightforward than annotating the border. Measures with disagreement can still be informative. According to Cheplygina et al., ”Although removing disagreement leads to the best performances, we show that disagreement alone leads to better-than-random results. Therefore, the disagreement of these crowd labels could be an advantage when training a skin lesion classifier with these crowd labels as additional outputs” Cheplygina and Pluim (2018). #### 6.1.3 A mainly positive effect on CNN performance for multiple annotations usage Our preprint (Raumanns et al., 2020) showed that VGG-16 based multi-task models with individual crowdsourced features have a limited effect on the model. Still, when combined in ensembles, it leads to improved generalization. This paper has further confirmed this improved generalization for Inception v3 CNN and the ResNet50 based multi-task models. We also showed that the Inception v3 CNN outperformed the ResNet50 and VGG-16 architectures for all three annotations. The ResNet50 showed improved performance compared to the VGG-16 model. One perhaps surprising result is that noisy annotations positively contribute to the performance. Our annotations are highly noisy, as shown by the correlation coefficients in Table 3 and the raincloud plots in Fig. 3. We explain the success of these annotations by several factors. First, annotations that are perfectly correlated with the diagnostic label would not add information to the classifier. Second, training multiple (biased) classifiers and combining these in an ensemble is a well-known result that can lead to improved generalization (Jain et al., 2000). We also show that this is the case for fully randomized annotations (Table 4), but that this is less effective than our gathered annotations. Finally, the classifier also learns from the diagnostic labels; learning from only the annotations is not feasible. ### 6.2 Limitations We demonstrated the added value of using non-expert and automated annotations for model learning. Yet, we have not optimally tuned the algorithms for automatically scoring the ABC features. Also, the algorithms depend on the available masks. The quality of these masks differs and affects the automated score of asymmetry and border irregularity. Furthermore, we did not optimize the multi-task model to achieve the highest performance. There are three main differences between the annotation by the crowd and the students. Firstly, the student annotations were done in an educational setting, and students were encouraged to decide their annotation protocols based on existing literature. Letting the crowd decide on their protocol was not feasible due to the distributed nature of crowdsourcing: the crowd workers do not interact with each other, and most annotate only a few images. Secondly, students were not blinded to the diagnostic label while annotating. Since it is a public dataset, anybody could try to find the label, but this is less likely for MTurk because the MTurk jobs are time-limited. Thirdly, only the ISIC skin lesions were part of the student assignment. The PH2 dataset was only added to this study after an informal review round after the subject was no longer taught. Thompson et al. (2016) conclude that personal characteristics (such as sex and age) influence healthcare-seeking behavior; thus, the datasets might have an unintended bias against subjects from specific groups. Abbasi-Sureshjani et al. (2020) showed that even when the training set is relatively balanced, there is a variable performance on subgroups based on age and sex. For the ISIC dataset, the distribution between men and women is roughly the same. However, the dataset is skewed towards lower age groups. Unfortunately, the sex and age characteristics are missing for the PH2 dataset. Besides these, the Fitzpatrick phototype (Sachdeva, 2009) is another characteristic that would be relevant in this prediction problem. The PH2 dataset contains lesions with phototype II or III (Mendonca et al., 2015), but it is unspecified per lesion, and the ISIC database does not have phototype information. The discussed unintended bias or missing demographic characteristics might lead to representation bias, ultimately leading to an insufficiently representative model. ### 6.3 Opportunities In this study, we used automated annotations based on best in class image algorithms. However, the automated annotations are not as discriminative as the expert annotations for diagnosis. A future study could concentrate on tuning the used image algorithms or finding new algorithms that mimic expert annotations more closely. Another important direction for future research is explainability. We showed that multi-task models with non-expert annotations have a limited effect on the model performance. However, the multi-task prediction of ABC scores together with a diagnosis helps to explain the diagnostic outcome. For example, when the model predicts abnormality and high ABC scores, the latter could be interpreted as warning signs/explanation for abnormality. The use of the model in this way needs further research. For instance, what kind of model architectures fit the best for this explanation task? What types of annotations are suitable for this task? What kind of model produces gradual class activation maps (Selvaraju et al., 2017) that explain the model outcome to dermatologists? We used three different sources to collect annotations for the ISIC and PH2 dataset to create a new open dataset that incorporates these additional annotations and then used this dataset to see whether a multi-task model can take advantage of the extra annotations. A future study, for example, might consider clarifying the multi-task model performance benefit of additional annotations for mammography in the domain of breast cancer diagnosis or studying the quality of the extra annotations in another field. The annotators’ expertise levels will probably be different. Depending on the level of expertise, an annotation can have more or less influence during the model’s training procedure. This could be possible via different weights or by modeling the expertise of each annotator, similar to Guan et al. (2017). However, this might be more applicable for few annotators who annotated all images, rather than many annotators who each annotate a few images, as in crowdsourcing. This study used the ground truth masks’ segmentation masks for extracting asymmetry, border irregularity, and color characteristics. We see a wide variation in the given segmentation masks, with boundaries ranging from precisely defined to more loose ones. Some masks also have clipped boundaries. Optimizing these masks need to be considered in future studies. ## 7 Conclusions This paper presented ENHANCE, an open dataset with additional annotations, gathered by three different annotation sources, for ISIC 2017 and PH2 images of skin lesions, describing the lesions’ asymmetry, border, and color. We tested the dataset extensively with three different network architectures (VGG-16, ResNet50 and Inception c3) and show that the often claimed enhancement of multiple tasks is marginal. The asymmetry and color annotations from different annotation sources show their discriminative power to diagnose healthy or abnormal. At the same time, there is a moderate agreement level between the annotation sources. Nevertheless, this disagreement could be advantageous when training a skin lesion classifier with the annotations as additional output. Acknowledgments We would like to acknowledge all students and crowd workers who have contributed to this project with image annotation. We gratefully acknowledge financial support from the Netherlands Organization for Scientific Research (NWO), grant no. 023.014.010. Ethical Standards The work follows appropriate ethical standards in conducting research and writing the manuscript, following all applicable laws and regulations regarding treatment of animals or human subjects. Conflicts of Interest We declare we don’t have conflicts of interest. ## References * Abbasi et al. (2004) Naheed R Abbasi, Helen M Shaw, Darrell S Rigel, Robert J Friedman, William H McCarthy, Iman Osman, Alfred W Kopf, and David Polsky. Early diagnosis of cutaneous melanoma: revisiting the ABCD criteria. _JAMA_ , 292(22):2771–2776, December 2004. * Abbasi-Sureshjani et al. (2020) Samaneh Abbasi-Sureshjani, Ralf Raumanns, Britt E J Michels, Gerard Schouten, and Veronika Cheplygina. Risk of training diagnostic algorithms on data with demographic bias. In _Interpretable and Annotation-Efficient Learning for Medical Image Computing_ , pages 183–192. Springer International Publishing, 2020\. * Achanta et al. (2012) Radhakrishna Achanta, Appu Shaji, Kevin Smith, Aurelien Lucchi, Pascal Fua, and Sabine Süsstrunk. SLIC superpixels compared to state-of-the-art superpixel methods. _IEEE Trans. Pattern Anal. Mach. Intell._ , 34(11):2274–2282, November 2012. * Allen et al. (2019) Micah Allen, Davide Poggiali, Kirstie Whitaker, Tom Rhys Marshall, and Rogier A Kievit. Raincloud plots: a multi-platform tool for robust data visualization. _Wellcome Open Res_ , 4:63, April 2019. * Caruana (1997) Rich Caruana. Multitask learning. _Mach. Learn._ , 28(1):41–75, July 1997. * Cheplygina and Pluim (2018) Veronika Cheplygina and Josien P W Pluim. Crowd disagreement about medical images is informative. In _Intravascular Imaging and Computer Assisted Stenting and Large-Scale Annotation of Biomedical Data and Expert Label Synthesis_ , pages 105–111. Springer International Publishing, 2018. * Codella et al. (2017) Noel C F Codella, David Gutman, M Emre Celebi, Brian Helba, Michael A Marchetti, Stephen W Dusza, Aadi Kalloo, Konstantinos Liopyris, Nabin Mishra, Harald Kittler, and Allan Halpern. Skin lesion analysis toward melanoma detection: A challenge at the 2017 international symposium on biomedical imaging (ISBI), hosted by the international skin imaging collaboration (ISIC). _arXiv preprint arXiv:1710.05006_ , October 2017. * Dhungel et al. (2017) Neeraj Dhungel, Gustavo Carneiro, and Andrew P Bradley. A deep learning approach for the analysis of masses in mammograms with minimal user intervention. _Medical Image Analysis_ , 37:114–128, 2017. * Géron (2019) Aurélien Géron. _Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems_. “O’Reilly Media, Inc.”, September 2019. * Giotis et al. (2013) Ioannis Giotis, Margaretha Visser, Marcel Jonkman, and Nicolai Petkov. Discriminative power of visual attributes in dermatology. _Skin Res. Technol._ , 19(1):e123–31, February 2013. * Guan et al. (2017) Melody Y Guan, Varun Gulshan, Andrew M Dai, and Geoffrey E Hinton. Who said what: Modeling individual labelers improves classification. _arXiv preprint arXiv:1703.08774_ , 2017. * He et al. (2016) Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In _Proceedings of the IEEE conference on computer vision and pattern recognition_ , pages 770–778, 2016. * Hussein et al. (2019) Sarfaraz Hussein, Pujan Kandel, Candice W Bolan, Michael B Wallace, and Ulas Bagci. Lung and pancreatic tumor characterization in the deep learning era: Novel supervised and unsupervised learning approaches. _IEEE Transactions on Medical Imaging_ , 38(8):1777–1787, 2019. * Jain et al. (2000) Anil K Jain, Robert P. W. Duin, and Jianchang Mao. Statistical pattern recognition: A review. _IEEE Transactions on Pattern Analysis and Machine Intelligence_ , 22(1):4–37, 2000. * Jaworek-Korjakowska (2015) Joanna Jaworek-Korjakowska. Novel method for border irregularity assessment in dermoscopic color images. _Comput. Math. Methods Med._ , 2015:496202, October 2015\. * Kasmi and Mokrani (2016) Reda Kasmi and Karim Mokrani. Classification of malignant melanoma and benign skin lesions: implementation of automatic ABCD rule. _IET Image Processing_ , 10(6):448–455, 2016\. * Liu et al. (2018) Jiali Liu, Wanyu Li, Ningbo Zhao, Kunlin Cao, Youbing Yin, Qi Song, Hanbo Chen, and Xuehao Gong. Integrate domain knowledge in training CNN for ultrasonography breast cancer diagnosis. In _Medical Image Computing and Computer Assisted Intervention – MICCAI 2018_ , pages 868–875. Springer International Publishing, 2018. * Mendonca et al. (2015) T F Mendonca, M E Celebi, T Mendonca, and J S Marques. Ph2: A public database for the analysis of dermoscopic images. _Dermoscopy image analysis_ , 2015. * Murthy et al. (2017) Veda Murthy, Le Hou, Dimitris Samaras, Tahsin M Kurc, and Joel H Saltz. Center-focusing multi-task CNN with injected features for classification of glioma nuclear images. In _IEEE Winter Conference on Applications of Computer Vision (WACV)_ , pages 834–841. IEEE, 2017. * Pacheco et al. (2020) Andre G C Pacheco, Gustavo R Lima, Amanda S Salomão, Breno Krohling, Igor P Biral, Gabriel G de Angelo, Fábio C R Alves, Jr, José G M Esgario, Alana C Simora, Pedro B C Castro, Felipe B Rodrigues, Patricia H L Frasson, Renato A Krohling, Helder Knidel, Maria C S Santos, Rachel B do Espírito Santo, Telma L S G Macedo, Tania R P Canuto, and Luíz F S de Barros. PAD-UFES-20: A skin lesion dataset composed of patient data and clinical images collected from smartphones. _Data Brief_ , 32:106221, October 2020. * Raumanns et al. (2020) Ralf Raumanns, Elif K Contar, Gerard Schouten, and Veronika Cheplygina. Multi-task ensembles with crowdsourced features improve skin lesion diagnosis. _arXiv preprint arXiv:2004. 14745_ , 2020. * Ruder (2017) Sebastian Ruder. An overview of multi-task learning in deep neural networks. _arXiv preprint arXiv:1706.05098_ , 2017. * Sachdeva (2009) Silonie Sachdeva. Fitzpatrick skin typing: applications in dermatology. _Indian J. Dermatol. Venereol. Leprol._ , 75(1):93–96, January 2009. * Selvaraju et al. (2017) Ramprasaath R Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. Grad-cam: Visual explanations from deep networks via gradient-based localization. In _Proceedings of the IEEE international conference on computer vision_ , pages 618–626, 2017. * Shi et al. (2019) Jialin Shi, Department of Electrical Engineering, Tsinghua University, Beijing, China, Ji Wu, Ping Lv, and Jiajia Guo. BreastNet: Entropy-Regularized transferable multi-task learning for classification with limited breast data, 2019. * Simonyan and Zisserman (2015) Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. _CoRR_ , abs/1409.1556, 2015. * Szegedy et al. (2016) Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In _Proceedings of the IEEE conference on computer vision and pattern recognition_ , pages 2818–2826, 2016. * Thompson et al. (2016) Ashley E Thompson, Yvonne Anisimowicz, Baukje Miedema, William Hogg, Walter P Wodchis, and Kris Aubrey-Bassler. The influence of gender and other patient characteristics on health care-seeking behaviour: a QUALICOPC study. _BMC Fam. Pract._ , 17:38, March 2016. * Tieleman and Hinton (2012) Tijmen Tieleman and Geoffrey Hinton. Rmsprop: Divide the gradient by a running average of its recent magnitude. coursera: Neural networks for machine learning. _COURSERA Neural Networks Mach. Learn_ , 2012. * Tschandl et al. (2018) Philipp Tschandl, Cliff Rosendahl, and Harald Kittler. The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions. _Scientific Data_ , 5(1), 2018. * Winkler et al. (2019) Julia K. Winkler, Christine Fink, Ferdinand Toberer, Alexander Enk, Teresa Deinlein, Rainer Hofmann-Wellenhof, Luc Thomas, Aimilios Lallas, Andreas Blum, Wilhelm Stolz, and Holger A. Haenssle. Association Between Surgical Skin Markings in Dermoscopic Images and Diagnostic Performance of a Deep Learning Convolutional Neural Network for Melanoma Recognition. _JAMA Dermatology_ , 155(10):1135–1141, 10 2019\. ISSN 2168-6068. doi: 10.1001/jamadermatol.2019.1735. URL https://doi.org/10.1001/jamadermatol.2019.1735. * Winkler et al. (2021) Julia K Winkler, Katharina Sies, Christine Fink, Ferdinand Toberer, Alexander Enk, Mohamed S Abassi, Tobias Fuchs, and Holger A Haenssle. Association between different scale bars in dermoscopic images and diagnostic performance of a market-approved deep learning convolutional neural network for melanoma recognition. _Eur. J. Cancer_ , 145:146–154, March 2021. ## Appendix A. AUC performances Table 5 shows the mean AUCx100 of 5-fold cross-validation of Inception v3, ResNet50 and VGG-16 CNN baseline and multi-task models. We trained the multi- task models on all features (A, B and C) from three different annotation sources (student, crowd, and automated). The AUC of the best performing model per CNN architecture is emphasized in bold. Table 5: Mean AUCx100 performances of 5-fold cross-validation on all features (Asymmetry, Border and Color) for three different CNNs. Type | Inception v3 | ResNet50 | VGG-16 ---|---|---|--- baseline | 85.3 ± 1.2 | 83.6 ± 2.7 | 77.0 ± 3.0 autoA | 85.4 ± 2.3 | 85.7 ± 1.3 | 79.0 ± 2.6 autoB | 84.8 ± 2.0 | 85.3 ± 2.4 | 78.8 ± 3.7 autoC | 85.0 ± 1.6 | 84.5 ± 2.2 | 79.1 ± 4.0 autoABC | 86.4 ± 1.8 | 87.1 ± 1.9 | 81.0 ± 3.1 crowdA | 85.5 ± 2.2 | 84.8 ± 1.0 | 80.9 ± 1.6 crowdB | 86.1 ± 1.0 | 85.3 ± 2.7 | 78.6 ± 1.3 crowdC | 85.1 ± 0.6 | 84.2 ± 3.5 | 78.6 ± 3.3 crowdABC | 86.7 ± 1.4 | 86.3 ± 2.4 | 80.9 ± 2.3 studA | 84.0 ± 2.2 | 85.8 ± 2.6 | 80.3 ± 1.7 studB | 85.2 ± 1.2 | 84.6 ± 2.1 | 79.9 ± 1.8 studC | 85.7 ± 1.6 | 84.4 ± 2.7 | 78.9 ± 2.9 studABC | 86.2 ± 1.4 | 86.1 ± 2.1 | 81.2 ± 1.9 ## Appendix B. Hyperparameters The table below describes the hyperparameter choices for baseline and MTL experiments. Table 6: Describes each parameter, its value, and, when applicable, the name in the Python code Hyperparameter | Value baseline | Value MTL | Name in code ---|---|---|--- Learning rate | $2.0\mathrm{e}{-5}$ | $2.0\mathrm{e}{-5}$ | Optimizer | RMSprop | RMSprop | Batch size | 20 | 20 | BATCH$\\_$SIZE Activation function | Sigmoid | Sigmoid (classification) | | | Linear (annotation) | Number of epochs | 30 | 30 | EPOCHS Steps per epoch | 100 | 100 | STEPS$\\_$PER$\\_$EPOCH Steps to validate | 50 | 50 | VALIDATION$\\_$STEPS Steps to yield from pred.generator | 20 | 20 | PREDICTION$\\_$STEPS Class weights | balanced | balanced | Input shape | (384, 384, 3) | (384, 384, 3) | INPUT$\\_$SHAPE Include top | False | False | Pre-training | Imagenet | Imagenet | ## Appendix C. Automatic annotation This appendix explains the different steps of automated asymmetry, border and color algorithms. Fig. 7 presents a schematic overview of the algorithm annotation steps. As a preprocessing step, we first rotate and center the provided segmentation mask, such that the major axis (longest diameter of the lesion) passes horizontally through the segmentation center of mass. This is the major axis, the minor axis is then defined as the diameter perpendicular to the major axis and also passing through the center of mass. The asymmetry algorithm is based on shape asymmetry (Kasmi and Mokrani, 2016). The asymmetry score algorithm steps are: 1. 1. flip the rotated image over both axes separately to measure the overlap in pixels between the mask areas on either side of the axis; 2. 2. determine the shape symmetry ratio for an axis by dividing the overlap in pixels by the total amount of pixels in the lesion’s mask; 3. 3. calculate the score by averaging the symmetry ratios of both axes. The border score is based on (Jaworek-Korjakowska, 2015) and assesses the border irregularity as follows: 1. 1. calculate a bounding box around the segmentation and connect four lines between the bounding box’s vertices and the center of mass; 2. 2. locate the border pixels that are on each of the four lines (resulting in a total of four border pixels); 3. 3. divide the border into four parts with the help of the four pixels (clockwise: top, right, bottom and left part border pixels); 4. 4. calculate the shortest distance between the border pixel and the edge’s image for each of the four parts (the direction in which the distances are calculated varies per part; for the top border pixels in the upward direction, the right part border pixels in the rightward direction, the bottom border pixels in the downward direction and the left border pixels in the leftward direction); 5. 5. create a borderline function based on the pixel location on the border and the calculated distances; 6. 6. smooth the borderline function with a Gaussian filter; 7. 7. count the number of turning points in the smoothed signal, resulting in the actual border score. The color algorithm is based on (Kasmi and Mokrani, 2016) and computes the number of the suspicious colors present in the lesion: light brown, dark brown, white, blue-gray, black, and red, as follows: 1. 1. extract the region of interest from the lesion image using the mask; 2. 2. segment the region of interest into superpixels by using the SLIC superpixels algorithm (Achanta et al., 2012); 3. 3. find all unique colors (having different RGB values) that are present in the SLIC superpixels; 4. 4. measure the normalized Euclidean distance between each unique color in the set of SLIC superpixels and the six predefined values for the suspicious colors; 5. 5. link a unique color to a suspicious color when its distance is less than a fixed threshold (0.4); 6. 6. count a linked unique color as a suspicious color when the number of pixels belonging to that unique color exceeds five per cent of the total amount of pixels of the region of interest; Figure 7: A schematic overview of the different steps of the automated annotation of asymmetry, border and color. ## Appendix D. Amazon MTurk annotation The following three figures represent the screens presented to the crowd workers by the online AmazonMechanical Turk (www.mturk.com) crowdsourcing tool. First, the workers receive instruction (Figure 8) to assess the skin lesions. Second, the tool presents three examples (Figure 9) that illustrate scoring asymmetry, border and color. Third, the crowdsourcing tool presents one by one the skin lesions (Figure 10). The crowd workers annotate each presented skin lesion by using the scoring sliders and pressing the submit button. With each skin lesion presented, the MTurk crowdsourcing tool shows the instructions and examples. Figure 8: An instruction screen with the task description. Figure 9: A screen with three examples showing how to score skin lesions. Figure 10: A screen with a skin lesion to be scored using the scoring sliders and pressing the submit button.
arxiv-papers
2021-07-27T11:23:33
2024-09-04T03:07:21.317319
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Ralf Raumanns, Gerard Schouten, Max Joosten, Josien P. W. Pluim and\n Veronika Cheplygina", "submitter": "Ralf Raumanns", "url": "https://arxiv.org/abs/2107.12734" }
2107.12737
# A Study of the Soft X-ray Emission Lines in NGC 4151 I. Kinematic Properties of the Plasma Wind S. Grafton-Waters Mullard Space Science Laboratory, University College London, Holmbury St. Mary, Dorking, Surrey RH5 6NT, UK M. Ahmed S. Henson F. Hinds- Williams B Ivanova E. Marshall H. Udueni D. Theodorakis Nottingham University Academy of Science and Technology, 93 Abbey St, Lenton, Nottingham NG7 2PL W. Dunn Mullard Space Science Laboratory, University College London, Holmbury St. Mary, Dorking, Surrey RH5 6NT, UK ###### Abstract We present our analysis of the narrow emission lines produced in the plasma regions within the bright active galactic nucleus of NGC 4151, from an ORBYTS research-with-schools public engagement project. Our goal was to test whether the properties of these plasma regions changed between XMM-Newton observations spanning 15 years from 2000 to 2015, by measuring the outflow velocities and distances. From this study, we found that NGC 4151 has at least two to three plasma regions. There is no evidence of the outflowing wind properties changing as the velocities and distances are consistent throughout the observations. ## 1 Introduction NGC 4151 (z = 0.003262) is a type 1.5 Seyfert active galactic nucleus (AGN) with a black hole (BH) mass of $M_{BH}=3.59\times 10^{7}$ M$\odot$ (Bentz & Katz, 2015). While NGC 4151 is highly variable in the hard X-ray band (e.g. Beuchert et al., 2017), the soft X-ray spectrum is very similar to that of NGC 1068 with multiple strong emission features on top of an almost negligible continuum (e.g. Grafton-Waters, 2021a). This extreme contrast between soft and hard X-ray bands makes NGC 4151 an ideal target to study the properties of the narrow line region (NLR). The NLR is part of the outflowing wind, composed of separate plasma regions, that produces the emission lines observed in the X-ray spectra (see Figure 1). The aim of this ORBYTS research-with-schools public engagement was to assess whether the NLR properties changed between observations spanning a 15 year period, by measuring the outflow velocities and distances of each region. The code can be found at Grafton-Waters (2021b). Figure 1: (a) RGS spectrum (grey line) with the Gaussian models (red lines) fitted to the strongest emission lines. The lines we investigated are labelled with their respective ions. The r, i and f labels stand for resonance, intercombination and forbidden, respectively, corresponding to electron transitions in the He-like triplet ions (see e.g. Porquet & Dubau, 2000, for details). The insert shows the OVII f line fitted with its respective Gaussian. (b-c) Measured line velocities using Eq. 2 and (d-e) calculated distances from Eq. 3 are compared for 2000 (left) and 2015 (right). Colours indicate different observations from each epoch, as labelled in the legends, and the black dashed lines signify the boundaries between plasma regions. ## 2 Method NGC 4151 was observed 27 times by XMM-Newton during six separate epochs between 2000 and 2015. Here we analysed the reflection grating spectrometer (RGS; den Herder et al., 2001) data from each observation. The data were reduced using the RGSPROC command in the SAS software v 17.0.0111See https://www.cosmos.esa.int/web/xmm-newton/sas-thread-rgs. Any large background counts in CCD9 were removed before combining RGS1 and RGS2 data with RGSCOMBINE. We modelled the thirteen strongest emission lines (labelled in Figure 1) that were present in all X-ray spectra with a simple Gaussian model in Python, defined as $G(x)=\frac{A}{\sqrt{2\pi\sigma^{2}}}\exp{\left[-\frac{(x-\mu)^{2}}{2\sigma^{2}}\right]},$ (1) where A is the amplitude, $\sigma$ is the standard deviation, and $\mu$ is the mean value (the emission line centre). To measure the properties of each emission line we defined a wavelength range ($\lambda_{R}$) to ensure we were only fitting one line at a time. This is shown in the insert in Figure 1 (a). This Gaussian model and the X-ray spectrum were then fed into the LMFIT interface in Python (Newville et al., 2014), which returned the parameter values ($\mu$, $\sigma$, and A) and errors. To estimate the outflow velocity ($v_{out}$) of the plasma regions, we used the redshift ($z$) equation, given by $z=\frac{v_{out}}{c}=\frac{\lambda_{obs}-\lambda_{rest}}{\lambda_{rest}},$ (2) where c is the speed of light, and $\lambda_{obs}$ and $\lambda_{rest}$ are the observed and rest frame wavelengths, respectively. The velocity shift was measured for each emission line individually. The observed wavelength ($\mu$) was measured from our modelling and the rest wavelengths were obtained from the SPEX line list222https://personal.sron.nl/~kaastra/leiden2020/line_new.pdf. We note that it is not the emission line that has the velocity, but instead it is a property of the line-emitting plasma region. If many of the emission lines had similar values they were likely to originate from the same plasma region within the outflowing wind. To estimate the distances ($R$) from the BH we assumed that $v_{out}$ was greater than or equal to the escape velocity ($v_{esc}$) of the BH, given by $R=\frac{2GM_{BH}}{v^{2}_{esc}},$ (3) where G is the gravitational constant, and $M_{BH}$ is the BH mass. After modelling each emission line, and obtaining the velocities and distances from each observation, we compared results. This allowed us to evaluate whether the wind properties changed over time. ## 3 Results Figure 1 (a) shows the 2000 RGS spectrum with the Gaussian models fitted to the strongest emission lines; these lines are labelled. The insert in Figure 1 (a) displays the OVII forbidden line at 22.15 Å with the Gaussian model fitted on top. From the spectral modelling of all the observations, we compare the results for the velocities and distances in 2000 (left) and 2015 (right) in Figure 1 (b-c) and (d-e), respectively. The black dashed lines in Figure 1 indicate the plasma boundaries for $v_{out}$ and $R$, suggesting that there are at least two to three plasma regions. However, we cannot rule out the possibility of more. The results for 2000 and 2015 are consistent with the velocities and distance from all observations. Our aim was to see whether the outflowing wind properties changed over the course of 15 years. However, based on this investigation, we found no evidence of this. One may expect that from 2000 to 2015, the distances and velocities would have increased and decreased, respectively, as the plasma regions move away from the BH. However, assuming the plasma is travelling at 500 km s-1, the distance travelled in a 15 year time period would only be 0.008 pc, which is insignificant compared to the distances that we measured (i.e. $>1$ pc). One explanation could be that we are viewing the plasma perpendicular to the outflow direction, meaning we are unable to observe the true outflow velocity, since the Doppler shifting of lines would only represent a component of its true outflow velocity. Alternatively, the plasma has been relatively static over the 15 years, which is reasonable given the large distances from the BH. In that case, 15 years may simply not be enough time for us to observe any significant changes with regards to the outflowing wind in NGC 4151. We did have some problems when modelling the data, which could have affected the final results. For example, the line centre ($\mu$) depended on $\lambda_{R}$ which we set when modelling the lines. This meant that if $\lambda_{R}$ was too large, then multiple lines would be fitted together by the model, or if $\lambda_{R}$ was too small we would lose information about the feature. This was a particular problem if $\lambda_{R}$ for an emission line differed between observations, especially if the S/N ratios were poor. As a result, a slightly different velocity was obtained each time. ## 4 Conclusions From our RGS analysis on NGC 4151, we found that there are at least two to three plasma regions that produce the emission features in the outflowing wind. However, the velocities and distances are consistent throughout the observations. This implies that either the plasma regions have been relatively static over the 15 year observation period, or because we are seeing the outflowing wind perpendicular to the flow direction, we are not measuring the velocities in the direction of motion. This work was undertaken with the ORBYTS Research-with-schools public engagement project, partnering scientists with schools to support students’ involvement in space research. S.G.W. acknowledges the support of a PhD studentship awarded by the UK Science & Technology Facilities Council (STFC). ## References * Bentz & Katz (2015) Bentz, M. C., & Katz, S. 2015, PASP, 127, 67, doi: 10.1086/679601 * Beuchert et al. (2017) Beuchert, T., et al. 2017, A&A, 603, A50, doi: 10.1051/0004-6361/201630293 * den Herder et al. (2001) den Herder, J. W., et al. 2001, A&A, 365, L7, doi: 10.1051/0004-6361:20000058 * Grafton-Waters (2021b) Grafton-Waters, S., 2021b, sgwxray/ORBYTS Python Code, v1.0.0, Zenodo, doi: 10.5281/zenodo.5116838 * Grafton-Waters (2021a) Grafton-Waters, S., et al. 2021a, A&A, 649, A162, doi: 10.1051/0004-6361/202039022 * Newville et al. (2014) Newville, M., et al. 2014, LMFIT, 0.8.0, Zenodo, doi: 10.5281/zenodo.11813 * Porquet & Dubau (2000) Porquet, D., & Dubau, J. 2000, A&AS, 143, 495, doi: 10.1051/aas:2000192
arxiv-papers
2021-07-27T11:34:17
2024-09-04T03:07:21.336479
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "S. Grafton-Waters, M. Ahmed, S. Henson, F. Hinds-Williams, B Ivanova,\n E. Marshall, H. Udueni, D. Theodorakis, and W. Dunn", "submitter": "Sam Grafton-Waters MPhys", "url": "https://arxiv.org/abs/2107.12737" }
2107.12741
# Partitioning all $k$-subsets into $r$-wise intersecting families Noga Alon Princeton University, Princeton, NJ 08544, USA and Tel Aviv University, Tel Aviv 69978, Israel. Email: [email protected]. Research supported in part by NSF grant DMS-1855464 and BSF grant 2018267. ###### Abstract Let $r\geq 2$, $n$ and $k$ be integers satisfying $k\leq\frac{r-1}{r}n$. In the original arXiv version of this note we suggested a conjecture that the family of all $k$-subsets of an $n$-set cannot be partitioned into fewer than $\lceil n-\frac{r}{r-1}(k-1)\rceil$ $r$-wise intersecting families. We noted that if true this is tight for all values of the parameters, that the case $r=2$ is Kneser’s conjecture, proved by Lovász, and observed that the assertion also holds provided $r$ is either a prime number or a power of $2$. We have recently learned, however, that the assertion of the conjecture for all values of the parameters follows from a recent result of Azarpendar and Jafari [4]. ## 1 Introduction One of the earliest and possibly the best known application of topological methods in extremal combinatorics is the Kneser conjecture, now Lovász’ Theorem [6]. This theorem asserts that for every $n\geq 2k$ it is impossible to split the family of all $k$-subsets of an $n$-set into fewer than $n-2k+2$ intersecting families. The main purpose of this brief note is to study the following extension of this result. Call a family of subsets $r$-wise intersecting if any collection of at most $r$ subsets in it has a common point. ###### Theorem 1.1. Let $r\geq 2,n$ and $k$ be integers, and suppose $k\leq\frac{r-1}{r}n$. Then the family of all $k$-subsets of $[n]=\\{1,2,\ldots,n\\}$ cannot be partitioned into fewer than $\lceil n-\frac{r}{r-1}(k-1)\rceil$ $r$-wise intersecting families ${\cal F}_{i}$. This is tight for all admissible values of the parameters. The case $r=2$ is Kneser’s Conjecture proved by Lovász. As mentioned in the abstract, we have learned that this theorem is in fact a special case of a recent result of Azarpendar and Jafari, see Theorem 1.1 and Corollary 1.1 in [4]. Since we have already posted an early version of this note before learning about this paper, we still describe here the observation that the assertion of the theorem holds for every prime $r$ and for every $r$ which is a power of $2$. ## 2 Proof One can prove Theorem 1.1 for prime $r$ and for $r$ which is a power of $2$ using tools from equivariant topology. It is much simpler, however, to deduce it from known results about the chromatic numbers of stable Kneser hypergraphs. We start by describing these results. For $n\geq rk$ let $KG^{r}(k,n)$ denote the Kneser hypergraph whose vertex set is the set of all ${n\choose k}$ subsets of cardinality $k$ of an $n$-set $[n]=\\{1,2,\ldots,n\\}$ and whose edges are all $r$-tuples of $k$-sets which are pairwise disjoint. For $r=2$ this is the Kneser graph. Lovász proved that the chromatic number of $KG^{2}(k,n)$ is $n-2k+2$ for all $n\geq 2k$, and in [3] it is proved that the chromatic number of $KG^{r}(k,n)$ is $\lceil\frac{n-r(k-1)}{r-1}\rceil$ for all $n\geq rk$. Call a subset $F$ of $[n]$ $s$-stable if any two elements of $F$ are at distance at least $s$ in the cyclic order on $[n]$. Let $KG^{r}(k,n)_{s-stab}$ be the induced sub-hypergraph of $KG^{r}(k,n)$ on the set of vertices which are $s$-stable. Ziegler [9], and Drewnowski, Łuczak and the present author [2] conjectured that the chromatic number of $KG^{r}(k,n)_{r-stab}$ is also $\lceil\frac{n-r(k-1)}{r-1}\rceil$, just as that of the full hypergraph $KG^{r}(k,n)$. We need the following known result regarding this conjecture. ###### Theorem 2.1 ([8], [2]). If $r$ is any power of $2$ then the chromatic number of $KG^{r}(k,n)_{r-stab}$ is $\lceil\frac{n-r(k-1)}{r-1}\rceil$ for all admissible values of $k,n$. The case $r=2$ was proved by Schrijver in [8], and in [2] it is shown that if the result holds for $r_{1}$ and $r_{2}$ then it also holds for $r_{1}r_{2}$, implying the assertion for all powers of $2$. Improving results of Meunier [7] and of Alishahi and Hajiabolhassan [1], Frick proved in [5] that the chromatic number of $KG^{r}(k,n)_{2-stab}$ is $\lceil\frac{n-r(k-1)}{r-1}\rceil$. Another result proved in [5] is (a slightly stronger version of) the following. ###### Theorem 2.2 ([5], Theorem 3.10). For any prime $r$ and for any partition of $[n]$ into subsets $C_{i}$, each of size at most $r-1$, the induced subhypergraph of $KG^{r}(k,n)$ on the set of all vertices $F$ that contain at most $1$ element of each $C_{i}$ has chromatic number $\lceil\frac{n-r(k-1)}{r-1}\rceil$. Proof of Theorem 1.1 for $r$ prime or a power of $2$: The upper bound showing that the result is tight (for all values of $r$) is simple. Put $s=\lfloor\frac{rk-1}{r-1}\rfloor$. Then every collection of $r$ subsets of cardinality $k$ of the subset $S=\\{n-s+1,n-s+2,\ldots,n\\}$ has a common point. For every $i\leq n-s$ let $F_{i}$ be the collection of all $k$-subsets of $[n]$ whose minimum element is $i$. Let $F_{n-s+1}$ be the remaining $k$-subsets, that is, all those contained in $S$. This shows that there is a construction with $m=n-s+1=n-\lfloor\frac{rk-1}{r-1}\rfloor+1=\lceil n-\frac{r}{r-1}(k-1)\rceil,$ as needed. To prove the lower bound let $n,k,r$ and ${\cal F}_{1},\ldots{\cal F}_{m}$ be as in the statement of the theorem. Assume, first, that $r$ is a prime. Let $C_{1},C_{2},\ldots,C_{n}$ be $n$ pairwise disjoint sets, each of size $r-1$, and let $C=\cup_{i=1}^{n}C_{i}$ be their union. For each of the families ${\cal F}_{i}$, let ${\cal G}_{i}$ be the family of all $k$-subsets of $C$ obtained as follows. For each member $F=\\{i_{1},i_{2},\ldots,i_{k}\\}$ of ${\cal F}_{i}$, let $C(F)$ denote the family of all $(r-1)^{k}$ subsets of $C$ containing exactly one element of each $C_{i_{j}}$ for $1\leq j\leq k$. The family ${\cal G}_{i}$ is the union of all families $C(F)$ for $F\in{\cal F}_{i}$. We claim that no set ${\cal G}_{i}$ contains $r$ pairwise disjoint sets. Indeed, every collection of $r$ (not necessarily distinct) members $G_{1},G_{2},\ldots,G_{r}$ of ${\cal G}_{i}$ consists of subsets that belong to $C(F_{1}),C(F_{2}),\ldots,C(F_{r})$, respectively, for some (not necessarily distinct) members $F_{j}\in{\cal F}_{i}$. Since ${\cal F}_{i}$ is $r$-wise intersecting there is a common point, say $\ell$, in all sets $F_{j}$. Thus each $G_{j}$ contains a point of $C_{\ell}$ and as $|C_{\ell}|=r-1$ some pair of sets $G_{j}$ intersect inside $C_{\ell}$, by the pigeonhole principle. This proves the claim. Note that the union of all families ${\cal G}_{i}$ is exactly the collection of all the $k$-subsets of $C$ that contain at most $1$ element from each $C_{i}$. Therefore the families ${\cal G}_{i}$ provide a proper coloring of the hypergraph described in Theorem 2.2 with parameters $(r-1)n$, $r$ and $k$. The chromatic number of this hypergraph is $\lceil\frac{(r-1)n-r(k-1)}{r-1}\rceil$, providing the required lower bound for $m$. The proof for $r$ which is a power of $2$ is similar, using the result in Theorem 2.1. We apply the same construction with sets $C_{i}$ and families ${\cal G}_{i}$ as before, and place the sets $C_{i}$ along a cycle of length $(r-1)n$, where each set $C_{i}$ appears contiguously along the cycle. It is then easy to see that the union of the families ${\cal G}_{i}$ contains a copy of the hypergraph $KG^{r}((r-1)n,k)_{r-stab}$ on the set of vertices $C=\cup_{i=1}^{n}C_{i}$ of the cycle (as well as some additional hyperedges). As before, here too each family ${\cal G}_{i}$ contains no $r$ pairwise disjoint members. The lower bound thus follows from Theorem 2.1. This completes the proof. $\Box$ Acknowledgment I thank Ryan Alweiss for many helpful discussions and Amir Jafari for telling me about [4]. ## References * [1] M. Alishahi and H. Hajiabolhassan, On the chromatic number of general Kneser hypergraphs, J. Combin. Theory, Ser. B 115 (2015), 186–209. * [2] N. Alon, L. Drewnowski and T. Łuczak, Stable Kneser Hypergraphs and Ideals in N with the Nikodym Property, Proc. Amer. Math. Soc. (2009), 467–471. * [3] N. Alon, P. Frankl and L. Lovász, The chromatic number of Kneser hypergraphs, Trans. Amer. Math. Soc. 298 (1986), 359-370. * [4] S. Azarpendar and A. Jafari, On some topological and combinatorial lower bounds on the chromatic number of Kneser type hypergraphs, arXiv 2002.01748v3, 2020. * [5] F. Frick, Chromatic numbers of stable Kneser hypergraphs via topological Tverberg-type theorems, Int. Math. Res. Not. IMRN, no. 13 (2020), 4037–4061. * [6] L. Lovász, Kneser’s conjecture, chromatic number, and homotopy, J. Combin. Theory Ser. A 25 (1978), no. 3, 319–324. * [7] F. Meunier, The chromatic number of almost stable Kneser hypergraphs, J. Combin. Theory, Ser. A 118 (2011), no. 6, 1820–1828. * [8] A. Schrijver, Vertex-critical subgraphs of Kneser-graphs, Nieuw Archief voor Wiskunde 26 (1978), 454–461. * [9] G. M. Ziegler, Generalized Kneser coloring theorems with combinatorial proofs, Invent. Math. 147 (2002), no. 3, 671–691.
arxiv-papers
2021-07-27T11:36:03
2024-09-04T03:07:21.345240
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Noga Alon", "submitter": "Noga Alon", "url": "https://arxiv.org/abs/2107.12741" }
2107.12748
# Extremely low-energy collective modes in a quasi-one-dimensional system Z. X. Wei State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054, China S. Zhuang Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China Y. L. Su State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054, China L. Cheng State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054, China H. D. Zhou Department of Physics and Astronomy, University of Tennessee, Knoxville, Tennessee 37996, USA Z. Jiang School of Physics, Georgia Institute of Technology, Atlanta, Georgia 30332, USA H. Weng Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China J. Qi [email protected] State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054, China ###### Abstract We have investigated the quasiparticle dynamics and collective excitations in the quasi-one-dimensional material ZrTe5 using ultrafast optical pump-probe spectroscopy. Our time-domain results reveal two coherent oscillations having extremely low energies of $\hbar\omega_{1}\sim$0.33 meV (0.08 THz) and $\hbar\omega_{2}\sim$1.9 meV (0.45 THz), which are softened as the temperature approaches two different critical temperatures ($\sim$54 K and $\sim$135 K). We attribute these two collective excitations to the amplitude mode of charge density wave instabilities in ZrTe5 with tremendously small nesting wave vectors. Furthermore, scattering with the $\hbar\omega_{2}$ mode may result in a peculiar quasiparticle decay process with a timescale of $\sim$1-2 ps below the transition temperature $T^{*}$ ($\sim$135 K). Our findings provide pivotal information for studying the fluctuating order parameters and their associated quasiparticle dynamics in various low-dimensional topological systems and other materials. In a many-body system, interaction between the quasiparticles, and/or interaction between the quasparticles and other quantized modes may bring about various broken symmetry ground states G book 1994 , e.g. superconducting state, density wave state, and magnetically ordered state, accompanied simultaneously by abundant collective excitations, typical examples of which are phonons, density waves (charge or spin) and magnons obeying the Bose- Einstein statistics. Delicate balance among different interactions and phases might cause the fluctuating characteristics in some order parameters or collective excitations with a finite correlation time $\tau_{F}$ G book 1994 ; Kivelson_RMP_2003 . ZrTe5 is a quasi-one-dimensional material with highly anisotropic crystal lattice and electronic structures Weng_PRX_2014 . Their subtle correlations Weng_PRX_2014 ; J sciadv 2019 ; C PRX 2020 make this material enormously interesting. On the one hand, ZrTe5 is associated with the topological phases of matter, i.e. the topological insulator (TI) G PRL 2016 ; R PRX 2016 ; Weng_PRX_2014 ; Y PRB 2018 ; H PRB 2017 ; R PRX 2016 or the Dirac semimetal RY PRB 2015 ; Y NC 2016 ; Wang 2018 , which have been experimentally investigated by different equilibrium or quasi-equilibrium techniques, e.g. electronic transport Niu PRB2017 ; Terry PRB 1999 , infrared optical spectroscopy RY PRB 2015 ; ZG PNAS 2017 ; Jiang PRL2020 ; Jiang PRB 2017 ; B PRL 2018 , scanning tunneling microscope Li PRL 2016 ; R PRX 2016 , and angle- resolved photoemission spectroscopy (ARPES) R PRX 2016 ; H PRB 2017 . On the other hand, many unusual electronic responses such as the chiral magnetic effect Li_NPhy_2016 , anomalous Hall effect Liang NP 2018 , and 3D quantum Hall effect Tang Nature 2019 have been reported. It is believed that those exotic phenomena are connected to the peculiar fermionic and bosonic excitations in ZrTe5 with the anomalous phase transition around temperature $T^{*}$, where the resistivity presents a peak FJ PRB 1981 . In particular, the static charge density wave (CDW) stabilized by the external magnetic field was employed to interpret the 3D quantum Hall effect at temperatures below 20 K Tang Nature 2019 ; Qin_PRL_2020 , while the collective Dirac polarons were proposed to explain the sharp resistivity peak around $T^{*}$ Fu_PRL_2020 . However, the fluctuating nature of any unique collective excitation(s) in ZrTe5 has never been observed or elucidated, although the related dynamics could be critical to understand the emergent phenomena in this material previously observed via the quasi-equilibrium probing techniques. Figure 1: (a) Typical $\Delta R(t)/R$ data as a function of temperature at a pump fluence of $\sim$0.5 $\mu$J/cm2. Inset: $\Delta R(t)/R$ in short timescale. The red line is the pump-probe cross correlation profile. (b) and (c) Typical fitted curves (red solid lines) for $\Delta R(t)/R$ data using Eq. (1) at 5 K and 200 K, respectively. The blue, green and purple lines are for components with decay times $\tau_{1}$, $\tau_{2}$, and $\tau_{s}$, respectively. By contrast, the ultrafast optical pump-probe technique is a powerful tool that not only can reveal the quasiparticle dynamics associated with the topological properties Gedik PRL2011 ; Wang PRL 2016 but also is capable of unveiling the collective phenomena in a broad correlation time- or length scale Yusupov_PRL_2008 ; Torchinsky_NM_2013 ; Liu PRL 2020 . Here, using ultrafast optical pump-probe spectroscopy our measurements for the first time reveal two extremely low-energy collective amplitude mode oscillations ($\sim$0.33 meV and 1.9 meV) at low temperatures in the high-quality ZrTe5 single crystals note1 , which have a transition temperature $T^{*}$ of $\sim$135 K. We demonstrate these two modes arising from the fluctuating CDW triggered by the acoustic phonons. We also observe a novel quasiparticle dynamics associated with this type of bosonic mode emerging below $T^{*}$ with a ps-timescale. All measurements were performed using an ultrafast laser with a repetition rate of 80 MHz, a pulse width of $\sim$55 fs (FWHM), and a center wavelength tunable between 780 nm and 820 nm. Detailed information on experimental setup, sample preparation and additional data can also be found in the Supplemental Material Suppl and Refs. Wang PRL 2016 ; Qi PRL 2013 ; Liu PRL 2020 ; Jiang PRB 2017 ; Jiang PRL2020 ; W J 2016 . Figure 1 (a) shows the typical measured signals at low and high temperatures. Upon photoexcitation, all the $\Delta R(t)/R$ signals clearly exhibit an instantaneous rise, succeeded by lateral relaxation processes. Besides, rich damped ultrafast oscillations are superimposed on the non-oscillating decay background. These coherent oscillations can verify the high quality of our samples, as will be discussed in detail later. We first focus on the non-oscillatory signals. A close inspection of the rising curve (see the inset to Fig. 1(a)) reveals that it actually comprises two parts in the time-domain: (1) one exactly overlaps with the pump-probe cross correlation profile; (2) the other one shows relatively slow rising before the $\Delta R/R$ signal reaches the maximum value. We identify that the relative slow-rising can be well described by a sub-ps exponential decay process having amplitude with a different sign from that of the subsequent relaxation dynamics O PRL 2013 ; Qi APL 2010 (See also Supplemental Material for further details Suppl ). However, the succeeding relaxation process does not exactly follow a single exponential decay at all investigated temperatures. Rather, an extra decay process can be unambiguously observed below a critical temperature, which is nearly the same as the transition temperature $T^{*}\sim$135 K. According to these observations, we can fit our data using the following formula D PRL 2002 ; Wang PRL 2016 , $\Delta R(t)/R=(A_{1}e^{-\frac{t}{\tau_{1}}}+A_{2}e^{-\frac{t}{\tau_{2}}}+A_{s}e^{-\frac{t}{\tau_{s}}}+C)\otimes G(t),$ (1) where $A_{j}$ and $\tau_{j}$ ($j=1,2,s$) are the amplitudes and decay times, respectively. $A_{1}>0$ and $A_{2},A_{s}\leq 0$. Here, $\tau_{1}$ and $\tau_{s}$ represent the sub-ps and extra decay processes, respectively. $\tau_{2}$ is the subsequent decay after $\tau_{1}$ or $\tau_{s}$. $C$ is a constant, and $G(t)$ is an Gaussian function standing for the pump-probe cross correlation. As seen in Figs. 1(b) and (c), the fitted curves are in excellent agreement with the experimental data at low and high temperatures. Specifically, we found that $\tau_{1}$ is less than $\sim$0.3 ps, $\tau_{2}$ is $\sim$5-18 ps, and $\tau_{s}$ is $\sim$1-2 ps. The decay process characterized by $\tau_{s}$ emerges below $\sim 135$ K ($T^{*}$), or $A_{s}=0$ for $T\geq T^{*}$. The extracted $\tau_{j}$ ($j=1,2,s$) as a function of temperature are shown in Fig. 2. In general, the relaxation processes in conventional nonmagnetic materials disclosed by $\Delta R(t)/R$ can include the e-e thermalization, the e-ph scattering, the e-h recombination, and the thermal diffusion processes D Rev Mod Phys ; J Book 2013 ; R 2002 . The e-e thermalization usually has a timescale less than $\sim$100 femtoseconds. If this process is faster than the excitation pulse and out of the time resolution limit, it is often concealed in the initial rising signal, which then follows the pump-probe cross correlation profile. This is well consistent with our experiments. On the other hand, the thermal diffusion process and the e-h recombination across a direct gap with radiative decay have timescales larger than $\sim$100 ps, and clearly do not contribute to the three processes characterized by $\tau_{j}$ ($j=1,2,s$) shown in Figs. 1 and 2. Figure 2: (a) $\tau_{1}$ as a function of temperature. Red line is a fit via TTM. (b) Schematic of the hot carrier excited by $h\nu$ photon cooling via e-ph scattering. (c) $\tau_{2}$ as a function of temperature. Red line is a fit based on the phonon-assisted e-h recombination process. Inset: $1/\tau_{2}$ as a function of pump fluence at 5 K. (d) Schematic of the phonon-assisted e-h recombination. (e) $\tau_{s}$ as a function of temperature. Red line is a fit via TTM. (f) Schematic of the hot carrier cooling excited by $h\nu$ photon involved with unknown bosonic excitations emerging below $T^{*}$. Since $\tau_{1}$ and $\tau_{2}$ decay processes exist at all investigated temperatures, and experience a continuous change across $T^{*}$, they should represent a generic dynamical responses of ZrTe5, independent of any physics underlying the transition around $T^{*}$. In fact, the sub-ps process characterized by $\tau_{1}$ can be attributed to the photoexcited hot-carrier cooling via e-ph scattering (see Fig. 2(b)), which in turn leads to the optical phonon emission. Its $T$-dependence is quite similar with those of e-ph thermalization times observed in metals, semiconductors and topological materials Liang APL 2014 ; M PRB 2005 ; R PRB 1995 ; Qi APL 2010 ; J Book 2013 ; M Nano Lett 2012 . Such $T$-dependent behavior can be described by the two- temperature model (TTM) Allen PRL 1987 ; R PRB 1995 . Fig. 2(a) demonstrates that the fitted results using TTM agree very well with the experimental data. The fluence-dependent $\tau_{1}$ further confirms the effectiveness of TTM (see Supplemental Material Suppl ). Employing $\tau^{-1}=3\hbar\lambda\langle\omega^{2}\rangle(\pi k_{B}T_{e})^{-1}$ Allen PRL 1987 , we can further obtain the dimensionless e-ph coupling constant $\lambda$ to be $\sim$0.17 via $\tau_{1}(T)$. During the calculations, we obtained $\lambda\langle\omega^{2}\rangle\simeq 1.8$ $\times 10^{25}$ Hz${}^{2}\simeq$78.2 meV2, where the second moment of the phonon spectrum $\langle\omega^{2}\rangle$ is $\sim$6.2$\times 10^{4}$ K2 extracted via the Debye model. Figure 3: (a) Extracted oscillations for three typical temperatures. (b) The temperature-dependent Fourier transform spectra for the extracted oscillations. (c) The two low energy modes, $\omega_{1}$ and $\omega_{2}$, as a function of temperature in the frequency domain. The red dashed curves are guide lines. (d) At 5 K, wavelength dependence of the two low energy modes, $\omega_{1}$ and $\omega_{2}$, indicated by the red dashed lines. The $\tau_{2}$ decay process, with a timescale of $\sim$3-18 ps, illustrates a totally different $T$-dependent behavior as that of the $\tau_{1}$ process (see Fig. 2(c)). After the e-ph thermalization, the nonequilibrium electrons (holes) can still accumulate in the conduction (valence) bands. We might thus consider the phonon-assisted e-h recombination She PRB 2013 ; Dai PRB 2015 , where the electron and hole recombine with the assistance of e-ph scattering between the electron and hole pockets, as illustrated in Fig. 2(d). In fact, the conduction and valence band extrema for ZrTe5 are in close proximity within the Brillouin zone Weng_PRX_2014 ; Monserrat B Physical Review Research 2019 , in favor of such interband e-h scatterings. Therefore, we assign the $\tau_{2}$ decay to this type of recombination process. This inference is not only consistent with the fluence ($F$) dependence of $\tau_{2}^{-1}$ (inset of Fig. 2(c)) D PRL 2010 ; Liu PRL 2020 , but also is strongly justified by the excellent agreement between the experimental $\tau_{2}$ and the theoretical fitted results based on such recombination Suppl , as shown in the Fig. 2(c). The peculiar $\tau_{s}$ process emerges below $T^{*}$, implying that the $\tau_{s}$ decay should be associated with the physics behind the transition. At first glance, $T$-dependent behavior of $\tau_{s}$ well resembles that of $\tau_{1}(T)$. So we suspect that this $\tau_{s}$ process should microscopically resemble the e-ph scattering but involves unknown bosonic excitations emerging below $T^{*}$. Numerically, we still can use $\tau^{-1}=3\hbar\lambda\langle\omega^{2}\rangle(\pi k_{B}T_{e})^{-1}$ to fit $\tau_{s}$ based on the TTM Suppl . However, the fitted parameter $\lambda\langle\omega^{2}\rangle$ ($\sim$5.47 meV2) only gives an upper limit because the TTM now evolves into a three temperature model Wang PRB 2018 . At this stage, although the type of boson associated with $\tau_{s}$ is unknown (to be identified later), we can tell its energy is not very high and probably close to scale of the acoustic phonons based on its timescale (1-2 ps) Gedik PRL2011 . One may argue whether the $\tau_{s}$ process is associated with the Fermi level shifting from the valence band to the conduction band as the temperature decreases across $T^{*}$ Zhang NC 2017 . However, previous ultrafast optical studies on graphene I PRB 2020 demonstrated that when the Fermi level was continuously tuned across the Dirac point, no emergence or disappearance of any quasiparticle decay channel was observed except for change of the e-ph relaxation time. Therefore, this effect should be irrelevant here. Figure 4: $T$-dependence of the (a) $\omega_{1}$ and (b) $\omega_{2}$ modes. The red lines are fit described in the main text. (c) and (d) are $T$-dependent damping rates of the amplitudon for $\omega_{1}$ and $\omega_{2}$ modes, respectively. The red lines are fits using a power law ($\propto T^{\alpha}$). Now let us focus on the “rich” oscillations observed in $\Delta R(t)/R$. Fig. 3(a) shows the typical time domain signals at temperatures below and above $T^{*}$. The temperature evolution of the oscillatory signals can be revealed by the Fourier transform data in the frequency domain (see Fig. 3(b)), where five modes with distinct frequencies are clearly observed. In general, the oscillations with THz frequency in pump-probe spectroscopy arise from the coherent optical phonon modes near the $\Gamma$ point due to the coherent Raman scattering or displacive excitation H PRB 1992 . The exact modes can be revealed by a direct comparison with the Raman spectroscopy data Taguchi I Solid state communications 1983 ; Landa G Solid state communications 1984 (see also the Supplemental Material Suppl ). We thus obtain that three modes with center frequencies near $\sim$1.2 THz, $\sim$3.7 THz, and $\sim$4.6 THz are attributed to the $A_{g}$ phonon modes. These modes are characteristics of a high quality ZrTe5 single crystal, first-time observed simultaneously in the time-resolved measurements. Temperature-dependence of all these modes can be well described by the anharmonic phonon model Suppl . Unexpectedly, as shown in Figs. 3(b)-(d), we also clearly observed two low energy modes with frequencies of $\omega_{1}/2\pi\sim$0.08 THz and $\omega_{2}/2\pi\sim$0.45 THz, respectively. These two modes cannot be attributed to the optical phonons since their frequencies are well under the low frequency limit of the Raman-active optical phonons, i.e. $\sim$1 THz, obtained by our theoretical calculations Suppl . In specific, the $\omega_{1}$ mode, emerging below $\sim$60 K, exhibits a clear softening as the temperature increases. The $\omega_{2}$ mode is non-observable above $\sim T^{*}$. One might first suspect they originate from the low energy acoustic phonons. However, the estimated phonon frequency and the corresponding probe-wavelength dependent shift significantly deviate from our observations (see Fig. 3(d) and Supplemental Material Suppl ). Therefore, we can exclude such a possibility J PRB 2006 ; D PRB 2005 ; R PRL 2017 . Since in ZrTe5 the long-range CDW order stabilized using the strong external magnetic field has been proposed to explain the quantum Hall effect Tang Nature 2019 ; Qin_PRL_2020 , these two modes, thus, might be attributed to the CDW instabilities triggered by the low-energy acoustic phonon mode G book 1994 . The dynamical CDW may give rise two collective excitations: (1) the amplitude mode (amplitudon) exhibits a gap when the wave vector approaches zero, and (2) the phase mode (phason) is gapless. Because the phason has similar dispersion relation as that of acoustic phonon, it is expected to bear the same wavelength dependence R PRL 2017 and thus cannot contribute to these two low energy modes. We thus finally arrive at the most reasonable candidate for these two modes, i.e. the amplitudon of CDW. Particularly, we notice that $T$ dependence of these two modes is quite similar with the temperature evolution of the fluctuating CDW G book 1994 ; R PRL 2017 ; Yusupov_PRL_2008 , as seen in Figs. 4(a) and (b). $\omega_{1}$ and $\omega_{2}$ as a function $T$ can well be fitted by a mean-field-like $T$ dependence Yusupov_PRL_2008 ; G book 1994 : $\omega_{A}=\omega_{A}(0)(1-T/T_{C})^{\beta}$, where $T_{C}$ is defined as a transition temperature. Satisfactory fits to the data in Figs. 4(a)-(b) give note2 : $\beta_{\omega_{1}}\simeq$0.25 and $\beta_{\omega_{2}}\simeq$0.1 corresponding to $T_{C}^{\omega_{1}}\simeq 54$ K and $T_{C}^{\omega_{2}}\simeq 135$ K, respectively. $\beta_{\omega_{1}}$ having a value of $\sim$1/4 indicates that $\omega_{1}$ mode has a pure one-dimensional origin note2 . In fact, such character is consistent with our theoretical calculations Suppl . Specifically, the obtained phonon linewidth in ZrTe5 has a quasi-one- dimensional character, i.e. the corresponding values of three acoustic modes along the $\Gamma-Z$ direction (inter-plane) are in general larger than those along others. Since the e-ph interactions dominate the order parameter Qin_PRL_2020 , it is not surprising that a fluctuating CDW can emerge along the inter-plane direction ($b$-axis). By contrast, the $\omega_{2}$ mode cannot belong to a simple one-dimensional case. The intricate $\omega_{2}$ mode might have higher dimensional characteristics, and needs to be unveiled by further investigations. The $T$-dependent damping rate $\Gamma_{1}$ ($\Gamma_{2}$) for the $\omega_{1}$ ($\omega_{2}$) mode can be extracted by fitting the oscillatory signals via a damped sine function Suppl , as shown in Figs. 4(c) and (d). In order to compare with the theoretical calculations Takada_PRB_1985 ; Richard_SSC_1993 , we used a power law ($\propto T^{\alpha}$) to fit the data, and obtained that $\Gamma_{1}$ and $\Gamma_{2}$ scale well as $T$ and $T^{0.6}$, respectively. Such $T$-scalings clearly deviate from the theoretical intrinsic damping Takada_PRB_1985 ; Richard_SSC_1993 ; Torchinsky_NM_2013 , i.e. $T^{2}$ away from $T_{C}$ and $T^{5}$ close to $T_{C}$, respectively. Indeed, decay of the amplitudon includes both the intrinsic damping and correlation time of the fluctuating CDW. Therefore, $\Gamma_{1}^{-1}$ and $\Gamma_{2}^{-1}$ here provide a lower bound of the correlation time $(\tau_{F})_{1}$ and $(\tau_{F})_{2}$. As is known, the acoustic phonon may soften significantly at $q=2k_{f}$ upon the phase transition of CDW G book 1994 . In the $q=$0 limit, $\omega_{A}\simeq\lambda^{1/2}\omega_{2k_{f}}$, where $\omega_{2k_{f}}$ is the frequency of the softening phonon above the phase transition connected to the frequency of amplitudon ($\omega_{A}$) via the e-ph coupling constant $\lambda$. Therefore, using a linear dispersion approximation with sound velocity of $v_{s}\sim 10^{3}$ m/s Wang_JAP_2018 , $k_{f}$ can be estimated to have values of 0.053 Å-1 and 0.34 Å-1 for $\omega_{1}$ and $\omega_{2}$ modes, respectively. Although we do not have accurate knowledge of anisotropic $v_{s}$ associated with $\omega_{1}$ and $\omega_{2}$ modes, based on these two estimated values we can conclude that their corresponding modulation wave vectors should be very small. Such uncommonly small $k_{f}$ values indicate that our observed density waves have tremendously long lattice modulation periods in the real space. These results are directly due to the extremely low energies of $\omega_{1}$ and $\omega_{2}$ modes. Interestingly, these derived values are consistent with the work demonstrating the 3D quantum Hall effect Tang Nature 2019 . Since $\omega_{1}$ and $\omega_{2}$ modes now can be attributed to the fluctuating CDW that obeys the Bose-Einstein statistics, they can naturally be assigned to the bosons contributing to the $\tau_{s}$ decay process emerging below $T^{*}$. However, the $\omega_{2}$ mode is the mostly possible candidate due to two reasons: (1) appearance temperature of this mode coincides with that of the $\tau_{s}$ process; (2) No clear anomalies at $T_{C}^{\omega_{1}}$ were found in the $T$-dependent $\tau_{s}$ and $A_{s}$ Suppl ; (3) energy of the $\omega_{1}$ mode is nearly smaller by an order than that of the $\omega_{2}$ mode so that the timescale of energy exchange between the nonequilibrium quasiparticles and $\omega_{1}$ mode can mix up with the long thermal diffusion process, where large number of low-energy acoustic phonons will overwhelm the CDW modes. In summary, using the ultrafast optical spectroscopy we present a detailed investigation on the quasi-one-dimensional system ZrTe5. Our results reveal that below $T^{*}$, there emerges a new quasiparticle decay process with a timescale of $\sim$1-2 ps, in addition to the two relaxation dynamics persisting at all temperatures with timescales of $\sim$0.15-0.3 ps and $\sim$3-18 ps, respectively. We address that this new decay process is most likely due to appearance of some novel collective excitations in ZrTe5, while the other two can be attributed to the electron-phonon (e-ph) scattering and the phonon-assisted electron-hole (e-h) recombination processes. Surprisingly, our experimental data for the first time unambiguously reveal two coherent oscillations with extremely small energies occurring below two distinct temperatures $\sim$54 K and $\sim$135 K, respectively. We argue that they arise from the amplitude mode of fluctuating CDW triggered by the acoustic phonons, and can well explain the new observed quasiparticle decay below $T^{*}$. Whether these findings are connected to the other emergent phenomena in this system deserves further explorations. We acknowledge the valuable discussion from Hrvoje Petek. This work was supported by the National Natural Science Foundation of China (Grants Nos. 11974070, 11734006, 11925408, 11921004), the Frontier Science Project of Dongguan (2019622101004), the National Key R&D Program of China (Grant Nos. 2016YFA0300600 and 2018YFA0305700), the Strategic Priority Research Program of Chinese Academy of Sciences (Grant No. XDB33000000), the K. C. Wong Education Foundation (Grant No. GJTD-2018-01), the Beijing Natural Science Foundation (Grant No. Z180008), the Beijing Municipal Science and Technology Commission (Grant No. Z191100007219013), and the CAS Interdisciplinary Innovation Team. ## References * (1) G. Grüner, Density waves in solids (Perseus, Cambridge, MA, 1994). * (2) S. A. Kivelson, I. P. Bindloss, E. Fradkin, V. Oganesyan, J. M. Tranquada, et al., Rev. Mod. Phys. 75, 1201 (2003). * (3) H. Weng, X. Dai, and Z. Fang, Phys. Rev. X 4, 011002 (2014). * (4) J. Mutch, W. C. Chen, P. Went, T. Qian, I. Z. Wilson, et al., Sci. Adv. 5, eaav9771 (2019). * (5) C. Vaswani, L. L. Wang, D. H. Mudiyanselage, Q. Li, P. M. Lozano, et al., Phys. Rev. X 10, 021013 (2020). * (6) R. Wu, J. Z. Ma, S. M. Nie, L. X. Zhao, X. Huang, et al., Phys. Rev. X 6, 021017 (2016). * (7) G. Manzoni, L. Gragnaniello, G. Autès, T. Kuhn, A. Sterzi, et al., Phys. Rev. Lett. 117, 237601 (2016). * (8) H. Xiong, J. A. Sobota, S. L. Yang, H. Soifer, A. Gauthier, et al., Phys. Rev. B 95, 195119 (2017). * (9) Y. Y. Lv, B. Bin Zhang, X. Li, K. W. Zhang, X. B. Li, et al., Phys. Rev. B 97, 115137 (2018). * (10) R. Y. Chen, S. J. Zhang, J. A. Schneeloch, C. Zhang, Q. Li, et al., Phys. Rev. B 92, 075107 (2015). * (11) Y. Liu, X. Yuan, C. Zhang, Z. Jin, A. Narayan, et al., Nat. Commun. 7, 12516 (2016). * (12) J. Wang, J. Niu, B. Yan, X. Li, R. Bi, et al., Proc. Natl. Acad. Sci. U. S. A. 115, 9145 (2018). * (13) T. M. Tritt, N. D. Lowhorn, R. T. Littleton, A. Pope, C. R. Feger, and J. W. Kolis, Phys. Rev. B 60, 7816 (1999). * (14) J. Niu, J. Wang, Z. He, C. Zhang, X. Li, et al., Phys. Rev. B 95, 035420 (2017). * (15) Y. Jiang, Z. L. Dun, H. D. Zhou, Z. Lu, K. W. Chen, et al., Phys. Rev. B 96, 041101 (2017). * (16) Z. G. Chen, R. Y. Chen, R. D. Zhong, J. Schneeloch, C. Zhang, et al., Proc. Natl. Acad. Sci. U. S. A. 114, 816 (2017). * (17) B. Xu, L. X. Zhao, P. Marsik, E. Sheveleva, F. Lyzwa, et al., Phys. Rev. Lett. 121, 187401 (2018). * (18) Y. Jiang, J. Wang, T. Zhao, Z. L. Dun, Q. Huang, et al., Phys. Rev. Lett. 125, 046403 (2020). * (19) X. B. Li, W. K. Huang, Y. Y. Lv, K. W. Zhang, C. L. Yang, et al., Phys. Rev. Lett. 116, 176803 (2016). * (20) Q. Li, D. E. Kharzeev, C. Zhang, Y. Huang, I. Pletikosić, et al., Nat. Phys. 12, 550 (2016). * (21) T. Liang, J. Lin, Q. Gibson, S. Kushwaha, M. Liu, et al., Nat. Phys. 14, 451 (2018). * (22) F. Tang, Y. Ren, P. Wang, R. Zhong, J. Schneeloch, et al., Nature 569, 537 (2019). * (23) F. J. DiSalvo, R. M. Fleming, and J. V. Waszczak, Phys. Rev. B 24, 2935 (1981). * (24) F. Qin, S. Li, Z. Z. Du, C. M. Wang, W. Zhang, et al., Phys. Rev. Lett. 125, 206601 (2020). * (25) B. Fu, H. W. Wang, and S. Q. Shen, Phys. Rev. Lett. 125, 256601 (2020). * (26) D. Hsieh, F. Mahmood, J. W. McIver, D. R. Gardner, Y. S. Lee, and N. Gedik, Phys. Rev. Lett. 107, 077401 (2011). * (27) M. C. Wang, S. Qiao, Z. Jiang, S. N. Luo, and J. Qi, Phys. Rev. Lett. 116, 036601 (2016). * (28) R. V. Yusupov, T. Mertelj, J. H. Chu, I. R. Fisher, and D. Mihailovic, Phys. Rev. Lett. 101, 246402 (2008). * (29) D. H. Torchinsky, F. Mahmood, A. T. Bollinger, I. Božović, and N. Gedik, Nat. Mater. 12, 387 (2013). * (30) Y. P. Liu, Y. J. Zhang, J. J. Dong, H. Lee, Z. X. Wei, et al., Phys. Rev. Lett. 124, 057404 (2020). * (31) The unique properties of ZrTe5 do not manifest them in previous time-resolved optical experiments Zhang PRB 2019 ; Li PRB 2020 , primarily due to the critical deficiencies in these measurements such as the usage of unreliable samples, evidenced by the absence of various coherent Raman modes characterizing the quality of ZrTe5. * (32) X. Zhang, H. Y. Song, X. C. Nie, S. B. Liu, Y. Wang, et al., Phys. Rev. B 99, 125141 (2019). * (33) N. Li, W. Liang, and S. N. Luo, Phys. Rev. B 101, 014304 (2020). * (34) See Supplemental Material for additional data, more experimental and theoretical details, which includes Refs. Weng_PRX_2014 ; Jiang PRB 2017 ; Li_NPhy_2016 ; 1 ; 4 ; 5 ; 6 ; 7 ; 9 ; Landa G Solid state communications 1984 ; 10 ; 11 ; 12 ; Qi PRL 2013 ; Balkanski M PRB 1983 ; Menendez J PRB 1984 ; Tang H PRB 1991 ; 17 ; 18 ; 19 ; 20 ; 22 ; 23 ; 24 ; 25 ; 26 ; 27 ; 28 . * (35) J. Qi, T. Durakiewicz, S. A. Trugman, J. X. Zhu, P. S. Riseborough, et al., Phys. Rev. Lett. 111, 057402 (2013). * (36) T. Dekorsy, G. C. Cho, and H. Kurz, in Light Scattering in Solids VIII, Ed. by M. Cardona and G. Güntherodt, (Springer, Berlin, 2000) * (37) P. B. Allen, Phys. Rev. B 6, 2577 (1972). * (38) R. H. Groeneveld, R. Sprik, and A. Lagendijk, Phys. Rev. B 51, 11433 (1995). * (39) A. A. Lopez, Phys. Rev. 175, 823 (1968). * (40) A. Zwick, G. Landa, R. Carles, M. A. Renucci, and A. Kjekshus, Solid State Commun 44, 89 (1982). * (41) R. Merlin, Solid State Commun. 102, 207 (1997). * (42) G. A. Garrett, T. F. Albrecht, J. F. Whitaker, and R. Merlin, Phys. Rev. Lett. 77, 3661 (1996). * (43) I. Gdor, T. Ghosh, O. Lioubashevski, and S. Ruhman, J. Phys. Chem. Lett. 8, 1920 (2017). * (44) G. Batignani, C. Ferrante, G. Fumero, and T. Scopigno, J. Phys. Chem. Lett. 10, 7789 (2019). * (45) Z. Guo, H. Gu, M. Fang, B. Song, W. Wang, X. Chen, C. Zhang, H. Jiang, L. Wang, and S. Liu, ACS Materials Lett. 3, 525 (2021). * (46) V. L. Ginzburg, Sov. Phys. Usp. 5, 649 (1963). * (47) Y. Toda, F. Kawanokami, T. Kurosawa, M. Oda, I. Madan, T. Mertelj, V. V. Kabanov, and D. Mihailovic, Phys. Rev. B 90, 094513(2014). * (48) A. Kogar, A. Zong, P. E. Dolgirev, X. Z. Shen, et al., Nat. Phys. 16, 159 (2019). * (49) S. Furuseth, L. Brattas, and A. Kjekshus. J. Acta Chemica Scandinavica 27, 2367 (1973). * (50) P. Giannozzi, S. Baroni, et al., J. Phys. Condens. Matter 21, 395502 (2009). * (51) P. Giannozzi, O. Andreussi, et al., J. Phys. Condens. Matter 29, 465901 (2017). * (52) S. Baroni, S. d. Gironcoli, A. D. Corso, and P. Giannozzi, Rev. Mod. Phys. 73, 515 (2001). * (53) D. R. Hamann. Phys. Rev. B 88, 085117 (2013). * (54) F. Giustino, M. L. Cohen, and S. G. Louie. Phys. Rev. B 76, 165108 (2007). * (55) S. Poncé, E.R. Margine, C. Verdi, and F. Giustino. Comput. Phys. Commun. 209, 116 (2016). * (56) G. Landa, A. Zwick, R. Carles, M. A. Renucci, and A. Kjekshus, Solid State Commun. 49, 1095 (1984). * (57) M. Balkanski, R. F. Wallis, and E. Haro, Phys. Rev. B 28, 1928 (1983). * (58) J. Menéndez and M. Cardona, Phys. Rev. B 29, 2051 (1984). * (59) H. Tang and I. P. Herman, Phys. Rev. B 43, 2299 (1991). * (60) W. Yu, Y. Jiang, J. Yang, Z. L. Dun, H. D. Zhou, et al., Sci. Rep. 6, 353357 (2016). * (61) J. Qi, X. Chen, W. Yu, P. Cadden-Zimansky, D. Smirnov, et al., Appl. Phys. Lett. 97, 182102 (2010). * (62) J. P. Hinton, J. D. Koralek, G. Yu, E. M. Motoyama, Y. M. Lu, et al., Phys. Rev. Lett. 110, 217002 (2013). * (63) D. J. Hilton and C. L. Tang, Phys. Rev. Lett. 89, 146601 (2002). * (64) J. Shah, Ultrafast spectroscopy of semiconductors and semiconductor nanostructures. (Springer Science Business Media, 2013). * (65) D. N. Basov, R. D. Averitt, D. Van Der Marel, M. Dressel, and K. Haule, Rev. Mod. Phys. 83, 471 (2011). * (66) R. D. Averitt and a J. Taylor, J. Phys. Condens. Matter 14, R1357 (2002). * (67) R. H. M. Groeneveld, R. Sprik, and A. Lagendijk, Phys. Rev. B 51, 11433 (1995). * (68) M. Hase, K. Ishioka, J. Demsar, K. Ushida, and M. Kitajima, Phys. Rev. B 71, 184301 (2005). * (69) M. Hajlaoui, E. Papalazarou, J. Mauchain, G. Lantz, N. Moisan, et al., Nano Lett. 12, 3532 (2012). * (70) L. Cheng, C. La-O-Vorakiat, C. S. Tang, S. K. Nair, B. Xia, et al., Appl. Phys. Lett. 104, 211906 (2014). * (71) P. B. Allen, Phys. Rev. Lett. 59, 1460 (1987). * (72) Y. M. Sheu, Y. J. Chien, C. Uher, S. Fahy, and D. A. Reis, Phys. Rev. B 87, 075429 (2013). * (73) Y. M. Dai, J. Bowlan, H. Li, H. Miao, S. F. Wu, et al., Phys. Rev. B 92, 161104 (2015). * (74) B. Monserrat and A. Narayan, Phys. Rev. Res. 1, 033181 (2019). * (75) D. H. Torchinsky, G. F. Chen, J. L. Luo, N. L. Wang, and N. Gedik, Phys. Rev. Lett. 105, 027005 (2010). * (76) M. C. Wang, H. S. Yu, J. Xiong, Y. F. Yang, S. N. Luo, et al., Phys. Rev. B 97, 155157 (2018). * (77) Y. Zhang, C. Wang, L. Yu, G. Liu, A. Liang, et al., Nat. Commun. 8, 15512 (2017). * (78) I. Katayama, K. I. Inoue, Y. Arashida, Y. Wu, H. Yang, et al., Phys. Rev. B 101, 245408 (2020). * (79) H. J. Zeiger, J. Vidal, T. K. Cheng, E. P. Ippen, G. Dresselhaus, and M. S. Dresselhaus, Phys. Rev. B 45, 768 (1992). * (80) I. Taguchi, A. Grisel, and F. Levy, Solid State Commun. 46, 299 (1983). * (81) D. Lim, V. K. Thorsmølle, R. D. Averitt, Q. X. Jia, K. H. Ahn, et al., Phys. Rev. B 71, 134403 (2005). * (82) J. K. Miller, J. Qi, Y. Xu, Y. J. Cho, X. Liu, et al., Phys. Rev. B 74, 113313 (2006). * (83) R. Y. Chen, S. J. Zhang, M. Y. Zhang, T. Dong, and N. L. Wang, Phys. Rev. Lett. 118, 107402 (2017). * (84) $\beta$ will arrive at 1/4 under the condition of $\omega_{A}\gg$$v_{f}q$ in one-dimensional case G book 1994 . * (85) S. Takada, K. Y. M. Wong, and T. Holstein, Phys. Rev. B 32, 4639 (1985). * (86) J. Richard and J. Chen, Solid State Commun. 86, 485 (1993). * (87) C. Wang, H. Wang, Y. B. Chen, S. H. Yao, and J. Zhou, J. Appl. Phys. 123, 175104 (2018).
arxiv-papers
2021-07-27T11:42:34
2024-09-04T03:07:21.354668
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Z. X. Wei, S. Zhang, Y. L. Su, L. Cheng, H. D. Zhou, Z. Jiang, H.\n Weng, and J. Qi", "submitter": "Jingbo Qi", "url": "https://arxiv.org/abs/2107.12748" }
2107.12749
# The glueball content of $\eta_{c}$ Renqiang Zhang Wei Sun [email protected] Ying Chen [email protected] Ming Gong Long-Cheng Gui Zhaofeng Liu Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, P.R. China School of Physics, University of Chinese Academy of Sciences, Beijing 100049, P.R. China Department of Physics, Hunan Normal University, Changsha 410081, P.R. China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education, Changsha 410081, P.R. China Synergetic Innovation Center for Quantum Effects and Applications(SICQEA), Hunan Normal University, Changsha 410081, P.R. China ###### Abstract We carry out the first lattice QCD derivation of the mixing energy and the mixing angle of the pseudoscalar charmonium and glueball on two gauge ensembles with $N_{f}=2$ degenerate dynamical charm quarks. The mixing energy is determined to be $49(6)$ MeV on the near physical charm ensemble, which seems insensitive to charm quark mass. By the assumption that $X(2370)$ is predominantly a pseudoscalar glueball, the mixing angle is determined to be approximately $4.6(6)^{\circ}$, which results in a $+3.9(9)$ MeV mass shift of the ground state pseudoscalar charmonium. In the mean time, the mixing can raise the total width of the pseudoscalar charmonium by 7.2(8) MeV, which explains to some extent the relative large total width of the $\eta_{c}$ meson. As a result, the branching fraction of $\eta_{c}\to\gamma\gamma$ can be understood in this $c\bar{c}$-glueball mixing framework. On the other hand, the possible discrepancy of the theoretical predictions and the experimental results of the partial width of $J/\psi\to\gamma\eta_{c}$ cannot be alleviated by the $c\bar{c}$-glueball mixing picture yet, which demands future precise experimental measurements of this partial width. ## 1 Introduction The $\eta_{c}$ meson is usually assigned to be the $1^{1}S_{0}$ state of charmonium in the quark model. The latest review of the Particle Data Group (PDG) [1] gives its mass and the total width to be $m_{\eta_{c}}=2983.9\pm 0.4$ MeV and $\Gamma_{\eta_{c}}=32.0\pm 0.7$ MeV, respectively. Its width seems quite large among the charmonium states below the $D\bar{D}$ threshold, since its strong decays take place only through the Okubo-Zweig-Iizuka rule (OZI rule) [2, 3, 4] suppressed processes. This large width motivates the scenario that $\eta_{c}$ may have a sizable glueball component. Among the established flavor singlet pseudoscalar mesons, $\eta(1405)$ is usually taken as a candidate for the pseudoscalar glueball [5, 6, 7]. However, the quenched lattice QCD studies [8, 9, 10, 11] predict that the mass of the pseudsoscalar glueball is around 2.4-2.6 GeV, which is confirmed by lattice simulations with dynamical quarks [12, 13, 14] (Note that in these lattice studies with dynamical quarks, only gluonic operators built from Wilson loops were used and the possible mixing of glueballs with $q\bar{q}$ mesons and multiple meson states were not considered yet). This raised a question on $\eta(1405)$ as a glueball candidate because of its much lighter mass. On the other hand, there is also a theoretical analysis claiming that $\eta(1405)$ and $\eta(1475)$ can be the same state belong to the $q\bar{q}$-nonet in the 1.3-1.5 GeV mass region [15], such that there is no need of a pseudoscalar glueball state in this region. Given the mass of the pseudoscalar glueball predicted by lattice QCD, it is intriguing to study the possible mixing between the pseudoscalar charmonium and the glueball. Apart from the total width of $\eta_{c}$, this mixing scenario is also physically relevant to the understanding of $\eta_{c}$ properties in the $\eta_{c}\to\gamma\gamma$ [16, 17, 18, 19] and $J/\psi\to\gamma\eta_{c}$ processes [20, 21, 22, 23, 24, 25], where there exist more or less tensions between the experimental observations and the theoretical expectations. The phenomenological and lattice studies on this topic can be found in Refs. [26, 27, 28, 29]. In this work, we investigate the charmonium-glueball mixing relevant to $\eta_{c}$ in the lattice QCD formalism. There have been pioneering lattice studies of the mixing of the scalar glueball and $q\bar{q}$ mesons [30, 31]. Strictly speaking, this kind of study should be carried out by the lattice calculation with dynamical quarks. It is known that glueballs are flavor singlets and can mix only with flavor singlet $q\bar{q}$ mesons or meson systems. The propagator of a flavor singlet $q\bar{q}$ meson has contributions from both connected and disconnected quark diagrams. Theoretically, in full QCD the disconnected diagrams are the valence quark loops sandwiched with a tower of sea quark loops. When dynamical quarks are absent, the propagator of a flavor singlet $q\bar{q}$ state is not complete such that there are no propagating modes. Since this work is an exploratory study on the charmonium- glueball mixing, we generate the gauge configurations with charm sea quarks and omit light sea quarks for the theoretical simplicity. Our lattice setup is unitary for charm quarks and permits the charmonium-glueball mixing to take place at any time in a temporal interval, since the species of the sea quarks and the valence quarks are the same. In practice, we generate two large gauge ensembles with two degenerate flavors of charm sea quarks. The Large statistics are mandatory for glueballs to have good signal-to-noise ratios. The key task of this study is the calculation of the annihilation diagrams of charm quarks, which is highly computational demanding. For this we adopt the distillation method [32] which enables us to realize the gauge covariant smearing of quark fields and the all-to-all quark propagators simultaneously. ## 2 Numerical Details ### 2.1 Lattice Setup As an exploratory study, we ignore the effect of light quarks and generate gauge configurations with $N_{f}=2$ flavors degenerate charm sea quarks on an $L^{3}\times T=16^{3}\times 128$ anisotropic lattice with the aspect ratio being set to $\xi=a_{s}/a_{t}=5$, where $a_{t}$ and $a_{s}$ are the temporal and spatial lattice spacing, respectively. The lattice spacing $a_{s}$ is determined to be $a_{s}=0.1026$ fm through the static potential and $r_{0}=0.491$ fm.We use the tadpole improved anisotropic clover fermion action and tadpole improved gauge action, the details of lattice action can be found in [14]. To investigate the mass dependence of the mixing, we generate two gauge ensembles (denoted by Ensemble I and Ensemble II) with different bare charm quark masses. The parameters of the gauge ensembles are listed in Table 1, where $m_{J/\psi}$ is the corresponding mass of the vector charmonium on these two ensembles. The charm quark mass on Ensemble II is close to the physical one with $m_{J/\psi}=3068$ MeV, which is not far from the experimental $J/\psi$ mass $3097$ MeV. The quark mass on Ensemble I is a little lighter than the physical charm quark mass. We would like to use these two ensembles to check quark mass dependence of our results. In order to get good signals of glueballs, we generate the gauge ensembles with high statistics in this study. Table 1: Parameters of two $N_{f}=2$ gauge ensembles with degenerate charm sea quarks. Ensemble | $L^{3}\times T$ | $\beta$ | $a_{s}$(fm) | $\xi$ | $N_{\mathrm{cfg}}$ | $m_{J/\psi}$(MeV) ---|---|---|---|---|---|--- I | $16^{3}\times 128$ | 2.8 | $0.1026$ | 5 | $7000$ | $2743(1)$ II | $16^{3}\times 128$ | 2.8 | $0.1026$ | 5 | $6084$ | $3068(1)$ ### 2.2 Operators and correlation functions The principal goal of this work is to investigate the possible mixing of the pseudoscalar glueball and the pseudoscalar $c\bar{c}$ meson, therefore the annihilation diagrams of charm quark and antiquark should be taken care of. For this to be done, we adopt the distillation method [32]: First, for each configuration and on each time slice, we calculate $N=50$ eigenvectors $v_{n}(t)$ of the gauge covariant spatial lattice Laplacian operator $-\nabla_{xy}^{2}(t)$. Thus the smeared charm quark field $c^{(s)}$ can be obtained by $c^{(s)}(\mathbf{x},t)=[V(t)V^{\dagger}(t)]_{\mathbf{xy}}c(\mathbf{y},t)$ where $V(t)$ is a matrix with each column being an eigenvector $v_{n}(t)$. Secondly, the all-to-all propagator $S^{(c)}_{\alpha\beta}(\mathbf{x},t;\mathbf{y},t^{\prime})$ of $c^{(s)}$ can be derived through perambulators defined in the framework of the distillation method (one can refer to Ref. [33] for the technical details). Physically, there is only one flavor of the charm quark, while we have two degenerate flavors of charm quarks in the fermion action of our setup, therefore two degenerate charm sea quarks in the gauge configuration, which can be denoted by $c_{1}(x)$ and $c_{2}(x)$, and compose an ‘isospin’ doublet similar to $u$ and $d$ quarks. Since glueballs are independent of quark flavors and can mix only with flavor singlet mesons, the pseudoscalar charmonium of interest in this work is only the flavor (isospin) singlet state, whose interpolation field can be defined in terms of the smeared charm quark fields $c_{1}^{(s)}$ and $c_{2}^{(s)}$ $\mathcal{O}_{\Gamma}=\frac{1}{\sqrt{2}}(\bar{c}_{1}^{(s)}\Gamma c_{1}^{(s)}+\bar{c}_{2}^{(s)}\Gamma c_{2}^{(s)}),$ (1) where $\Gamma$ refers to $\gamma_{5}$ or $\gamma_{5}\gamma_{4}$. Based on the degeneracy of the two flavors of charm quarks, the correlation function of $\mathcal{O}_{\Gamma}$ can be expressed as $\displaystyle C_{CC}(t)$ $\displaystyle=$ $\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{xy}}\langle\mathcal{O}_{\Gamma}(\mathbf{x},t+t_{s})\mathcal{O}_{\Gamma}^{\dagger}(\mathbf{y},t_{s})\rangle$ (2) $\displaystyle=$ $\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{xy}}\langle C(\mathbf{x},t+t_{s};\mathbf{y},t_{s})+2D(\mathbf{x},t+t_{s};\mathbf{y},t_{s})\rangle\equiv C(t)+2D(t)$ with $C(\mathbf{x},t;\mathbf{y},t^{\prime})$ and $D(\mathbf{x},t;\mathbf{y},t^{\prime})$ being the contributions from the connected and disconnected diagrams, respectively, $\displaystyle C(\mathbf{x};t,\mathbf{y},t^{\prime})$ $\displaystyle=$ $\displaystyle-\mathrm{Tr}[\Gamma S^{(c)}(\mathbf{x},t;\mathbf{y},t^{\prime})\Gamma^{\dagger}S^{(c)}(\mathbf{y},t^{\prime};\mathbf{x},t)]$ $\displaystyle D(\mathbf{x};t,\mathbf{y},t^{\prime})$ $\displaystyle=$ $\displaystyle\mathrm{Tr}[\Gamma S^{(c)}(\mathbf{x},t;\mathbf{x},t)]\mathrm{Tr}[\Gamma^{\dagger}S^{(c)}(\mathbf{y},t^{\prime};\mathbf{y},t^{\prime})].$ (3) For the pseudoscalar glueball operator, we adopt the treatment in Ref. [9, 10] to get the optimized hermitian operator $\mathcal{O}_{G}(t)=\mathcal{O}^{\dagger}_{G}(t)$ coupling mainly to the ground state glueball based on different prototypes of Wilson loops and gauge link smearing schemes, Appendix A shows details of the operator construction. Thus we have the following correlation functions $\displaystyle C_{GG}(t)$ $\displaystyle=$ $\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\langle\mathcal{O}_{G}(t+t_{s})\mathcal{O}_{G}(t_{s})\rangle$ $\displaystyle C_{GC}(t)$ $\displaystyle=$ $\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{G}(t+t_{s})\mathcal{O}_{\Gamma}^{\dagger}(\mathbf{x},t_{s})\rangle$ $\displaystyle=$ $\displaystyle-\frac{\sqrt{2}}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{G}(t+t_{s})\mathrm{Tr}[\Gamma^{\dagger}S^{(c)}(\mathbf{x},t_{s};\mathbf{x},t_{s})]\rangle$ $\displaystyle C_{CG}(t)$ $\displaystyle=$ $\displaystyle\frac{1}{T}\sum\limits_{t_{s}=1}^{T}\sum\limits_{\mathbf{x}}\langle\mathcal{O}_{\Gamma}(\mathbf{x},t+t_{s})\mathcal{O}_{G}(t_{s})\rangle=\mp C_{GC}(t)$ (4) where the $\mp$ sign comes from the hermiticity of $\mathcal{O}_{\Gamma}$ and takes the minus sign for $\Gamma=\gamma_{5}$ (anti-hermitian) and positive sign for $\gamma_{5}\gamma_{4}$ (hermitian). ## 3 Mixing angles Strictly speaking, the hadronic states in lattice QCD are the eigenstates $|n\rangle$ of the lattice Hamiltonian $\hat{H}$, which are defined as $\hat{H}|n\rangle=E_{n}|n\rangle$. For a given quantum number, $|n\rangle$’s span a orthogonal and complete set, namely $\sum\limits_{n}|n\rangle\langle n|=1$ with the normalization condition $\langle m|n\rangle=\delta_{mn}$. Therefore, the correlation function $C_{XY}(t)$ of operator $\mathcal{O}_{X}$ and $\mathcal{O}_{Y}$ can be parameterized as $C_{XY}(t)\approx\sum\limits_{n\neq 0}\left[\langle 0|\mathcal{O}_{X}|n\rangle\langle n|\mathcal{O}^{\dagger}_{Y}|0\rangle\left(e^{-E_{n}t}\pm e^{-E_{n}(T-t)}\right)\right]$ (5) where the $\pm$ sign is for the same and opposite hermiticities of $\mathcal{O}_{X}$ and $\mathcal{O}_{Y}$, respectively. Since our lattice formalism is unitary for charm quarks, namely, the species of sea quarks and valence quarks are the same, we can choose another complete state set $\\{|\alpha_{i}\rangle,i=1,2,\cdots\\}$ as the state basis, such that an eigenstate $|n\rangle$ of $\hat{H}$ can be expressed in terms of $|\alpha_{i}\rangle$ as $|n\rangle=\sum\limits_{i}C_{ni}|\alpha_{i}\rangle$ with $\sum\limits_{i}|C_{ni}|^{2}=1$. In this sense, one can say that $|n\rangle$ is an admixture of states $|\alpha_{i}\rangle$ whose fractions are $|C_{ni}|^{2}$. For the case of this work, we choose the state set $\\{|\alpha_{i}\rangle,i=1,2,\ldots\\}$ of flavor singlet pseudoscalars to be $|\alpha_{i}\rangle=|G_{1}\rangle,|(c\bar{c})_{1}\rangle,|G_{2}\rangle,|(c\bar{c})_{2}\rangle,\ldots$, where $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$ are the $i$-th pure gauge glueball state and the pure $c\bar{c}$ state, respectively. This might be physically meaningful since glueball states are well defined and turn out to exist in the quenched approximation, as well as that charmonium states are usually considered as $c\bar{c}$ bound states in the phenomenological studies. It should be emphasized that this assumption is the prerequisite of the following discussion, and is the common ansatz in the phenomenological mixing models. Obviously, the mixing takes place only between glueball states and $c\bar{c}$ states in the state set $\\{|\alpha_{i}\rangle,i=1,2,\ldots\\}$. If the dynamics of the mixing can be treated as perturbations, then to the lowest order of the perturbation theory, it may be assumed that the mixing is dominated by that between the nearest glueball state and $c\bar{c}$ state. Thus the Hamiltonian $\hat{H}$ can be expressed as $\hat{H}=\left(\begin{array}[]{cc}m_{G_{1}}&x_{1}\\\ x_{1}&m_{(c\bar{c})_{1}}\\\ \end{array}\right)\oplus\left(\begin{array}[]{cc}m_{G_{2}}&x_{2}\\\ x_{2}&m_{(c\bar{c})_{2}}\\\ \end{array}\right)\oplus\cdots$ (6) where $m_{G_{i}}$ and $m_{(c\bar{c})_{i}}$ are the masses of the state $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$, respectively. The off-diagonal matrix elements $x_{i}$ of $\hat{H}$ are called mixing energies which are exactly the transition amplitude between state $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$. Thus the eigenstates $|n\rangle=|g_{1}\rangle,|\eta_{1}\rangle,|g_{2}\rangle,|\eta_{2}\rangle,\ldots$ are related to $|G_{i}\rangle$ and $|(c\bar{c})_{i}\rangle$ by $\left(\begin{array}[]{c}|g_{i}\rangle\\\ |\eta_{i}\rangle\\\ \end{array}\right)=\left(\begin{array}[]{cc}\cos\theta_{i}&-\sin\theta_{i}\\\ \sin\theta_{i}&\cos\theta_{i}\\\ \end{array}\right)\left(\begin{array}[]{c}|G_{i}\rangle\\\ |(c\bar{c})_{i}\rangle\\\ \end{array}\right)$ (7) where the mixing angles $\theta_{i}$ have been introduced. The eigenvalues of $\hat{H}$, namely, the masses of $|\eta_{i}\rangle$ and $|g_{i}\rangle$ states can be easily derived as $m_{\eta_{i}}=\bar{m}_{i}+\Delta_{i}\delta_{i}/2$ and $m_{g_{i}}=\bar{m}_{i}-\Delta_{i}\delta_{i}/2$, where $\bar{m}_{i}=\frac{1}{2}(m_{G_{i}}+m_{(c\bar{c})_{i}})$, $\Delta_{i}=m_{(c\bar{c})_{i}}-m_{G_{i}}$, $\delta_{i}=\sqrt{1+4x_{i}^{2}/\Delta_{i}^{2}}$. Accordingly, the mixing angles $\theta_{i}$ and mass shifts of $|(c\bar{c})_{i}\rangle$ can be derived as $\displaystyle\sin\theta_{i}$ $\displaystyle=$ $\displaystyle\mathrm{sgn}({x_{i}}{\Delta_{i}})\sqrt{\frac{\delta_{i}-1}{2\delta_{i}}}=\frac{x_{i}}{\Delta_{i}}+\mathcal{O}\left(\frac{x_{i}^{3}}{\Delta_{i}^{3}}\right),$ $\displaystyle\Delta m_{\eta_{i}}$ $\displaystyle=$ $\displaystyle m_{\eta_{i}}-m_{(c\bar{c})_{i}}=-\frac{1}{2}\Delta_{i}+\frac{1}{2}\Delta_{i}\delta_{i}\approx\frac{x_{i}^{2}}{\Delta_{i}},$ (8) where $\mathrm{sgn}({x_{i}}{\Delta_{i}})$ refers to the sign of $x_{i}\Delta_{i}$. Therefore, for the ground state $\eta_{c}(1S)$ we are interested in, the key task is to extract $\theta_{1}$ that is the mixing angle of the ground state of the pseudoscalar glueball $|G_{1}\rangle$ and the ground state pseudoscalar charmonium $|(c\bar{c})_{1}\rangle$. Figure 1: Effective mass from two point functions $C_{CC}(t)$, $C_{GG}(t)$ and correlation function $C_{GC}(t)$ for operator with $\Gamma=\gamma_{5}$ using best fit parameters from Eq. (10) and (3.1) on ensemble I (top) and ensemble II (bottom), where points with error bar are from simulation data with jackknife estimated error, the light gray band shows the fitted results with best fit parameters in Table. 2, and the color band indicates the fitting range. The large errors of $m^{\mathrm{eff}}_{CC}(t)$ in the time range beyond $t/a_{t}>20$ come mainly from the disconnected diagrams (see discussions in Appendix B). ### 3.1 The $\Gamma=\gamma_{5}$ case Actually the mixing angle $\theta_{i}$ can be derived from the correlation function $C_{CG}(t)$ or $C_{GC}(t)$ for the $\Gamma=\gamma_{5}$ case if we assume boldly that $\mathcal{O}_{G}$ couples almost exclusively with $|G_{i}\rangle$ and $\mathcal{O}_{\Gamma}$ couples exclusively with $|(c\bar{c})_{i}\rangle$, namely, $\displaystyle\mathcal{O}_{G}^{\dagger}|0\rangle$ $\displaystyle=$ $\displaystyle\sum\limits_{i\neq 0}\sqrt{Z_{G_{i}}}|G_{i}\rangle$ $\displaystyle\mathcal{O}_{\gamma_{5}}^{\dagger}|0\rangle$ $\displaystyle=$ $\displaystyle\sum\limits_{i\neq 0}\sqrt{Z_{(\gamma_{5}),i}}|(c\bar{c})_{i}\rangle$ (9) With this assumption and by utilizing Eq.(7) and Eq.(3.1), one has $\displaystyle C_{GC}(t)=$ $\displaystyle-\sum_{i}\sqrt{Z_{G_{i}}Z_{(\gamma_{5}),i}}\cos\theta_{i}\sin\theta_{i}\left(e^{-m_{g_{i}}t}-e^{-m_{g_{i}}(T-t)}-(e^{-m_{\eta_{i}}t}-e^{-m_{\eta_{i}}(T-t)})\right).$ (10) Note that in the above equation, we also use the fact that $\mathcal{O}_{\gamma_{5}}$ is anti-hermitian. When $T$ is large, the above parameterization of $C_{GC}(t)$ requires $C_{GC}(t=0)\approx 0$, which is a direct consequence of the assumption of Eq. (3.1). The measured $C_{GC}(t)$’s from the ensemble I and II are shown in the right most column of Fig. 1, where one can see that this $C_{GC}(t=0)\approx 0$ is meet. This manifests that the assumptions in Eq. (10) are reasonable. In order for $\theta_{i}$’s to be extracted using Eq. (10), one has to know the parameters $m_{g_{i}}$, $m_{\eta_{i}}$, $Z_{G_{i}}$ and $Z_{(\gamma_{5}),i}$, which, based on the assumptions of Eq. (3.1), are encoded in the correlation functions $C_{CC}(t)$ and $C_{GG}(t)$ as $\displaystyle C_{GG}(t)$ $\displaystyle=$ $\displaystyle\sum\limits_{i}Z_{G_{i}}\left[\cos^{2}\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)+\sin^{2}\theta_{i}\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)\right]$ $\displaystyle C_{CC}(t)$ $\displaystyle=$ $\displaystyle\sum\limits_{i}Z_{(\gamma_{5}),i}\left[\cos^{2}\theta_{i}\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)+\sin^{2}\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)\right].$ (11) Therefore, we carry out a simultaneous fit to $C_{GC}(t)$, $C_{CC}(t)$ and $C_{GG}(t)$ through the correlated minimal-$\chi^{2}$ fitting procedure using the function forms in Eq. (10) and (3.1). Since we focus on $\theta_{1}$, in practice we only consider the contribution from the lowest two glueball states and two $c\bar{c}$ states, namely, we use $i=1,2$ in above functions to model the data and treat the second states to be the effective states that take account of the contribution of all the higher states. Table 2: Ground state mass and mixing angle fitted from operators with $\Gamma=\gamma_{5}$ and $\Gamma=\gamma_{5}\gamma_{4}$ on ensemble I and ensemble II, rows started with avg. are the final weighted average results. ensemble | $\Gamma$ | $[t_{l},t_{h}]_{CC}$ | $[t_{l},t_{h}]_{GG}$ | $[t_{l},t_{h}]_{GC}$ | $\chi^{2}/dof$ | $m_{\eta_{1}}$(MeV) | $m_{g_{1}}$(MeV) | $\theta_{1}$ | $x_{1}$(MeV) ---|---|---|---|---|---|---|---|---|--- I | $\gamma_{5}$ | [10, 25] | [2, 18] | [2, 25] | $1.1$ | $2705(2)$ | $2289(50)$ | $6.8(9)^{\circ}$ | 49(9) $\gamma_{5}\gamma_{4}$ | [10, 25] | [2, 18] | [2, 30] | $0.98$ | $2701(1)$ | $2283(51)$ | $6.5(9)^{\circ}$ | 48(9) avg. | — | — | — | — | $2703(1)$ | $2286(50)$ | $6.6(9)^{\circ}$ | 48(9) II | $\gamma_{5}$ | [13, 30] | [3, 15] | [2, 20] | $1.1$ | $3028(8)$ | $2261(74)$ | $4.5(6)^{\circ}$ | 60(10) $\gamma_{5}\gamma_{4}$ | [13, 30] | [2, 15] | [1, 30] | $1.1$ | $3031(3)$ | $2348(47)$ | $3.9(3)^{\circ}$ | 47(5) avg. | — | — | — | — | $3031(3)$ | $2323(55)$ | $4.3(4)^{\circ}$ | 49(6) The calculated results and fit results are shown in Fig. 1. The data points in the left most column show the effective masses $m_{CC}^{\mathrm{eff}}(t)$ of the correlation function $C_{CC}(t)$ on the two ensembles (the upper panel is for ensemble I and the lower one is for ensemble II), which are defined by $m_{CC}^{\mathrm{eff}}(t)=\ln\frac{C_{CC}(t)}{C_{CC}(t+1)}.$ (12) The effective mass $m_{GG}^{\mathrm{eff}}(t)$ on the two ensembles are shown as data points in the middle column. The right most two panels of Fig. 1 show the correlation functions $C_{GC}(t)$ obtained on the two ensembles. The curves with error bands are plotted using the best fit parameters obtained through the fitting procedure mentioned above, where the colored bands illustrate the fitting time range. The fitted masses and the mixing angles $\theta_{1}$ are collected in Table 2, where the masses are converted into the values in physical units through the lattice spacings in Table 1. The fit time windows and the related $\chi^{2}$ per degree of freedom ($\chi^{2}/dof$) are also presented. It is seen that the function forms of Eq. (10) and Eq. (3.1) describes the data very well with a reasonable $\chi^{2}/dof$. On the ensemble I, the fitted $\eta_{c}$ mass is around $m_{\eta_{1}}\approx 2.7$ GeV, while the result on ensemble II is $m_{\eta_{1}}\approx 3.0$ GeV and close to the experimental value. On the two ensembles, the fitted pseudoscalar glueball mass is around $2.3$ GeV and shows little dependence of the charm quark masses. Finally, we get the mixing angle $\theta_{1}=6.8(9)^{\circ}$ and $\theta_{1}=4.5(6)^{\circ}$ on ensemble I and ensemble II, respectively. According to Eq. (3) and using the mass differences $m_{\eta_{1}}-m_{g_{1}}$ listed in Table. 2 as the estimate for $\Delta_{1}=m_{(c\bar{c})_{1}}-m_{G_{1}}$, the mixing energy $x_{1}$ are derived to be $49(9)$ MeV and $60(10)$ MeV on these two ensembles. Figure 2: Effective mass from two point functions $C_{CC}(t)$, $C_{GG}(t)$ and correlation function $C_{GC}(t)$ for operator with $\Gamma=\gamma_{5}\gamma_{4}$ using best fit parameters from $C_{GG}(t)$ of Eq. (3.1) and (18) on ensemble I (top) and ensemble II (bottom), where points with error bar are from simulation data with jackknife estimated error, the light gray band shows the fitted results with best fit parameters in Table. 2, and the color band indicates the fitting range. ### 3.2 The $\Gamma=\gamma_{5}\gamma_{4}$ case As a cross check, we also carried out the similar calculation by using the $\Gamma=\gamma_{5}\gamma_{4}$ for the interpolation field operator of the pseudoscalar $c\bar{c}$ states. The corresponding correlation functions $C_{CC}(t)$ and $C_{GC}(t)$ are calculated using Eq. (2.2). The effective masses $m_{CC}^{\mathrm{eff}}(t)$ , $m_{GG}^{\mathrm{eff}}(t)$ and $C_{GC}(t)$ on the two ensembles are shown in Fig.2. It is interesting to see that, in contrast to the case of $\Gamma=\gamma_{5}$, the correlation function $C_{GC}(t)$ does not go to zero when $t\to 0$ now (see the right most column of Fig. 2). This implies that the assumptions in Eq. (3.1) may not apply here. If we insist the relation $\mathcal{O}_{G}^{\dagger}|0\rangle=\sum\limits_{i\neq 0}\sqrt{Z_{G_{i}}}|G_{i}\rangle$ still holds, then the second assumption in Eq. (3.1) should be modified. Actually, the operator $\mathcal{O}_{\gamma_{5}\gamma_{4}}$ is the temporal component of the isoscalar axial vector current $J_{5}^{\mu}=\bar{c}\gamma_{5}\gamma^{\mu}c$ with $c=(c_{1},c_{2})^{T}$ here (up to a normalization factor since the charm quark fields in $\mathcal{O}_{\gamma_{5}\gamma_{4}}$ are spatially smeared). According to the $U_{A}(1)$ anomaly of QCD, $J_{5}^{\mu}$ satisfies the following anomalous axial vector relation $\partial_{\mu}J_{5}^{\mu}(x)=2m_{c}\bar{c}(x)\gamma_{5}c(x)+q(x),$ (13) where $q(x)=\frac{g^{2}}{16\pi^{2}}\epsilon^{\alpha\beta\rho\sigma}G_{\alpha\beta}^{a}G^{a}_{\rho\sigma}$ is the anomalous term from the $U_{A}(1)$ anomaly with $g$ being the strong coupling constant and $G_{\alpha\beta}^{a}$ being the strength of color fields. The first term on the right hand side of Eq. (13) is proportional to our operator $\mathcal{O}_{\gamma_{5}}$, thus based on the assumption in Eq. (3.1) we have $\langle 0|\partial_{\mu}J_{5}^{\mu}(x)|G_{i}\rangle\approx\langle 0|q(x)|G_{i}\rangle.$ (14) On the other hand, if we introduce the decay constant of the glueball state $|G_{i}\rangle$ through the definition $\langle 0|J_{5}^{\mu}(x)|G_{i},p\rangle=if_{G_{i}}p^{\mu}e^{-ip\cdot x},$ (15) then we have $\langle 0|\partial_{\mu}J_{5}^{\mu}(0)|G_{i},\mathbf{p}=0\rangle=m_{G_{i}}^{2}f_{G_{i}}$ and therefore $f_{G_{i}}=\frac{1}{m_{G_{i}}^{2}}\langle 0|q(0)|G_{i}\rangle$. Thus from Eq. (15) we can estimate that $\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i},\mathbf{p}=0\rangle\propto\frac{1}{m_{G_{i}}}\langle 0|q(0)|G_{i}\rangle.$ (16) Previous lattice studies show that pseudoscalar states can be accessed by the operator $q(x)$ [10, 11], thus the nonzero matrix element $\langle 0|q(0)|G_{i}\rangle$ implies the coupling $\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle\neq 0$. Consequently we have the following matrix elements $\displaystyle\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|g_{i}\rangle$ $\displaystyle=$ $\displaystyle\cos\theta_{i}\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle-\sin\theta_{i}\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle$ $\displaystyle\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|\eta_{i}\rangle$ $\displaystyle=$ $\displaystyle\sin\theta_{i}\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle+\cos\theta_{i}\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle.$ Thus the correlation function $C_{GC}(t)$ can be parameterized as $\displaystyle C_{GC}(t)$ $\displaystyle=$ $\displaystyle\sum_{i=1}^{2}\left[\langle 0|\mathcal{O}_{G}|g_{i}\rangle\langle g_{i}|\mathcal{O}_{\gamma_{5}\gamma_{4}}|0\rangle\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}\right)+\langle 0|\mathcal{O}_{G}|\eta_{i}\rangle\langle\eta_{i}|\mathcal{O}_{\gamma_{5}\gamma_{4}}|0\rangle\left(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)}\right)\right]$ (18) $\displaystyle\approx$ $\displaystyle\sqrt{Z_{G_{1}}}\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{1}\rangle\cos^{2}\theta_{1}\left(e^{-m_{g_{1}}t}+e^{-m_{g_{1}}(T-t)}\right)$ $\displaystyle-\sum_{i=1}^{2}\sqrt{Z_{G_{i}}Z_{(\gamma_{5}\gamma_{4}),i}}\cos\theta_{i}\sin\theta_{i}\left(e^{-m_{g_{i}}t}+e^{-m_{g_{i}}(T-t)}-(e^{-m_{\eta_{i}}t}+e^{-m_{\eta_{i}}(T-t)})\right),$ where $\sqrt{Z_{(\gamma_{5}\gamma_{4}),i}}=\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|(c\bar{c})_{i}\rangle$ has been defined. The second equality is derived based on first assumption of Eq. (3.1), namely $\langle 0|\mathcal{O}_{G}|(c\bar{c})_{i}\rangle=0$, and $\langle 0|\mathcal{O}_{\gamma_{5}\gamma_{4}}|G_{i}\rangle\neq 0$ discussed above. In the first term of the last expression of Eq. (18), we only keep the mass term of $|g_{1}\rangle$ state to take care of the temporal behavior of $C_{GC}(t)$ in the early time range. This is justified since the operator $\mathcal{O}_{G}(t)$ is optimized to couple most to the ground state with $Z_{G_{1}}\gg Z_{G_{2}}$. The terms proportional to $\sin^{2}\theta_{i}$ are expected to be small and also neglected here. Using Eq. (3.1) (after replacing $Z_{(\gamma_{5}),i}$ by $Z_{(\gamma_{5}\gamma_{4}),i}$) and Eq. (18), we carry out a simultaneous fit to $C_{GG}(t)$, $C_{GC}(t)$ and $C_{CC}(t)$. The fit procedure is the same as the case of $\Gamma=\gamma_{5}$. In Fig. 2, the colored curves with error bands are plotted using the best fit parameters. It is seen that the function forms mentioned above also describe the data very well. The fitted results are shown in Table 2 and can be compared with the $\gamma_{5}$-case directly. On both ensembles, it is clear that the results of the two cases are compatible with each other within errors. For each ensemble, the final results are obtained by averaging the results of the $\gamma_{5}$ and $\gamma_{5}\gamma_{4}$ case weighted by their inverse error square. To be specific, for a quantity $A$, its averaged value and error are calculated through $A_{\texttt{avg}}=\sum_{i}\omega_{i}A_{i},~{}~{}~{}~{}A_{\texttt{err}}=\sqrt{\sum_{i,j}\omega_{i}\omega_{j}\sigma_{i}\sigma_{j}},$ (19) with $\omega_{i}=\sigma_{i}^{-2}/\sum_{i}\sigma_{i}^{-2}$, where $\sigma_{i}$ is the standard error of observable $A_{i}$. The averaged results are also shown in the rows labelled by avg. in Table 2. Finally, we get the following mixing angles $\theta_{1}$ and the mixing energies $x_{1}$ on ensemble I and II $\displaystyle\theta_{1}$ $\displaystyle=$ $\displaystyle 6.6(9)^{\circ},~{}~{}~{}x_{1}=48(9)~{}\mathrm{MeV}~{}~{}~{}(\mathrm{Ensemble~{}~{}I})$ $\displaystyle\theta_{1}$ $\displaystyle=$ $\displaystyle 4.3(4)^{\circ},~{}~{}~{}x_{1}=49(6)~{}\mathrm{MeV}~{}~{}~{}(\mathrm{Ensemble~{}~{}II}).$ (20) Since the mass $m_{\eta_{1}}$ on ensemble II is close to the experimental value of $m_{\eta_{c}}$, we use Eq. (3) to estimate the mass shift from $m_{(c\bar{c})_{1}}$ due to the mixing as $\displaystyle\Delta m^{lat}_{\eta_{c}}$ $\displaystyle\approx$ $\displaystyle\frac{x_{1}^{2}}{m_{\eta_{1}}-m_{g_{1}}}\approx 3.4(9)~{}\mathrm{MeV}.$ (21) ## 4 Discussion Till now, our major conclusion is that there does exist the mixing between the ground state pseudoscalar glueball and the ground state pseudoscalar charmonium. In this section, we will discuss the possible phenomenological implications of this kind of mixing. The prerequisite of these discussions is the identification of the possible pseudoscalar glueball candidate in experiments. The BESIII collaboration has observed a likely pseudoscalar structure $X(2370)$ in the processes $J/\psi\to\gamma\eta^{\prime}\pi\pi$ [34] and $J/\psi\to\gamma\eta^{\prime}K\bar{K}$ [35]. The mass of $X(2370)$ is consistent with the prediction of the pseudoscalar glueball mass from lattice QCD studies. On the other hand, the branching fractions are measured to be $\mathrm{Br}(J/\psi\to\gamma X\to\gamma\eta^{\prime}K^{+}K^{-})=(1.79\pm 0.23(\mathrm{stat.})\pm 0.65(\mathrm{syst.}))\times 10^{-5}$ and $\mathrm{Br}(J/\psi\to\gamma X\to\gamma\eta^{\prime}K_{S}K_{S})=(1.18\pm 0.32(\mathrm{stat.}))\pm 0.39(\mathrm{syst.}))\times 10^{-5}$ [35], which are also compatible with the lattice prediction of the branching ratio of $J/\psi$ radiatively decaying into a pseudoscalar glueball, namely $\mathrm{Br}(J/\psi\to\gamma G)=2.31(80)\times 10^{-4}$ [25]. With these observations, we tentatively consider $X(2370)$ as the pseudoscalar glueball candidate in the following discussions. First, we consider the mass shift of the pseudoscalar charmonium due to the mixing. The non-zero mixing angle $\theta_{1}$ and mixing energy $x_{1}$ imply that the mixing can shift the masses of the unmixed pseudoscalar charmonium upward. Since $x_{1}$ reflects the dynamics of the $c\bar{c}$-glueball mixing, it is expected that $x_{1}$ is insensitive to the small variances of the masses of the pseudoscalar glueball and charmonium. Thus, to the lowest order of the perturbation theory (see Eq. (3)), the mixing angle and the mass shift of the ground state pseudoscalar charmonium can be estimated as $\displaystyle\sin\theta^{exp}$ $\displaystyle\approx$ $\displaystyle\frac{x_{1}}{m_{\eta_{c}}-m_{X(2370)}}\approx 0.080(10)$ $\displaystyle\Delta m^{exp}_{\eta_{c}}$ $\displaystyle\approx$ $\displaystyle\frac{x_{1}^{2}}{m_{\eta_{c}}-m_{X(2370)}}\approx 3.9(9)~{}\mathrm{MeV},$ (22) where the corresponding mixing angle is $\theta^{exp}\approx 4.6(6)^{\circ}$. These results are relevant to the charmonium hyperfine splitting $\Delta_{\mathrm{HFS}}=m_{J/\psi}-m_{\eta_{c}}$, which is usually used as a good quantity to calibrate the systematic uncertainties of lattice QCD calculations in charm physics. The PDG2020 result [1] gives $\Delta_{\mathrm{HFS}}=113.0(4)$ MeV. The latest lattice calculation carried out by the HPQCD collaboration finds $\Delta_{\mathrm{HFS}}=120.3(1.1)$ MeV at the physical point after considering the quenched QED effects [36]. Obviously, this result, with a much smaller error, still deviates the experimental value by $+7.3(1.2)$ MeV. The uncontrolled systematic uncertainties of this calculation are the charm quark annihilation effects and the possible mixing between pseudoscalar glueball and the pseudoscalar charmonium. As far as the charm annihilation effects are concerned, previous lattice studies show that they contribute little to the $J/\psi$ mass while move the $\eta_{c}$ mass upward by roughly 2 MeV [37]. We have also investigated this effects using the same ensembles in this work and obtained the mass shift of $\eta_{c}$ due to the charm annihilation effects is $+3.7(5)$ MeV [33]. We are not sure whether this mass shift is theoretically equivalent to $\Delta m_{\eta_{c}}$ in Eq. (21) or they can be combined together to give the total mass shift of $\eta_{c}$. Anyway, these corrections to the $\eta_{c}$ mass are in the right direction. On the other hand, the effect of light sea quarks, which are not considered in this work, may push the $\eta_{c}$ mass upward further. Secondly, the $c\bar{c}$-glueball mixing can contribute substantially to the total width of $\eta_{c}$. It is known that $\eta_{c}$ decays predominantly into light hadrons such that the total width of $\eta_{c}$ can be approximated as $\Gamma_{\eta_{c}}\approx\Gamma(\eta_{c}\to\mathrm{LH})$ where LH stands for all the light hadron final states. Although a direct derivation of $\Gamma(\eta_{c}\to\mathrm{LH})$ cannot be achieved from lattice QCD in the present era, we can discuss the contribution of the $c\bar{c}$-glueball mixing to $\Gamma_{\eta_{c}}$ by the following logic. To the leading order of perturbative QCD, the processes $\eta_{c}\to\mathrm{LH}$ can be viewed as that $\eta_{c}$ decays into two gluons first and then the two gluons are hadronized into light hadrons. Thus the decay width $\Gamma(\eta_{c}\to\mathrm{LH})$ can be expressed as $\Gamma_{\eta_{c}}\approx\Gamma(\eta_{c}\to\mathrm{LH})\approx\Gamma(\eta_{c}\to gg)=\frac{1}{2}\frac{1}{16\pi}\frac{1}{m_{\eta_{c}}}|\mathcal{M}(\eta_{c}\to gg)|^{2}$ (23) where the additional factor is due to the identical two final state gluons. These arguments also apply to the hadronic decays of the pseudoscalar glueball (denoted by $|G\rangle$) and charmonium (denoted by $|(c\bar{c})\rangle$). Therefore we obtain the following relation $\frac{|\mathcal{M}(G\to gg)|}{|\mathcal{M}(c\bar{c}\to gg)|}\approx\left(\frac{m_{G}\Gamma_{G}}{m_{c\bar{c}}\Gamma_{c\bar{c}}}\right)^{1/2},$ (24) where $(m_{G},\Gamma_{G})$,$(m_{c\bar{c}},\Gamma_{c\bar{c}})$ are the mass and width of $|G\rangle$ and $|(c\bar{c})\rangle$, respectively. If $\eta_{c}$ is an admixture of $|G\rangle$ and $|(c\bar{c})\rangle$, i.e. $|\eta_{c}\rangle=\cos\theta|(c\bar{c})\rangle+\sin\theta|G\rangle$ (see Eq. (7)), by using Eq. (24) the ratio of $\Gamma_{\eta_{c}}$ to $\Gamma_{c\bar{c}}$ is expressed as $\displaystyle\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}\approx\frac{|\mathcal{M}(\eta_{c}\to gg)|^{2}m_{c\bar{c}}}{|\mathcal{M}(c\bar{c}\to gg)|^{2}m_{\eta_{c}}}$ $\displaystyle\approx$ $\displaystyle\left|\cos\theta+\sin\theta\frac{\left|\mathcal{M}(G\to gg)\right|}{\left|\mathcal{M}(c\bar{c}\to gg)\right|}\right|^{2}$ (25) $\displaystyle\approx$ $\displaystyle 1+2\sin\theta\left(\frac{m_{G}\Gamma_{G}}{m_{\eta_{c}}\Gamma_{\eta_{c}}}\right)^{1/2}\left(\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}\right)^{1/2},$ where we use $m_{c\bar{c}}\approx m_{\eta_{c}}$, $\cos\theta\approx 1$. With the assumption that $X(2370)$ is predominantly a pseudoscalar glueball, and if we take $\Gamma_{G}\approx\Gamma_{X(2370)}\approx 100$ MeV and use the PDG value $\Gamma_{\eta_{c}}=32.0(7)$ MeV, then by solving Eq. (25) we get $\frac{\Gamma_{\eta_{c}}}{\Gamma_{c\bar{c}}}=1.29(4)$, which implies $\Gamma_{c\bar{c}}\approx 24.8(9)$ MeV. Finally, the contribution of $c\bar{c}$-glueball mixing to $\Gamma_{\eta_{c}}$ is estimated as $\delta\Gamma_{c\bar{c}}\equiv\Gamma_{\eta_{c}}-\Gamma_{c\bar{c}}\approx 7.2(8)~{}~{}\mathrm{MeV}.$ (26) The decays of $c\bar{c}$ pseudoscalar meson into hadrons can be viewed as that the $c\bar{c}$ first decays into two gluons and then the two gluons are hadronized into light hadrons. In this sense, one can take the approximation $\Gamma_{c\bar{c}}\approx\Gamma(c\bar{c}\to gg)$. On the other hand, the radiative decay $\eta_{c}\to\gamma\gamma$ is dominated by $c\bar{c}\to\gamma\gamma$. According to the running of the strong coupling constant $\alpha_{s}(\mu)$, at $\mu\approx m_{c}\approx 1.5$ GeV, $\alpha_{s}$ takes the value in the range $0.3<\alpha_{s}<0.35$. If one takes $\alpha=1/134$ at the charm quark mass scale, to the leading order QCD correction [26, 38] one has $\frac{\Gamma(c\bar{c}\to\gamma\gamma)}{\Gamma(c\bar{c}\to gg)}\approx\frac{8}{9}\frac{\alpha^{2}}{\alpha_{s}^{2}}\frac{1-3.4\alpha_{s}/\pi}{1+4.8\alpha_{s}/\pi}\approx(1.6\sim 2.5)\times 10^{-4}$ (27) Experimentally, the PDG result of $\mathrm{Br}(\eta_{c}\to\gamma\gamma)=(1.61\pm 0.12)\times 10^{-4}$ [1]. Considering the ratio $\Gamma_{\eta_{c}}/\Gamma_{c\bar{c}}=1.29(4)$, the experimental value implies ${\Gamma(c\bar{c}\to\gamma\gamma)}/{\Gamma(c\bar{c}\to gg)}\approx(2.07\pm 0.17)\times 10^{-4}$, which falls into the range of Eq. (27). Note that the NRQCD analysis with next-next-leading order QCD corrections predicts the branching fraction $\mathrm{Br}(\eta_{c}\to\gamma\gamma)\sim(2.3-2.9)\times 10^{-4}$ if $\eta_{c}$ is taken as a pure $c\bar{c}$ state [39], which also requires a smaller total width of the ground state pseusoscalar charmonium when comparing with PDG value. Anyway, the above discussions are just tentative because of the assumption that $X(2370)$ is predominantly a pseudoscalar glueball. The existence and the status of $X(2370)$ need to be clarified by future experiments. As for the decay width of $J/\psi\to\gamma\eta_{c}$, however, the tension between the experiments and the theoretical predictions cannot be alleviated by the $c\bar{c}$-glueball mixing. PDG gives the world average value $\mathrm{Br}(J/\psi\to\gamma\eta_{c})=(1.7\pm 0.4)\times 10^{-2}$ [1], which corresponds to the partial decay width $\Gamma(J/\psi\to\gamma\eta_{c})=1.6\pm 0.4$ keV. Theoretically, the effective field theories and non-relativistic potential models predict the partial width to be 1.5-2.9 keV [40, 41, 42, 43, 44, 45]. The result from the NRQCD effective field theory predicts the branching fraction to be $(1.5\pm 1.0)$ keV [43], which is compatible with the experimental value but with a quite large error. The predictions of most of lattice QCD calculations, both quenched and full-QCD ones [20, 21, 22, 23, 24, 25], are around 2.4-2.9 keV, which have discrepancies from the PDG value, but are in agreement with the KEDR experimental result $\Gamma(J/\psi\to\gamma\eta_{c})=2.98\pm 0.18^{+0.15}_{-0.33}$ keV [46]. As addressed before, since the radiative production rate of the pseudoscalar glueball in the $J/\psi$ decays is two orders of magnitude smaller than that of the pseudoscalar charmonium [25], and $\eta_{c}$ has a very small fraction of the pseudoscalar glueball, the mixing cannot change the partial width of $J/\psi\to\gamma\eta_{c}$. Hopefully, the contraversial situation on the decay width of $J/\psi\to\gamma\eta_{c}$ can be resolved by the future study of the BESIII collaboration using its large $J/\psi$ event sample. ## 5 Summary We generate large gauge ensembles with $N_{f}=2$ degenerate charm quarks on anisotropic lattices, such that the theoretical framework is unitary for charm quarks. The annihilation diagrams of charm quark are tackled through the distillation method. By calculating the correlation functions of the pseudoscalar quark bilinear operators and the pseudoscalar glueball operator, the mixing energy $x=49(6)$ MeV and the mixing angle $\theta=4.3(4)^{\circ}$ have been obtained for the first time through lattice QCD calculations. The nonzero mixing energy and the mixing angle help to understand the properties of the $\eta_{c}$ meson. If $X(2370)$ observed by BESIII can be taken as predominantly a pseudoscalar glueball, then the $c\bar{c}$-glueball mixing can result in a positive mass shift approximately $3.9(9)$ MeV of the ground state pseudoscalar charmonium, which serves to understand the discrepancy of lattice and the experimental results of the $1S$ hyperfine splitting of charmonia. In the mean time, the mixing implies that the total width of the pseudoscalar charmonium can be increased by 7.2(8) MeV, which can explain to some extent the relatively large width of $\eta_{c}$ in comparison with the theoretical expectations for a pure $c\bar{c}$ state. Furthermore, the branching fraction of $\eta_{c}\to\gamma\gamma$ can be understood in this $c\bar{c}$-glueball framework. It should be notified that, even though the assumption that $X(2370)$ is predominantly a pseudoscalar glueball seems compatible with the discussion in this work, its justification should be clarified by future experimental and theoretical investigations. At last, the seemingly discrepancy of the theoretical predictions and the experimental results of the partial width of $J/\psi\to\gamma\eta_{c}$ cannot be alleviated by the $c\bar{c}$-glueball mixing picture, which demands future sophisticated experimental studies. The BESIII collaboration may take this mission by the help of its largest $J/\psi$ event ensemble in the world. ## Acknowledgements We thank Prof. Q. Zhao of IHEP for the inspiring discussions. This work is supported by the Strategic Priority Research Program of Chinese Academy of Sciences (No. XDB34030302), the National Key Research and Development Program of China (No. 2020YFA0406400) and the National Natural Science Foundation of China (NNSFC) under Grants No.11935017, No. 11575196, No.11775229, No.12075253, No.12070131001 (CRC 110 by DFG and NNSFC), No.12175063. Y. Chen also acknowledges the support of the CAS Center for Excellence in Particle Physics (CCEPP). L.C. Gui is supported by Natural Science Foundation of Hunan Province under Grants No.2020JJ5343, No.20A310. The Chroma software system [47] and QUDA library [48, 49] are acknowledged. The computations were performed on the CAS Xiandao-1 computing environment, the HPC clusters at Institute of High Energy Physics (Beijing) and China Spallation Neutron Source (Dongguan), and the GPU cluster at Hunan Normal University. ## References * [1] P. Zyla, et al., Review of Particle Physics, PTEP 2020 (8) (2020) 083C01. doi:10.1093/ptep/ptaa104. * [2] S. Okubo, Phi meson and unitary symmetry model, Phys. Lett. 5 (1963) 165–168. doi:10.1016/S0375-9601(63)92548-9. * [3] J. Mandula, J. Weyers, G. Zweig, Patterns of exchange deceneracies, Ann. Rev. Nucl. Part. Sci. 20 (1970) 289–322. doi:10.1146/annurev.ns.20.120170.001445. * [4] G. ’t Hooft, Symmetry Breaking Through Bell-Jackiw Anomalies, Phys. Rev. Lett. 37 (1976) 8–11. doi:10.1103/PhysRevLett.37.8. * [5] H.-Y. Cheng, H.-n. Li, K.-F. Liu, Pseudoscalar glueball mass from eta - eta-prime - G mixing, Phys. Rev. D 79 (2009) 014024. arXiv:0811.2577, doi:10.1103/PhysRevD.79.014024. * [6] S. He, M. Huang, Q.-S. Yan, The Pseudoscalar glueball in a chiral Lagrangian model with instanton effect, Phys. Rev. D 81 (2010) 014003. arXiv:0903.5032, doi:10.1103/PhysRevD.81.014003. * [7] B. A. Li, Chiral field theory of 0-+ glueball, Phys. Rev. D 81 (2010) 114002. arXiv:0912.2323, doi:10.1103/PhysRevD.81.114002. * [8] C. J. Morningstar, M. J. Peardon, Efficient glueball simulations on anisotropic lattices, Phys. Rev. D 56 (1997) 4043–4061. arXiv:hep-lat/9704011, doi:10.1103/PhysRevD.56.4043. * [9] C. J. Morningstar, M. J. Peardon, The Glueball spectrum from an anisotropic lattice study, Phys. Rev. D 60 (1999) 034509. arXiv:hep-lat/9901004, doi:10.1103/PhysRevD.60.034509. * [10] Y. Chen, et al., Glueball spectrum and matrix elements on anisotropic lattices, Phys. Rev. D 73 (2006) 014516. arXiv:hep-lat/0510074, doi:10.1103/PhysRevD.73.014516. * [11] A. Chowdhury, A. Harindranath, J. Maiti, Correlation and localization properties of topological charge density and the pseudoscalar glueball mass in SU(3) lattice Yang-Mills theory, Phys. Rev. D 91 (7) (2015) 074507. arXiv:1409.6459, doi:10.1103/PhysRevD.91.074507. * [12] C. M. Richards, A. C. Irving, E. B. Gregory, C. McNeile, Glueball mass measurements from improved staggered fermion simulations, Phys. Rev. D 82 (2010) 034501. arXiv:1005.2473, doi:10.1103/PhysRevD.82.034501. * [13] E. Gregory, A. Irving, B. Lucini, C. McNeile, A. Rago, C. Richards, E. Rinaldi, Towards the glueball spectrum from unquenched lattice QCD, JHEP 10 (2012) 170\. arXiv:1208.1858, doi:10.1007/JHEP10(2012)170. * [14] W. Sun, L.-C. Gui, Y. Chen, M. Gong, C. Liu, Y.-B. Liu, Z. Liu, J.-P. Ma, J.-B. Zhang, Glueball spectrum from $N_{f}=2$ lattice QCD study on anisotropic lattices, Chin. Phys. C 42 (9) (2018) 093103. arXiv:1702.08174, doi:10.1088/1674-1137/42/9/093103. * [15] J.-J. Wu, X.-H. Liu, Q. Zhao, B.-S. Zou, The Puzzle of anomalously large isospin violations in $\eta(1405/1475)\to 3\pi$, Phys. Rev. Lett. 108 (2012) 081803\. arXiv:1108.3772, doi:10.1103/PhysRevLett.108.081803. * [16] E. Ackleh, T. Barnes, Two photon widths of singlet positronium and quarkonium with arbitrary total angular momentum, Phys. Rev. D 45 (1992) 232–240. doi:10.1103/PhysRevD.45.232. * [17] C. R. Munz, Two photon decays of mesons in a relativistic quark model, Nucl. Phys. A 609 (1996) 364–376. arXiv:hep-ph/9601206, doi:10.1016/S0375-9474(96)00265-5. * [18] S. N. Gupta, J. M. Johnson, W. W. Repko, Relativistic two photon and two gluon decay rates of heavy quarkonia, Phys. Rev. D 54 (1996) 2075–2080. arXiv:hep-ph/9606349, doi:10.1103/PhysRevD.54.2075. * [19] H.-W. Huang, K.-T. Chao, The Cancellation of infrared divergence in the hadronic annihilation decay of heavy quarkonium, Phys. Rev. D 55 (1997) 244–248. arXiv:hep-ph/9605362, doi:10.1103/PhysRevD.55.244. * [20] J. J. Dudek, R. G. Edwards, D. G. Richards, Radiative transitions in charmonium from lattice QCD, Phys. Rev. D 73 (2006) 074507. arXiv:hep-ph/0601137, doi:10.1103/PhysRevD.73.074507. * [21] J. J. Dudek, R. Edwards, C. E. Thomas, Exotic and excited-state radiative transitions in charmonium from lattice QCD, Phys. Rev. D 79 (2009) 094504. arXiv:0902.2241, doi:10.1103/PhysRevD.79.094504. * [22] Y. Chen, et al., Radiative transitions in charmonium from $N_{f}=2$ twisted mass lattice QCD, Phys. Rev. D 84 (2011) 034503. arXiv:1104.2655, doi:10.1103/PhysRevD.84.034503. * [23] D. Becirevic, F. Sanfilippo, Lattice QCD study of the radiative decays $J/\psi\to\eta_{c}\gamma$ and $h_{c}\to\eta_{c}\gamma$, JHEP 01 (2013) 028. arXiv:1206.1445, doi:10.1007/JHEP01(2013)028. * [24] G. C. Donald, C. T. H. Davies, R. J. Dowdall, E. Follana, K. Hornbostel, J. Koponen, G. P. Lepage, C. McNeile, Precision tests of the $J/{\psi}$ from full lattice QCD: mass, leptonic width and radiative decay rate to ${\eta}_{c}$, Phys. Rev. D 86 (2012) 094501. arXiv:1208.2855, doi:10.1103/PhysRevD.86.094501. * [25] L.-C. Gui, J.-M. Dong, Y. Chen, Y.-B. Yang, Study of the pseudoscalar glueball in $J/\psi$ radiative decays, Phys. Rev. D 100 (5) (2019) 054511. arXiv:1906.03666, doi:10.1103/PhysRevD.100.054511. * [26] Y.-D. Tsai, H.-n. Li, Q. Zhao, $\eta_{c}$ mixing effects on charmonium and $B$ meson decays, Phys. Rev. D 85 (2012) 034002. arXiv:1110.6235, doi:10.1103/PhysRevD.85.034002. * [27] W. Qin, Q. Zhao, X.-H. Zhong, Revisiting the pseudoscalar meson and glueball mixing and key issues in the search for a pseudoscalar glueball state, Phys. Rev. D 97 (9) (2018) 096002. arXiv:1712.02550, doi:10.1103/PhysRevD.97.096002. * [28] W. I. Eshraim, C. S. Fischer, Hadronic decays of the (pseudo-)scalar charmonium states $\eta_{c}$ and $\chi_{c0}$ in the extended Linear Sigma Model, Eur. Phys. J. A 54 (8) (2018) 139. arXiv:1802.05855, doi:10.1140/epja/i2018-12569-3. * [29] T. Chen, et al., Two-photon decays of $\eta_{c}$ from lattice QCD, Eur. Phys. J. C 76 (7) (2016) 358. arXiv:1602.00076, doi:10.1140/epjc/s10052-016-4212-8. * [30] W.-J. Lee, D. Weingarten, Scalar quarkonium masses and mixing with the lightest scalar glueball, Phys. Rev. D 61 (2000) 014015. arXiv:hep-lat/9910008, doi:10.1103/PhysRevD.61.014015. * [31] C. McNeile, C. Michael, Mixing of scalar glueballs and flavor singlet scalar mesons, Phys. Rev. D 63 (2001) 114503. arXiv:hep-lat/0010019, doi:10.1103/PhysRevD.63.114503. * [32] M. Peardon, J. Bulava, J. Foley, C. Morningstar, J. Dudek, R. G. Edwards, B. Joo, H.-W. Lin, D. G. Richards, K. J. Juge, A Novel quark-field creation operator construction for hadronic physics in lattice QCD, Phys. Rev. D 80 (2009) 054506. arXiv:0905.2160, doi:10.1103/PhysRevD.80.054506. * [33] R. Zhang, W. Sun, F. Chen, Y. Chen, M. Gong, X. Jiang, Z. Liu, Annihilation diagram contribution to charmonium masses, Chin. Phys. C 46 (4) (2022) 043102\. arXiv:2110.01755, doi:10.1088/1674-1137/ac3d8c. * [34] M. Ablikim, et al., Confirmation of the $X(1835)$ and observation of the resonances $X(2120)$ and $X(2370)$ in $J/\psi\to\gamma\pi^{+}\pi^{-}\eta^{\prime}$, Phys. Rev. Lett. 106 (2011) 072002. arXiv:1012.3510, doi:10.1103/PhysRevLett.106.072002. * [35] M. Ablikim, et al., Observation of $X(2370)$ and search for X(2120) in $J/\psi\rightarrow\gamma K{\bar{K}}\eta^{\prime}$, Eur. Phys. J. C 80 (8) (2020) 746. arXiv:1912.11253, doi:10.1140/epjc/s10052-020-8078-4. * [36] D. Hatton, C. T. H. Davies, B. Galloway, J. Koponen, G. P. Lepage, A. T. Lytle, Charmonium properties from lattice $QCD$+QED : Hyperfine splitting, $J/\psi$ leptonic width, charm quark mass, and $a^{c}_{\mu}$, Phys. Rev. D 102 (5) (2020) 054511\. arXiv:2005.01845, doi:10.1103/PhysRevD.102.054511. * [37] L. Levkova, C. DeTar, Charm annihilation effects on the hyperfine splitting in charmonium, Phys. Rev. D 83 (2011) 074504. arXiv:1012.1837, doi:10.1103/PhysRevD.83.074504. * [38] W. Kwong, P. B. Mackenzie, R. Rosenfeld, J. L. Rosner, Quarkonium Annihilation Rates, Phys. Rev. D 37 (1988) 3210. doi:10.1103/PhysRevD.37.3210. * [39] N. Brambilla, H. S. Chung, J. Komijani, Inclusive decays of $\eta_{c}$ and $\eta_{b}$ at NNLO with large $n_{f}$ resummation, Phys. Rev. D 98 (11) (2018) 114020\. arXiv:1810.02586, doi:10.1103/PhysRevD.98.114020. * [40] A. Y. Khodjamirian, On the Calculation of $J/\psi\to\eta_{c}\gamma$ Width in QCD, Sov. J. Nucl. Phys. 39 (1984) 614. * [41] S. Godfrey, N. Isgur, Mesons in a Relativized Quark Model with Chromodynamics, Phys. Rev. D 32 (1985) 189–231. doi:10.1103/PhysRevD.32.189. * [42] T. Barnes, S. Godfrey, E. S. Swanson, Higher charmonia, Phys. Rev. D 72 (2005) 054026. arXiv:hep-ph/0505002, doi:10.1103/PhysRevD.72.054026. * [43] N. Brambilla, Y. Jia, A. Vairo, Model-independent study of magnetic dipole transitions in quarkonium, Phys. Rev. D 73 (2006) 054005. arXiv:hep-ph/0512369, doi:10.1103/PhysRevD.73.054005. * [44] N. Brambilla, P. Roig, A. Vairo, Precise determination of the $\eta_{c}$ mass and width in the radiative $J/\Psi\to\eta_{c}\gamma$ decay, AIP Conf. Proc. 1343 (2011) 418–420. arXiv:1012.0773, doi:10.1063/1.3575048. * [45] A. Pineda, J. Segovia, Improved determination of heavy quarkonium magnetic dipole transitions in potential nonrelativistic QCD, Phys. Rev. D 87 (7) (2013) 074024. arXiv:1302.3528, doi:10.1103/PhysRevD.87.074024. * [46] V. V. Anashin, et al., Measurement of $J/\psi\to\gamma\eta_{\rm c}$ decay rate and $\eta_{\rm c}$ parameters at KEDR, Phys. Lett. B 738 (2014) 391–396. arXiv:1406.7644, doi:10.1016/j.physletb.2014.09.064. * [47] R. G. Edwards, B. Joo, The Chroma software system for lattice QCD, Nucl. Phys. B Proc. Suppl. 140 (2005) 832. arXiv:hep-lat/0409003, doi:10.1016/j.nuclphysbps.2004.11.254. * [48] M. A. Clark, R. Babich, K. Barros, R. C. Brower, C. Rebbi, Solving Lattice QCD systems of equations using mixed precision solvers on GPUs, Comput. Phys. Commun. 181 (2010) 1517–1528. arXiv:0911.3191, doi:10.1016/j.cpc.2010.05.002. * [49] R. Babich, M. A. Clark, B. Joo, G. Shi, R. C. Brower, S. Gottlieb, Scaling Lattice QCD beyond 100 GPUs, in: SC11 International Conference for High Performance Computing, Networking, Storage and Analysis, 2011. arXiv:1109.2935, doi:10.1145/2063384.2063478. ## Appendix ## Appendix A Glueball operator construction Based on the four prototypes of Wilson loops shown in Fig. 3, we build $A_{1}^{-+}$ operators for the pseudoscalar glueball operators with $A_{1}$ being an irreducible representation of spatial symmetry group, namely, the octahedral group $O$. We adopt six different schemes to smear gauge links, which are different combinations of single-sink smearing and double link smearing [9, 10]. Let $W_{\alpha}(\mathbf{x},t)$ be one prototype of Wilson loop under a specific smearing scheme, then the $A_{1}^{-+}$ operator in the rest frame of a glueball can be obtained by $\phi_{\alpha}(t)=\sum\limits_{\mathbf{x}}\sum\limits_{R\in O}c_{R}^{A_{1}}\left[R\circ W_{\alpha}(\mathbf{x},t)-\mathcal{P}R\circ W_{\alpha}(\mathbf{x},t)\mathcal{P}^{-1}\right]$ (28) where $R\circ W_{\alpha}$ refers to a differently oriented Wilson loops after one of the 24 elements of $O$ ($R$) operated on $W_{\alpha}$, $\mathcal{P}$ is spatial reflection operation and $C_{R}^{A_{1}}$ are the combinational coefficients for the $A_{1}$ representation. Thus we obtain a $A_{1}^{-+}$ operator set $\\{\phi_{\alpha}(t),\alpha=1,2,\ldots,24\\}$ based on the four prototypes and six smearing schemes. We then use the well established variational method to get an optimized operator $O_{G}$ that couples most to the ground state glueball by solving the generalized eigenvalue problem. ## Appendix B Large $t$ behaviour of $C_{GG}(t)$ and $C_{CC}(t)$ The spectrum of $C_{GG}(t)$ and $C_{CC}(t)$ should be the same, as reflected by Eq. (3.1). It is expected $C_{GG}(t)$ and $C_{CC}(t)$ are dominated by the contribution from the lowest state $|g_{1}\rangle$ at very large $t$ (when $T\to\infty$) such that their effective masses $m^{\mathrm{eff}}_{GG}(t)$ and $m^{\mathrm{eff}}_{CC}(t)$ should merge into $m_{g_{1}}a_{t}$ at very large $t$. The left panel of Fig. 4 shows $m^{\mathrm{eff}}_{GG}(t)$ and $m^{\mathrm{eff}}_{CC}(t)$ for the $\Gamma=\gamma_{5}$ case on ensemble II. We do not observed a clear tendency that they will merge together at $m_{g_{1}}a_{t}$ in the available time range. This implies that $\sin^{2}\theta_{1}$ should be very small, as confirmed by the fitted result $\sin^{2}\theta_{1}\sim 0.006$. On the other hand, the error of $m^{\mathrm{eff}}_{CC}(t)$ is quite small when $t/a_{t}<20$ but grows rapidly beyond $t/a_{t}>25$. Actually, the error of $C_{CC}(t)$ comes mainly from the error of the disconnected diagram contribution. Since the disconnected part falls off more slowly than the connected part, the contribution and the error of the former become more pronounced when $t$ increases. In the right panel of Fig. 4, we compare $m^{\mathrm{eff}}_{CC}(t)$ with the effective mass $m^{\mathrm{eff}}_{C}(t)$ of the connected part for the $\Gamma=\gamma_{5}$ case on ensemble II. It is seen that $m^{\mathrm{eff}}_{CC}(t)$ deviates from $m^{\mathrm{eff}}_{C}(t)$ gradually beyond $t/a_{t}\sim 15$ where the mixing effect begins to show up. Figure 3: Wilson loop prototypes used to construct the pseudoscalar glueball operator [9, 10]. Figure 4: (left): Effective mass from two point functions $C_{CC}(t)$, $C_{GG}(t)$ for operator with $\Gamma=\gamma_{5}$ on ensemble II shown in same plot for comparison. (right): Effective mass $m^{\mathrm{eff}}_{C}(t)$ from connected part of $O_{\Gamma}$’s correlation function $C(t)$ and $m^{\mathrm{eff}}_{CC}(t)$ from full correlation function $C(t)+2D(t)$ including disconnected diagram with $\Gamma=\gamma_{5}$ on ensemble II.
arxiv-papers
2021-07-27T11:44:44
2024-09-04T03:07:21.366212
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Renqiang Zhang, Wei Sun, Ying Chen, Ming Gong, Long-Cheng Gui,\n Zhaofeng Liu", "submitter": "Renqiang Zhang", "url": "https://arxiv.org/abs/2107.12749" }
2107.12758
# Fixed point behavior of cumulants in the three-dimensional Ising universality class Xue Pan [email protected] School of Electronic Engineering, Chengdu Technological University, Chengdu 611730, China ###### Abstract High-order cumulants and factorial cumulants of conserved charges are suggested to study the critical dynamics in heavy-ion collision experiments. In this paper, using the parametric representation of the three-dimensional Ising model which is believed to belong to the same universality class with the Quantum chromo-dynamics, temperature dependence of the second- to fourth- order (factorial) cumulants of the order parameter is studied. It is found that the values of the normalized cumulants are independent of the external magnetic field at the critical temperature, which results in a fixed point in the temperature dependence of the normalized cumulants. In finite-size systems simulated by Monte Carlo method, the fixed point behavior still exists at the temperature near the critical one. The fixed point behavior is also appeared in the temperature dependence of normalized factorial cumulants at least from the fourth-order one. With a mapping from the Ising model to QCD, the fixed point behavior is also found in the energy dependence of the normalized cumulants (or fourth-order factorial cumulants) along different freeze-out curves. ###### pacs: 25.75.Gz, 25.75.Nq ## I Introduction One of the main goals of current relativistic heavy-ion collision experiments is to make clear the phase diagram of quantum chromo-dynamics (QCD) main goal . At vanishing baryon chemical potential, the transition from hadronic matter to quark-gluon plasma has been proved to be a crossover by lattice QCD fodor- nature . Due to the fermion sign problem, lattice QCD can not calculate the cases at large baryon chemical potential. Some effective theories predict that the QCD system undergoes a first order phase transition at high baryon density and low temperature first-PRD ; first-NPB ; first-PRL ; first-NPB1 ; first- LQCD ; first-PRC . From first order phase transition to crossover, there is a critical point, which is a unique feature of the QCD phase diagram. Large fluctuations and correlations of conserved charges are expected at the critical point. The high-order cumulants of conserved charges, reflecting their fluctuations, are suggested to search for the critical point stephanov-prl91 ; koch ; Stephanov-prl102 ; Karsch-EPJC71 . Results from effective theories of QCD suggest that the non-monotonic behavior of the high-order cumulants are related to the critical point Asakawa-prl103 ; Fuweijie ; Vladi . Especially, sign change of the fourth-order cumulant of net-proton is used to search for the critical point in experiments Stephanov-prl107 ; Phys. Rev. Lett. 112.032302 . While in Ref. Chin. Phys. C.43.033103 ; Chin. Phys. C.45.104103 , the authors argued that the sign change is not sufficient to prove the presence of the critical point. Other work pointed out that the peak structure remains a solid feature and can be used as a clean signature of the critical point Eur. Phys. J. C.79.245 ; PhysRevC103034901 . Recently, the factorial cumulants, which are also known as the integrated multi-particle correlations, get a lot of attention Phys. Lett. B.728.386-392 ; Nuclear Physics A.942.65-96 ; Phys. Rev. C.93.034915 ; Phys. Rev. C.95.064912 ; Phys. Rev. C.95.054906 ; Phys. Lett. B.774.623-629 ; Phys. Rev. C.96.024910 ; Eur. Phys. J. C.77.288 ; Phys. Rev. C.100.051902 . Multi-proton correlations have been found in the STAR data, at least at the lower energies Phys. Rev. C.95.054906 ; Phys. Rev. C.98.054901 ; Eur. Phys. J. C.77.288 . It has been shown that the signs of the second- to fourth-order factorial cumulants are a useful tool to exclude regions in the QCD phase diagram close to the critical point using parametric representation of the Ising model Phys. Rev. C.95.054906 . The causes of sign change of factorial cumulants far away from the critical point compared with the cumulants have been analyzed in our recent work panx . In the vicinity of the critical point, the sign and temperature dependence of factorial cumulants is almost the same with that of the cumulants. It has also argued in Ref. Phys. Rev. C.93.034915 that the cumulants and factorial cumulants can not be distinguished in the vicinity of the critical point in a model of critical fluctuations. Except non-monotonic behavior or sign change of the cumulants and factorial cumulants, the other behavior of the high-order cumulant is also suggested searching for the critical point, such as the finite-size scaling Phys. Rev. D.97.034015 ; Journal of Physics G: Nuclear and Particle Physics.42.015104 . The finite-size scaling implies a fixed point. Usually, the fixed point is obtained from the scale transformation of the re-normalization group, resulting in the independence of rescaled thermodynamics on the system sizes at the critical point fixed point 1 ; fixed point 2 ; fixed point 3 . This feature has also been used to search for the critical point fixed point 4 ; Phys.Rev.E.100.052146 ; chenlz . The QCD critical point, if exists, is expected to belong to the same universality class of the three-dimensional Ising model class 1 ; class 2 ; class 3 ; class 4 . Critical behavior of the corresponding thermodynamics in different systems that belongs to the same universality class is the same which is supervised by the same critical exponents. Recently, many works have been made to map the results of the three-dimensional Ising model to that of the QCD PhysRevD102014505 ; PhysRevC103034901 . Usually, a linear ansatz between the QCD variables, temperature and net-baryon chemical potential, and the Ising variables, temperature and external magnetic field is suggested linearmap1 ; linearmap2 ; linearmap3 ; NPA . Cumulants of net-baryon number, which are the derivatives of the QCD free energy density with respect to net- baryon chemical potential, can be regarded as the combination of the derivatives with respect to temperature and magnetic field in the three- dimensional Ising model in the vicinity of the critical point. Since the critical exponent of external magnetic field is larger than that of the temperature Ising exponents1 , the critical behavior of net-baryon number fluctuations is expected to be mainly controlled by the derivatives with respect to the external magnetic field, i.e., the fluctuations of the order parameter in the three-dimensional Ising model. In this paper, using parametric representation and Monte Carlo simulations of the three-dimensional Ising model, we study and discuss the other kind of fixed point behavior in the temperature dependence of the normalized cumulants and factorial cumulants. Assuming the system formed in the heavy-ion collision experiments is in equilibrium, with a mapping from the Ising model to QCD, the fixed point behavior is also studied and discussed in the energy dependence of the normalized cumulants and factorial cumulants along different freeze-out curves, which may be helpful to locate the QCD critical point. The paper is organized as follows. In section 2, the three-dimensional Ising model and its parametric representation are introduced. Parametric expressions of second- to fourth-order cumulants and factorial cumulants of the order parameter are derived. At the critical temperature, the independence on the external magnetic fields of the normalized cumulants has been deduced. In section 3, temperature dependence of second- to fourth-order cumulants and factorial cumulants at different distances to the phase boundary and fixed point behavior of the corresponding normalized ones are studied and discussed in the parametric representation. In section 4, the fixed point behavior of normalized second- to fourth-order cumulants and factorial cumulants is discussed in finite-size systems simulated by the Monte Carlo method. In section 5, a mapping from the Ising model to QCD is introduced. The fixed point behavior in the energy dependence of the normalized (factorial) cumulants is studied and discussed. Finally, conclusions and summary are given in section 6. ## II The second- to fourth-order cumulants and factorial cumulants The three-dimensional Ising model is defined as follows, $\displaystyle\qquad\mathcal{H}=-J\sum_{\langle i,j\rangle}{s}_{i}{s}_{j}-H\sum_{i}{s}_{i},$ (1) where $\mathcal{H}$ is the Hamiltonian, $s_{i}$ is spin at site $i$ on a simple cubic lattice which can take only two values $\pm 1$. $J$ is the interaction energy between nearest-neighbor spins $\langle i,j\rangle$. $H$ represents the external magnetic field. The magnetization $M$ (the order parameter) is $\displaystyle\qquad M=\frac{1}{V}{\langle\sum_{i}{s_{i}}\rangle}=\frac{\langle s\rangle}{V},$ (2) $s=\sum_{i}{s_{i}}$ and $V=L^{d}$ denotes the total spin and volume of the lattice, respectively, where $d=3$ is the dimension of the lattice and $L$ is the number of lattice points of each direction on the cubic lattice. The magnetization is dependent on the external magnetic field $H$ and the reduced temperature $t=(T-T_{c})/{T_{c}}$, where $T_{c}$ is the critical temperature. At $t>0$, it is the crossover side. At $t<0$, it is the first order phase transition side. High-order cumulants of the order parameter can be got from the derivatives of magnetization with respect to $H$ at fixed $t$, $\displaystyle\qquad\left.\kappa_{n}(t,H)=(\frac{\partial^{n-1}M}{\partial H^{n-1}})\right|_{t}.$ (3) In particular, the second- to fourth-order cumulants are as follows, $\displaystyle\qquad\kappa_{2}=\frac{1}{V}{\langle(\delta s)^{2}\rangle},$ $\displaystyle\qquad\kappa_{3}=\frac{1}{V}{\langle(\delta s)^{3}\rangle},$ $\displaystyle\qquad\kappa_{4}=\frac{1}{V}(\langle(\delta s)^{4}\rangle-3\langle(\delta s)^{2}\rangle^{2}),$ (4) where $\delta s=s-\langle s\rangle$. Turn to the parametric representation of the three-dimensional Ising model, magnetization $M$ and reduced temperature $t$ can be parameterized by two variables $R$ and $\theta$ linear para ; linear para 3 , $\displaystyle\qquad M=m_{0}R^{\beta}\theta,\leavevmode\nobreak\ \leavevmode\nobreak\ \leavevmode\nobreak\ \leavevmode\nobreak\ \leavevmode\nobreak\ \leavevmode\nobreak\ t=R(1-\theta^{2}).$ (5) The equation of state of the Ising model can be given by the parametric representation in terms of $R$ and $\theta$ as $\displaystyle\qquad H=h_{0}R^{\beta\delta}h(\theta).$ (6) Where $m_{0}$ in Eq. (5) and $h_{0}$ in Eq. (6) are normalization constants. They are fixed by imposing the normalization conditions $M(t=-1,H=+0)=1$ and $M(t=0,H=1)=1$. $\beta$ and $\delta$ are critical exponents of the three- dimensional Ising universality class with values 0.3267(10) and 4.786(14), respectively Ising exponents . If $M$, $t$ and $h$ are analytic function of $\theta$, the analytic properties of the equation of state are satisfied linear para 1 . The analytic expression of the high-order cumulants can be derived in the parametric representation. What is more, the function $h(\theta)$ is an odd function of $\theta$ because the magnetization is an odd function of the external magnetic field $M(-H)=-M(H)$. One simple function of $h(\theta)$ obeying all the demands is as follows, $\displaystyle\qquad h(\theta)=\theta(3-2\theta^{2}).$ (7) This is a mean-field approximation of representation for the equation of state of the three-dimensional Ising model to order $\varepsilon^{2}$, where $\varepsilon$ is a parameter related to the number of dimensions of space. $\varepsilon$-expansion is one of the techniques to explore the critical phenomena. It is enough for our purpose although the parametric representation is also known up to order $\varepsilon^{3}$ linear para 3 . On the other hand, there is an excellent agreement of the scaling magnetization data from Monte Carlo simulation and the equation of state in the parametric representation J. Engels . When taking the approximate values of the critical exponents $\beta=1/3$ and $\delta=5$ (it is enough for our purpose), the first fourth-order cumulants in the parametric representation are as follows: $\begin{split}&\kappa_{1}(t,H)=m_{0}R^{1/3}\theta,\\\ &\kappa_{2}(t,H)=\frac{m_{0}}{h_{0}}\frac{1}{R^{4/3}(2\theta^{2}+3)},\\\ &\kappa_{3}(t,H)=\frac{m_{0}}{h_{0}^{2}}\frac{4\theta(\theta^{2}+9)}{R^{3}(\theta^{2}-3)(2\theta^{2}+3)^{3}},\\\ &\kappa_{4}(t,H)=12\frac{m_{0}}{h_{0}^{3}}\frac{(2\theta^{8}-5\theta^{6}+105\theta^{4}-783\theta^{2}+81)}{R^{14/3}(\theta^{2}-3)^{3}(2\theta^{2}+3)^{5}}.\\\ \end{split}$ (8) The reduced temperature $t$ and external magnetic field $H$, are functions of $R$ and $\theta$ provided by Eq. (5) and Eq. (6). At fixed $H$, $R$ can be represented in terms of $\theta$ by Eq. (6). As a consequence, cumulants in Eq. (8) just depends on $\theta$, so is the reduced temperature $t$ in Eq.(5). There are three kinds of special values of $\theta$, they are $\theta=\theta_{n}^{max}$ for the peak of $\kappa_{n}$ if the peak exists, $\theta=\theta_{n}^{min}$ for the valley of $\kappa_{n}$ if the valley exists, $\theta=1$ for the reduced temperature $t=0$ (the critical temperature) at a positive magnetic field (or $\theta=-1$ for $t=0$ at a negative magnetic field), respectively. The first two cases imply the ratios (the factor of $H$ is offset in the ratios) of the peak hight to the valley depth for $\kappa_{4}$, $\kappa_{5}$ and $\kappa_{6}$ are universal and independent of $H$. They are approximately $-28$, $-0.1$, and $-6$ for $H>0$, respectively Stephanov-prl107 ; panx . At a positive magnetic field, temperature dependence of even-order cumulants shows a positive peak in the vicinity of the critical temperature, while it is a negative valley for the odd-order cumulants panx . Normalizing the even- order cumulants by their peak hight $\kappa_{2n}^{max},n=1,2,3...$, and the odd-order cumulants by the absolute value of the valley depth $|\kappa_{2n+1}^{min}|,n=1,2,3...$, then from the last case, one can get a fixed point behavior of temperature dependence of normalized cumulants $\kappa_{n}^{Norm}$ for different values of $H$ at $t=0$. Figure 1: (Color online). Temperature dependence of $\kappa_{2}$ (a), $\kappa_{3}$ (b), $\kappa_{4}$ (c), $C_{2}$ (d), $C_{3}$ (e) and $C_{4}$ (f) at three different values of external magnetic fields, $H=0.05$, $0.1$ and $0.2$, in the parametric representation of the three-dimensional Ising model. The green dashed line shows the critical temperature. Especially, one can get the second- to fourth-order normalized cumulants, $\begin{split}&\kappa_{2}^{Norm}=\kappa_{2}/\kappa_{2}^{max},\\\ &\kappa_{3}^{Norm}=\kappa_{3}/|\kappa_{3}^{min}|,\\\ &\kappa_{4}^{Norm}=\kappa_{4}/\kappa_{4}^{max}.\\\ \end{split}$ (9) At any positive magnetic field, values of second- to fourth-order normalized cumulants at $t=0$ are as follows, $\begin{split}&\kappa_{2}^{Norm}(t=0)=\frac{\kappa_{2}(\theta=1)}{\kappa_{2}(\theta=\theta_{2}^{max})}\approx 0.58,\\\ &\kappa_{3}^{Norm}(t=0)=\frac{\kappa_{3}(\theta=1)}{|\kappa_{3}(\theta=\theta_{3}^{min})|}\approx-0.51,\\\ &\kappa_{4}^{Norm}(t=0)=\frac{\kappa_{4}(\theta=1)}{\kappa_{4}(\theta=\theta_{4}^{max})}\approx 0.49.\\\ \end{split}$ (10) In fact, cumulants can be normalized by their values at any $\theta$ to get the fixed point behavior at the critical temperature, but among those the most convenient choice would be normalization by the extreme values which can be identified easily from measured data. The second- to fourth-order factorial cumulants can be expressed by the cumulants as follows Phys. Rev. C.96.024910 , $\begin{split}&C_{2}=\kappa_{2}-\kappa_{1},\\\ &C_{3}=\kappa_{3}-3\kappa_{2}+2\kappa_{1},\\\ &C_{4}=\kappa_{4}-6\kappa_{3}+11\kappa_{2}-6\kappa_{1}.\\\ \end{split}$ (11) They can also be normalized by their maximum or the absolute values of their minimum as follows, $\begin{split}&C_{2}^{Norm}=C_{2}/C_{2}^{max},\\\ &C_{3}^{Norm}=C_{3}/|C_{3}^{min}|,\\\ &C_{4}^{Norm}=C_{4}/C_{4}^{max}.\\\ \end{split}$ (12) Because the factorial cumulants mix different orders of cumulants as showed in Eq. (11), far away from the critical point, the behavior of factorial cumulants is very different from the same order cumulants panx . It also appears to be that there may be no fixed point behavior in the temperature dependence of the factorial cumulants at the critical temperature for different external magnetic fields. But one should keep in mind that in the vicinity of the critical point, cumulants and the same order factorial cumulants can not be distinguished. The higher the order of the factorial cumulant, the more dominant role of the same order cumulant in its critical behavior. ## III Fixed point behavior of normalized cumulants and factorial cumulants in the parametric representation As the increase of value of $H$, it is far away from the phase boundary. At three different magnetic fields $H=0.05,0.1,0.2$, the temperature dependence of second- to fourth-order cumulants and factorial cumulants are studied in the parametric representation of the three-dimensional Ising model, as showed in Fig. 1(a) to 1(f). The vertical green dashed line shows the critical temperature. It is clear that, as the decreasing value of $H$, the qualitative temperature dependence of $\kappa_{2}$ does not change, all showing a peak structure in the vicinity of the critical temperature. But the peak becomes higher, sharper and closer to the critical temperature as showed in Fig. 1(a). The similar situation occurs for $\kappa_{3}$ in Fig. 1(b) and $\kappa_{4}$ in Fig. 1(c). The smaller value of $H$, the closer to the phase boundary, the more singular of the behavior of cumulants. In the vicinity of the critical temperature, trends of temperature dependence of factorial cumulants are similar with the same order cumulants as showed in Fig. 1(d) to 1(f). When it is far away from the critical temperature, the sign of factorial cumulants is possible to change, this is consistent with the results in Ref. panx . The normalized cumulants and factorial cumulants are showed in Fig. 2. The vertical green dashed line shows the critical temperature, while the horizontal green dashed line shows the value of normalized cumulants at the critical temperature which inferred from Eq. (10). Figure 2: (Color online). Temperature dependence of $\kappa_{2}^{Norm}$ (a), $\kappa_{3}^{Norm}$ (b), $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d), $C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) at three different values of external magnetic fields, $H=0.05$, $0.1$ and $0.2$, in the parametric representation of the three-dimensional Ising model. The cross point of green dashed lines is the fixed point. It is clear that for $\kappa_{2}^{Norm}$, $\kappa_{3}^{Norm}$ and $\kappa_{4}^{Norm}$ showed in Fig. 2(a) to 2(c), a common feature occurs. That is the fixed point behavior at the critical temperature. At different values of $H$, values of the $\kappa_{2}^{Norm}$ are the same at the critical temperature. It is independent of the distance to the phase boundary. So are the values of $\kappa_{3}^{Norm}$ and $\kappa_{4}^{Norm}$. The fixed point is just at the cross point of the two dashed green lines. That is to say the values of the normalized cumulants at $t$ are consistent with Eq. (10). As shown in Fig. 2(c), the valley depths for $\kappa_{4}^{Norm}$ at $H=0.05,0.1,0.2$ are almost the same Stephanov-prl107 . One can easily conclude that the ratios of the peak hight to the valley depth are independent of $H$. For the fourth-order cumulant, in some cases, if the peak can not be decided, one can normalize it by its valley depth. The fixed point behavior also exists. All in all, the ratios of the value of even-order cumulants (odd-order cumulants) at critical temperature to its peak value (valley depth) is independent on the external magnetic fields. This results in a fixed point behavior in the temperature dependence of normalized cumulants, which may be helpful to search for the critical temperature. Turn to the normalized factorial cumulants showed in Fig. 2(d) to 2(f), it is clear that far away from the critical temperature, each order of factorial cumulant has sign changes as the increasing $H$. That is to say far away from the phase boundary, there exists sign difference between cumulants and the same order factorial cumulants. Let us pay attention to the fixed point behavior of the normalized factorial cumulants, there is no fixed point behavior in temperature dependence of $C_{2}^{Norm}$ as showed in Fig. 2(d), which is in line with the inference from relation of factorial cumulants with cumulants in Eq. (11). For $C_{3}^{Norm}$ in Fig. 2(e), the fixed point behavior is not so obvious. But the fixed point occurs again in $C_{4}^{Norm}$ as showed in Fig. 2(f). The position of the fixed point is just at the cross point of the two green dashed line, consistent with $\kappa_{4}^{Norm}$. In fact, the higher the order of the cumulants, the more sensitive of the cumulants to the correlation length, the more dominant role of the cumulants in the critical behavior of the same order factorial cumulants. So fixed point behavior occurring in $C_{4}^{Norm}$ again is not hard to understand. ## IV Fixed point behavior of normalized cumulants and factorial cumulants by Monte Carlo simulations Figure 3: (Color online). Temperature dependence of $\kappa_{2}^{Norm}$ (a), $\kappa_{3}^{Norm}$ (b) and $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d), $C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) at three different values of external magnetic fields, $H=0.05$, $0.07$ and $0.1$, in the three-dimensional Ising model simulated by Monte Carlo method. The cross point of green dashed lines is the fixed point for the upper panel. The positions of the green dashed lines in the lower panel are keep consistent with that in the upper panel. By Monte Carlo simulation method, the fixed point behavior is tested in finite-size systems at three different values of external magnetic fields. Because of the finite-size effects, the temperature dependence curves of the cumulants will shift to the higher temperature side until the system size is bigger enough and sufficiently converge to the thermodynamic limit. The typical size is determined by the saturation of size dependence of an observable at a given magnetic field systemsize . For cumulants up to the fourth-order at three different magnetic fields $H=0.05$, $0.07$, and $0.1$, lattice sizes $L=14$, $12$ and $10$ is sufficient to converge to the thermodynamic limit, respectively. For each value of $H$, the simulations are performed at $5$ values of inverse temperature $J/T=0.202$, $0.212$, $0.222$, $0.232$ and $0.242$ near the critical temperature $T_{c}/J\approx 4.51$, where the value of interaction energy $J$ is set to $1$. The Wolff cluster algorithm is used with the helical boundary conditions Wolff . At each pair of $(H,J/T)$, $48$ million independent configurations are generated and used in a Ferrenberg-Swendsen reweighting analysis to calculate observables at intermediate temperature values FS . Results of the second- to fourth- order normalized cumulants and factorial cumulants are shown in Fig. 3(a) to 3(f), respectively. It is clear that the fixed point behavior in temperature dependence of $\kappa_{2}^{Norm}$, $\kappa_{3}^{Norm}$ and $\kappa_{4}^{Norm}$ still exists as shown in Fig. 3(a) to Fig. 3(c). The cross point of the two green dashed line shows the position of the fixed point. The corresponding temperature is about one percent lower than the critical one. What is more, the higher the order of the cumulants, the closer of the fixed point to the critical temperature. In addition, the values of the normalized cumulants at fixed points are different from those in the parametric representation. This can be caused by the finite-size system, the choice of function $h(\theta)$ and the different quantitative temperature dependence of $\kappa_{n}$ in Monte Carlo simulation and the parametric representation. Figure 4: (Color online). Phase diagram on $t-H$ plane of the three- dimensional Ising model (a). Sketch of the $t-H$ axes mapped onto the QCD $T-\mu_{B}$ plane (b). The black solid line and the red point are the first- order phase transition line and the critical point, respectively. The $t$ axis is tangential to the QCD phase boundary at the critical point. The $H$ direction is set to be perpendicular to the $t$ axis. The three lines parallel to the phase boundary from left to right ($H=0.05,0.1$ and $H$ = 0.2) of Ising model (a) are mapped to the three freeze-out curves which is parallel to the $t$ axis from up to down (FC I, FC II and FC III) in QCD $T-\mu_{B}$ plane (b). Comparing temperature dependence of normalized factorial cumulants as showed in Fig. 3(d) to 3(f) with the same order normalized cumulants showed in Fig. 3(a) to Fig. 3(c), respectively, there are no significant difference between them. That is because the temperatures are close to the critical one. This result is consistent with that in Ref. panx ; Phys. Rev. C.93.034915 that these two kinds of cumulants can not be distinguished in the vicinity of the critical point. So it is not hard to understand that except $C_{2}^{Norm}$, there are both obvious fixed point behavior in the temperature dependence in $C_{3}^{Norm}$ and $C_{4}^{Norm}$ as showed in Fig. 3(e) and 3(f). The positions of the green dashed lines are set as the same with that in the same order normalized cumulants. It is not hard to infer that the temperature of fixed point in the normalized factorial cumulants is almost the same with that in the normalized cumulants. All in all, at different external magnetic fields in finite-size systems of the three-dimensional Ising model, temperature dependence of the normalized cumulants or factorial cumulants (at least from the third-order) form a fixed point just about one percent distance to the critical temperature. Comparing with positions of the peak and sign change, the fixed point of normalized cumulants or factorial cumulants is much closer to the critical temperature. ## V Fixed point behavior in the energy dependence of normalized cumulants and factorial cumulants Figure 5: (Color online). Energy dependence of $\kappa_{2}^{Norm}$ (a), $\kappa_{3}^{Norm}$ (b) and $\kappa_{4}^{Norm}$ (c), $C_{2}^{Norm}$ (d), $C_{3}^{Norm}$ (e) and $C_{4}^{Norm}$ (f) along three different freeze-out curves as showed in Fig. 4(b). The vertical green dashed lines show the energy ${\sqrt{s}}_{c}$ corresponding to $\mu_{Bc}$. The horizontal green dashed lines show the value of the normalized cumulants at the fixed point for the upper panel. The positions of the green dashed lines in the lower panel are keep consistent with that in the upper panel. In the current study we focus on the equilibrium properties of the cumulants and factorial cumulants. Thus the non-equilibrium effects are not taken into account Phys. Rev. C.92.034912 . In order to apply the results of this paper to the heavy-ion collision experiments to search for the QCD critical point, it is essential to specify the map between the Ising variables $t$, $H$ to the QCD variables temperature $T$, baryon chemical potential $\mu_{B}$. The $t$ axis is tangential to the first-order phase transition line at the QCD critical point. The angle between the horizontal (fixed $T$) lines on the QCD phase diagram and $t$ axis is $\alpha$. For simplicity, we assume that the $H$ axis is perpendicular to the $t$ axis after the map to the $T-\mu_{B}$ plane which has been studied in Ref. linearmap3 . Then a linear mapping relations can be got as follows: $\begin{split}&\frac{T-T_{cep}}{\Delta T}=-\cos\alpha\frac{H}{\Delta H}+\sin\alpha\frac{t}{\Delta t},\\\ &\frac{\mu_{B}-\mu_{Bc}}{\Delta\mu_{B}}=-\sin\alpha\frac{H}{\Delta H}-\cos\alpha\frac{t}{\Delta t}.\\\ \end{split}$ (13) Where $T_{cep}$, $\mu_{Bc}$ represent the temperature and baryon chemical potential at the QCD critical point. $\Delta T$ and $\Delta\mu_{B}$ denote the width of the critical regime in the QCD phase diagram. Because the location of the critical point and the width of the critical regime for QCD are not known, the suggestion that $\Delta\mu_{B}\approx 0.1$ GeV from model calculations Phys. Rev. D.67.014028 and lattice QCD calculations Phys. Rev. D.78.114503 is used. We set $\Delta\mu_{B}=0.1$ GeV and $\mu_{Bc}=0.25$ GeV as was done in Ref. Phys. Rev. C.92.034912 . $\Delta H$ and $\Delta t$ denote the width of the critical regime in the Ising variables. For simplicity, we set $\Delta H=0.4$ and $\Delta t=2$, respectively (the fixed point behavior is not sensitive to the width of the critical regime in the Ising variables. For more information to define the critical regime, to see Ref. Phys. Rev. C.92.034912 ). At last, the freeze-out curve is assumed below the crossover/first-order phase transition line. An empirical parametrization of the heavy-ion-collision data from Ref. Phys. Rev. C.73.034905 can be used to describe the freeze-out curves, $T_{f}(\mu_{B})=a-b{\mu_{B}}^{2}-c{\mu_{B}}^{4}.$ (14) Where $a=0.166$ GeV, $b=0.139$ GeV-1, $c=0.053$ GeV-3. At a small range of $\mu_{B}$ (0.15 GeV ¡ $\mu_{B}$ ¡ 0.35 GeV), $T_{f}$ is approximately viewed varying linearly with $\mu_{B}$ in this study. The angle between the straight line of $T_{f}(\mu_{B})$ and the horizontal (fixed $T$) line on the QCD $T-\mu_{B}$ plane is very small. For simplicity, we assume the freeze-out curve approximately parallel to the $t$ direction which has been mapped to the QCD phase diagram. For straightforward, phase diagram of the three-dimensional Ising model on the $t-H$ plane and one possible sketch of the $t-H$ axes mapped onto the $T-\mu_{B}$ plane of QCD are showed in Fig. 4(a) and 4(b), respectively. Thus three lines parallel to the $t$ axis from left to right at three different values of $H$ in Fig. 4(a) can be simply mapped to three freeze-out curves from up to down in QCD as showed in Fig. 4(b). Base on the mapping and using Eq. (13), the temperature dependence of normalized cumulants and factorial cumulants at the three different $H$ can be converted to the $\mu_{B}$ dependence of normalized cumulants and factorial cumulants along the three different freeze-out curves. Turn to the heavy-ion collision experiments, using the energy ($\sqrt{s}$) dependence of $\mu_{B}$ given in Ref. Phys. Rev. C.73.034905 , $\mu_{B}(\sqrt{s})=\frac{d_{0}}{d_{1}\sqrt{s}+1},$ (15) where $d_{0}=1.308$ GeV, $d_{1}=0.273$ GeV-1, one can get the energy dependence of normalized cumulants and factorial cumulants along the three different freeze-out curves. Supposing the angel $\alpha=3^{\circ}$, based on the parametric representation of the Ising model, energy dependence of the second- to fourth-order normalized cumulants and factorial cumulants along the three freeze-out curves are showed in Fig. 5(a) to 5(f), respectively. The vertical green dashed lines show the critical energy ${\sqrt{s}}_{c}=15.5$ GeV which is corresponding to $\mu_{Bc}=0.25$ GeV at the QCD critical point through Eq. (15). It is clear that, the fixed point behavior exists at ${\sqrt{s}}_{c}$ in the energy dependence of $\kappa_{2}^{Norm}$ to $\kappa_{4}^{Norm}$ as showed in Fig. 5(a) to 5(c), respectively. The values of the normalized cumulants at the fixed point showed by the horizontal green dashed line are a little changed compared to the values given by Eq. (10) because of the mapping from the Ising variables to the QCD variables. For the normalized factorial cumulants showed in Fig. 5(d) to 5(f), the fixed point behavior occurs from the fourth-order one, and its position is consistent with that in $\kappa_{4}^{Norm}$. The fixed point behavior in the energy dependence of the normalized cumulants is derived directly from the linear mapping in Eq. (13), where $\Delta H$, $\Delta t$ and the angle $\alpha$ are all set a fixed value in this paper. The influence of these three parameters on the fixed point behavior should be explained. The fixed point behavior still exists as the variation of these three parameters. Different values of $\Delta H$ and $\Delta t$ almost do not change the energy at the fixed point. They just influence the range of the energy (the range of $\mu_{B}$) after the mapping. Small values of $\alpha$ (like $3^{\circ}$ used in this paper) has little influence on the fixed point behavior. While soaring values of $\alpha$ not only change the range of the energy, but also shift the fixed point away from ${\sqrt{s}}_{c}$ (but one should notice that a small value for $\alpha$ should be more closer to the truth here). One other problem should be discussed is that how can one get different freeze-out curves in the heavy-ion collisions? In fact, the centrality dependence of the chemical freeze-out temperature and baryon chemical potential has been studied in Ref. Phys. Rev. C.71.054901 ; Advances in High Energy Physics.2021.6611394 . Although the chemical freeze-out temperature does not vary much with centralities, the temperature interval between the three different freeze-out curves can be very small. If we set $T_{cep}=1.8$ GeV and $\Delta T=T_{cep}/8$ which has been used in Ref. Phys. Rev. C.92.034912 , the critical regime of QCD temperature is $\Delta T$ = 0.0225 GeV. When the external magnetic field $H$ changes from 0.05 to 0.2 at the same $t$, after mapping to the QCD variables through Eq. (13), the freeze-out temperature interval is just about $0.0084$ GeV. What is more, baryon chemical potential increases from peripheral to the most central collisions Advances in High Energy Physics.2021.6611394 . It is enough for one to get different freeze-out curves at different centralities. So the centrality controlling the freeze-out curves in the QCD phase diagram may play a similar role of the external magnetic field $H$ of the Ising model. Under the mapping from the three-dimensional Ising model to QCD, the fixed point behavior may be expected in the energy dependence of normalized net- proton (factorial) cumulants in heavy-ion collision experiments. This feature can be used to locate the QCD critical point. ## VI Summary By using the parametric representation of the three-dimensional Ising model, temperature dependence of the second- to fourth-order cumulants and factorial cumulants of the order parameter is studied. The qualitative behavior of temperature dependence of cumulants does not change with the varying external magnetic field in the vicinity of the critical temperature. So does that of the factorial cumulants. The fixed point behavior in temperature dependence of normalized cumulants at the critical temperature for different magnetic fields is deduced and showed. By Monte Carlo simulation of the three-dimensional Ising model, the fixed point behavior in the temperature dependence of normalized second- to fourth- order cumulants is checked in finite-size systems. The fixed point behavior still exists just about one percent distance to the critical temperature, which is much closer to the critical temperature than the peak structure or sign change showed in the temperature dependence of the cumulants. For the normalized factorial cumulants, the fixed point behavior is also survived at least from the fourth order cumulants both in the parametric representation and finite-size systems which reflect the fact that the critical behavior of factorial cumulants is dominant by the corresponding cumulants. The higher the order of the factorial cumulant, the more dominant role of the same order cumulant in its critical behavior. Through a mapping from the three-dimensional Ising model to QCD, the fixed point behavior is also found in the energy dependence of the normalized cumulants (or fourth-order factorial cumulants) along different freeze-out curves. The fixed point is very close to the critical energy (corresponding to the baryon-chemical potential at the QCD critical point). It should be promising for the method to be applicable to locate the QCD critical point in heavy-ion collision experiments. More generally it must be emphasized that all of the results here rely on the equilibrium of the system. Whether the fixed point behavior survived in the non-equilibrium cumulants needs further studies. What is more, further studies of different ways of mapping from the Ising model to QCD will be helpful. The author acknowledges fruitful discussions with Yuanfang Wu, MingMeiXu and Lizhu Chen ## References * (1) J. Adams et al (STAR Collaboration), Nucl. Phys. A, 757: 102 (2005) * (2) Y. Aoki, G. Endrödi, Z. Fodor et al, Nature, 443: 675 (2006) * (3) L. G. Yaffe, B. Svetitsky, Phys. Rev. D, 26: 963 (1982) * (4) A. Roberge, N. Weiss, Nucl. Phys. B, 27: 5734 (1986) * (5) M. Fukugita, M. Okawa, A. Ukawa, Phys. Rev. Lett., 63: 1768 (1989) * (6) P. de Forcrand, O. Philipsen, Nucl. Phys. B, 64: 2290 (2002) * (7) S. Ejiri, Phys. Rev. D, 78: 074507 (2008) * (8) E. S. Bowman, J. I. Kapusta, Phys. Rev. C, 79: 015202 (2009) * (9) B. Friman, F. Karsch, K. Redlich et al, Eur. Phys. J. C, 71: 1694 (2001) * (10) Y. Hatta, M. A. Stephanov, Phys. Rev. Lett., 91: 102003 (2003) * (11) V. Koch, arXiv:0810.2520 * (12) M. A. Stephanov, Phys. Rev. Lett., 102: 032301 (2009) * (13) M. Asakawa, S. Ejiri, M. Kitazawa, Phys. Rev. Lett., 103: 262301 (2009) * (14) V. Skokov, B. Stokić, B. Friman et al, Phys. Rev. C, 82: 015206 (2010) * (15) Wei-jie Fu, Yu-Xin Liu, and Yue-Liang Wu, Phys. Rev. D, 81: 014028 (2010) * (16) M. A. Stephanov, Phys. Rev. Lett., 107: 052301 (2011) * (17) S. Collaboration, L. Adamczyk, J. K. Adkins, et al., Phys. Rev. Lett., 112: 032302 (2014) * (18) W. Fan, X. Luo and H. Zong, Chin. Phys. C, 43: 033103 (2019) * (19) Li-Zhu Chen, Ye-yin Zhao, Jin Wu, et al., Chin. Phys. C, 45: 104103 (2021) * (20) Z. Li, K. Xu, X. Wang and M. Huang, Eur. Phys. J. C, 79: 245 (2019) * (21) D. Mroczek, A. R. Nava Acuna, J. Noronha-Hostler et al., Phys. Rev. C, 103: 034901 (2021) * (22) M. Kitazawa, M. Asakawa and H. Ono, Phys. Lett. B, 728: 386 (2014) * (23) M. Kitazawa, Nuclear Physics A, 942: 65 (2015) * (24) B. Ling and M. A. Stephanov, Phys. Rev. C, 93: 034915 (2016) * (25) T. Nonaka, M. Kitazawa and S. Esumi, Phys. Rev. C, 95: 064912 (2017) * (26) A. Bzdak, V. Koch and N. Strodthoff, Phys. Rev. C, 95: 054906 (2017) * (27) S. He and X. Luo, Phys. Lett. B, 774: 623 (2017) * (28) M. Kitazawa and X. Luo, Phys. Rev. C, 96: 024910 (2017) * (29) A. Bzdak, V. Koch and V. Skokov, Eur. Phys. J. C, 77: 288 (2017) * (30) A. Bzdak and V. Koch, Phys. Rev. C, 100: 051902 (2019) * (31) A. Bzdak, V. Koch, D. Oliinychenko, et al., Phys. Rev. C, 98: 054901 (2018) * (32) Xue Pan, Mingmei Xu and Yuanfang Wu, Int. Jour. Mod. Phys. E, 30: 2150036 (2021) * (33) N. G. Antoniou, F. K. Diakonos, X. N. Maintas and C. E. Tsagkarakis, Phys. Rev. D, 97: 034015 (2018) * (34) X. Pan, M. Xu and Y. Wu, Journal of Physics G: Nuclear and Particle Physics, 42: 015104 (2015) * (35) J. Cardy, Scaling and Renormalization in Statistical Physics. Cambridge University Press, Cambridge, UK, 1996 * (36) M. E. Fisher, Rev. Mod. Phys., 46: 597 (1974) * (37) K. Wilson, Phys. Rep., 12: 75 (1974) * (38) Privman V. Finite Size Scaling and Numerical Simulation of Statistical Physics. World Scientific, Singapore, 1990 * (39) Y. Zhang, Y. Zhao, L. Chen, X. Pan, M. Xu, Z. Li, Y. Zhou and Y. Wu, Phys. Rev. E, 100: 052146 (2019) * (40) L. Chen, Y. Zhao, X. Li, Z. Li and Y. Wu, Int. Jour. Mod. Phys. E, 30: 2150056 (2021) * (41) P. de Forcrand, O. Philipsen, Phys. Rev. Lett., 105: 152001 (2010) * (42) M. Stephanov, K. Rajagopal, E. Shuryak, Phys. Rev. Lett., 81: 4816 (1998) * (43) M. Asakawa, J. Phys. G: Nucl. Part. Phys, 36: 064042 (2009) * (44) R. D. Pisarski, F. Wilczek, Phys. Rev. D, 29: 338 (1984) * (45) M. Caselle and M. Sorba, Phys. Rev. D, 102: 014505 (2020) * (46) J.J. Rehr and N.D. Mermin, Phys. Rev. A, 8: 472 (1973) * (47) N. B Wilding, J. Phys.: Condens. Matter, 9: 585 (1997) * (48) C. Nonaka and M. Asakawa, Phys. Rev. C, 71: 044904 (2005) * (49) Xue pan, Lizhu Chen, X.S. Chen and Yuanfang Wu, Nucl. Phys. A, 913: 206 (2013) * (50) J. Garcia, J.A. Gonzalo, Phys. A, 326: 464 (2003) * (51) P. Schofield, Phys. Rev. Lett., 22: 606 (1969) * (52) D. J. Wallace, R. K. P. Zia, J. Phys. C: Solid State Phys, 7: 3480 (1974) * (53) H. W. J. Blöte, E. Luijten, J. R. Heringa, J. Phys. A: Math. Gen, 28: 6289 (1995) * (54) B. D. Josephson and J. Phys. C: Solid State Phys, 2: 113 (1969) * (55) J. Engels, L. Fromme, M. Seniuch, Nucl. Phys. B, 655: 277 (2003) * (56) Mark Abraao York and Guy D. Moore, arXiv: 1106.2535 (2011) * (57) U. Wolff, Phys. Rev. Lett., 62: 361 (1989) * (58) A. M. Ferrenberg and R. H. Swendsen, Phys. Rev. Lett., 61: 2635 (1988) * (59) S. Mukherjee, R. Venugopalan and Y. Yin, Phys. Rev. C, 92: 034912 (2015) * (60) Y. Hatta and T. Ikeda, Phys. Rev. D, 67: 014028 (2003) * (61) R. V. Gavai and S. Gupta, Phys. Rev. D, 78: 114503 (2008) * (62) J. Cleymans, H. Oeschler, K. Redlich and S. Wheaton, Phys. Rev. C, 73: 034905 (2006) * (63) J. Cleymans, B. Kämpfer, M. Kaneta, S. Wheaton and N. Xu, Phys. Rev. C, 71: 054901 (2005) * (64) D. Biswas, Advances in High Energy Physics, 2021: 6611394 (2021)
arxiv-papers
2021-07-27T11:58:45
2024-09-04T03:07:21.390409
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Xue Pan", "submitter": "Xue Pan", "url": "https://arxiv.org/abs/2107.12758" }
2107.12762
# Multi-Scale Local-Temporal Similarity Fusion for Continuous Sign Language Recognition Pan Xie Zhi Cui Yao Du Mengyi Zhao Jianwei Cui Bin Wang Xiaohui Hu ###### Abstract Continuous sign language recognition (cSLR) is a public significant task that transcribes a sign language video into an ordered gloss sequence. It is important to capture the fine-grained gloss-level details, since there is no explicit alignment between sign video frames and the corresponding glosses. Among the past works, one promising way is to adopt a one-dimensional convolutional network (1D-CNN) to temporally fuse the sequential frames. However, CNNs are agnostic to similarity or dissimilarity, and thus are unable to capture local consistent semantics within temporally neighboring frames. To address the issue, we propose to adaptively fuse local features via temporal similarity for this task. Specifically, we devise a Multi-scale Local-Temporal Similarity Fusion Network (mLTSF-Net) as follows: 1) In terms of a specific video frame, we firstly select its similar neighbours with multi-scale receptive regions to accommodate different lengths of glosses. 2) To ensure temporal consistency, we then use position-aware convolution to temporally convolve each scale of selected frames. 3) To obtain a local-temporally enhanced frame-wise representation, we finally fuse the results of different scales using a content-dependent aggregator. We train our model in an end-to- end fashion, and the experimental results on RWTH-PHOENIX-Weather 2014 datasets (RWTH) demonstrate that our model achieves competitive performance compared with several state-of-the-art models. ###### keywords: Sign Language Recognition , Temporal Similarity , Content-aware Feature Selector , Position-aware Convolution , Content-dependent Aggregator ††journal: Nuclear Physics B [inst1]organization=Beihang University,city=Beijing, country=China [inst2]organization=Xiaomi AI Lab,city=Beijing, country=China [inst3]organization=Institute of Software, Chinese Academy of Sciences,city=Beijing, country=China ## 1 Introduction Sign language (SL), consisted of various hand gestures, motions, facial expressions, transitions and etc, is an indispensable daily communication tool between people with hearing impairment. A gloss is the minimal semantic unit of sign language [1], and people would have to accomplish one single or a set of gestures in order to sign a gloss. The video-based continuous Sign Language Recognition (cSLR) is the task that transcribes a sequence of signing frames into an ordered gloss sentence. However, this task is challenging: 1) On the one hand, many gestures or actions could be shared across different glosses due to the richness of the vocabulary in a sign language. 2) On the other hand, even a same gloss may also be comprised of different lengths of corresponding video frames, as different people would act in different speed. These aspects address difficulties in explicitly aligning the video frames with the corresponding signing glosses. Therefore, it would be challenging to recognize glosses from such a dynamic sequential video, where there is no explicit semantic boundaries between glosses. Figure 1: Case study of two examples: the figures above respectively visualize the pairwise cosine similarities $cos_{ij}$ between the spatial features of framei and framej, where the diagonal elements always equal 1. Note that spatial features are extracted from a CNN backbone model. To address the aforementioned challenge, many recent approaches have achieved excellent performance by adopting a mainstream framework [2, 3, 4]: they firstly utilize a convolution neural network (CNN) to extract a sequence of spatial features from video frames, and then fuse the temporal sequence either using a recurrent neural network (RNN) or one-dimensional convolution neural network (1D-CNN). However, these two conventional fusion methods still have several problems. In terms of RNNs, previous research [3] has indicated that they tend to focus more on the sequential order of sign language than the fine-grained gloss-level details, and thus RNNs are not suitable for this task where the local details play a vital role. On the contrary, it is more promising to use the fully convolutional neural network (FCN) [3], which uses 1D-CNNs to learn such gloss-level granularities. However 1D-CNNs are content-agnostic [5], i.e., the same trained CNN filters are applied to all the videos frames without distinction between locally similar or dissimilar ones. But note that the sign language is semantically coherent, suggesting that the temporally close video frames share similarities [6]. To further demonstrate such phenomenon, we plot similarity heatmaps of two examples shown in Figure 1. We can clearly see that the temporal neighbours share much higher cosine similarities than those far-away ones, where there are more yellow pixels along the diagonal of the heatmaps. Besides, another research [7] has implied that a learned CNN filter could also be insensitive to where it is targeting. As a result, 1D-CNNs would tend to skip temporal consistency of the convolved frames. To sum up, 1D-CNNs alone could not model this task very well if without extra regulations. Figure 2: An overview of our model, where we mainly zoom on in our proposed mLTSF module. In this figure, ”CFS” stands for content-aware feature selector, ”PTC” stands for position-aware temporal convolver, and ”CMA” stands for content-dependent multi-scale aggregator. To tackle the problem, we propose to adaptively augment the sequential fusion with locally similar frames for continuous Sign Language Recognition. Specifically, we introduce a (multi-scale Local-Temporal Similarity Fusion) Network (mLTSF-Net). Compared with the fully convolutional neural network (FCN) [3], our model additionally has an mLTSF module as shown in Figure 2, which brings the following improvements: 1) Rather than a fixed receptive region, we propose a content-aware feature selector (CFS) which firstly selects similar neighboring frames with different scaled selection regions. Facilitated by this, our model is induced to accommodate different lengths of glosses. 2) To enhance temporal consistency, we then introduce a position- aware temporal convolver (PTC), where each scale of selected frames will be appended with relative positional embeddings and convolved in an temporal order. 3) To augment local-temporal frame-wise representations, we finally fuse different scales of convolved features with a content-dependent multi- scale aggregator (CMA), where we incorporate a dynamic weight using an attention-like mechanism. We conduct experiments on the benchmark dataset, RWTH-PHOENIX-Weather-2014 (RWTH) [8]. We also apply extensive ablation studies to validate the effectiveness of our model. The experimental results demonstrate that our proposed model mLTSF-Net achieves the state-of-the-art accuracy (with a word error rate (WER) as 23.0$\%$) compared with many competitive baseline models. ## 2 Related Work Most researches on continuous sign language recognition mainly focus on two aspects (feature-level and sequence-level): 1) either strive to better model the spatial or temporal semantic information of sign language video frames, or 2) design a better sequence learning mechanism to learn the mapping relationship between the sign video frames and the corresponding gloss sequences. #### Feature-Level Generally, the feature-level researches for cSLR include two aspects: spatial modeling and temporal modeling. Early works of cSLR mostly use the hand- crafted feature for sign video representation [9, 10, 11, 12, 13]. Recently, deep learning based methods achieve the state-of-the-art in cSLR for their strong feature representation capability[14, 15, 16, 17, 18, 3, 4, 19]. A common practice is to use 2D-CNNs to extract the spatial features, and then RNNs or 1D-CNNs are employed to model the temporal variations of sign language. Cui et al. [17] utilizes the combination of 2D-CNNs and LSTMs to learn the spatial-temporal representation. Cheng et al. [3] adopts a fully convolutional network which is composed of 2D-CNNs and 1D-CNNs. The comparison of these two approaches shows that 1D-CNNs are more robust than RNNs for cSLR to model the semantic structure of sign glosses. #### Sequence-Level Sequence learning in cSLR is to learn the mapping relationship between sign video sequences and sign gloss labels. Early on, Hidden markov models (HMMs) are widely used to model the state transitions in cSLR [20, 14, 21, 22]. Recently, the attention-based encoder-decoder architecture have shown a great success in machine translation [23]. Despite that several works show promising results to apply such architecture for cSLR [24, 25], it is time- and labor- consuming to build a very large-scale source-to-target mapping dataset. Moreover, Connectionist Temporal Classification (CTC) [26] has proven to be the state-of-the-art performance in cSLR, where CTC algorithm succeeds in processing unsegmented sequence [16, 17, 18, 3]. #### Ours In summary, our model is built upon the fully convolutional network (FCN) [3]. In particular, FCN use 1D-CNNs to learn temporal information of video features with a window sliding over the time dimension. Despite the successful performance, CNNs are agnostic to similar neighbouring frames [5], and also tend to be insensitive to temporal dependency of ordered frames [7]. These drawbacks would hinder the performance of model from being further improved. In this paper, our contributions lie in that we propose a multi-scale Local- Temporal Simialrity Fusion Network (mLTSF-Net) to address the above issue, and our model achieves the state-of-the-art performance compared with many competitive baseline models. Figure 3: An overview of our proposed model. ”CFS” means content-aware feature selector. ”PTC” means position-aware convolver. ”CMA” means content-dependent aggregator. ”GELU” means gaussian error linear units activation. ## 3 Method ### 3.1 Preliminaries Towards the task of cSLR, our objective is to learn a mapping probability $p(\mathcal{Y|X})$ from a given series of video frames $\mathcal{X}=\\{x_{t}\\}^{T}_{t=1}$ to an ordered gloss sequence $\mathcal{Y}=\\{y_{i}\\}^{L}_{i=1}$, where $T$ and $L$ respectively denote the lengths. To model the mapping probability, a promising method is to adopt a fully convolutional network (FCN) [3] to learn feature representations. To be specific, the FCN framework is consisted of two main components in a top-down order: 1) a frame feature extractor, and 2) a gloss feature encoder. Due to the drawback of CNNs as discussed previously, the CNN-stacked gloss feature encoder is insufficient to fully capture gloss-level details. To address this issue, we introduce a (multi-scale Local-Temporal Similarity Fusion) Network (mLTSF-Net) as shown in Figure 3. Built upon FCN, our proposed model has an additional mLTSF module on top of the gloss feature encoder. In the following subsections, we will firstly revisit the FCN framework and then give a detailed description about our proposal. ### 3.2 FCN Framwork #### Frame Feature Extractor Given a series of video frames $\mathcal{X}=\\{x_{t}\\}_{t=1}^{T}$, the frame feature extractor firstly encodes them, and then outputs a series of according spatial features. Specifically, CNNs are commonly adopted as the backbone model to learn the spatial features as: $\displaystyle z^{T\times C^{\prime}\times H^{\prime}\times W^{\prime}}=\mathcal{F}_{2d-CNN}(x^{T\times C\times H\times W})$ (1) where $C,H,W$ respectively denote the number of spatial channels (here $C=3$), the height and weight of the input frame, while $C^{\prime},H^{\prime},W^{\prime}$ denote the sizes of a new activation feature map $z$ with a lower-resolution. To collapse the spatial dimension of $z$, a global average pooling function $\mathcal{F}_{GAP}$ is adopted: $\displaystyle s^{T\times C^{\prime}}=\mathcal{F}_{GAP}(z^{T\times C^{\prime}\times H^{\prime}\times W^{\prime}})$ (2) where $s^{T\times C^{\prime}}$ denotes the sequence of the frame-wise representations, and $C^{\prime}$ is the number output channels. #### Gloss Feature Encoder Given the extracted spatial features, the gloss feature encoder adopts 1D-CNNs over the time dimension to learn contextual information. Such encoder is consisted of two levels, where each level is stacked with multiple 1D-CNN layers and undertakes different functions: The 1st Level. To capture the semantic information of a gloss in terms of the whole sign video, the 1st level gloss feature encoder adopts a larger filter size in order to consider more frames at a time. Since it is hard to learn extremely long dependencies in a temporal sequence [18], temporal max pooling layers are utilized to pool the feature sequence to a moderate length. In other words, the stacked temporal layers can be regarded as a window sliding function over the time dimension. Mathematically, we obtain the gloss feature from the 1st level as: $\displaystyle g_{1}^{T^{\prime}\times C^{\prime}}=\mathcal{F}_{TP}(\mathcal{F}_{1d-CNN}(s^{T\times C^{\prime}}))$ (3) where $T^{\prime}$ is smaller than $T$ due the temporal pooling. The 2nd Level. To learn the neighboring information in between glosses, the 2nd level of gloss feature encoder uses a relatively smaller filter size to emphasize on the local details. The 2nd level does not has a temporal pooling layer, where the output time dimension would not be changed. Likewise, the output gloss feature from 2nd level is represented as: $\displaystyle g_{2}^{T^{\prime}\times C^{o}}=\mathcal{F}_{1d-CNN}(g_{1}^{T^{\prime}\times C^{\prime}})$ (4) where $C^{0}$ is the output feature channels of 2nd level. Figure 4: An overview of three-step selection by content-aware feature selector. ### 3.3 Multi-scale Local-Temporal Similarity Fusion It is worth mentioning again that temporal neighboring frames share consistent local semantics [6], which highlights the importance of local-temporal similarity. However, the fully CNN-stacked gloss feature encoder is hard to catch such detailed information, since CNNs are unable to take additional consideration into temporally similar and consistent neighbours. More specific reasons are detailed in Section 1. Accordingly, we introduce mLTSF-Net to learn the local-temporal similarity. As mentioned before, our model has an additional mLTSF module compared with FCN. Specifically, our proposed mLTSF module has three main components as shown in Figure 3: 1) Content-aware Feature Selector (CFS), 2) Position-aware Temporal Convolver (PTC), and 3) Content-dependent Multi-scale Aggregator (CMA). In this section, we will detail each component and how they overcome the drawback of CNNs. #### Content-aware Feature Selector First of all, the aim of Content-aware Feature Selector (CFS) is to adaptively select top-$k$ similar neighbouring frame-wise features. Given a series of extracted features from Frame Feature Extractor, CFS will select similar neighbours via three step as shown in Figure 4: (a) With the extracted features $s^{T\times C^{\prime}}$ from the backbone CNN model, we apply outer tensor product and softmax function to get a similarity matrix $d^{T\times T}$: $\displaystyle d^{T\times T}=\textup{softmax}(\frac{s^{T\times C^{\prime}}s^{{C^{\prime}\times T}}}{C^{\prime}})$ (5) where the diagonal elements in $d^{T\times T}$ represent similarities of the features themselves. (b) To ensure neighbors are going to be selected instead of the far-away ones, we only consider a range $[t-k,t+k]$ for a specific feature $s_{t}\in{s^{T\times C^{\prime}}}$ to keep local semantic consistency. Outside that range, we replace the similarity scores with $-inf$. Mathematically, the selecting criterion for $s_{t}$ becomes as: $\displaystyle d_{t,j}=\begin{cases}d_{t,j},&j\in[\max(0,t-k),\min(t+k,T)]\\\ -inf,&\text{others}\end{cases}$ (6) (c) Notably, we denote the selected $k$ neighbours as $\mathbb{K}_{t}$ (i.e., Locally Similar Region) for a specific feature $s_{t}$. Finally, we obtain a sub-series of enhanced frame-wise representations via temporal similarity as: $\displaystyle s^{T\times k\times C^{\prime}}=\mathcal{F}_{topk}(s^{T\times C^{\prime}},\mathbb{K})$ (7) where the $k$ neighbors are sorted based upon the time steps in ascending order. Since different glosses usually correspond to different frame lengths, we propose multi-scale locally similar regions to accommodate such phenomenon rather than a fixed one. Here, we use three region sizes $k_{1}$, $k_{2}$ and $k_{3}$, and accordingly obtain three set of selected frames, $s^{T\times k_{1}\times C^{\prime}}$, $s^{T\times k_{2}\times C^{\prime}}$ and $s^{T\times k_{3}\times C^{\prime}}$. #### Position-aware Temporal Convolover To further facilitate the temporal consistency between the selected frames, we then use temporal convolutional layers to sequentially fuse the selected features. However, according to Islam et. al [7], CNN layers are insensitive to what they are convolving in an image. And thus 1D-CNNs suffers from the same problem that they are insufficient to fully learn temporal dependency in between neighbouring frames. To encode the relationship of temporal position between frames, we adopt the relative position encoding [27, 28, 29] to inject temporal dependency into the sign feature learning. Concretely, we first calculate the relative positions w.r.t the center feature and map them into trainable embedding vectors. Then the relative position embeddings are added to the selected features, resulting in position-aware sign features: $\displaystyle{\hat{s}^{T\times k\times C^{\prime}}}_{t,p}={s^{T\times k\times C^{\prime}}_{t,p}}+\phi(p-t)$ (8) where ${s^{T\times k\times C^{\prime}}_{t,p}}$ denotes the $p^{th}$ selected feature in the region around the center $s_{t}$, and $p-t$ is the relative position value between the $p^{th}$ feature and the center $s_{t}$. With a specific scale of selected features, we apply one-dimensional convolution layers to aggregate the position-aware sign features. The enhanced sign feature $\tilde{s}\in R^{T\times C^{\prime}}$ is represented as: $\displaystyle{\tilde{s}^{T\times C^{\prime}}}=MaxPool(Relu(LN(Conv1d(\hat{s}^{T\times k\times C^{\prime}}))))$ (9) where Conv1d stands for 1D-CNN and LN denotes Layer Normalization [30]. In order to learn more expressive features, we add two linear layers $W_{1}\in\mathbb{R}^{C^{\prime}\times C^{\prime}}$, $W_{2}\in\mathbb{R}^{C^{\prime}\times C^{\prime}}$ with a GELU activation [31] in between as follows: $\displaystyle{s^{\prime}}^{T\times C^{\prime}}=W_{2}\cdot\text{GELU}(W_{1}\tilde{s}^{T\times C^{\prime}}+b_{1})+b_{2}$ (10) where $s^{\prime}\in\mathbb{R}^{T\times C^{\prime}}$ denotes enhanced sign features with local similar features. Accordingly, the same operations 8, 9, 10 are applied to all the scales ($k_{1}$, $k_{2}$ and $k_{3}$) of selection regions. Finally, we concatenate the three resulting enhanced features into ${s^{\prime}}^{T\times 3\times C^{\prime}}$, which still needs to be fused into a 2D matrix for the following recognition. #### Content-dependent Multi-scale Aggregator In order to fuse the three-scaled features ${s^{\prime}}^{T\times 3\times C^{\prime}}$, we are inspired by Chen et. al [32] and re-weight the three scales content-dependently at each time step. To be specific, we introduce a linear projection and map them into a weight distribution $\alpha$, which is also shown in the right side of Figure 2: $\displaystyle\alpha^{T\times 3}=\text{softmax}(Ws^{T\times C^{\prime}}+b)$ (11) where $W\in\mathbb{R^{C^{\prime}\times 3}}$ and $b\in\mathbb{R^{3}}$. And then, we dynamically aggregate these three scales using the weight distribution $\alpha$ as: $\displaystyle s_{o}^{T\times C^{\prime}}=a^{T\times 3}\cdot s_{o}^{T\times 3\times C^{\prime}}$ (12) where the resulting feature $s_{o}$ is the final aggregated representation. With the learned weight distribution, our model is able to dynamically emphasize on different scale at different time step, e.g., if a gloss is across a wide range, and the model will pay pay more attention onto the bigger scale size of selection region, and vice versa. #### Summary of mLTSF On the one hand, our mLTSF-Net (CFS + PTC + CMA) is induced to capture temporal local similarity in sign language, on the other hand it is also able to enhance temporal consistency of every fused representation. ### 3.4 Sequence Learning It is hard to train a cSLR model, since the source and target sequences usually have different lengths. Besides, there is no specific alignment between the video frames and the corresponding signing glosses. To tackle the problem, we use Connectionist Temporal Classification (CTC) [26] to optimize our model for cSLR. Specifically, CTC introduces a designed cost function for sequence prediction, where the sequence is purely unsegmented or is weakly segmented. Besides, CTC extends the sign vocabulary with a special token “blank”, and we name this vocabulary as $V$. Further, the token “blank” is expected to label the silence or transition frame that may exist in between output sign labels. To transform the gloss features into gloss labels, we adopt a fully-connected layer $\mathcal{F}_{fc}$ on the outputs from the 2nd level of gloss feature encoder in Equation 4. Mathematically, we obtain the normalized probabilities of predicted labels as: $\displaystyle p^{T^{\prime}\times V}=\mathcal{F}_{fc}(g_{2}^{T^{\prime}\times C^{o}})$ (13) Moreover, CTC defines a mapping function $\mathcal{B}$: $\mathcal{Y}^{L}=\mathcal{B}(\pi^{T^{\prime}})$ by removing “blank” tokens and collapsing repetitions. Note that $L\leq T^{\prime}$ and $\pi$ is a possible alignment sequence. During training, the objective of CTC is to minimize the negative log-likelihoods of all possible alignments, $\mathcal{B}^{-1}(\mathcal{Y})=\\{\pi:\mathcal{B}(\pi)=\mathcal{Y}\\}$: $\displaystyle\mathcal{L}_{ctc}(\mathcal{X,Y})=-\sum_{\small{\pi\in\mathcal{B}^{-1}(\mathcal{Y})}}\log{p(\mathcal{Y}|\mathcal{X})}$ (14) Overall, we train the whole model by minimizing the loss as follows: $\displaystyle\mathcal{L}=\mathcal{L}_{ctc}+\lambda\lVert W\rVert_{2}$ (15) where $\lambda$ is the $L_{2}$ regularization coefficient. ## 4 Model Configuration Frame Feature Extractor --- CNN backbone mLTSF Module Content-aware Feature Selector ($k$={16,12,8}) Position-aware Temporal Convolver | RPE (C512) Conv1D (F3-S1-P1-C512) Conv1D (F3-S1-P1-C512) AdaptiveMaxPool (M1) Linear + GLEU + Linear Content-dependent Multi-scale Aggregator 1st Level of Gloss Feature Encoder Conv1D (F5-S1-P2-C512) Maxpool1D (M2-S2) Conv1D (F5-S1-P2-C512) Maxpool1D (M2-S2) 2nd Level of Gloss Feature Encoder Conv1D (F3-S1-P1-C1024) Table 1: The configuration of our proposed architecture. CNN Backbone --- Conv2D, $3\times 3,1,1,32$ | MaxPool2D, $2\times 2,2$ Conv2D, $3\times 3,1,1,32$ | Conv2D, $3\times 3,1,1,64$ | MaxPool2D, $2\times 2,2$ Conv2D, $3\times 3,1,1,64$ | Conv2D, $3\times 3,1,1,128$ | MaxPool2D, $2\times 2,2$ Conv2D, $3\times 3,1,1,128$ | Conv2D, $3\times 3,1,1,256$ | MaxPool2D, $2\times 2,2$ Conv2D, $3\times 3,1,1,256$ | Conv2D, $3\times 3,1,1,512$ | MaxPool2D, $2\times 2,2$ Conv2D, $3\times 3,1,1,512$ | Global Average Pooling | Table 2: The settings of our backbone model, which is used to extract spatial features from the input sign language frames. The parameters of 2D convolution layer are denoted as ”Conv2D, filter size $\times$ filter size, stride, padding, output channels”. In this section, we will provide more details of our model in a left-to-right order as illustrated in Figure 3. The overall configurations of our proposed architecture are presented in Table 4. In terms of the feature extractor shown as in Figure 3, we follow the setting of Cheng et al. [3], where the parameters are listed in Table 2. Besides, we also add batch normalization [33] to accelerate training after every convolution layer. Followed right after by the frame feature extractor, our proposed mLTSF module is consisted of three components, 1) Content-aware Feature Selector (CFS), 2) Position-aware Temporal Convolver (PTC), and 3) Content-dependent Multi-scale Aggregator (CMA). The CFS component is used to capture similarity in multi- scale regions, here we set the sizes of three selection regions for CSF as $k_{1}=16$, $k_{2}=12$, and $k_{3}=8$. We use PTC component to sequentially convolve a set of selected similar features. Here, we stack two 1D-CNNs for PTC, where the filter size is set as as 3, the stride size as 1, and the padding size as 1. Also, we add Layer Normalization [30] after the 1D-CNN layer. Afterwards, the CMA component just follows equation 11 and 11 to fuse the three scales. The 1st level of gloss feature encoder is stacked with two same compounds (where each compound is consisted of a 1D-CNN and a TP (temporal max pooling)). Specifically, we set the filter size of 1D-CNNs as 5, stride size as 1, the padding size is 2, and the channel number is 512. For the sake of consistency, we name such setting as F5-S1-P2-C512. Besides, the TP layer has a pooling size of 2 and the stride size of 2. Similarly, we define this setting as M2-S2. Therefore, the overall receptive field of the 1st level of gloss feature encoder is equal to 16, which is ensured to be equivalent to $k_{1}=16$, the largest size of our selection region. Therefore, the original sequence length $T$ of video frames is reduced to $T^{\prime}=\frac{T}{4}$. Accordingly, the length of a gloss unit is scaled down by four times. Then, we use a 1D-CNNs with the setting as F3-S1-P1-C1024 layer for the 2nd level of gloss feature encoder. ## 5 Experiment ### 5.1 Dataset and Metrics We conduct experiment on RWTH-PHOENIX-Weather-2014 (RWTH) [8], the benchmarking dataset of the continuous Sign Language Recognition. It is curated from a public television broadcast in Germany, where all signers wear dark clothes and perform sign language in front of a clean background. Specifically, this dataset contains $\small{6,841}$ sign language sentences (around $\small{80,000}$ glosses with a vocabulary of size $\small{1,232}$). Officially, the dataset is splitted with $\small{5,672}$ training samples, $\small{540}$ validation samples, and $\small{629}$ testing samples. All videos have been pre-processed to a resolution of $210\times 260$ and $\small{25}$ frames per second (FPS). We evaluate the performance of our model using word error rate (WER), which is broadly adopted metric for cSLR: $\displaystyle\text{WER}=\dfrac{\\#\text{substitution}+\\#\text{deletion}+\\#\text{insertion}}{\\#\text{words in reference}}$ (16) ### 5.2 Implementation Details We resize all the input frames to $256\times 256$ for both training and testing. To augment the training dataset, we randomly crop the video frames to $224\times 224$. In addition, we also scale up the training video sequence by +$20{\%}$ and then scale down by -$20{\%}$. During testing, we however crop the frames from the center, instead of randomness. We use the Adam optimizer [34] to optimize our model, where the initial learning rate is set to $10^{-4}$. After 40 epochs, we decay the learning rate by 0.5 every 5 epochs, where the decay rate $\lambda$ is $10^{-4}$. Overall, we train our model for 60 epochs in total on one NVIDIA Titan RTX GPU. Methods | Iterative | Dev (%) | Test (%) ---|---|---|--- del/ins | WER | del/ins | WER DeepHand [14] | yes | 16.3/4.6 | 47.1 | 15.2/4.6 | 45.1 Staged-Opt [17] | yes | 13.7/7.3 | 39.4 | 12.2/7.5 | 38.7 Re-Sign [21] | yes | - | 27.1 | - | 26.8 CNN-LSTM-HMM [35] | yes | - | 26.0 | - | 26.0 SBD-RL [36] | yes | 9.9/5.6 | 28.6 | 8.9/5.1 | 28.6 DNF [18] | yes | 7.8/3.5 | 23.8 | 7.8/3.4 | 24.4 SubUNets [16] | no | 14.6/4.0 | 40.8 | 14.3/4.0 | 40.7 DeepSign [22] | no | 12.6/5.1 | 38.3 | 11.1/5.7 | 38.8 SFNet [2] | no | - | 38.0 | - | 38.1 FCN [3] | no | - | 26.1 | - | 26.0 FCN + GFE [3] | no | - | 23.7 | - | 23.9 mLTSF-Net | no | 8.5/3.2 | 23.8 | 8.3/3.1 | 23.5 mLTSF-Net + GFE | no | 7.9/2.7 | 22.9 | 7.6/3.0 | 23.0 Table 3: The evaluation results on baseline models, where del and ins stand for deletion and insertion, respectively. ### 5.3 Comparison Against Baselines To demonstrate the effectiveness of our work, we compare with several state- of-the-art models. The experimental results are summarized in Table 3. We firstly examine the performance of iterative optimization methods, e.g., Stage-Opt [17], Re-sign [21] and DNF [18]. The results are listed in the first block of Table 3. They resort to iteration in order to address the problem of weak supervision. They first train an end-to-end recognition model for alignment proposals, and then use the alignment proposals to finetune the frame feature extractor. However, these iterative methods are time consuming. Even worse, the proposed alignments for supervision are noisy, and thus tend to degrade the performance unavoidably. Among the non-iteration method as shown in the second block of Table 3, FCN [3] achieve a remarkable WER compared with the others. It is built upon an end-to-end fully convolutional neural network for cSLR. Further, Cheng et.al. [3] introduce a Gloss Feature Enhancement (GFE) to enhance the frame-wise representation, where GFE is trained to provide a set of alignment proposals for the frame feature extractor. Notably, FCN+GFE exhibits great potentials for cSLR, and reduce the WER to a new low. However, as discussed in previous sections, CNNs are insufficient to capture local similarities and insensitive to temporal order of a series of video frames. Built on FCN, our mLTSF-Net additionally introduces a mLTSF module to address the issues of CNNs for cSLR. As shown in the last two rows in Table 3, our model outperforms all the other baseline models on WER. Combined with Gloss Feature Enhancement (GFE), our model can even achieve a better performance. Such results demonstrate the effectiveness of our proposed mLTSF module, and our model equipped with GFE achieves the state-of-the-art performance on the dataset of RWTH-PHOENIX-Weather-2014. ## 6 Ablation Study and Analysis mLTSF | WER ---|--- DEV | TEST None | 26.1 | 26.0 $k=8$ | 25.0 | 24.9 $k=12$ | 24.7 | 24.5 $k=16$ | 24.4 | 24.2 $k=20$ | 25.3 | 25.2 $k=\\{8,12\\}$ | 24.3 | 24.5 $k=\\{8,16\\}$ | 23.9 | 24.2 $k=\\{12,16\\}$ | 24.0 | 23.9 $k=\\{8,12,16\\}$ | 23.8 | 23.5 Table 4: The effect of selection region sizes for mLTSF module. Compared with the FCN framework, our model has an additional module, i.e., mLTSF module, which is induced to adaptively fuse the local-temporal features, in order to capture local semantic consistency. In this section, we will compare closely with FCN to validate the effectiveness of our proposal. ### 6.1 Single vs Multiple Scales The main idea of our proposed multi-scale selection regions is to dynamically adapt to different lengths of gloss. To demonstrate our idea, we evaluate the performance of our model with different combinations of selection region sizes in Equation 7 to answer the following two questions: 1) Are multiple scales are effectively necessary? 2) If necessary, how do the sizes of these scales influence the overall performance? The results are shown in Table 4. The 2nd row (None), which represents the pure FCN and performs the worst, which does not contain our proposed mLTSF module. Such result indicates that our proposed mLTSF module is effective in improving the performance over the FCN framework. As we gradually increase the size from $k=8$ to $k=16$ as shown in Table 4, the performance is promoted along with such size increase. Particularly, the performance reaches the best when we set $k$ as 16. This is not surprising since the average length of a gloss roughly equals to 16. However, when we set $k$ as 20, the performance becomes much worse. Such performance decline is mostly due to that 20 frames are usually contain more than on sign gloss, and similar frames which locate distantly might share little semantic consistency. As a result, the final representations tend to be indistinguishable for cSLR. Comparing last four lines with a single scale as illustrated in Table 4, we see that our model with multiple scales greatly outperforms than single scale. Especially when we use three scales with the setting as $k={8,12,16}$, our model achieves the lowest WER. Enhanced with multiple selection regions, our model is able to seize most salient scale to represent current time-step feature for downstream sign language recognition. On the other side, since different gloss is consists of different lengths, our model equipped with multiple scales are capable of accommodate such phenomenon. To sum up, this comparison demonstrates that it is recommendable to use multiple scales for mLTSF module with a setting as $k=\\{8,12,16\\}$. Feature Selector | WER ---|--- DEV | TEST FCN | 26.1 | 26.0 global-FS | 26.1 | 26.5 center-FS | 25.3 | 25.0 CFS | 24.4 | 24.2 Table 5: The effect of feature selector. Method | WER ---|--- DEV | TEST w/o RPE | 24.8 | 24.7 w/o TCNs | 25.7 | 25.6 mean pooling | 24.6 | 24.4 PTC | 24.4 | 24.2 Table 6: The effect of position-aware temporal convolver. ### 6.2 Analysis on Content-aware Feature Selector In our proposed mLTSF module, we introduce a content-aware feature selector (CFS) to dynamically select most similar features in a local region. To demonstrate its effectiveness, we conduct comparison study to explore two potential concerns: 1) Compared against a fixed local region, is it necessary to use content-aware mechanism to dynamically select neighbours based on the similarity? 2) Is it competent to select similar neighbours from all the whole sequence globally? To uncover these two doubts, we compare our proposed CFS with some feature selector variants as shown in Table 5. Note that FCN is the baseline model where there is no feature selector. For notation, ”center-FS” stands for that the model simply picks its surrounding left and right neighbours, where there are 16 neighbours in total. Besides, ”global-FS” stands for that the model selects top-$k$ similar features from the whole sequence globally, where $k$ is set as 16. Note that we use a single-scale receptive region to select top-$k$ similar features locally for a fair comparison with the variants, where $k$ is also set as 16. The comparison results are listed in Table 5. It is surprising that global-CFS even degrades the performance compared with FCN. In such way, the final aggregated features become indistinguishable, since two similar frames but locates far away might not share much semantic consistency. On the contrary, center-FS brings a performance increase over the baseline FCN. This increase shows that the aggregation of neighbouring local region is a simple yet effective way, where the model is able to further seize local semantic consistency. Moreover, our proposed CFS performs the best, which further demonstrates the importance of concentration of local similar features. This content-aware mechanism provides a channel to make full use of local semantic consistency. Besides, this comparison validates the effectiveness of our CFS component. ### 6.3 Analysis on Position-aware Temporal Convolver To generate neighborhood-enhanced representation, we propose a position-aware temporal convolver to ensure the sequential consistency among each scale of selected features. Specifically, the position-aware temporal convolver (PTC) is composed of a relative position encoding (RPE), temporal convolutions (TCNs), and an adaptive max-pooling layer. To testify the influence of each component, we apply ablation experiments to compare PTC with its variants. As shown in Table 6, the first two variants are without RPE and TCNs, respectively. The third variant replaces the adaptive max-pooling layer with mean pooling. From such comparison, we can see that (1) without RPE, the model performance is reduced by 0.4/0.5 WER on DEV/TEST. This result validates that that relative position information is essential for sequence modeling, and confirms the assertion made by [7] that the CNN filters tend to be insensitive with temporal dependency. (2) Without TCNs, we aggregate the selected features only using the max-pooling layer. The performance of our model drops significantly, showing that temporal convolution is still fundamental for local-temporal modeling. (3) We replace the adaptive max-pooling with mean- pooling, where the model tends to become insensitive to the salience. As a consequence, the performance is decreased by 0.2/0.2 WER. In summary, each component of PTC is indispensable, and our proposed PTC as a whole can effectively improve the performance. ### 6.4 Analysis on Content-dependent Multi-scale Aggregator In order to seize multiple temporal granularities, we introduce a content- dependent multi-scale aggregator to fuse different scales of selection regions. To testify if it is necessary to fuse the three scales in a dynamic way, we conduct an experiment to compare our dynamic method with a static average one. The experimental results are shown in Table 7. The dynamic method significantly outperforms the average one in terms of WER. Since different gloss corresponds to different length, a static average method is insufficient to catch gloss-level salience. On the contrary, our dynamic method is able to fuse different scales with salience estimation, and generates a sequence of distinguishable features for downstream sign language recognition. Finally, this comparison further demonstrates that a content-dependent assembling method is an excellent approach for multi-scaled features fusion. Aggregator Method | WER ---|--- DEV | TEST average | 24.3 | 23.9 dynamic | 23.8 | 23.5 Table 7: The effect of content-dependent multi-scale aggregator. Method | WER ---|--- DEV | TEST non-local sparse attention | 43.0 | 46.6 local sparse attention | 38.2 | 36.6 single-LTSF | 24.4 | 24.2 Table 8: Comparison between single-LTSF and sparse attention. ### 6.5 Our model vs Sparse Attention Our proposed content-aware feature selector is induced to select top-$k$ similar neighbours. This selection process is similar to Sparse Attention [37, 38, 39], which have been shown great potentials in various tasks. They design various sparsity patterns, and find similar ones globally from the whole sequence. However, what is difference from our model is that they aggregate the selected features by weighted averaging. To verify whether our model is over designed for cSLR, we compare our model using only a single scale (top-16 similar features) with the sparse attention. The experimental results are exhibited in Table 8. When comparing the non- local with local sparse attention, the local one achieves a much better performance, where the local sparse attention is constrained to attend only in a local region. This performance promotion further confirms that similar frames which locate far away do not share much gloss-level consistency. Our model only using a single scale is named as single-LTSF, which is listed in the last row of Table 8. Interestingly, single-LTSF outperforms significantly the other two comparable models. This improvement might due to many reasons, and we speculate that sparse attention which just uses weighted average is hard to ensure the temporal consistency with the selected sparse features, resulting an indistinguishable fusion for downstream sign language recognition. To sum up, the sparse attention could not model well the task of cSLR. On the contrary, it is more recommendable to use our proposed mLTSF-Net for the task of cSLR. Figure 5: Alignments for a training example by FCN and Ours. The x-axis represents the alignment with the highest probability among all possible underlying alignments, where ”-” represents ”blank” symbol. While the y-axis represents the corresponding probabilities. ### 6.6 Case study To better understand the effect of our mLTSF-Net, we visualize the alignments of FCN and our model (FCN + mLTSF) in Figure 5. Particularly, we see that FCN is more likely to align “blank” tokens to the frames at the boundaries. For example, the frames around “NOVEMBER” (purple bars) are very similar. However, FCN does not capture such similarity, and assign a “blank” or gives a very low probability for “NOVEMBER”. In contrast, our mLTSF-Net performs much better. Thanks to mLSTF module, our model is able to capture such similarity, and gives a correct alignment or even assign a much higher probability. This comparison further demonstrates that our mLTSF module is able to capture local semantic consistency. This is the most important factor for performance improvement. ## 7 Conclusion In this paper, we identify the drawback of fully convolutional network for cSLR that CNNs would tend to become agnostic to similarity and temporal consistency, and thus could not model well local semantic consistency in sign language. To tackle it, we propose a mLTSF-Net which is built upon the FCN network to fuse temporal similar frames with multiple granularities, in order to keep consistent semantics in between neighboring frames. On the standard benchmarking RWTH dataset, we demonstrate that our approach outperforms several baseline models. The extensive ablation study proves the effectiveness of our proposed mLTSF-Net for cSLR. ## References * [1] S. W. Ong, S. Ranganath, Automatic sign language analysis: A survey and the future beyond lexical meaning, IEEE transactions on pattern analysis and machine intelligence 27 6 (2005) 873–91. * [2] Z. Yang, Z. Shi, X. Shen, Y.-W. Tai, Sf-net: Structured feature network for continuous sign language recognition, ArXiv abs/1908.01341 (2019). * [3] K. L. Cheng, Z. Yang, Q. Chen, Y.-W. Tai, Fully convolutional networks for continuous sign language recognition, 2020 European Conference on Computer Vision (ECCV) (2020). * [4] H. Zhou, W. Zhou, Y. Zhou, H. Li, Spatial-temporal multi-cue network for continuous sign language recognition, in: AAAI, 2020. * [5] H. Su, V. Jampani, D. Sun, O. Gallo, E. Learned-Miller, J. Kautz, Pixel-adaptive convolutional neural networks, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 11166–11175. * [6] D. Li, C. Xu, X. Yu, K. Zhang, B. Swift, H. Suominen, H. Li, Tspnet: Hierarchical feature learning via temporal semantic pyramid for sign language translation, Advances in Neural Information Processing Systems 33 (2020). * [7] M. A. Islam, S. Jia, N. D. B. Bruce, How much position information do convolutional neural networks encode?, ArXiv abs/2001.08248 (2020). * [8] J. Forster, C. Schmidt, O. Koller, M. Bellgardt, H. Ney, Extensions of the sign language recognition and translation corpus rwth-phoenix-weather, in: LREC, 2014\. * [9] T. D. Nguyen, S. Ranganath, Facial expressions in american sign language: Tracking and recognition, Pattern Recognition 45 (5) (2012) 1877–1891. * [10] T. Starner, J. Weaver, A. Pentland, Real-time american sign language recognition using desk and wearable computer based video, IEEE Trans. Pattern Anal. Mach. Intell. 20 (1998) 1371–1375. * [11] N. Habili, C. Lim, A. Moini, Segmentation of the face and hands in sign language video sequences using color and motion cues, IEEE Transactions on Circuits and Systems for Video Technology 14 (2004) 1086–1097. * [12] L. Wang, R. Wang, D. Kong, B. Yin, Similarity assessment model for chinese sign language videos, IEEE Transactions on Multimedia 16 (2014) 751–761. * [13] W. Kong, S. Ranganath, Towards subject independent continuous sign language recognition: A segment and merge approach, Pattern Recognition 47 (3) (2014) 1294–1308. * [14] O. Koller, H. Ney, R. Bowden, Deep hand: How to train a cnn on 1 million hand images when your data is continuous and weakly labelled, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016) 3793–3802. * [15] P. Kumar, H. Gauba, P. P. Roy, D. P. Dogra, A multimodal framework for sensor based sign language recognition, Neurocomputing 259 (2017) 21–38. * [16] N. C. Camgöz, S. Hadfield, O. Koller, R. Bowden, Subunets: End-to-end hand shape and continuous sign language recognition, 2017 IEEE International Conference on Computer Vision (ICCV) (2017) 3075–3084. * [17] R. Cui, H. Liu, C. Zhang, Recurrent convolutional neural networks for continuous sign language recognition by staged optimization, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017) 1610–1618. * [18] R. Cui, H. Liu, C. Zhang, A deep neural framework for continuous sign language recognition by iterative training, IEEE Transactions on Multimedia 21 (2019) 1880–1891. * [19] L. Gao, H. Li, Z. Liu, Z. Liu, L. Wan, W. Feng, Rnn-transducer based chinese sign language recognition, Neurocomputing 434 (2021) 45–54. * [20] W. Gao, G. Fang, D. Zhao, Y. Chen, A chinese sign language recognition system based on sofm/srn/hmm, Pattern Recognition 37 (12) (2004) 2389–2402. * [21] O. Koller, S. Zargaran, H. Ney, Re-sign: Re-aligned end-to-end sequence modelling with deep recurrent cnn-hmms, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017) 3416–3424. * [22] O. Koller, S. Zargaran, H. Ney, R. Bowden, Deep sign: Hybrid cnn-hmm for continuous sign language recognition, in: BMVC, 2016. * [23] D. Bahdanau, K. Cho, Y. Bengio, Neural machine translation by jointly learning to align and translate, CoRR abs/1409.0473 (2015). * [24] J. Huang, W. Zhou, Q. Zhang, H. Li, W. Li, Video-based sign language recognition without temporal segmentation, in: AAAI, 2018. * [25] D. Guo, W. Zhou, H. Li, M. Wang, Hierarchical lstm for sign language translation, in: AAAI, 2018. * [26] A. Graves, S. Fernández, F. Gomez, J. Schmidhuber, Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks, in: ICML ’06, 2006. * [27] P. Shaw, J. Uszkoreit, A. Vaswani, Self-attention with relative position representations, in: NAACL-HLT, 2018. * [28] Z. Dai, Z. Yang, Y. Yang, J. Carbonell, Q. V. Le, R. Salakhutdinov, Transformer-xl: Attentive language models beyond a fixed-length context, in: ACL, 2019. * [29] H. Yan, B. Deng, X. Li, X. Qiu, Tener: Adapting transformer encoder for named entity recognition, ArXiv abs/1911.04474 (2019). * [30] J. Ba, J. Kiros, G. E. Hinton, Layer normalization, ArXiv abs/1607.06450 (2016). * [31] D. Hendrycks, K. Gimpel, Gaussian error linear units (gelus), arXiv: Learning (2016). * [32] Y. Chen, X. Dai, M. Liu, D. Chen, L. Yuan, Z. Liu, Dynamic convolution: Attention over convolution kernels, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020) 11027–11036. * [33] S. Ioffe, C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift, arXiv preprint arXiv:1502.03167 (2015). * [34] D. P. Kingma, J. Ba, Adam: A method for stochastic optimization, CoRR abs/1412.6980 (2015). * [35] O. Koller, N. C. Camgoz, H. Ney, R. Bowden, Weakly supervised learning with multi-stream cnn-lstm-hmms to discover sequential parallelism in sign language videos, IEEE Transactions on Pattern Analysis and Machine Intelligence 42 (2020) 2306–2320. * [36] C. Wei, J. Zhao, W. gang Zhou, H. Li, Semantic boundary detection with reinforcement learning for continuous sign language recognition, IEEE Transactions on Circuits and Systems for Video Technology 31 (2021) 1138–1149. * [37] R. Child, S. Gray, A. Radford, I. Sutskever, Generating long sequences with sparse transformers, ArXiv abs/1904.10509 (2019). * [38] I. Beltagy, M. E. Peters, A. Cohan, Longformer: The long-document transformer, ArXiv abs/2004.05150 (2020). * [39] H.-Y. Zhou, S. Zhang, J. Peng, S. Zhang, J. Li, H. Xiong, W. Zhang, Informer: Beyond efficient transformer for long sequence time-series forecasting, in: AAAI, 2021.
arxiv-papers
2021-07-27T12:06:56
2024-09-04T03:07:21.403017
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Pan Xie, Zhi Cui, Yao Du, Mengyi Zhao, Jianwei Cui, Bin Wang, Xiaohui\n Hu", "submitter": "Pan Xie", "url": "https://arxiv.org/abs/2107.12762" }
2107.12767
# Pointwise A Priori Estimates for Solutions to Some p-Laplacian Equations Xiaoqiang Sun111 School of Mathematics, Sun Yat-sen University, Guangzhou, 510275, China. ⊠ Jiguang Bao222 School of Mathematical Sciences, Beijing Normal University, Laboratory of Mathematics and Complex Systems, Ministry of Education, Beijing 100875, China. Emails: [email protected], [email protected] $\boxtimes$ Corresponding author ###### Abstract In this paper, we apply blow-up analysis to study pointwise a priori estimates for some p-Laplace equations based on Liouville type theorems. With newly developed analysis techniques, we first extend the classical results of interior gradient estimates for the harmonic function to that for the p-harmonic function, i.e., the solution of $\Delta_{p}u=0,\ x\in\Omega$. We then obtain singularity and decay estimates of the sign-changing solution of Lane-Emden-Fowler type p-Laplace equation $-\Delta_{p}u=|u|^{\lambda-1}u,\ x\in\Omega$, which are then extended to the equation with general right hand term $f(x,u)$ with certain asymptotic properties. In addition, pointwise estimates for higher order derivatives of the solution to Lane-Emden type p-Laplace equation, in a case of $p=2$, are also discussed. ## 1 Introduction p-Laplacian equation arises in many studies of non-linear phenomena, for instance, in mathematical modeling of non-Newtonian fluids in physics [1, 2], and in the theory of quasi-regular, quasi-conformal mappings in geometry [3, 4, 5]. The p-Laplacian equation represents an important type of quasi-linear equations. It has the following form $-\Delta_{p}u=f(x,u),\qquad x\in\Omega$ (1.1) where $\Omega$ is a domain in $\mathbb{R}^{N}$, and $\Delta_{p}u:=div(|\nabla u|^{p-2}\nabla u),\qquad 1<p<\infty$ is p-Laplace operator. When $p=2$, $\Delta_{p}u$ is Laplace operator. $\Delta_{p}u$ is degenerate elliptic when $p>2$ and has singularity when $p<2$. We call $u\in C^{1}(\Omega)$ as a weak solution of (1.1), if $\int_{\Omega}|\nabla u|^{p-2}(\nabla u,\nabla\varphi)dx=\int_{\Omega}f(x,u)\varphi dx,\qquad\forall\varphi\in C_{c}^{\infty}(\Omega).$ (1.2) In this paper we assume $f\in C^{1}(\mathbb{R}^{N})$. In the following text, a weak solution always refers to that defined above with $C^{1,\alpha}_{loc}$ regularity. ###### Remark 1.1. Although weak solutions in other weaker forms could be defined as well, for example $u\in W^{1,m}_{loc}(\Omega)\cap L^{\infty}_{loc}(\Omega)$ [1], or $C^{1,\alpha}_{loc}$ weak solution [6], however, we can deduce that these definitions are equivalent to each other due to the following established conclusion on regularity [7, 8, 1, 9]: _If $u\in C^{1}$ is a weak solution of (1.1), then there exists $\beta\in(0,1)$ such that $u\in W^{2,2}_{loc}(\Omega)\cap C^{1,\beta}_{loc}(\Omega).$ _ When $f$=0, Eq. (1.1) becomes $-\Delta_{p}u=0,\qquad x\in\Omega.$ (1.3) The solution $u$ of (1.3) is called p-harmonic function. In the case of $p=2$, it is well-known harmonic function, satisfying the following Laplace equation $-\Delta u=0,\qquad x\in\Omega.$ (1.4) For harmonic function, the following pointwise interior estimate of its gradient [10] can be derived via Poisson integrative formula or mean vale theorem: $|\nabla u(x)|\leq N\cdot\sup_{\Omega}|u|\cdot dist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (1.5) A natural question is that whether the above gradient estimate for harmonic function can be extended to that for p-harmonic function? We will seek to answer it in this paper. On the other hand, when $f$ has the form of $u^{\lambda}$, then Eq. (1.1) becomes the following Lane-Emden type equation $-\Delta_{p}u=u^{\lambda},\qquad x\in\Omega.$ (1.6) J. Serrin and H. Zou [1] proved the Liouville type theorems of (1.6), i.e. nonexistence of the nonnegative nontrivial solution on the whole space $\mathbb{R}^{N}$. Based on the Liouville type theorems, P. Polacik, P. Quittner and P. Souplet [11] obtained the following singularity and decay estimates for the nonnegative weak solution of (1.6) by applying the method of blow-up analysis: _Let $0<p-1<\lambda<\Lambda_{s}(p),$ and let $\Omega\neq\mathbb{R}^{N}$ be a domain, then there exists a constant $C=C(p,N,\lambda)>0$ $($independent of $\Omega$ and $u),$ such that any $($ nonnegative weak $)$ solution $u$ of (1.6) satisfies_ $u(x)+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega$ (1.7) where, $\Lambda_{s}(p):=\begin{cases}\frac{N(p-1)+p}{n-p},\qquad\qquad ifN>p\\\ \infty,\qquad\qquad\qquad ifN\leq p\end{cases}$ (1.8) is the corresponding Sobolev critical exponent ([12, 13]). Again, we are curious about that whether the decay estimates (1.7) could be obtained for the following Lane-Emden-Fowler type p-Laplacian equation [8] $-\Delta_{p}u=|u|^{\lambda-1}u,\qquad x\in\Omega.$ (1.9) To answer the above two questions, we here develop new analytic techniques to get pointwise a priori estimates for the solution and/or gradient of some types of quasilinear equations by coupling blow up analysis with Liouville- type theorems. In this paper, we first extend the interior estimates for the gradient of harmonic function to p-harmonic function. Subsequently, we study the singularity and decay estimates of the sign-changing solutions of the Lane-Emden-Fowler type p-Laplacian equation, $-\Delta_{p}u=|u|^{\lambda-1}u$. Furthermore, we also discuss the pointwise a priori estimates for higher order derivatives of solution to $-\Delta u=u^{\lambda},x\in\Omega$, i.e., the Lane- Emden type p-Laplacian equation in the case of $p=2$. Different from the estimates in the form of $L^{p}$ norm or $C^{\alpha}$ seminorm, the pointwise a priori estimates deduced in this paper have some interesting features: (1) $dist^{-1}(x,\partial\Omega)$ is explicitly expressed in the right hand of the estimates. (2) The constant $C$ in the right hand of the estimates depends only on the exponents in the equation ($p$, $N$ and/or $\lambda$), and is independent of domain $\Omega$ and solution $u$. In this sense the pointwise estimates are also universal. ## 2 Main Results ### 2.1 Interior estimates of gradient of p-harmonic function ###### Theorem 2.1. Let $p\in(1,\infty)$, and let $\Omega$ be a bounded domain in $\mathbb{R}^{N}$ $(N\geq 2)$. Then there exists a constant $C=C(p,N)>0$, such that any $C^{1}$ weak solution $u$ of $\Delta_{p}u=0,\qquad x\in\Omega,$ satisfies $|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot dist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.1) ###### Remark 2.1. This result extends the classical interior estimates (1.5) of gradient of the harmonic function [10]. ### 2.2 Singularity estimates for Lane-Emden-Fowler type equation For Lane-Emden-Fowler type equation $-\Delta_{p}u=|u|^{\lambda-1}u,\qquad x\in\Omega,$ (2.2) according to (1.2), we say $u\in C^{1}(\Omega)$ is a weak solution of (2.2), if $\int_{\Omega}|\nabla u|^{p-2}(\nabla u,\nabla\varphi)dx=\int_{\Omega}|u|^{\lambda-1}u\varphi dx,\qquad\forall\varphi\in C_{c}^{\infty}(\Omega).$ (2.3) A weak solution is called "stable" if the second variation of energy function of (2.2) is nonnegative. More specifically, we have the following definition [8]. ###### Definition 2.1. Denote $L_{u}(v,\varphi)=\int_{\Omega}|\nabla u|^{p-2}(\nabla v,\nabla\varphi)dx+\int_{\Omega}(p-2)|\nabla u|^{p-4}(\nabla u,\nabla v)\cdot(\nabla v,\nabla\varphi)-\lambda|u|^{\lambda-1}v\varphi dx.$ The weak solution $u\in C^{1}$ of (2.2) is called stable, if $L_{u}(\varphi,\varphi)\geq 0,\qquad\forall\varphi\in C_{c}^{1}(\Omega).$ (2.4) Accordingly, the weak solution $u\in C^{1}$ of (2.2) is called stable outside a compact set $K\subset\Omega$, if $L_{u}(\varphi,\varphi)\geq 0,\qquad\forall\varphi\in C_{c}^{1}(\Omega\setminus K).$ (2.5) ###### Remark 2.2. If $u$ has finite Morse index, then $u$ is stable outside a compact set. ###### Theorem 2.2. Let $p>2$, and let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of $\mathbb{R}^{N}$. If $\begin{cases}p-1<\lambda<\infty,\qquad\qquad\ \ if\ N\leq\frac{p(p+3)}{p-1},\\\ p-1<\lambda<\Lambda_{c}(N,p),\qquad if\ N>\frac{p(p+3)}{p-1},\\\ \end{cases}$ (2.6) then there exists $C=C(p,N,\lambda)>0$ $($independent of $\Omega$ and $u$ $)$, such that any stable weak solution $u\in C^{1}(\Omega)$ of (2.2) satisfies $|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.7) ###### Remark 2.3. This theorem expands the estimates of singularity and decay for nonnegative solution of Lane-Emden type equation in [11] to that for sign-changing solution of Lane-Emden-Fowler type equation, under the condition of "stability" of the weak solution. ###### Theorem 2.3. Let $p>2$, and let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of $\mathbb{R}^{N}$, if $\begin{cases}p-1<\lambda<\infty,\qquad\qquad\ ifN\leq p,\\\ p-1<\lambda<\frac{N(p-1)+p}{N-p},\qquad ifN>p,\\\ \end{cases}$ (2.8) then there exists $C=C(p,N,\lambda)>0$ (independent of $\Omega$ and $u$), such that any weak solution $u\in C^{1}(\Omega)$ of (2.2) which is stable outside a compact set $K\subset\mathbb{R}^{N}$ satisfies $|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq Cdist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.9) The conclusions in the above two theorems can be extended for the following equation: $-\Delta_{p}u=f(u),\qquad x\in\Omega.$ (2.10) ###### Corollary 2.4. Assume that the relations between $N,p,\lambda$ are the same as that in Theorem 2.2. Let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of $\mathbb{R}^{N}$, and let $f$ satisfy $\lim_{u\rightarrow\infty}|u|^{1-\lambda}u^{-1}f(u)=l\in(0,+\infty).$ (2.11) If $u\in C^{1}(\Omega)$ is a weak solution of (2.10) and satisfies (2.4), then there exists $C=C(p,N,\lambda,f)>0$ (independent of $\Omega$ and $u$), such that $|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq C(1+dist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega)),\qquad\forall x\in\Omega.$ (2.12) ###### Corollary 2.5. Assume that the relations between $N,p,\lambda$ are the same as that in Theorem 2.3. Let $\Omega\neq\mathbb{R}^{N}$ be an arbitrary domain of $\mathbb{R}^{N}$. Assume that $f$ satisfies $\lim_{u\rightarrow\infty}|u|^{1-\lambda}u^{-1}f(u)=l\in(0,+\infty).$ (2.13) If $u\in C^{1}(\Omega)$ is a weak solution of (2.10) and satisfies (2.5), then there exists $C=C(p,N,\lambda,f)>0$ $($independent of $\Omega$ and $u)$, such that $|u(x)|+|\nabla u(x)|^{\frac{p}{\lambda+1}}\leq C(1+dist^{-\frac{p}{\lambda+1-p}}(x,\partial\Omega)),\qquad\forall x\in\Omega.$ (2.14) ### 2.3 Estimates of higher order derivatives ###### Theorem 2.6. Let $n\geq 2$, $1<\lambda<\lambda_{s}$ , here, $\lambda_{s}:=\begin{cases}\frac{n+2}{n-2},\quad if\ N>2,\\\ \infty,\quad if\ N=2,\\\ \end{cases}$ (2.15) and let $\Omega$ be an arbitrary domain in $\mathbb{R}^{N}$, $\Omega\neq\mathbb{R}^{n}$. Then for any nonnegative integer $s$, there exists $C=C(p,N,\lambda,s)>0$ (independent of $\Omega$ and $u$) such that any nonnegative smooth solution $u$ of $-\Delta u=u^{\lambda},\qquad x\in\Omega,$ (2.16) satisfies $\sum_{r=0}^{s}|\nabla^{r}u(x)|^{\frac{\lambda-1}{(\lambda-1)r+2}}\leq Cdist^{-1}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (2.17) ###### Remark 2.4. The requirements for the regularity of solution actually only need $u\in C^{s}(\Omega)$. What’s more, in fact, the requirements for the regularity of solution can be relaxed by applying the regularity theory of elliptic equation. ###### Remark 2.5. For the equation with general right hand term $f$ that satisfies corresponding asymptotic conditions, by using the same method one can obtain the estimates of higher order derivatives of the solutions. The details are omitted here. ###### Remark 2.6. Compared to the singularity and decay estimates of the solutions to elliptic equations that have been obtained in previous studies (e.g., [14]), our result presented here gives a more precise estimate for higher order derivatives of the solution to p-Laplacian equation. ## 3 Lemmas In this section , we first introduce Liouville theorem for p-harmonic function [1]. ###### Lemma 3.1. Let $u$ be a nonnegative weak solution of $\Delta_{p}u=0,\qquad x\in\mathbb{R}^{N}\qquad(n>p)$ or $\Delta_{p}u\leq 0,\qquad x\in\mathbb{R}^{N}\qquad(n\geq 2)$ then $u$ is constant. For Lane-Emden-Fowler type equation (2.2), the following Liouville type theorems have been established in [8]. ###### Lemma 3.2. Let $u\in C^{1}(\mathbb{R}^{N})$ be a stable weak solution of (2.2), $p>2$, if $\begin{cases}p-1<\lambda<\infty,\qquad\qquad ifN\leq\frac{p(p+3)}{p-1},\\\ p-1<\lambda<\Lambda_{c}(N,p),\qquad ifN>\frac{p(p+3)}{p-1},\\\ \end{cases}$ (3.1) here, $\Lambda_{c}(N,p)=\frac{[(p-1)N-p]^{2}+p^{2}(p-2)-p^{2}(p-1)N+2p^{2}\sqrt{(p-1)(N-1)}}{(N-p)[(p-1)N-p(p+3)]}.$ (3.2) then $u\equiv 0.$ ###### Lemma 3.3. Let $u\in C^{1}(\mathbb{R}^{N})$ be a weak solution of (2.2) which is stable outside of a compact set of $K$, $p>2$, if $\begin{cases}p-1<\lambda<\infty,\qquad\qquad ifN\leq p,\\\ p-1<\lambda<\frac{N(p-1)+p}{N-p},\qquad ifN>p,\\\ \end{cases}$ (3.3) then $u\equiv 0.$ Along with the above Liouville type theorems, the following "Doubling lemma" proposed in [11] also plays an important role in blow-up analysis for the proof in this paper. ###### Lemma 3.4. Let $(X,d)$ be a compact metric space and let $D\subset\Sigma\subset X$, where $D$ is non-empty and $\Sigma$ is closed. Set $\Gamma:=\Sigma\setminus D$. Let $M:D\rightarrow(0,\infty)$ be bounded on compact subset of $D$, and fix a real $k>0$. If $y\in D$ satisfies $M(y)dist(y,\Gamma)>2k,$ then there exists $x\in D$ such that $M(x)dist(x,\Gamma)>2k,\qquad M(x)\geq M(y),$ and $M(z)\leq 2M(x),\qquad\forall z\in D\cap\overline{B}(x,kM^{-1}(x)).$ In addition, we present here the following result regarding the convergence of weak stable solutions of the p-Laplacian equation, which will be used in proofs of Theorems 2.2 and 2.3 . ###### Lemma 3.5. Let $\Omega_{k}\upuparrows\mathbb{R}^{N},K$ be a compact subset in $\mathbb{R}^{N}$. Assume that $u_{k}$ are a set of weak solutions to (2.2) on $\Omega_{k}$, $k=1,2,\cdots$, respectively and that $($as $k$ large enough$)$ $u_{k}$ is stable outside of $K$. If $u_{k}\rightarrow u\qquad in\ C_{loc}^{1,\alpha}(\mathbb{R}^{N}),$ then $u$ is a weak solution of (2.2) and is stable outside of $K$. ## 4 Proofs In this section we apply the method of blow-up analysis to derive pointwise estimates. The method of blow-up is an efficient approach to deduce estimates in partial differential equations, which has been applied by many scholars in, for example, [15, 11, 16]. The corresponding Liouville type theorems ( e.g. [17, 10, 8, 15, 1, 14]) are important basis of this method. This method can be briefly described as follows: by proof of contradiction, assuming that an estimate (in terms of the distance to $\partial\Omega$) fails, we could construct an appropriate auxiliary function and use "doubling" property, then the sequence of violating solutions $u_{k}$ will be increasingly large along a sequence of points $x_{k}$, such that each $x_{k}$ has a suitable neighborhood where the relative growth of $u_{k}$ remains controlled. After appropriate rescaling, we can blow up the sequence of neighborhoods and pass to the limit to obtain a bounded solution of a limiting problem in the whole of $\mathbb{R}^{N}$ based on $L^{p}$ estimates or $C^{\alpha}$ estimates. By applying Liouville type theorems to the limiting equation we finally derive a contradiction. ### 4.1 The proof of Theorem 2.1 ###### Proof of Theorem2.1. Under the same condition with that in Theorem 2.1, we just need to prove the following estimate: $\forall\epsilon\in(0,1)$, there exists a constant $C=C(p,N)$, such that any $C^{1}$ weak solution $u$ of $\Delta_{p}u=0,\qquad x\in\Omega,$ satisfies $|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot diam^{\epsilon}(\Omega)\cdot dist^{-(1+\epsilon)}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (4.1) Assume $u\geq 0$, otherwise let $w=u+sup_{\Omega}|u|,$ then $w\geq 0$, and $\Delta_{p}w=0,\qquad x\in\Omega.$ If for $w,$ (4.1) holds, then for $u$ and $\forall x\in\Omega$ we have $\displaystyle|\nabla u(x)|$ $\displaystyle=|\nabla w(x)|\leq C\mathop{\sup_{\Omega}}|w|\cdot diam^{\epsilon}(\Omega)\cdot dist^{-1+\epsilon}(x,\partial\Omega)$ $\displaystyle\leq C\mathop{\sup_{\Omega}}|u|\cdot diam^{\epsilon}(\Omega)\cdot dist^{-(1+\epsilon)}(x,\partial\Omega).$ Moreover, we assume $\mathop{\sup_{\Omega}}|u|\cdot diam^{\epsilon}(\Omega)=1$. Otherwise, let $\widetilde{w}=\frac{u}{\mathop{\sup_{\Omega}}|u|\cdot diam^{\epsilon}(\Omega)},$ then $\mathop{\sup_{\Omega}}|\widetilde{w}|\cdot diam^{\epsilon}(\Omega)=1$, and $\Delta_{p}\widetilde{w}=0,\qquad x\in\Omega.$ If for $\widetilde{w}$, (4.1) holds, then for $u$, by $\frac{|\nabla u(x)|}{\mathop{\sup_{\Omega}}|u|\cdot diam^{\epsilon}(\Omega)}=|\nabla\widetilde{w}(x)|\leq Cdist^{-(1+\epsilon)}(x,\partial\Omega),$ we know that $|\nabla u(x)|\leq C\sup_{\Omega}|u|\cdot diam^{\epsilon}(\Omega)\cdot dist^{-1+\epsilon}(x,\partial\Omega),\qquad\forall x\in\Omega.\\\ $ (4.2) Therefore, we only need to prove that if $u$ satisfies $\Delta_{p}u=0$ on $\Omega$, and $u\geq 0,\sup_{\Omega}|u|\cdot diam(\Omega)=1$, then there holds $|\nabla u(x)|\leq C\cdot dist^{-(1+\epsilon)}(x,\partial\Omega),\qquad\forall x\in\Omega.$ (4.3) If (4.3) fails, then for $k=1,2,\cdots$, there exist sequences $\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ and $\epsilon_{k}\in(0,1)$, such that $u_{k}$ is nonnegative $C^{1}$ weak solution of $\Delta_{p}u=0$ on $\Omega_{k}$, with $\displaystyle{\sup_{\Omega_{k}}u_{k}\cdot diam^{\epsilon_{k}}(\Omega_{k})=1}$, and the function $M_{k}:=|\nabla u_{k}|^{\frac{1}{1+\epsilon_{k}}}$ satisfies $M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}).$ By Lemma 3.4, it follows that $\exists x_{k}\in\Omega_{k}$, such that $M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$ and $M_{k}(z)\leq 2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$ Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and we rescale $u_{k}$ by setting $v_{k}(y):=k^{\epsilon_{k}}\lambda_{k}^{\epsilon_{k}}\cdot u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y),\qquad\forall y:|y|\leq k.$ Note that as $|y|\leq k$, $|\frac{1}{k^{\epsilon_{k}}}\cdot\lambda_{k}y|\leq\frac{1}{k^{\epsilon_{k}}}\cdot\frac{1}{2k}dist(x_{k},\partial\Omega_{k})\cdot k^{1+\epsilon_{k}}=\frac{1}{2}dist(x_{k},\partial\Omega_{k}),$ thus $x_{k}+\frac{1}{k^{\epsilon_{k}}}\cdot\lambda_{k}y\in\Omega_{k}$. As such, $v_{k}$ is well defined. Meanwhile we have $\displaystyle|v_{k}(y)|$ $\displaystyle=k^{\epsilon_{k}}\lambda_{k}^{\epsilon_{k}}\cdot u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)$ $\displaystyle\leq k^{\epsilon_{k}}\cdot(\frac{1}{2k})^{\epsilon_{k}}\cdot dist^{\epsilon_{k}}(x_{k},\partial\Omega_{k})\cdot\sup_{\Omega_{k}}u_{k}$ $\displaystyle\leq(\frac{1}{2})^{\epsilon_{k}}\cdot\sup_{\Omega_{k}}u_{k}\cdot diam^{\epsilon_{k}}(\Omega_{k})$ $\displaystyle=(\frac{1}{2})^{\epsilon_{k}}\leq 1,$ $\displaystyle|\nabla v_{k}(y)|$ $\displaystyle=\lambda_{k}^{1+\epsilon_{k}}\cdot|\nabla u_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)|$ $\displaystyle=M_{k}(x_{k})^{-(1+\epsilon_{k})}\cdot M_{k}(x_{k}+\frac{1}{k^{\epsilon_{k}}}\lambda_{k}y)^{1+\epsilon_{k}}\leq 4,\qquad\forall y:|y|\leq k$ $\displaystyle|\nabla v_{k}(0)|$ $\displaystyle=1,$ and $\Delta_{p}v_{k}(y)=div(|\nabla v_{k}|^{p-2}\cdot\nabla v_{k})=(\lambda_{k}^{1+\epsilon_{k}})^{p-1}\cdot\Delta_{p}u_{k}=0,$ (4.4) that is, $v_{k}$ solves $\Delta_{p}v_{k}=0,\qquad x\in B_{k}(0).$ By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$ and constant $C$ (independent of $k$) such that $\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C.$ Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$, such that $v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}),$ (4.5) and at point $0$, $v$ satisfies $|\nabla v(0)|=1.$ (4.6) By (4.4) it follows that $v$ satisfies $\Delta_{p}v=0,\qquad x\in\mathbb{R}^{N}.$ By Liouville theorem (Lemma 3.1) we deduce that $v=const,\qquad x\in\mathbb{R}^{N}.$ So $|\nabla v|\equiv 0$ in $\mathbb{R}^{N}$, this contradicts with (4.6). Therefore (4.3) holds and we have proved Theorem 2.1. ∎ ###### Remark 4.1. In the above proof, we used an approximation method to get the estimate by first relaxing the inequality through introducing $\epsilon$ in (4.1) and then taking limit, which is a critical step since we found that it was hard to apply blow up analysis for the estimate (2.1) directly. ### 4.2 The proof of Theorem 2.2 ###### Proof of Lemma 3.5. $\forall\varphi\in C_{c}^{1}(\mathbb{R}^{N}\setminus K)$, let $V=supp\varphi\subset\mathbb{R}^{N}\setminus K$, $V\subset\Omega_{k}$ as $k$ large enough. We first prove that $u$ satisfies (2.3). In fact, as $k$ large enough, $\displaystyle|\int_{V}|\nabla u_{k}|^{p-2}(\nabla u_{k},\nabla\varphi)dx-\int_{V}|\nabla u|^{p-2}(\nabla u,\nabla\varphi)dx|$ $\displaystyle\leq\int_{V}(|\nabla u_{k}|-|\nabla u|)^{p-2}(\nabla u_{k},\nabla\varphi)dx+\int_{V}|\nabla u|^{p-2}(\nabla u_{k}-\nabla u,\nabla\varphi)dx\rightarrow 0,\qquad(k\rightarrow\infty).$ We next prove $L_{u_{k}}(\varphi,\varphi)\rightarrow L_{u}(\varphi,\varphi)\qquad(k\rightarrow\infty).$ (4.7) In fact, as $k$ large enough, $\displaystyle|\int_{V}|\nabla u_{k}|^{p-2}|\nabla\varphi|^{2}dx-\int_{V}|\nabla u|^{p-2}|\nabla\varphi|^{2}dx|$ $\displaystyle\leq\displaystyle\max_{V}(|\nabla u_{k}|^{p-2}|-|\nabla u|^{p-2}|)\int_{V}|\nabla\varphi|^{2}dx\rightarrow 0,\qquad(k\rightarrow\infty).$ Similarly, $\int_{V}|u_{k}|^{\lambda-1}\varphi^{2}dx\rightarrow\int_{V}|u|^{\lambda-1}\varphi^{2}dx,\qquad(k\rightarrow\infty).$ Moreover, $\displaystyle|\int_{V}|\nabla u_{k}|^{p-4}|(\nabla u_{k},\nabla\varphi)|^{2}dx-\int_{V}|\nabla u|^{p-4}|(\nabla u,\nabla\varphi)|^{2}dx|$ $\displaystyle\leq\int_{V}(|\nabla u_{k}|-|\nabla u|)^{p-4}|(\nabla u_{k},\nabla\varphi)|^{2}dx+\int_{V}|\nabla u|^{p-4}(\nabla u_{k}+\nabla u,\nabla\varphi)(\nabla u_{k}-\nabla u,\nabla\varphi)dx$ $\displaystyle\rightarrow 0\qquad(k\rightarrow\infty).$ Therefore, $L_{u_{k}}(\varphi,\varphi)\rightarrow L_{u}(\varphi,\varphi)\geq 0\qquad(k\rightarrow\infty).$ (4.8) So $u$ is a weak solution to (2.2) and is stable outside of $K$ according to the Definition 2.1. ∎ ###### Proof of Theorem 2.2. Let $\alpha=\frac{p}{\lambda+1-p}$. Assume that estimate (2.9) fails, then there exist sequences $\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ $(k=1,2,\cdots)$, such that each $u_{k}$ is a stable weak solution of (2.2) on $\Omega_{k}$ and functions $M_{k}:=|u_{k}|^{\frac{1}{\alpha}}+|\nabla u_{k}|^{\frac{1}{(\alpha+1)}},\qquad k=1,2,\cdots,$ satisfy $M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}).$ By Lemma 3.4 it follows that $\exists x_{k}\in\Omega_{k}$, such that $M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$ $M_{k}(z)\leq 2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$ Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and rescale $u_{k}$ by setting $v_{k}(y):=\lambda_{k}^{\alpha}u_{k}(x_{k}+\lambda_{k}y),\qquad\forall y:|y|\leq k.$ Note that $(p-1)(\alpha+1)+1=\lambda\alpha$. It’s easy to verify that $v_{k}$ is a stable weak solution of $-\Delta_{p}v_{k}=|v_{k}|^{\lambda-1}v_{k},\qquad y\in B_{k}(0)$ (4.9) and $[|v_{k}|^{\frac{1}{\alpha}}+|\nabla v_{k}|^{\frac{1}{(\alpha+1)}}](0)=1,\qquad\qquad$ (4.10) $[|v_{k}|^{\frac{1}{\alpha}}+|\nabla v_{k}|^{\frac{1}{(\alpha+1)}}](y)\leq 2,\qquad|y|\leq k.$ (4.11) By using $C_{loc}^{1,\beta}$ estimates of p-Laplacian equation, we know $\exists\beta\in(0,1)$ and $C$ (independent of $k$$)$ such that $\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C,\qquad\forall k=1,2,\cdots.$ By Arzela-Ascolli Theorem, it follows that there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$, such that $v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}).$ (4.12) and by (4.9) we deduce that $v$ satisfies $\Delta_{p}v=|v|^{\lambda-1}v,\qquad x\in\mathbb{R}^{N}.$ (4.13) By Lemma 3.5, $v$ is a stable weak solution of $\eqref{v22}$. By Lemma 3.2 we know that $v=0,\qquad x\in\mathbb{R}^{N}.$ But by (4.10) it follows that $[|v|^{\frac{1}{\alpha}}+|\nabla v|^{\frac{1}{(\alpha+1)}}](0)=1.$ (4.14) Contradiction is derived. As such we have proved Theorem 2.2. ∎ ###### Proof of Theorem 2.3. By applying the same procedure in proof of Theorem 2.2, it is easy to deduce the conclusion by Lemma 3.3 and Lemma 3.5. ∎ ###### Proofs of Corollary 2.4 and Corollary 2.5. Similar to the proofs of Theorem 2.2 and Theorem 2.3, the difference lies in that $M_{k}(y_{k})>2k(1+dist^{-1}(y_{k},\partial\Omega_{k}))>2kdist^{-1}(y_{k},\partial\Omega_{k}),$ and $\lambda_{k}\rightarrow 0\quad(k\rightarrow\infty).$ $v_{k}$ solves $-\Delta_{p}v_{k}(y)=f_{k}(v_{k}(y)):=\lambda_{k}^{(\alpha+1)(p-1)+1}f(\lambda_{k}^{-\alpha v_{k}(y)}),\qquad|y|\leq k.$ (4.15) By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$ and constant $C($independent of $k$$)$ such that $\parallel v_{k}\parallel_{C_{loc}^{1+\beta}}\leq C,\qquad\forall k=1,2,\cdots.$ Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$, such that $v_{k}\rightarrow v\qquad in\ C_{loc}^{1}(\mathbb{R}^{N}),$ (4.16) and by (4.15) we deduce that $v$ satisfies (4.10)-(4.11) and solves $\Delta_{p}v=l\cdot|v|^{\lambda-1}v,\qquad x\in\mathbb{R}^{N}.$ (4.17) By Liouville theorems $($Lemma 3.2 and Lemma 3.3$)$ we know $v=0,\qquad x\in\mathbb{R}^{N}.$ The contradiction is also derived. ∎ ###### Proofs of Theorem 2.6. Assume that (2.17) fails, then, there exist sequences $\Omega_{k},u_{k},y_{k}\in\Omega_{k}$ $(k=1,2,\cdots)$, such that each $u_{k}$ is a smooth solution of $-\Delta u=u^{\lambda}$ on $\Omega_{k}$, and functions $M_{k}:=\sum_{r=0}^{s}|\nabla^{r}u_{k}|^{\frac{1}{\alpha+r}},\qquad k=1,2,\cdots,$ (4.18) satisfy $M_{k}(y_{k})>2kdist^{-1}(y_{k},\partial\Omega_{k}),$ where $\alpha=\frac{2}{\lambda-1}$. By Lemma 3.4 it follows that there exists $x_{k}\in\Omega_{k}$, such that $M_{k}(x_{k})>2kdist^{-1}(x_{k},\partial\Omega_{k}),$ $M_{k}(z)\leq 2M_{k}(x_{k}),\quad\forall z:|z-x_{k}|\leq kM_{k}^{-1}(x_{k}).$ Let $\lambda_{k}:=M_{k}^{-1}(x_{k})$, and rescale $u_{k}$ by setting $v_{k}(y):=\lambda_{k}^{\alpha}u_{k}(x_{k}+\lambda_{k}y),\qquad\forall y:|y|\leq k.$ Note that as $|y|\leq k$ we have $|\lambda_{k}y|\leq\frac{1}{2k}dist(x_{k},\partial\Omega_{k})\cdot k=\frac{1}{2}dist(x_{k},\partial\Omega_{k}).$ This implies that $x_{k}+\lambda_{k}y\in\Omega_{k},$ Therefore $v_{k}$ is well defined. We further deduce that $\displaystyle-\Delta v_{k}(y)$ $\displaystyle=-\lambda_{k}^{\alpha}\cdot\Delta_{y}u_{k}(x_{k}+\lambda_{k}y)$ $\displaystyle=-\lambda_{k}^{\alpha+2}\Delta u_{k}$ $\displaystyle=\lambda_{k}^{\alpha+2}u_{k}^{\lambda}=(\lambda_{k}^{\alpha}u_{k})^{\lambda}$ $\displaystyle=v_{k}^{\lambda}(y).$ So $v_{k}$ solves $-\Delta v_{k}=v_{k}^{\lambda},\qquad y\in B_{k}(0),$ and $\displaystyle\sum_{r=0}^{s}|\nabla^{r}v_{k}(y)|^{\frac{1}{\alpha+r}}$ $\displaystyle=\sum_{r=0}^{s}|\lambda_{k}^{\alpha+r}\nabla^{r}u_{k}|^{\frac{1}{\alpha+r}}$ $\displaystyle=\lambda_{k}M_{k}(x_{k}+\lambda_{k}y)$ $\displaystyle\leq 2,\qquad\qquad\qquad|y|\leq k;$ $\sum_{r=0}^{s}|\nabla^{r}v_{k}|^{\frac{1}{\alpha+r}}(0)=\lambda_{k}M_{k}(x_{k})=1.$ (4.19) By using $C^{\alpha}$ estimates, we deduce that there exist $\beta\in(0,1)$ and constant $C$ (independent of $k$) such that $\parallel v_{k}\parallel_{C_{loc}^{s+\beta}}\leq C.$ Therefore there exist a subsequence of ${v_{k}}$, still denoted by ${v_{k}}$, such that $v_{k}\rightarrow v\qquad in\ C_{loc}^{s}(\mathbb{R}^{N}),$ (4.20) and $v$ solves $-\Delta v=v^{\lambda},\qquad x\in\mathbb{R}^{N}.$ (4.21) By Lemma 3.1 we deduce $v=const,\qquad x\in\mathbb{R}^{N}.$ This contradicts with (4.19), thus we have proved Theorem 2.6. ∎ Acknowledgements. This study was supported by grants from the National Natural Science Foundation of China (11871070), the Guangdong Basic and Applied Basic Research Foundation (2020B151502120), the Fundamental Research Funds for the Central Universities (20ykzd20). ## References * [1] J. Serrin and H. Zou. Cauchy-liouville and universal boundedness theorems for quasilinear elliptic equations and inequalities. Acta Mathematica, 189(1):79–142, 2002. * [2] G. Astarita, G. Marrucci, and D. D. Joseph. Principles of non-newtonian fluid mechanics. Journal of Applied Mechanics, 42(3), 1975. * [3] M. Mateljević and M. Vuorinen. On harmonic quasiconformal quasi-isometries. Journal of Inequalities and Applications, 2010(1):1–19, 2010. * [4] Ilkka Holopainen and Seppo Rickman. Ricci curvature, Harnack functions, and Picard type theorems for quasiregular mappings. In Analysis and topology, pages 315–326. World Sci. Publ., River Edge, NJ, 1998. * [5] Y. G. Reshetnyak. Index boundedness condition for mappings with bounded distortion. Siberian Mathematical Journal, 9(2):281–285, 1968. * [6] B. Gidas and J. Spruck. A priori bounds for positive solutions of nonlinear elliptic equations. Communications in Partial Differential Equations, 6(8):883–901, 2007. * [7] E. Dibenedetto. $c^{1,\alpha}$ local regularity of weak solutions of degenerate elliptic equations. Nonlinear Analysis, 7(8):827–850, 1983. * [8] D. Gilbarg and N. S. Trudinger. Elliptic Partial Differential Equations of Second Order. Springer, Berlin, 2001. * [9] Peter and Tolksdorf. Regularity for a more general class of quasilinear elliptic equations. Journal of Differential Equations, 1984. * [10] B. Gidas and J. Spruck. A priori bounds for positive solutions of nonlinear elliptic equations. Communications in Partial Differential Equations, 6(8):883–901, 2007. * [11] P Poláčik, P. Quittner, and P. Souplet. Singularity and decay estimates in superlinear problems via liouville-type theorems, i: Elliptic equations and systems. Duke Mathematical Journal, 139(3):555–579, 2015. * [12] Haïm Brezis and Louis Nirenberg. Positive solutions of nonlinear elliptic equations involving critical sobolev exponents. Communications on Pure and Applied Mathematics, 36(4):437–477, 1983\. * [13] Asymptotic symmetry and local behavior of semilinear elliptic equations with critical sobolev growth. Communications on Pure and Applied Mathematics, 42(3):271–297, 1989\. * [14] G. Lu, P. Wang, and J. Zhu. Liouville-type theorems and decay estimates for solutions to higher order elliptic equations. Annales De Linstitut Henri Poincare Non Linear Analysis, 29(5):653–665, 2012. * [15] Y. Y. Li and L. Zhang. Liouville-type theorems and harnack-type inequalities for semilinear elliptic equations. Journal d’Analyse Mathématique, 90(1):27–87, 2003. * [16] P. Polacik, P. Quittner, and P. Souplet. Singularity and decay estimates in superlinear problems via liouville-type theorems. part ii: Parabolic equations. Indiana University Mathematics Journal, 56(2):879–908, 2007. * [17] B. Gidas and J. Spruck. Global and local behavior of positive solutions of nonlinear elliptic equations. Communications on Pure and Applied Mathematics, 34(4), 1981.
arxiv-papers
2021-07-27T12:23:43
2024-09-04T03:07:21.416083
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Xiaoqiang Sun, Jiguang Bao", "submitter": "Xiaoqiang Sun", "url": "https://arxiv.org/abs/2107.12767" }
2107.12770
# Comparing Prophet and Deep Learning to ARIMA in Forecasting Wholesale Food Prices Lorenzo Menculini111Corresponding author: [email protected] Idea-re S.r.l., Perugia, Italy Andrea Marini Idea-re S.r.l., Perugia, Italy Massimiliano Proietti Idea-re S.r.l., Perugia, Italy Alberto Garinei Department of Engineering Sciences, Guglielmo Marconi University, Rome, Italy Idea-re S.r.l., Perugia, Italy Alessio Bozza Cancelloni Food Service S.p.A., Magione (PG), Italy Cecilia Moretti Marcello Marconi Department of Engineering Sciences, Guglielmo Marconi University, Rome, Italy Idea-re S.r.l., Perugia, Italy ###### Abstract Setting sale prices correctly is of great importance for firms, and the study and forecast of prices time series is therefore a relevant topic not only from a data science perspective but also from an economic and applicative one. In this paper we examine different techniques to forecast sale prices applied by an Italian food wholesaler, as a step towards the automation of pricing tasks usually taken care by human workforce. We consider ARIMA models and compare them to Prophet, a scalable forecasting tool by Facebook based on a generalized additive model, and to deep learning models exploiting Long Short–Term Memory (LSTM) and Convolutional Neural Networks (CNNs). ARIMA models are frequently used in econometric analyses, providing a good benchmark for the problem under study. Our results indicate that ARIMA models and LSTM neural networks perform similarly for the forecasting task under consideration, while the combination of CNNs and LSTMs attains the best overall accuracy, but requires more time to be tuned. On the contrary, Prophet is quick and easy to use, but considerably less accurate. ## 1 Introduction The main aim of firms is profit maximization. To achieve this goal, the constant updating and forecasting of selling prices is of fundamental importance for every company. Although the digital transformation is a phenomenon that is involving all companies, from small to large, many of them still update prices by hand through logics that are not always clear nor objective and transparent, but rather based on the experience and expertise of those in charge of updating the price list. On the other hand, the automation of price prediction and update can provide a strong productivity boost by freeing up human resources, which can thus be allocated to more creative and less repetitive tasks. This also increases the morale and commitment of employees; it also speeds up the achievement of goals, and improves accuracy by minimizing human errors. Subjectivity is also reduced: once the operating criteria have been established, forecast algorithms will keep behaving consistently. This in turn means an improvement in compliance. Besides the automation of price updates, the prediction of the sales prices charged to customers in the short term also holds great value. In general, organizations across all sectors of industry must undertake business capacity planning to be efficient and competitive. Predicting the prices of products is tightly connected to demand forecasting and therefore allows for a better management of warehouse stocks. The current economic crisis caused by COVID-19 has highlighted the value of such management optimization, stressing the importance of the companies’ ability to minimize inventory reserves and just- in-time production models. Forecast models considered in this paper can contribute to keeping the difference between wholesale purchase prices and company’s sales prices under control, in view of maximizing the gross operating income. They can therefore help companies avoid the risk of incalculable losses and ultimately improve their contractual capacity. The present work proposes to deal with these topics by investigating and comparing different price forecasting models. The specific task we consider is that of predicting the prices of three food products sold by a medium/large- size local wholesaler based in central Italy. In such way, we investigate the predictability of wholesale prices, comparing the performance of traditional econometrics time series forecasting models with Facebook’s Prophet and machine learning models. The main goal of this paper is therefore to develop a forecasting model that could represent a first step towards the automation of the price-setting process, thus effectively aiding the work of company employees. In this way, it aims to be of practical use to companies for the maintenance and management of price lists. Scalability and flexibility of the models presented in this paper are also an important point: for the sake of simplicity, we have applied the models to three different products, but we underline that the same models and algorithms can be easily applied to any product. Time series forecasting has always been a major topic in data science with plenty of applications. For a general review of some of the most used tools, see for example [1]. Well-known traditional econometric methods are not always appropriate to study and forecast big and noisy time series data. This has generated particular interest in machine learning methods, bolstering data driven approaches that include a wide range of methods that have the advantage of not relying on prior assumptions and knowledge on data. See for example [2, 3, 4, 5] for reviews focusing on the application of deep learning [6] to time series. Long short–term memory (LSTM) networks [7] and convolutional neural networks (CNNs) [8] are almost ubiquitous in time series forecasting with machine learning. CNNs are even more commonly used for image recognition and feature extraction. However, the forecasting accuracy of standalone CNNs can be relatively low [9]. The literature concerning economic time series prediction employing various methos – for classical to artificial intelligence ones – is very rich. Nevertheless, although we believe automatic updating mechanisms and forecasting of sale prices are of uttermost relevance, the literature on these topics is not as developed as one would expect. Most studies focus primarily on the implementation of models for the analysis and forecasting of general price levels (inflation) or commodity and stock market prices. The forecasting of food prices in China was considered by the authors of [10, 11]. In particular, Zou et al. [11] compared the performances of ARIMA, neural networks (NNs) and a combination of the two to forecast wheat prices in the Chinese market. Their findings showed that, overall, NNs perform best at the task. Neural networks were also employed in [12] to forecast monthly wholesale prices of two agricultural products. Ahumada and Cornejo [13] considered a similar problem, also taking into account possible cross-dependencies of different product prices. In [14] the author focused on sales forecasting using machine learning models, a topic similar to the one considered in the present paper. For more recent work on forecasting commodities prices see [15], where the authors forecasted gold prices, and [16] where the Levenberg- Marquardt Backpropagation (LM-BP) algorithm was applied to stock prices prediction. Other authors used machine learning methods for inflation forecasting [17, 18], also in comparison with more classical econometric models [19]. Xue et al. [20] recently presented a high-precision short-term forecasting model for financial market time series employing deep LSTM neural networks, comparing them with other NN models. Their results showed that LSTM deep neural networks have high forecasting accuracy for stock market time series. In 2020, Kamalov [21] evaluated multilayer perceptrons, CNNs and LSTM neural networks to forecast significant changes in stock prices for four major US public companies, showing that these three methods yield better results when compared to similar studies that forecast the direction of price change. For models similar to the ones considered in this work and applied again to stock indexes forecasting, see [22]. Hybrid ARIMA/neural network models where instead studied by the authors of [23]. Stock prices have also been forecasted using LSTMs in conjunction with the attention mechanism [24]. Machine learning models using LSTMs and CNNs are of widespread use in time series forecasting, well beyond the financial and economic realm. For recent work on time series forecasting using machine learning outside the economic and financial area see [25], an application to COVID-19 spreading forecasting, and [26] for an application of deep learning to Influenza prevalence forecasting. In this paper we compare the performance of standard Autoregressive Integrated Moving Average (ARIMA) models [27], which we take as a benchmark, to Prophet – a forecasting tool developed by Facebook and based on a Generative Additive Model (GAM) [28] – and machine learning models exploiting LSTMs, both on their own and in combination with CNNs. ARIMA univariate models are considered a standard reference model in econometrics. The compared models are rather different, as are the datasets that they accept in input, making the comparison interesting. On one hand, Prophet’s driving principles are simplicity and scalability; it is specifically tailored for business forecasting problems and handles missing data very well by construction. On the other, the NN models we construct allow for a multivariate regression, fully exploiting all the collected data, but also require some data pre- processing, as does ARIMA. Prophet has been compared to ARIMA models for the prediction of stock prices [29] and bitcoin [30]. Our results indicate that the combination of CNNs and LSTMs yields the most accurate results for all the three products, but require the longest and computationally more expensive tuning. On the contrary, Prophet performances were not brilliant, but model tuning and data preparation were particularly quick. ARIMA and LSTM-only neural networks showed good performances both in terms of accuracy and time required for model selection and training. The rest of the paper proceeds as follows. Section 2 introduces the dataset features, discussing its properties and some pre-processing steps that were taken on it; it also briefly presents the three models under consideration, their set-up and tuning. In Section 3 we give the results obtained with the three approaches and compare them. We conclude in Section 4 by discussing the results of this study and providing an outlook on future perspectives in the light of the paper findings. ## 2 Materials and Methods ### 2.1 Dataset description and preparation For this study we had access to a dataset comprising a total of approximately 260,000 food order records, reporting the following information: _date of order_ , _order number_ , _unit price_ , _article code_ , _sold quantity_ , _customer code_ , _offer_ (if present) and _offer type_ , _unitary cost_. The records were collected by the wholesaler in a period ranging from year 2013 to 2021. For the study conducted in this paper, we decided to focus on the three products with the most records, namely _Carnaroli rice 1kg $\times$ 10_ (henceforth product 1), _Gorgonzola cheese 1/8 of wheel 1.5 kg_ (product 2) and _Cured aged ham 6.5 kg_ (product 3). The forecasting task considered in this work was to predict the average selling price for the following week, for each of the selected products. As a first thing, we chose to leave out all data following the outbreak of the COVID-19 pandemic. This was motivated by the huge impact that the lockdowns and restrictions imposed by the authorities had on the food and catering sector, introducing a major shock in sales trends at all scales. Therefore, we excluded all records dated later than March 9, 2020 (last day before the first national lockdown in Italy). A preliminary data analysis revealed that the dataset contained a good number of outliers: for some of them, it appeared evident that this was due to incorrect typing of the product sale price. To improve the quality of the dataset, we calculated the _z-score_ of each record based on its price as $z=(p-\bar{p}^{(w)})/\sigma^{(w)}\,,$ where $p$ is the unit sale price and $\bar{p}^{(w)}$ and $\sigma^{(w)}$ are the mean and standard deviation for the selected product, weighted by the quantity sold in each order. Then, we filtered out all records with $|z|>4$. Figure 1 shows the price distribution for product 2, after the filtering. Figure 1: Price distribution (after _z-score_ filtering) for product 2: to the left, boxplot, and to the right, violin plot. In view of the subsequent time series forecasting and as a further step in dealing with data inaccuracies, we decided to resample the dataset with weekly frequency. This was done by cumulating the number of orders in each window and calculating the average sale price for each week. For later use in neural network models, when resampling data we also kept track of the following fields in the dataset: _number served customers_ , _number of orders_ , _number of orders on sale_ , (weighted) _average product cost_ , and (weighted) _price standard deviation_. Table 1 summarizes the main features of the resampled price time series for each of the products. In Figures 2, 3 and 4 we display the time series of sale prices and sold quantities after resampling. All prices, here and everywhere in the paper, are intended in euros (€). Table 1: Mean and standard deviation of the weekly prices time series. Product | 1 | 2 | 3 ---|---|---|--- Mean (€) | 1.99 | 7.64 | 7.27 Std (€) | 0.36 | 0.40 | 0.26 Figure 2: (a) Unit price and (b) sold quantity time series for product 1 after resampling with weekly frequency. Figure 3: (a) Unit price and (b) sold quantity time series for product 2 after resampling with weekly frequency. Figure 4: (a) Unit price and (b) sold quantity time series for product 3 after resampling with weekly frequency. We then split the weekly dataset in the following way: * • _Training dataset_ : years 2013–2017, * • _Validation dataset_ : year 2018, * • _Test dataset_ : years 2019–March 2020 This choice was made in order to make the training set as large as possible, while also having validation and test sets that cover at least one year of data. As can be seen in Figures 2, 3 and 4, even after resampling the price time series have missing periods. Therefore, they are not suited for being given as input to ARIMA and neural network forecasting models, as they require evenly spaced data. To overcome this problem, we adopt the following strategy for all products: 1. 1. Since the time series for all products have a long window with no data in the second half of year 2013, we do not consider this empty period and start right after it; 2. 2. When occasional weeks with no data occur, we take the average of the preceding and following week prices and interpolate. In this way we were able to fill in all empty weeks – in fact, after resampling the missing records were very sparse. Note that the above procedure is only necessary for preparing the dataset for ARIMA and NN models, as Prophet has no problems in handling missing datapoints. The size of the datasets for each product, both before and after removal of empty periods, is summarized in Table 2. Table 2: Dataset size (# of datapoints) for each product and forecasting model. Product | Model | Train | Valid | Test ---|---|---|---|--- 1 | Prophet | 240 | 52 | 62 ARIMA & NN | 211 2 | Prophet | 241 | 52 | 62 ARIMA & NN | 211 3 | Prophet | 242 | 52 | 62 ARIMA & NN | 212 ### 2.2 ARIMA models ARIMA models [27] are among the most simple and used econometric approaches to univariate time series modeling. In this work, we implemented non-seasonal ARIMA models, neglecting the modulation effects of holidays and using therefore pure trend lines. In econometrics, it is quite customary when dealing with price variables to transform prices through a logarithmic map, since this generally leads to better results. We decided to follow this approach when using the ARIMA modelling, thus working with $\log(p_{t})$ in the model fitting. As a first step we checked the stationarity properties of the time series. We performed the _Augmented Dikey-Fuller_ unit root test using the built-in method in the _statsmodels_ Python package. The results we obtained are qualitatively similar for all the three products we considered: for the $\log(p_{t})$ time series one cannot reject the null hypothesis of the presence of a unit root, signalling the non-stationarity of the series. First differencing the series, i.e. considering $\Delta\log(p_{t})=\log(p_{t})-\log(p_{t-1})$, makes it stationary. Thus the $\log(p_{t})$ series are integrated of order one, and accordingly the models we considered are ARIMA$(p,1,q)$. In order to have a rough indication on the AR orders, $p$’s, and on the MA orders, $q$’s, we computed the sample autocorrelation function (ACF) and the partial autocorrelation function (PACF) for $\Delta\log(p_{t})$. Recall that * • for an exact MA($q$), ACF is zero for lags larger than $q$; * • for an exact AR($p$), PACF is zero for lags larger than $p$. As an example we show the plots of these functions for product 2 in Figure 5. Figure 5: Autocorrelation function and partial autocorrelation function for $\Delta\log(p_{t})$ of product 2. In the ARIMA model selection and fitting procedures, we used a different dataset splitting scheme with respect to the one described above, in that the _training_ set comprised years 2013–2018 (i.e. the union of the former training and validation sets). This is since we decided not to use the validation set to selected the hyperparameters $p$ and $q$, instead exploiting the _Bayesian Information Criterion_ (BIC) as a metric for model comparison [31]. Hence we took into account different combinations of $p$ and $q$ around the values suggested by the ACF and PACF plots, and eventually we selected the model with least BIC. ### 2.3 Prophet Prophet is an open-source tool provided by Facebook Inc., available both in Python and R. For the current analysis, the Python package (with Python 3.9) was used. As explained by the authors [32], the idea leading to Prophet was to develop a flexible forecasting tool which is easy to both use and tune. The underlying model features a decomposable time series with three components: growth (or trend) $g(t)$, seasonality $s(t)$ and holidays $h(t)$ (if present). In the present case, there are no obvious holidays to consider, as the wholesaler’s customers are mainly restaurants and hotels, which tend to stay open during holidays. The time series is therefore decomoposed as $y(t)=g(t)+s(t)+\epsilon_{t}\,,$ (1) where $\epsilon_{t}$ encodes variations that are not taken into account by the model, and which are assumed to be normally distributed [32]. The Prophet model can be seen as a GAM [28]. In this framework, forecasting is phrased as a curve-fitting task, with time as the only regressor, so the model is univariate. The trend function adopted for the problem under study is a piecewise linear function written as $g(t)=\big{(}k+\sum_{i:t>s_{i}}\delta_{i}\big{)}t+\big{(}m+\sum_{j:t>s_{j}}\gamma_{j}\big{)}\,,$ (2) where $k$ is a scalar coefficient, $s_{i}$ are the _trend changepoints_ – _i.e._ $S$ times $s_{1}$, $s_{2}$, … , $s_{S}$ at which the angular coefficient of the trend is allowed to change – $\delta_{i}$ are the rate adjustements, and $\gamma_{j}=-s_{j}\delta_{j}$ are parameters used to make the function continuous. The algorithm starts with a number $S=25$ of potential changepoints, placed in the first $80\%$ of the time series in order to avoid responding to fluctuations in the last part of the series. Then, the actual changepoints are selected by putting a sparse prior of the kind $\delta_{j}\sim\text{Laplace}(0,\tau)$, with $\tau$ (tunable hyperparameter) regulating222Using a Laplace prior is equivalent to L1-regularization. the magnitudes rate adjustments. A larger $\tau$ means the model has more power to fit trend changes. As for seasonality, Prophet accounts for it using Fourier series, namely $s(t)=\sum_{n=1}^{N}\left(a_{n}\cos\left(\frac{2\pi nt}{P}\right)+b_{n}\sin\left(\frac{2\pi nt}{P}\right)\right)\,.$ (3) Since we considered weekly data with no other obvious expected seasonality effects but yearly ones, we had $P=365.25\text{d}$. For weekly seasonality, the truncation parameter is set to $N=10$ by the authors of [32] when modelling yearly seasonality, and we follow this specification. When performing the fit, a smoothing prior $\beta\sim N(0,\sigma^{2})$ is imposed on the $2N$ components $\beta=(a_{1},\ldots,a_{n},b_{1},\ldots,b_{n})^{T}$, with $\sigma$ a second hyperparameter (essentially acting as an L2-regularization parameter). Prophet fits its GAM using the L-BFGS quasi-Newton optimization method of [33] in a Bayesian setting, finding a maximum _a posteriori_ estimate. ### 2.4 Neural Networks The advent of artificial intelligence, in particular machine learning, has led to the development of a set of techniques that have proved to be very useful in many different areas. One breakthrough has certainly been deep learning [6], which has revolutionized our way of handling and exploiting information contained in data. Deep learning can effectively detect and model hidden complexity in data, automatically extracting features that should otherwise be extracted manually by dataset inspection. A standard choice when facing problems involving time series is that of using LSTM neural networks, a kind of recurrent neural networks (RNNs) devised by Hochreiter and Schmidhuber in 1997 [7]. Like all RNNs, they can by construction handle data endowed with temporal structure, while also providing a way to deal with the vanishing gradient problem [34]. Here we will describe the application of LSTM NNs to the problem under study, both on their own and in combination with CNNs. Indeed, standard LSTM NNs for time series forecasting can be enriched with one-dimensional convolutional layers that sequentially apply a unidimensional filter to the time series. Convolutions can be seen as non-linear transformations on the time series data. This enhances the model’s capability to learn discriminative features which are useful for the forecasting and that can be fed to the LSTM layers that follow. The models developed in this work were trained and tested using Python 3.9 and TensorFlow 2.5. Unlike in the ARIMA and Prophet case, with NNs we can exploit a larger fraction of the information available in the dataset by setting up a multivariate regression. However, since dates cannot be used as input variables to a NN, we made an addition to the fields listed in Section 2.1, performing a time embedding to provide information about seasonality. We did this by adding the columns week_cos $\displaystyle=\cos(2\pi w/52.1429)\,,$ (4a) week_sin $\displaystyle=\sin(2\pi w/52.1429)\,,$ (4b) where $w$ is the week number ($w=0,1,\ldots,52$). Therefore, we had a total of 9 input columns that were passed to the NN models. A sample of the input dataset for one product is shown in Table 3. Table 3: A slice of the dataset used to generate input data for the NN models. quantity | customers | orders | on sale | cost | week_cos | week_sin | p_std | avg_price ---|---|---|---|---|---|---|---|--- 10 | 1 | 1 | 0 | 1.40 | 0.990 | -0.141 | 0 | 1.41 0 | 0 | 0 | 0 | 1.40 | 1.000 | -0.0214 | 0 | 1.55 70 | 6 | 6 | 0 | 1.40 | 0.993 | 0.120 | 0.0690 | 1.69 220 | 17 | 18 | 0 | 1.40 | 0.971 | 0.239 | 0.0580 | 1.75 230 | 14 | 15 | 0 | 1.39 | 0.935 | 0.353 | 0.0685 | 1.86 To construct the actual training dataset (made of a tensor $\bf{x}_{t}$ and a scalar $y_{t}$, for each time $t$) that could be fed to LSTM neural networks, we then performed the following steps: * • reshape data so that at each time $t$, $\bf{x}_{t}$ is a $n\times 9$ tensor containing the $n$ last values of each time series in Table 3; * • set $y_{t}=\Delta_{t+1}=p_{t+1}-p_{t}$ as the variable to be used in the cost function. In this way, the model learns to predict $y$ (price variation) at each time based on information about the last $n$ timesteps. Predicting the increment of the quantity of interest instead of the quantity itself is a well-known way to improve performance when training multivariate machine learning models. Moreover, we checked through the _Augmented Dikey-Fuller_ test that the $\Delta_{t}$ time series was stationary. The number $n$ of timesteps used depends on the model and will be specified later. The NN models tried in this paper for predicting product prices fall in two classes: those using only LSTM layers and those with CNN layers before the LSTM. We denoted these classes A and B, respectively. ## 3 Results In this section we report results obtained with the three different approaches to forecasting – namely ARIMA, Prophet and deep learning – studied in this work. ### 3.1 ARIMA results We considered first ARIMA models, to provide a standard performance benchmark with which to compare the other models developed in the rest of this work. The best ARIMA models for the three products are given in Table 4. As outlined in Section 2.2, they were selected by considering the series of the price logarithms $\log(p_{t})$ and using a least BIC criterion [31]. For the sake of comparison with the other models, we transformed back the $\log(p_{t})$ series to the $p_{t}$ series to compute the root mean squared error (RMSE) between the predicted and observed increments $\hat{\Delta}(t)=\hat{p}_{t}-p_{t-1}\,,\qquad\Delta(t)=p_{t}-p_{t-1}\,,$ (5) $\hat{p}_{t}$ being the predicted price at time $t$. Table 4: Selected ARIMA models for the three products and associated RMSE on the entire training+validation set. Product | selected model | (tr+v)RMSE ---|---|--- 1 | ARIMA(2,1,0) | 0.097 2 | ARIMA(0,1,2) | 0.232 3 | ARIMA(3,1,1) | 0.211 In all cases, we checked also that the Ljung-Box statistics [35, 36] for 1-,6- and 12-lag residual autocorrelations do not reject the null hypothesis, so the residuals can be considered approximately white noise. The results obtained on the test set by the selected ARIMA models are summarized in Table 5. We also report values for the MAE (mean absolute error) and MAPE (mean absolute percent error). Table 5: Performance of the best ARIMA models on the test set. The MAPE is computed for price time series $p_{t}$, not for the $\Delta(t)$ time series. ARIMA results --- Product | 1 | 2 | 3 RMSE | 0.0758 | 0.173 | 0.215 MAE | 0.0581 | 0.132 | 0.159 MAPE | 0.0348 | 0.0178 | 0.0222 ### 3.2 Prophet results #### 3.2.1 Prophet grid search As suggested in the Prophet documentation and reviewed in Section 2.3, one can tune the $\tau$ (trend changepoints prior scale) and $\sigma$ (seasonality prior scale) hyperparameters so that the model fits data as well as possible. We did so by performing a grid search over $\tau$ and $\sigma$ in the following way: for each combination of $\tau\in\\{0.005,0.01,0.05,0.1,0.5\\}$ and $\sigma\in\\{0.01,0.05,0.1,0.5,1,2\\}$, we started by fitting the model over the training dataset, and predicted the price for the following week (first datapoint in the validation set). We calculated the squared error between predicted and observed price. Then, we moved on to the second datapoint in the validation set, performed a new fit using also the first validation set datapoint, and predicted the price for the following week. The whole process was repeated until the validation dataset was exhausted. For each product, the configuration with least RMSE was selected, yielding the results shown in Table 6. Table 6: Prophet grid search results. vRMSE indicates the RMSE on the validation set, calculated as described in the main text. Product | $\tau$ | $\sigma$ | vRMSE ---|---|---|--- 1 | 0.5 | 0.01 | 0.0831 2 | 0.1 | 0.01 | 0.293 3 | 0.5 | 1.0 | 0.215 #### 3.2.2 Prophet forecasting After selecting the best values of the parameters for each product, we employed them to specify the Prophet model in the test phase. Testing took place in the following way: we started by fitting the model over the entire training plus validation dataset, predicting the first data entry in the test dataset and calculating the squared error. We repeated the procedure for all entries in the test dataset, each time using all previous history, and calculated the achieved RMSE at the end of the process. Note that by employing this procedure, also the test dataset is progressively used to fit the model. We plot in Figure 6 the result of the fit over the entire dataset for product 1, i.e. the function that would be used to predict the unit price for the first week following the end of the test dataset. Figure 6: Prophet fit over the entire product 1 dataset. The actual fit is shown in light blue, while trend changepoints are shown in red. Figure 7 shows instead the plot of the predicted and observed increments – $\hat{\Delta}(t)$ and $\Delta(t)$ as defined in Eq. 5 – in the case of product 2. The performance of Prophet in forecasting the weekly price time series is summarized in Table 7. As done for ARIMA models, besides the RMSE parameter used in the fine tuning, we also report values for the MAE and MAPE. Figure 7: Comparison of Prophet forecasts and observed data for price variations in the test set, for product 2. The corresponding RMSE is 0.220. Table 7: Performance of the tuned Prophet models on the test dataset. Prophet results --- Product | 1 | 2 | 3 RMSE | 0.0812 | 0.220 | 0.350 MAE | 0.0694 | 0.165 | 0.301 MAPE | 0.0414 | 0.0224 | 0.0424 ### 3.3 Neural Networks results #### 3.3.1 NN grid search As a third forecasting tool, we studied deep neural networks. Two different classes of models – class A and B as introduced in Section 2.4 – were analyzed. We performed two different grid searches to select the best model in each class, as we now briefly describe. The common features between the classes were: the usage of an MSE cost function and of the _Adam_ optimization algorithm [37], with learning rate (or _stepsize_) $\alpha\in\\{0.0005,0.001\\}$; the adoption of an early stopping procedure, monitoring the cost function on the validation set with a patience of 5 epochs, while also setting an upper bound of 150 training epochs. Finally, data were standardized using a _z-score_ normalization333Specifically, the _MinMaxScaler_ function of the _scikit-learn_ Python package was employed., and we used a batch size of 32. For class A, we trained NN models with the following architecture and hyperparameters: a number $l\in\\{1,2,3\\}$ of LSTM layers with $n_{u}\in\\{32,64,96\\}$ neurons each and _normal Glorot_ weight initialization [38]. Each LSTM layer was followed by a dropout layer, with dropout rate $r\in\\{0.1,0.2,0.3\\}$. The output layer consisted of a single neuron with linear activation function, again with normal Glorot initialization. For this class of models, we used a number of timesteps $n=4$. The grid search over the hyperparameters $l$, $n_{u}$, $r$, $\alpha$ was performed by initializing and training each model ten times, monitoring the cost function on the validation set and recording the best result obtained for every configuration. The best performing models for each product are reported in Table 8. Table 8: Results of the grid search on class A (LSTM only). trRMSE and vRMSE are the RMSEs computed on the training and validation sets, respectively. Product | $l$ | $n_{u}$ | $r$ | $\alpha$ | trRMSE | vRMSE ---|---|---|---|---|---|--- 1 | 3 | 32 | 0.1 | 0.001 | 0.0964 | 0.0612 2 | 3 | 64 | 0.3 | 0.001 | 0.163 | 0.173 3 | 1 | 96 | 0.1 | 0.0005 | 0.156 | 0.142 The second class of models, class B, consisted in a combination of CNN layers and LSTM layers, as done for example in [15] and [22]. We added two one- dimensional convolutional layers, with a pooling layer in between. Each of the convolutional layers had $f\in\\{10,20,30\\}$ _output filters_ , _kernel size_ $k_{s}\in\\{2,4\\}$ and _relu_ (rectified linear unit) activation function. Moreover, we tried to use _same_ , _causal_ or no padding in each of the conv1D layers: we dub the corresponding hyperparameters pad1, pad2. The 1D _average pooling_ layer had _pool size_ equal to 2 and no padding. This block was then followed by the same LSTM layers as for the first class of models. The reason behind adding CNN layers is that they can help make better use of the data history, improving the ability of LSTM networks to learn from long series of past data. The grid search was indeed performed with varying numbers of timesteps $n\in{4,8,12}$. As for the previous class, each model was initialized and trained twice. Results for the grid search over the hyperparameters $l$, $n_{u}$, $r$, $\alpha,f,k_{s},n$ are shown in Table 9. Figure 8 shows the trajectory of training and validation cost functions for the best-performing model in the case of product 1. Table 9: Results of the grid search on class B (CNN + LSTM). trRMSE and vRMSE are the RMSEs computed on the training and validation sets, respectively. Product | $l$ | $n_{u}$ | $r$ | $\alpha$ | $f$ | $k_{s}$ | pad1 | pad2 | $n$ | trRMSE | vRMSE ---|---|---|---|---|---|---|---|---|---|---|--- 1 | 1 | 64 | 0.3 | 0.0005 | 20 | 2 | causal | causal | 8 | 0.0770 | 0.0553 2 | 3 | 64 | 0.1 | 0.0005 | 20 | 2 | no | same | 12 | 0.175 | 0.165 3 | 1 | 32 | 0.2 | 0.001 | 20 | 2 | same | same | 8 | 0.148 | 0.132 Figure 8: Trajectory of training and validation losses, as a function of the training epoch, for product 1. Note that the cost functions are calculated on rescaled data, therefore they cannot be directly compared to the values appearing on the first line of Table 9. ### 3.4 NN forecasting We then used the models specified by the hyperparameter choices in Tables 8 and 9 to forecast price variations on the test set. We proceeded by training the each selected model on the entire training _and_ validation set, for a number of epochs corresponding to the epoch at which the training had stopped during the grid search. Table 10 reports the test set performances of NN models obtained in this way. Although they played no role in model training and validation, here we also report the values of the MAE and MAPE metrics obtained on the test set. We already observe that class B models always outperform class A models in forecasting prices for all the three products. Figure 9 displays the forecasts made by the best NN model and compares it to the actual price variations, in the case of product 3. Table 10: Performance of the fine-tuned NN models on the test dataset. NN results --- Product | 1 | 2 | 3 class | A | B | A | B | A | B RMSE | 0.0617 | 0.0613 | 0.179 | 0.162 | 0.219 | 0.200 MAE | 0.0498 | 0.0511 | 0.135 | 0.126 | 0.157 | 0.150 MAPE | 0.0299 | 0.0305 | 0.0181 | 0.0168 | 0.0221 | 0.0212 Figure 9: Comparison of NN forecasts and observed data for price variations in the test set, for product 3. The corresponding RMSE is 0.200. ### 3.5 Result comparison We can now compare the results obtained with the various models that have been tried. The comparison can be made by looking at Tables 5, 7 and 10 We begin by noting that Prophet performances are considerably poorer than the ARIMA benchmark and neural networks. On one hand, this could be expected as Prophet is based on a model with relatively low complexity that prioritizes ease of use and of tuning. On the other, as mentioned in Section 3.2.2, Prophet was progressively fitted also on the test set, effectively using more data than the other models for the fit, so its performances have arguably benefited from that. Nevertheless, one point that needs to be stressed is that we were able to provide Prophet with the entire weekly price time series comprising all of 2013 data, with no need for particular data pre-processing. Therefore, although Prophet’s performances were not brilliant for the problem studied in this paper, it could still be useful in certain contexts where quick, preliminary forecasts are needed. Turning to the other models, we observe that those featuring both CNN and LSTM layers (class B) yielded the most accurate forecasts for all the three products. At the same time, tuning them required by far the longest time (approximately 20 hrs for each product using a NVIDIA RTX 3060 graphic card) with moderate improvement on purely LSTM (class A) models: considering the RMSE metric, the improvement amounts to about 9% for both product 2 and 3, while for product 1 the two classes yield similar results (class B has lower RMSE but higher MAE and MAPE). On the other hand, class A models required a considerably lower computational effort (of the order of 30 minutes to select the model hyperparameters for each product). Notice that once the grid search was concluded, training the best model on the entire training plus validation dataset required only a few minutes, both for class A and B models. ARIMA models performed well if we take into account both the achieved values of the metrics and time necessary for tuning. They were less accurate than class B models, yielding RMSEs that were 23% higher RMSE for product 1, 7% higher for product 2, and 8% higher for product 3444Similar considerations apply if we instead look at MAE and MAPE metrics.. However, they required about the same tuning time as class A models, and performed better for product 2 and 3: the RMSE obtained by ARIMA models was 23% higher for product 1, but 2% lower for products 2 and 3. We remark that ARIMA is univariate, while a multivariate input dataset was used to train and test deep learning models: this highlights the effectiveness of the ARIMA approach for the problem under study, while at the same time suggesting that the additional data fields used to perform the multivariate analysis were not so informative for price prediction. We add that machine learning models were tuned over a larger parameter space than the others: the search grids were made of 54 and 8978555Factoring out the three different choices of the timesteps number $n$, which are not really part of the NN models but refer to the way data is prepared, we are left with 2916 configurations for class B models. hyperparameter configurations for class A and class B NN models respectively, versus a maximum of 5 ARIMA configurations and the 25 of Prophet. Another important aspect to consider in comparing the models is that dataset size strongly affects the performance of machine learning models. To this regard, we note that the sizes of the datasets were not very large (just over 200 for each product, as seen in Table 2), hence one could expect especially the NN models performance to further improve when more historical data is made available. ## 4 Discussion In this paper, we have discussed the application of different methods to the forecast of wholesale prices. We put a standard econometric model (ARIMA) side by side with two different approaches to time series forecasting. These were rather diverse both in kind and complexity, going from a simple additive model using a piecewise linear trend and Fourier series seasonality (Prophet) to deep learning models featuring both convolutional and LSTM layers. The findings showed that while Prophet was quick to set-up and tune, requiring no data pre-processing, it was not able to come close to the performance of the other, well-established time-series forecasting models. Instead, we found that the best deep learning models performed better than ARIMA, but also required much longer times for the hyperparameter tuning. The work done in this paper can be extended in many directions. First, it would be interesting to carry out a similar analysis also for the forecasting of sales, and to consider data with daily frequency instead of weekly. Sales forecasting with higher frequency can indeed be relevant for wholesalers and retailers. Second, a more refined version of the study would distinguish between different customers, as the selling strategies adopted by the wholesaler do certainly differ when dealing with customers of various kinds and sizes. Customer profiling is an extremely interesting and active avenue of applied research, which can clearly enhance companies’ returns. Therefore, in the near future we plan to carry on the analysis by combining customer classification algorithms with time-series forecasting: understanding how and when each customer buys, how specific products are treated differently by different customers (identifying _complementary_ and _substitute_ goods for each of them), as well as relating the price elasticity of demand for different product/customers, are all aspects that could lead to economic benefits for the wholesaler. To this end, one would want to compare further machine learning models to dynamic panel data where prices for each product and customer and price demand elasticity are considered. The approach could lead to an essential gain in the accuracy of the forecast, and would be an important contribution to sales prediction analysis, which is becoming an increasingly important part of modern business intelligence [39, 40]. Another aspect of sure relevance would be to evaluate algorithms and models on data including the effects of the COVID-19 outbreak, to both learn how the market has transformed and help modifying selling strategies in adapting to the current rapidly changing situation. The limits encountered in the application of the forecasting tools examined in this work encourage the evaluation of further models that could bring together the advantages of each approach. Finally, it would be relevant to apply one of the most exciting recent advances in machine learning, namely the attention mechanism [41], to the forecasting task we have considered. Work on this particular topic is definitely attractive and recently made its appearance in this field [42]. ##### Note: The paper is an output of the project “Cancelloni Big Data Analytics (BDA)” at Cancelloni Food Service S.p.A. Data used in this work are property of Cancelloni Food Service S.p.A. and cannot be disclosed. ## References * [1] Ratnadip Adhikari and R.. Agrawal “An Introductory Study on Time Series Modeling and Forecasting” In _CoRR_ abs/1302.6613, 2013 arXiv: http://arxiv.org/abs/1302.6613 * [2] Hassan Ismail Fawaz et al. “Deep learning for time series classification: a review” In _Data mining and knowledge discovery_ 33.4 Springer, 2019, pp. 917–963 DOI: https://doi.org/10.1007/s10618-019-00619-1 * [3] Omer Berat Sezer, Mehmet Ugur Gudelek and Ahmet Murat Ozbayoglu “Financial time series forecasting with deep learning : A systematic literature review: 2005–2019” In _Applied Soft Computing_ 90, 2020, pp. 106181 DOI: https://doi.org/10.1016/j.asoc.2020.106181 * [4] Bryan Lim and Stefan Zohren “Time-series forecasting with deep learning: a survey” In _Philosophical Transactions of the Royal Society A_ 379.2194 The Royal Society Publishing, 2021, pp. 20200209 DOI: http://doi.org/10.1098/rsta.2020.0209 * [5] Pedro Lara-Benítez, Manuel Carranza-García and José C Riquelme “An Experimental Review on Deep Learning Architectures for Time Series Forecasting” In _International Journal of Neural Systems_ 31.03 World Scientific, 2021, pp. 2130001 DOI: https://doi.org/10.1142/S0129065721300011 * [6] Yann LeCun, Yoshua Bengio and Geoffrey Hinton “Deep learning” In _Nature_ 521.7553 Nature Publishing Group, 2015, pp. 436–444 DOI: https://doi.org/10.1038/nature14539 * [7] Sepp Hochreiter and Jürgen Schmidhuber “Long Short-Term Memory” In _Neural Computation_ 9.8, 1997, pp. 1735–1780 DOI: 10.1162/neco.1997.9.8.1735 * [8] Yann LeCun and Yoshua Bengio “Convolutional networks for images, speech, and time series” In _The handbook of brain theory and neural networks_ 3361.10, 1995 * [9] Emir Alibašić, Boris Fažo and Ivica Petrović “A new approach to calculating electrical energy losses on power lines with a new improved three-mode method” In _Tehnički vjesnik_ 26.2 Strojarski fakultet u Slavonskom Brodu; Fakultet elektrotehnike, računarstva …, 2019, pp. 405–411 * [10] Zou Haofei, Xia Guoping, Yang Fangting and Yang Han “A neural network model based on the multi-stage optimization approach for short-term food price forecasting in China” In _Expert Systems with Applications_ 33.2 Elsevier, 2007, pp. 347–356 DOI: https://doi.org/10.1016/j.eswa.2006.05.021 * [11] HF Zou, GP Xia, FT Yang and HY Wang “An investigation and comparison of artificial neural network and time series models for Chinese food grain price forecasting” In _Neurocomputing_ 70.16-18 Elsevier, 2007, pp. 2913–2923 DOI: https://doi.org/10.1016/j.neucom.2007.01.009 * [12] Girish K Jha and Kanchan Sinha “Agricultural price forecasting using neural network model: An innovative information delivery system” In _Agricultural Economics Research Review_ 26.347-2016-17087, 2013, pp. 229–239 DOI: 10.22004/ag.econ.162150 * [13] Hildegart Ahumada and Magdalena Cornejo “Forecasting food prices: The case of corn, soybeans and wheat” In _International Journal of Forecasting_ 32.3 Elsevier, 2016, pp. 838–848 DOI: https://doi.org/10.1016/j.ijforecast.2016.01.002 * [14] Bohdan M. Pavlyshenko “Machine-Learning Models for Sales Time Series Forecasting” In _Data_ 4.1, 2019 DOI: 10.3390/data4010015 * [15] Ioannis E Livieris, Emmanuel Pintelas and Panagiotis Pintelas “A CNN–LSTM model for gold price time-series forecasting” In _Neural computing and applications_ 32.23 Springer, 2020, pp. 17351–17360 DOI: https://doi.org/10.1007/s00521-020-04867-x * [16] Li Zhang et al. “Prediction of stock prices based on LM-BP neural network and the estimation of overfitting point by RDCI” In _Neural Computing and Applications_ 30.5 Springer, 2018, pp. 1425–1444 DOI: 10.1007/s00521-017-3296-x * [17] Gour Sundar Mitra Thakur, Rupak Bhattacharyya and Seema Sarkar Mondal “Artificial Neural Network Based Model for Forecasting of Inflation in India” In _Fuzzy Information and Engineering_ 8.1, 2016, pp. 87–100 DOI: https://doi.org/10.1016/j.fiae.2016.03.005 * [18] Livia Paranhos “Predicting Inflation with Neural Networks”, 2021 arXiv:2104.03757 [econ.EM] * [19] Gustavo Silva Araujo and Wagner Piazza Gaglianone “Machine learning methods for inflation forecasting in Brazil: new contenders versus classical models”, 2020 * [20] Xue Yan, Wang Weihan and Miao Chang “Research on financial assets transaction prediction model based on LSTM neural network” In _Neural Computing and Applications_ 33.1 Springer, 2021, pp. 257–270 DOI: 10.1007/s00521-020-04992-7 * [21] Firuz Kamalov “Forecasting significant stock price changes using neural networks” In _Neural Computing and Applications_ 32.23 Springer, 2020, pp. 17655–17667 DOI: 10.1007/s00521-020-04942-3 * [22] Yaping Hao and Qiang Gao “Predicting the trend of stock market index using the hybrid neural network based on multiple time scale feature learning” In _Applied Sciences_ 10.11 Multidisciplinary Digital Publishing Institute, 2020, pp. 3961 DOI: https://doi.org/10.3390/app10113961 * [23] Yi Xiao, Jin Xiao and Shouyang Wang “A hybrid model for time series forecasting” In _Human Systems Management_ 31.2 IOS Press, 2012, pp. 133–143 * [24] Jiayu Qiu, Bin Wang and Changjun Zhou “Forecasting stock prices with long-short term memory neural network based on attention mechanism” In _PLOS ONE_ 15.1 Public Library of Science, 2020, pp. 1–15 DOI: 10.1371/journal.pone.0227222 * [25] Vinay Kumar Reddy Chimmula and Lei Zhang “Time series forecasting of COVID-19 transmission in Canada using LSTM networks” In _Chaos, Solitons & Fractals_ 135, 2020, pp. 109864 DOI: https://doi.org/10.1016/j.chaos.2020.109864 * [26] Neo Wu, Bradley Green, Xue Ben and Shawn O’Banion “Deep Transformer Models for Time Series Forecasting: The Influenza Prevalence Case” In _CoRR_ abs/2001.08317, 2020 URL: https://arxiv.org/abs/2001.08317 * [27] George EP Box, Gwilym M Jenkins, Gregory C Reinsel and Greta M Ljung “Time series analysis: forecasting and control” John Wiley & Sons, 2015 * [28] Trevor Hastie and Robert Tibshirani “Generalized Additive Models” In _Statistical Science_ 1.3 Institute of Mathematical Statistics, 1986, pp. 297–310 DOI: 10.1214/ss/1177013604 * [29] Wint Nyein Chan “Time Series Data Mining: Comparative Study of ARIMA and Prophet Methods for Forecasting Closing Prices of Myanmar Stock Exchange” In _J. Comput. Appl. Res._ 1, 2020, pp. 75–80 * [30] Işil Yenidoğan et al. “Bitcoin forecasting using ARIMA and prophet” In _2018 3rd International Conference on Computer Science and Engineering (UBMK)_ , 2018, pp. 621–624 IEEE DOI: 10.1109/UBMK.2018.8566476 * [31] Gareth James, Daniela Witten, Trevor Hastie and Robert Tibshirani “An introduction to statistical learning” Springer, 2013 DOI: DOI https://doi.org/10.1007/978-1-4614-7138-7 * [32] Sean J. Taylor and Benjamin Letham “Forecasting at Scale” In _The American Statistician_ 72.1 Taylor & Francis, 2018, pp. 37–45 DOI: 10.1080/00031305.2017.1380080 * [33] Richard H. Byrd, Peihuang Lu, Jorge Nocedal and Ciyou Zhu “A Limited Memory Algorithm for Bound Constrained Optimization” In _SIAM Journal on Scientific Computing_ 16.5, 1995, pp. 1190–1208 DOI: 10.1137/0916069 * [34] Razvan Pascanu, Tomas Mikolov and Yoshua Bengio “On the difficulty of training recurrent neural networks” In _Proceedings of the 30th International Conference on Machine Learning_ 28.3, Proceedings of Machine Learning Research Atlanta, Georgia, USA: PMLR, 2013, pp. 1310–1318 arXiv: http://proceedings.mlr.press/v28/pascanu13.html * [35] George EP Box and David A Pierce “Distribution of residual autocorrelations in autoregressive-integrated moving average time series models” In _Journal of the American statistical Association_ 65.332 Taylor & Francis, 1970, pp. 1509–1526 DOI: 10.2307/2284333 * [36] Greta M Ljung and George EP Box “On a measure of lack of fit in time series models” In _Biometrika_ 65.2 Oxford University Press, 1978, pp. 297–303 URL: http://www.jstor.org/stable/2335207 * [37] Diederik P Kingma and Jimmy Ba “Adam: A method for stochastic optimization” In _3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings_ , 2014 URL: http://arxiv.org/abs/1412.6980 * [38] Xavier Glorot and Yoshua Bengio “Understanding the difficulty of training deep feedforward neural networks” In _Proceedings of the thirteenth international conference on artificial intelligence and statistics_ 9, Proceedings of Machine Learning Research, 2010, pp. 249–256 JMLR WorkshopConference Proceedings URL: http://proceedings.mlr.press/v9/glorot10a.html * [39] John T Mentzer and Mark A Moon “Sales forecasting management: a demand management approach” Sage Publications, 2004 * [40] G Peter Zhang “Neural networks in business forecasting” IGI global, 2004 * [41] Ashish Vaswani et al. “Attention is all you need” In _Advances in neural information processing systems_ 30, 2017, pp. 5998–6008 arXiv: https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf * [42] Vijay Ekambaram et al. “Attention based Multi-Modal New Product Sales Time-series Forecasting” In _Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining_ Association for Computing Machinery, 2020, pp. 3110–3118 DOI: https://doi.org/10.1145/3394486.3403362
arxiv-papers
2021-07-23T15:13:31
2024-09-04T03:07:21.432537
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Lorenzo Menculini, Andrea Marini, Massimiliano Proietti, Alberto\n Garinei, Alessio Bozza, Cecilia Moretti, Marcello Marconi", "submitter": "Lorenzo Menculini", "url": "https://arxiv.org/abs/2107.12770" }
2107.12771
# Theoretical Study and Comparison of SPSA and RDSA Algorithms with Different Perturbations Yiwen Chen ###### Abstract Stochastic approximation (SA) algorithms are widely used in system optimization problems when only noisy measurements of the system are available. This paper studies two types of SA algorithms in a multivariate Kiefer-Wolfowitz setting: random-direction SA (RDSA) and simultaneous- perturbation SA (SPSA), and then describes the bias term, convergence, and asymptotic normality of RDSA algorithms. The gradient estimations in RDSA and SPSA have different forms and, consequently, use different types of random perturbations. This paper looks at various valid distributions for perturbations in RDSA and SPSA and then compares the two algorithms using mean-square errors computed from asymptotic distribution. From both a theoretical and numerical point of view, we find that SPSA generally outperforms RDSA. ††1\. A compressed version of this paper appears in the 2021 55rd Annual Conference on Information Sciences and Systems (CISS), Mar 2021. 2\. Contact Information: [email protected] / [email protected] ## 1 Introduction Stochastic approximation is a well-known recursive procedure for finding roots of equations in the presence of noisy measurements. Consider a smooth $p$-dimensional loss function $L:\,\mathbb{R}^{p}\rightarrow\mathbb{R}$, with gradient $\bm{g}:\mathbb{R}^{p}\rightarrow\mathbb{R}^{p}$. Assume that $L$ has a unique minimum $\bm{\uptheta}^{*}\in\mathbb{R}^{p}$; i.e. $L(\bm{\uptheta}^{*})\leq L(\bm{\uptheta})$ for all $\bm{\uptheta}^{*}\in\mathbb{R}^{p}$, and $\bm{g}(\bm{\uptheta}^{*})=\bm{0}$. In many cases where only noisy measurements of the gradient are available, the Robbins-Monro stochastic approximation (SA) algorithm is widely used with the form of: $\displaystyle\bm{\hat{\uptheta}}_{k+1}=\bm{\hat{\uptheta}}_{k}-a_{k}\bm{Y}_{k}(\bm{\hat{\uptheta}}_{k}).\;k=0,1,2,...$ (1) where $\bm{Y}_{k}(\bm{\hat{\uptheta}}_{k})=\partial{Q}/\partial{\bm{\uptheta}}$ represents a direct noisy measurement of the true gradient $\bm{g}_{k}(\bm{\hat{\uptheta}}_{k})$ for $Q$ in the representation $L(\bm{\uptheta})=E[Q(\bm{\uptheta,V})]$ with $\bm{V}$ corresponding to the randomness in the problem. $a_{k}>0$ is the step size, determining the convergence of the algorithm. However, in most practical cases, such direct measurement is difficult to obtain and only noisy measurements of the loss function are available. Then it comes to the use of gradient-free algorithms. There are several common algorithms such as the finite-difference (FD) SA, random-direction SA (RDSA) and the simultaneous-perturbation SA (SPSA). All of them use the measurement of the loss function to estimate the gradient. The FDSA algorithm has also been discussed comprehensively in [15]. It has an $i$th component in the form of: $\displaystyle\hat{\bm{g}}_{ki}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{e}_{i})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{e}_{i})}{2c_{k}},$ (2) where $\bm{e}_{i}$ denotes the unit vector along the $i$th axis and $y$ is the noisy measurement of the loss value and $c_{k}>0$ defines the difference magnitude. The pair ${\\{a_{k},c_{k}}\\}$ represents the gain sequences. Nevertheless, the FDSA algorithm shows inefficiency in solving problems with high dimension due to its use of $2p$ measurements of $L$ per iteration. The other two RDSA and SPSA approaches, alleviate this problem by requiring only two system simulations regardless of the parameter dimension. Several papers have discussed the three SA algorithms. Spall has discussed details of FDSA and SPSA algorithms in [13] and [15]; Kushner discussed the RDSA algorithm in [9]; Blakney and Zhu compared FDSA and SPSA algorithms in [2] and Chin compared the three algorithms using mean-square errors in [3]. Because the FDSA and SPSA algorithms have been well analyzed, this paper will mainly focus on the RDSA algorithm. Some papers investigated the theoretical foundation for RDSA algorithms such as [1], [18] and [3]; however, some of them gave the illustration only briefly. This paper is going to arrange and organize those different versions of theoretical proofs to show the convergence and asymptotic normality. After that, we will conduct the comparison between RDSA and SPSA using Mean-Square Error and present certain conditions under which SPSA outperforms RDSA with specific perturbations. The remainder of this paper is organized as follows. Section 2 introduces the general formulation of the SPSA and RDSA algorithms. Section 3 covers the bias term, convergence condition, and asymptotic normality of RDSA algorithm and leads to the comparison of relative accuracy of SPSA and RDSA. Section 4 presents several numerical studies to assist the theoretical conclusion in Section 3. Especially, this paper uses the skewed-quartic function as an example to show how the theory works on the performance of distinct distributed perturbation in SPSA and RDSA. ## 2 Background This section briefly discusses the SPSA algorithm and the RDSA algorithm with their estimates for the gradient, $\hat{\bm{g}}(\hat{\bm{\uptheta}}_{k})$. SPSA (‘Simultaneous Perturbation Stochastic Algorithm’) has been well discussed in [15, Chap. 7] and [14]. The estimate for $\bm{g}(\hat{\bm{\uptheta}}_{k})$ is in the form of: $\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\Delta}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\Delta}_{k})}{2c_{k}\bm{\Delta}_{k}},$ where $y(\hat{\bm{\uptheta}}_{k}\pm c_{k}\bm{\Delta}_{k})=L(\hat{\bm{\uptheta}}_{k}\pm c_{k}\bm{\Delta}_{k})+\upepsilon^{(\pm)}_{k}$ with $\upepsilon^{(\pm)}_{k}$ representing measurement noise term that satisfies $E[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}]=0$. $\bm{\Delta}_{k}\in\mathbb{R}^{p}$ is a vector of $p$ mutually independent mean-zero random variables representing the perturbation, which satisfies certain conditions, and $\bm{\Delta}^{-1}_{k}$ represents the vector of inverse components. There’s no specific type of distribution for $\bm{\Delta}_{k}$ as long as the perturbation satisfies general conditions mentioned in [15, Chap. 7] (Principally, mean 0, symmetric, finite moments and certain inverse moments). Usually, $\bm{\Delta}_{k}$ can be chosen as Bernoulli, U-shape, and other distributions. The range of choices is restricted due to the main constraint that the inverse moment $E(|1/\Delta_{km}|)$ should be finite. Many common distributions, such as Gaussian distribution and Uniform distribution, cannot be applied to the SPSA algorithm since they contain too much probability mass near 0. For RDSA (‘Random Direction Stochastic Algorithm’), the estimate for $\bm{g}(\hat{\bm{\uptheta}}_{k})$ is in the form of: $\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\bm{\pi}_{k},$ where $\bm{\pi}_{k}\in\mathbb{R}^{p}$ is a vector of Monte-Carlo generated random variables satisfying certain regularity conditions and normalized so that $||\bm{\pi}_{k}||^{2}=p$ . Unlike SPSA, the requirement for finite inverse moment is released for $\bm{\pi}_{k}$ in RDSA, so the range of choices of distribution for $\bm{\pi}_{k}$ is different from that for $\bm{\Delta}_{k}$ in SPSA. Several valid choices have been discussed in [18] such as axis distribution, Gaussian distribution, and Uniformly Spherical distribution where the perturbation distributes uniformly on a $p$-dimensional sphere. The main difference between the two algorithms is that in RDSA, both adjustments to $\hat{\bm{\uptheta}}_{k}$ and $\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})$ are in the same direction $\bm{\pi}_{k}$ while the SPSA employs two different directions, $\bm{\Delta}_{k}$ and $\bm{\upzeta}_{k}$ with component $\upzeta_{ki}=1/{\Delta}_{ki}$. There are two popular choices for $\bm{\pi}_{k}$: independent Gaussian distribution $N(0,1)$ and Uniformly Spherical distribution with radius $\sqrt{p}$. Notice that in Uniformly Spherical distribution, since there is the normalization, $||\bm{\pi}_{k}||^{2}=p$, variables are not independent, but uncorrelated. ## 3 Methodology This section presents several results that form the theoretical basis for the RDSA algorithm, similar to those results of SPSA, which have been completely proved in [12]. The following sections consider the bias term in $\bm{\hat{g}}_{k}(\bm{\hat{\uptheta}}_{k})$, the strong convergence and asymptotic normality of $\hat{\bm{\uptheta}}_{k}$ in the RDSA algorithm. Then we compare the performance of RDSA with SPSA using mean-square error computed with the asymptotic distribution. ### 3.1 The bias in $\hat{\bm{g}}_{k}$ The bias term in $\hat{\bm{g}}_{k}$ is in the form of: $\displaystyle\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})=E[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})|\hat{\theta}_{k}]-\bm{g}_{k}(\bm{\hat{\uptheta}}_{k}),$ (3) where $\upepsilon^{(\pm)}_{k}=y(\bm{\uptheta}_{k}\pm c_{k}\bm{\pi}_{k})-L(\bm{\uptheta}_{k}\pm c_{k}\bm{\pi}_{k})$ is the noise on the estimate of the loss function $L$, with mean 0 and variance $\upsigma^{2}$. Here we henceforth assume that the noise is independent with $\hat{\bm{\uptheta}}_{k}$ and $\bm{\pi}_{k}$. Calculate $E[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})]$ and $\bm{g}(\hat{\bm{\uptheta}}_{k})$ respectively: $\displaystyle\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})=$ $\displaystyle\dfrac{y(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-y(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\;\bm{\pi}_{k}$ $\displaystyle=\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})+\upepsilon^{(+)}_{k}-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})-\upepsilon^{(-)}_{k}}{2c_{k}}\;\bm{\pi}_{k}$ $\displaystyle=\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2c_{k}}\;\bm{\pi}_{k}+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}$ $\displaystyle=\dfrac{2c_{k}\bm{g}(\hat{\bm{\uptheta}}_{k})^{T}\bm{\pi}_{k}+\dfrac{1}{6}c^{3}_{k}L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})[\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]}{2c_{k}}\;\bm{\pi}_{k}$ $\displaystyle+\dfrac{\dfrac{1}{6}c^{3}_{k}L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})[\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]}{2c_{k}}\;\bm{\pi}_{k}$ $\displaystyle+O(c^{5}_{k})+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}$ where $\bar{\bm{\uptheta}}^{(\pm)}_{k}$ denotes points on the line segments between $\hat{\bm{\uptheta}}_{k}$ and $\hat{\bm{\uptheta}}_{k}\pm c_{k}\bm{\pi}_{k}$. Then look at the $m$th term of $\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})$: $\displaystyle\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})=$ $\displaystyle\left(\sum_{i=1}^{p}g_{i}(\hat{\bm{\uptheta}}_{k}){\pi}_{ki}+\dfrac{1}{12}c^{2}_{k}[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\right)\,\pi_{km}$ $\displaystyle+\dfrac{\upepsilon^{(+)}_{km}-\upepsilon^{(-)}_{km}}{2c_{k}}\pi_{km}$ $\displaystyle=g_{m}(\hat{\uptheta}_{k})\pi^{2}_{km}+\sum_{i=1,i\neq m}^{p}g_{i}(\hat{\uptheta}_{k})\pi_{ki}{\pi}_{km}$ $\displaystyle+\dfrac{1}{12}c^{2}_{k}\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}])\;\pi_{km}\right\\}+\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\pi_{km}$ Based on the basic assumption of independence between $\upepsilon^{(\pm)}_{k}$ and $\bm{\pi}_{k}$ and the uncorrelation between $\pi_{ki}$ and $\pi_{kj}$, $i\neq j$, we have: $E\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2c_{k}}\bm{\pi}_{k}\right]=0;\;E(\pi^{2}_{km})=1;\;E(\pi_{ki}\pi_{km})=0.$ Then, $\displaystyle E[\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})]$ $\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})E(\pi^{2}_{km})+\sum_{i=1,i\neq m}^{p}g_{i}(\hat{\bm{\uptheta}}_{k})E(\pi_{ki}\pi_{km})$ $\displaystyle+\dfrac{c^{2}_{k}}{12}E\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\;\pi_{km}\right\\}$ $\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{c^{2}_{k}}{12}E\left\\{[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\pi_{km}\right\\}$ $\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}E\left\\{[L^{{}^{\prime\prime\prime}}(\hat{\bm{\uptheta}}_{k})+O(c^{2}_{k})][\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}]\;\pi_{km}\right\\}$ $\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}\left(\sum_{i,j,k}\dfrac{\partial^{3}L}{\partial\pi_{ki}\partial\pi_{kj}\partial\pi_{kl}}\;\pi_{ki}\pi_{kj}\pi_{kl}\right)\;\pi_{km}+O(c^{4}_{k})$ $\displaystyle=g_{m}(\hat{\bm{\uptheta}}_{k})+\dfrac{1}{6}c^{2}_{k}\left(\dfrac{\partial^{3}L(\hat{\bm{\uptheta}}_{k})}{\partial{\pi}_{km}^{3}}\;\pi^{4}_{km}+\sum_{i,j,l\neq m}\dfrac{\partial^{3}L}{\partial\pi_{ki}\partial\pi_{kj}\partial\pi_{kl}}\;\pi_{ki}\pi_{kj}\pi_{kl}\pi_{km}\right)+O(c^{4}_{k})$ So, the $m$th bias term is in the form of: $\displaystyle\begin{split}\bm{b}_{km}(\hat{\bm{\uptheta}}_{k})&=E[\hat{g}_{km}(\hat{\bm{\uptheta}}_{k})]-g_{m}(\hat{\bm{\uptheta}}_{k})\\\ &=\dfrac{1}{6}c^{2}_{k}\left(L^{{}^{\prime\prime\prime}}_{mmm}(\hat{\bm{\uptheta}}_{k})E(\pi^{4}_{km})+3\sum\limits_{i=1,i\neq m}^{p}L^{{}^{\prime\prime\prime}}_{iim}(\hat{\bm{\uptheta}}_{k})E(\pi^{2}_{ki}\pi^{2}_{km})\right)+O(c^{4}_{k})\end{split}$ ### 3.2 Convergence Conditions This subsection presents conditions for convergence of the RDSA iteration: $\bm{\uptheta}^{*}\rightarrow\bm{\uptheta}^{*}\;\text{a.s.}$. The following conditions ensure convergence of $\hat{\bm{\uptheta}}_{k}$ to $\bm{\uptheta}^{*}$ in the RDSA algorithm: Consider all $k\geq K$ for some $K<\infty$. Suppose that for each $k$, there exists some $\upalpha_{0},\upalpha_{1},\upalpha_{2}>0$, $\bm{\pi}_{k}$ is a direction vector normalized so that $||\bm{\pi}_{k}||^{2}=p$ and symmetrically distributed about 0 with $|\pi_{ki}^{4}|\leq\upalpha_{0}\;\text{a.s. and}\;E|\pi_{ki}|^{2}\leq\upalpha_{1}.i=1,2,...,p$ For almost all $\hat{\bm{\uptheta}}_{k}$, suppose that for $\forall\;\bm{\uptheta}$ in an open neighborhood of $\hat{\bm{\uptheta}}_{k}$, $L^{{}^{\prime\prime\prime}}(\bm{\uptheta})$ exists continuously with individual elements satisfying $|L^{{}^{\prime\prime\prime}}_{ijk}(\bm{\uptheta})|\leq\upalpha_{2}$. Similar to the conditions for SPSA discussed in [15, Chap.7], if the derivatives of $L$ are equicontinuous and bounded, then the RDSA algorithm will converge almost surely under the following conditions: * • A1: $a_{k},c_{k}>0,\;\forall k:a_{k}\rightarrow 0,c_{k}\rightarrow 0\;{\text{as}}\;k\rightarrow\infty,\;\sum\limits^{\infty}_{k=0}a_{k}=\infty,\;\sum\limits^{\infty}_{k=0}\left(\dfrac{a_{k}}{c_{k}}\right)^{2}<\infty.$ * • A2: $\mathop{{\text{sup}}}\limits_{k}||\hat{\bm{\uptheta}}_{k}||<\infty\;\text{a.s.}$ * • A3: $\bm{\uptheta}^{*}$ is an asymptotically stable solution of the differential equation: $d\bm{x}(t)/dt=-\bm{g}(\bm{x}).$ * • A4: Let $D(\bm{\uptheta}^{*})=[x_{0}|\mathop{\text{lim}}\limits_{t\rightarrow\infty}\bm{x}(t|x_{0})=\bm{\uptheta}^{*}]$ where $\bm{x}(t|x_{0})$ denotes the solution to the differential equation of $d\bm{x}(t)/dt=-\bm{g}(\bm{x})$ based on initial conditions $\bm{x}_{0}$. There exists a compact $S\subseteq D(\bm{\uptheta}^{*})$ s.t $\tilde{\bm{\uptheta}}\in S$ infinitely often for almost all sample points. * • A5: $\forall k,E|\upepsilon^{(\pm)}_{k}|^{2}\leq\upalpha_{0},E(\bm{\pi}_{k}\bm{\pi}^{T}_{k})=\bm{I}$, and $E|\pi^{2}_{kl}L(\hat{\bm{\uptheta}}_{k}\pm c_{k}{\bm{\pi}}_{k})^{2}|\leq\upalpha_{1},\;l=1,2,...,p.$ Proposition 1A: Let A1–A5 hold and for some $K<\infty$, each $k\geq K$, ${\\{\pi_{ki}\\}}$ is Gaussian (0,1) distributed i.i.d., then $\hat{\bm{\uptheta}}_{k}\rightarrow\bm{\uptheta}^{*}$ as $k\rightarrow\infty$. Proposition 1B: Let A1–A5 hold and for some $K<\infty$, each $k\geq K$, ${\\{\pi_{ki}\\}}$ are uniformly distributed on a $p$-dim sphere, then $\hat{\bm{\uptheta}}_{k}\rightarrow\bm{\uptheta}^{*}$ as $k\rightarrow\infty$. Proof: This proof applies for both 1A and 1B above. From the above subsection in terms of bias in $\hat{\bm{g}}_{k}$ and the A1 condition, we know that: $\displaystyle||b_{k}(\hat{\bm{\uptheta}}_{k})||<\infty\qquad\forall k,\;b_{k}(\hat{\bm{\uptheta}}_{k})\rightarrow\bm{0}\;\;\text{a.s.}$ (4) According to the inequality in [7, p. 315] , it holds that: $\displaystyle P(\mathop{\text{sup}}\limits_{m\geq k}||\sum\limits_{i=k}^{m}a_{i}\bm{e}_{i}||\geq\upeta)\leq\upeta^{-2}E||\sum\limits_{i=k}^{\infty}a_{i}\bm{e}_{i}||^{2}=\upeta^{-2}\sum\limits_{i=k}^{\infty}a^{2}_{i}E||\bm{e}_{i}||^{2}.$ (5) By the definition of $\bm{e}_{k}(\hat{\bm{\uptheta}}_{k})$ and Condition A1, A5, we would have: $\mathop{\text{lim}}\limits_{k\rightarrow\infty}P(\mathop{\text{sup}}\limits_{m\geq k}||\sum\limits_{i=k}^{m}a_{i}\bm{e}_{i}||\geq\upeta)=0\;\;\text{for\;any\;}\upeta>0.$ Then, by [5, Lemma 2.2.1], the above propositions hold. ### 3.3 Asymptotic Normality This subsection mainly discusses the asymptotic normality for $\hat{\bm{\uptheta}}_{k}$ in RDSA algorithm, especially, how the Fabian’s Theorem in [5, Theorem 2.2] applies on RDSA algorithm based on its generalization for SPSA shown in [12] and [6]. In order to satisfy the conditions for Fabian’s Theorem, we strengthen the Condition A5 to: A5′: For some $\updelta,\upalpha_{0},\upalpha_{1},\upalpha_{2}>0$ and $\forall k,E|\upepsilon^{(\pm)}_{k}|^{2+\delta}\leq\upalpha_{0},E(\pi_{kl}L(\hat{\bm{\uptheta}}_{k}\pm c_{k}\bm{\pi}_{k}))^{2+\updelta}\leq\upalpha_{1},E(\pi_{kl})^{4+\updelta}\leq\upalpha_{2},\;l=1,2,...,p,E(\bm{\pi}_{k}\bm{\pi}^{T}_{k})=\bm{I}$. Then, the conditions for the asymptotic normality for $\hat{\bm{\uptheta}}_{k}$ in RDSA can be stated as the following proposition: Proposition 2: Assume that conditions A1–A4 and A5′ hold and $\upbeta>0$. Let $\bm{H}(\cdot)$ denote the Hessian matrix for $L(\bm{\uptheta})$; $\upsigma,\upphi$ be such that $E(\upepsilon_{k}^{(+)}-\upepsilon_{k}^{(-)})^{2}\rightarrow\upsigma^{2}$ and $E(\pi_{kl}^{4})\rightarrow\upphi,\;k\rightarrow\infty$. Suppose the gain sequences are $a_{k}=a/(k+1)^{\upalpha},c_{k}=c/(k+1)^{\upgamma},a>0,c>0,k=0,1,2,3,...$ and set $0<\upalpha\leq 1,\upgamma\geq\upalpha/6,\upbeta=\upalpha-2\upgamma$. Let $\bm{P}$ be an orthogonal matrix such that $\bm{PH}(\bm{\uptheta}^{*})\bm{P}^{T}=a^{-1}\text{diag}(\uplambda_{1},...,\uplambda_{p})$. Then $\displaystyle k^{\upbeta/2}(\hat{{\uptheta}}_{k}-{\uptheta}^{*})\stackrel{{\scriptstyle\text{dist}}}{{\longrightarrow}}N(\bm{\upmu},\bm{PMP}^{T}),\quad k\rightarrow\infty,$ (6) where $\bm{M}=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}\text{diag}[1/(2\uplambda_{1}-\upbeta_{+}),....,1/(2\uplambda_{p}-\upbeta_{+})]$ with $\upbeta_{+}=\upbeta<2\mathop{\text{min}}\limits_{i}\uplambda_{i}$ if $\upalpha=1$ and $\upbeta_{+}=0$ if $\upalpha<1$, and $\displaystyle\bm{\upmu}=\left\\{\begin{array}[]{ccr}0&&{\text{if}\;3\upgamma-\upalpha/2>0}\\\ (a\bm{H}(\uptheta^{*})-\dfrac{1}{2}\upbeta_{+}\bm{I})^{-1}\bm{T}&&{\text{if}\;3\upgamma-\upalpha/2=0}\\\ \end{array}\right.,$ (9) where the $l$th component of $\bm{T}$ is: $\displaystyle\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[{\upphi}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3{\upsilon}\sum\limits_{i\neq l}^{p}L^{{}^{\prime\prime\prime}}_{iil}(\bm{\uptheta}^{*})\right],$ and $\displaystyle{\upphi}=E(\pi^{4}_{kl}),\;{\upsilon}=E(\pi^{2}_{kl}\pi^{2}_{km}),\;l\neq m.$ Proof: The result will be shown if conditions (2.2.1), (2.2.2), and (2.2.3) of [5, Theorem 2.2] hold. In the notation of [5, Theorem 2.2], we can rewrite the formula (1) in the form of: $\displaystyle\hat{\bm{\uptheta}}_{k+1}-\bm{\uptheta}^{*}=(\bm{I}-k^{-\upalpha}\bm{\Gamma}_{k})(\hat{\bm{\uptheta}}_{k}-\bm{\uptheta}^{*})+k^{-(\upalpha+\upbeta)/2}\bm{\Phi}_{k}\bm{V}_{k}+k^{-\upalpha-\upbeta/2}\bm{T}_{k},$ where $\displaystyle\bm{\Gamma}_{k}$ $\displaystyle=k^{\upalpha}a_{k}\tilde{\bm{H}}_{k},\;\;\;\bm{\Phi}_{k}=-a\bm{I},$ $\displaystyle\bm{V}_{k}$ $\displaystyle=\dfrac{1}{k^{\upgamma}}[\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})-E(\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})],\;\;\bm{T}_{k}=-ak^{\upbeta/2}\bm{b}_{k}(\hat{\bm{\uptheta}}_{k}).$ Next, we are going to verify Fabian’s conditions. As shown in the [4, p. 233], let $\bm{\Gamma}_{k}=k^{\upalpha}a_{k}\tilde{\bm{H}}_{k}$ where the $i$th row of $\tilde{\bm{H}}_{k}$ equals to the $i$th row of the Hessian matrix evaluated at $\bm{\uptheta}=(1-\uplambda_{i})\hat{\bm{\uptheta}}_{k}+\uplambda_{i}\bm{\uptheta}^{*}$ for some $\uplambda_{i}\in[0,1]$. Due to the continuity of $\bm{H}(\bm{\uptheta})$ at $\bm{\uptheta}^{*}$ and $k^{\upalpha}a_{k}\rightarrow a,k\rightarrow\infty$, $a\bm{H}(\bm{\uptheta}^{*})$ would be a positive definite matrix, which $\bm{\Gamma}_{k}$ would converge to. Next, consider the convergence of $\bm{T}_{k}$: $\displaystyle T_{kl}$ $\displaystyle=-\dfrac{1}{12}ac^{2}\dfrac{1}{k^{3\upgamma-\upalpha/2}}E\left\\{\pi_{kl}[L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(+)}_{k})+L^{{}^{\prime\prime\prime}}(\bar{\bm{\uptheta}}^{(-)}_{k})]\bm{\pi}_{k}\otimes\bm{\pi}_{k}\otimes\bm{\pi}_{k}\right\\}.$ If $3\upgamma-\upalpha/2>0$, we have ${T}_{kl}\rightarrow 0$ a.s. If $3\upgamma-\upalpha/2=0$, use the fact that $L^{{}^{\prime\prime\prime}}$ is uniformly bounded near $\bm{\uptheta}^{*}$, we have: $T_{kl}\rightarrow-\dfrac{ac^{2}}{6}\left\\{E(\pi^{4}_{kl})L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{i\neq l}^{p}L^{{}^{\prime\prime\prime}}_{iil}(\bm{\uptheta}^{*})E(\pi^{2}_{ki}\pi^{2}_{kl})\right\\}\;\text{a.s.}$ So, we can show that $\bm{T}_{k}$ converges a.s. for $3\upgamma-\upalpha/2\geq 0.$. Further, obviously, $\bm{\Phi}_{k}=-a\bm{I}\rightarrow\bm{\Phi}=-a\bm{I}.$ Last, consider $\bm{V}_{k}$: $\displaystyle\begin{split}&E(\bm{V}_{k}\bm{V}^{T}_{k})\\\ &=k^{-2\upgamma}E\bigg{\\{}\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2ck^{-\upgamma}}\right]^{2}\\\ &+\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2ck^{-\upgamma}}\right]\left[\dfrac{L(\hat{\bm{\uptheta}}_{k}+c_{k}\bm{\pi}_{k})-L(\hat{\bm{\uptheta}}_{k}-c_{k}\bm{\pi}_{k})}{2ck^{-\upgamma}}\right]\\\ &+\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\dfrac{\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}}{2ck^{-\upgamma}}\right]^{2}\bigg{\\}}\\\ &-k^{-2\upgamma}\left[\bm{g}(\hat{\bm{\uptheta}}_{k})+\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})\right]\left[\bm{g}(\hat{\bm{\uptheta}}_{k})+\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})\right]^{T}.\end{split}$ (10) Similar to the proof (3.5) in [12], for sufficiently large $k$, $L(\hat{\bm{\uptheta}}_{k}\pm c_{k}{\bm{\pi}_{k}})$ is uniformly bounded in $\bm{\pi}_{k}$. Combined with condition A2 and Holder’s Inequality, it is implied that the first and second terms in (10) will converge to 0 a.s. Also, by conditions A1–A5, the fourth term will converge to 0 a.s. as well. Then consider the third term: $\displaystyle E\left\\{\bm{\pi}_{k}(\bm{\pi}_{k})^{T}\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}\right\\}$ $\displaystyle=\int_{\Omega_{\bm{\pi}}}\bm{\pi}_{k}(\bm{\pi}_{k})^{T}E\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}dP_{\bm{\pi}}.$ where $\Omega_{\bm{\pi}}$ is the sample space generating the $\bm{\pi}_{k}$ and $P$ is the corresponding probability measure. Here we have the fact that $E\left[\upepsilon^{(+)}_{k}-\upepsilon^{(-)}_{k}\right]^{2}\rightarrow\upsigma^{2}$ a.s. and $||\bm{\pi}_{k}||^{2}=p$. If we consider ${\\{\bm{\pi}_{ij}}\\}$ to be independently generated with mean 0 and second moment 1 and then it leads to the result that $E({\pi}_{kl}{\pi}_{km})=E({\pi}_{kl})E({\pi}_{km})=0$. If we consider $\\{\pi_{k}\\}$ being generated from a $p$-dimensional sphere with radius $\sqrt{p}$ uniformly, then for $l\neq m,\;{\pi}_{kl},{\pi}_{km}$ are not independent, but uncorrelated. In this case, we still have $E({\pi}_{kl}{\pi}_{km})=E({\pi}_{kl})E({\pi}_{km})=0$. Moreover, $E({\pi}^{2}_{kl})=E({\pi}^{2}_{km})$, such that $E({\pi}^{2}_{kl})=1$. So, we can have: $E[\bm{\pi}_{k}(\bm{\pi}_{k})^{T}]=\bm{I},\;\;\forall\;l\neq m$. such that, $E(\bm{V}_{k}\bm{V}^{T}_{k})\rightarrow\dfrac{1}{4}c^{-2}\upsigma^{2}\bm{I}.$ Now, the conditions (2.2.1) and (2.2.2) in [5, Theorem 2.2] have been shown. Next, we are going to show the condition (2.2.3) also holds. By the definition of $\bm{V}_{k}$, Markov Inequality, and the triangle inequality and the proof shown in (3.8) in [12], for any $0<\upsilon<\updelta/2$, it holds that: $\displaystyle||\bm{V}_{k}||^{2(1+\upsilon)}\leq$ $\displaystyle 2^{2(1+\upsilon)}k^{-2\upgamma(1+\upsilon)}[||\hat{\bm{g}}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}$ $\displaystyle+||\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}+||\bm{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}].$ Since $\bm{g}(\hat{\bm{\uptheta}}_{k})$ and $\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})$ are uniformly bounded and $L(\hat{\bm{\uptheta}}_{k}\pm c_{k}{\bm{\pi}}_{k})$ is uniformly bounded for $\forall k>K$, we have $\displaystyle E[k^{-2\upgamma(1+\upsilon)}||\bm{b}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]\rightarrow\bm{0},$ $\displaystyle E[k^{-2\upgamma(1+\upsilon)}||\bm{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]\rightarrow\bm{0}.$ as $k\rightarrow\infty$. Moreover, invoking A5′, Holder’s Inequality, similar to the case in [12], it implies that $E[||\hat{g}_{k}(\hat{\bm{\uptheta}}_{k})||^{2(1+\upsilon)}]=O(k^{2\upgamma(1+\upsilon)})$. As a result, $E||\bm{V}_{k}||^{2(1+\upsilon)}=O(1)$, which shows that: $\mathop{\rm{lim}}\limits_{k\rightarrow\infty}E\left(I_{||\bm{V}_{k}||^{2}\geq rk^{\upalpha}}||\bm{V}_{k}||^{2}\right)=0,\qquad\forall r>0,$ where $I_{\\{.\\}}$ is the indicator function. Now all the required conditions for Fabian’s Theorem in [5, Theorem 2.2] have been verified. It is stated that $\hat{\bm{\uptheta}}_{k}$ in RDSA algorithm is asymptotically normal. Corollary 2A: Assume conditions in Proposition 2 hold and perturbation $\\{{\bm{\pi}_{k}\\}}$ is Gaussian distributed $N(0,1)$ independently. Then the $l$th component of $\bm{T}$ is: $\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[3L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{m\neq l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right].$ Corollary 2B: Assume conditions in Proposition 2 hold and perturbation $\\{{\bm{\pi}_{k}}\\}$ is uniformly distributed on a $p$-dim sphere with radius $\sqrt{p}$. Then the $l$th element of $\bm{T}$ is: $\bm{T}^{\text{RD}}_{l}=-\dfrac{1}{6}ac^{2}\left[\dfrac{3p}{p+2}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+\dfrac{3p}{p+2}\sum\limits_{m\neq l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right].$ ### 3.4 Relative Accuracy between SPSA and RDSA #### 3.4.1 Introduction This subsection discusses the MSE for SPSA and RDSA algorithm using the same gain sequence. We mainly focus on several widely used distributions for perturbations in SPSA and RDSA. We choose Bernoulli, and U-shape, especially polynomial with high order for $\bm{\Delta}_{k}$. (Here we choose $\Delta_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}x^{10},\,x\in[-1.17,1.17]$ to make it a valid probability density function) and choose Gaussian and uniform-spherical for $\bm{\pi}_{k}$ in RDSA. Notice that $\hat{{\bm{\uptheta}}}_{k}$ in the SPSA and RDSA algorithms have the asymptotic normality in, respectively, [12] or formula (6) with different values for the parameters. Here we give several notations to make the parameters more concise: $\displaystyle\begin{split}&\upphi=E[({\pi}^{4}_{ki})]\;\;;\;\,\qquad{\upsilon}=E({\pi}^{2}_{ki}{\pi}^{2}_{km}),\;i\neq m\\\ &{\uprho}^{2}=E\left[({\Delta}_{ki})^{-2}\right];\;\;{\xi}^{2}=E\left[({\Delta}_{ki})^{2}\right].\end{split}$ Then we have: $\displaystyle\bm{T}^{\text{RD}}_{l}$ $\displaystyle=-\dfrac{1}{6}ac^{2}\left[{\upphi}L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3{\upsilon}\sum\limits_{m\neq l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right];$ $\displaystyle\bm{M}^{\text{RD}}$ $\displaystyle=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}\text{diag}\left(\dfrac{1}{2\uplambda_{1}-\beta_{+}},....,\dfrac{1}{2\uplambda_{p}-\beta_{+}}\right);$ $\displaystyle\bm{T}^{\text{SP}}_{l}$ $\displaystyle=-\dfrac{1}{6}ac^{2}{\xi}^{2}\left[L^{{}^{\prime\prime\prime}}_{lll}(\bm{\uptheta}^{*})+3\sum\limits_{m\neq l}^{p}L^{{}^{\prime\prime\prime}}_{llm}(\bm{\uptheta}^{*})\right];$ $\displaystyle\bm{M}^{\text{SP}}$ $\displaystyle=\dfrac{1}{4c^{2}}a^{2}\upsigma^{2}{\uprho}^{2}\text{diag}\left(\dfrac{1}{2\uplambda_{1}-\upbeta_{+}},....,\dfrac{1}{2\uplambda_{p}-\beta_{+}}\right).$ Notice that tr$(\bm{M}_{\text{SP}})={\uprho}^{2}$tr$(\bm{M}_{\text{RD}}).$ Then, we can compute the asymptotic mean-square error by the definition: $\displaystyle{\text{MSE}}=\bm{\upmu}^{T}\bm{\upmu}+{\text{tr}}(\bm{PMP}^{T})=\bm{\upmu}^{T}\bm{\upmu}+{\text{tr}}(\bm{M}).$ Asymptotically, the ratio of the MSE values of the two algorithms are in the form of: $\displaystyle\begin{split}\dfrac{\text{MSE}_{\text{RD}}}{\text{MSE}_{\text{SP}}}&\rightarrow\dfrac{\bm{\mu}^{T}_{\text{RD}}\bm{\mu}_{\text{RD}}+{\text{tr}}(\bm{PM}_{\text{RD}}\bm{P}^{T})}{\bm{\mu}^{T}_{\text{SP}}\bm{\mu}_{\text{SP}}+{\text{tr}}(\bm{PM}_{\text{SP}}\bm{P}^{T})}\\\ &={\left[{\upphi}\bm{u}_{1}+{\upsilon}\bm{u}_{2}\right]^{T}\bm{S}\left[{\upphi}\bm{u}_{1}+{\upsilon}\bm{u}_{2}\right]+{D}}{\left[\upxi^{2}\bm{u}_{1}+\upxi^{2}\bm{u}_{2}\right]^{T}\bm{S}\left[\upxi^{2}\bm{u}_{1}+\upxi^{2}\bm{u}_{2}\right]+{\uprho}^{2}{D}},\end{split}$ (11) where $\displaystyle\bm{u}_{1}=ac^{2}[L^{{}^{\prime\prime\prime}}_{111}(\bm{\uptheta}^{*}),...,L^{{}^{\prime\prime\prime}}_{ppp}(\bm{\uptheta}^{*})]^{T}/6;$ $\displaystyle\bm{u}_{2}=ac^{2}[3\sum\limits_{j\neq 1}L^{{}^{\prime\prime\prime}}_{jj1}(\bm{\uptheta}^{*}),...,3\sum\limits_{j\neq p}L^{{}^{\prime\prime\prime}}_{jjp}(\bm{\uptheta}^{*})]^{T}/6;$ $\displaystyle\bm{S}=\left(a\bm{H}(\bm{\uptheta}^{*})-\dfrac{\upbeta_{+}}{2}\bm{I}\right)^{-2};$ $\displaystyle D={\text{tr}}(\bm{M}_{\text{RD}})=\dfrac{a^{2}\upsigma^{2}}{4c^{2}}\sum\limits_{i=1}^{p}\dfrac{1}{2\uplambda_{i}-\upbeta_{+}}.$ Denote $\displaystyle\begin{split}&{Q}_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}),\\\ &{Q}_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2}).\end{split}$ The parameters ${\\{\upphi,\upsilon,\upxi^{2},\uprho^{2}}\\}$ and the MSE values for several common used perturbations in SPSA and RDSA are listed as follows: Table 1: Key parameters for perturbations in RDSA and SPSA algorithms with different distributions Perturbation in RDSA | ${\upphi}$ | ${\upsilon}$ ---|---|--- ${\pi}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}N(0,1)$ | 3 | 1 $\bm{\pi}_{k}\sim$ Uniformly Spherical | $\dfrac{3p}{p+2}$ | $\dfrac{p}{p+2}$ Perturbation in SPSA | ${\xi}^{2}$ | ${\rho}^{2}$ ---|---|--- ${\Delta}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}$ Bernoulli ($\pm 1$) | 1 | 1 ${\Delta}_{ki}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}x^{10}$, $x\in[-1.17,1.17]$ | 1.15 | 0.90 Table 2: MSE in SPSA and RDSA with different perturbations Algorithm | Distribution | MSE ---|---|--- SPSA | Bernoulli | ${Q}_{1}+D$ SPSA | U-shape ($x^{10}$) | $1.33{Q}_{1}+0.9D$ RDSA | Gaussian | ${Q}_{2}+D$ RDSA | Uniformly Spherical | $\dfrac{p}{p+2}{Q}_{2}+D$ From the two tables, we notice that when dimension $p$ is sufficiently large, $\upphi,\upsilon$ of uniformly spherical are identical to those of the Gaussian distribution. Also, as the order $d$ of $x^{d}$ in the U-shape distribution increases, $\upxi^{2}$ of that distribution is close to that of Bernoulli as well (the curve of the U-shape converges to two single points $\pm 1$). Next, we are going to choose Bernoulli and Gaussian, respectively to be the representative distribution of SPSA and RDSA and make comparisons between them. Proposition 3: If $2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\geq 0$ holds, then SPSA with Bernoulli distributed perturbation has a smaller MSE value than RDSA with Gaussian perturbation. Corollary 3A: If $|2\bm{u}_{1}|>|\bm{u}_{2}|$ holds component-wise and $S_{ij}\geq 0$, then Proposition 3 holds. Proof: $\bm{S}=(a\bm{H}(\bm{\uptheta}^{*})-\upbeta_{+}\bm{I}/2)^{-2}$ is a positive-definite matrix by the fact that $\bm{H}(\bm{\uptheta}^{*})$ is diagonalizable and $\upbeta_{+}<2\text{min}\uplambda_{i}(a\bm{H}(\uptheta^{*}))$. By matrix analysis, for any $\bm{u}_{1},\bm{u}_{2}\in\mathbb{R}^{p}$: $|\bm{u}^{T}_{1}\bm{S}\bm{u}_{2}|\leq\sqrt{(\bm{u}^{T}_{1}\bm{Su}_{1})(\bm{u}^{T}_{2}\bm{Su}_{2})},$ So we would have, $\displaystyle\begin{split}&2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\\\ &\geq 2\bm{u}^{T}_{1}\bm{Su}_{1}-\sqrt{(\bm{u}^{T}_{1}\bm{Su}_{1})(\bm{u}^{T}_{2}\bm{Su}_{2})}.\end{split}$ (12) If $|2\bm{u}_{1}|\geq|\bm{u}_{2}|$ component-wise and $S_{ij}\geq 0$, then the r.h.s of (12) would be larger than 0, so that $2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}\geq 0$, leading to, $\displaystyle(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2})\geq(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}).$ Consequently, the MSE of SPSA with Bernoulli-distributed perturbation will be lower than that of RDSA with Gaussian-distributed perturbation. Corollary 3B: If the loss function does not have cross-third derivative term, i.e. $\bm{u}_{2}=\bm{0}$ along with $\upxi^{2}<\upphi,\uprho<1$, then SPSA has a smaller MSE value than RDSA for any valid perturbation. Proof: When $\bm{u}_{2}=\bm{0}$, we would have: $\displaystyle\begin{split}&\text{MSE}_{\text{SPSA}}=\upxi^{4}\bm{u}^{T}_{1}\bm{Su}_{1}+\uprho^{2}D,\\\ &\text{MSE}_{\text{RDSA}}=\upphi^{2}\bm{u}^{T}_{1}\bm{Su}_{1}+D,\end{split}$ (13) Then under the condition that $\upxi^{2}<\upphi,\uprho<1$, SPSA would have a smaller MSE value. #### 3.4.2 Application on the skewed-quartic function Consider the skewed quartic loss function: $L(\bm{\uptheta})=\bm{\uptheta}^{T}\bm{B}^{T}\bm{B\uptheta}+0.1\sum\limits^{p}_{i=1}(\bm{B\uptheta})^{3}_{i}+0.01\sum\limits^{p}_{i=1}(\bm{B\uptheta})^{4}_{i}.$ where $\bm{\uptheta}=(t_{1},t_{2},...,t_{p})^{T}$. After calculation we obtain that: $\bm{u}_{1}=ac^{2}(L^{{}^{\prime\prime\prime}}_{111}(\bm{\uptheta}),...,L^{{}^{\prime\prime\prime}}_{ppp}(\bm{\uptheta}))^{T}/6|_{\bm{\uptheta}^{*}=\bm{0}}$= $\displaystyle\dfrac{ac^{2}}{6}\left(\begin{array}[]{l}\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=1}t_{i}\\\ \dfrac{0.6}{p^{3}}\times 2+\dfrac{0.01}{p^{4}}\times 24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i})\\\ \dfrac{0.6}{p^{3}}\times 3+\dfrac{0.01}{p^{4}}\times 24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i}+\sum\limits^{p}_{i=3}t_{i})\\\ ...\\\ \dfrac{0.6}{p^{3}}\times p+\dfrac{0.01}{p^{4}}\times 24\times(\sum\limits^{p}_{i=1}t_{i}+\sum\limits^{p}_{i=2}t_{i}+\sum\limits^{p}_{i=3}t_{i}+...+t_{p})\end{array}\right)_{\bm{\uptheta}^{*}=\bm{0}}=\dfrac{0.1\times ac^{2}}{p^{3}}\left(\begin{array}[]{c}1\\\ 2\\\ 3\\\ ...\\\ p-1\\\ p\end{array}\right)$ $\bm{u}_{2}=ac^{2}(3\sum\limits^{p}_{j\neq 1}L^{{}^{\prime\prime\prime}}_{jj1}(\bm{\uptheta}),...,3\sum\limits^{p}_{j\neq p}L^{{}^{\prime\prime\prime}}_{jjp}(\bm{\uptheta}))^{T}/6|_{\bm{\uptheta}^{*}=\bm{0}}$= $\displaystyle\dfrac{ac^{2}}{2}\left(\begin{array}[]{l}(p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=1}t_{i}\right)\\\ (p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=1}t_{i}\right)+(p-2)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=2}t_{i}\right)\\\ ...\\\ (p-1)\left(\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=1}t_{i}\right)+...+\dfrac{0.6}{p^{3}}+\dfrac{0.01}{p^{4}}\times 24\sum\limits^{p}_{i=p-1}t_{i}\end{array}\right)$ $\displaystyle=\dfrac{0.3\times ac^{2}}{p^{3}}\left(\begin{array}[]{c}p-1\\\ (p-1)+(p-2)\\\ ...\\\ (p-1)+(p-2)+...+2+1\end{array}\right)$ $\bm{H}(\bm{\uptheta}^{*})=(L^{{}^{\prime\prime}}_{ij}(\bm{\uptheta}))_{ij}|_{\bm{\uptheta}^{*}=\bm{0}}$= $\displaystyle\left(\begin{array}[]{ccccc}\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}&...&\dfrac{2}{p^{2}}\\\ \dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times 2&...&\dfrac{2}{p^{2}}\times 2\\\ \dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times 3&...&\dfrac{2}{p^{2}}\times 3\\\ \dfrac{2}{p^{2}}\times&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times 3&...&\dfrac{2}{p^{2}}\times 4\\\ ...\\\ \dfrac{2}{p^{2}}&\dfrac{2}{p^{2}}\times 2&\dfrac{2}{p^{2}}\times 3&...&\dfrac{2}{p^{2}}\times p\end{array}\right)=\dfrac{2}{p^{2}}\left(\begin{array}[]{cccccc}1&1&1&1&...&1\\\ 1&2&2&2&...&2\\\ 1&2&3&3&...&3\\\ 1&2&3&4&...&4\\\ ...\\\ 1&2&3&4&...&p\end{array}\right)$ In many practical cases, we set $\upalpha$ in the gain sequence $a_{k}=a/(k+1)^{\upalpha}$ less than 1, so the $\upbeta^{+}=0$. Then $\bm{S}=(a\bm{H}(\bm{\uptheta}^{*})-\dfrac{\upbeta^{+}}{2}\bm{I})^{-2}$= $\displaystyle\dfrac{p^{4}}{4a^{2}}\left(\begin{array}[]{ccccccccc}5&-4&1&0&0&...&0&0&0\\\ -4&6&-4&1&0&...&0&0&0\\\ 1&-4&6&-4&1&...&0&0&0\\\ 0&1&-4&6&-4&...&0&0&0\\\ ...\\\ 0&0&0&0&...&1&-4&6&-3\\\ 0&0&0&0&...&0&1&-3&2\end{array}\right)$ Then we could calculate the key terms: $\displaystyle\begin{split}&\bm{u}^{T}_{1}\bm{Su}_{1}=\dfrac{0.01\times c^{4}}{4a^{2}p^{2}};\\\ &\bm{u}^{T}_{1}\bm{Su}_{2}=0;\\\ &\bm{u}^{T}_{2}\bm{Su}_{2}=\dfrac{0.09\times c^{4}(p-1)}{4a^{2}p^{2}}.\end{split}$ So, we will have: $\displaystyle 2\bm{u}^{T}_{1}\bm{Su}_{1}+\bm{u}^{T}_{1}\bm{Su}_{2}=\dfrac{0.01\times c^{4}}{2a^{2}p^{2}}.$ (14) Since $p$ represents an integer larger than 1, the above term is always positive. According to Proposition 3, it is known that the asymptotic MSE value of SPSA with Bernoulli is smaller than the MSE for RDSA with Gaussian (or other perturbation with fourth moment of its distribution being 3 and the product of two separate second moments being 1). The corresponding numerical experiment is shown in the next section. Moreover, we can obtain the MSE value for each case: $\displaystyle\begin{split}&Q_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2})=\dfrac{0.09c^{4}p-0.08c^{4}}{4a^{2}p^{2}},\\\ &Q_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2})=\dfrac{0.09c^{4}}{4a^{2}p},\\\ &D=\dfrac{\sigma^{2}}{8c^{2}}\sum\limits_{i}\dfrac{1}{\uplambda_{i}}\;\;\;\;(\uplambda_{i}\;\text{are\;the\;eigenvalues\;of\;matrix\;}a\bm{H}(\bm{\uptheta}^{*})).\end{split}$ From Table 2, we find that the asymptotic MSE value of Bernoulli will always be smaller than that of Gaussian since $Q_{1}<Q_{2}$. Also, we find that the MSE value of Uniform Spherical will be smaller than Gaussian with the coefficient in front of $Q_{2}$ being less than 1. For the U-shape, there is no certain conclusion for the relative MSE value since one contribution $D$ is going down while the other one $Q_{1}$ is going up. ### 3.5 A More Straightforward Look We can have a more straightforward understanding of the comparison of $Q_{1}$ and $Q_{2}$ by looking in a 2-dim way. Let $S,u_{1}$ and $u_{2}$ be scalars, set $x=\sqrt{S}u_{1},y=\sqrt{S}u_{2}$, then consider $(3x+y)^{2}-(x+y)^{2}$: $\displaystyle(3x+y)^{2}-(x+y)^{2}$ (15) $\displaystyle=9x^{2}+6xy+y^{2}-x^{2}-2xy-y^{2}=8x^{2}+4xy.$ (16) Under the following conditions, we will have (14) larger than 0. $\left\\{\begin{array}[]{lr}y\geq-2x\;\;\;\text{if\;}x>0\\\ y<-2x\;\;\;\text{if\;}x<0\end{array}\right.$ The shadow region in the following figure shows the area satisfying the above condition, which indicates a large probability, around 5/6 (more accurately, 1-2*arctan (0.5)) of $Q_{2}-Q_{1}>0$. In other words, there is a probability around 5/6 that SPSA with Bernoulli outperforms RDSA with Gaussian. Figure 1: Region of equation (14) being larger than 0 Then we are going to consider the high-dim case. Denote: $\displaystyle\begin{split}&{Q}_{1}=(\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(\bm{u}_{1}+\bm{u}_{2}),\\\ &{Q}_{2}=(3\bm{u}_{1}+\bm{u}_{2})^{T}\bm{S}(3\bm{u}_{1}+\bm{u}_{2}).\end{split}$ We would like to compare $Q_{2},Q_{1}$. Similar to the scalar case, set $\bm{x}=\bm{S}^{1/2}\bm{u}_{1},\bm{y}=\bm{S}^{1/2}\bm{u}_{2}.$ Then consider: $\displaystyle\bm{z}=Q_{2}-Q_{1}$ (17) $\displaystyle=(3\bm{x}+\bm{y})^{T}(3\bm{x}+\bm{y})-(\bm{x}+\bm{y})^{T}(\bm{x}+\bm{y})$ (18) $\displaystyle=4(2\bm{x}^{T}\bm{x}+\bm{x}^{T}\bm{y})$ (19) $\displaystyle=4\bm{x}^{T}(2\bm{x}+\bm{y})$ (20) Here we consider a simple case to have a straightforward understanding. Set $\bm{x},\bm{y}$ to be two independent random variables with uniform symmetrical distribution (i.e. $\bm{x}=(x_{1},x_{2},...,x_{p})^{T},\bm{y}=(y_{1},y_{2},...,y_{p})^{T},\;x_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a),y_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-b,b)$) and $\bm{S}$ to be the identical matrix. Then we have: $\displaystyle E(\bm{x}^{T}\bm{x})=E\left(\sum\limits^{p}_{i=1}x^{2}_{i}\right)=\sum\limits^{p}_{i=1}E(x^{2}_{i})=\sum\limits^{p}_{i=1}Var(x_{i})=\dfrac{a^{2}p}{3}.$ $\displaystyle E(\bm{x}^{T}\bm{y})=E\left(\sum\limits^{p}_{i=1}x_{i}y_{i}\right)=\sum\limits^{p}_{i=1}E(x_{i})E(y_{i})=0.\;\;\;(\text{due\;to\;the\;independence})$ $\displaystyle E(\bm{z})=8E(\bm{x}^{T}\bm{x})+4E(\bm{x}^{T}\bm{y})=\dfrac{8a^{2}p}{3}.$ Furthermore, we use one-sided version of Chebyshev inequality to see the probability that $\bm{z}\leq 0$, which indicates $Q_{2}\leq Q_{1}$. The inequality states that $P(X\geq c)\leq Var(X)/[Var(X)+c^{2}]$. In our case, the inequality is in the form of: $\displaystyle P[(-\bm{z}+E(\bm{z}))\geq E(\bm{z})]$ $\displaystyle\leq\dfrac{Var[-\bm{z}+E(\bm{z})]}{Var[-\bm{z}+E(\bm{z})]+[E(\bm{z})]^{2}}$ (21) $\displaystyle=\dfrac{Var(\bm{z})}{Var(\bm{z})+[E(\bm{z})]^{2}}.$ (22) To simplify the calculation, we set $x_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a),y_{i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-a,a)$. Then we have: $\displaystyle Var(\bm{z})$ $\displaystyle=Var(8\bm{x}^{T}\bm{x})+Var(4\bm{x}^{T}\bm{y})+Cov(8\bm{x}^{T}\bm{x},4\bm{x}^{T}\bm{y})$ $\displaystyle=64Var\left(\sum\limits^{p}_{i=1}x^{2}_{i}\right)+16Var\left(\sum\limits^{p}_{i=1}x_{i}y_{i}\right)=\dfrac{64pa^{4}}{5}+\dfrac{16pa^{4}}{9}=16\times\dfrac{41pa^{4}}{45}.$ Plug it into the inequality (20), it looks like: $\displaystyle P(\bm{z}\leq 0))$ $\displaystyle\leq\dfrac{Var(\bm{z})}{Var(\bm{z})+[E(\bm{z})]^{2}}$ (23) $\displaystyle=\dfrac{16\times\dfrac{41pa^{4}}{45}}{16\times\dfrac{41pa^{4}}{45}+\dfrac{64p^{2}a^{4}}{9}}$ (24) $\displaystyle=\dfrac{41}{41+20p}.$ (25) Inequality (23) shows that as the dimension $p$ increases, the probability of $\bm{z}\leq 0$ decreases. Here we make a simulation by setting a range of dimension from 1 to 10 and then take 100,000 independent trials to calculate the probability, i.e. $P(\bm{z}\leq 0)$ with $\bm{S}=\bm{I};\;\bm{u}_{1i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-100,100);\;\bm{u}_{2i}\stackrel{{\scriptstyle\text{i.i.d}}}{{\sim}}U(-100,100),\;i=1,2,...,p$. The result is shown in the following Table 3, demonstrating a decreasing trend when the dimension gets large. Also, it shows consistency with the conclusion in the scalar case, namely, when $p=1,P(z\leq 0)\approx\dfrac{1}{6}$. Table 3: Relationship Between Dimension and $P(\bm{z}\leq 0)$ Dim | 1 | 2 | 3 | 4 | 5 ---|---|---|---|---|--- $\bm{P}(\bm{z}\leq 0)$ | 0.12546 | 0.0336 | 0.00932 | 0.00252 | 0.00071 Dim | 6 | 7 | 8 | 9 | 10 $\bm{P}(\bm{z}\leq 0)$ | 0.00024 | $9\times 10^{-5}$ | $3\times 10^{-5}$ | 0 | 0 As Table 3 indicates, if we consider those high-dimension cases, there will be a tiny probability that $Q_{2}\leq Q_{1}$, i.e. SPSA with Bernoulli will highly probably beat RDSA with Gaussian from the perspective of a smaller MSE. However, it should be noticed that the above case is based on a simple simulated setting, which aims at providing an intuitive view at the comparison of Gaussian and Bernoulli. In the next section, we will show how Proposition 3 works more specifically by some numerical experiments. ## 4 Numerical Experiment ### 4.1 Numerical Example 1 Consider the loss function [3]: $L(\uptheta)=||\uptheta||^{2}+\sum\limits_{i=1}^{p}e^{t_{i}/p},$ where $\bm{\uptheta}=[t_{1},t_{2},...,t_{p}]^{T}$ and the minimum occurs at $\bm{\uptheta}^{*}$ with each component $-0.033$, such that $L(\bm{\uptheta}^{*})=29.99994$. This is a convex function with third- derivative being nonzero and cross third-derivative being zero. Namely, in our case, we have $\bm{u}_{2}=\bm{0}$ and $\bm{u}_{1}>\bm{0}$. So according to the Corollary in Proposition 3, SPSA with Bernoulli has lower MSE than RDSA with Gaussian. Let $p=30$ and take 100 independent trials, each with 3000 iterations. Results are presented in Fig 2 and Table 4. We assume the noise term has distribution $N(0,0.01)$ and gain sequence as $a_{k}=0.05/(k+1)^{0.602},\,c_{k}=0.3/(k+1)^{0.101}$. Set the initial point $\hat{\bm{\uptheta}}_{0}=[1,1,...,1]^{T}$. The results are shown below. The lowest MSE is highlighted in bold in Table 4 and other numerical results below. Figure 2: Mean Square Error, computed as an average over 100 trials, plotted the last 200 iterations for different random perturbation distributions Table 4: MSE and confidence interval in SPSA and RDSA with different perturbations with same gain sequences in all algorithms Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 0.01318 | [0.01281, 0.01354] U-shape($\bm{x^{10}}$) SP | 0.01301 | [0.01266, 0.01336] Gaussian RD | 0.01325 | [0.01290, 0.01359] Uniformly Spherical RD | 0.01319 | [0.01285, 0.01355] The experimental result shows consistency with the Proposition 3. The confidence intervals show overlap among the four and then we conduct the two- sample $t$-test between the Bernoulli and Gaussian cases and obtain the $p$-value 0.35982, which is larger than the common threshold, 0.05, indicating that the difference is not statistically significant. The reason is that in this case, the $D$ value (shown in the Table 2) is much larger than the term $\bm{u}_{1}^{T}\bm{Su}_{1}$ so that it dominates the whole MSE value. So the MSE of SPSA with Bernoulli is slightly smaller than that of RDSA with Gaussian. Moreover, we notice that the MSE of U-Shape distributed perturbation is the smallest one which can also be explained by the 0.9 in front of the value $D$. ### 4.2 Numerical Example 2 Consider the Ackley Function with dimension $p=30$: $\displaystyle L(\bm{\uptheta})$ $\displaystyle=-a\times\text{exp}\left(-b\sqrt{\dfrac{1}{30}\sum\limits^{d}_{i=1}t^{2}_{i}}\right)-\text{exp}\left(\dfrac{1}{30}\sum\limits^{d}_{i=1}\text{cos}(ct_{i})\right)+a+e,$ where $a=20,b=0.2,c=2\pi,\,\bm{\uptheta}=[t_{1},t_{2},...,t_{30}]$ and $L(\bm{\uptheta})=0$ at $\bm{\uptheta}^{*}=[1,1,...,1]^{T}.$ Here, we assume the noise term has distribution $N(0,0.01)$ and gain sequence as $a_{k}=0.02/(k+1+A)^{0.602},\;A=10,\,c_{k}=0.2/(k+1)^{0.101}$. Set the initial point $\hat{\bm{\uptheta}}_{0}=[0.2,0.2,...,0.2]^{T}$. In this case, there are no cross-third derivatives, i.e. $\bm{u}_{2}=\bm{0}$. By Proposition 3, SPSA with Bernoulli would have smaller MSE value than RDSA with Gaussian. Take 100 independent trials, each with 5000 iterations. The results are shown in Fig 3 and Table 5: Figure 3: Mean Square Error, computed as an average over 100 trials, plotted the last 500 iterations for different random perturbation distributions Table 5: MSE and its Confidence Interval in SPSA and RDSA with different perturbations with same gain sequences in all algorithms Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 0.00041 | [0.00038, 0.00044] U-shape ($x^{10}$) SP | 0.00043 | [0.00041, 0.00045] Uniformly Spherical RD | 0.00054 | [0.00051, 0.00056] Gaussian RD | 0.00057 | [0.00054, 0.00060] The MSE value of SPSA with Bernoulli case is lower than that of RDSA with Gaussian case, which is accordant with the Proposition 3. Notice that the confidence interval of the two cases does not overlap and we take the two- sample $t$-test between them and gain the $p$-value $5.96\times 10^{-13}$, which indicates that the difference is significant. ### 4.3 Numerical Example 3 To give a more specific example. Consider the skewed-quartic function: $L({\bm{\uptheta}})={\bm{\uptheta}}^{T}{\bm{B}}^{T}{\bm{B\uptheta}}+0.1\sum\limits^{p}_{i=1}({\bm{B\uptheta}})^{3}_{i}+0.01\sum\limits^{p}_{i=1}({\bm{B\uptheta}})^{4}_{i}.$ #### 4.3.1 Optimal Gain Sequence Searching We consider searching the ‘optimal gain sequence’ for $a_{k}$ and $c_{k}$ in the gain sequence with the smallest MSE value, i.e. set $a_{k}=a/(k+A+1)^{\alpha},\;c_{k}=c/(k+1)^{\gamma}$ and keep $A=10$. Then set the search range of $a$ and $c$ to be 0.1 to 1, with interval 0.02 and pick the sequence leading to the lowest MSE value. The ‘optimal gain sequence’ for each case has been listed in Table 6. Particularly, in order to satisfy that $\bm{\upmu}\neq\bm{0}$ in (9), we set $\upalpha=0.606,\upgamma=0.101$ in the gain sequence. Table 6: Optimal Gain Sequence for Algorithms with distinct Perturbations Perturbation | $a_{k}$ | $c_{k}$ ---|---|--- Bernoulli SP | $0.12/(k+11)^{0.606}$ | $0.8/(k+1)^{0.101}$ U-shape ($x^{10}$) SP | $0.1/(k+11)^{0.606}$ | $0.48/(k+1)^{0.101}$ Uniformly Spherical RD | $0.1/(k+11)^{0.606}$ | $0.42/(k+1)^{0.101}$ Gaussian RD | 0.1/$(k+11)^{0.606}$ | $0.58/(k+1)^{0.101}$ #### 4.3.2 Further Comparison In order to conduct a further comparison of the performance of RDSA and SPSA algorithm, as well as work in connection with our previous theoretical calculation, we are going to apply the optimal gain sequence for each distribution to the other three distributions and see the result. That is, in 1)-4) below, we, in turn, pick one of the pairs {$a_{k},c_{k}$} in Table 6 and run all four methods at the chosen gain sequence. This will demonstrate each method in its best configuration. Then we mainly focus on the Bernoulli and Gaussian to see their comparison. * 1) Apply the optimal gain sequence for Bernoulli, i.e. set $a_{k}=0.12/((k+11)^{0.606}),c_{k}=0.8/((k+1)^{0.101}$ for the four methods. The result is shown in Fig 4 and Table 7. Figure 4: Mean Square Error, computed as an average over 100 trials each of 4000 iterations with the optimal gain for Bernoulli distributed perturbation in SPSA, plotted the last 500 iterations for different random direction distributions Table 7: MSE for Skewed Quartic Loss Function and its Confidence Interval (Gain Sequence $a_{k}=0.12/((k+11)^{0.606}),c_{k}=0.8/((k+1)^{0.101}$) Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 6.3368 | [6.0959, 6.5778] U-shape ($x^{10}$) SP | 6.3557 | [6.0536, 6.6579] Uniformly Spherical RD | 6.6240 | [6.3064, 6.9416] Gaussian RD | 6.6132 | [6.2637, 6.9626] We find that the Bernoulli performs the best, then the U-shape, Uniformly Spherical and Gaussian being the worst one. It is accordant with the previous Table 2. Also, we find that the 95% confidence interval of Bernoulli and Gaussian does not overlap. The two-sample test between Bernoulli and Gaussian produces the $p$-value 0.0040573, indicating that the difference is significant. * 2) Apply the optimal gain sequence for U-shape, i.e. set $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.48/((k+1)^{0.101}$ for the four methods. The result is shown in Fig 5 and Table 8. Figure 5: Mean Square Error, computed as an average over 100 trials each of 4000 iterations with the optimal gain for U-shape in SPSA, plotted the last 500 iterations for different random direction distributions Table 8: MSE for Skewed Quartic Loss Function and its Confidence Interval (Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.48/((k+1)^{0.101}$) Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 6.3784 | [6.1038, 6.6531] U-shape($\bm{x^{10}}$) SP | 6.3540 | [6.0761, 6.6320] Uniformly Spherical RD | 6.6257 | [6.3150, 6.9365] Gaussian RD | 6.5604 | [6.2803, 6.8406] * 3) Apply the optimal gain sequence for Uniform Spherical, i.e. set $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.42/((k+1)^{0.101}$ for the four methods. The result is shown in Fig 6 and Table 9. Figure 6: Mean Square Error, computed as an average over 100 trials each of 4000 iterations with the optimal gain for Uniform Spherical in RDSA, plotted the last 500 iterations for different random direction distributions Table 9: MSE for Skewed Quartic Loss Function and its Confidence Interval (Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.42/((k+1)^{0.101}$) Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 6.7323 | [6.4523,7.0123] U-shape ($x^{10}$) SP | 6.7012 | [6.4212,6.9812] Uniformly Spherical RD | 6.4436 | [6.1636,6.7236] Gaussian RD | 7.0789 | [6.7889,7.3689] We find that under such gain sequence, the Uniform Spherical performs the best and Bernoulli still outperforms Gaussian, consistent with the Table 2. We then conduct the two-sample $t$-test between Bernoulli and Gaussian and obtain the $p$-value 0.121487, indicating that the difference is not statistically significant. * 4) Apply the optimal gain sequence for Gaussian, i.e. set $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.58/((k+1)^{0.101}$ for the four methods. The result is shown in Fig 7 and Table 10. Figure 7: Mean Square Error, computed as an average over 100 trials each of 4000 iterations with the optimal gain for Gaussian distributed perturbation in RDSA, plotted the last 500 iterations for different random direction distributions Table 10: MSE for Skewed Quartic Loss Function and its Confidence Interval (Gain Sequence $a_{k}=0.1/((k+11)^{0.606}),c_{k}=0.58/((k+1)^{0.101}$) Perturbation | MSE | 95% CI ---|---|--- Bernoulli SP | 6.4928 | [6.2314, 6.7542] U-shape ($x^{10}$) SP | 6.9915 | [6.7374, 7.2456] Uniformly Spherical RD | 7.4873 | [7.1479, 7.8267] Gaussian RD | 6.5534 | [6.2897, 6.8171] In this case, although the optimal gain sequence of Gaussian has been applied and the Gaussian reaches its lowest MSE, it is still smaller than the MSE of Bernoulli, which can be a strong support for the theoretical conclusion shown in Proposition 3. The two-sample test between Bernoulli and Gaussian produces the $p$-value 0.2431523, indicating that the difference is not statistically significant. From above four experiments, all the four algorithms show their best performance from the perspective of a lowest MSE when their optimal gain sequence is applied. The tables show that no matter in which case, SPSA with Bernoulli beats RDSA with Gaussian, showing consistency with Proposition 3. ## 5 Conclusion This paper provides a strict derivation for several essential terms in the RDSA algorithm and presents a comparison of the asymptotic MSE between RDSA and SPSA. Furthermore, this paper presents specific conditions under which SPSA with Bernoulli perturbation works better in the MSE sense than RDSA with Gaussian perturbation, which may provide practitioners a general guidance in the practical cases. In particular, it is found that SPSA outperforms RDSA across the large majority of implementation cases with different gain sequences and types of loss functions. There are several directions for future research. First, we can consider extra types of random directions with different distributions. Second, more work related to robustness and relative efficiency would be useful. Third, since this paper mainly focuses on Bernoulli and Gaussian cases, more general cases could be considered for the comparison of MSE between SPSA and RDSA. It would also be of interest to carry out a comparison such as that above for both second-order or non-continuous versions of SPSA and RDSA, such as presented in [16], [19], [17], [21], and [10], and constant-gain (step size) versions, such as in [8], [20], and [11]. ## References * [1] Shalabh Bhatnagar, Harshika Prasad, and L. A. Prashanth. Stochastic recursive algorithms for optimization. Simultaneous perturbation methods, volume 434. Jan 2013. * [2] A. Blakney and J. Zhu. A comparison of the finite difference and simultaneous perturbation gradient estimation methods with noisy function evaluations. In 2019 53rd Annual Conference on Information Sciences and Systems (CISS), pages 1–6, 2019. * [3] D. C. Chin. Comparative study of stochastic algorithms for system optimization based on gradient approximations. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 27(2):244–249, 1997. * [4] Karla Hernández Cuevas. Cyclic stochastic optimization: Generalizations, convergence, and applications in multi-agent systems, PhD Dissertation, Johns Hopkins University, https://arxiv.org/abs/1707.06700, 2017. * [5] Vaclav Fabian. On asymptotic normality in stochastic approximation. The Annals of Mathematical Statistics, 39(4):1327–1332, 1968. * [6] Karla Hernández and J. C. Spall. Generalization of a result of Fabian on the asymptotic normality of stochastic approximation. Automatica, 99:420 – 424, 2019. * [7] J.L.Doob. Stochastic Process. New York: Wiley, 1953. * [8] Itsuro Kajiwara, Keiichiro Furuya, and Shinichi Ishizuka. Experimental verification of a real-time tuning method of a model-based controller by perturbations to its poles. Mechanical Systems and Signal Processing, 107:396–408, 2018. * [9] H. J. Kusher and G. Yin. Random directions methods in stochastic approximation. In Proceedings of the 36th IEEE Conference on Decision and Control, pages 3430–3435 vol.4, 1997. * [10] L. A. Prashanth, S. Bhatnagar, M. Fu, and S. Marcus. Adaptive system optimization using random directions stochastic approximation. IEEE Transactions on Automatic Control, 62(5):2223–2238, 2017\. * [11] A. Ramaswamy. DSPG: Decentralized simultaneous perturbations gradient descent scheme. In 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pages 54–62, Los Alamitos, CA, USA, Mar 2020. IEEE Computer Society. * [12] J. C. Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation. IEEE Transactions on Automatic Control, 37(3):332–341, 1992\. * [13] J. C. Spall. Developments in stochastic optimization algorithms with gradient approximations based on function measurements. In Proceedings of Winter Simulation Conference, pages 207–214, 1994\. * [14] J. C. Spall. An overview of the simultaneous perturbation method for efficient optimization. Johns Hopkins APL Technical Digest, 19:482–492, 1998. * [15] J. C. Spall. Introduction to stochastic search and optimization: estimation, simulation, and control, volume 65. John Wiley & Sons, 2005. * [16] J. C. Spall. Feedback and weighting mechanisms for improving Jacobian estimates in the adaptive simultaneous perturbation algorithm. IEEE Transactions on Automatic Control, 54(6):1216–1229, 2009. * [17] S. Sun and J. C. Spall. SPSA method using diagonalized Hessian estimate. In 2019 IEEE 58th Conference on Decision and Control (CDC), pages 4922–4927, 2019. * [18] J. Theiler and J. Alper. On the choice of random directions for stochastic approximation algorithms. IEEE Transactions on Automatic Control, 51(3):476–481, 2006\. * [19] L. Wang, J. Zhu, and J. C. Spall. Mixed simultaneous perturbation stochastic approximation for gradient-free optimization with noisy measurements. In 2018 Annual American Control Conference (ACC), pages 3774–3779, 2018. * [20] J. Zhu and J. C. Spall. Stochastic approximation with nondecaying gain: Error bound and data-driven gain-tuning. International Journal of Robust and Nonlinear Control, 30(15):5820–5870, 2020. * [21] J. Zhu, L. Wang, and J. C. Spall. Efficient implementation of second-order stochastic approximation algorithms in high-dimensional problems. IEEE Transactions on Neural Networks and Learning Systems, 31:3087–3099, 2020.
arxiv-papers
2021-07-24T05:50:17
2024-09-04T03:07:21.447185
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Yiwen Chen", "submitter": "Yiwen Chen", "url": "https://arxiv.org/abs/2107.12771" }
2107.12772
# Collaborative Software Modeling in Virtual Reality Enes Yigitbas, Simon Gorissen, Nils Weidmann, Gregor Engels Paderborn University, Germany [email protected] ###### Abstract Modeling is a key activity in conceptual design and system design. Through collaborative modeling, end-users, stakeholders, experts, and entrepreneurs are able to create a shared understanding of a system representation. While the Unified Modeling Language (UML) is one of the major conceptual modeling languages in object-oriented software engineering, more and more concerns arise from the modeling quality of UML and its tool-support. Among them, the limitation of the two-dimensional presentation of its notations and lack of natural collaborative modeling tools are reported to be significant. In this paper, we explore the potential of using Virtual Reality (VR) technology for collaborative UML software design by comparing it with classical collaborative software design using conventional devices (Desktop PC / Laptop). For this purpose, we have developed a VR modeling environment that offers a natural collaborative modeling experience for UML Class Diagrams. Based on a user study with 24 participants, we have compared collaborative VR modeling with conventional modeling with regard to efficiency, effectiveness, and user satisfaction. Results show that the use of VR has some disadvantages concerning efficiency and effectiveness, but the user’s fun, the feeling of being in the same room with a remote collaborator, and the naturalness of collaboration were increased. ###### Index Terms: Collaborative Modeling, Virtual Reality, UML ## I Introduction In modern software development collaboration between developers is one of the driving factors that determines the quality and speed at which the projects can be realized. One central artifact of communication and discussion in software engineering are models [1]. The Unified Modeling Language (UML) with its associated diagrams is one of the most well known general-purpose modeling languages in software engineering and is considered by many as ”lingua franca” for software engineers [2]. However, researchers and software designers have realized the insufficiency of UML in its expressiveness since it is restricted to a two-dimensional plane. These insufficiencies include a lack of dynamic expression and interaction ability between groups of remote designers [3], [4] as well as the complexity for large models [5]. Furthermore, the authors in [6] argue that the dissatisfaction of developers with UML tools is one of the reasons it has not been adopted more universally, exemplifying the need for improving the tool support. Since the COVID-19 pandemic has spread around the world, this need for good UML tool support has only increased. Many educational institutions, like schools and universities, around the world have been forced to switch to online education settings to support social distancing. Likewise, millions of workplaces wherever possible were transitioned to home office. To enable collaboration for software engineers in such situations, tools are needed that offer support for creating and discussing models from remote locations. While classical modeling applications, like Lucidchart [7] or GenMyModel [8], support remote collaboration, they do not overcome the mentioned issues with regard to visualization and collaboration as they are mostly relying on a 2D UML notation and do not support a natural way of collaboration comparable to editing a model on a whiteboard while situated together in one room. Virtual Reality technology, on the other hand, is becoming increasingly sophisticated and cost-effective and can be applied to many areas such as training [9], robotics [10], education [11], healthcare [12], and even Information Systems (IS) research, to simulate a real environment or represent complicated scenarios. Modern Head Mounted Display (HMD) Virtual Reality (VR) devices have several technological capabilities that are not present on conventional devices (Desktop PC / Laptop): (1) Stereoscopic 3D Images, (2) Six Degrees of Freedom, (3) Hand Presence Support. and (4) 3D Spatial Voice Chat. Since HMD devices show a slightly different image to each eye, they can invoke the perception of a truly 3D virtual world that the user inhabits. These Stereoscopic 3D Images are more in line with the visual experience of the real world compared to images on a 2D screen, since people also perceive the real world in 3D, not in 2D. In VR, users can also look around in the virtual world by simply moving their heads, like they would in a real environment. In addition to this rotational movement, modern VR devices can also track the positional movement of a user, independent of the direction the user moves in. This means, the user has Six Degrees of Freedom (three rotational and three positional axes) in her movement and the VR system can adapt the view and position of the user in the virtual world accordingly. Additionally, typical VR controllers are used single-handedly with each controller representing one hand in the virtual world. This Hand Presence Support allows a user to make natural gestures like grabbing an object and pointing at things to interact with the virtual world. With the means of 3D Spatial Voice Chat, it is possible to make users feel like the voices of their collaborators come with the volume level (distance-based) and from the direction that their virtual representations (i.e. Avatars) are in. Overall, the fast development in VR concerning prototyping [13] and engineering of VR applications [14] as well as the mentioned technological advances allow us to extend the research field to improve the quality of UML and collaborative modeling. Thus, the main goal of this paper is to explore the potential of using Virtual Reality (VR) technology for collaborative UML software design by comparing it with classical collaborative software design using conventional devices (Desktop PC / Laptop). For this purpose, we have developed a VR modeling environment, called VmodlR, that offers a natural collaborative modeling experience for UML Class Diagrams. Based on a user study with 24 participants, we have compared collaborative VR modeling with conventional modeling with regard to efficiency, effectiveness, and user satisfaction. The rest of the paper is structured as follows. In Section 2, we present and discuss the related work. In Section 3, we describe the conceptual solution of our VR-based collaborative modeling environment VmodlR. In Section 4, we show the details of the implementation of VmodlR. In Section 5, we present and discuss the main results of the usability evaluation. In Section 6, we conclude the paper and give an outlook for future work. ## II Related Work Model-based and model-driven development methods have been discussed in the past for various application domains such as intelligent user interfaces [15, 16, 17], usability engineering [18, 19, 20], digital twins [21, 22] or business model development [23, 24]. In the following, we draw on prior research into Collaborative Modeling, 3D Modeling, and Immersive Modeling. ### II-A Collaborative Modeling In previous work, the topic of collaborative software modeling was already researched from different perspectives [25]. In [26], the authors present a distributed UML editor that aims to transfer collaborative discussion and editing of UML models from regular meeting rooms to remote settings using regular computers. In addition, a collaborative learning environment for UML modeling is presented in [27]. Furthermore, [28] introduces an approach to a real-time synchronous collaborative modeling of software systems using 3D UML. Besides these approaches from research, there are also many commercial tools supporting collaborative software modeling. Lucidchart is a web-based commercial tool for collaboratively creating diagrams [7]. It includes support for many diagram types and modeling languages like UML, Business Process Model Notation (BPMN), Enterprise Relationship models, and more. The tool shows a 2D canvas where standard 2D diagrams can be created. Since Lucidchart is web- based, it can be used by any device that runs a modern browser, although as with many web-based contents the experience can be assumed to be best suited to the use on desktop and laptop computers and is not specifically adopted to the possibilities of VR devices. Released by Axellience in 2014, GenMyModel [8] is a web-based tool similar to Lucidchart. GenMyModel supports a subset of the most commonly used UML diagrams, i.e., Class, Use Case, Component, Object, State, Deployment, Activity, and Sequence Diagrams. Axellience describes the mode of collaboration as similar to how Google Drive or Microsoft Office online collaboration works. So users can see where their co-workers are editing the model but do not have an integrated voice chat to discuss those changes. This has to be done via an external tool. The system aims to support the language’s visual representations according to their official definitions and thus only presents 2D models to the users. While the above-described approaches mostly support collaborative modeling based on standard 2D UML diagrams, they do not support immersive VR. ### II-B 3D Modeling The authors in [29] presented a conceptual system that visualizes UML Class and Sequence Diagrams in 3D. The Sequence Diagrams are displayed in the context of the Classes they belong to and animated to emphasize their connection. Furthermore, the authors in [30] have also discussed a conceptual approach to extending 2D UML Diagrams to the third dimension. They introduce some modeling quality attributes and explain how VR can improve the UML modeling quality according to these attributes. For example, they argue that the model’s ”understandability” can be improved through VR’s ”Immersion” and ”Stereopsis” (Stereoscopic 3D presentation) features. Subsequently, they provide some examples of a Class Diagram and a Sequence Diagram that are visualized in 3D and demonstrate their advantages in comparison to a 2D representation. In [31], the authors proposed VisAr3D, a 3D visualization tool for UML models to make large models easier to comprehend, especially by inexperienced modelers like students. The system automatically converts a 2D UML model from an .xmi file into its 3D representation. The virtual environment the 3D UML models are placed in can be viewed through a web-based app and does not support HMDs. Their prototype is not a model editor, however, it only visualizes UML models in 3D. This approach was evaluated based on a user study assessing the effect of the 3D compared to a 2D representation. The main results show that the 3D representation aided the understandability of large models, ”increased students’ interest” and supported teaching purposes [31]. In [32], the authors described an implementation that visualized a process model in a 3D virtual world on a desktop computer. It is a training system intended to aid a single user in understanding Business Process Models through 3D visualization. They evaluate how the 3D representation assists the user in learning the modeled process compared to a standard 2D model representation. They conclude that the 3D representation provides a noticeable learning benefit. It is not a modeling tool, however, only a visualization and training tool. Further examples for approaches which make use of a 3D representation of UML models can be found in [33, 34, 35, 36]. In summary, a modeling approach that combines and integrates the aspects of 3D modeling, collaboration, and VR in one solution is not fully covered and yet existing. ### II-C Immersive Modeling in AR and VR In the following, AR- and VR-based approaches for modeling purposes will be briefly described and discussed. Although VR is our main focus, we included AR approaches to cover immersive modeling approaches on the whole. Augmented Reality (AR) is closely related to VR with the main difference being that VR immerses a user in a completely virtual world while AR does not isolate the user from the real world by displaying virtual objects in the real environment. In general, AR has been already applied for different aspects such as robot programming [37], product configuration (e.g., [38], [39]), planning and measurements [40] or for realizing smart interfaces (e.g., [41], [42]). To be more specific, example approaches that apply AR for software modeling are as follows. The authors in [43] have presented a framework that is supposed to allow editing and viewing UML models in a 3D space through the Microsoft Hololens AR Glasses. Their approach is to overlay 3D model elements over real scenery so the user can move around and inside the model while not being shut off from the real world. In this way, their prototype only displays static objects that are meant to represent UML models. Similarly, in [44], the authors proposed a system that aims to make learning UML more accessible by displaying it in 3D as overlays to the natural environment using the Microsoft Hololense. The system supports creating and editing UML Class Diagrams but is only intended for single users and does not support collaboration. Furthermore, in [45] the authors introduce the concept of ”HoloFlows” to support the modelling of processes for the internet of things in mixed reality. A similar solution is introduced in [46] where the authors present an approach for supporting domain-specific modelling environments based on AR. The main drawback of AR-based solutions for modeling is the small field of view which narrows down the possibilities for modeling support. Therefore, we have explored an alternative solution in VR. Focusing on VR-related approaches for software modeling, we can see that many previous works already have seen the potential in using VR for improving modeling activities. In [47], for example, the authors have presented a system that analyses an object-orientated code base and visualizes its classes, attributes, and relations automatically in a 3D virtual environment that users can inspect inside a Cave Automatic Virtual Environment (CAVE). So it supports VR only in a broader sense. The application is not networked and does not support editing the model, it is only a visualization tool. In [48], the authors have proposed a system for HMD VR devices that can import a Finite State Machine (FSM) and visualize it in a game-like environment where players stand on islands representing states and can change islands via different boats representing the possible transitions. It is a single-player game environment meant for educational purposes and does not support UML modeling with actual UML Diagram elements or remote collaboration. In [49], the authors have presented a HMD VR system for visualizing process models in 3D. Therein, the models can be annotated but not edited. They evaluated the effectiveness, efficiency, and intuitiveness of the VR visualization in comparison to (1) paper and (2) desktop tool based BPMN and found that the effectiveness was equivalent between VR and desktop but task completion in VR was faster than with the BPMN tool and the users found the VR controls very intuitive. ## III Solution Overview The system overview of our VR-based collaborative modeling environment VmodlR is shown in Fig. 1. The top half of this figure represents User A and the Virtual Environment she accesses through a VR Device. The bottom half symmetrically shows a remote collaborator, User B, and the VR Device she uses to access the same shared Virtual Environment. Through the VR Device, each User is represented in the Virtual Environment as a Virtual Character. The View Orientation and Position of the VR Device together with the Controller Input controls the Virtual Character while the Virtual Environment with its content is displayed from the Virtual Character’s perspective inside the VR Device. Figure 1: System overview of VmodlR Through the Virtual Character, each User interacts with the elements inside the Virtual Environment: The 3D Model can be edited by either directly editing model elements (e.g. creating, deleting, or moving them), or through the VR Text Input component that is used to edit the text inside the 3D Model, for example, the Class names. All those changes to the model are synchronized between users through the Network Synchronization component. In the case of this solution, the 3D Model is a three-dimensional UML Class Diagram, but theoretically, this could be adapted to any kind of conceptual model. Through their Virtual Characters, Users can also interact with each other via Network Synchronization which transmits their voices and synchronizes their body and hand movements. This is visualized in Fig. 1 as the Synchronize Movements & Communication interface between the Virtual Characters and the Network Synchronization. The Network Synchronization component then ensures that the Virtual Environment and its content is synchronized between the Users through the Cloud. It offers several different services that can be used by other components to synchronize all necessary aspects of the Virtual Environment. In the following, each of the main components Virtual Environment, Network Synchronization, Virtual Character, 3D Models, and VR Text Input will be described in more detail. ### III-A Virtual Environment The Virtual Environment consists of all virtual elements that are needed to provide a collaborative software modeling environment. Within this environment, each user can see and move around via their VR Device in 3D. As a design decision for the Virtual Environment, we opted to use an open space instead of a closed one to not introduce some unrealistic environment behavior or limit the user’s ability to create large models. Since there is no open environment that could be considered natural for creating conceptual models, any space that offers a planar ground for the user to walk on could be chosen. We decided on a grass field under a blue sky because it does not limit the 3D space available to the user and depicts a pleasant real-world environment that users are familiar with. ### III-B Network Synchronization All elements inside the Virtual Environment have to be synchronized through the Network Synchronization component. We will briefly describe how this networking generally works in this conceptual solution. The networking has a server-based architecture where all users connect to a server and the server synchronizes instances of a Virtual Environment between all users that are currently in that environment. It is important to understand that a networked environment is not a singular environment. Instead, on each user’s VR Device (clients) a local version of the networked environment exists, so the user can look around in it and interact with it. All the changes the user can thereby make inside the Virtual Environment, like moving their Virtual Character, are communicated to the server so it can update its reference representation of the networked environment and forward the changes to the local environments of all other clients. These clients then apply the changes accordingly to their local copies of the environment. This way, the local environments on all clients are always kept in sync with the server’s networked environment. Three components can be used to synchronize objects inside the Virtual Environment: The Movement Synchronization Service, the Event Synchronization Service, and the Voice Synchronization Service. The Movement\- and Event Synchronization Services can be more generally used. The difference between them is that the Movement Synchronization Service is dedicated to rapidly and frequently changing information, that need to be synchronized many times per second. In the case of movement, this is needed to show the movement of an object that is moved by a remote collaborator fluently to the local user. The Movement Synchronization Service also deals with tracking if a synchronized object that can be moved gets created or deleted. The Event Synchronization Service, on the other hand, is supposed to synchronize arbitrary events that happen rather infrequently and therefore only have to be synchronized occasionally, once they occur, instead of the constant synchronization needed for movement. This provides flexibility where something that only occasionally changes (like the name of a Class for example) can be synchronized via the Event Synchronization Service and otherwise does not consume network bandwidth while things that often change and have to be synchronized many times per second, like the movement of a Class or a Virtual Character’s Virtual Hands, can be synchronized fluently via the Movement Synchronization Service. Finally, the Voice Synchronization Service is dedicated to synchronizing the voices of users to enable voice chat inside our solution. ### III-C Virtual Character In VR, people can be represented by 3D characters through an avatar with a body, head, and hands. This way, a user can, for example, move around in the virtual environment and point with their finger in real life and the VR Controller can reproduce this gesture on the Virtual Character’s hands. Since this has the possibility to make discussions about models in VR much more natural than possible on PCs, these features were also included in the design of our solution and the hands’ gestures are synchronized across the network for each user, along with the positional audio of voices and the positions and orientations of Virtual Characters. Our solution supports this form of natural movement, where the Virtual Character and therefore the user’s view into the world changes according to the physical VR Headset movement. This is the ideal scenario for movement, where there is enough physical space available to the user to move anywhere she would want to go in the virtual world. However, this is hardly a realistic scenario since the models creatable in our solution can theoretically become arbitrarily large, meaning that the user would need an infinitely large physical space to move around in. Therefore, a secondary movement method, namely teleportation is required, that allows a user to move their Virtual Character through the environment without moving in the physical world. Teleportation involves the user entering a teleportation mode, for example through pressing or holding a specific button on one of the VR Controllers, and then aiming the controller at a spot that she wishes to teleport to. When either releasing the button or pressing it again the target position is selected and the Virtual Character is instantly teleported to the aimed location. With these two movement methods—natural walking and teleportation movement—the player can reach any position in the Virtual Environment independent of the size of physical space available to her while still moving in a rather natural way. ### III-D 3D Models Usually, modeling languages are only specified with 2D visual representations. UML is no exception from that rule. We could stick to those same 2D shapes inside a 3D world with users being able to position the 2D shapes freely in 3D. However, we believe using 3D shapes instead of 2D ones will likely result in a more natural experience for users because the real world only consists of 3D objects and we do not want the model elements to seem like foreign bodies in the Virtual Environment. The main shapes used to visualize UML elements in the 2D specification are rectangles and lines with different forms of arrowheads at the end of those lines. To ensure that users familiar with the 2D representations can learn the 3D ones easily we tried to find natural equivalents of the 2D shapes in 3D. The equivalent of rectangles in 3D are cubes and cuboids, while lines are best represented by thin tubes (see Fig. 2 (c)). A challenge of a 3D visualization of UML Classes is the text representation inside them. A 2D Class only has one side that the text is displayed on which always faces the user. Since the Class rectangles known from 2D are most similar to Cuboids in 3D, every UML Class is visualized as a cuboid in our solution (see Fig. 2 (a)). It can be assumed that the users can see at most three of the six sides of a cuboid at any given time. If the Class’s cuboid only displays the text on one side, this side could, thus, be hidden depending on the view direction that the user has towards the Class. Rotating the cubes automatically so the text-side always faces the user would be a possible solution to that. However, we wanted the user to be the only entity changing the model’s appearance, so the model seems more stable and thus natural. For these reasons, we chose to display the text associated with a Class on all sides of the Class. This means that every Class side basically shows the same 2D Class in a notation similar to 2D UML. Since all these sides belong to a single Class it is important that all sides always show the same content. ### III-E VR Text Input In VR, text input is more difficult compared to traditional computers due to the lack of a physical keyboard that provides haptic feedback on whether a key was hit or not. Since the user cannot see and use a real keyboard while in VR, virtual keyboards are often used instead. There are two basic types of keyboards regularly found in VR applications: Laser pointer and drum-style keyboards. Laser pointer style keyboards are usually displayed as a vertical plane in front of the user with each hand representing one laser pointer that can be used to press a key with a dedicated button. Since the buttons have to be rather large to be easily hittable, this input method requires a lot of space. An alternative to laser pointer keyboards are drum-style keyboards which we have chosen in our solution (see Fig. 2 (b)). These are shown in a horizontal, slightly tilted, form in front of the user like many real keyboards are as well. One virtual mallet is attached to each of the user’s hands that can be used to hit a key similar to how a person would hit a drum in the real world. Because of the obvious drum analogy, it can be assumed that this control scheme is also easy to understand for most users and could be more natural to use than laser pointers. ## IV Implementation As a target implementation platform for our collaborative VR modeling environment, we have chosen the Oculus Quest 2 which is a cable-free, mobile VR HMD. For the implementation of the VR environment, we have used the Unity 3D Game Engine developed by Unity Technologies [50] as it includes a fully featured Graphics, Sound and Physics Engine and has easy-to-use APIs for many different aspects like controller input. Furthermore, Unity also provides support for the Oculus Quest 2 among other Oculus VR headsets through an Oculus VR SDK. To enable remote collaboration, a networking system is needed that synchronizes aspects like model element- and user avatar positions, user hand gestures, etc. For the implementation of the networking system, we have used the Photon Unity Networking 2 (PUN2) plug-in for Unity. This is a third- party system developed by Exit Games specifically for use in Unity multiplayer projects and offers easy-to-use high-level components. PUN2 realizes the network architecture discussed in the previous section by providing its own Cloud servers that automatically work with PUN2 without the need for any custom server-side development. The Oculus Software Development Kit (SDK), used to realize the interaction between the VR Device and the Virtual Environment, comes with a variety of assets that can be used to quickly implement common functionalities inside a VR application. Most aspects needed to realize the Virtual Character are covered by those assets provided by Oculus. Therefore, to save development time on those basics, we used Oculus’ OVRAvatar and OVRCameraRig assets and adjusted them slightly for our application. The OVRCameraRig deals with tracking the position and rotation of the head and controllers and rendering the world accordingly into the headset. It does not include animated hands by default but there are separate assets for that which can simply be placed under the empty GameObjects that track the controller positions to enable users to see their hands. The gestures of the hands are tracked locally by default through an animator so we only had to add an animator synchronizer provided by PUN2 to synchronize the hand’s animation states across the network [51]. Since all Virtual Characters are represented equally in this prototype, we chose to display every user’s name above their character. An example of how a remote user’s Virtual Character looks inside the VR app is shown in Figure 2. Figure 2: Screenshots of the collaborative VR modeling environment ## V Evaluation To evaluate the efficiency, effectiveness, and user satisfaction of VmodlR and to compare it with conventional collaborative modeling approaches, we have conducted a user study which will be presented in the following. ### V-A Setup and Participants The user study was organized in such a way that two people in different rooms had to collaboratively create a UML Class Diagram. We have chosen a within- subjects design [52] for our user study where the participants were asked to use both modeling approaches, a conventional modeling tool, and the developed VR modeling tool. Two different small UML Class Diagram modeling tasks (consisting of five classes and based on a textual description) were provided to the participants, while the sequence and type of task which was carried with the help of a modeling tool were evenly distributed to avoid potential bias in the collected data. As a reference application for comparing with our own VR environment, we have decided to use an existing commercially available tool for collaborative UML modeling. The tool we used is the Web application Lucidchart [7]. This was chosen because it offers a mode of collaboration many users are already familiar with from services like Google Docs, it offers a free version that could be used for this study, and supported UML Class Diagrams. The evaluated applications focus on remote collaboration, therefore, we simulated a remote setting by placing each participant in a different room during their collaborative tasks where they could only communicate through computing devices (conventional and VR device). For the VR application, each participant was positioned in a free space of approximately the same size and equipped with an Oculus Quest 2 VR Headset including its two VR Controllers. The participants were able to communicate over the application’s voice chat feature using the Oculus Quest’s built-in microphone and speakers. The respective task was displayed inside the VR app on a panel that could be opened and closed through an icon on the user’s menu. The panel was positioned slightly to the left of the user so they could leave the panel open and edit the model in front of them at the same time. While using the Web task, each participant was sitting at a desk in the same room that the VR free space was in, equipped with a laptop and a wired mouse. The participants could use the laptop’s keyboard, its trackpad, and the mouse as they saw fit. Since the Web application does not include voice chat, the participants communicated via the voice chat application Skype that was running in the background on their laptops. The app used the built-in speakers and microphones of the laptops. The tasks were supplied to users on a sheet of paper so, like in the VR app, it would not occlude their modeling environment unnecessarily. Since this study involved participants having to create two small Class Diagrams, these participants had to bring a basic knowledge about what a Class Diagram is and which purpose it serves for software modeling. Therefore, we had to rely on participants who either had lectures or school classes on this topic, for example in computer science lectures or subjects and/or who knew Class Diagrams from a different source, like working as a software developer who uses them. Therefore, we primarily tried to acquire participants with educational backgrounds, like university students and recent graduates. Our main source was a lecture on Model-Based Software Engineering designed for undergraduate students of computer science in their third year of studies. In this lecture, we presented the study and asked students to participate in it. We also reached out to students we were still in contact with who took part in this lecture during the prior year to widen our pool of possible participants while still ensuring comparable credentials among them. In total, 24 participants took part in the user study, meaning that there were 12 groups of two people each. ### V-B Procedure The user study was conducted during one week in February 2021. The experimental setting was kept as equal as possible for all pairs of participants. First, the participants were greeted and introduced to the user study. Then, the basic procedure of how they will take part in the study and what they will do during their participation were explained. Afterward, depending on whether the VR or Web app was used first, the collaboration environment was set up (e.g., splitting the participants, starting Skype, etc.), and they received a short introduction to the respective program. In the case of the Web application, this was done through the study supervisor explaining the main functionality from a pre-written script to ensure all participants were given the same information. In the VR app, we have additionally implemented a tutorial that served as an on-boarding tutorial at the beginning of the user study. After the tutorials, the participants were provided with the respective task and instructed to solve the task collaboratively in the sense that they should only create one Class Diagram together in each application. They were then asked to indicate to the study executor once they think they are done with their task. When the participants finished the first task, the procedure was repeated for the second task. After both tasks were finished, the collaborative applications were closed so participants would not be able to talk to each other anymore. They were then given the questionnaire hosted via Google Forms [53] and were asked to fill it out using the laptops that were used for the Web application as well. During this process, the users stayed in the different rooms they were in while working on the tasks to ensure that they would not influence each other’s answers. ### V-C Usability Measurements To extract meaningful results from the study we had to choose certain measurements that we would take during the execution. Figure 3 shows an overview of the data that was collected during the user study and which measurements were derived from that. Figure 3: An overview of what was measured within the user study. Efficiency was measured by recording the participants’ execution of the task and tracking the time from the point where they started reading the task to the time when they told the study executor that they finished it. From these same recordings, the effectiveness was measured by counting the number of operating errors that the participants made during the execution of the task. From this, an error rate was calculated by dividing the number of errors by the time in minutes that was measured as the efficiency. This error rate was our final score for the effectiveness in errors per minute. The recordings used for tracking efficiency and effectiveness were screen-captures including the voice chat audio. In each group, only one participant was recorded to reduce the amount of video data that had to be manually evaluated. Another reason for that was the network infrastructure that did not allow us to capture and record two video feeds from the VR headsets in parallel. The user satisfaction was evaluated through a questionnaire that participants were asked to fill out after they finished both tasks. We chose to use the System Usability Scale (SUS) questionnaire [54] since it is a well-proven and reliable questionnaire that provides comparability with SUS evaluations of other applications and that can be quickly filled out due to its low number of questions [55]. While efficiency and effectiveness were measured for both applications, the SUS questionnaire was only asked in the context of the VR application. This is because the SUS questionnaire’s main purpose in this work is to provide a proof of concept that the VR solution has a rather good usability. Furthermore, the participants were asked to answer a custom- developed questionnaire that included mainly 5 point Likert scale questions (like the SUS questions) and some free text questions asking for more specific impressions with regard to collaboration and interaction. ### V-D Results In the following, we present the main results of the user study. #### V-D1 Demographic Statistics 24 people in 12 collaborating groups participated in the study. All participants were between 22 and 30 with a median of 25 and a mean of 25.5. 21 of the 24 participants were male and the others female. Most of the participants were software engineering practitioners or had a background in computer science. As a consequence, many participants reported advanced experience with UML and UML modeling tools. The average rating scores for prior experience with UML and UML modeling tools were 3.25 and approximately 3, respectively. With regard to prior experience with VR, our results show that half of the participants have never used a VR device before this study while 8 used them at least reasonably often. #### V-D2 Efficiency The times participants needed to complete their tasks are shown in Figure 4. Figure 4: The times each group took to execute the task in the Web and the VR app respectively. All but two groups (Group 7 and 11) needed more time in VR than in the Web application to complete their task. From the recordings, it could be observed that almost all groups split up the work on the Class Diagram by each modeling one part of the diagram and putting both parts together in the end. During this process, they occasionally discussed how to model certain aspects if they were unsure and checked the part of the model their collaborator created in the end. The two groups that took longer in the Web application than in VR had a slightly different approach that could explain this anomaly: In VR they split up their task as outlined above. In the Web application, however, they mainly followed a pair-programming style approach: For each part of the task they discussed how to model it, and then only one of them modeled the aspect accordingly. The first approach obviously saves time in comparison to the latter one which could explain why they were able to complete the task faster in VR than in the Web application when everyone else needed longer in VR. This makes the times for these two groups not comparable since they did not use a similar organizational method in both conditions. Therefore, we excluded them from time-related analyses like the box plots shown on the right of figure 4. Besides this anomaly, it can be said that the spread with respect to time was way smaller for the Web application than for VR, i.e. they vary less as shown on the right of figure 4. In VR, times range from almost 20 minutes to as low as 9:30 min, while in the Web condition, the times vary from approximately 5:30 to 10 minutes. The difference of each group between Web and VR had a mean of 4:46min and a median of 5:26. This time-data may be normally distributed around its mean but does not have to be. To perform a significance test, we used the Wilcoxon Signed-Rank test [56] since it does not assume a normal distribution and based on our test we cannot confirm that both samples are normally distributed. This test reports a $Z=-2,589$ with $p<.05$, meaning that VR had statistically significantly longer task times than Web. #### V-D3 Effectiveness In order to consistently track errors across all recordings we had to define what ”error” means in the context of this usability evaluation. Our definition of a Usability Problem is based on [57] where the authors define a Usability Problem as ”a set of negative phenomena, such as user’s inability to reach his/her goal, inefficient interaction and/or user’s dissatisfaction, caused by a combination of user interface design factors and factors of usage context” [57]. Based on this definition, we extracted 3 types of errors that we analyzed in the recordings: 1. 1. Missed Interaction Point: The user tried to interact with an element of the application but did not hit said element (for example a button) or used the wrong control for interaction. Thus, the user needs to repeat the interaction. 2. 2. Accidental Interaction: The user did not intend to interact at all or not with this specific element but accidentally interacted with it anyway. Thus, the user needs to revert the interaction. 3. 3. False Interaction: The user tried to do an interaction that is not possible at all or not possible at that specific element. Thus, the user experiences a loss of time and needs to find out the correct interaction to achieve the desired effect. During the evaluation of the recordings, we tracked each error by its type and a time stamp. Finally, the effectiveness was measured in errors per minute and is shown in Figure 5. Most errors belonged to the Missed Interaction Point or Accidental Interaction types with only a few False Interactions. Figure 5: The error rates of the recorded participant in each group. In VR, we observed a mean error rate of approximately 1.5 (error per minute) with a median of 1.25 (error per minute), while these values lied at 0.66 and 0.61 (error per minute) respectively in the Web application. The Wilcoxon Signed-Rank test resulted in a test statistic of $Z=-2.599$ with a significance $<.05$ which shows that VR had a statistically significantly higher error rate than Web. #### V-D4 User Satisfaction The basic user satisfaction was measured in the VR application using the 10 items SUS questionnaire for each participant. In total, our collaborative VR modeling environment reached an average SUS score of 78 out of 100 which indicates according to [58] good usability. As mentioned earlier, we did not ask the participants to fill out the SUS questionnaire for the Web application as our focus was more on the acceptance of our own VR solution than on the acceptance of a mature and commercial modeling tool like Lucidchart. #### V-D5 Additional Questionnaire Results To assess the perceived naturalness of both applications, the Web and our VR solution, the similarity of interactions inside the applications to face-to- face interactions and the feeling of co-presence were analyzed. The results are depicted in Fig. 6. Figure 6: Results of additional questions concerning interactivity and co- presence Concerning the similarity of interactions to face-to-face interactions (see Fig. 6 (a)), the average score of the Web application is 2.33 and noticeably lower than the VR’s 3.58. Additionally, in VR 14 out of 24 people selected the highest (5/5 on the Likert scale) answers whereas, in the Web, nobody chose the highest and only two people chose the second highest answer (4/5 on the Likert scale). A Wilcoxon Signed-Rank test revealed that this observed difference is indeed statistically significant with $Z=-3.208$ and a significance of $<0.05$. Overall, this means that users found interactions with their teammates to be significantly more similar to face-to-face interactions in the VR modeling environment compared to the Web application. A further important aspect for natural interaction and collaboration is co- presence which denotes the feeling of being in the same place despite the remote setting. Fig. 6 (b) shows how the participants assessed their feeling of co-presence in both applications. It shows that in the Web, this feeling is very different from user to user, with larger bulks at both ends of the scale. The median, however, with a value of 2.6 points more towards the lower end of the scale. In the VR app, this is very different. While two people rated the co-presence rather low (2 on the 1-5 scale), every other participant at least somewhat agreed with the sentiment that there was a feeling of co-presence with 9 participants selecting 4/5 and 13 choosing 5/5. The Wilcoxon Signed- Rank test confirmed that this difference is statistically significant with a $Z=-3.587$ and a significance of $<0.05$. This implies that the VR application can more successfully make users feel like they are collaborating in the same room compared to the Web app. Apart from the above-mentioned questions, we asked the participants to provide us general feedback and remarks (what have you liked/disliked most) on the developed collaborative VR modeling environment. The most notable result is that 14 out of 24 people mentioned that moving the model elements through the grabbing feature felt natural. Furthermore, most comments were praising the ”collaboration” in the VR modeling environment. Some comments explicitly mentioned a like for the collaboration (3 out of 24), some indicated a positive impression for the ability of talking to the teammate (4 out of 24), being able to see the teammate (4 out of 24) or the feeling of the teammate’s presence (4 out of 24). Some participants mentioned multiple of these aspects. In total, 11 out of 24 noted that at least one of these collaboration-related aspects felt natural or intuitive. Concerning the negative feedback comments, typing on the keyboard in VR was the most mentioned aspect (9 out of 24) while some of the participants stated that this would only need some time to get used to it. Furthermore, the missing of an auto-alignment or snapping feature, like known from most diagramming and modeling tools (e.g. Microsoft Visio [59]), was complained about by five users. However, five out of 24 people said that VR was entertaining or fun to use and two added that it is specifically useful for home office scenarios since it makes people feel more together and would ”definitely improve motivation and team spirit”. Finally, the participants had to choose which application they would prefer to use for collaborative UML modelling: They could choose either one or state that they would want to use both depending on the situation. A follow up question to this one subsequently asked in which situations they would want to use which application if they selected ”Both”. 13% (3 out of 24) wanted to use the VR app over the Web application and 37% (9 out of 24) vice versa. Half of the participants, however, indicated that they would want to use both applications, each for specific situations. When asked in which situations they would want to use which application, participants gave rather diverse answers. Five users stated that they would want to use the Web application for complex or longer tasks and the VR one for shorter ones. Two mentioned that they would prefer the Web application for time critical work. Brainstorming and planning was mentioned by three people to be more suited for the VR application and one person stated that she would like to use ”the web application when you are working on one device with your partner” and the VR app when in ”different locations”. #### V-D6 Discussion Based on previous research and the participants’ familiarity with traditional computer programs, we expected one downside of VR to be that users’ task executions are slower and more error-prone in VR. The data from our study shows that this was indeed the case. These measures could have been influenced by the universal familiarity of participants with PC applications in general and UML tools specifically. It is therefore possible that speed and error rates in VR improve as users get more experience with a specific VR UML tool. However, the current state-of-art text entry can be seen as a major bottleneck for the efficiency of text-intensive VR applications. The results of the SUS evaluation additionally showed that our VR implementation is already quite usable even though it still lacks many features that users expect from such an application like automatic aligning of model elements and copy & paste functionalities. The various data points gathered about the naturalness of different aspects of the application gave a clearer insight on what concrete advantages such a VR application can have compared to traditional tools: On average, users found the interactions and especially the collaboration related aspects of the VR application significantly more natural than in the Web application. This is especially important with respect to this work’s focus on remote collaboration settings as the study showed that the feelings of being together and collaborating face to face with a co-worker were much higher in VR compared to the traditional PC alternative. Another aspect that we expected VR to be beneficial for is the motivation and fun users are having while using it. Our study shows that it is indeed true that users were a lot more motivated and had a lot more fun using the VR application compared to the Web app. It is important to note that this could be influenced by the fact that VR is a relatively new and therefore possibly more interesting technology, so these values might align more over time when a user regularly uses a VR application for modeling. The fact that using VR can be more exhausting for people was one downside of VR we expected to observe in this study as well. While we did see that some participants experienced significant discomfort (due to heavy headsets, pressure against the face, or cybersickness), most people did not have any issues with that. Considering the suggestions made by participants about when they would like to use which application, it is evident, however, that a VR UML tool would not simply replace the desktop ones. Rather it would be an amendment, so users have the option to use the tool that is most suited for a given situation. In remote collaboration settings, where two or more people need to brainstorm or discuss how something should be modeled, the VR application could be used. When collaborating in the same room or when creating a model alone, a PC-based application could be more appropriate. This implies that such apps need seamless interoperability between PCs and VR when they ought to be used in actual modeling work outside of usability studies. Summarizing, it can be said that VR can offer a more natural collaborative modeling experience compared to PC-based tools but that both techniques have certain advantages and drawbacks. These make the use of both tool-types, depending on the concrete situation, most sensible instead of using only one of them exclusively. #### V-D7 Threats to Validity With regard to collaboration, this study only evaluated two-person teams. Therefore, it is unclear if the findings can be generalized to larger numbers of simultaneous collaborators. The number of participants and thereby collaboration teams was also rather limited. With more participants, a between-subjects design [52] could have been chosen which has the possibility to provide data and thus findings that are more generalizable across many different users. Due to the participant’s demographics (e.g., age, profession, background, etc.), the findings of this study should be taken carefully and further user studies with other user groups are needed to get insights about the general usability. Additionally, this study compared a fully-featured commercially available Web application with a VR modeling prototype, missing many of the features that the Web application supported, like automatic aligning of model elements. This study therefore could not achieve a strict like-for-like comparison between the two types of applications. ## VI Conclusion and Future Work While the Unified Modeling Language (UML) is one of the major conceptual modeling languages for software engineers, more and more concerns arise from the modeling quality of UML and its tool-support. Among them, the limitation of the two-dimensional presentation of its notations and lack of natural collaborative modeling tools are reported to be significant. In this paper, we have explored the potential of using Virtual Reality (VR) technology for collaborative UML software design by comparing it with classical collaborative software design using conventional devices (Desktop PC / Laptop). For this purpose, we have presented a VR modeling environment that offers a natural collaborative modeling experience for UML Class Diagrams. Based on a user study with 24 participants, we have compared collaborative VR modeling with conventional modeling with regard to efficiency, effectiveness, and user satisfaction. In future work, we plan to extend our collaborative VR modeling environment to further UML modeling diagram types and even to further modeling languages (e.g., BPMN, SysML, etc.). In addition, further improvements of the VR modeling environment are planned to support a multi-modal (e.g. speech in-/output or haptic feedback) interaction and a more realistic representation of the virtual character (e.g. realistic avatars or tracking of users’ facial expressions). Features like automatic aligning of model elements, and tracking of which collaborator created which parts of the model are also useful aspects that could be integrated into the VR modeling environment. In addition, further usability evaluation studies with larger groups of heterogeneous participants and more complex modeling tasks should be conducted to analyze in more detail the benefit of collaborative modeling in VR. Finally, we believe that a cross-device mixed reality collaborative modeling approach is a promising way to support modeling across different AR/VR capable and conventional devices. ## References * [1] J. Whitehead, “Collaboration in software engineering: A roadmap,” in _Future of Software Engineering (FOSE '07)_. IEEE, May 2007. * [2] M. Petre, “UML in practice,” in _35th International Conference on Software Engineering, ICSE ’13, San Francisco, CA, USA, May 18-26, 2013_ , D. Notkin, B. H. C. Cheng, and K. Pohl, Eds. IEEE Computer Society, 2013, pp. 722–731. [Online]. Available: https://doi.org/10.1109/ICSE.2013.6606618 * [3] M. Gogolla, O. Radfelder, and M. Richters, “Towards three-dimensional representation and animation of uml diagrams,” in _Proceedings of the 2nd International Conference on The Unified Modeling Language: Beyond the Standard_ , ser. UML’99. Berlin, Heidelberg: Springer-Verlag, 1999, p. 489–502. * [4] J. I. Maletic, J. Leigh, and A. Marcus, “Visualizing software in an immersive virtual reality environment,” in _in Proceedings of ICSE’01 Workshop on Software Visualization_. Society Press, 2001, pp. 12–13. * [5] J. Erickson and K. Siau, “Unified modeling language: Theoretical and practical complexity,” in _9th Americas Conference on Information Systems, AMCIS 2003, Tampa, FL, USA, August 4-6, 2003_. Association for Information Systems, 2003, p. 164. [Online]. Available: http://aisel.aisnet.org/amcis2003/164 * [6] O. Badreddin, R. Khandoker, A. Forward, O. Masmali, and T. C. Lethbridge, “A decade of software design and modeling: A survey to uncover trends of the practice,” in _Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2018, Copenhagen, Denmark, October 14-19, 2018_ , A. Wasowski, R. F. Paige, and Ø. Haugen, Eds. ACM, 2018, pp. 245–255. [Online]. Available: https://doi.org/10.1145/3239372.3239389 * [7] L. S. Inc., “Lucidchart,” https://www.lucidchart.com/, Dec. 2020. * [8] Axellience, “Genmymodel,” https://www.genmymodel.com/, Nov. 2020. * [9] E. Yigitbas, I. Jovanovikj, J. Scholand, and G. Engels, “VR training for warehouse management,” in _VRST ’20: 26th ACM Symposium on Virtual Reality Software and Technology_ , R. J. Teather, C. Joslin, W. Stuerzlinger, P. Figueroa, Y. Hu, A. U. Batmaz, W. Lee, and F. R. Ortega, Eds. ACM, 2020, pp. 78:1–78:3. * [10] E. Yigitbas, K. Karakaya, I. Jovanovikj, and G. Engels, “Enhancing human-in-the-loop adaptive systems through digital twins and VR interfaces,” in _16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS@ICSE 2021, Madrid, Spain, May 18-24, 2021_. IEEE, 2021, pp. 30–40. [Online]. Available: https://doi.org/10.1109/SEAMS51251.2021.00015 * [11] E. Yigitbas, C. B. Tejedor, and G. Engels, “Experiencing and programming the ENIAC in VR,” in _Mensch und Computer 2020_ , F. Alt, S. Schneegass, and E. Hornecker, Eds. ACM, 2020, pp. 505–506. * [12] E. Yigitbas, J. Heindörfer, and G. Engels, “A context-aware virtual reality first aid training application,” in _Proc. of Mensch und Computer 2019_ , F. Alt, A. Bulling, and T. Döring, Eds. GI / ACM, 2019, pp. 885–888. * [13] I. Jovanovikj, E. Yigitbas, S. Sauer, and G. Engels, “Augmented and virtual reality object repository for rapid prototyping,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481. Springer, 2020, pp. 216–224. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_15 * [14] E. Yigitbas, J. Klauke, S. Gottschalk, and G. Engels, “VREUD - an end-user development tool to simplify the creation of interactive VR scenes,” _CoRR_ , vol. abs/2107.00377, 2021. [Online]. Available: https://arxiv.org/abs/2107.00377 * [15] E. Yigitbas, S. Grün, S. Sauer, and G. Engels, “Model-driven context management for self-adaptive user interfaces,” in _Ubiquitous Computing and Ambient Intelligence - 11th International Conference, UCAmI 2017, Philadelphia, PA, USA, November 7-10, 2017, Proceedings_ , ser. Lecture Notes in Computer Science, S. F. Ochoa, P. Singh, and J. Bravo, Eds., vol. 10586\. Springer, 2017, pp. 624–635. [Online]. Available: https://doi.org/10.1007/978-3-319-67585-5\\_61 * [16] E. Yigitbas, S. Sauer, and G. Engels, “Adapt-ui: an IDE supporting model-driven development of self-adaptive uis,” in _Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS 2017, Lisbon, Portugal, June 26-29, 2017_ , J. C. Campos, N. Nunes, P. Campos, G. Calvary, J. Nichols, C. Martinie, and J. L. Silva, Eds. ACM, 2017, pp. 99–104. [Online]. Available: https://doi.org/10.1145/3102113.3102144 * [17] E. Yigitbas, I. Jovanovikj, K. Biermeier, S. Sauer, and G. Engels, “Integrated model-driven development of self-adaptive user interfaces,” _Softw. Syst. Model._ , vol. 19, no. 5, pp. 1057–1081, 2020. [Online]. Available: https://doi.org/10.1007/s10270-020-00777-7 * [18] E. Yigitbas, A. Anjorin, I. Jovanovikj, T. Kern, S. Sauer, and G. Engels, “Usability evaluation of model-driven cross-device web user interfaces,” in _Human-Centered Software Engineering - 7th IFIP WG 13.2 International Working Conference, HCSE 2018, Sophia Antipolis, France, September 3-5, 2018, Revised Selected Papers_ , ser. Lecture Notes in Computer Science, C. Bogdan, K. Kuusinen, M. K. Lárusdóttir, P. A. Palanque, and M. Winckler, Eds., vol. 11262. Springer, 2018, pp. 231–247. [Online]. Available: https://doi.org/10.1007/978-3-030-05909-5\\_14 * [19] E. Yigitbas, A. Hottung, S. M. Rojas, A. Anjorin, S. Sauer, and G. Engels, “Context- and data-driven satisfaction analysis of user interface adaptations based on instant user feedback,” _Proc. ACM Hum. Comput. Interact._ , vol. 3, no. EICS, pp. 19:1–19:20, 2019. [Online]. Available: https://doi.org/10.1145/3331161 * [20] E. Yigitbas, B. Mohrmann, and S. Sauer, “Model-driven UI development integrating HCI patterns,” in _Proceedings of the 1st Workshop on Large-scale and Model-based Interactive Systems: Approaches and Challenges, LMIS 2015, co-located with 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015), Duisburg, Germany, June 23, 2015_ , ser. CEUR Workshop Proceedings, R. Seiger, B. Altakrouri, A. Schrader, and T. Schlegel, Eds., vol. 1380. CEUR-WS.org, 2015, pp. 42–46. [Online]. Available: http://ceur-ws.org/Vol-1380/paper6.pdf * [21] K. Josifovska, E. Yigitbas, and G. Engels, “A digital twin-based multi-modal UI adaptation framework for assistance systems in industry 4.0,” in _Human-Computer Interaction. Design Practice in Contemporary Societies - Thematic Area, HCI 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings, Part III_ , ser. Lecture Notes in Computer Science, M. Kurosu, Ed., vol. 11568\. Springer, 2019, pp. 398–409. [Online]. Available: https://doi.org/10.1007/978-3-030-22636-7\\_30 * [22] ——, “Reference framework for digital twins within cyber-physical systems,” in _Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS@ICSE 2019, Montreal, QC, Canada, May 28, 2019_ , T. Bures, B. R. Schmerl, J. S. Fitzgerald, and D. Weyns, Eds. IEEE / ACM, 2019, pp. 25–31. [Online]. Available: https://doi.org/10.1109/SEsCPS.2019.00012 * [23] S. Gottschalk, E. Yigitbas, A. Nowosad, and G. Engels, “Situation-specific business model development methods for mobile app developers,” in _Enterprise, Business-Process and Information Systems Modeling - 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28-29, 2021, Proceedings_ , ser. Lecture Notes in Business Information Processing, A. Augusto, A. Gill, S. Nurcan, I. Reinhartz-Berger, R. Schmidt, and J. Zdravkovic, Eds., vol. 421. Springer, 2021, pp. 262–276. [Online]. Available: https://doi.org/10.1007/978-3-030-79186-5\\_17 * [24] S. Gottschalk, E. Yigitbas, and G. Engels, “Model-based hypothesis engineering for supporting adaptation to uncertain customer needs,” in _Business Modeling and Software Design - 10th International Symposium, BMSD 2020, Berlin, Germany, July 6-8, 2020, Proceedings_ , ser. Lecture Notes in Business Information Processing, B. Shishkov, Ed., vol. 391. Springer, 2020, pp. 276–286. [Online]. Available: https://doi.org/10.1007/978-3-030-52306-0\\_18 * [25] M. Renger, G. L. Kolfschoten, and G. de Vreede, “Challenges in collaborative modelling: a literature review and research agenda,” _Int. J. Simul. Process. Model._ , vol. 4, no. 3/4, pp. 248–263, 2008. [Online]. Available: https://doi.org/10.1504/IJSPM.2008.023686 * [26] N. Boulila, “Supporting distributed software development with rd-uml,” in _GI-Edition: Lecture Notes in Informatics_ , Jan. 2002. * [27] W. Chen, R. Pedersen, and Ø. Pettersen, “Colemo: A collaborative learning environment for UML modelling,” _Interact. Learn. Environ._ , vol. 14, no. 3, pp. 233–249, 2006. [Online]. Available: https://doi.org/10.1080/10494820600909165 * [28] M. Ferenc, I. Polásek, and J. Vincur, “Collaborative modeling and visualization of software systems using multidimensional UML,” in _IEEE Working Conference on Software Visualization, VISSOFT 2017, Shanghai, China, September 18-19, 2017_. IEEE, 2017, pp. 99–103. [Online]. Available: https://doi.org/10.1109/VISSOFT.2017.19 * [29] O. Radfelder and M. Gogolla, “On better understanding uml diagrams through interactive three-dimensional visualization and animation,” in _Proceedings of the Working Conference on Advanced Visual Interfaces_ , ser. AVI ’00. New York, NY, USA: Association for Computing Machinery, 2000, p. 292–295. [Online]. Available: https://doi.org/10.1145/345513.345358 * [30] B. Zhang and Y. sho Chen, “Enhancing UML conceptual modeling through the use of virtual reality,” in _Proceedings of the 38th Annual Hawaii International Conference on System Sciences_. IEEE, 2005. * [31] C. S. C. Rodrigues, C. M. L. Werner, and L. Landau, “VisAr3d: an innovative 3d visualization of uml models,” in _Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16_. ACM Press, 2016\. * [32] M. Leyer, R. Brown, B. Aysolmaz, I. Vanderfeesten, and O. Turetken, “3d virtual world BPM training systems: Process gateway experimental results,” in _Advanced Information Systems Engineering_. Springer International Publishing, 2019, pp. 415–429. * [33] K. Casey and C. Exton, “A java 3d implementation of a geon based visualisation tool for UML,” in _Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, PPPJ 2003, Kilkenny City, Ireland, June 16-18, 2003_ , ser. ACM International Conference Proceeding Series, J. F. Power and J. Waldron, Eds., vol. 42. ACM, 2003, pp. 63–65. [Online]. Available: https://dl.acm.org/citation.cfm?id=957309 * [34] J. von Pilgrim and K. Duske, “Gef3d: a framework for two-, two-and-a-half-, and three-dimensional graphical editors,” in _Proceedings of the ACM 2008 Symposium on Software Visualization, Ammersee, Germany, September 16-17, 2008_ , R. Koschke, C. D. Hundhausen, and A. C. Telea, Eds. ACM, 2008, pp. 95–104. [Online]. Available: https://doi.org/10.1145/1409720.1409737 * [35] J. von Pilgrim, K. Duske, and P. McIntosh, “Eclipse GEF3D: bringing 3d to existing 2d editors,” _Inf. Vis._ , vol. 8, no. 2, pp. 107–119, 2009. [Online]. Available: https://doi.org/10.1057/ivs.2009.9 * [36] P. McIntosh and M. Hamilton, “X3D-UML: 3d UML mechatronic diagrams,” in _21st Australian Software Engineering Conference (ASWEC 2010), 6-9 April 2010, Auckland, New Zealand_. IEEE Computer Society, 2010, pp. 85–93. [Online]. Available: https://doi.org/10.1109/ASWEC.2010.14 * [37] E. Yigitbas, I. Jovanovikj, and G. Engels, “Simplifying robot programming using augmented reality and end-user development,” _CoRR_ , vol. abs/2106.07944, 2021. [Online]. Available: https://arxiv.org/abs/2106.07944 * [38] S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “Model-based product configuration in augmented reality applications,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481. Springer, 2020, pp. 84–104. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_5 * [39] ——, “Proconar: A tool support for model-based AR product configuration,” in _Human-Centered Software Engineering - 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 - December 2, 2020, Proceedings_ , ser. Lecture Notes in Computer Science, R. Bernhaupt, C. Ardito, and S. Sauer, Eds., vol. 12481\. Springer, 2020, pp. 207–215. [Online]. Available: https://doi.org/10.1007/978-3-030-64266-2\\_14 * [40] E. Yigitbas, S. Sauer, and G. Engels, “Using augmented reality for enhancing planning and measurements in the scaffolding business,” in _EICS ’21: ACM SIGCHI Symposium on Engineering Interactive Computing Systems, virtual, June 8-11, 2021_. ACM, 2021\. [Online]. Available: https://doi.org/10.1145/3459926.3464747 * [41] S. Krings, E. Yigitbas, I. Jovanovikj, S. Sauer, and G. Engels, “Development framework for context-aware augmented reality applications,” in _EICS ’20: ACM SIGCHI Symposium on Engineering Interactive Computing Systems, Sophia Antipolis, France, June 23-26, 2020_ , J. Bowen, J. Vanderdonckt, and M. Winckler, Eds. ACM, 2020, pp. 9:1–9:6. [Online]. Available: https://doi.org/10.1145/3393672.3398640 * [42] E. Yigitbas, I. Jovanovikj, S. Sauer, and G. Engels, “On the development of context-aware augmented reality applications,” in _Beyond Interactions \- INTERACT 2019 IFIP TC 13 Workshops, Paphos, Cyprus, September 2-6, 2019, Revised Selected Papers_ , ser. Lecture Notes in Computer Science, J. L. Abdelnour-Nocera, A. Parmaxi, M. Winckler, F. Loizides, C. Ardito, G. Bhutkar, and P. Dannenmann, Eds., vol. 11930. Springer, 2019, pp. 107–120. [Online]. Available: https://doi.org/10.1007/978-3-030-46540-7\\_11 * [43] A. Mikkelsen, S. Honningsøy, T.-M. Grønli, and G. Ghinea, “Exploring microsoft hololens for interactive visualization of UML diagrams,” in _Proceedings of the 9th International Conference on Management of Digital EcoSystems - MEDES '17_. ACM Press, 2017. * [44] R. Reuter, F. Hauser, D. Muckelbauer, T. Stark, E. Antoni, J. Mottok, and C. Wolff, “Using augmented reality in software engineering education? first insights to a comparative study of 2d and AR UML modeling,” in _Proceedings of the 52nd Hawaii International Conference on System Sciences_. Hawaii International Conference on System Sciences, 2019. * [45] R. Seiger, R. Kühn, M. Korzetz, and U. Aßmann, “Holoflows: modelling of processes for the internet of things in mixed reality,” _Software and Systems Modeling_ , pp. 1–25, 2021. * [46] L. Brunschwig, R. Campos-López, E. Guerra, and J. de Lara, “Towards domain-specific modelling environments based on augmented reality,” in _43rd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, ICSE (NIER) 2021, Madrid, Spain, May 25-28, 2021_. IEEE, 2021, pp. 56–60. [Online]. Available: https://doi.org/10.1109/ICSE-NIER52604.2021.00020 * [47] J. Maletic, J. Leigh, A. Marcus, and G. Dunlap, “Visualizing object-oriented software in virtual reality,” in _Proceedings 9th International Workshop on Program Comprehension. IWPC 2001_. IEEE Comput. Soc, 2001. * [48] A. Dengel, “Seeking the treasures of theoretical computer science education: Towards educational virtual reality for the visualization of finite state machines,” in _2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)_. IEEE, Dec. 2018. * [49] R. Oberhauser, C. Pogolski, and A. Matic, “VR-BPMN: Visualizing BPMN models in virtual reality,” in _Lecture Notes in Business Information Processing_. Springer International Publishing, 2018, pp. 83–97. * [50] U. Technologies, “Unity engine,” https://unity.com, Feb. 2021. * [51] Exit Games, “Pun — player networking,” https://doc.photonengine.com/en-us/pun/v2/demos-and-tutorials/pun-basics-tutorial/player-networking, Feb. 2021. * [52] C. M. Barnum, _Usability Testing Essentials: Ready, Set…Test!_ , 1st ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2010. * [53] Google LLC, “Google forms,” https://www.google.de/intl/en/forms/about/, Mar. 2021. * [54] J. Brooke, _”SUS - A quick and dirty usability scale.” Usability evaluation in industry_. CRC Press, June 1996, iSBN: 9780748404605. [Online]. Available: https://www.crcpress.com/product/isbn/9780748404605 * [55] A. Bangor, P. Kortum, and J. Miller, “Determining what individual sus scores mean: Adding an adjective rating scale,” _J. Usability Stud._ , vol. 4, pp. 114–123, 04 2009. * [56] Ahmed Sabbir Arif, University of California, “A brief note on selecting & reporting the right statistical test,” https://www.asarif.com/notes/HypothesisTesting.html, Mar. 2021. * [57] P. Manakhov and V. D. Ivanov, “Defining usability problems,” in _Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems_. ACM, May 2016. * [58] J. Sauro, _A practical guide to the system usability scale: background, benchmarks & best practices_. Denver, Colorado: Measuring Usability LLC, 2011. * [59] Microsoft, “Visio — the ultimate tool for diagramming,” https://www.microsoft.com/en-us/microsoft-365/visio/flowchart-software/, Feb. 2021. *[UML]: Unified Modeling Language *[HMD]: Head Mounted Display *[VR]: Virtual Reality *[BPMN]: Business Process Model Notation *[AR]: Augmented Reality *[CAVE]: Cave Automatic Virtual Environment *[FSM]: Finite State Machine *[PUN2]: Photon Unity Networking 2 *[SDK]: Software Development Kit *[SUS]: System Usability Scale
arxiv-papers
2021-07-27T12:34:54
2024-09-04T03:07:21.463047
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Enes Yigitbas, Simon Gorissen, Nils Weidmann, Gregor Engels", "submitter": "Enes Yigitbas", "url": "https://arxiv.org/abs/2107.12772" }
2107.12776
# Black holes solutions in power-law Maxwell-$f(T)$ gravity in diverse dimensions G.G.L. Nashed [email protected] Centre for Theoretical Physics, The British University in Egypt, P.O. Box 43, El Sherouk City, Cairo 11837, Egypt Int. Lab. Theor. Cosmology, Tomsk State University of Control Systems and Radioelectronics (TUSUR), 634050 Tomsk, Russia Kazuharu Bamba [email protected] Division of Human Support System, Faculty of Symbiotic Systems Science, Fukushima University, Fukushima 960-1296, Japan ###### Abstract We investigate the solutions of black holes in $f(T)$ gravity with nonlinear power-law Maxwell field, where $T$ is the torsion scalar in teleparalelism. In particular, we introduce the Langranian with diverse dimensions in which the quadratic polynomial form of $f(T)$ couples with the nonlinear power-law Maxwell field. We explore the leverage of the nonlinear electrodynamics on the space-time behavior. It is found that these new black hole solutions tend towards those in general relativity without any limit. Furthermore, it is demonstrated that the singularity of the curvature invariant and the torsion scalar is softer than the quadratic form of the charged field equations in $f(T)$ gravity and much milder than that in the classical general relativity because of the nonlinearity of the Maxwell field. In addition, from the analyses of physical and thermodynamic quantities of the mass, charge and the Hawking temperature of black holes, it is shown that the power-law parameter affects the asymptotic behavior of the radial coordinate of the charged terms, and that a higher-order nonlinear power-law Maxwell field imparts the black holes with the local stability. ## I Introduction Over the past years, black holes (BHs) possessing linear and nonlinear Maxwell fields have attracted tremendous attention. The study of charged BH solutions is relevant because BH created in a collider may generally possess an electric field. Moreover, the difference between the electroweak and Planck scales is still an unsolved challenge that is known as the hierarchy problem. This problem has been tackled in the frame of theories with extra spatial dimensions. Further, this work is an attempt at elucidating higher-dimension charged BH solutions. The first higher-dimension spherically symmetric BH solution was derived in Tangherlini (1963), after which it was generalized in Myers and Perry (1986). Moreover, a higher-dimension charged BH solution, which is a generalization of the Reissner-Nordström BH, was derived in Fadeev _et al._ (1991). There are different sets of the charged BH solutions, which were derived by the Brans-Dicke and Lovelock theories; their physical properties have been studied Dehghani and Hendi (2007); Dehghani _et al._ (2007, 2008); Hendi (2010). The research on the higher dimensions of the Kerr- Newman solution is in progress, although the slowly rotating BH solution has been derived in Mignemi and Stewart (1993); El Hanafy and Nashed (2016); Volkov and Straumann (1997); Ghosh and SenGupta (2007); Kim and Cai (2008); Sheykhi and Allahverdizadeh (2008). It is known that the Maxwell theory is invariant under conformal transformation in four dimensions, although it is not invariant in a higher dimension. The lack of this transformation has been explicitly studied in higher dimensions employing the nonlinear power-law Maxwell field Hassaine and Martinez (2007, 2008). The conformal invariance in a higher dimension was considered to derive a similar four-dimensional Reissner-Nordström BH with extra dimensions. Thus, the present study is aimed at deriving diverse- dimensional charged BH solutions within the frame of the modified teleparallel equivalent of general relativity (TEGR), namely, f(T)-gravitational theory. There are various reasons, ranging from our accelerated expansion of the universe and its dark energy in the astrophysical tests, for researchers to consider modifying general relativity (GR). Among the modifications, the Brans-Dicke Brans and Dicke (1961); Dicke (1962), Lovelock Lovelock (1971), $f(R)$ Buchdahl (1970); Sotiriou and Faraoni (2010); Nojiri _et al._ (2017), and $f(T)$ (refer to Cai _et al._ (2016) for more details) gravitational theories have gained much attraction for different reasons. In the present study, we concentrate on the $f(T)$ gravity for many reasons, such as the fact that the Lagrangian of this theory which depends on the torsion scalar only, which makes it easy to handle compared with other modified gravitational theories ($f(R)$ Cembranos _et al._ (2012); Nojiri and Odintsov (2011)). Another major reason for focusing on $f(T)$ is the point that the gravitational field equations are of the second order, unlike those in the other modified theories Ferraro and Fiorini (2007); Awad and Nashed (2017); Li _et al._ (2011). TEGR is a theory, which was developed by Einstein to unify the gravitational and electromagnetic fields Nashed (2006, 2008, 2010, 2007a); Unzicker and Case (2005); Nashed (2007b). The TEGR theory could be applied to calculate the conserved quantities, mass and angular momentum employing the energy-momentum tensor Maluf (1995); Maluf _et al._ (2002). The main motivation of the modification of TEGR theory was the issues recently appeared in observations that TEGR cannot explain Ferraro and Fiorini (2007). $f(T)$, which exhibits many viable applications, is the modification of the TEGR theory Capozziello _et al._ (2015); Nashed (2002); Iorio and Saridakis (2012); Gamal (2012); Bamba _et al._ (2014). By employing this theory, not only inflation Ferraro and Fiorini (2007) in the early universe but also the late-time cosmic acceleration could be explained Bengochea and Ferraro (2009); Linder (2010); Wu and Yu (2011); Dent _et al._ (2011); Awad and Nashed (2017); Bamba _et al._ (2011, 2010, 2012); Aviles _et al._ (2013); Jamil _et al._ (2012); Ferraro and Fiorini (2011a, b); Sebastiani and Zerbini (2011); Salako _et al._ (2013); Haghani _et al._ (2012, 2013). There exist a number of interesting applications of $f(T)$ gravity to the realm of cosmology Bamba _et al._ (2013a, b); Bamba (2011); Bamba _et al._ (2013c); Bengochea and Ferraro (2009); Linder (2010); Geng _et al._ (2011); Otalora (2013); Chattopadhyay and Pasqua (2013); Dent _et al._ (2011); Yang (2011); Bamba _et al._ (2011); Capozziello _et al._ (2011); Awad _et al._ (2018); Capozziello _et al._ (2011); Geng _et al._ (2012); Farajollahi _et al._ (2012); Cardone _et al._ (2012); Bahamonde _et al._ (2015), as well as in the domain of astrophysics Capozziello _et al._ (2013); Paliathanasis _et al._ (2014); Gonzalez _et al._ (2012); Boehmer _et al._ (2012); Nashed (2013); Ruggiero and Radicella (2015). In the astrophysical domain, $f(T)$ possesses a new exact charged BH solution, which involves, in addition to the monopole term, a quadruple term whose contribution accrues from the quadratic $f(T)$ form, i.e., $T^{2}$. Based on the achievements recorded in $f(T)$ gravity, we explore the implication of the nonlinear power-law Maxwell field. Particularly, we derive the field equations of $f(T)$ coupled with the nonlinear power-law Maxwell field and apply their quadratic form, that is, $f(T)=T_{0}+\alpha T-\beta T^{2}$, to diverse-dimensional flat transverse sections. The arrangements of the study are the followings. In Sec. II, we explain $f(T)$ gravity and show the field equations with the Maxwell field. In Sec. III, we investigate the solutions of the charged static BH with the Anti-de- Sitter/de-Sitter (AdS/dS) behavior. We analyze the singularity and horizon structure of these BH solutions and calculate their energies in Sec. III. In Sec. IV, we explore the charged AdS solutions of the rotating BH in power-law Maxwell-$f(T)$ gravity. In Sec. V, we calculate different thermodynamical quantities and establish the local stability of our BH solutions. Finally, the conclusions and discussions are given in Sec. VI. ## II Basic formulations of $f(T)$ gravity The f(T)-gravity is a kind of extension of TEGR. In this theory, it is suitable to apply the vielbein (tetrads) fields, $e_{i}^{\mu}$ , as dynamic variables (the Greek indices run for the coordinate space and the Latin one spans for the tangent one) that constitute orthonormal basis of the tangent space at the spacetime each point. The relations between the covariant and contravariant tetrads and between the tetrads and metrics are represented by the following equation: $e^{i}_{\mu}e_{i}^{\nu}:={\delta_{\mu}}^{\nu},\qquad\qquad e^{i}_{\mu}e_{j}^{\mu}:={\delta_{j}}^{i},\qquad\qquad{\it g_{\mu\nu}:=\eta_{ij}{e^{i}}_{\mu}{e^{j}}_{\nu},}\qquad\qquad\eta_{ij}:={e_{i}}^{\mu}{e_{j}}^{\nu}g_{\mu\nu},$ (1) where $\eta_{ij}=(+,-,-,-\cdots)$ is the $d$-dimensional Minkowskian metric of the tangent space. Unlike the symmetric Levi-Civita connection in GR, the (non-symmetric) Weitzenböck connection in TEGR is defined as Weitzenböck (1923) $\overset{{\bf{w}}}{\Gamma}^{\lambda}_{\mu\nu}:={e_{i}}^{\lambda}~{}\partial_{\nu}e^{i}_{\mu}.$ (2) It follows from Eq. (2) that the torsion tensor is given by ${T^{\alpha}}_{\mu\nu}:=\overset{{\bf{w}}}{\Gamma}^{\alpha}_{\nu\mu}-\overset{{\bf{w}}}{\Gamma}^{\alpha}_{\mu\nu}={e_{i}}^{\alpha}\left(\partial_{\mu}{e^{i}}_{\nu}-\partial_{\nu}{e^{i}}_{\mu}\right).$ (3) This tensor encodes all the information of the gravitational field. The difference between the Levi-Civita and the Weitzenböck connections defines the contorsion tensor, which is expressed by Eq. (4): ${K^{\lambda}}_{\mu\nu}:=\overset{{\bf{w}}}{\Gamma}^{\lambda}_{\mu\nu}-\overset{{\bf{\circ}}}{\Gamma}^{\lambda}_{\mu\nu},$ (4) where $\overset{{\bf{\circ}}}{\Gamma}^{\lambda}_{\mu\nu}$ is the symmetric Levi-Civita connection. The super-potential can be defined by the foregoing equations, as follows: ${S_{\lambda}}^{\mu\nu}:={K^{\mu\nu}}_{\lambda}+\delta^{\mu}_{\lambda}{T^{\alpha\nu}}_{\alpha}-\delta^{\nu}_{\lambda}{T^{\alpha\mu}}_{\alpha},$ (5) that has a skew symmetry in the last two indices. The torsion scalar with the following form can be defined by Eqs. (3) and (5): $T=\frac{1}{2}{S_{\lambda}}^{\mu\nu}{T^{\lambda}}_{\mu\nu}\equiv\frac{1}{4}T^{\rho\mu\nu}T_{\rho\mu\nu}+\frac{1}{2}T^{\rho\mu\nu}T_{\nu\mu\rho}-T_{\rho\mu}^{\ \ \rho}T_{\ \ \ \nu}^{\nu\mu}.$ (6) The Lagrangian of TEGR mainly depends on the torsion scalar $T$ and the variation of the the Lagrangian with respect to the vierbeins can lead to the same field equations in GR. With the same spirit of $f(R)$ gravity, the Lagrangian of TEGR described by $T$ can be expanded to an arbitrary function $f$ of $T$ as $f(T)$ as follows Cai _et al._ (2016): ${\cal L}=\frac{1}{2\kappa}\int|e|f(T)~{}d^{d}x.$ (7) Here, $|e|=\sqrt{-g}=\det\left({e^{a}}_{\mu}\right)$ is the determinant of the tetrad. Moreover, $\kappa$ is a constant in the $d$-dimensions with the form $\kappa=2(d-3)\Omega_{d-1}G_{d}$, where $G_{d}$ the Newtonian constant in the $d$-dimensions and $\Omega_{d-1}$ is the volume of the unit sphere in the $(d-1)$-dimensions, given by $\Omega_{d-1}=\frac{2\pi^{(d-1)/2}}{\Gamma[(d-1)/2]},$ (8) with $\Gamma$ a $\Gamma$-function. The action (7) coupled with the power law-Maxwell Lagrangian is represented as ${\cal L}=\frac{1}{2\kappa}\int|e|f(T)~{}d^{d}x+\int|e|{\cal L}_{em}~{}d^{d}x,$ (9) where ${\cal L}_{em}={\cal F}^{s}$, with ${\cal F}=dQ$ and $Q=Q_{\mu}dx^{\mu}$ is the electromagnetic potential 1-form Capozziello _et al._ (2013) and $s$ is a power-law parameter in terms of the Maxwell field. When the power for the Maxwell field is equal to unity ($s=1$), the Lagrangian describes the ordinary Maxwell theory Nashed (2013). By varing the action in Eq. (9) in terms of the tetrads, we acquire Cai _et al._ (2016): $\displaystyle I^{\nu}{}_{\mu}={S_{\mu}}^{\rho\nu}\partial_{\rho}Tf_{TT}+\left[e^{-1}{e^{i}}_{\mu}\partial_{\rho}\left(e{e_{i}}^{\alpha}{S_{\alpha}}^{\rho\nu}\right)-{T^{\alpha}}_{\lambda\mu}{S_{\alpha}}^{\nu\lambda}\right]f_{T}-\frac{1}{4}f\delta^{\nu}_{\mu}+\frac{1}{2}\kappa{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}\equiv 0.$ (10) Here, we show $f(T)$ as $f$, and we describe $f_{T}:=\frac{\partial f(T)}{\partial T}$ and $f_{TT}:=\frac{\partial^{2}f(T)}{\partial T^{2}}$. Moreover, ${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}$ means the energy-momentum tensor of the power law-Maxwell field defined by ${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}=s{\cal F}_{\mu\alpha}{\cal F}^{\nu\alpha}{\cal F}^{s-1}-\frac{1}{4}\delta_{\mu}{}^{\nu}{\cal F}^{s}\,,$ (11) where ${\cal F}={\cal F}_{\mu\nu}{\cal F}^{\mu\nu}$. Furthermore, the variation of Eq. (9) with respect to $\bm{Q_{\mu}}$, which is the 1-form of the gauge potential, yields $\displaystyle\partial_{\alpha}\left(\sqrt{-g}{\cal F}^{\mu\nu}{\cal F}^{s-1}\right)=0\;.$ (12) It follows from Eq. (12) clearly that when the power law $s=1$ the energy- momentum tensor of Eq. (12) coincides with the linear form of Maxwell field Nashed (2013). Eq. (12) determines the power law of Maxwell field in arbitrary dimensions. In addition, Eq. (10) can take the following form: $\partial_{\nu}\Biggl{[}e{S}^{a\rho\nu}f_{T}\Biggr{]}=\kappa e{e^{a}}_{\mu}\Biggl{[}t^{\rho\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\rho\mu}\Biggr{]},$ (13) where $t^{\nu\mu}$ is the energy-momentum tensor of the gravitational configuration, given by $t^{\nu\mu}=\frac{1}{\kappa}\Biggl{[}4f_{T}{S^{\alpha}}^{\nu\lambda}{T_{\alpha\lambda}}^{\mu}-g^{\nu\mu}f\Biggr{]}.$ (14) The anti-symmetry of the tensor ${S}^{a\nu\lambda}$ leads $\partial_{\mu}\partial_{\nu}\left[e{S}^{a\mu\nu}f_{T}\right]=0,$ (15) from which we have $\partial_{\mu}\left[e\left(t^{a\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{a\mu}\right)\right]=0.$ (16) Hence, from Eq. (16) we find $\frac{d}{dt}\int_{V}d^{(d-1)}x\ e\ {e^{a}}_{\mu}\left(t^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)+\oint_{\Sigma}\left[e\ {e^{a}}_{\mu}\ \left(t^{j\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{j\mu}\right)\right]=0.$ (17) Equation (17) denotes the conservation law of ${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\lambda\mu}$ as well as the pseudo tensor $t^{\lambda\mu}$, which describes the energy- momentum tensor of gravitation in $f(T)$ gravity Ulhoa and Spaniol (2013). Thus, the energy-momentum tensor of $f(T)$ gravity in the ($d-1$)–dimensions contained in the volume $V$ reads $P^{a}=\int_{V}d^{(d-1)}x\ e\ {e^{a}}_{\mu}\left(t^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)=\frac{1}{\kappa}\int_{V}d^{(d-1)}x\partial_{\nu}\left[e{S}^{a0\nu}f_{T}\right],$ (18) which corresponds to TEGR when $f(T)=T$ Maluf _et al._ (2002). The above equation (18) is the conserved four-momentum equation for any configuration that behaves as a flat spacetime. In this research, we derived a class of BH solutions, which behaves asymptotically as an AdS spacetime. Therefore, it was necessary to conduct the calculations of the conserved quantities concerning a pure AdS/dS space to avoid the conserved quantities having infinite value because the asymptotic behavior of the solutions of BH is similar to that of AdS. With the difference of the energy of the pure AdS BH solution from that of the AdS space, the total energy of the AdS BH could be found. Hence, for the calculation of the conserved quantities, we subtract the effects of the AdS space, which we describe by using the subscription “$r$” to regularized value. From Eq. (17), we get $\frac{d}{dt}\int_{V}d^{(d-1)}x\ e\ {e^{a}}_{\mu}\left(t_{r}^{0\mu}+{{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{0\mu}\right)+\oint_{\Sigma}\left[e\ {e^{a}}_{\mu}\ \left(t_{r}^{j\mu}+{{{{\mathrm{T}}_{r}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}}{}^{j\mu}\right)\right]=0.$ (19) Thus Eq. (19) is the regularized conservation law of any spacetime that behaves as (A)dS. ## III New Anti-de-Sitter solutions of black holes in power law Maxwell-$f(T)$ gravity In this section, we will derive the AdS charged BH solutions in $d$–dimensions for the power-law Maxwell-$f(T)$-gravity. For this aim, we will use the flat transverse sections in the $d$–dimensions ($t$, $r$, $\theta_{1}$, $\theta_{2}$, $\cdots$, $\theta_{i}$, $z_{1}$, $z_{2}$ $\cdots$ $z_{k}$), where $k=1,2\cdots$ $d-i-2$, $0\leq r<\infty$, $-\infty<t<\infty$, $0\leq\theta_{i}<2\pi$, $-\infty<z_{k}<\infty$, with the following vielbein form Capozziello _et al._ (2013); Awad _et al._ (2017): $\left({e^{i}}_{\mu}\right)=\left(\sqrt{N(r)},\;\frac{1}{\sqrt{N(r)g(r)}},\;r,\;r,\;r\;\cdots\right)$. --- (20) Here, $t$ and $r$ are time and the radial coordinate, respectively. The metric associated of the vielbein in Eq. (20) assumes the following form: $ds^{2}=N(r)dt^{2}-\frac{1}{N(r)g(r)}dr^{2}-r^{2}\left(\sum_{i=1}^{n}d\theta^{2}_{i}+\sum_{k=1}^{d-n-2}dz_{k}^{2}\right),$ (21) with $N(r)$ and $g(r)$ two unknown functions $r$111In 4-dimension the metric (21) yields $ds^{2}=N(r)dt^{2}-\frac{1}{N(r)g(r)}dr^{2}-r^{2}\gamma_{ij}dx^{i}dx^{j}\,.$ where $\gamma_{ij}dx^{i}dx^{j}$ represents the line element of a two- dimensional surface with constant curvature $k=-1,0,1$, and the indices $(i,j)=1,2$. The well-known solutions of GR, such as the Schwarzschild and the Reissner-Nordstr¨om geometries, correspond to spherical horizon structure where $k=1$. In this work, however, we shall consider solutions with a flat horizon structure where $k=0.$. By combining the tetrad in Eq. (20) into the scalar torsion $T$ in Eq. (6), we obtain $T=\frac{(d-2)g}{r}\Big{[}N^{\prime}+\frac{(d-3)N}{r}\Big{]},$ (22) where $N^{\prime}=\frac{dN(r)}{dr}$ and $g^{\prime}=\frac{dg(r)}{dr}$. In the following, we omit the arguments of $N(r)$, $g(r)$, $N^{\prime}(r)$ and $g^{\prime}(r)$. Owing to the success of the power-law form of $(T)$ to describe cosmology Nesseris _et al._ (2013); Nunes _et al._ (2016); Basilakos _et al._ (2018), we focus on the quadratic form $f(T)=T_{0}+\alpha T-\beta T^{2},$ (23) where $T_{0}$, $\alpha$ and $\beta$ are constants. ### III.1 Asymptotically static AdS BHs with the power-law Maxwell field Regarding the vanishing of the electromagnetic sector, i.e., ${{{\mathrm{T}}^{{}^{{}^{{\\!\\!\\!\\!\scriptstyle{em}}}}}}}^{\nu}_{\mu}=0$, the results are identical to those obtained in Ref. Capozziello _et al._ (2013); Awad _et al._ (2017); Nashed and Saridakis (2018). However, novel results can be found for the non-vanishing of the electromagnetic field, and this could be explained by the tetrads in Eq. (20) in the field equations (10) and (12) by utilizing the vector potential 1-form222Through out the rest of this study we will put $\kappa=1$.. $Q(r)=\phi(r)dt.$ (24) The non-zero components of the field equations read $\displaystyle I^{r}{}_{r}=2Tf_{T}-f-(2s-1)\Big{\\{}-2\phi^{\prime 2}g(r)\Big{\\}}^{s}=0,$ $\displaystyle I^{z_{1}}{}_{z_{1}}=I^{z_{2}}{}_{z_{2}}=\cdots\cdots=I^{z_{d-n-2}}{}_{z_{d-n-2}}=\frac{f_{TT}[r^{2}T+(d-2)(d-3)N]gT^{\prime}}{r(d-2)}+\frac{f_{T}}{2r^{2}}\Biggl{\\{}2r^{2}gN^{\prime\prime}+2(3d-8)rgN^{\prime}$ $\displaystyle+4(d-3)^{2}Ng+2(d-3)rNg^{\prime}+r^{2}N^{\prime}g^{\prime}\Biggr{\\}}-f+\Big{\\{}-2\phi^{\prime 2}g(r)\Big{\\}}^{s}=0,$ $\displaystyle I^{t}{}_{t}=\frac{2(d-2)Ngf_{TT}T^{\prime}}{r}+\frac{(d-2)f_{T}[2\\{(d-3)Ng+rgN^{\prime}\\}+rNg^{\prime}]}{r^{2}}-f-(2s-1)\Big{\\{}-2\phi^{\prime 2}g(r)\Big{\\}}^{s}=0,$ where $\phi^{\prime}=\frac{d\phi}{dr}$. Various observations including the followings are extracted from Eq. (III.1): (i)-Equation (III.1) is reduced to those derived in Awad _et al._ (2017) for $s=1$. (ii)-When $s=1/2$, the above system does not yield any solution because the charged terms of Eq. (III.1) are imaginary. Hence, the case (ii) is excluded in this study. To derive an exact and well-behaved physical solution for the above system, we considered $T_{0}=-\frac{1}{12\beta}$ and $\alpha=1$ and assumed that $s$ possessed odd values. Other factors prevented the good behavior of the solution and imparted it with an imaginary value. By employing the pervious constraints, we acquire the following general solution of the above differential equations in $d$-dimensions $\displaystyle N(r)=\frac{r^{2}}{6(d-1)(d-2)\beta}+\frac{c_{1}}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}c_{2}{}^{2s}}{2(d-2)(2s+1-d)r^{\frac{2[1+(d-4)s]}{2s-1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}c_{2}{}^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\frac{[2+(3d-10)s]}{2s-1}}},$ $\displaystyle g(r)=\frac{1}{\Bigg{[}c_{2}{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{{}^{\frac{2s(d-2)}{2s-1}}}}}+1\Bigg{]}^{2}},\qquad\qquad{\cal F}_{tr}=\frac{c_{2}}{r^{{}^{\frac{(d-2)}{2s-1}}}}+\frac{c_{2}{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}}{{r^{{}^{\frac{(s+1)(d-2)}{2s-1}}}}},$ $\displaystyle\phi(r)=\frac{c_{2}(2s-1)}{(d-1-2s){r^{{}^{\frac{(d-1-2s)}{2s-1}}}}}+\frac{c_{2}{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)^{5/2}}}{{[d-1+s(d-4)]r^{{}^{\frac{[d-1+s(d-4)]}{2s-1}}}}},$ (26) where $s$ takes a odd value, ${\cal F}_{tr}$ is the electric field, and $\phi(r)$ is the gauge potential 1-form. Equation (III.1) clearly expresses that $s$ must not be equal to half ($s\neq 1/2$). Additionally, Eq. (III.1) is a generalization of the one presented in Awad _et al._ (2017) and is reduced to them at $s=1$. For an asymptotic AdS/dS spacetime, we have $\Lambda_{\mathrm{eff}}=\frac{1}{6(d-1)(d-2)\beta}.$ (27) Equation (27) ensures that black hole solution (III.1) has no corresponding in TEGR upon taking the limit $\beta\rightarrow 0$, which means this charged black hole solution has no analogue in GR or TEGR. By combining Eqs. (III.1) and (27), we get $\displaystyle N(r)=\Lambda_{\mathrm{eff}}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\frac{2[1+(d-4)s]}{2s-1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\frac{[2+(3d-10)s]}{2s-1}}},$ (28) $\displaystyle g(r)=\frac{1}{\Bigg{[}q{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{{}^{\frac{2s(d-2)}{2s-1}}}}}+1\Bigg{]}^{2}},\qquad\qquad{\cal F}_{tr}=\frac{q}{r^{{}^{\frac{(d-2)}{2s-1}}}}+\frac{q{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}}{{r^{{}^{\frac{(s+1)(d-2)}{2s-1}}}}},$ $\displaystyle\phi(r)=\frac{q(2s-1)}{(d-1-2s){r^{{}^{\frac{(d-1-2s)}{2s-1}}}}}+\frac{q{}^{s+1}\sqrt{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)^{5/2}}}{{[d-1+s(d-4)]r^{{}^{\frac{[d-1+s(d-4)]}{2s-1}}}}},$ where $c_{1}=-m$, and $c_{2}=q$. It follows from Eq. (28) that a kind of cosmological constant can appear in $f(T)$ gravity Iorio and Saridakis (2012); Kofinas _et al._ (2015). Moreover, it is seen from Eq. (28) that $s\leq\frac{d-1}{2}$ so that the monopole term, first term of $\phi(r)$ in Eq. (28), could exhibit finite behavior. However, the second term of $\phi(r)$ in Eq. (28) is always finite at $r\rightarrow 0$. To discuss some of the physical properties of the aforementioned BH solution, we substituted Eq. (28) into Eq. (21) and obtained the metric spacetime in the following form: $\displaystyle\\!\\!\\!\\!\\!\\!\\!ds{}^{2}=\Biggl{[}\Lambda_{eff}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\beta_{1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\beta_{2}}}\Biggr{]}dt^{2}-r^{2}\left(\sum_{i=1}^{n}d\theta^{2}_{i}+\sum_{k=1}^{d-n-2}dz_{k}^{2}\right)$ $\displaystyle\ \ \ -\frac{\\!dr^{2}}{\Biggl{[}\Lambda_{eff}r^{2}-\frac{m}{r^{d-3}}+\frac{3\;2{{}^{{}^{s}}}(2s-1)^{2}q^{2s}}{2(d-2)(2s+1-d)r^{\beta_{1}}}+\frac{2^{{}^{\frac{3s-1}{2}}}(2s-1)^{\frac{5}{2}}q^{3s}\sqrt{6\beta}}{(d-2)[(d-1)+(d-4)s]r^{\beta_{2}}}\Biggr{]}\Bigg{[}q{}^{s}\sqrt{\frac{2{{}^{{}^{(s-1)}}}\;(-1)^{{}^{1+s}}\;6\;\beta(2s-1)}{r^{\beta_{3}}}}+1\Bigg{]}^{2}},\\!$ (29) where $\beta_{1}=\frac{2[1+(d-4)s]}{2s-1}$, $\beta_{2}=\frac{[2+(3d-10)s]}{2s-1}$ and $\beta_{3}={\frac{2s(d-2)}{2s-1}}$. As expected, we have obtained a solution, which behaves asymptotically as (A)dS dS according to the sign of the dimensional parameter $\beta$ because the constants $\beta_{1}$, $\beta_{2}$ $\beta_{3}$ are always positive. Additionally, Eq. (28) is a generalization of the ones derived in Ref. Capozziello _et al._ (2013); Awad _et al._ (2017), owing to the application of a more general power-law Maxwell-$f(T)$-gravity. Furthermore, we investigate the singularity structure of the BH solution in Eq. (28),by calculating the curvature and torsion invariants. The curvature scalars were calculated from the metric in Eq. (III.1, whereas the torsion scalar was calculated employing the vierbeins in Eq. (20). By calculating the Ricci scalar, the Ricci tensor square, and the Kretschmann scalar, we find $\displaystyle R\approx\frac{C_{1}(r)}{\sqrt{\beta}r^{{}^{\frac{{{s(d-2)}}}{2s-1}}}},\qquad R^{\mu\nu}R_{\mu\nu}\approx\frac{C_{2}(r)}{\sqrt{\beta}r^{{}^{\frac{{{2s(d-2)}}}{2s-1}}}},\qquad K\approx R^{\mu\nu\lambda\rho}R_{\mu\nu\lambda\rho}\approx\frac{C_{3}(r)}{\sqrt{\beta}r^{{}^{\frac{{{2s(d-2)}}}{2s-1}}}},$ (30) and the torsion scalar exhibited the following form: $\displaystyle T(r)\approx\frac{C_{4}(r)}{\sqrt{\beta}r^{{}^{\frac{{{s(d-2)}}}{2s-1}}}},$ (31) where $C_{i}(r)$ is the lengthy polynomial function of $r$. The foregoing invariants clearly indicate that there is singularity at $r=0$. At $limit_{r=0}$, , the above invariants exhibited the following form $(K,R_{\mu\nu}R^{\mu\nu})\sim r^{{}^{\frac{{{-2s(d-2)}}}{2s-1}}}$ and $(R,T)\sim r^{{}^{\frac{{{-s(d-2)}}}{2s-1}}}$ (dissimilar to the BH solutions that were derived from the linear Maxwell-$f(T)$ in which $(K,R_{\mu\nu}R^{\mu\nu})\sim r^{{}^{{{{-2(d-2)}}}}}$ and $(R,T)\sim r^{{}^{{{{-(d-2)}}}}}$. the asymptotic behaviors of the curvature and torsion invariants of the solution (Eq. 28) ) were different from those of the BH solution that were derived from the Einstein-Max- ell theory in the GR and TEGR formulations, which behaved as $(K,R_{\mu\nu}R^{\mu\nu})\sim r^{-2d}$ and $(R,T)\sim r^{-d}$. This clearly indicated that the singularity of the charged BH solution (28) was softer than that, which was obtained in the linear Maxwell-$f(T)$ and much softer than those of GR and TEGR for the charged case. Finally, it is noteworthy that although the solution (28) possessed different components, $g_{tt}$ and $g_{rr}$, its Killing vector and event horizons were equal. To investigate the horizons of the solution (28), it was necessary to calculate the roots of the function $N(r)=0$. We plotted the function $N(r)$ versus the radial coordinate, $r$, in four and five dimensions for the various values of the model parameters, as depicted in figure 1. (a) The $N(r)$ in 4-dim. (b) The $N(r)$ in 5-dim. Figure 1: The function $N(r)$ of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. The term $r_{h}$ denotes the black hole of inner Cauchy horizon. Furthermore, the aforementioned properties of the BH solution were explained differently by expressing the horizon mass–radius, $m_{h}$, of $m$ which corresponds to $r_{h}$, that representing the global properties of a horizon as obtained by setting $N(r_{h})=0$, namely ${m_{h}}=\frac{r_{h}^{(d-3)}\left(36\beta(2s-1)^{2}q^{2s}2^{s}\mathrm{A}+(d-1-2s)\Big{[}24\;2^{s}\beta q^{3s}(2s-1)^{5/2}\sqrt{6\beta}\;r_{h}{}^{\frac{-(d-2)s}{2s-1}}-r_{h}{}^{\frac{2[2+(d-4)s]}{2s-1}}(d-2)\mathrm{A}\Big{]}\right)}{24r_{h}{}^{\frac{2[1+(d-4)s]}{2s-1}}\beta(d-2)(d-1-2s)\mathrm{A}},$ (32) where $\mathrm{A}=(1+s)d-1-4s$. Noteworthily, at $s=1$ and $d=4$ we obtained $m_{h}$ of the BH solutions that were derived in Awad _et al._ (2017). (a) The value $m_{h}$ of the parameter $m$ in 4-dim. (b) The value $m_{h}$ of the parameter $m$ in 5-dim. Figure 2: The value $m_{h}$ of the parameter $m$ that corresponds to the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. Eq. (32) is plotted in Fig. 2 when $d=4$ and $d=5$. ### III.2 Energy of the black hole (28) In this subsection, the energy of the BH solution (28) was calculated from Eq. (18), and the necessary component of the super-potential $S^{\mu\nu\rho}$ of the BH solution (28) is given as follows: $S^{001}=\frac{g(r)}{r},$ (33) where $g(r)$ is expressed by Eq. (28). The regularized expression of Eq. (19) takes the following form: $P^{a}:=\int_{V}d^{d-2}x\left[e{S}^{a00}f_{T}\right]-\int_{V}d^{d-2}x\left[e{S}^{a00}f_{T}\right]_{AdS/dS},$ (34) where AdS/dS means calculations for pure AdS/dS space. Using Eq. (34) in solution (28), we get $\displaystyle E=\frac{(d-2)m}{2}+\frac{2(d-3)^{2}(2s-1)2^{s-2}3^{s-1}q^{2s}}{(2s-3)r^{\frac{[d-1-2s]}{2s-1}}}+\frac{2^{s+1}(3s-1)(2s-1)(d-3)^{4}\sqrt{3(2s-1)\beta}q^{3s}}{3(2s-3)r^{\frac{(2d-5)}{2s-1}}}+\cdots\,.$ (35) Eq. (35) indicates that the modification of $f(T)$ did not affect the mass term of the energy of standard TEGR Maluf _et al._ (2002); Maluf (1995), although it affected the charge terms. The charge terms would aid the calculation of energy starting from ${\mathcal{O}}\Bigg{(}\frac{1}{r}\Bigg{)}$, contrary to Reissner-Nordström spacetime. This difference is due to the contribution of the function $g(r)$ given in Eq. (28). Moreover, as already stated, $s$ must satisfy $s\leq\frac{d-1}{2}$ so that the second term in Eq. (35) could be finite at $r\rightarrow 0$. ## IV Rotating BHs in the power law Maxwell-$f(T)$ gravity Further, the rotating BH solutions were derived to satisfy the field equations of the power-law $f(T)$ gravity. Thus, we utilized the static BH solutions that were derived in the previous section and applied the following transformations with $n$-rotation parameters, as follows: $\bar{\theta}_{i}=-\aleph~{}{\theta_{i}}+\frac{\omega_{i}}{\lambda^{2}}~{}t,\qquad\qquad\qquad\bar{t}=\Omega~{}t-\sum\limits_{i=1}^{n}\omega_{i}~{}\theta_{i},$ (36) where $\omega_{i}$ are the rotation parameters (their number is $n=\lfloor(d-1)/2\rfloor$ where $\lfloor...\rfloor$ represents the integer part), and $\lambda$ is related to the parameter $\Lambda_{eff}$ of the static solution (28) through Eq. (37): $\displaystyle\lambda=-\frac{(d-2)(d-1)}{2\Lambda_{eff}}.$ (37) Additionally, the parameter $\Omega$ is defined as follows: $\Omega:=\sqrt{1-\sum\limits_{j=1}^{{n}}\frac{\omega_{j}{}^{2}}{\lambda^{2}}}.$ Applying the transformation (36) to the vielbeins (20) we obtained the following equation: $\displaystyle\left({e^{i}}_{\mu}\right)=\left(\begin{array}[]{cccccccccccccc}\Omega\sqrt{N(r)}&0&-\omega_{1}\sqrt{N(r)}&-\omega_{2}\sqrt{N(r)}\cdots&-\omega_{n}\sqrt{N(r)}&0&0&\cdots&0\\\\[5.0pt] 0&\frac{1}{\sqrt{N(r)g(r)}}&0&0\cdots&0&0&0&\cdots&0\\\\[5.0pt] \frac{\omega_{1}r}{\lambda^{2}}&0&-\Omega r&0\cdots&0&0&0&\cdots&0\\\\[5.0pt] \frac{a_{2}r}{\lambda^{2}}&0&0&-\Omega r\cdots&0&0&0&\cdots&0\\\\[5.0pt] \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\cdots&\vdots\\\\[5.0pt] \frac{\omega_{n}\;r}{\lambda^{2}}&0&0&0\cdots&-\Omega r&0&0&\cdots&0\\\\[5.0pt] 0&0&0&0\cdots&0&r&0&\cdots&0\\\\[5.0pt] 0&0&0&0\cdots&0&0&r&\cdots&0\\\\[5.0pt] 0&0&0&0\cdots&0&0&0&\cdots&r\\\ \end{array}\right),$ (47) where $N(r)$ and $g(r)$ are given by Eq. (28). Hence, for the electromagnetic potential (24), we obtained the following form: $\bar{\phi}(r)=-\phi(r)\left[\sum\limits_{j=1}^{n}\omega_{j}d\theta^{\prime}_{j}-\Omega dt^{\prime}\right].$ (49) Notably, although the transformation (36) did not alter the local properties of the spacetime, it changed them globally, as reported in Lemos (1995), since it mixed the compact and noncompact coordinates. Thus, the vielbeins, (20) and (47) could only be locally mapped into each other Lemos (1995); Awad (2003). The metric, which corresponds to the vielbein, (47) is written as follows: $\displaystyle ds^{2}=N(r)\left[\Omega d{t^{\prime}}-\sum\limits_{i=1}^{n}\omega_{i}d{z}^{\prime}\right]^{2}-\frac{dr^{2}}{N(r)g(r)}-\frac{r^{2}}{\lambda^{2}}\sum\limits_{i=1}^{n}\left[\omega_{i}d{t}^{\prime}+\Omega\lambda^{2}d{\theta}^{\prime}_{i}\right]^{2}-\sum\limits_{k=1}^{d-n-2}r^{2}dz_{k}^{2}-\frac{r^{2}}{\lambda^{2}}\sum\limits_{i<j}^{n}\left(\omega_{i}d{\theta}^{\prime}_{j}-\omega_{j}d{\theta}^{\prime}_{i}\right)^{2},$ where $0\leq r<\infty$, $-\infty<t<\infty$, $0\leq\theta_{i}<2\pi$, $i=1,2\cdots n$ and $-\infty<z_{k}<\infty$, where $dz_{k}^{2}$ is the Euclidean metric on $(d-2)$ dimensions with $k=1,,2\cdots d-3$. As mentioned earlier, the static configuration (21) could be recovered as a special case of the aforementioned general metric if we choose to vanish the rotation parameters $\omega_{j}$. Finally, following the procedure in subsection III.2 , the energy of the rotating charged AdS BH (LABEL:m1), as calculated as follows: $E=\frac{(d-2)[1+2(d-1)(d-2)\Lambda_{eff}\beta][\Lambda_{eff}{}^{2}\omega_{j}\sum\limits_{j=1}^{{n}}\omega_{j}+3\Omega^{2}]m}{12(d-3)G_{d}}+\cdots.$ (51) Equation (51) is the energy of spacetime (47) which contains the rotation parameters $\omega_{j}$ and when these parameters are vanishing we get the value of energy given by Eq. (35) provided the use of Eq. (27). ## V Thermodynamics of the derived black holes To study different thermodynamical properties Hunter (1999); Hawking _et al._ (1999); Bekenstein (1972, 1973); Gibbons and Hawking (1977) of BH solution (28) we start by defining the Bekenstein–Hawking entropy of $f(T)$ as reported in Karami and Abdolmaleki (2012); Bamba _et al._ (2012); Nashed (2015a, b) $S(r_{h})=\frac{1}{4}Af_{T}=\pi r_{h}{}^{2}(1-2\beta T),$ (52) where $A$ is the area of the event horizon and $T$ is the scalar torsion, which is given by Eq. (31). We plotted the entropy relation in Fig. 3 for $d=4$ and $d=5$. The figure 3 2(a) revealed that we obtained a negative entropy in the region when $r<r_{dg}$. At $r>r_{dg}$, we obtained a positive value. Eq. (52) revealed that the entropy was not proportional to the area because of the appearance of $\beta$. However, when $d=5$ we always obtain a positive entropy as 3 2(b) shows. The heat capacity, $C_{h}$ which is valuable for examining the stability of BH, was defined thermodynamically according to its sign. $C_{h}$ is defined as reported in Nouicer (2007); Dymnikova and Korpusik (2011); Chamblin _et al._ (1999); Nashed _et al._ (2018) $C_{h}=\frac{\partial m}{\partial T}\equiv\frac{\partial m}{\partial r_{h}}\left(\frac{\partial r_{h}}{\partial T}\right).$ (53) Therefore, if the heat capacity is is positive, $C_{h}>0$, BH would thermodynamically stable. Conversely, at ($C_{h}<0$), BH would be thermodynamically unstable. To calculate Eq. (53) we calculate the mass of BH mass in $r_{h}$ as obtained in Eq. (32). The Hawking temperature of BHs can be defined as reported in Hawking (1975) $T=\frac{\kappa}{2\pi},\qquad\textmd{where}\quad\kappa\quad\textmd{ is the surface gravity which is defined as, }\qquad\qquad\kappa=\frac{N^{\prime}(r_{h})}{2}.$ (54) The Hawking temperatures which is associated with the BH solution (28), is expressed as follows: $T_{h}=\frac{(d-1)(d-2)r_{h}{}^{2}-24\;2^{s}(2s-1)q^{3s}\beta\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta(2s-1)}\;r^{-\beta_{2}}-36\beta q^{2s}(2s-1)2^{s}\;r^{-\beta_{1}}}{96r_{h}\beta(d-2)},$ (55) where ${T_{h}}$ is the Hawking temperature at the inner horizon. We plotted $T_{h}$ in Fig. 4 for $d=4$ and $d=5$. (a) The value of the entropy, $S_{h}$ in 4-dim. (b) The value of the entropy, $S_{h}$ in 5-dim. Figure 3: The value of the entropy, $S_{h}$, that corresponds to the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. (a) The value of the Hawking temperature, $T_{h}$ in 4-dim. (b) The value of the Hawking temperature, $T_{h}$ in 5-dim. Figure 4: The value of the Hawking temperature, $T_{h}$, that corresponds to the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. Further, we calculated $C_{h}$ after substituting Eq. (32) and (55) into (53) as follows: $\displaystyle C_{h}=\Big{(}\frac{4\pi\sqrt{2s-1}r_{h}{}^{d-2}}{A(24\;2^{s}\;q^{3s}\;(2s-1)\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta}(1+3sd-8s)\beta r_{h}{}^{-\beta_{2}}+\sqrt{2s-1}\\{r_{h}{}^{2}(d-1)(d-2)-36\;q^{2s}\;2^{s}\;\beta\;r_{h}{}^{-\beta_{1}}\\})}\Big{)}$ $\displaystyle\times\Big{(}24\;q^{3s}\;2^{s}\;\sqrt{2^{s}\;(-1)^{{}^{s+1}}\;3\;\beta(2s-1)}(2s-1)[(2+3sd-10s)-(2s-1)(d-3)]\beta\;r_{h}{}^{-\beta_{2}}$ $\displaystyle-A[r_{h}{}^{2}(d-1)(d-2)-36\;q^{2s}\;2^{s}\;(2s-1)\;\beta\;r_{h}{}^{-\beta_{1}}]\Big{)},$ (56) It was challenging to extract any information from Eq. (V), therefore, we plotted it in 4-dimension as illustrated in Fig. 5, for particular values of the BH parameters. As figure 5 4(b) shows that we have always positive heat which means a stable BH in 5-dimension. (a) The value of the heat capacity, $C_{h}$ in 4-dim. (b) The value of the heat capacity, $C_{h}$ in 5-dim. Figure 5: The value of the heat capacity, $C_{h}$, that corresponds to the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. Although Fig. 5 indicates that $C_{h}$ of the linear case was always positive, it was negative in the nonlinear case and diverged at some critical values, $r_{h}<r_{min}$ a, thus exhibiting a positive value. These imply that BH of the linear Maxwell–$f(T)$ exhibited local stability, whereas the nonlinear case exhibited local stability only when $r_{h}>r_{min}$, otherwise, it did not. The free energy in the grand canonical ensemble, which is called the Gibbs free energy, is defined as reported in Nashed _et al._ (2018): $G(r_{h})=M(r_{h})-T(r_{h})S(r_{h}),$ (57) where $M(r_{h})$, $T(r_{h})$ and $S(r_{h})$ are the mass of the BH, the temperature and entropy at the event horizon, respectively. Inserting Eqs. (32), (52) and (55) into (57) ) affords a lengthy expression. Here we just demonstrated the behavior of the free energy in 4-dimension, as illustrated in Fig. 6. (a) The value of the free energy, $G_{h}$ in 4-dim. (b) The value of the free energy, $G_{h}$ in 5-dim. Figure 6: The value of the free energy, $G_{h}$, that corresponds to the horizon $r_{h}$, of solution (28) of power law Maxwell-$f(T)$ gravity in four and five dimensions, for various values of the power law parameter $s$. Notably, when $d=4$, the linear Maxwell field had a positive value, followed by a negative one in the range of $0.2<r<0.8$ and a positive one again Altamirano _et al._ (2014). However, the nonlinear Maxwell field was always a positive quantity, and this indicates that the nonlinear Maxwell field was always locally stable. Same discussion can be applied for $d=5$ but in that case the linear one has a positive value then a negative value in the range $0.2<r<0.4$ and the always positive value. ## VI Conclusions and Discussions We investigated the effect of the nonlinear power law of electrodynamics in the context of the modified TEGR theory, $f(T)$-gravity. To do this, we applied the flat horizon spacetime in a diverse dimension and applied it to a specific form of $f(T)=T_{0}+\alpha T-\beta T^{2}$, where $T_{0}$ and $\alpha$ are constants and $\beta$ is a dimensional parameter. The obtained nonlinear second-order differential equations were solved in an exact approach. The BH solution of these differential equations was characterized by two integration constants, in addition to the nonlinear parameter that describes the nonlinearity of the Maxwell field equation. The two constants were explained to represent the mass and charge of BH. This BH solution is a generalization to that, which was presented in Awad _et al._ (2017) owing to the existence of the nonlinear parameter. When it was equal to 1, we returned to BH that was discussed in Awad _et al._ (2017). To investigate the physical properties of this generalized BH, we calculated the scalar invariants (the ones that are related to the curvature and those that are related to the torsion) and demonstrated that the singularities of this BH were much softer than those of Awad _et al._ (2017) owing to the contribution of the nonlinear electromagnetic parameter. Moreover, we demonstrated that the singularities of our BH were much milder than those of GR BH. This result is considered to be the main merit of this study, in addition to the fact that the calculations of the energy confirmed that $s$ affects the asymptotic behavior of the charged terms as shown in Eq. (35). To explore our BH in detail, we applied a coordinate to create an exact rotating BH with nonlinear electrodynamics in the $f(T)$ frame. The features of this rotating BH are that it possessed $d$-dimensional rotating parameters, and could easily return to the nonrotating BH if all the rotation parameters were set to zero. Notably, all the features of the singularities of the nonrotating BH were present in the rotating one. Finally, we calculated some thermodynamic quantities of the nonrotating case and revealed that the entropy was not proportional to the area. The entropy was non-proportional to the area because our BH possessed a non-vanishing value of $T$. Our calculations revealed that the entropy might have a negative value when $r_{h}<r_{dg}$ otherwise, it would have a positive value. A negative entropy has been obtained and explained Cvetic _et al._ (2002); Nojiri _et al._ (2001); Nojiri and Odintsov (2002, 2017); Clunan _et al._ (2004); Nojiri _et al._ (2002). The entropy might be negative because the dimensional parameter, $\alpha$, had entered an unpermitted phase. Further, we computed the temperature of BH and demonstrated that its value was negative. This value mainly accounts for the structure of ultracold BH Davies (1977). The computations of the thermodynamics in the context of the $f(T)$-gravity for a non-trivial BH, which possessed a non-vanishing value of $T$, achieved a limit for validation. This statement required further study, which would be conducted in another work. ### Acknowledgments The authors acknowledge the anonymous referee for improving the presentation of the manuscript. G.N. would like to thank TUSUR for visiting fellowship. The work of KB has partially been supported by the JSPS KAKENHI Grant Number JP21K03547. ## References * Tangherlini (1963) F. R. Tangherlini, “Schwarzschild field inn dimensions and the dimensionality of space problem,” Il Nuovo Cimento 27, 636–651 (1963). * Myers and Perry (1986) R. C. Myers and M. J. Perry, “Black holes in higher dimensional space-times,” Annals of Physics 172, 304–347 (1986). * Fadeev _et al._ (1991) S B Fadeev, V D Ivashchuk, and V N Melnikov, “On charged black hole in multidimensional theory with ricci-flat internal spaces,” Chinese Physics Letters 8, 439 (1991). * Dehghani and Hendi (2007) M. H. Dehghani and S. H. Hendi, “Thermodynamics of rotating black branes in Gauss-Bonnet-Born-Infeld gravity,” Int. J. Mod. Phys. D16, 1829–1843 (2007), arXiv:hep-th/0611087 [hep-th] . * Dehghani _et al._ (2007) M. H. Dehghani, S. H. Hendi, A. Sheykhi, and H. Rastegar Sedehi, “Thermodynamics of rotating black branes in (n+1)-dimensional Einstein-Born-Infeld-dilaton gravity,” JCAP 0702, 020 (2007), arXiv:hep-th/0611288 [hep-th] . * Dehghani _et al._ (2008) M. H. Dehghani, N. Alinejadi, and S. H. Hendi, “Topological Black Holes in Lovelock-Born-Infeld Gravity,” Phys. Rev. D77, 104025 (2008), arXiv:0802.2637 [hep-th] . * Hendi (2010) S. H. Hendi, “Slowly Rotating Black Holes in Einstein-Generalized Maxwell Gravity,” Prog. Theor. Phys. 124, 493–502 (2010), arXiv:1008.0544 [hep-th] . * Mignemi and Stewart (1993) S. Mignemi and N. R. Stewart, “Dilaton axion hair for slowly rotating Kerr black holes,” Phys. Lett. B298, 299–304 (1993), arXiv:hep-th/9206018 [hep-th] . * El Hanafy and Nashed (2016) W. El Hanafy and G. G. L. Nashed, “Exact Teleparallel Gravity of Binary Black Holes,” Astrophys. Space Sci. 361, 68 (2016), arXiv:1507.07377 [gr-qc] . * Volkov and Straumann (1997) Mikhail S. Volkov and Norbert Straumann, “Slowly rotating nonAbelian black holes,” Phys. Rev. Lett. 79, 1428–1431 (1997), arXiv:hep-th/9704026 [hep-th] . * Ghosh and SenGupta (2007) Tanwi Ghosh and Soumitra SenGupta, “Slowly rotating dilaton black hole in anti-de Sitter spacetime,” Phys. Rev. D76, 087504 (2007), arXiv:0709.2754 [hep-th] . * Kim and Cai (2008) Hyeong-Chan Kim and Rong-Gen Cai, “Slowly Rotating Charged Gauss-Bonnet Black holes in AdS Spaces,” Phys. Rev. D77, 024045 (2008), arXiv:0711.0885 [hep-th] . * Sheykhi and Allahverdizadeh (2008) A. Sheykhi and M. Allahverdizadeh, “Higher dimensional slowly rotating dilaton black holes in AdS spacetime,” Phys. Rev. D78, 064073 (2008), arXiv:0809.1131 [gr-qc] . * Hassaine and Martinez (2007) Mokhtar Hassaine and Cristian Martinez, “Higher-dimensional black holes with a conformally invariant Maxwell source,” Phys. Rev. D75, 027502 (2007), arXiv:hep-th/0701058 [hep-th] . * Hassaine and Martinez (2008) Mokhtar Hassaine and Cristian Martinez, “Higher-dimensional charged black holes solutions with a nonlinear electrodynamics source,” Class. Quant. Grav. 25, 195023 (2008), arXiv:0803.2946 [hep-th] . * Brans and Dicke (1961) C. Brans and R. H. Dicke, “Mach’s Principle and a Relativistic Theory of Gravitation,” Physical Review 124, 925–935 (1961). * Dicke (1962) R. H. Dicke, “Mach’s Principle and Invariance under Transformation of Units,” Physical Review 125, 2163–2167 (1962). * Lovelock (1971) D. Lovelock, “The Einstein Tensor and Its Generalizations,” Journal of Mathematical Physics 12, 498–501 (1971). * Buchdahl (1970) H. A. Buchdahl, “Non-linear Lagrangians and cosmological theory,” mnras 150, 1 (1970). * Sotiriou and Faraoni (2010) Thomas P. Sotiriou and Valerio Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82, 451–497 (2010), arXiv:0805.1726 [gr-qc] . * Nojiri _et al._ (2017) S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, “Modified Gravity Theories on a Nutshell: Inflation, Bounce and Late-time Evolution,” Phys. Rept. 692, 1–104 (2017), arXiv:1705.11098 [gr-qc] . * Cai _et al._ (2016) Yi-Fu Cai, Salvatore Capozziello, Mariafelicia De Laurentis, and Emmanuel N. Saridakis, “f(T) teleparallel gravity and cosmology,” Rept. Prog. Phys. 79, 106901 (2016), arXiv:1511.07586 [gr-qc] . * Cembranos _et al._ (2012) J. A. R. Cembranos, A. de la Cruz-Dombriz, and B. Montes Nunez, “Gravitational collapse in f(R) theories,” JCAP 1204, 021 (2012), arXiv:1201.1289 [gr-qc] . * Nojiri and Odintsov (2011) Shin’ichi Nojiri and Sergei D. Odintsov, “Unified cosmic history in modified gravity: from F(R) theory to Lorentz non-invariant models,” Phys. Rept. 505, 59–144 (2011), arXiv:1011.0544 [gr-qc] . * Ferraro and Fiorini (2007) R. Ferraro and F. Fiorini, “Modified teleparallel gravity: Inflation without an inflaton,” Physical Review D 75, 084031 (2007), arXiv: gr-qc/0610067. * Awad and Nashed (2017) Adel Awad and Gamal Nashed, “Generalized teleparallel cosmology and initial singularity crossing,” JCAP 02, 046 (2017), arXiv:1701.06899 [gr-qc] . * Li _et al._ (2011) B. Li, T. P. Sotiriou, and J. D. Barrow, “$f(T)$ gravity and local Lorentz invariance,” Physical Review D 83, 064035 (2011), arXiv: gr-qc/1010.1041, arXiv:1010.1041 [gr-qc] . * Nashed (2006) Gamal G. L. Nashed, “Charged axially symmetric solution, energy and angular momentum in tetrad theory of gravitation,” Int. J. Mod. Phys. A 21, 3181–3197 (2006), arXiv:gr-qc/0501002 . * Nashed (2008) Gamal Gergess Lamee Nashed, “Charged Dilaton, Energy, Momentum and Angular-Momentum in Teleparallel Theory Equivalent to General Relativity,” Eur. Phys. J. C 54, 291–302 (2008), arXiv:0804.3285 [gr-qc] . * Nashed (2010) Gamal G. L. Nashed, “Brane World black holes in Teleparallel Theory Equivalent to General Relativity and their Killing vectors, Energy, Momentum and Angular-Momentum,” Chin. Phys. B 19, 020401 (2010), arXiv:0910.5124 [gr-qc] . * Nashed (2007a) Gamal Gergess Lamee Nashed, “Charged axially symmetric solution and energy in teleparallel theory equivalent to general relativity,” Eur. Phys. J. C 49, 851–857 (2007a), arXiv:0706.0260 [gr-qc] . * Unzicker and Case (2005) A. Unzicker and T. Case, “Translation of Einstein’s Attempt of a Unified Field Theory with Teleparallelism,” arXiv Physics e-prints (2005), physics/0503046 . * Nashed (2007b) Gamal G. L. Nashed, “Kerr-Newman Solution and Energy in Teleparallel Equivalent of Einstein Theory,” Mod. Phys. Lett. A 22, 1047–1056 (2007b), arXiv:gr-qc/0609096 . * Maluf (1995) Jose W. Maluf, “Localization of energy in general relativity,” J. Math. Phys. 36, 4242–4247 (1995), arXiv:gr-qc/9504010 [gr-qc] . * Maluf _et al._ (2002) J. W. Maluf, J. F. da Rocha-Neto, T. M. L. Toribio, and K. H. Castello-Branco, “Energy and angular momentum of the gravitational field in the teleparallel geometry,” Phys. Rev. D65, 124001 (2002), arXiv:gr-qc/0204035 [gr-qc] . * Ferraro and Fiorini (2007) Rafael Ferraro and Franco Fiorini, “Modified teleparallel gravity: Inflation without inflaton,” Phys. Rev. D75, 084031 (2007), arXiv:gr-qc/0610067 [gr-qc] . * Capozziello _et al._ (2015) Salvatore Capozziello, Orlando Luongo, and Emmanuel N. Saridakis, “Transition redshift in $f(T)$ cosmology and observational constraints,” Phys. Rev. D91, 124037 (2015), arXiv:1503.02832 [gr-qc] . * Nashed (2002) Gamal G. L. Nashed, “Vacuum nonsingular black hole in tetrad theory of gravitation,” Nuovo Cim. B 117, 521–532 (2002), arXiv:gr-qc/0109017 . * Iorio and Saridakis (2012) Lorenzo Iorio and Emmanuel N. Saridakis, “Solar system constraints on f(T) gravity,” Mon. Not. Roy. Astron. Soc. 427, 1555 (2012), arXiv:1203.5781 [gr-qc] . * Gamal (2012) G. L. N. Gamal, “Spherically Symmetric Solutions on a Non-Trivial Frame in f(T) Theories of Gravity,” Chinese Physics Letters 29, 050402 (2012), arXiv:1111.0003 [physics.gen-ph] . * Bamba _et al._ (2014) Kazuharu Bamba, Shin’ichi Nojiri, and Sergei D. Odintsov, “Trace-anomaly driven inflation in $f(T)$ gravity and in minimal massive bigravity,” Phys. Lett. B731, 257–264 (2014), arXiv:1401.7378 [gr-qc] . * Bengochea and Ferraro (2009) Gabriel R. Bengochea and Rafael Ferraro, “Dark torsion as the cosmic speed-up,” Phys. Rev. D79, 124019 (2009), arXiv:0812.1205 [astro-ph] . * Linder (2010) E. V. Linder, “Einstein’s other gravity and the acceleration of the Universe,” prd 81, 127301 (2010), arXiv:1005.3039 [astro-ph.CO] . * Wu and Yu (2011) Puxun Wu and Hong Wei Yu, “$f(T)$ models with phantom divide line crossing,” Eur. Phys. J. C71, 1552 (2011), arXiv:1008.3669 [gr-qc] . * Dent _et al._ (2011) J. B. Dent, S. Dutta, and E. N. Saridakis, “f(T) gravity mimicking dynamical dark energy. Background and perturbation analysis,” jcap 1, 009 (2011), arXiv:1010.2215 [astro-ph.CO] . * Bamba _et al._ (2011) K. Bamba, C.-Q. Geng, C.-C. Lee, and L.-W. Luo, “Equation of state for dark energy in f(T) gravity,” jcap 1, 021 (2011), arXiv:1011.0508 . * Bamba _et al._ (2010) K. Bamba, C.-Q. Geng, and C.-C. Lee, “Comment on “Einstein’s Other Gravity and the Acceleration of the Universe”,” arXiv e-prints (2010), arXiv:1008.4036 [astro-ph.CO] . * Bamba _et al._ (2012) K. Bamba, R. Myrzakulov, S. Nojiri, and S. D. Odintsov, “Reconstruction of f(T) gravity: Rip cosmology, finite-time future singularities, and thermodynamics,” prd 85, 104036 (2012), arXiv:1202.4057 [gr-qc] . * Aviles _et al._ (2013) Alejandro Aviles, Alessandro Bravetti, Salvatore Capozziello, and Orlando Luongo, “Cosmographic reconstruction of $f(\mathcal{T})$ cosmology,” Phys. Rev. D87, 064025 (2013), arXiv:1302.4871 [gr-qc] . * Jamil _et al._ (2012) Mubasher Jamil, D. Momeni, and Ratbay Myrzakulov, “Stability of a non-minimally conformally coupled scalar field in F(T) cosmology,” Eur. Phys. J. C72, 2075 (2012), arXiv:1208.0025 [gr-qc] . * Ferraro and Fiorini (2011a) Rafael Ferraro and Franco Fiorini, “Non trivial frames for f(T) theories of gravity and beyond,” Phys. Lett. B702, 75–80 (2011a), arXiv:1103.0824 [gr-qc] . * Ferraro and Fiorini (2011b) Rafael Ferraro and Franco Fiorini, “Cosmological frames for theories with absolute parallelism,” _Proceedings, 8th Alexander Friedmann International Seminar on Gravitation and Cosmology: Rio de Janeiro, Brazil, May 30-June 3, 2011_ , Int. J. Mod. Phys. Conf. Ser. 3, 227–237 (2011b), arXiv:1106.6349 [gr-qc] . * Sebastiani and Zerbini (2011) Lorenzo Sebastiani and Sergio Zerbini, “Static Spherically Symmetric Solutions in F(R) Gravity,” Eur. Phys. J. C71, 1591 (2011), arXiv:1012.5230 [gr-qc] . * Salako _et al._ (2013) I. G. Salako, M. E. Rodrigues, A. V. Kpadonou, M. J. S. Houndjo, and J. Tossa, “$\Lambda$ CDM Model in $f(T)$ Gravity: Reconstruction, Thermodynamics and Stability,” JCAP 1311, 060 (2013), arXiv:1307.0730 [gr-qc] . * Haghani _et al._ (2012) Zahra Haghani, Tiberiu Harko, Hamid Reza Sepangi, and Shahab Shahidi, “Weyl-Cartan-Weitzenboeck gravity as a generalization of teleparallel gravity,” JCAP 1210, 061 (2012), arXiv:1202.1879 [gr-qc] . * Haghani _et al._ (2013) Zahra Haghani, Tiberiu Harko, Hamid Reza Sepangi, and Shahab Shahidi, “Weyl-Cartan-Weitzenböck gravity through Lagrange multiplier,” Phys. Rev. D88, 044024 (2013), arXiv:1307.2229 [gr-qc] . * Bamba _et al._ (2013a) Kazuharu Bamba, Shin’ichi Nojiri, and Sergei D. Odintsov, “Effective $F(T)$ gravity from the higher-dimensional Kaluza-Klein and Randall-Sundrum theories,” Phys. Lett. B725, 368–371 (2013a), arXiv:1304.6191 [gr-qc] . * Bamba _et al._ (2013b) Kazuharu Bamba, Jaume de Haro, and Sergei D. Odintsov, “Future Singularities and Teleparallelism in Loop Quantum Cosmology,” JCAP 1302, 008 (2013b), arXiv:1211.2968 [gr-qc] . * Bamba (2011) Kazuharu Bamba, “Equation of State for Dark Energy in Modified Gravity Theories,” in _Proceedings, KMI Inauguration Conference on Quest for the Origin of Particles and the Universe (KMIIN): Nagoya, Japan, October 24-26, 2011_ (2011) pp. 73–79, arXiv:1202.4317 [gr-qc] . * Bamba _et al._ (2013c) Kazuharu Bamba, Sergei D. Odintsov, and Diego Sáez-Gómez, “Conformal symmetry and accelerating cosmology in teleparallel gravity,” Phys. Rev. D88, 084042 (2013c), arXiv:1308.5789 [gr-qc] . * Geng _et al._ (2011) Chao-Qiang Geng, Chung-Chi Lee, Emmanuel N. Saridakis, and Yi-Peng Wu, ““Teleparallel” dark energy,” Phys. Lett. B704, 384–387 (2011), arXiv:1109.1092 [hep-th] . * Otalora (2013) G. Otalora, “Scaling attractors in interacting teleparallel dark energy,” JCAP 1307, 044 (2013), arXiv:1305.0474 [gr-qc] . * Chattopadhyay and Pasqua (2013) S. Chattopadhyay and A. Pasqua, “Reconstruction of f( T) gravity from the Holographic Dark Energy,” apss 344, 269–274 (2013), arXiv:1211.2707 [physics.gen-ph] . * Yang (2011) Rong-Jia Yang, “New types of $f(T)$ gravity,” Eur. Phys. J. C71, 1797 (2011), arXiv:1007.3571 [gr-qc] . * Bamba _et al._ (2011) Kazuharu Bamba, Chao-Qiang Geng, Chung-Chi Lee, and Ling-Wei Luo, “Equation of state for dark energy in $f(T)$ gravity,” JCAP 1101, 021 (2011), arXiv:1011.0508 [astro-ph.CO] . * Capozziello _et al._ (2011) S. Capozziello, V. F. Cardone, H. Farajollahi, and A. Ravanpak, “Cosmography in f(T)-gravity,” Phys. Rev. D84, 043527 (2011), arXiv:1108.2789 [astro-ph.CO] . * Awad _et al._ (2018) A. Awad, W. El Hanafy, G. G. L. Nashed, S. D. Odintsov, and V. K. Oikonomou, “Constant-roll Inflation in $f(T)$ Teleparallel Gravity,” JCAP 07, 026 (2018), arXiv:1710.00682 [gr-qc] . * Capozziello _et al._ (2011) S. Capozziello, V. F. Cardone, H. Farajollahi, and A. Ravanpak, “Cosmography in f(T) gravity,” prd 84, 043527 (2011), arXiv:1108.2789 [astro-ph.CO] . * Geng _et al._ (2012) C.-Q. Geng, C.-C. Lee, and E. N. Saridakis, “Observational constraints on teleparallel dark energy,” jcap 1, 002 (2012), arXiv:1110.0913 [astro-ph.CO] . * Farajollahi _et al._ (2012) H. Farajollahi, A. Ravanpak, and P. Wu, “Cosmic acceleration and phantom crossing in f( T)-gravity,” apss 338, 195–204 (2012), arXiv:1112.4700 [physics.gen-ph] . * Cardone _et al._ (2012) V. F. Cardone, N. Radicella, and S. Camera, “Accelerating f(T) gravity models constrained by recent cosmological data,” prd 85, 124007 (2012), arXiv:1204.5294 . * Bahamonde _et al._ (2015) Sebastian Bahamonde, Christian G. Böhmer, and Matthew Wright, “Modified teleparallel theories of gravity,” Phys. Rev. D92, 104042 (2015), arXiv:1508.05120 [gr-qc] . * Capozziello _et al._ (2013) Salvatore Capozziello, P. A. Gonzalez, Emmanuel N. Saridakis, and Yerko Vasquez, “Exact charged black-hole solutions in D-dimensional $f(T)$ gravity: torsion vs curvature analysis,” JHEP 02, 039 (2013), arXiv:1210.1098 [hep-th] . * Paliathanasis _et al._ (2014) A. Paliathanasis, S. Basilakos, E. N. Saridakis, S. Capozziello, K. Atazadeh, F. Darabi, and M. Tsamparlis, “New Schwarzschild-like solutions in $f(T)$ gravity through Noether symmetries,” Phys. Rev. , 104042 (2014), arXiv:1402.5935 [gr-qc] . * Gonzalez _et al._ (2012) P. A. Gonzalez, Emmanuel N. Saridakis, and Yerko Vasquez, “Circularly symmetric solutions in three-dimensional Teleparallel, f(T) and Maxwell-f(T) gravity,” JHEP 07, 053 (2012), arXiv:1110.4024 [gr-qc] . * Boehmer _et al._ (2012) Christian G. Boehmer, Tiberiu Harko, and Francisco S. N. Lobo, “Wormhole geometries in modified teleparralel gravity and the energy conditions,” Phys. Rev. D85, 044033 (2012), arXiv:1110.5756 [gr-qc] . * Nashed (2013) Gamal G. L. Nashed, “Spherically symmetric charged-dS solution in $f(T)$ gravity theories,” Phys. Rev. D88, 104034 (2013), arXiv:1311.3131 [gr-qc] . * Ruggiero and Radicella (2015) Matteo Luca Ruggiero and Ninfa Radicella, “Weak-Field Spherically Symmetric Solutions in $f(T)$ gravity,” Phys. Rev. D91, 104014 (2015), arXiv:1501.02198 [gr-qc] . * Weitzenböck (1923) R. Weitzenböck, _Invariance Theorie_ (Gronin-gen, 1923). * Nashed (2013) G. G. L. Nashed, “Spherically symmetric charged-dS solution in f(T) gravity theories,” Phys. Rev. D 88, 104034 (2013), arXiv:1311.3131 [gr-qc] . * Ulhoa and Spaniol (2013) S. C. Ulhoa and E. P. Spaniol, “On the Gravitational Energy-Momentum Vector in f(T) Theories,” Int. J. Mod. Phys. D22, 1350069 (2013), arXiv:1303.3144 [gr-qc] . * Awad _et al._ (2017) A. M. Awad, S. Capozziello, and G. G. L. Nashed, “$D$-dimensional charged Anti-de-Sitter black holes in $f(T)$ gravity,” JHEP 07, 136 (2017), arXiv:1706.01773 [gr-qc] . * Nesseris _et al._ (2013) S. Nesseris, S. Basilakos, E. N. Saridakis, and L. Perivolaropoulos, “Viable $f(T)$ models are practically indistinguishable from $\Lambda$CDM,” Phys. Rev. D88, 103010 (2013), arXiv:1308.6142 [astro-ph.CO] . * Nunes _et al._ (2016) Rafael C. Nunes, Supriya Pan, and Emmanuel N. Saridakis, “New observational constraints on f(T) gravity from cosmic chronometers,” JCAP 1608, 011 (2016), arXiv:1606.04359 [gr-qc] . * Basilakos _et al._ (2018) S. Basilakos, S. Nesseris, F. K. Anagnostopoulos, and E. N. Saridakis, “Updated constraints on $f(T)$ models using direct and indirect measurements of the Hubble parameter,” JCAP 1808, 008 (2018), arXiv:1803.09278 [astro-ph.CO] . * Nashed and Saridakis (2018) G. G. L. Nashed and E. N. Saridakis, “Rotating AdS black holes in Maxwell-$f(T)$ gravity,” arXiv e-prints (2018), arXiv:1811.03658 [gr-qc] . * Kofinas _et al._ (2015) Georgios Kofinas, Eleftherios Papantonopoulos, and Emmanuel N. Saridakis, “Self-Gravitating Spherically Symmetric Solutions in Scalar-Torsion Theories,” Phys. Rev. D91, 104034 (2015), arXiv:1501.00365 [gr-qc] . * Lemos (1995) J. P. S. Lemos, “Cylindrical black hole in general relativity,” Phys. Lett. B353, 46–51 (1995), arXiv:gr-qc/9404041 [gr-qc] . * Awad (2003) Adel M. Awad, “Higher dimensional charged rotating solutions in (A)dS space-times,” Class. Quant. Grav. 20, 2827–2834 (2003), arXiv:hep-th/0209238 [hep-th] . * Hunter (1999) C. J. Hunter, “The Action of instantons with nut charge,” Phys. Rev. , 024009 (1999), arXiv:gr-qc/9807010 [gr-qc] . * Hawking _et al._ (1999) S. W. Hawking, C. J. Hunter, and Don N. Page, “Nut charge, anti-de Sitter space and entropy,” Phys. Rev. , 044033 (1999), arXiv:hep-th/9809035 [hep-th] . * Bekenstein (1972) J. D. Bekenstein, “Black holes and the second law,” Lett. Nuovo Cim. 4, 737–740 (1972). * Bekenstein (1973) Jacob D. Bekenstein, “Black holes and entropy,” Phys. Rev. , 2333–2346 (1973). * Gibbons and Hawking (1977) G. W. Gibbons and S. W. Hawking, “Cosmological Event Horizons, Thermodynamics, and Particle Creation,” Phys. Rev. , 2738–2751 (1977). * Karami and Abdolmaleki (2012) K. Karami and A. Abdolmaleki, “Generalized second law of thermodynamics in f(T)-gravity,” JCAP 1204, 007 (2012), arXiv:1201.2511 [gr-qc] . * Bamba _et al._ (2012) Kazuharu Bamba, Ratbay Myrzakulov, Shin’ichi Nojiri, and Sergei D. Odintsov, “Reconstruction of $f(T)$ gravity: Rip cosmology, finite-time future singularities and thermodynamics,” Phys. Rev. D85, 104036 (2012), arXiv:1202.4057 [gr-qc] . * Nashed (2015a) G. G. L. Nashed, “Kerr-NUT black hole thermodynamics in f(T) gravity theories,” European Physical Journal Plus 130, 124 (2015a). * Nashed (2015b) G. G. L. Nashed, “Kerr-Newman-NUT Black Hole in f(T) Gravity Theory and Its Thermodynamical Quantities,” Journal of the Physical Society of Japan 84, 044006 (2015b). * Nouicer (2007) Khireddine Nouicer, “Black holes thermodynamics to all order in the Planck length in extra dimensions,” Class. Quant. Grav. 24, 5917–5934 (2007), [Erratum: Class. Quant. Grav.24,6435(2007)], arXiv:0706.2749 [gr-qc] . * Dymnikova and Korpusik (2011) Irina Dymnikova and Michał Korpusik, “Thermodynamics of regular cosmological black holes with the de sitter interior,” Entropy 13, 1967–1991 (2011). * Chamblin _et al._ (1999) Andrew Chamblin, Roberto Emparan, Clifford V. Johnson, and Robert C. Myers, “Charged AdS black holes and catastrophic holography,” Phys. Rev. D60, 064018 (1999), arXiv:hep-th/9902170 [hep-th] . * Nashed _et al._ (2018) G. G. L. Nashed, W. El Hanafy, and Kazuharu Bamba, “Charged rotating black holes coupled with nonlinear electrodynamics Maxwell field in the mimetic gravity,” (2018), arXiv:1809.02289 [gr-qc] . * Hawking (1975) S. W. Hawking, “Particle Creation by Black Holes,” _Euclidean quantum gravity_ , Commun. Math. Phys. 43, 199–220 (1975), [,167(1975)]. * Altamirano _et al._ (2014) Natacha Altamirano, David Kubiznak, Robert B. Mann, and Zeinab Sherkatghanad, “Thermodynamics of rotating black holes and black rings: phase transitions and thermodynamic volume,” Galaxies 2, 89–159 (2014), arXiv:1401.2586 [hep-th] . * Cvetic _et al._ (2002) Mirjam Cvetic, Shin’ichi Nojiri, and Sergei D. Odintsov, “Black hole thermodynamics and negative entropy in de Sitter and anti-de Sitter Einstein-Gauss-Bonnet gravity,” Nucl. Phys. B 628, 295–330 (2002), arXiv:hep-th/0112045 . * Nojiri _et al._ (2001) Shin’ichi Nojiri, Sergei D. Odintsov, and Sachiko Ogushi, “Holographic entropy and brane FRW dynamics from AdS black hole in d5 higher derivative gravity,” Int. J. Mod. Phys. A 16, 5085 (2001), arXiv:hep-th/0105117 . * Nojiri and Odintsov (2002) Shin’ichi Nojiri and Sergei D. Odintsov, “(Anti-) de Sitter black holes in higher derivative gravity and dual conformal field theories,” Phys. Rev. D 66, 044012 (2002), arXiv:hep-th/0204112 . * Nojiri and Odintsov (2017) Shin’ichi Nojiri and S. D. Odintsov, “Regular multihorizon black holes in modified gravity with nonlinear electrodynamics,” Phys. Rev. D 96, 104008 (2017), arXiv:1708.05226 [hep-th] . * Clunan _et al._ (2004) Tim Clunan, Simon F. Ross, and Douglas J. Smith, “On Gauss-Bonnet black hole entropy,” Class. Quant. Grav. 21, 3447–3458 (2004), arXiv:gr-qc/0402044 . * Nojiri _et al._ (2002) Shin’ichi Nojiri, Sergei D. Odintsov, and Sachiko Ogushi, “Cosmological and black hole brane world universes in higher derivative gravity,” Phys. Rev. D 65, 023521 (2002), arXiv:hep-th/0108172 . * Davies (1977) P. C. W. Davies, “Thermodynamics of Black Holes,” Proc. Roy. Soc. Lond. , 499–521 (1977).
arxiv-papers
2021-07-25T08:57:33
2024-09-04T03:07:21.479422
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "G.G.L. Nashed and K. Bamba", "submitter": "Gamal G.L. Nashed", "url": "https://arxiv.org/abs/2107.12776" }
2107.12777
# Spectral properties of strongly correlated multi impurity models in the Kondo insulator regime: Emergent coherence, metallic surface states and quantum phase transitions Fabian Eickhoff Frithjof B. Anders Fakultät Physik, Technische Universität Dortmund, 44221 Dortmund, Germany (July 27, 2021) ###### Abstract We investigate the real-space spectral properties of strongly-correlated multi-impurity arrays in the Kondo insulator regime. Employing a recently developed mapping onto an effective correlated cluster problem makes the problem accessible to the numerical renormalization group. The evolution of the spectrum as function of cluster size and cluster site is studied. We applied the extended Lieb-Mattis theorem to predict whether the spectral function must vanish at the Fermi energy developing a true pseudo-gap or whether the spectral function remains finite at $\omega=0$. Our numerical renormalization group spectra confirm the predictions of the theorem and shows a metallic behavior at the surface of a cluster prevailing in arbitrary spatial dimensions. We present a conventional minimal extension of a particle- hole symmetric Anderson lattice model at $U=0$ that leads to a gapped bulk band but a surface band with mainly $f$-orbital character for weak and moderate hybridization strength. The change in the site-dependent spectra upon introducing a Kondo hole in the center of the cluster are presented as a function of the hole-orbital energy. In particular the spectral signatures across the Kosterlitz-Thouless type quantum phase transition from a singlet to a local moment fixed point are discussed. ## I Introduction Multi-impurity Anderson models (MIAM) [1, 2, 3, 4] and its Kondo model counterparts have a long history in strongly correlated materials. The basic properties of Heavy Fermions (HF) [3, 5] can be understood in terms of a hybridized band picture responsible for the heavy Fermi-liquid (FL) [6] emerging from the coupling between the light itinerant conduction electrons and strongly localized and correlated $f$-orbitals. The discovery of superconductivity [7] and competing magnetic order [3, 8] in such materials has generated a large interest in this material class over the last 40 years. One special incarnation of such a system are Kondo insulators, where a correlation induced gap opens up [9, 10, 11]: The resistivity increases below a characteristic temperature scale of the lattice, and the material crosses over from a metal to an insulator with a very small band gap when lowering the temperature. Triggered by the advent of topological insulators, such Kondo insulators have again drawn a lot of experimental and theoretical interest. Particular there is an active debate on whether SmB6 can be classified as topological Kondo insulator [12, 13] or a trivial surface conductor [11]. Local density approximations [14] in combination with Gutzwiller methods [15] strongly indicate a topological nature of SmB6, although the Kondo physics in such materials cannot be addressed by those approaches. In topological insulators [16] the protection of the Chern number enforces metallic edge states. This single-particle band properties, induced by spin-orbit coupling, inspired a lot of theoretical activity [17, 18, 19, 20] to address the experimental findings of a metallic surface state [12, 13, 11] in Kondo insulators by converting the conventional Kondo lattice or periodic Anderson model (PAM) with a spin-orbit coupling term into a topological Kondo insulator in which a metallic surface emerges naturally from topological constrains. In this paper, we present site-dependent spectral functions of a MIAM comprising a finite number of correlated orbitals embedded in a bi-partite lattice of uncorrelated orbitals. Our conventional starting point [6, 21] does not take into account the spin-orbit coupling in the Ce 4f-shell considered by Dzero et al. [17] and, therefore, cannot address a topological Kondo insulator. Raczkowski and Assaad reported a metallic surface layer in a finite size Kondo nano cluster studied with a finite temperature auxiliary-field quantum Monte Carlo (QMC) algorithm. The authors realized that this spectral feature is unrelated to topological properties and interpret their results [22] as decoupling of the metallic surface from the bulk properties. We argue that the emerging metallic surface is a consequence of the extended Lieb-Mattis theorem [23, 24] that can be applied to arbitrary large finite size correlated cluster of a very simple MIAM. In contrary, in a conventional pristine Kondo lattice model or periodic Anderson model the surface remains insulating at half filling. In this paper we present a simple argument based on this theorem how to predict whether a local spectral function must vanish at $\omega=0$ or a finite density of state is found. We successfully employ this argument to understand the elementary real-space spectral properties of a MIAM cluster obtained with Wilson’s numerical renormalization group (NRG) approach [25, 26]. In particular, the argument rigorously predicts a non- vanishing spectral density in the $f$-orbitals spectra on the surface of a Kondo insulator cluster in agreement with auxiliary-field quantum Monte Carlo data [22] and our NRG spectra. In order to reconcile the insulating surface of a pristine Kondo insulator model with the findings of a metallic surface state in a finite size but arbitrary large Kondo insulator cluster embedded in a metallic host, we address the question what is the minimum extension of a Kondo insulator to generate a metallic surface without invoking the well discussed topological arguments. It turns out to be sufficient to include only one additional layer of non-interacting orbitals to generate a metallic surface band. We present a mean-field tight-binding calculation of a 2d Kondo lattice stripe to demonstrate the emerging of exactly two spin-degenerate metallic surface bands involving only the edge orbitals. While for weak hybridization, the surface band has mainly $f$-character close to Fermi energy, the uncorrelated edge orbital start to dominate once the hybridization strength exceeds the single particle hopping matrix element. This finding opens the door for speculations whether the metallic properties of the surface band in Kondo insulators might be related to ruggedness of the surface edge. We present the evolution of the spectral function in a finite size 1d MIAM to study the crossover from single-impurity surface physics to correlated bulk properties. We find that the gap size at the cluster center agrees excellently with those obtained from a dynamical mean field (DMFT) calculation [27, 28] for an infinitely large Kondo lattice model. From the recently developed mapping of the problem onto an effective cluster [4] it becomes apparent that a single impurity Kondo model is insufficient to understand the screening of the local moments, as already suspected by Nozières [29]. The spin moment screening mechanism in the Kondo lattice model can be better understood in terms of self-screening [30] after mapping the model onto an emerging Hubbard model that is also responsible for the band formation. We extend our study to the site dependent spectral properties of the Kondo hole problem. In particular, we track the spectral evolution close to the Kosterlitz-Thouless type quantum phase transition (QPT) from a strong-coupling fixed point to a local moment fixed point describing the local moment formation by a charge neutral substitution of a correlated orbital in a Kondo- insulator [31, 24]. The spectral properties explicitly reveals the occurrence of a second Kondo temperature well below the lattice coherence temperature responsible for a sharp Kondo resonance that develops in the gap of the Kondo- insulator. The paper is organized as follows: Section II is devoted to define the model under consideration and a very brief review of our recently developed mapping onto an effective model [4] which we employ to calculate the spectral functions using the NRG. In particular, the matrix generalization of the equation of motion approach by Bulla et al [32] is presented. We present our results in Sec. III. We start with the spectral evolution as function of the cluster size in Sec. III.1. Sec. III.2 is devoted to the application of the extended Lieb-Mattis theorem [24] to predict whether the spectral function must vanish at $\omega=0$ or not. We demonstrate that our NRG calculations are fully in line with the prediction of this theorem, providing a better understanding of the observed zero frequency features at certain lattice sites. The site-dependent evolution of the spectral functions is presented in Sec. III.3 for the largest cluster we can access within the NRG. We augment our findings with a tight-binding $U=0$ calculation for an infinitely large 2d stripe model with periodic boundary conditions in one dimension to demonstrate the emergence of a metallic surface band in Sec. III.3.2. The last part of the result section, Sec. III.4, is devoted to the evolution of the spectral properties in the vicinity of a Kondo hole. In particular, we trace the breakdown of the Kondo screening of the emerging local moment close to the QPT. We close the paper with a short conclusion. ## II Multi-impurity models and Kondo holes ### II.1 Hamiltonian Figure 1: Sketch of the geometric setup: An array of $N_{f}=7$ correlated f-orbitals (green) are locally coupled to a 1d tight binding chain (blue). The MIAM [4] comprises of two subsystems: the uncorrelated conduction electrons and the localized correlated $f$-electrons. The uncorrelated condition electrons are modeled by a tight-binding model $\displaystyle H_{\rm host}=\sum_{\begin{subarray}{c}i,j,\sigma\\\ i\not=j\end{subarray}}\left(-t_{ij}c^{\dagger}_{i,\sigma}c_{j,\sigma}+\epsilon^{c}_{i}c^{\dagger}_{i,\sigma}c_{i,\sigma}\right),$ (1) where $t_{ij}$, $\epsilon^{c}_{i}$ denote the transfer parameter and single particle energy, and $i,j$ labels the lattice sites of the underlying lattice. We assume translational invariance of this subsystem so that this Hamiltonian is diagonal in $k$ space and the single-particle dispersion is denoted by $\epsilon_{\vec{k}\sigma}$. In principle a Zeemann energy can be included but we only consider the system in the absence of an external magnetic field. The localized $f$-electrons are described the atomic part of a Hubbard Hamiltonian $\displaystyle H_{\text{corr}}$ $\displaystyle=$ $\displaystyle\sum_{l,\sigma}\epsilon^{f}_{l}f^{\dagger}_{l,\sigma}f_{l,\sigma}+H_{\rm int}$ (2) $\displaystyle H_{\rm int}$ $\displaystyle=$ $\displaystyle\sum_{l}U_{l}f^{\dagger}_{l,\uparrow}f_{l,\uparrow}f^{\dagger}_{l,\downarrow}f_{l,\downarrow},$ (3) on a subset of $N_{f}$ lattice sites $l\in i$. $f_{l}^{(\dagger)}$ destroys (creates) an electron on impurity $l$, whose on-site energy is labeled by $\epsilon^{f}_{l}$, and $U$ accounts for the on-site Coulomb repulsion. A local single particle hopping term $\displaystyle H_{\rm hyb}=\sum_{l,\sigma}V_{l}c^{\dagger}_{l,\sigma}f_{l,\sigma}+\rm h.c.\,,$ (4) facilitates the hopping of an electron between the localized $f$ orbital and the corresponding Wannier orbital at the same lattice site. $V_{l}$ denotes the local hybridization of the impurity at lattice site $l$ with the corresponding local lattice orbital, such that the total Hamiltonian is given by $\displaystyle H$ $\displaystyle=$ $\displaystyle H_{\rm host}+H_{\text{corr}}+H_{\rm hyb}.$ (5) For $l$ running over all lattice sites of the host, we obtain the periodic Anderson model. If $N_{f}=1$, we recover the well understood single impurity model. By setting individual values for $\epsilon^{f}_{l},U_{l}$ at specific lattice sites, we include the modeling of Kondo holes into our rather general description [24]. Such a setup is schematically depicted in Fig. 1 for $N_{f}=7$. We can also set $\epsilon^{f}_{l}=\epsilon_{h}^{f}$ at the location $h\in l$ of the Kondo hole, and sent $\epsilon_{h}^{f}$ to very large value to completely deplete that particular orbital. ### II.2 Mapping of the MIAM and Green’s functions Here we briefly review the mapping of the MIAM onto an effective multi-band model in the wide band limit which we developed recently [4] and already applied to the Kondo-hole problem [24]. In a translation invariant lattice the Hamiltonian $H_{\rm host}$ becomes diagonal in $\vec{k}$ space, $\displaystyle H_{\rm host}$ $\displaystyle=$ $\displaystyle\sum_{\vec{k}\sigma}\epsilon_{\vec{k}\sigma}c^{\dagger}_{\vec{k}\sigma}c_{\vec{k}\sigma}.$ (6) We define the coupling function matrix element $\Delta_{l,l^{\prime}}(z)$ [33, 4] $\displaystyle\Delta_{l,l^{\prime},\sigma}(z)$ $\displaystyle=$ $\displaystyle V_{l}V^{*}_{l^{\prime}}D_{l,l^{\prime}}^{\sigma}(z),$ (7) where $D_{l,l^{\prime}}^{\sigma}(z)$ denotes the unperturbed Green function of the non-interacting host in real-space, $\displaystyle D^{\sigma}_{l,l^{\prime}}(z)$ $\displaystyle=$ $\displaystyle\frac{1}{N}\sum_{\vec{k}}\frac{1}{z-\epsilon_{\vec{k}\sigma}}e^{i\vec{k}(\vec{R}_{l}-\vec{R}_{l^{\prime}})}.$ (8) Then, the exact real-space multi impurity Green’s function (GF) is a matrix of dimension $N_{f}\times N_{f}$ and takes the form $\displaystyle\bm{G}^{f}_{\sigma}(z)$ $\displaystyle=$ $\displaystyle[z-\bm{E}_{\sigma}-\bm{\Delta}_{\sigma}(z)-\bm{\Sigma}_{\sigma}(z)]^{-1},$ (9) where the matrix $\bm{E}_{\sigma}$ contains the single-particle energies of the localized $f$-orbitals and $\bm{\Sigma}(z)$ denotes the self-energy matrix. Using the exact equation of motion for the GFs it is straight forward to show that $\displaystyle\bm{\Sigma}_{\sigma}(z)$ $\displaystyle=$ $\displaystyle\bm{F}_{\sigma}[\bm{G}^{f}_{\sigma}]^{-1},$ (10) and the matrix elements of the correlation matrix $\bm{F}$ are defined as [32] $\displaystyle F_{l,l^{\prime},\sigma}(z)=G_{B_{l\sigma},f^{\dagger}_{l^{\prime}\sigma}}(z),$ (11) where the composite operator $B_{l\sigma}$ is generated by the commutator $\displaystyle B_{l\sigma}(z)=[f_{l\sigma},H_{\rm int}].$ (12) Since the host degrees of freedom are uncorrelated, the local host GF in the presence of the correlated orbitals obeys the exact relation $\displaystyle G_{c_{i\sigma},c^{\dagger}_{j\sigma}}(z)$ $\displaystyle=$ $\displaystyle D_{i,j}^{\sigma}(z)$ $\displaystyle+\sum_{l_{l},l_{2}}D_{i,l_{1}}^{\sigma}(z)V_{l_{1}}G^{f}_{l_{1},l_{2}}(z)V^{*}_{l_{2}}D_{l_{2},j}^{\sigma}(z),$ which can be casted into a matrix multiplication. While $D_{i,j}^{\sigma}(z)$ describes the free propagation of a conduction electron from the lattice site $j$ to the lattice site $i$, the t-matrix $V_{l_{1}}G^{f}_{l_{1},l_{2}}(z)V^{*}_{l_{2}}$ accounts for all the scattering processes of the conduction electrons on all the correlated impurity orbitals. In the wide band limit, the influence of the host onto the dynamics of the correlated orbitals is determined by the real part and the imaginary part of $\bm{\Delta}_{\sigma}(z)$ at the Fermi-energy [4]. In a first step, we diagonalize $\bm{\Gamma}_{\sigma}=\Im\bm{\Delta}_{\sigma}(-i0^{+})$. The eigenvalues $\tilde{V}_{l}$ define the new couplings to $N_{f}$ independent effective conduction bands [4], while the eigenvectors describe the composition of the new local orbitals in the rotated base. The real part $\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ contains the host mediated effective hopping matrix element between the local orbitals, which are absorbed into the diagonal matrix $\bm{E}_{\sigma}$ and rotated into the new local orbital basis. This procedure defines a mapping of the original Hamiltonian, Eq. (5), onto an effective Hubbard model that couples to multiple effective conduction band channels. Obviously, this Hubbard model cluster contains already the antiferromagnetic part of the RKKY interaction mediated by the conduction electrons. Generically, a multi-band model with $N_{f}$ effective conduction electron channels is expected from the $N_{f}$ eigenvalues of $\bm{\Gamma}_{\sigma}$. It turns out, however, that the encoded topology in $\bm{\Delta}_{\sigma}$ typically leads to a reduced rank of $\bm{\Gamma}_{\sigma}$ [4]. Since the upper bound of the rank is given by the number of $\vec{k}$ vectors on the Fermi surface of the host, the problem reduces to an effective two-band model for arbitrary geometries in 1d, which makes the mapped MIAM fully accessible to the NRG. Since the NRG always diagonalizes the rotated correlated orbital problem exactly in the first step, the complexity of the problem is essentially limited by the Hilbert space dimension of the correlated impurity problem. We are able to obtain very accurate NRG results up to $N_{f}=7$ correlated sites with the computer facilities we have access to. We would like to refer the reader for more details on the approach and its limitation to our recent paper, Ref. [4]. The NRG applied to the mapped problem provides the correlation functions used to construct the correlation self-energy matrix according to Eq. (10) after rotating back into the real-space orbital basis. The full energy dependency of the uncorrelated host enters via Eq. (9) the $f$-orbital Green’s function matrix. The equation of motion expression, Eq. (II.2), provides the access to the real-space Green function matrix at arbitrary lattice sites $i,j$ that can be chosen independently of the location of the correlated orbitals. Essentially the mapped MIAM serves as a powerful tool to calculate the real- space single particle Green function matrix including all spatial correlations of the original MIAM. ## III Results Figure 2: $c$-spectral function for the central position in a $N_{f}=7$ MIAM where $U=-2\epsilon_{f}=10\Gamma_{0}$ in comparison with the DMFT solution of Kondo lattice model with the identical Kondo coupling $g=\rho J=\rho J_{SW}=0.25$ obtained by the Schrieffer-Wolff transformation [34]. In order to set the stage for our detailed real-space investigation of the spectral functions in a finite size MIAM, we plot a comparison between the $c$-orbital spectrum at the center, obtained via the exact equation of motion Eq. (II.2), and the conduction electron spectrum for a 1d Kondo lattice calculated within the dynamical mean field theory (DMFT) [27] in Fig. 2. We set the local Kondo interaction in such a way that the dimensionless Kondo coupling $g=\rho J=\rho J_{SW}$ agrees with the prediction of the Schrieffer- Wolff transformation, $J_{SW}$ [34] in the MIAM. The data clearly show an excellent agreement between the DMFT and center spectra in the $N_{f}=7$ cluster. The cluster spectrum contains all many-body inter-site correlations exactly, which are only treated in mean-field within the DMFT. In addition, the NRG broadening is overestimated in the effective site of the DMFT, hence the MIAM spectrum is much sharper and contains sub- features at higher energies which are absent in the DMFT. In addition, the DMFT shows a clear pseudo-gap with $\rho^{c}(\omega=0)=0$ while we observe a finite value $\rho^{c}(\omega=0)>0$ in the MIAM. This finite value can be explained within the extended Lieb-Mattis theorem as demonstrated later on. In an infinitely large system, this finite value will disappear and the DMFT form will be asymptotically recovered. ### III.1 Evolution of the center spectral function with the number of correlated sites $N_{f}$ We consider the geometry of Fig. 1 shown for $N_{f}=7$ and vary the number of correlated sites from $N_{f}=2$ to $N_{f}=7$. The sites are labeled consecutively with $l=1,\cdots,N_{f}$, $\epsilon_{f}=-U/2=5\Gamma_{0}$. The 1d conduction band host is particle-hole symmetric ($\epsilon^{c}=0$), and the spectral functions are obtained by an NRG calculation with the parameters stated in the caption and by employing the algorithm [35, 36] based on the complete NRG basis set [37, 38]. Figure 3: Spectral function $\rho^{f}_{l_{c}}(\omega)$ of the central $f$-orbital in a dense array comprising (a) $N^{f}=2$, (b) $N_{f}=3$, (c) $N_{f}=4$, (d) $N_{f}=5$, (e) $N_{f}=6$ and (f) $N_{f}=7$ impurities. In case of even $N_{f}$ both central $f$-orbitals are equivalent due to parity symmetry. Parameters: $\epsilon_{f}=-U/2=5\Gamma_{0}$, $\epsilon^{c}=0$, $D=10\Gamma_{0}$, $\Lambda=2$ and $N_{s}=8000$. The evolution of the spectral function at the center of the correlated sites, $l_{c}$, for $N_{f}=2-7$ respectively, is shown in Fig. 3. The local spectral function at site $l$ is extracted from the diagonal matrix element $\displaystyle\rho_{l,\sigma}^{f}(\omega)$ $\displaystyle=$ $\displaystyle\frac{1}{\pi}\Im G_{ll,\sigma}^{f}(\omega-i0^{+})$ (14) in the usual way. Note that we perform all calculations in the absence of an external magnetic field. Therefore, all spectra in this paper are spin independent. Let us first comment on the feature at $\omega\approx D=10\Gamma_{0}$, visible in all spectra. This feature originates from the Van Hove singularity of the 1d density of states right at the band edge, which is included in $\bm{\Delta}(z)$, but doesn’t have any further physical meaning. Hence we will ignore these discontinuities in the following discussion. A common feature is the formation of a gap structure symmetrically around $\omega=0$, whose width is increasing with $N_{f}$. This feature can be traced back to the spectral properties of a MIAM cluster by artificially setting $\bm{\Gamma}_{\sigma}=0$ and only include $\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ in an exact diagonalization. $\bm{\Gamma}_{\sigma}$ is responsible for the ferromagnetic component of the RKKY interaction [4], the remaining Kondo screening of a small cluster spin moment [4], renormalization of parameters and broadening of the spectrum. We notice that $\rho^{f}_{l_{c}}(\omega=0)$ at the center location remains finite and only vanishes for $N_{f}=3$ and $N_{f}=7$. Particularly, the finding of very small offset at $\omega=0$ arises the question of whether this feature is caused by a numerical problem or has a physical origin, since this has not been reported in 2d QMC spectra for a finite size Kondo lattice cluster [22]. We show in the next section that this has a physical origin, and the extended Lieb-Mattis theorem can be used to predict under which circumstances $\rho^{f}_{l}(\omega=0)=0$ and in which case $\rho^{f}_{l}(\omega=0)$ must be finite at $T=0$. For $N_{f}=2$, we have a realization of a two-impurity model where the energy dependent density of states break the particle-hole symmetry in the even and the odd channels [39, 40, 41], which generates the finite size hopping between the two correlated sites [41, 4]. We obtain two Kondo peaks, one in the even and one in the odd channel, that are shifted away equally and in opposite direction from the chemical potential as a consequence of a non-resonant scattering. The symmetric superposition of the even and the odd spectral function yields the spectrum shown in Fig. 3(a). This spectrum develops a pronounced valley between the two peaks but with a finite density of states at $\omega=0$. The lower and upper charge excitations, sometimes referred to as Hubbard peaks, are well pronounced as known from the SIAM. In Figure 3(b) we proceed to the center orbital of the $N_{f}=3$ cluster. Here we have the first MIAM of second kind, where $N_{f}$ exceeds the number of screening channels [4]. We have shown [4] that the local moments of the two outer orbitals are aligned and AF correlated with the center spin. By inspecting the spectrum in the vicinity of the chemical potential we find an exactly vanishing $\rho_{l_{c}}^{f}(\omega=0)=0$. Increasing the local cluster size to $N_{f}=4$ generates a small density of states, $\rho_{l_{c}}^{f}(\omega=0)>0$. This observation holds up to $N_{f}=6$. The pseudo-gap width increases as well as the peak height, and spectral weight is transferred from the Hubbard peaks to the sharper features close to the Fermi level. The $f$-density of states resemble a band formation of the correlated orbitals by the effective hopping matrix $\bm{T}$, which asymptotically evolves in the heavy quasiparticles close to the Kondo insulator band gap [42]. For a cluster size of $N_{f}=7$, the spectral function depicted in Fig. 3(f) develops a true pseudo-gap with $\rho_{l_{c}}^{f}(\omega=0)=0$. ### III.2 Applying the extended Lieb-Mattis theorem for predicting a pseudo- gap spectrum We can combine an auxiliary Kondo problem with the extended Lieb-Mattis theorem [23, 24] to decide whether the spectral function should have a finite value $\rho_{l}^{f}(0)$ at $\omega=0$ or not. Shen [23] have proven that for a number of $N_{f}$ local moments coupled by a local AF exchange interaction to a half-filled system of conduction electrons on a bipartite d-dimensional lattice with $N_{c}\geq N_{f}$ sites, the ground state has a total $S_{z}$ component of $\displaystyle S^{\text{tot}}_{z}=\frac{1}{2}|N_{c,\text{A}}-N_{c,\text{B}}+N_{f,\text{B}}-N_{f,\text{A}}|.$ (15) The extended version [24] generalizes Shen’s version of the Lieb-Mattis theorem to predict the ground state multiplet of a MIAM in the continuum limit, where the number $N_{c}$ of $c$-orbitals is considered to be infinitely large, $N_{c}\to\infty$. Thereby, a finite size cluster is embedded into a conduction band continuum to account for a possible Kondo screening of cluster ground state multiplets. Setting aside subtle details of the spectrum close to $\omega=0$, the presented data in Fig. 3 suggest to qualitatively parametrize the density of states by a power law fit $\rho_{l}^{f}(\omega)\approx\rho_{l}^{f}(0)+C_{l}|\omega|^{r}$ with an offset $\rho_{l}^{f}(0)$ and some exponent $r>1/2$. Let us imagine, we extent the MIAM by an additional spin $1/2$ that is locally coupled antiferromagnetically with an arbitrarily weak Kondo coupling constant to the spin in the correlated orbital at site $l$. If the density of states is finite at $\omega=0$, a Kondo screening of this additional spin must occur in the limit $T\to 0$, and a strong coupling (SC) fixed point (FP) with a singlet ground state is found. If, however, $\rho_{l,\sigma}^{f}(0)=0$ and $r\geq 1/2$, we are dealing with a pseudo-gap Kondo problem [43, 44, 45] where the local local moment (LM) FP is stable in our parameter regime for $T\to 0$. Since the ground state of the total system remains independent of the auxiliary AF coupling strength, we can now sent the auxiliary coupling to infinity creating a local singlet from the auxiliary spin and the local moment at site $l$, such that the location of the fictitiously induced local moment is shifted into the remaining system [46, 47, 24]. The essence of this first step is to map the problem of a finite spectral function $\rho_{l}^{f}(0)$ onto the question of a local moment formation in an effective MIAM where the correlated site $l$ has been removed. We extensively studied this so-called Kondo hole problem in a recent paper [24] where we have shown that the nature of the ground state can be derived from an extended Lieb-Mattis theorem on a bi-partite lattice with AF couplings at half filling. In a second step, we employ Shen’s cluster Lieb-Mattis theorem [23] for a finite size effective MIAM cluster [23, 47] with the $f$-orbital at site $l$ being removed, to determine its maximal spin component $S^{\text{tot}}_{z}$ of the ground state. If $S^{\text{tot}}_{z}=0$, no effective moment remains and $\rho_{l}^{f}(\omega=0)>0$. If, however $S^{\text{tot}}_{z}>0$, we have to be more careful and need to check in a third step whether by enlarging the conduction electron cluster, $S^{\text{tot}}_{z}$ is increasing or decreasing as outlined in Ref. [24]. This step extends finite size cluster to a true continuum model including additional screening channels due to the coupling to the host conduction electrons. If $S^{\text{tot}}_{z}$ increases, the effective exchange coupling of the ground state spin multiplet to the remaining conduction band channels is ferromagnetic, and a local moment prevails leading to $\rho_{l}^{f}(\omega=0)=0$. If, however $S^{\text{tot}}_{z}$ decreases, we can conclude that the finite size cluster is AF coupled to the effective conduction band channel and a singlet ground state is found in the Kondo hole problem. A specific example where this procedure agrees perfect with well known and established theoretical as well as experimental results is the case of graphene. Here the bi-partite lattice structure in combination with moderate correlations within the $\pi$-orbital enable the applicability of the Lieb- Mattis theorem, which predicts a stable local moment when a single carbon atom is removed. This is in agreement with theoretical studies on a microscopic level [48, 49, 50] and has already been observed experimentally [51, 52, 53]. At the same time, the pseudo-gap in the density of states of pristine graphene with an exponent of $r=1$ is well established as well, and the breakdown of the single ion Kondo effect was experimentally observed [52]. Hence this example is in line with our argumentation that the occurrence of a stable local moment when a single site is removed is directly related to a local pseudo-gap spectrum with exponent $r\geq 1/2$. Moreover, the predictions of the auxiliary model also fit to the $f$-orbital spectra of a half filled 2d PAM on simple cubic lattice with one $f$-orbital being removed, see Fig. 5 of Ref. [54]. According to the Lieb-Mattis theorem, removing another $f$-orbital on the same sublattice as the first one would increase the degeneracy of the ground state, whereas it is reduced when a $f$-orbital on the opposite sublattice gets removed. Consequently, the spectra of the $f$-orbitals on the opposite sublattice as the hole sites are expected to be finite at $\omega=0$, while the others should be fully gapped. Note that the precise value of $\rho^{f}(\omega=0)>0$ can not be predicted by the Lieb- Mattis theorem. It is expected that $\rho^{f}(\omega=0)>0$ falls of rapidly with increasing distance from the hole site, such that it might be difficult to resolve for larger distances as shown in Fig. 3 of Ref. [54]. We applied the extended Lieb-Mattis theorem to the situation where we removed the correlated orbital at the center position $l_{c}$ for the different cluster sizes $N_{f}$. Indeed, we only found a LM FP for $N_{f}=3$ and $N_{f}=7$ confirming our numerical findings as depicted in Fig. 3. For $N_{f}=2$, the auxiliary problem reduces to a SIAM that has a singlet ground state, and consequently $\rho_{1}^{f}(\omega=0)>0$. For $N_{f}=3$, the Kondo-hole cluster yield $2S^{\text{tot}}_{z}=1$, adding another conduction electron site yields $2S^{\text{tot}}_{z}=2$ indicating a ferromagnetic coupling so that a the ground state carries a local moment. It is interesting to note that this $N_{f}=3-1=2$ effective Kondo-hole MIAM is identical to a two-impurity Anderson model with both impurities located on the same sub-lattice. For this case we have explicitly proven in a NRG calculation including the full energy dependency of the conduction band host that the LM fixed point is stable [40]. Therefore $\rho_{2}^{f}(\omega=0)=0$, for $N_{f}=3$ as observed in Fig. 3(b). Note that the $N_{f}=3$ cluster is the minimal model to realize a MIAM of the second kind in a 1d host. In a MIAM of the second kind the number of screening channels is less than the number of $f$-orbitals [4], which is required in order to realize a fully gapped spectra. In Sec. III.1 of Ref. [24], we presented a detailed analysis for the non-interacting limit of the simplest realization for a MIAM of the second kind in arbitrary dimensions on a simple cubic lattice, arranged as schematically depicted in Fig. 6 of Ref. [24] for the 1d and 2d case. The even parity subspace of the model contains the central $f$-orbital ($f_{l_{c}}$) and the even linear combination of the outer ones ($f_{+}\propto\sum_{i\not=l_{c}}f_{i}$). At low temperatures, only the center orbital, $f_{l_{c}}$, couples to the conduction band electrons, while the $f_{+}$-orbital does only indirectly couple via a finite hopping element $t_{{l_{c}}+}$ between the $f_{l_{c}}$\- and $f_{+}$-orbital. The Green’s function of the $f_{l_{c}}$-orbital now involves propagations into the (decoupled) $f_{+}$-orbital and back, which, in case of PH symmetry, results in a diverging real part of the self-energy $\propto t^{2}_{{l_{c}}+}/\omega$ and, consequently, in a fully gapped spectra - see Eq. (48) in Ref. [24]. Since this contribution to the self-energy is still present when the correlations are switched on, the spectra in these models will always be fully gapped. This argumentation also holds in 2d when $N_{f}=5$ $f$-orbitals are considered and arranged as depicted in Fig. 6 (b) of Ref. [24]. In the 2d QMC study of Raczkowski and Assaad [22], however, no fully gapped spectrum was found for this specific $N_{f}=5$ model - see Fig. 3(a) in Ref. [22]. We believe that the mismatch is a finite temperature effect, and encourage the authors of Ref. [22] to adopt the zero temperature project QMC algorithm so as to investigate in more details the long imaginary time behavior of the local $\tilde{f}$-Green function. For $N_{f}=4$, a removal of the $l=2$ f-orbital yields $2S^{\text{tot}}_{z}=1$. By extending the cluster with one conduction electron site [24] we can show that one of the two screening channels is AF coupled and, therefore, the ground state of the extended Kondo-hole MIAM cluster has a singlet ground state. We leave it to the reader to apply the extended Lieb- Mattis theorem to show that this prevails for $N_{f}=5,6$ while for $N_{f}=7$ a finite LM FP is predicted by the Lieb-Mattis theorem which is compatible with our finding of $\rho_{4}^{f}(\omega=0)=0$ for $N_{f}=7$. The extended Lieb-Mattis theorem has turned out to be a very powerful tool to rigorously establish the ground state degeneracy of auxiliary MIAM, and allows us to make a prediction whether $\rho_{l}^{f}(\omega=0)$ is finite or must vanish, independent of the selected numerical approach for the calculation of the spectral functions. This establishes the high accuracy of our NRG calculations presented in Fig. 3, which are fully compatible with the prediction of the extended Lieb-Mattis theorem. ### III.3 Concentrated MIAM cluster with $N_{f}=7$ This section is devoted to the investigation of the real-space spectral functions for a MIAM cluster depicted in Fig. 1. #### III.3.1 Real-space spectral functions Figure 4: Spectral functions $\rho^{f}(\omega)$ for an impurity array comprising $N_{f}=7$ $f$-orbitals. The panels depict the spectral function of the individual $f$-orbitals starting at the outermost in panel (a) and ending at the center in panel (d). Parameters: as in Fig. 3 After establishing the evolution of the spectral function at the central site with the cluster size $N_{f}$, we investigate the site depending spectra for our largest MIAM with $N_{f}=7$. We present the $f$-spectra for the correlated site $l=1,2,3$ and the center location $l_{c}=4$ in Figs. 4(a)-(d). Note that the data shown in Fig. 4(d) is identical to Fig. 3(f) and is added for completeness. A pseudo-gap feature is found in the spectra of all sites with two nearest neighbors. This pseudo-gap is absent on the surface of the correlated chain, i. e. at $l=1$ and $l=N_{f}$, which resembles more a SIAM type spectral function. Since this feature has also been reported by Raczkowski and Assaad [22] in an auxiliary QMC calculation for a 2d Kondo cluster model on a substrate, we believe this is a generic surface property of a finite size MIAM in arbitrary spatial dimensions. We can resort to the extended Lieb-Mattis theorem exemplified in our small clusters, that such metallic surface spectrum must indeed prevail in arbitrary spatial dimensions and cluster sizes $N_{f}$, as long as the number $N_{c}$ of lattice sites of the underlying metallic host is always significantly larger, $N_{c}>N_{f}$. By removing an arbitrary correlated orbital on the surface of the cluster we are left with a new dense cluster of size $N_{f}-1$ which again has a singlet ground state. The neglected coupling to the rest of the host does not change the ground state property. The screening of an auxiliary spin coupled antiferromagnetically to a surface $f$-orbital is always possible and, therefore, the density of states of the correlated orbital at the surface for $\omega=0$ must always remain finite. This general statement provides an explanation for the finite $f$-spectral function $\rho^{f}(\omega=0)$ at the surface of $6\times 6$ Kondo cluster model [22] and in our 1d correlated chain. Let us proceed to the other correlated sites $l$ with $1<l<N_{f}$. At $l=2$ and $l_{c}=4$, $\rho_{l}^{f}(\omega=0)$ vanishes exactly, while we find $\rho_{l}^{f}(\omega=0)>0$ for $l=1,3$ in the data presented in Fig. 4. Again, this observation is consistent with the prediction of the extended Lieb-Mattis theorem. Since the number of uncorrelated sites are fixed and have a imbalance of $1$ for $N_{f}=7$, $S_{z}^{\rm tot}$ of the MIAM cluster obtained from Eq. (15) is independent of the sublattice of the removed correlated orbital, and we always find $S_{z}^{\rm tot}=1/2$. The cluster develops a local moment ground state as expected from the isolated Kondo-hole problem [24]. Now we add one more uncorrelated orbital which must belong to the opposite sublattice as the first or last lattice site of the cluster. While this leads to $N_{c,A}-N_{c,B}=0$ the total spin of the extended cluster depends on the imbalance $N_{f,B}-N_{f,A}$. Without loss of generality, let us assume that $l$ odd belongs to sublattice $A$. If we remove a correlated f-orbital on sublattice $A$, we obtain $S_{z}^{\rm tot}=0$, and consequently a finite $\rho_{l}^{f}(\omega=0)$, while for even $l$ that belongs to sublattice $B$, the ground state spin is increasing to $S_{z}^{\rm tot}=1$. Consequently, the effective MIAM cluster ground state spin is ferromagnetically coupled to the host for removing an $l$ even correlated orbital, and the local moment cannot be fully screened. At these lattice sites, $\rho_{l}^{f}(\omega=0)$ must vanish, confirming the findings of our NRG calculation. Figure 5: Effective spectral functions $\tilde{\rho}^{f}(\omega)$ for an impurity array comprising $N_{f}=7$ uncorrelated $f$-orbitals that are located at $\epsilon_{l}^{f}=0$ to maintain half-filling. The panels depict the spectral function of the individual $f$-orbitals starting at the outermost in (a) and ending at the center in panel (d). The magnitude of $\rho_{l}^{f}(\omega=0)>0$, however is not determined by the extended Lieb-Mattis theorem. In order to provide a basic understanding of the density of states, we assume that the MIAM cluster shows Fermi liquid properties for $T\to 0$ implying that we can replace the full self-energy matrix $\bm{\Sigma}_{\sigma}(z)$ in Eq. (9) for $z\to 0$ by the Hartree contribution $\Re[\bm{\Sigma}_{\sigma}(0)]$. The diagonal matrix elements renormalize the local single-particle $\epsilon^{f}_{l}\to\epsilon^{f}_{l}+U/2=0$ to ensure half-filling. The off- diagonal matrix elements renormalize the hopping matrix $\bm{T}$ but its magnitude is analytically not known. Therefore, we calculated the spatially dependent spectral functions from $\bm{\tilde{G}}^{f}_{\sigma}(z)=[z-\bm{\Delta}_{\sigma}(z)]^{-1}$ in Fig. 5 by neglecting the finite $U$ off-diagonal Hartree terms, essentially defining the $U=0$ and $\epsilon^{f}_{l}=0$ problem. Interestingly, the surface spectrum $\rho_{1,\sigma}^{f}(\omega=0)$ remains metallic while all bulk spectral functions develop a finite gap. This gap corresponds exactly to the analytic gap of the 1d PAM located at $\pm\Gamma_{0}$. This confirms that a metallic surface and bulk gap-formation is already present in the $U=0$ PH symmetric MIAM. In the corresponding local conduction electron spectra calculated by the exact equation of motion in Eq. (II.2) we found fully gapped spectra for all uncorrected conduction electrons at the sites $l$ – not shown here. We still need to reconcile the even-odd oscillations in $\rho_{l}^{f}(\omega=0)$ for $U>0$ with the finding of a gap for all bulk sites $1<l<N_{f}$ when $U=0$. A more careful analysis presented in Ref. [24] relates that to a $U=0$ Kosterlitz-Thouless type transition in the model where the f-orbital at site $l$ has been removed. To elaborate on this difference we still use the auxiliary spin picture for probing the local $f$-spectrum and employ the $U=0$ supercell analysis for the MIAM presented in Ref. [24]. In an isolated cluster of non-interacting orbitals and half-filling we have shown that removing a single $f$-orbital at site $1<l<N_{f}$ generates a localized state. For a nearest neighbor tight-binding model, this localized orbital is located at the neighboring $f$-sites and at the conduction band Wannier orbital $l$ [24]. Therefore, the $f$-electron spectra must have a gap which we interpret as a precursor of the bulk gap. Now we switch on a finite $U$. As we have demonstrated in Ref. [24], the localized bound single particle orbitals can acquire a U-induced effective Kondo coupling such that the low-temperature local moments are screened at $T=0$. This provides the microscopic mechanism that is implicitly accounted for by the extended Lieb-Mattis theorem which is only valid for $U>0$ and half-filling. Since this effective Kondo coupling increases with some power law $U^{\alpha}$, $\alpha>1$ [24] for small $U$, this mechanism also explains that the zero frequency peaks for $U/\Gamma_{0}=20$ as shown in Fig. 7 are larger than those in Fig. 4 for $U/\Gamma_{0}=10$. Eventually, for very large $U$, the crossover temperature $T_{0}$ at which the local moment is screened will decrease again as depicted in Fig. 15 of Ref. [24]. Since the effective Kondo coupling for screening the local moment depends on its distance from the edge, this mechanism is increasingly suppressed when moving from the edge to the center (bulk). Therefore, the pseudo-gap becomes more pronounce, and the finite $\rho_{l}^{f}(\omega=0)$ is reduced beyond detectability for large cluster sizes $N_{f}\to\infty$, even when the extended Lieb-Mattis theory predicts $\rho_{l}^{f}(\omega=0)>0$. Since the dimensionality of a cluster does not enter the theorem, we expect that such A-B sublattice oscillations in the local $f$-spectra should also be present in a 2d Kondo cluster for $U>0$. Raczkowski and Assaad [22], however, do not address this question, and the presented data in Fig. 3 of Ref. [22] suggests a true pseudo-gap away from the cluster surface. This might be linked to the limits of the employed auxiliary QMC. In our NRG calculations we had to access exponential small temperature scales well below the single impurity Kondo temperature to reveal these A-B sublattice oscillations in the f-spectra. Also note that the extended Lieb-Mattis theorem cannot make a prediction of the magnitude of $\rho_{l}^{f}(\omega=0)$ and only can help distinguishing between a finite $\rho_{l}^{f}(\omega=0)$ and $\rho_{l}^{f}(\omega=0)=0$. Setting aside the even-odd oscillations of $\rho_{l}^{f}(0)$, we clearly can recognize the evolution of the spectral function from an impurity type spectrum more towards a bulk spectrum with a well pronounced pseudo-gap that is compatible in width with the DMFT solution of the 1d Kondo lattice problem. Figure 6: The conduction electron spectral functions $\rho^{c}_{l}(\omega)$ for the same parameters as in Fig. 4 (a) $l=1$, (b) $l=2$, (c) $l=3$, (d) $l=4$, The Green’s functions was calculated via Eq. (II.2). In Figure 6 we present the spectra for the corresponding conduction electron orbital at the cluster site $l$. The Green’s function was calculated via Eq. (II.2). The van-Hove singularities of the 1d simple cubic density of states of the host at the band edges are clearly visible. Additionally, a gaped density of states is also found at the surface of the cluster. This is for arbitrary $N_{f}$ and is in agreement with the findings in Ref. [22]. Note that the data of Fig. 6(d) was already used for the comparison between the DMFT Kondo lattice solution and the cluster calculations as presented in Fig. 2. Figure 7: Same as in Fig. 4 but with $\epsilon_{f}=-U/2=10\Gamma_{0}$. Reminiscence of the Hubbard side peaks expected at $\omega\approx\pm U/2$ in the spectra can only be seen for $l=1$ in Fig. 4, while they disappeared for $1<l<N_{f}$. We attribute this to the strongly energy dependent self-energy matrix $\bm{\Sigma}(z)$ as well as the peculiar feature of a 1d density of states that is included in $\bm{\Delta}_{\sigma}(z)$ which shows to square root type divergencies at both band edges. We can, however, recover the Hubbard side peaks by increasing $U$. The spectral functions for $U=20\Gamma_{0}$ are shown in Fig. 7 using the same NRG parameters as in Fig. 4. For each of the calculations we have used the adequate NRG iterations such that the spectrum remains unaltered when increasing the number of iteration to ensure that we are well in the low- temperature fixed point and $T\to 0$. In addition, a low energy Kondo peak emerges on odd lattice sites. The hopping matrix $\bm{T}_{\sigma}$ generates an antiferromagnetic coupling of the different cluster local moments which leave a $S=1/2$ ground state multiplet. The bulk gap is already seen in the ED spectrum of the cluster. The remaining coupling to the conduction electron bands causes the Kondo screening of this spin 1/2 ground state leading a very narrow Kondo peak in the preformed gap structure at odd cluster sites. #### III.3.2 Discussion: Metallic surface conductor in an Kondo insulator Figure 8: Sketch of a strip of a 2d MIAM model for a Kondo insulator with a infinite large y-axis but a finite size x-axis to define a surface. The correlated orbitals are depicted in green, the uncorrelated in blue. Note that on the surface the correlated orbitals are absent. So far we exemplified a metallic surface $f$-spectra in a small MIAM cluster embedded in an metallic environment that is in agreement with auxiliary field QMC data [22] as well as with the extended Lieb-Mattis theorem. Since the spatial dimension does not enter in the extended Lieb-Mattis theorem, only requiring half-filling, antiferromagnetic coupling and a bi-partite lattice, we can conclude that even the surface of a macroscopically large cluster in 3d will be a surface conductor as long as the number of host lattice sites $N_{c}\gg N_{f}$. On the other hand, we can use the cluster Lieb-Mattis theorem [23] to analyze the surface states of a very large but finite size cluster where $N_{f}=N_{c}=O(10^{23})$. Since the removal of a single orbital, a correlated or uncorrelated does not matter, always induces a local moment of $s=1/2$, the spectra must always have a gap independent of the boundary conditions. This well known observation inspired many theoretical papers [17, 18, 19, 20] in which the Kondo lattice model is extended by spin-orbit interactions to a topological Kondo insulator in order to address the experimental findings of a metallic surface conductance on Kondo insulators [12, 13, 11]. All these concepts use a perfect lattice structure that abruptly ends at some boundary which appears to be very unrealistic in real strongly correlated materials that often have changing surfaces after cleaving. Chemical reactions with oxygen or surface roughness leads to deviation of the surface for an ideal situation. This well known fact made topological models so popular since a metallic surface state is topologically protected independent of the surface ruggedness of the real material. This discrepancy between the ideal trivial Kondo lattice with its insulating surface and a generically metallic surface in a large Kondo lattice cluster model embedded in a infinitely large metallic host raises the question of how many additional uncorrelated orbitals we need to add in order to see a metallic surface state developing at the edge of the Kondo lattice. For simplicity let us consider a 2d strip of a Kondo insulator symbolized in Fig. 8. We imagine a very large system in y-direction with $N_{y}\to\infty$. The number of sites $N_{x}$ in x-directions remains finite to establish two 1d surfaces at both edges of the strip. The exact number $N_{x}$ does not enter the argument and can be arbitrarily large but only need to be finite in order to establish an edge. The major ingredient in the setup of Fig. 8 is the removal of the correlated orbital at the surface layer of a Kondo insulator. In essence, Fig. 8 describes the smallest extension of a pristine finite size Kondo lattice model to a MIAM by adding a single uncorrelated orbital. Figure 9: (a) The $k_{y}$-dependent band structure for the periodic stripe in Hartree mean field theory, $\tilde{\epsilon}^{f}=\epsilon^{f}+U/2=0$ of a Kondo insulator model depicted in Fig. 8 and $V_{l}/t=0.5$ for a stripe width of $N_{x}=50$. The inset on the left hand side reveals the small hybridization gap and the insulating behavior. Clearly visible are the two metallic surface bands that are not crossing each other, one for positive and one for negative $k_{y}$. (b) Probability of the edge $f$ and $c$ orbital contribution at the Fermi-energy to the metallic band as function of $V/t$. The inset depicts this probability contribution for $V/t=1$ as function of the site along the x-axis on a logarithmic scale. In case of a finite $N_{y}$ the conventional Lieb-Mattis theorem needs to be applied. In analogy to the conventional Kondo insulator, removing a single orbital always leads to a change of the ground state multiplet and, hence, starting from $S^{\rm tot}_{z}=0$ results in $S^{\rm tot}_{z}=1/2$, indicating $\rho^{f/c}_{l}(\omega=0)=0$. In order to clarify the existence of a gapped $f$-spectra at the boundary in the continuum limit $N_{y}\to\infty$, we invoke the arguments of the extended Lieb-Mattis theorem as outlined before. In a first step we neglect the two edge stripes of uncorrelated orbitals such that the model results in the conventional Kondo insulator, and a $S^{\rm tot}_{z}=1/2$ ground state emerges after removing one of the $f$-orbitals at an arbitrary site (not only at the boundary). However, after including the uncorrelated edge stripes the extended Lieb-Mattis theorem predicts a reduction of the moment to $S^{\rm tot}_{z}=0$ which proves an effective antiferromagnetic coupling of the induced local moment and the 1d edge strip when recovering the original model as depicted in Fig. 8: The ground state remains in the SC FP from which we conclude that all the $f$-spectra must be metallic, $\rho^{f}_{l}(\omega=0)>0$. Since we expect an exponential suppression of the metallic states in the bulk, that is beyond the extended Lieb-Mattis theorem which only distinguishes between $\rho^{f}_{l}(\omega=0)>0$ and $\rho^{f}_{l}(\omega=0)=0$, this strongly indicates that even for an infinitely large system adding a layer of uncorrelated orbitals immediately yields a metallic surface even in a conventional Kondo insulator. Here the metallic behavior is driven by the Kondo effect, while the gap- formation in the Kondo insulator is more related to a self-screening mechanism driven by the RKKY interaction than to a picture of a single ion Kondo effect. This leaves the question of the role of the correlations and in more details the properties of the uncorrelated surface orbital defining the two vertical surface boundaries in Fig. 8. By making use of the adiabatic connection of the ground state properties upon varying the parameter strength we can answer some aspects by sending the local hybridization $V_{l}\to\infty$. Then the correlated site form individual bound states with the local conduction orbital comparable with an infinitely strong Kondo coupling. Consequently, two uncorrelated 1d surface tight binding models emerge which show trivial metallic behavior determined by the tight-binding model of the edge states. This metallic behavior will be preserved for finite $V_{l}$ and we end up with a trivial metallic surface for arbitrary $V_{l}$ but with an unclear mixture of the different orbitals. We tested this prediction by considering the mean-field theory, i. e. setting $\tilde{\epsilon}^{f}=\epsilon^{f}+U/2$ which is equivalent to $U=0$ while maintaining particle-hole symmetry. We solved the single-particle tight binding model in the geometry shown in Fig. 8 for an infinitely large stripe of width $N_{x}=50$ with periodic boundary condition in $y$-directions. The $2N_{y}-2$ bands are depicted in Fig. 9(a) revealing an insulating behavior with a finite band gap. $N_{y}-2$ bands lay completely below the chemical potential $\mu=0$ and $N_{y}-2$ bands are located above it. In addition, two non-crossing metallic bands emerge as shown in the inset of Fig. 9(a). In order to identify the spatial location of the metallic band and the orbital content, we plot the probability contribution of the $c$-edge orbital at $l_{x}=1$ or $l_{x}=N_{x}$ and the $f$-edge orbital at $l_{x}=2$ or $l_{x}=N_{x}-2$ in Fig. 9(b) as function of the hybridization strength $V$ at the chemical potential. The inset depicts the probability contribution for $V/t=1$ as function of $l_{x}$ on a logarithmic scale. The data reveals that the metallic state is exponentially localized at the edge and $V/t$ determines the mixture of $c$ and $f$ orbitals. For a small hybridization, the wide band limit, the $f$-orbital content dominates while with increasing $V$ the uncorrelated edge orbital increases its contribution. For $V=t$, both orbital contribute equally. The figure also confirms the prediction made above that for infinitely large $V$, only the uncorrelated edge orbitals contribute to the metallic surface band close to the chemical potential. We conjecture that this picture prevails in a model that also includes the fluctuating contributions of the Coulomb interaction. In addition the inset in Fig. 9(b) also reveals that the local density of states $\rho_{l_{x},l_{y}}^{f}(0)$ and $\rho_{l_{x},l_{y}}^{c}(0)$ remain finite in agreement with the finite $U$ extended Lieb-Mattis theorem. Our $U=0$ analysis and the exponential localization of the metallic surface state in the bulk also reconciles the seemingly paradox of the prediction of an finite spectra at $\omega=0$ by the extended Lieb-Mattis theorem and the expectation of a bulk insulator. The contribution of the metallic surface band to the bulk spectrum at $\omega=0$ becomes exponentially small, and for practical purposes one can not distinguish the bulk spectra from a true insulator with vanishing spectra at $\omega=0$. Since the results for the $U=0$ spectra is in line with the finite $U$ prediction, there is no QPT at $U=0$ in this case which we attribute to geometric differences between infinite and semi-infinite 2d systems. The supercell analysis in Ref. [24] is valid in arbitrary dimensions, but relies on periodic boundary conditions in all spatial directions. ### III.4 Real-space spectral functions for the Kondo-hole problem Figure 10: Sketch of the geometric setup with a Kondo hole: An array of $N_{f}=7$ correlated f-orbitals (green) are locally coupled to a 1D tight binding chain (blue). We replace the center correlated orbital with one uncorrelated orbital (red) and introduce $\epsilon^{h}$ as its single orbital energy. In this section we address the question how a Kondo-hole located at the center of a $N_{f}=7$ MIAM cluster changes the spectral properties. The geometry of the problem is sketched in Fig. 10. We replace the center $f$-orbital by an uncorrelated orbital with an single-particle energy $\epsilon^{f}_{l_{c}}=\epsilon^{h}$ and $U_{l_{c}}=0$. This allows for modeling charge neutral substitution of Ce by La which has a finite $4f$-orbital energy $\epsilon^{h}\geq 0$ up to complete removing the site by setting $\epsilon^{h}\to\infty$ [24]. Figure 11: Spectral function of the outermost $f$-orbital in an $N_{f}=7$ impurity array with an uncorrelated hole-orbital in its center at $\epsilon_{c}=0$. For the correlated $f$-orbitals $\epsilon_{f}=-U/2=5\Gamma_{0}$ holds, and the different panels show different onsite-energies of the hole-orbital: (a) $\epsilon^{h}/\Gamma_{0}=0.0$, (b) $\epsilon^{h}/\Gamma_{0}=1.0$, (c) $\epsilon^{h}/\Gamma_{0}=2.0$, (d) $\epsilon^{h}/\Gamma_{0}=2.1$, (e) $\epsilon^{h}/\Gamma_{0}=2.2$, (f) $\epsilon^{h}/\Gamma_{0}=5.0$. The QCP occurs at around $\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$. Let us start with the evolution of the spectrum at the outermost f-orbital for six different values $\epsilon^{h}/\Gamma_{0}$ plotted in Fig. 11. The initial cluster occupation starts out at $N_{f}=7$ charges at $\epsilon^{h}/\Gamma_{0}=0.0$ and monotonically decreases to $6$ charges for $\epsilon^{h}\to\infty$ when the central orbital is completely unoccupied and can be removed. Therefore, we expect that spectral weight is shifted from $\omega<0$ to $\omega>0$ upon increasing $\epsilon^{h}$. The main shift of the spectral weight is expected to occur for the central orbital. The system undergoes a quantum phase transition (QPT) [24] at critical value $\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$ from a SC FP for $|\epsilon^{h}|<\epsilon^{h}_{c}$ to a local moment FP for $|\epsilon^{h}|>\epsilon^{h}_{c}$in agreement with the extended Lieb-Mattis theorem. The initial PH symmetric spectrum becomes PH asymmetric for $\epsilon^{h}>0$. The screening temperature $T_{0}$ is exponentially suppressed at $\epsilon^{h}_{c}$, typical for a Kosterlitz-Thouless type transition, and the very narrow Kondo peak developing at $\omega=0$ becomes numerically not resolvable when approaching the QPT, i. e. $\epsilon^{h}\to[\epsilon^{h}_{c}]^{-}$. However, the boundary or surface spectrum remains metallic at any time. Figure 12: Same as Fig. 11 but for the second $f$-orbital. The situation changes when inspecting the spectral evolution for the second correlated orbital $l=2$ as depicted in Fig. 12 for the same parameters as in the previous figure. As in Fig. 4(b), the spectra vanishes at $\omega=0$ for $\epsilon^{h}=0$ 111Note that $U_{l_{c}}=0$ in this case in contrary to Fig. 4. Therefore, the $\epsilon^{h}=0$ spectra at different sites are not fully identical to those plotted in Fig. 4.. Also the extended Lieb-Mattis theorem is not applicable for finite $\epsilon^{h}$ since the system is shifted away from half-filling. A quasi-bound state is developing at the two adjacent sites to the Kondo hole, $l=3$ and $l=5$, whose local moment is screened via a coupling mediated by the central uncorrelated Kondo hole orbital. Once the low-energy (Kondo) scale is small enough, a very narrow Kondo peak develops inside of the gap as can be seen in Fig. 12(c). Furthermore, the pseudo-gap is absent ,and $\rho^{f}_{2,\sigma}(0)>0$. This additional Kondo effect well below the coherent temperature of the $N_{f}=7$ cluster destroys the Kondo insulator properties in the spectra. The system approaches the KT type QPT when increasing $\epsilon^{h}\to\epsilon^{h}_{c}$. The low temperature screening scale is already exponentially suppressed in Fig. 12(e) such that the peak is very hard to resolve. In the local moment phase, depicted in Fig. 12(f) the Kondo peak is absent in the spectrum leaving us with a slightly asymmetric spectrum with an onset of a pseudo-gap. For $\epsilon^{h}\to\infty$, we recover a half-filled system with one correlated site removed. The extended Lieb-Mattis theorem predicts a true pseudo-gap spectrum with $\rho_{2,\sigma}^{f}(0)=0$, consistent with the spectrum in the local moment phase as depicted in Fig. 12(f). Note, however, that $\rho_{2,\sigma}^{f}(0)$ is very small at finite $\epsilon^{h}$ and only vanishes in the limit $\epsilon^{h}\to\infty$ where the extended Lieb-Mattis theorem is applicable. Figure 13: Evolution of $\rho_{3,\sigma}^{f}(\omega)$ neighboring the hole site for the same parameters as in Fig. 11. Figure 13 shows the evolution of spectra for the third side using the same parameters as in the previous two figures. On top of a spectral valley around $\omega=0$ with $\rho_{3,\sigma}^{f}(0)>0$, a Kondo peak emerges at $\omega=0$ due to the screening of local moment that is created by the Kondo hole as long as $\epsilon^{h}<\epsilon^{h}_{c}$. This Kondo peak also disappears at the QPT once we enter the local moment regime. However, an additional finite frequency peak is clearly visible at finite but small $\omega$ in the spectral function plotted in Fig. 13(f) whose origin we discuss below. Figure 14: Evolution of the Kondo hole spectrum $\rho_{4,\sigma}^{f}(\omega)$ in the cluster center for the same parameters as in Fig. 11. With this basic understanding of spectral evolution we draw our attention to the spectrum at the Kondo hole site hosting an uncorrelated $f$-orbital whose single-particle energy is increased across the KT-type transition in the panels from Fig. 14(a) to Fig. 14(f) using the same parameters as for the previous three figures. Starting from a PH symmetric spectrum with a gap, i. e. $\rho_{4,\sigma}^{f}(0)=0$, for $\epsilon^{h}=0$ the spectrum becomes increasing more asymmetric, and the gap disappears. We also observe the substantial shift of the spectral weight from below to above the chemical potential reflecting that the Kondo hole occupations is rapidly and monotonically decreasing for $1<\epsilon^{h}/\Gamma_{0}\to\infty$. In fact, the crossover from half-filling to an empty orbital occurs just before $\epsilon^{h}_{c}$ but does not coincide with the QPT. Starting from Fig. 14(c) the main single-particle spectral peak from the local orbital is clearly visible at $0<\omega\approx\epsilon^{h}$. Simultaneously the spectrum show and additional peak that crosses the Fermi-energy just below the critical value $\epsilon^{h}_{c}$. Its spectral contribution is small and is overshadowed by a very narrow Kondo resonance that disappears in the local moment regime depicted in Fig. 14(f). Figure 15: Zoom of the spectral functions around the Fermi energy near the QCP located at $\epsilon^{h}_{c}/\Gamma_{0}\approx 2.25$. (a) $l=1$, (b) $l=2$, (c) $l=3$, (d) $l=l_{c}=4$. In order to address the spectral evolution across the QPT in more detail, we focus on the low-energy part of the site-dependent spectra for three values $\epsilon^{h}/\Gamma_{0}=2.1,2.2,2.3$ and combine the three spectra for each cluster site into one panel of Fig. 15, starting from the outermost site $l=1$ in Fig. 15(a) and ending at the center site $l_{c}=4$ plotted in Fig. 15(d). We clearly see the Kondo resonances at each site pinned at $\omega=0$ which is a result of the screening of the cluster local moment. The peak height depends on the contribution of the local site to this Kondo effect, and the resonance is absent in the LM FP. In addition, we observe an broader resonance just above the Fermi energy most pronounced in the spectra around the Kondo hole as plotted in Fig. 15(c)$+$(d). In order to clarify its origin, we performed an exact diagonalization of the MIAM Kondo-hole cluster by just taking into account the inter-site hopping generated by $\bm{T}_{\sigma}=\Re\bm{\Delta}_{\sigma}(-i0^{+})$ and ignoring the coupling to the effective band continua setting $\bm{\Gamma}_{\sigma}=0$. It turns out that upon raising of $\epsilon^{h}$ a low lying excitation in the spectrum is crossing the Fermi-energy and simultaneously the cluster occupation on the $f$-sites decreases from $N=7$ to $N=6$ charges. This sharp cluster excitation is broadened by including the hybridization $\bm{\Gamma}$ to the broader peaks located around $0.1<\omega/\Gamma_{0}<0.3$. Therefore, this is a contribution from a collective excitation within the effective MIAM cluster. The QPT, however does not occur exactly at this mixed valence point between $N=6$ and $N=7$: It is energetically more favorable to form a SC FP and pay some extra single particle energy $\epsilon^{h}$ as long as the energy gain in spin screening energy as well as the gain in hybridization energy is larger than the energy loss by the virtual occupation of the Kondo hole orbital. Such behavior is typical for a QPT changing the ground state degeneracy and has been discussed in the context of a chemically driven quantum phase transition in a two-molecule Kondo system [56]. This energy argument explains why the orbital peak and the peak of low-lying cluster excitation is observed at $\omega>0$ and still a Kondo effect is formed. ## IV Conclusion In this paper we studied the spectral properties of dense 1d MIAM comprising up to $N_{f}=7$ correlated orbitals using NRG in combination with a recently developed wide band approximation [4]. We focused on the parameter regime with a half filled conduction band such that the model describes a Kondo insulator in the limit $N_{f}\to\infty$ when maintaining PH symmetry. Increasing $N_{f}$ a dip in the spectra of the central sites develops rapidly, leading to a full gap already for $N_{f}=3$. This rapid onset of heavy Fermion formation is in agreement with QMC calculations [22] for a finite size Kondo cluster on a 2d square lattice and is caused by the crossover from a MIAM of the first kind to a MIAM of the second kind [4]. In case of $N_{f}=7$ the gap width in the spectral function of the central orbitals already agrees astonishing well with a full DMFT(NRG) calculation for a Kondo lattice with a Kondo coupling obtained from a Schrieffer-Wolff transformation of the corresponding SIAM for $N_{f}=1$. Using two techniques, (i) a supercell analysis for the uncorrelated limit and (ii) the extended Lieb-Mattis theorem for the strongly interacting and PH symmetric MIAM on a bi-partite lattice, which originally were developed in order to make a statement on the nature of the ground state in a Kondo hole problem [24], we predicted the essential feature of the spectra at the Fermi energy of an orbital at an arbitrary site $l$: If the degeneracy of the ground state is enhanced by removing that orbital the spectra needs to be fully gapped, $\rho_{l}(\omega=0)=0$, whereas it is finite if the degeneracy remains constant, $\rho_{l}(\omega=0)>0$. These predictions are in perfect agreement with our 1d NRG calculations and can be summarized as follows: (i) The spectra of the $f$-orbitals at the edge of the impurity array are always metallic, independent of the strength of correlations. (ii) In case of nearest neighbor hopping between the $c$-orbitals, the remaining spectra are fully gapped at $\omega=0$ in the uncorrelated limit, according to the supercell analysis. (iii) In the strongly interacting limit either all of the $f$-orbitals acquire a finite spectra at $\omega=0$ if the finite size $c$-$f$-orbital cluster is coupled to both of the sublattices of the remaining continuum, or the $\omega=0$ spectra oscillates as function of the sublattice index otherwise. Note that our numerical results demonstrate a rapid decrease of $\rho(\omega=0)$ with increasing distance to the boundary of the $f$-orbital array such that a fully gapped bulk will be restored in the limit $N_{f}\to\infty$. The finding of metallic surface states in the MIAM is in agreement with recent QMC calculations [22] for a finite size Kondo cluster on a 2d square lattice, however, the oscillations of the spectra at $\omega=0$ in the bulk have not been reported, even if the Kondo cluster only couples to one sublattice of the remaining continuum. Since the experimental observation of metallic surface states in Kondo insulators triggered a lot of theoretical research with the focus on topological protection protected mechanisms caused by spin-orbit coupling, the finding of such states in the MIAM naturally raised the question, of how many additional uncorrelated $c$-orbitals are needed in an extension of the conventional Kondo insulator description to obtain a metallic surface. Using the Lieb-Mattis theorem in combination with a mean-field calculation we demonstrated that the removal of only the outermost $f$-orbitals in a 2d Kondo insulator is sufficient to realize a metallic band that is exponentially localized at the boundary. We studied the change in the site dependent spectra upon introducing a Kondo hole in the center of a $N_{f}=7$ cluster model. Shifting the onsite energy $\epsilon^{h}$ of the uncorrelated hole orbital from $\epsilon^{h}=0$ to $\epsilon^{h}=\infty$, the model undergoes a Kosterlitz-Thouless type quantum phase transition at a critical $\epsilon^{h}_{c}$ which is in accordance with the extended Lieb-Mattis theorem [24]. For $\epsilon^{h}\to\epsilon^{h}_{c}$ a Kondo resonance develops inside the gap of all $f$-orbitals in the cluster, whose width gets exponentially suppressed at the QCP. In addition a collective excitation is observed in form of a sharp resonance that crosses the Fermi energy already for $\epsilon^{h}<\epsilon^{h}_{c}$ and signals the reduction of charge carriers by one due to the removal of the hole orbital. ###### Acknowledgements. The authors would like to thank fruitful discussion with Fakher Assaad. ## References * Jones and Varma [1987] B. A. Jones and C. M. Varma, Study of two magnetic impurities in a fermi gas, Phys. Rev. Lett. 58, 843 (1987). * Ingersent _et al._ [1992] K. Ingersent, B. A. Jones, and J. W. Wilkins, Study of the two-impurity, two-channel kondo hamiltonian, Phys. Rev. Lett. 69, 2594 (1992). * Grewe and Steglich [1991] N. Grewe and F. Steglich, Heavy fermions, in _Handbook on the Physics and Chemistry of Rare Earths_ , Vol. 14, edited by K. A. Gschneidner, Jr. and L. Eyring (North-Holland, Amsterdam, 1991) p. 343. * Eickhoff and Anders [2020] F. Eickhoff and F. B. Anders, Strongly correlated multi-impurity models: The crossover from a single-impurity problem to lattice models, Phys. Rev. B 102, 205132 (2020). * Maple _et al._ [1995] M. B. Maple, M. C. de Andrade, J. Herrmann, Y. Dalichaouch, D. A. Gajewski, C. L. Seaman, R. Chau, R. Movshovich, M. C. Aronson, and R. Osborn, Non fermi liquid ground states in strongly correlated f-electron materials, J. Low Temp. Phys. 99, 223 (1995). * Grewe [1984] N. Grewe, One particle excitation spectrum of the Kondo-lattice, Solid State Communications 50, 19 (1984). * Steglich _et al._ [1979] F. Steglich, J. Aarts, C. D. Bredl, W. Lieke, D. Meschede, W. Franz, and H. Schäfer, Superconductivity in the Presence of Strong Pauli Paramagnetism: CeCu2Si2, Phys. Rev. Lett. 43, 1892 (1979). * Löhneysen _et al._ [2007] H. v. Löhneysen, A. Rosch, M. Vojta, and P. Wölfle, Fermi-liquid instabilities at magnetic quantum phase transitions, Rev. Mod. Phys. 79, 1015 (2007). * Kasaya _et al._ [1985] M. Kasaya, F. Iga, M. Takigawa, and T. Kasuya, Mixed valence properties of YbB12, Journal of Magnetism and Magnetic Materials 47-48, 429 (1985). * Kasuya [1996] T. Kasuya, Physical Mechanism in Kondo Insulator, Journal of the Physical Society of Japan 65, 2548 (1996). * Hlawenka _et al._ [2018] P. Hlawenka, K. Siemensmeyer, E. Weschke, A. Varykhalov, J. Sánchez-Barriga, N. Shitsevalova, A. Dukhnenko, V. Filipov, S. Gabáni, K. Flachbart, O. Rader, and E. Rienks, Samarium hexaboride is a trivial surface conductor, Nat Commun 9, 517 (2018). * Kim _et al._ [2014] D. Kim, J. Xia, and Z. Fisk, Topological surface state in the Kondo insulator samarium hexaboride., Nature Mater. 13, 466 (2014). * Park _et al._ [2016] W. K. Park, L. Sun, A. Noddings, D.-J. Kim, Z. Fisk, and L. H. Greene, Topological surface states interacting with bulk excitations in the Kondo insulator SmB6 revealed via planar tunneling spectroscopy, Proceedings of the National Academy of Sciences 113, 6599 (2016). * Antonov _et al._ [2002] V. N. Antonov, B. N. Harmon, and A. N. Yaresko, Electronic structure of mixed-valence semiconductors in the $\mathrm{LSDA}+U$ approximation. II. ${\mathrm{SmB}}_{6}$ and ${\mathrm{YbB}}_{12}$, Phys. Rev. B 66, 165209 (2002). * Lu _et al._ [2013] F. Lu, J. Zhao, H. Weng, Z. Fang, and X. Dai, Correlated topological insulators with mixed valence, Phys. Rev. Lett. 110, 096401 (2013). * Hasan and Kane [2010] M. Z. Hasan and C. L. Kane, Colloquium: Topological insulators, Rev. Mod. Phys. 82, 3045 (2010). * Dzero _et al._ [2010] M. Dzero, K. Sun, V. Galitski, and P. Coleman, Topological Kondo Insulators, Phys. Rev. Lett. 104, 106408 (2010). * Alexandrov _et al._ [2013] V. Alexandrov, M. Dzero, and P. Coleman, Cubic Topological Kondo Insulators, Phys. Rev. Lett. 111, 226403 (2013). * Werner and Assaad [2013] J. Werner and F. F. Assaad, Interaction-driven transition between topological states in a Kondo insulator, Phys. Rev. B 88, 035113 (2013). * Peters _et al._ [2016] R. Peters, T. Yoshida, H. Sakakibara, and N. Kawakami, Coexistence of light and heavy surface states in a topological multiband Kondo insulator, Phys. Rev. B 93, 235159 (2016). * Kuramoto [1985] Y. Kuramoto, in _Theory of Heavy Fermions and Valence Fluctuations_ , edited by T. Kasuya and T. Saso (Springer Verlag, Berlin, 1985) p. 152. * Raczkowski and Assaad [2019] M. Raczkowski and F. F. Assaad, Emergent Coherent Lattice Behavior in Kondo Nanosystems, Phys. Rev. Lett. 122, 097203 (2019). * Shen [1996] S.-Q. Shen, Total spin and antiferromagnetic correlation in the Kondo model, Phys. Rev. B 53, 14252 (1996). * Eickhoff and Anders [2021] F. Eickhoff and F. B. Anders, Kondo holes in strongly correlated impurity arrays: RKKY-driven Kondo screening and hole-hole interactions, Phys. Rev. B 104, 045115 (2021). * Wilson [1975] K. G. Wilson, The renormalization group: Critical phenomena and the Kondo problem, Rev. Mod. Phys. 47, 773 (1975). * Bulla _et al._ [2008] R. Bulla, T. A. Costi, and T. Pruschke, The numerical renormalization group method for quantum impurity systems, Rev. Mod. Phys. 80, 395 (2008). * Georges _et al._ [1996] A. Georges, G. Kotliar, W. Krauth, and M. J. Rozenberg, Dynamical mean-field theory of strongly correlated fermion systems and the limit of infinite dimensions, Rev. Mod. Phys. 68, 13 (1996). * Kotliar and Vollhardt [2004] G. Kotliar and D. Vollhardt, Strongly correlated materials: Insights from dynamical mean field theory, Physics Today 57, 53 (2004). * Nozières [1985] P. Nozières, Ann. Phys. (Paris) 10, 19 (1985). * Grewe [1988] N. Grewe, On the competition between magnetic and Fermi liquid phases in Kondo lattices, Solid State Commun. 66, 1053 (1988). * Sollie and Schlottmann [1991] R. Sollie and P. Schlottmann, A simple theory of the Kondo hole, Journal of Applied Physics 69, 5478 (1991). * Bulla _et al._ [1998] R. Bulla, A. C. Hewson, and T. Pruschke, Numerical renormalization group calculations for the self-energy of the impurity Anderson model, J. Phys.: Condens. Matter 10, 8365 (1998). * Jabben _et al._ [2012] T. Jabben, N. Grewe, and S. Schmitt, Spectral properties of the two-impurity Anderson model with varying distance and various interactions, Phys. Rev. B 85, 045133 (2012). * Schrieffer and Wolff [1966] J. R. Schrieffer and P. A. Wolff, Relation between the Anderson and Kondo Hamiltonians, Phys. Rev. 149, 491 (1966). * Peters _et al._ [2006] R. Peters, T. Pruschke, and F. B. Anders, A Numerical Renormalization Group approach to Green’s Functions for Quantum Impurity Models, Phys. Rev. B 74, 245114 (2006). * Weichselbaum and von Delft [2007] A. Weichselbaum and J. von Delft, Sum-rule conserving spectral functions from the numerical renormalization group, Phys. Rev. Lett. 99, 076402 (2007). * Anders and Schiller [2005] F. B. Anders and A. Schiller, Time-dependent numerical renormalization group approach to non-equilibrium dynamics of quantum impurity systems, Phys. Rev. Lett. 95, 196801 (2005). * Anders and Schiller [2006] F. B. Anders and A. Schiller, Spin precession and real-time dynamics in the Kondo model: Time-dependent numerical renormalization-group study, Phys. Rev. B 74, 245113 (2006). * Affleck _et al._ [1995] I. Affleck, A. W. W. Ludwig, and B. A. Jones, Conformal-field-theory approach to the two-impurity Kondo problem: Comparison with numerical renormalization-group results, Phys. Rev. B 52, 9528 (1995). * Lechtenberg _et al._ [2017] B. Lechtenberg, F. Eickhoff, and F. B. Anders, Realistic quantum critical point in one-dimensional two-impurity models, Phys. Rev. B 96, 041109 (2017). * Eickhoff _et al._ [2018] F. Eickhoff, B. Lechtenberg, and F. B. Anders, Effective low-energy description of the two-impurity Anderson model: RKKY interaction and quantum criticality, Phys. Rev. B 98, 115103 (2018). * Pruschke _et al._ [2000] T. Pruschke, R. Bulla, and M. Jarrell, Low-energy scale of the periodic Anderson model, Phys. Rev. B 61, 12799 (2000). * Withoff and Fradkin [1990] D. Withoff and E. Fradkin, Phase transitions in gapless fermi systems with magnetic impurities, Phys. Rev. Lett. 64, 1835 (1990). * Ingersent [1996] K. Ingersent, Behavior of magnetic impurities in gapless fermi systems, Phys. Rev. B 54, 11936 (1996). * Fritz and Vojta [2004] L. Fritz and M. Vojta, Phase transitions in the pseudogap Anderson and Kondo models: Critical dimensions, renormalization group, and local-moment criticality, Phys. Rev. B 70, 214427 (2004). * Yu [1996] C. C. Yu, Numerical renormalization-group study of a Kondo hole in a one-dimensional Kondo insulator, Phys. Rev. B 54, 15917 (1996). * Titvinidze _et al._ [2014] I. Titvinidze, A. Schwabe, and M. Potthoff, Ferromagnetism of magnetic impurities coupled indirectly via conduction electrons: Insights from various theoretical approaches, Phys. Rev. B 90, 045112 (2014). * Yazyev and Helm [2007] O. V. Yazyev and L. Helm, Defect-induced magnetism in graphene, Phys. Rev. B 75, 125408 (2007). * Palacios _et al._ [2008] J. J. Palacios, J. Fernández-Rossier, and L. Brey, Vacancy-induced magnetism in graphene and graphene ribbons, Phys. Rev. B 77, 195428 (2008). * Uchoa _et al._ [2008] B. Uchoa, V. N. Kotov, N. M. R. Peres, and A. H. Castro Neto, Localized Magnetic States in Graphene, Phys. Rev. Lett. 101, 026805 (2008). * Chen _et al._ [2014] J.-J. Chen, H.-C. Wu, D.-P. Yu, and Z.-M. Liao, Magnetic moments in graphene with vacancies, Nanoscale 6, 8814 (2014). * Jiang _et al._ [2018] Y. Jiang, P.-W. Lo, D. May, G. Li, G.-Y. Guo, F. B. Anders, T. Taniguchi, K. Watanabe, J. Mao, and E. Y. Andrei, Inducing Kondo screening of vacancy magnetic moments in graphene with gating and local curvature, Nature Communications 9, 2349 (2018). * May _et al._ [2018] D. May, P.-W. Lo, K. Deltenre, A. Henke, J. Mao, Y. Jiang, G. Li, E. Y. Andrei, G.-Y. Guo, and F. B. Anders, Modeling of the gate-controlled Kondo effect at carbon point defects in graphene, Phys. Rev. B 97, 155419 (2018). * Costa _et al._ [2018] N. C. Costa, M. V. Araújo, J. P. Lima, T. Paiva, R. R. dos Santos, and R. T. Scalettar, Compressible ferrimagnetism in the depleted periodic Anderson model, Phys. Rev. B 97, 085123 (2018). * Note [1] Note that $U_{l_{c}}=0$ in this case in contrary to Fig. 4. Therefore, the $\epsilon^{h}=0$ spectra at different sites are not fully identical to those plotted in Fig. 4. * Esat _et al._ [2016] T. Esat, B. Lechtenberg, T. Deilmann, ChristianWagner, P. Krüger, R. Temirov, M. Rohlfing, F. B. Anders, and F. S. Tautz, A chemically driven quantum phase transition in a two-molecule Kondo system, Nature Physics 12, 8 (2016).
arxiv-papers
2021-07-27T12:37:42
2024-09-04T03:07:21.492100
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Fabian Eickhoff and Frithjof B. Anders", "submitter": "Frithjof Anders", "url": "https://arxiv.org/abs/2107.12777" }
2107.12785
A mechanistic model for airborne and direct human-to-human transmission of COVID-19: Effect of mitigation strategies and immigration of infectious persons mymainaddress]Saheb [email protected] mysecondaryaddress]Indrajit Ghoshmycorrespondingauthor[mycorrespondingauthor]Corresponding [email protected] [mymainaddress]Department of Mathematics, Visva-Bharati, Santiniketan-731235, India [mysecondaryaddress]Department of Computational and Data Sciences, Indian Institute of Science, Bangalore - 560012, Karnataka, India The COVID-19 pandemic is the most significant global crisis since World War II that affected almost all the countries of our planet. To control the COVID-19 pandemic outbreak, it is necessary to understand how the virus is transmitted to a susceptible individual and eventually spread in the community. The primary transmission pathway of COVID-19 is human-to-human transmission through infectious droplets. However, a recent study by Greenhalgh et al. (Lancet: 397:1603-1605, 2021) demonstrates 10 scientific reasons behind the airborne transmission of SARS-COV-2. In the present study, we introduce a novel mathematical model of COVID-19 that considers the transmission of free viruses in the air beside the transmission of direct contact with an infected person. The basic reproduction number of the epidemic model is calculated using the next-generation operator method and observed that it depends on both the transmission rate of direct contact and free virus contact. The local and global stability of disease-free equilibrium (DFE) is well established. Analytically it is found that there is a forward bifurcation between the DFE and an endemic equilibrium using central manifold theory. Next, we used the nonlinear least-squares technique to identify the best-fitted parameter values in the model from the observed COVID-19 mortality data of two major districts of India. Using estimated parameters for Bangalore urban and Chennai, different control scenarios for mitigation of the disease are investigated. Results indicate that the vaccination of susceptible individuals and treatment of hospitalized patients are very crucial to curtail the disease in the two locations. It is also found that when a vaccine crisis is there, the public health authorities should prefer to vaccinate the susceptible people with compared to the recovered persons who are now healthy. Along with face mask use, treatment of hospitalized patients and vaccination of susceptibles, immigration should be allowed in a supervised manner so that economy of the overall society remain healthy. COVID-19; Airborne transmission; Compartmental model; Mathematical analysis; Mitigation strategies. § INTRODUCTION The current outbreak of coronavirus disease 2019 (COVID-19) has significantly affected public health and the economy worldwide. As of 31 May 2021, more than 171 million COVID-19 cases and 3 million deaths have been reported globally [1]. COVID-19 is an emerging respiratory infectious disease that was first detected in early December 2019 in Wuhan, China. The virus that causes COVID-19 is severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which spread rapidly throughout the globe. The World Health Organization (WHO) initially declared the COVID-19 outbreak as a public health emergency of international concern but with the spread across and within countries leading to a rapid increase in the number of cases, the outbreak was officially declared a global pandemic on 11 March 2020 [44]. Given the global scenario on the series of waves and unprecedented strains of COVID-19, there is a need for more investigation to timely and effectively curtail the spread of the disease. Mathematical modelling is a very versatile and effective instrument for understanding infectious disease transmission dynamics and helps us to develop preventive measures for controlling the infection spread both qualitatively and quantitatively. To model the epidemiological data of infectious diseases, compartmental models are widely used due to their simplicity and well-studied applications [17]. In this regard, the recent epidemiological threat of COVID-19 is not an exception. In such types of models, the population is categorized into several classes, or compartments, based on the stage of the infection that is affecting them. These models are governed by a system of ordinary differential equations that take into account the time-discoursed infection status of the population compartments. Wu et al. [46] first developed a mathematical model for COVID-19 which is based on SEIR (Susceptible-Exposed-Infectious-Recovered) model and explains the transmission dynamics and estimate the national and global spread of COVID-19. After that, various mathematical models were proposed by considering several stages of susceptible and infected populations [49, 25, 11, 34]. Many researchers studied the dynamics of COVID-19 using real incidence data of the affected countries and examined different characteristics of the outbreak as well as evaluated the effect of intervention strategies implemented to suppress the outbreak in respective countries [49, 11]. Presently, the second wave of COVID-19 is affecting most of the countries in the world. In a densely populated country like India, this scenario is more threatening. On April 15, 2021, the daily cases of COVID-19 were double the first peak. However, The epidemic evolution of the country is quite complex due to regional inhomogeneities. Thus, governments of various states in India are adopting different strategies to control the outbreak, such as wearing masks, vaccination drives, social distancing guidelines, partial lockdowns, and restricted store hours in place. Thus, gaining an understanding of how this outbreak spread in the form of waves and possible interventions on a short-term basis is urgent. As of 31 May 2021, more than 28 million COVID-19 cases and more than 331 thousand deaths are reported in India [2]. We have chosen to concentrate on two major districts namely, Bangalore urban and Chennai of India for our case studies. These two districts are very crucial hubs of south India and are experiencing a severe second wave of COVID-19. Additionally, taking small regions is also necessary to make reliable projections using mechanistic mathematical models. Due to the small area and populations, it is also easy to implement and supervise specific control measures. As a case study in India, several researchers proposed models that are fitted to the daily COVID-19 cases and deaths, and examined different control strategies [23, 31, 28, 33, 34, 15]. Some of the studies explore the vaccine allocation strategy in India due to limited supply and to support relevant policies [14]. However, none of the above studies has considered the airborne transmission of the SARS-COV-2 virus in their respective models with application to Indian districts. To control a pandemic outbreak, it is necessary to understand how the virus transmits to a susceptible individual and eventually spreads in the community. The primary transmission pathway of COVID-19 is human-to-human propagation through infectious droplets [42]. However, a recent study of Greenhalgh et al. [16] suggests that SARS-COV-2 can be transmitted through the air and they showed 10 scientific reasons behind this. Later on, Addleman et al. [6] commented that Canadian public health guidance and policies should be updated to address the airborne mode of transmission. The authors also suggested that addressing airborne transmission requires the expertise of interdisciplinary teams to inform solutions that can end this pandemic faster. Motivated by these scientific pieces of evidence, we consider a compartmental model of SEIR-type including shedding of free virus in the air by infectious persons. To the best of our knowledge, this is the first modelling study that considers the airborne transmission of COVID-19 with applications to Indian districts. We consider that the susceptible population becomes exposed in two different ways: firstly through direct contact with an infected population or touches a surface that has been contaminated. This transmission also occurs through large and small respiratory droplets that contain the virus, which would occur when near an infected person. The next is through the airborne transmission of smaller droplets and particles that are suspended in the air over longer distances and time [13]. We also study the effect of immigration along with popular control strategies. The main focus of our study is to explore the following epidemiological issues: * Mathematically analyze the COVID-19 transmission dynamics by incorporating the airborne pathway of free SARS-CoV-2 virus into the model structure. * Impact of anti-COVID drugs on the reduction of hospitalized persons. * Individual and combined effects of various control measures (use of face mask, vaccination) as well as immigration of infectious persons on the COVID-19 pandemic. The remainder of this paper is organized as follows. In the next section, we propose a deterministic compartmental model to describe the disease transmission mechanism. We consider the amount of free virus in the air as a dynamic variable. Section <ref> describes the theoretical analysis of the model, which incorporates the existence of positive invariance region, boundedness of solutions, computation of the basic reproduction number, and stability of disease-free equilibrium. Also, in this section, the existence of forward bifurcation of the model system is explored. In Section <ref>, we fit the mathematical model using nonlinear least-squares technique from the observed mortality data and estimate unknown parameters. Section <ref> describe several control mechanisms and immigration of infectives through numerical simulation. We examine the effects of vaccination, treatment by drugs, and use of face masks with different degrees of efficacy as intervention strategies. Finally, in Section <ref> we discuss the findings and some concluding remarks about mitigation strategy obtained from our study. § MODEL DESCRIPTION To design the basic mathematical model for COVID-19 transmission dynamics, some general epidemiological factors are considered including the airborne transmission of the free virus. Several studies of novel corona virus suggest that an infected person can be asymptomatic (infectious but not symptomatic) or symptomatic with small, moderate, severe, or critical symptoms [43, 48, 21, 47]. For simplicity of model formulation, we break the infected individuals in two separated classes, notified and un-notified. Here, the un-notified class contains untested asymptomatic, asymptomatic who are tested negative, untested symptomatic, and symptomatic who are tested negative, whereas notified class contains those symptomatic and asymptomatic persons who are tested COVID-19 positive. Population among both the notified and un-notified class can be hospitalized, when they have a critical health situation. Thus the entire population can be stratified into six main compartments based on the status of the disease: susceptible ($S(t)$), exposed ($E(t)$), un-notified ($I_u(t)$), notified ($I_n(t)$), hospitalized ($I_h(t)$), and recovered ($R(t)$), at time $t$. Consequently, the total population size is given by $N(t)=S(t)+E(t)+I_u(t)+I_n(t)+I_h(t)+R(t)$. In addition, $V(t)$ describes the amount of free virus in the environment. Now, we consider individuals from each human class have a per capita natural mortality rate $\mu$. The net influx rate of susceptible population per unit time is $\Pi$. This parameter includes new births, immigration, and emigration of susceptible persons. Also, the susceptible population decrease after infection, acquired through the direct contact of notified or un-notified infected individuals. Let $\beta_1$ be the transmission rate for direct contact with the modification factor $\nu$ for notified infected individuals. Then $\nu\in(0,1)$, since the notified persons are advised to take preventive measures like face mask use, social distancing more seriously. In addition, the susceptible population is infected through the contact of the free virus in air [16, 6]. Let $\beta_2$ be the transmission rate for free virus contact. The interaction of susceptible individuals with infected individuals (un-notified or notified) follows standard mixing incidence and with free virus follows mass action incidence. For basic details and difference between standard mixing incidence and mass action incidence, interested readers are referred to Martcheva's book ([24]; Chap. 3). Then the differential equation that describes the rate of change of susceptible individuals at time $t$, is given by $$\displaystyle{\od{S}{t}} =\Pi-\frac{\beta_1 S( I_u+ \nu I_n)}{N} - \beta_2 SV -\mu S + \theta R.$$ Here, $\theta$ be the rate at which recovered individuals eventually lose the temporal immunity from the infection and become susceptible [32, 14]. Schematic diagram of the proposed model. Solid arrows represent the transmission rate from one compartment to other, whereas dashed arrows represent interaction between compartments. Alongside, the exposed population ($E(t)$) who are infected individuals, however still not infectious for the community. By making successful contact with infectives, susceptible individuals become exposed. Also, these people decreases at a rate $\gamma$ and become notified or un-notified. The probability that exposed individuals progress to the notified infectious class is $p$ and that of un-notified class is $1-p$. This assumption leads to the following rate of change in $E$: $$\displaystyle{\od{E}{t}} = \frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV - (\gamma + \mu) E. $$ The un-notified individuals ($I_u$), who are transferred from exposed class at a rate $(1-p)\gamma$ are the population who are un-notified from COVID-19 disease. Also, the un-notified individuals progress to hospitalized class at a rate $\eta_u$ and recovered at a rate $\sigma_u$. The un-notified individuals are assumed to have no disease-induced mortality rate as most of them will not develop severe symptoms. However, if some of the un-notified persons develop sudden severe symptoms, they will be transferred to the hospital and die as a hospitalized patients. Thus, the equation governing the rate of change of un-notified persons is $$\displaystyle{\od{I_u}{t}} =(1-p)\gamma E- (\eta_u+\sigma_u+\mu)I_u.$$ The notified individuals ($I_n$), who are transferred from exposed class at a rate $p\gamma$ are the population who are notified as COVID-19 positive people. Also, the notified individuals reduced by progressing to hospitalized class at a rate $\eta_n$, by recovery at a rate $\sigma_n$, and COVID-19 induced mortality rate $\delta_n$. Therefore we have the following equation $$\displaystyle{\od{I_n}{t}} = p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n. $$ The hospitalized individuals ($I_h$) increase from un-notified or notified people at rates $\eta_n$ or $\eta_u$, respectively. Also, this class of people recover at a rate $\sigma_h$ and decrease through COVID-19 induced mortality rate $\delta_h$. Thus, we have the following rate of change of $I_h$: $$\displaystyle{\od{I_h}{t}} = \eta_u I_u+ \eta_n I_n - (\sigma_h + \mu + \delta_h)I_h.$$ The recovered individuals ($R$) increase by recovering from each of the infected classes (un-notified, notified and hospitalized) at rates $\sigma_u$, $\sigma_n$, and $\sigma_h$ respectively. As mentioned earlier, $\theta$ is the rate at which recovered population loss immunity against COVID-19 and becomes susceptible again. Thus, following differential equation leads to the rate of change of $R$: $$\displaystyle{\od{R}{t}} =\sigma_u I_u+\sigma_n I_n + \sigma_h I_h - (\theta + \mu)R.$$ The differential equation describing the rate of change of free virus, increased from the shedding rate of un-notified and notified patients at rates $\alpha_u$ and $\alpha_n$, respectively with a natural clearance rate $\mu_c$. Thus $$\displaystyle{\od{V}{t}} = \alpha_u I_u+ \alpha_n I_n - \mu_c V.$$ Fig. <ref> describes the flow patterns of individuals between compartments over time. Assembling all the above differential equations, we have the following system \begin{eqnarray} \begin{cases} \begin{array}{lll} \displaystyle{\od{S}{t}} &=& \Pi-\frac{\beta_1 S( I_u+ \nu I_n)}{N} - \beta_2 SV -\mu S + \theta R, \\ \displaystyle{\od{E}{t}} &=& \frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV - (\gamma + \mu) E, \\ \displaystyle{\od{I_u}{t}} &=& (1-p) \gamma E - (\eta_u + \sigma_u +\mu )I_u, \\ \displaystyle{\od{I_n}{t}} &=& p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n, \\ \displaystyle{\od{I_h}{t}} &=& \eta_u I_u+ \eta_n I_n - (\sigma_h + \mu + \delta_h)I_h, \\ \displaystyle{\od{R}{t}} &=& \sigma_u I_u+\sigma_n I_n + \sigma_h I_h - (\theta + \mu)R, \\ \displaystyle{\od{V}{t}} &=& \alpha_u I_u+ \alpha_n I_n - \mu_c V. \end{array} \label{EQ:TheModel} \end{cases} \end{eqnarray} All the parameters involved in the above system are positive. We present the parameters with their biological interpretation, dimensions and realistic values in Table <ref>. Description of model parameters used in the model (<ref>). Parameter Dimension Interpretation Value(s) Reference $\Pi$ person day$^{-1}$ Recruitment rate of susceptibles $\mu \times N_{init}$ – $\beta_1 $ day$^{-1}$ Transmission rate for direct contact (0,1) To be estimated $\beta_2 $ copies$^{-1}$ litre day$^{-1}$ Transmission rate for free virus contact (0,1) To be estimated $\nu$ unitless Modification factor for notified infectives 0.1852 [15] $\theta$ day$^{-1}$ Rate at which recovered individuals lose immunity 1/365 [14] $\mu$ day$^{-1}$ Natural mortality rate 0.3891 $\times {10}^{-4}$ [3] $\gamma$ day$^{-1}$ Rate at which the exposed individuals are infected 0.2 [19, 20] $\eta_u$ day$^{-1}$ Rate at which un-notified patients become hospitalized (0,1) To be estimated $\eta_n$ day$^{-1}$ Rate at which notified patients become hospitalized (0,1) To be estimated $p$ unitless Proportion of notified infectives 0.2 [47, 50] $\sigma_u$ day$^{-1}$ Recovery rate of un-notified patients 0.17 [39, 45] $\sigma_n$ day$^{-1}$ Recovery rate of notified patients 0.072 [22] $\sigma_h$ day$^{-1}$ Recovery rate of hospitalized patients (0,1) To be estimated $\delta_n$ day$^{-1}$ Disease induced mortality rate of notified patients 0.0017 [15] $\delta_h$ day$^{-1}$ Disease induced mortality rate of hospitalized patients (0,1) To be estimated $\alpha_u$ copies litre$^{-1}$ person$^{-1}$ day$^{-1}$ Virus shedding rate of un-notified patients (0,10) To be estimated $\alpha_n$ copies litre$^{-1}$ person$^{-1}$ day$^{-1}$ Virus shedding rate of notified patients (0,10) To be estimated $\mu_c$ day$^{-1}$ Natural clearance rate of free virus 1 [29] § MATHEMATICAL ANALYSIS §.§ Basic properties Here, we explore basic dynamical properties of the model (<ref>). Let us first consider the initial conditions of the model as \begin{equation} S(0)>0,~E(0),~I_u(0),~I_n(0),~I_h(0),~R(0),~V(0)\geq 0.\label{model_IC} \end{equation} The dynamical system (<ref>) is well posed as shown in the following theorem. Consider the model (<ref>) with initial conditions (<ref>). The nonnegative orthant $\mathbb{R}_+^7$ is invariant under the flow of (<ref>), including $S$ remaining positive with the advancement of time. Moreover, the solutions of the system (<ref>) are bounded in the region $$\Omega=\left\{(S,~E,~I_u,~I_n,~I_h,~R,~V)|~~0<S+E+I_u+I_n+I_h+R\leq \frac{\Pi}{\mu},~~ 0\leq V<\frac{\Pi(\alpha_u+\alpha_n) }{\mu\mu_c}\right\}.$$ Consider the initial conditions (<ref>). Suppose that at time $t=t_1$, $S(t_1)=0$. Then from (<ref>) at $t=t_1$, $\od{S}{t}=\Pi+\theta R>0$ which implies that $\od{S}{t}>0$ when $S$ is positive and small. Thus, there is no time $t_1$ such that $S(t_1)=0$. Therefore, $S$ stays positive for $t>0$ with the initial condition $S(0)>0$. Now, for the other components \begin{align*} \evalat{\od{E}{t}}{E=0}&=\frac{\beta_1 S( I_u+ \nu I_n)}{N} + \beta_2 SV\geq0, \quad &\evalat{\od{I_u}{t}}{I_u=0}&= (1-p) \gamma E\geq0, \\ \evalat{\od{I_n}{t}}{I_n=0} &= p \gamma E\geq0, \quad &\evalat{\od{I_h}{t}}{I_h=0} &= \eta_u I_u+ \eta_n I_n,\geq0, \\ \evalat{\od{R}{t}}{R=0} &= \sigma_u I_u+\sigma_n I_n + \sigma_h I_h,\geq0, \quad & \evalat{\od{V}{t}}{V=0}&=\alpha_u I_u+ \alpha_n I_n\geq0. \end{align*} Thus, all the other components are nonnegative and the orthant $\mathbb{R}_+^7$ is invariant under (<ref>). To show the boundedness of solutions of the system (<ref>), we add all the equations except the last one of (<ref>) to get \begin{align*} \od{N}{t}&=\od{}{t}(S+E+I_u+I_n+I_h+R)\\ &=\Pi-\mu N-\delta_nI_n-\delta_hI_h\\ &\leq \Pi-\mu N. \end{align*} Using the results of differential inequality, we have Since the total population is bounded, so the individual components are also bounded. Also, from the last equation of (<ref>), the rate of change of free virus is given by \begin{align*} \od{V}{t} &= \alpha_u I_u+ \alpha_n I_n - \mu_c V\\ &< (\alpha_u+ \alpha_n)\frac{\Pi}{\mu}- \mu_c V \end{align*} Again, using the results of differential inequality, we have $$\limsup_{t\to\infty}V(t)<\frac{\Pi(\alpha_u+ \alpha_n)}{\mu\mu_c}.$$ This completes the proof. §.§ Disease-free equilibrium and basic reproduction number As of many epidemiological models, our model (<ref>) also exhibit the disease-free equilibrium (DFE). At this equilibrium, population persists in the absence of disease. Mathematically, DFE is obtained by assuming all the infected compartments to be zero, i.e., $E, I_u, I_n, I_h$, and $V$ to be zero. Then from the model, $S=\frac{\Pi}{\mu}$ and $R=0$. Thus, the DFE is given by $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$. The basic reproduction number $\mathscr{R}_0$ is interpreted as the average number of secondary cases produced by one infected individual introduced into a population of susceptible individuals. This dimensionless number is a measure of the potential for disease outbreak. Now to obtain $\mathscr{R}_0$, we use next-generation operator method [12, 40]. First we assemble the compartments which are infected (i.e., $E$, $I_u$, $I_n$, $I_h$, and $V$) and decomposing the right hand side of the system (<ref>) as $\mathscr{F}-\mathscr{W}$, where $\mathscr{F}$ is the transmission part, expressing the production of new infection, and the transition part is $\mathscr{W}$, which describe the rate of transfer of individuals from one compartment to another. Then we have for the model (<ref>) \frac{\beta_1 S( I_u+ \nu I_n)}{N}+ \beta_2 SV\\ \end{pmatrix}\quad \text{and}\quad \mathscr{W}=\begin{pmatrix} (\gamma + \mu) E\\ -(1-p) \gamma E+\phi_uI_u\\ -p\gamma E+\phi_n I_n \\ -\eta_u I_u- \eta_n I_n +\phi_hI_h \\ -\alpha_u I_u-\alpha_n I_n+ \mu_c V \end{pmatrix},$$ with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\sigma_h+\mu+\delta_h$. Consider $X=(E, I_u, I_n, I_h, V)$. Then the derivatives of $\mathscr{F}$ and $\mathscr{W}$ at the DFE $\mathscr{E}_s$ are given by 0 & \beta_1 & \beta_1\nu & 0 &\frac{\beta_2\Pi}{\mu}\\ 0 & 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 0 & 0 \end{pmatrix}\quad \text{and}\quad (\gamma + \mu) & 0 & 0 & 0 & 0\\ -(1-p) \gamma & \phi_u & 0 & 0 & 0\\ -p\gamma & 0 & \phi_n & 0 & 0 \\ 0 & -\eta_u & -\eta_n &\phi_h& 0\\ 0 & -\alpha_u & -\alpha_n & 0 &\mu_c \end{pmatrix}.$$ Now, we calculate the next-generation matrix $FW^{-1}$, whose $(i,j)$-th entry describe the expected number of new infections in compartment $i$ produced by the infected individual originally introduced into compartment $j$. According to Diekmann et al. [12], the basic reproduction number is given by $\mathscr{R}_0=\rho(FW^{-1})$, where $\rho$ is the spectral radius of the next-generation matrix $FW^{-1}$. A simple calculation leads to the following expression for $\mathscr{R}_0$: \begin{equation} \mathscr{R}_0=\frac{(1-p)\gamma\beta_1}{\phi_u( \gamma+\mu)}+\frac{p\gamma\nu\beta_1}{\phi_n( \gamma+\mu)}+\frac{(1-p)\gamma\alpha_u\beta_2(\Pi/\mu)}{\mu_c \phi_u( \gamma+\mu)}+\frac{p\gamma\alpha_n\beta_2(\Pi/\mu)}{\mu_c\phi_n( \gamma+\mu)}.\label{EQ:basic_reproduction} \end{equation} Epidemiologically, the first and second term of $\mathscr{R}_0$ can be interpreted as the number of secondary infections that one un-notified and notified individual will produce in a completely susceptible population during its infectious period, respectively. Here, the infection occurs due to direct contact. Also, the last two term represent the same but for free virus contact. Thus, both transmission pathways have impacts on the dynamics of COVID-19 spread in the community. §.§ Stability of disease-free equilibrium Following theorem gives the local stability properties of the DFE $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$. The disease-free equilibrium (DFE) $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$ of the system (<ref>) is locally asymptotically stable if $\mathscr{R}_0<1$ and unstable if $\mathscr{R}_0>1$. The Jacobian matrix at the DFE $\mathscr{E}_s$ is given by \begin{equation} J_{\mathscr{E}_s}= \left[ \begin {array}{ccccccc} -\mu & 0 &-\beta_1 &-\nu\beta_1 & 0 & \theta & -\frac {\Pi\beta_2}{\mu}\\ 0 & -(\gamma+\mu)& \beta_1 & \nu\beta_1 & 0 & 0 & \frac{\Pi\beta_2}{\mu}\\ 0 & (1-p)\gamma &-\phi_u & 0 & 0 & 0 & 0\\ 0 & p\gamma & 0 & -\phi_n & 0 & 0 & 0\\ 0 & 0 &\eta_u & \eta_n &-\phi_h & 0 & 0\\ 0 & 0 &\sigma_u &\sigma_n &\sigma_h &-(\theta+\mu) & 0 \\ 0 &0 &\alpha_u &\alpha_n & 0 &0 &-\mu_c \end {array} \right],\label{Jacobian_DFE} \end{equation} with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\eta_h+\mu+\delta_h$. The above Jacobian matrix possess three obvious eigenvalues $-\mu$, $-(\theta+\mu)$ and $-\phi_h=-(\sigma_h+\mu+\delta_h)$, which are all negative. Also, the remaining eigenvalues ($\lambda$) are the roots of the equation $\det(M-\lambda I)=0$, where $I$ is the $4\times 4$ identity matrix and $$M= \left[ \begin {array}{ccccccc} -(\gamma+\mu) & \beta_1 & \nu\beta_1 & \frac {\Pi\beta_2}{\mu} \\ (1-p)\gamma &-\phi_u & 0 & 0 \\ p\gamma & 0 & -\phi_n & 0 \\ 0 &\alpha_u & \alpha_n &-\mu_c \\ \end {array} \right].$$ Now, $\det(M-\lambda I)=0$ gives \begin{align*} -(1-p)\gamma\alpha_u\frac{\Pi\beta_2}{\mu}(\lambda+\phi_n)-\frac {\Pi\beta_2}{\mu}p\gamma\alpha_n(\lambda+\phi_u)=0. \end{align*} The above equation can be written as $H(\lambda)=1$, where \begin{align} \begin{split} \end{split} \end{align} We also rewrite $H(\lambda)$ as where $H_j(\lambda)$, $j=1,2,3,4$, are the respective term of (<ref>). Now, if $Re(\lambda)\geq0$ with $\lambda=x+iy$, then $$|H_1(\lambda)|=\frac{(1-p)\gamma\beta_1}{|\lambda+\phi_u||\lambda+\gamma+\mu|}\leq H_1(x)\leq H_1(0).$$ $$|H_j(\lambda)|\leq H_j(x)\leq H_j(0),\quad \text{for}~j=2,3,4.$$ \begin{align*} |H(\lambda)|\leq& |H_1(\lambda)|+|H_2(\lambda)|+|H_3(\lambda)|+|H_4(\lambda)|\\ \leq &H_1(0)+H_2(0)+H_3(0)+H_4(0)\\ = &H(0). \end{align*} From (<ref>) and (<ref>), we have $H(0)=\mathscr{R}_0$. Then $\mathscr{R}_0<1$ $\implies$ $|H(\lambda)|<1$, which implies there does not exist any solutions of $H(\lambda)= 1$ with $Re(\lambda)\geq0$. Therefore if $\mathscr{R}_0<1$, all the eigenvalues of $H(\lambda)= 1$ have negative real parts and hence the DFE $\mathscr{E}_s$ of the system (<ref>) is locally asymptotically stable. Now for the case of $\mathscr{R}_0>1$, i.e., $H(0)>1$ Then there exists $\lambda^*>0$ such that $H(\lambda^*)=1$, which confirm the existence of positive eigenvalue of the Jacobian matrix $J_{\mathscr{E}_s}$. Thus the DFE $\mathscr{E}_s$ is unstable for $\mathscr{R}_0>1$. Moreover, when $\mathscr{R}_0<1$ the DFE $\mathscr{E}_s$ is globally asymptotically stable, which can be assured by the following theorem. The disease-free equilibrium (DFE) $\mathscr{E}_s=(\frac{\Pi}{\mu},0,0,0,0,0,0)$ of the system (<ref>) is globally asymptotically stable if $\mathscr{R}_0<1$. First we rewrite the model (<ref>) into the form \begin{eqnarray} \begin{cases} \begin{array}{lll} \displaystyle{\od{\mathbb{X}}{t}} &=& P(\mathbb{X},\mathbb{Z}), \\ \displaystyle{\od{\mathbb{Z}}{t}} &=& Q(\mathbb{X},\mathbb{Z}) \end{array} \label{EQ:global_DFE} \end{cases} \end{eqnarray} where $\mathbb{X}^T=(S,R)\in\mathbb{R}^2_+$ with $S>0$, describe the uninfected compartments and $\mathbb{Z}^T=(E,I_u,I_n,I_h,V)\in\mathbb{R}^5_+$ describe the infected compartments with free virus. Also, $T$ denoting the transpose of the matrix. Note that $Q(\mathbb{X},\mathbf{0})=\mathbf{0}$, where $\mathbf{0}$ is a zero vector. Following Castillo-Chavez [9], the DFE $\mathscr{E}_s$ of the system (<ref>) is globally asymptotically stable if it is locally asymptotically stable and satisfy following two conditions: * For the subsystem $\od{\mathbb{X}}{t}=P(\mathbb{X},\mathbf{0})$, the equilibrium $\mathbb{X}^*$ is globally asymptotically stable, * $Q(\mathbb{X},\mathbb{Z})=B\mathbb{Z}-\widetilde{Q}(\mathbb{X},\mathbb{Z})$, $\widetilde{Q}(\mathbb{X},\mathbb{Z})\geq 0$ for $(\mathbb{X},\mathbb{Z})\in\Omega$, where $B=\evalat{\frac{\partial Q}{\partial \mathbb{Z}}}{(\mathbb{X},\mathbf{Z})=(\mathbb{X}^*,\mathbf{0})}$ is a Metzler matrix (a matrix whose off diagonal elements are nonnegative) and $\Omega$ is the positive invariant set for the model (<ref>) as described in Subsection <ref>. Now, for the model (<ref>), \Pi-\mu S\\0 \end{pmatrix}.$$ Since all the infected compartments are zero, so there is no infection, and thus, no recovery. That's why, we consider $R=0$. Clearly, $\mathbb{X}^*=(\frac{\Pi}{\mu},0)$ is a globally asymptotically equilibrium for the system $\od{\mathbb{X}}{t}=P(\mathbb{X},\mathbf{0})$. So the condition (H1) satisfied. -(\gamma+\mu) & \beta_1 & \beta_1\nu & 0 & \frac{\beta_2\Pi}{\mu}\\ (1-p)\gamma & -\phi_u & 0 & 0 & 0\\ p\gamma & 0 & -\phi_n & 0 & 0\\ 0 & \eta_u & \eta_n & -\phi_h & 0\\ 0 & \alpha_u & \alpha_n & 0 & -\mu_c\\ \end{pmatrix}\quad \text{and}$$ \beta_1(1-\frac{S}{N})I_u+\beta_1\nu (1-\frac{S}{N})I_n+\beta_2(\frac{\Pi}{\mu}-S)V\\ \end{pmatrix},$$ with $\phi_u=\eta_u+\sigma_u+\mu$, $\phi_n=\eta_n+\sigma_n+\mu+\delta_n$, and $\phi_h=\eta_h+\mu+\delta_h$. The matrix $B$ is a Metzler matrix and $\widetilde{Q}(\mathbb{X},\mathbb{Z})\geq0$ whenever the state variables are inside the invariant set $\Omega$. Thus (H2) also satisfied. This completes the proof. §.§ Existence of endemic equilibrium Here, we discuss the existence of endemic equilibrium of the model (<ref>). The endemic equilibrium $\mathscr{E}^*=(S^*,E^*,I_u^*,I_n^*,I_h^*,R^*,V^*)$ is given by $I_u^*=A_1E^*$, $I_n=A_2E^*$, $I_h^*=A_3E^*$, $R=A_4E^*$, $V^*=A_5E^*$, $S^*=\frac{\Pi+(\theta A_4-(\gamma+\mu))E^*}{\mu}=\frac{(\gamma+\mu)(\Pi-A_7E^*)}{A_6+\beta_2A_5(\Pi-A_7E^*)}$, where all the $A_i$, $i=1,2,\cdots,7$ are positive and given by \begin{align*} A_1&=\frac{(1-p)\gamma}{\eta_u+\sigma_u+\mu},\; & A_2&=\frac{p\gamma}{\eta_n+\sigma_n+\mu+\delta_n},\; & A_3&=\frac{\eta_u A_1+\eta_n A_2}{\sigma_h+\mu+\delta_h},\\ A_4&=\frac{\sigma_u A_1+\sigma_n A_2+\sigma_h A_3}{\theta+\mu},\;& A_5&=\frac{\alpha_u A_1+\alpha_n A_2}{\mu_c},\; & A_6&=\mu\beta_1(A_1+\nu A_2),\;\\ A_7&=\delta_n A_2+\delta_h A_3, \end{align*} and $E^*$ is a positive root of the quadratic equation \begin{equation} \rho_0E^2+\rho_1E+\rho_2=0\label{root_endemic} \end{equation} \begin{align*} \rho_0&=-\beta_2 A_5 A_7(\theta A_4-(\gamma+\mu)),\\ \rho_1&=(A_6+\beta_2 A_5 \Pi)(\theta A_4-(\gamma+\mu))-\beta_2 A_5 A_7\Pi+\mu(\gamma+\mu )A_7\\ &=\mu(\gamma+\mu)\mathscr{R}_0(\theta A_4-(\gamma+\mu))+\mu(\gamma+\mu)(1-\mathscr{R}_0)A_7+A_6A_7,\\ \rho_2&=(A_6+\beta_2 A_5 \Pi)\Pi-\mu(\gamma+\mu)\Pi \end{align*} For the existence of real roots of (<ref>), we must have $\rho_1^2-4\rho_0\rho_2\geq0$. Without loss of generality, assume that $E_1^*>E_2^*$, when equation (<ref>) have two real roots. From the expression of $S^*$, $S^*=\frac{\Pi}{\mu}+\frac{(\theta A_4-(\gamma+\mu))}{\mu}E^*$. Since the upper bound of total population is $\Pi/\mu$, so we must have $\theta A_4-(\gamma+\mu)< 0$. Then $\rho_0$ is always positive. Note that, for $\theta A_4-(\gamma+\mu)= 0$, $S^*=\frac{\Pi}{\mu}$ and thus the endemic equilibrium becomes DFE. Also, $\rho_2<(>)0\iff\mathscr{R}_0<(>)1$. At the equilibrium density, $N^*=\frac{\Pi-A_7E^*}{\mu}$. Thus, $N^*>0\iff \Pi-A_7E^*>0$. Keeping all the conditions in mind, in the next theorem, we state about the existence and possible number of endemic equilibrium points. When $\mathscr{R}_0<1$, the model (<ref>) has unique endemic equilibrium if $\Pi-A_7E^*>0$. When $\mathscr{R}_0>1$, the model (<ref>) has * two endemic equilibrium if $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2>0$, and $\Pi-A_7E_i^*>0$, $i=1,2$. * unique endemic equilibrium if any of the following cases holds * $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2>0$, and $E_1^*>\frac{\Pi}{A_7}>E_2^*$, * $\rho_1<0$, $\rho_1^2-4\rho_0\rho_2=0$, $\Pi-A_7E^*>0$, * no endemic equilibrium otherwise. §.§ Analysis of the center manifold near DFE $\mathscr{E}_s$ when $\mathscr{R}_0=1$ In this subsection, we discuss the nature of DFE $\mathscr{E}_s$ when $\mathscr{R}_0=1$. Recall the Jacobian matrix $J_{\mathscr{E}_s}$ from (<ref>). Notice that, when $\mathscr{R}_0=1$, $J_{\mathscr{E}_s}$ possess a zero eigenvalue. So the equilibrium $\mathscr{E}_s$ becomes non-hyperbolic. Then center manifold theory is the best approach to study the behaviour of this equilibrium. In this regard, we follow Theorem 4.1 described in Castillo-Chavez and Song [10]. To proceed, first we write the mathematical model (<ref>) into the vector form $\od{\mathbf{x}}{t}=f(\mathbf{x})$, with $\mathbf{x}=(x_1,~ x_2,~ x_3,~ x_4,~ x_5,~ x_6,~ x_7)^T=(S,~E,~I_u,~I_n,~I_h,~R,~V)^T$ and $f(\mathbf{x})=(f_1(\mathbf{x}), ~f_2(\mathbf{x}),~ \cdots,~ f_7(\mathbf{x}))^T$. Since $\mathscr{R}_0$ is often inconvenient to use directly as a bifurcation parameter, we introduce $\beta_1$ as a bifurcation parameter. Then $\mathscr{R}_0=1$ gives $$\beta_1=\frac{\mu_c (\gamma+\mu)\phi_u \phi_n -\gamma\beta_2(\Pi/\mu)((1-p)\alpha_u\phi_n+p\alpha_n\phi_u)}{\mu_c \gamma((1-p)\phi_n+\nu p\phi_u)}=\beta_1^* ~~(\text{say}).$$ Moreover, $\mathscr{R}_0<1$ for $\beta_1<\beta_1^*$ and $\mathscr{R}_0>1$ for $\beta_1>\beta_1^*$. Now, consider the system $\od{\mathbf{x}}{t}=f(\mathbf{x},\beta_1)$ and at $\beta_1=\beta_1^*$ the Jacobian matrix $J_{\mathscr{E}_s}$ have simple zero eigenvalue and all the other eigenvalues have negative real parts. Let $\mathbf{v}=(v_1,~ v_2,~ \cdots~, v_7)$ and $\mathbf{w}=(w_1,~ w_2,~ \cdots~, w_7)^T$ are the respective left and right eigenvectors corresponding to zero eigenvalue. Simple algebraic calculations lead us to the following expressions of $v_i$ and $w_i$, $i=1,2,\cdots, 7$: \begin{align*} v_1&=0=v_5=v_6, \quad v_2=v_2>0,\quad v_3=\frac{1}{\phi_u}\left(\beta_1^*+\frac{\beta_2\alpha_u\Pi}{\mu \mu_c}\right)v_2,\\ v_4&=\frac{1}{\phi_n}\left(\beta_1^*\nu+\frac{\beta_2\alpha_n\Pi}{\mu \mu_c}\right)v_2,\quad v_7=\frac{\beta_2\Pi}{\mu \mu_c}v_2, \end{align*} \begin{align*} w_2&=w_2>0,\quad w_3=\frac{(1-p)\gamma}{\phi_u}w_2,\quad w_4=\frac{p\gamma}{\phi_n}w_2,\quad w_5=\frac{1}{\phi_h}\left(\frac{(1-p)\gamma\eta_u}{\phi_u}+\frac{p\gamma\eta_n}{\phi_n}\right)w_2,\\ \end{align*} Clearly, all the $v_i$ and $w_i$ ($i=1,2,\cdots,7$) are positive except $w_1$. From the expression of $w_1$, note that $w_1=\frac{1}{\mu}(\theta A_4-(\gamma+\mu))w_2$. Also, since $\theta A_4-(\gamma+\mu)<0$, so $w_1<0$. Now, according to the Theorem 4.1 [10], we calculate the quantities $a$ and $b$, which are defined by \begin{align} a&=\sum_{k,i,j=1}^{7}v_kw_iw_j\frac{\partial^2 f_k}{\partial x_i \partial x_j}\label{center_manifold_a},\\ b&=\sum_{k,i=1}^{7}v_kw_i\frac{\partial^2 f_k}{\partial x_i \partial \beta_1}\label{center_manifold_b}, \end{align} where all the partial derivatives are evaluated at the DFE $\mathscr{E}_s$ and $\beta_1=\beta_1^*$. Since $v_1$ is zero and $f_k$, $k=3,4,\cdots 7$ are linear functions of the state variables, so we need to calculate only $\frac{\partial^2 f_2}{\partial x_i \partial x_j}$. Then we have \begin{align*} \frac{\partial^2 f_2}{\partial x_1 \partial x_7}&=\beta_2, \quad \frac{\partial^2 f_2}{\partial x_2 \partial x_3}=-\frac{\beta_1^*\mu}{\Pi}=\frac{\partial^2 f_2}{\partial x_3 \partial x_5}=\frac{\partial^2 f_2}{\partial x_3 \partial x_6},\quad \frac{\partial^2 f_2}{\partial x_3 \partial x_4}=-\frac{\beta_1^*\mu(1+\nu)}{\Pi},\\ \frac{\partial^2 f_2}{\partial x_3^2}&=-\frac{2\beta_1^*\mu}{\Pi},\quad \frac{\partial^2 f_2}{\partial x_2 \partial x_4}=-\frac{\beta_1^*\mu\nu}{\Pi}=\frac{\partial^2 f_2}{\partial x_4 \partial x_5}=\frac{\partial^2 f_2}{\partial x_4 \partial x_6}, \quad \frac{\partial^2 f_2}{\partial x_4^2}=-\frac{2\beta_1^*\mu\nu}{\Pi}, \end{align*} and the rest of the derivatives are zero. Thus from (<ref>), we have \begin{equation*} a=v_2\left[\beta_2w_1w_7-\frac{\beta_1^*\mu}{\Pi}\left\{w_3(w_2+2w_3+w_4+w_5+w_6)+\nu w_4(w_2+w_3+2w_4+w_5+w_6)\right\}\right]. \end{equation*} Again, since $v_1$ is zero and $\frac{\partial^2 f_k}{\partial x_i \partial \beta_1}=0$ for $k=3,4,\cdots,7$, then from (<ref>) we have \begin{equation*} b=v_2\left[w_3\frac{\partial^2 f_2}{\partial x_3 \partial \beta_1}+w_4\frac{\partial^2 f_2}{\partial x_4 \partial \beta_1}\right]=v_2(w_3+\nu w_4)>0. \end{equation*} Since $w_1<0$, so $a<0$. Hence, for the system (<ref>), $a<0$ and $b>0$. Thus the system exhibit forward bifurcation at $\beta_1=\beta_1^*$, and an endemic equilibrium appears which is locally asymptotically stable. We numerically verify the existence of forward bifurcation with respect to the basic reproduction number $\mathscr{R}_0$. Since $\mathscr{R}_0$ is not a model parameter and it depends on $\beta_1$, so we vary $\beta_1$. When $\mathscr{R}_0$ crosses the threshold value $1$, the system transits from the stable DFE to the stable endemic equilibrium and the DFE becomes unstable (Fig. <ref>). In the figure, blue-coloured line depicts the stable DFE and red curve depicts the stable endemic equilibrium. Forward bifurcation of the system (<ref>) with respect to the basic reproduction number $\mathscr{R}_0$. The parameter values are taken as $\Pi=496.68615$, $\beta_2=6.6248\times 10^{-8}$, $\eta_u=0.0223$, $\eta_n = 0.7846$, $\sigma_h= 0.9181$, $\delta_h = 0.0046$, $\alpha_u = 1.3232\times 10^{-6}$, $\alpha_n = 0.0741$ and the other parameter values are same as Table <ref>. We also draw the time series plot by choosing two different values of $\beta_1$. For $\beta_1=0.15$, $\mathscr{R}_0<1$ and all the infected compartments (un-notified, notified and hospitalized) becomes zero and for $\beta_1=0.3$, $\mathscr{R}_0>1$ and infected compartments persists in a stable manner as time evolves (Fig. <ref>). Time series evaluation of infected compartments for the system (<ref>). In Fig. (A-C), $\beta_1=0.15$ where $\mathscr{R}_0<1$, and for Fig. (D-F), $\beta_1=0.3$ where $\mathscr{R}_0>1$. The other parameter values are same as Fig. <ref>. § MODEL CALIBRATION Daily new deaths between the period 1 March 2021 to 31 May 2021 for the districts Bangalore Urban and Chennai are used to calibrate the model. The rationale behind using mortality data is that this data is more reliable than the incidence data due to limited testing capacities [26, 18]. We fit the model output ($\int_{t=1}^{T} [\delta_n I_n + \delta_h I_h] dt$, where T=92) to daily new deaths and cumulative deaths due to COVID-19 for both districts. Fixed parameters of the model (<ref>) are given in Table <ref>. Eight unknown model parameters are estimated, namely $\beta_1$, $\beta_2$, $\nu_u$, $\nu_h$, $\sigma_h$, $\delta_h$, $\alpha_u$ and $\alpha_n$. In addition, initial number of exposed people $E(0)$ is also estimated from the mortality data. During the specified time period, nonlinear least square solver $lsqnonlin$ (in MATLAB) is used to fit simulated daily mortality data to the reported COVID-19 deaths in Bangalore urban and Chennai districts. MATLAB codes for generating the fitting figures for Chennai has been uploaded to the GitHub repository <https://github.com/indrajitg-r/ODE_model_fitting>. The fitting of the daily new deaths and cumulative deaths due to COVID-19 are displayed in Fig. <ref> and Fig. <ref> for Bangalore urban and Chennai, respectively. Initial conditions used to simulate the model (<ref>) in Bangalore urban and Chennai. IC's Description Values for Bangalore Urban Values for Chennai Reference $N_{init}$ Total population 12765000 11235000 [4, 5] $S(0)$ Initial number of susceptible $0.7 \times N_{init}$ $0.7 \times N_{init}$ – $E(0)$ Initial number of exposed people (1-15000) (1-15000) To be estimated $I_u(0)$ Initial number of un-notified patients 500 500 – $I_n(0)$ Initial number of notified patients 210 189 [2] $I_h(0)$ Initial number of hospitalized patients 10 10 – $R(0)$ Initial number of recovered patients 1000 1000 – $V(0)$ Initial concentration of virus $10^{-7}$ $10^{-7}$ – Fitting model solution to (A) new deaths and (B) cumulative death data due to COVID-19 in Bangalore Urban district. From Fig. <ref>, it can be argued that the model output fits the mortality data well. Estimated parameter values for Bangalore urban are as follows: $\beta_1=0.2083$, $\beta_2=6.6248 \times 10^{-6}$, $\eta_u =0.0223$, $\eta_n =0.7846$, $\sigma_h =0.9181$, $\delta_h =0.0046$, $\alpha_u =1.3232 \times 10^{-6}$, $\alpha_n = 0.0741$ and $E(0)= 4497$. The data trend is well captured by the model output as seen in Fig. <ref>. Estimated parameter values for Chennai district data are as follows: $\beta_1=0.2155$, $\beta_2=5.361 \times 10^{-6}$, $\eta_u =0.0012$, $\eta_n =0.5470$, $\sigma_h =0.8419$, $\delta_h =3.204 \times 10^{-4}$, $\alpha_u =6.278 \times 10^{-4}$, $\alpha_n = 0.0711$ and $E(0)= 1919$. Using these estimated parameters for both the districts, we investigate different control strategies. Fitting model solution to (A) new deaths and (B) cumulative deaths data due to COVID-19 in Chennai district. § CONTROL INTERVENTIONS AND IMMIGRATION OF INFECTIVES In this section, we investigate different control mechanisms and immigration of infectives through numerical simulation. We examine the effects of vaccination, treatment by drugs and use of face masks with different degrees of efficacy. §.§ Use of face mask Although several vaccines are discovered and people are vaccinated in a rapid process, several drugs are in trial stage and few of them are implemented for hospitalized patients, nevertheless, use of face mask still could offer as a non-pharmaceutical intervention, to avoid transmission of direct contact and airborne transmission of free virus. In a densely populated country like India, it is almost impossible to determine how many people have come in contact with an infected person. Thus wearing face mask properly is an important control strategy for current epidemic outbreak. The idea of using face mask to combat respiratory infections in community was not new [41]. Face masks reduce the amount of droplet inoculum discharging from infectious individuals by capturing a proportion of droplets within the mask [41, 38]. Face masks also reduce the amount of droplet inoculum inhaled by susceptible individuals by capturing a proportion of droplets in inhaled air and hence reducing the airborne transmission rate. Let $0\leq c_m\leq1$ is the community-wide compliance in the face mask usage and $0<\epsilon_m\leq 1$ is the face mask efficiency in preventing of the disease. Then the term $1- c_m \epsilon_m$ describe a measure of reduction in community contacts and free virus contacts due to use of face mask [38, 26]. Note that, $0\leq1- c_m \epsilon_m\leq 1$. We consider three different efficiency levels, depending on the material and layering of the face masks viz. N95 masks are 95% effective; Surgical masks are 55% effective and Multi-layered cloth masks are 38% effective [35]. Community-wide compliance in the face mask usage is chosen at three different levels namely, High 75%, Medium 50% and low 25%. The baseline values for $c_m$ and $\epsilon_m$ are taken to be 10% and 0.1, respectively. §.§ Treatment by drugs: faster recovery Recently, several drugs are developed for moderate to severe COVID-19 patients and some of them are in different phase of trial period. The 3rd phase trial of Soin et al. [37] in India predict that, tocilizumab plus standard care in patients admitted to hospital with moderate to severe COVID-19 have faster recovery and reduce the burden of intensive care. Recently, Institute of Nuclear Medicine and Allied Sciences (DRDO- INMAS) and Dr Reddy’s laboratories, Hyderabad jointly developed a drug, 2-deoxy-D-glucose (2-DG) for emergency use in symptomatic COVID-19 patients [8, 30]. On 8$^{th}$ May, 2021, the Drugs Controller General of India (DCGI) approved this drug [27]. As per the government release, clinical trial data shows that the drug helps in recovery timelines of hospitalized patients and reduces supplemental oxygen dependence. Consider $\epsilon_t\geq1$ be the factor describing the faster recovery of hospitalized patients. Taking the base value of the $\epsilon_t$ as 1, we vary this parameter upto 1.3 while evaluating control strategies. §.§ Effect of vaccination To control the ongoing global pandemic, vaccine is a critical tool as a pharmaceutical intervention. At present, Covaxin and Covishield vaccines are being used for the vaccination drive against COVID-19 in India and also, several vaccine are in trial process [36]. To extend our mathematical model under the effect of vaccination, we introduced a new compartment of population, namely protected ($P(t)$), those who are vaccinated. Now, the Susceptible and recovered population both can progress to the protected population at rates $\xi_s$ and $\xi_r$, respectively, through vaccination. For simplicity, we consider that protected population completed the required doses of vaccine (and also completed 14 days after last dose) and thus does not consider any intermediate stage (i.e., the time gap between doses or before 14 days of last dose). The base values for vaccination rates are chosen to be 0.00085 for both susceptibles and recovered people. This value is calculated from the vaccination data of India [2]. Simulations are performed by increasing the vaccination rates to 0.05 for both the sub-populations. §.§ Immigration of infectives Communicable disease like the current COVID-19 epidemic may be introduced into a community by the arrival of infectives outside the community. Indeed, in India, the first COVID-19 case was reported in Trissur, Kerala, on January 30, 2020, who was returned from Wuhan, China [7]. Thus, immigration of infectives in a disease-free community played a crucial role for the spread of the disease. We extend the mathematical model (<ref>) by assuming a constant flow of new members of un-notified person. Recruitment of notified person was not considered as they are restricted for travelling. On the other hand, immigration is necessary for many people to maintain a livelihood. Thus, individuals from neighboring locations must be allowed to immigrate for the well being of the overall community. Let $\Lambda$ be the recruitment rate of un-notified infected individuals through immigration. We consider three levels of immigration as low, medium and high with $\Lambda$ = 100, 1000 and 5000 respectively. By considering above control interventions and immigration of infectives, the model (<ref>) can be extended to the following model: \begin{eqnarray} \begin{cases} \begin{array}{lll} \displaystyle{\od{S}{t}} &=& \Pi-\frac{\beta_1 (1- c_m \epsilon_m) S( I_u+ \nu I_n)}{N} - \beta_2 (1- c_m \epsilon_m) SV -(\mu + \xi_s) S + \theta R, \\ \displaystyle{\od{E}{t}} &=& \frac{\beta_1 (1- c_m \epsilon_m) S( I_u+ \nu I_n)}{N} + \beta_2 (1- c_m \epsilon_m) SV - (\gamma + \mu) E, \\ \displaystyle{\od{I_u}{t}} &=& \Lambda + (1-p) \gamma E - (\eta_u + \sigma_u +\mu )I_u, \\ \displaystyle{\od{I_n}{t}} &=& p \gamma E-(\eta_n + \sigma_n + \mu + \delta_n) I_n, \\ \displaystyle{\od{I_h}{t}} &=& \eta_u I_u+ \eta_n I_n - ( \epsilon_t \sigma_h + \mu + \delta_h)I_h, \\ \displaystyle{\od{R}{t}} &=& \sigma_u I_u+\sigma_n I_n + \epsilon_t \sigma_h I_h - (\theta + \mu +\xi_r)R, \\ \displaystyle{\od{P}{t}} &=& \xi_s S + \xi_r R - \mu P, \\ \displaystyle{\od{V}{t}} &=& \alpha_u I_u+ \alpha_n I_n - \mu_c V. \end{array} \label{EQ:TheModel_with_control} \end{cases} \end{eqnarray} Intensive numerical simulations are performed to quantify the effects of various strategies in Bangalore urban and Chennai district. The fixed parameters and initial conditions are taken from Table <ref> and <ref>. The initial number of protected/vaccinated people is estimated using vaccination coverage data from both the districts [2]. Estimated parameters for both districts are mentioned in the model calibration section. Using these parameters and control parameters at various levels we simulate the model (<ref>) with three months ahead projections. For both the districts, the projection period is 1 June 2021 to 31 August 2021. Initially, we simulate the effects of single control parameters while other parameters are fixed at the base level. Change in the hospitalized populations with different control levels are depicted for Bangalore urban and Chennai in Fig. <ref> and Fig. <ref>, respectively. For both the districts it can be seen that $\epsilon_t$ and $\xi_s$ have significant impact on reduction of hospitalized persons. Face mask related parameters ($\epsilon_m$ and $c_m$) and vaccination rate of recovered persons ($\xi_r$) show minimal effect on reduction of hospitalized populations. On the other hand, immigration rate of un-notified infected people has significant on the hospitalized populations. In particular, high immigration rates may drive the hospitalized cases to high values. Further, to quantify the effects of single control strategies more precisely, we calculate the percentage reduction of notified and hospitalized persons in the three month projection period. We use the following basic formula \begin{eqnarray}\label{percent_reduction} \textmd{Percentage reduction}=\frac{\textmd{Baseline cases} - \textmd{Cases with control}}{\textmd{Baseline cases}}\times 100. \end{eqnarray} The percentage reduction in notified and hospitalized cases are reported in Table <ref> for Bangalore urban and Chennai districts. The fixed parameters and initial conditions are taken from Tables <ref> and <ref>. Effects of single control strategies in Bangalore urban namely (A) efficacy of face mask usage, (B) community-wide compliance in face mask usage, (C) increase in recovery rate of hospitalized patients, (D) vaccination rate of susceptible individuals, (E) vaccination rate recovered people and (F) immigration of infectives. Effects of single control strategies in Chennai namely (A) efficacy of face mask usage, (B) community-wide compliance in face mask usage, (C) increase in recovery rate of hospitalized patients, (D) vaccination rate of susceptible individuals, (E) vaccination rate recovered people and (F) immigration of infectives. We can see that the face mask related controls when applied individually have moderate impact on the notified and hospitalized populations of both locations. On the other hand, treatment of hospitalized population has large positive impact on the percentage reduction of hospitalized patients. However, treatment do not show any impact on the notified patients for both the locations. This might be due to the fact that the hospitalized patients are not responsible for new infections directly. Comparing the vaccination rates of susceptible and recovered people, it can be inferred from the table that vaccinating susceptibles has better impact than that of recovered people. At least in the short-term (three months) scenario, it is beneficial to vaccinate susceptible people than to vaccinate recovered people. Furthermore, while evaluating the effects of immigration, we noticed that high level of immigration has significant negative impact on the percentage reduction. Thus, the immigration of un-notified COVID-19 patients has to be as low as possible. This can be done by allowing people from low incidence neighbor districts and restricting the immigration from highly affected areas. From the single control results it is evident that pharmaceutical mitigation strategies like treatment of hospitalized patients and vaccination of susceptible individuals are most effective. Additionally, non-pharmaceutical measures such as face mask use has minimal effects on the reduction of notified and hospitalized COVID-19 cases. Percentage reduction in total number of notified and hospitalized COVID-19 patients for different levels of interventions. 2*Parameter values 2c|Bangalore urban 2c|Chennai 2-3 4-5 Reduction in $I_n$ Reduction in $I_h$ Reduction in $I_n$ Reduction in $I_h$ $\epsilon_m$ = 0.38 3.25 2.91 2.50 2.35 = 0.55 5.21 4.67 4.03 3.78 = 0.95 9.79 8.77 7.65 7.18 $c_m$ = 0.25 1.74 1.56 1.33 1.25 = 0.50 4.64 4.15 3.58 3.36 = 0.75 7.51 6.73 5.83 5.48 $\epsilon_t$ = 1.10 -0.00 8.83 -0.00 8.84 = 1.20 -0.00 16.18 -0.00 16.21 = 1.30 -0.00 22.41 -0.00 22.44 $\xi_s$ = 0.005 8.67 7.71 6.93 6.48 = 0.01 15.91 14.20 13.06 12.24 = 0.05 39.42 35.33 34.85 32.72 $\xi_r$ = 0.01 0.61 0.53 1.24 1.15 = 0.03 1.23 1.08 2.97 2.76 = 0.05 3.98 3.51 4.02 3.74 $\Lambda$ = 100 -0.21 -0.32 -0.19 -0.19 = 1000 -2.03 -3.12 -1.90 -1.87 = 5000 -9.41 -15.01 -8.76 -8.70 To investigate the combined effects of control interventions, we examine four different combinations on the total number of hospitalized patients ($I_h^{tot}$) in the three month projection period. The parameter values are taken as mentioned earlier in this section. We draw contour plots with respect to the control parameters with response variable $I_h^{tot}=\int_{t=92}^{184} I_h(t) dt$. Contour plots depicting combination of interventions are displayed in Fig. <ref> and Fig. <ref> for Bangalore urban and Chennai districts, respectively. Combination of control strategies and immigration of infectives in Bangalore urban. (A) efficacy of face mask usage $ \textendash$ community-wide compliance in face mask usage ($\epsilon_m-c_m$), (B) increase in recovery rate of hospitalized patients $ \textendash$ vaccination rate of susceptible individuals ($\epsilon_t-\xi_s$), (C) increase in recovery rate of hospitalized patients $ \textendash$ immigration of infectives ($\epsilon_t-\Lambda$), (D) vaccination rate of susceptible individuals $ \textendash$ immigration of infectives ($\epsilon_s-\Lambda$). For both of the locations, similar scenarios are seen with varying control interventions and immigration of un-notified infectious patients. Simultaneously increasing face mask efficacy and population-wide compliance level will decrease $I_h^{tot}$ in the three month projection period ( Fig. <ref>(A) and <ref>(A)). Thus both the face mask related parameters will have stronger impact on the reduction of $I_h^{tot}$. On the other hand, vaccination rate of susceptibles and increase in the treatment rate of hospitalized patients will have similar effects for both the locations (as seen in Fig. <ref>(B) and <ref>(B)). Further, the immigration of un-notified COVID-19 patients will obviously show increase in $I_h^{tot}$. But keeping $\Lambda$ low and increasing treatment rate simultaneously will keep $I_h^{tot}$ under control (see Fig. <ref>(C) and <ref>(C)). From the number of $I_h^{tot}$, it should be noted that this combination is risky if there is no other intervention in action. However, if the vaccination of susceptibles are performed with a increased rate, then the immigration may not have very adverse effects (see Fig. <ref>(D) and <ref>(D)). It can be noted that high level of face mask use with maximum efficacy is more effective than the other combined strategies in terms of reduction in $I_h^{tot}$. But the feasibility of face mask usage in such intensity may be critical. From the contour plot analysis, it can be argued that the combination of $\xi_s$ and $\epsilon_t$ is more feasible and has competitive effects on $I_h^{tot}$. Further numerical simulations are necessary to study combination of more than two control interventions and immigration of un-notified infectives. Combination of control strategies and immigration of infectives in Chennai. (A) efficacy of face mask usage $ \textendash$ community-wide compliance in face mask usage ($\epsilon_m-c_m$), (B) increase in recovery rate of hospitalized patients $ \textendash$ vaccination rate of susceptible individuals ($\epsilon_t-\xi_s$), (C) increase in recovery rate of hospitalized patients $ \textendash$ immigration of infectives ($\epsilon_t-\Lambda$), (D) vaccination rate of susceptible individuals $ \textendash$ immigration of infectives ($\epsilon_s-\Lambda$). Three or more control interventions and the immigration of infectives are now applied to examine their combined impact on the COVID-19 cases in the three months projection period. We calculate the percentage reduction in notified COVID-19 patients and hospitalized COVID-19 patients using the formula (<ref>). The fixed parameters and initial conditions are taken from Tables <ref> and <ref>. Four different combination strategies are investigated namely, strategy I: face mask efficacy - community level usage of face masks - vaccination of susceptibles ($\epsilon_m$-$c_m$-$\xi_s$), strategy II: face mask efficacy - community level usage of face masks - vaccination of susceptibles - increase in treatment rate ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$), strategy III: face mask efficacy - community level usage of face masks - vaccination of susceptibles - increase in treatment rate - immigration of un-notified infectives ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$-$\Lambda$) and strategy IV: combination of all control interventions with immigration of un-notified infectives ($\epsilon_m$-$c_m$-$\xi_s$-$\epsilon_t$-$\Lambda$-$\xi_r$). The parameter values are chosen for feasibility of the strategies i.e., we do not consider hypothetically high values of the parameters. The percentage reduction of $I_n$ and $I_h$ for Bangalore urban and Chennai are reported in Table <ref>. Percentage reduction in total number of notified and hospitalized COVID-19 patients for different strategies. 2*Parameter values 2c|Bangalore urban 2c|Chennai Reduction in $I_n$ Reduction in $I_h$ Reduction in $I_n$ Reduction in $I_h$ $\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005 16.92 15.12 13.66 12.80 2*[origin=c]90Strategy-I $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005 25.71 23.02 21.18 19.87 $\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005 20.92 18.72 17.03 15.98 $\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 16.92 22.58 13.65 20.49 2*[origin=c]90Strategy-II $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 25.71 29.77 21.18 26.92 $\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1 20.92 25.85 17.03 23.37 $\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 16.76 22.33 13.50 20.35 $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 25.57 29.53 21.03 26.78 4*[origin=c]90Strategy-III $\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 100 20.77 25.61 16.88 23.24 $\epsilon_m$ = 0.38, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 15.38 20.11 12.15 19.11 $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 24.28 27.38 19.75 25.60 $\epsilon_m$ = 0.55, $c_m$ = 0.25, $\xi_s$ = 0.005, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 19.42 23.42 15.56 22.02 2*[origin=c]90Strategy-IV     $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\xi_r$ = 0.01, $\epsilon_t$ = 1.1, $\Lambda$ = 100 25.99 29.87 21.55 27.23 $\epsilon_m$ = 0.38, $c_m$ = 0.50, $\xi_s$ = 0.005, $\xi_r$ = 0.01, $\epsilon_t$ = 1.1, $\Lambda$ = 1000 24.78 27.78 20.36 26.12 From the combinations of strategy I and strategy II, we observe that the second case of strategy II has most the positive reduction for both the districts. However, the travel restrictions are being eased and more people tend to come to these districts. Thus, the immigration of un-notified infectives is also evident and hence it is necessary to consider non-zero values of $\Lambda$. It can be observed that strategy IV (first case) with specified control parameter values and low immigration has the most fruitful results on both the locations (marked bold in Table <ref>). Alternatively, the second case of strategy II show a similar case reduction in both the locations. This strategy does not include immigration and therefore is not feasible. It can be seen that the second case of strategy III also shows competitive results in terms of percentage reduction of both populations. This strategy is feasible and can be implemented with less effort by the policy makers. § RESULTS AND CONCLUSIONS An SEIR-type compartmental model for the transmission dynamics of COVID-19 outbreak incorporating free virus concentration of the environment is considered in this paper. The model assumes standard incidence function while COVID-19 transmission by un-notified and notified individuals. Mass action incidence is considered for the airborne transmission of the virus. The mathematical model consists of a seven-dimensional system of ordinary differential equations. The model is mathematically analysed to obtain insight into the long-term dynamic features of the disease. Basic properties of the model are studied by finding positivity and boundedness of the solutions when the initial conditions are taken non-negative for all the state variables. The disease-free equilibrium (DFE) of the model is found to be unique and the basic reproduction number is found using the next-generation matrix method. The model has a locally stable DFE whenever the basic reproduction number is less than unity otherwise the DFE becomes unstable. Moreover, the global stability of the DFE is guaranteed when $\mathscr{R}_0<1$. This can be inferred that COVID-19 will be mitigated from the community if the corresponding parameters are in the range to ensure $\mathscr{R}_0<1$. The existence of the endemic equilibrium is investigated and it is found that at most two endemic equilibria may exist for the system. Forward transcritical bifurcation is established both analytically and numerically between DFE and one of the endemic equilibrium (see Fig. <ref>). Further, it is numerically shown that all the infected compartments tend to vanish in the long run when $\mathscr{R}_0<1$ and approaches a non-zero equilibrium when $\mathscr{R}_0>1$ (shown in Fig. <ref>). We calibrated the proposed model parameters to fit daily mortality data of two districts of India during the period of March $1^{st}$, 2021 to May $31^{st}$, 2021. From the fitting of the model output to mortality data, it can be seen that the model output closely anticipates the real data for both the districts. Afterwards, we investigate the impacts of control strategies and immigration of un-notified persons on the number of hospitalized patients. We concentrate on both pharmaceutical and non-pharmaceutical control measures as they are being implemented simultaneously to combat the deadly disease. Two pharmaceutical measures namely, treatment of hospitalized persons and vaccination of susceptibles as well as recovered persons are considered. On the other hand, face mask efficacy and community-wide compliance of face masks are considered as non-pharmaceutical control measures. Along with these interventions, we also study the effect of immigrating un-notified persons from other communities. Individual controls and immigration of infectives are initially projected to understand their sole impact on the hospitalized cases. It is found that treatment of hospitalized patients and vaccination of susceptible impacts has a significant impact on the reduction of hospitalized cases (see Fig. <ref> and Fig. <ref>). Therefore, pharmaceutical measures are more reliable than non-pharmaceutical controls. Additionally, immigration of un-notified infected persons may drive the hospitalized cases to higher prevalence. We calculated the percentage reduction in total hospitalized patients to get a quantitative idea of the control measures and immigration. It is reinforced that face mask related controls have a lower impact than pharmaceutical measures like treatment and vaccination. The immigration of un-notified patients has a negative impact on the total hospitalized cases and thus this should be kept as low as possible. Low immigration of infectives can be maintained by restricting immigration from highly affected neighbouring districts. Further, we investigate the combined effect of two strategies on the total number of hospitalized patients for both districts. We found that the combination of treatment and vaccination of susceptible individuals will be very effective to reduce the disease. Finally, we compare three or more interventions by calculating the percentage reduction of notified and hospitalized patients with different levels of feasible control measures and immigration rates. We examine strategy I – strategy IV (as defined in the previous section) and find that combination of all controls with low immigration will have the best effect on the reduction of the disease. However, the second case of strategy III also show competitive results in terms of percentage reduction of both populations. This strategy differs from the strategy IV by the vaccination of recovered people. Therefore, it can be concluded that when vaccine crisis is there, the public health authorities may not vaccinate the recovered people. In other words, the people who were tested COVID-19 positive in past and are now healthy (they may have developed natural antibodies against SARS-CoV-2) may be vaccinated later when vaccines are available. Low immigration of un-notified patients can be regulated by restricting the movement of people from high prevalence adjacent districts. This analysis can be made with data from other profoundly affected districts with proper parametrization. In summary, the results indicate that vaccination of susceptible individuals and treatment of hospitalized patients are very crucial to control COVID-19 in the two locations. In the three months short-term period, vaccination of susceptible people should be prioritized over vaccination of recovered people for a better outcome. Whenever vaccine crisis is there, governments may avoid the vaccination of people who were tested COVID-19 positive and are now healthy. However, increased quality and quantity of mask use are also helpful. Along with face mask use, treatment of hospitalized patients and vaccination of susceptibles, immigration should be allowed in a supervised manner so that economy of the overall society remain healthy. § ACKNOWLEDGEMENTS Research of Indrajit Ghosh is supported by National Board for Higher Mathematics (NBHM) postdoctoral fellowship (Ref. No: 0204/3/2020/R & D-II/2458), Department of Atomic Energy, Government of India. § CONFLICT OF INTEREST The authors declare that they have no conflict of interest. [1] Coronavirus worldometer. <https://www.worldometers.info/coronavirus/>, 2021. Retrieved : 2021-06-04. [2] <https://www.covid19india.org/>, 2021. Retrieved : 2021-06-09. [3] Demographics worldometer. Retrieved : 2021-06-04. [4] Macrotrends bangalore population. Retrieved : 2021-06-09. [5] Macrotrends chennai population. Retrieved : 2021-06-09. [6] Sarah Addleman, Victor Leung, Leyla Asadi, Abdu Sharkawy, and Jennifer Mitigating airborne transmission of sars-cov-2. CMAJ, 193(26):E1010–E1011, 2021. [7] MA Andrews, Binu Areekal, KR Rajesh, Jijith Krishnan, R Suryakala, Biju Krishnan, CP Muraly, and PV Santhosh. First confirmed case of covid-19 infection in india: A case report. The Indian Journal of Medical Research, 151(5):490, 2020. [8] Jyostna Bere, Naga Dharant Jonnalagadda, Lavanya Kappari, Jyoshika Karangula, Narender Boggula, and Vedhavathi Kappari. 2-deoxy-d-glucose: an update review. Journal For Innovative Development in Pharmaceutical and Technical Science (JIDPTS), 4(5):68–78, 2021. [9] Carlos Castillo-Chavez, Zhilan Feng, Wenzhang Huang, et al. On the computation of $\mathcal{R}_0$ and its role in global stability, in mathematical approaches for emerging and reemerging infectious diseases: an introduction (minneapolis, mn, 1999). IMA Volumes in Mathematics and Its Applications, New York, Springer, 125:229–250, 2002. [10] Carlos Castillo-Chavez and Baojun Song. Dynamical models of tuberculosis and their applications. Mathematical Biosciences & Engineering, 1(2):361–404, 2004. [11] Wongyeong Choi and Eunha Shim. Optimal strategies for vaccination and social distancing in a game-theoretic epidemiologic model. Journal of Theoretical Biology, 505:110422, 2020. [12] Odo Diekmann, Johan Andre Peter Heesterbeek, and Johan AJ Metz. On the definition and the computation of the basic reproduction ratio $r_0$ in models for infectious diseases in heterogeneous populations. Journal of Mathematical Biology, 28(4):365–382, 1990. [13] Covid-19 transmission—up in the air. The Lancet. Respiratory Medicine, 8(12):1159, 2020. [14] Brody H Foy, Brian Wahl, Kayur Mehta, Anita Shet, Gautam I Menon, and Carl Comparing covid-19 vaccine allocation strategies in india: A mathematical modelling study. International Journal of Infectious Diseases, 103:431–438, [15] Indrajit Ghosh and Maia Martcheva. Modeling the effects of prosocial awareness on covid-19 dynamics: Case studies on colombia and india. Nonlinear Dynamics, 104:4681–4700, 2021. [16] Trisha Greenhalgh, Jose L Jimenez, Kimberly A Prather, Zeynep Tufekci, David Fisman, and Robert Schooley. Ten scientific reasons in support of airborne transmission of The Lancet, 397(10285):1603–1605, 2021. [17] William Ogilvy Kermack and Anderson G McKendrick. A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society A: Mathematical Physical and Engineering Sciences, 115(772):700–721, 1927. [18] Hien Lau, Tanja Khosrawipour, Piotr Kocbach, Hirohito Ichii, Jacek Bania, and Veria Khosrawipour. Evaluating the massive underreporting and undertesting of covid-19 cases in multiple global epicenters. Pulmonology, 27(2):110–115, 2021. [19] Qun Li, Xuhua Guan, Peng Wu, Xiaoye Wang, Lei Zhou, Yeqing Tong, Ruiqi Ren, Kathy SM Leung, Eric HY Lau, Jessica Y Wong, et al. Early transmission dynamics in wuhan, china, of novel coronavirus–infected pneumonia. New England Journal of Medicine, 382:1199–1207, 2020. [20] Natalie M Linton, Tetsuro Kobayashi, Yichi Yang, Katsuma Hayashi, Andrei R Akhmetzhanov, Sung-mok Jung, Baoyin Yuan, Ryo Kinoshita, and Hiroshi Incubation period and other epidemiological characteristics of 2019 novel coronavirus infections with right truncation: a statistical analysis of publicly available case data. Journal of Clinical Medicine, 9(2):538, 2020. [21] Yang Liu, Li-Meng Yan, Lagen Wan, Tian-Xin Xiang, Aiping Le, Jia-Ming Liu, Malik Peiris, Leo LM Poon, and Wei Zhang. Viral dynamics in mild and severe cases of covid-19. The Lancet Infectious Diseases, 20(6):656–657, 2020. [22] Leonardo López and Xavier Rodó. The end of social confinement and covid-19 re-emergence risk. Nature Human Behaviour, 4(7):746–755, 2020. [23] Sandip Mandal, Tarun Bhatnagar, Nimalan Arinaminpathy, Anup Agarwal, Amartya Chowdhury, Manoj Murhekar, Raman R Gangakhedkar, and Swarup Sarkar. Prudent public health intervention strategies to control the coronavirus disease 2019 transmission in india: A mathematical model-based The Indian Journal of Medical Research, 151(2-3):190, 2020. [24] Maia Martcheva. An Introduction to Mathematical Epidemiology, volume 61. Springer, New York, 2015. [25] Samuel Mwalili, Mark Kimathi, Viona Ojiambo, Duncan Gathungu, and Rachel Mbogo. Seir model for covid-19 dynamics incorporating the environment and social distancing. BMC Research Notes, 13(1):1–5, 2020. [26] Calistus N Ngonghala, Enahoro A Iboi, and Abba B Gumel. Could masks curtail the post-lockdown resurgence of covid-19 in the Mathematical Biosciences, 329:108452, 2020. [27] Dcgi approves anti-covid drug developed by drdo for emergency use. <https://pib.gov.in/PressReleasePage.aspx?PRID=1717007>, 2021. Press Information Bureau, Government of India. 2021-05-08 Retrieved : [28] Danish Rafiq, Suhail Ahmad Suhail, and Mohammad Abid Bazaz. Evaluation and prediction of covid-19 in india: A case study of worst hit states. Chaos, Solitons & Fractals, 139:110014, 2020. [29] Fernando Saldaña, Hugo Flores-Arguedas, José Ariel Camacho-Gutiérrez, and Ignacio Barradas. Modeling the transmission dynamics and the impact of the control interventions for the covid-19 epidemic outbreak. Mathematical Biosciences & Engineering, 17(4):4165–4183, [30] Kailash Chandra Samal, Bhagyalaxmi Panda, and Laxmipreeya Behera. Anti-covid drug: 2-deoxy-d-glucose and its mechanism of action. Biotica Research Today, 3(5):345–347, 2021. [31] Tridip Sardar, Sk Shahid Nadim, Sourav Rana, and Joydev Chattopadhyay. Assessment of lockdown effect in some states and overall india: A predictive mathematical study on covid-19 outbreak. Chaos, Solitons & Fractals, 139:110078, 2020. [32] Alan Sariol and Stanley Perlman. Lessons for covid-19 immunity from other coronavirus infections. Immunity, 53(2):248–263, 2020. [33] Kankan Sarkar, Subhas Khajanchi, and Juan J Nieto. Modeling and forecasting the covid-19 pandemic in india. Chaos, Solitons & Fractals, 139:110049, 2020. [34] Abhishek Senapati, Sourav Rana, Tamalendu Das, and Joydev Chattopadhyay. Impact of intervention on the spread of covid-19 in india: A model based study. Journal of Theoretical Biology, 523:110711, 2021. [35] Suresh K Sharma, Mayank Mishra, and Shiv K Mudgal. Efficacy of cloth face mask in prevention of novel coronavirus infection transmission: A systematic review and meta-analysis. Journal of Education and Health Promotion, 9:192, 2020. [36] Khan Sharun and Kuldeep Dhama. India’s role in covid-19 vaccine diplomacy. Journal of Travel Medicine, 2021. [37] Arvinder S Soin, Kuldeep Kumar, Narendra S Choudhary, Pooja Sharma, Yatin Mehta, Sushila Kataria, Deepak Govil, Vikas Deswal, Dhruva Chaudhry, Pawan Kumar Singh, et al. Tocilizumab plus standard care versus standard care in patients in india with moderate to severe covid-19-associated cytokine release syndrome (covintoc): an open-label, multicentre, randomised, controlled, phase 3 The Lancet Respiratory Medicine, 9(5):511–521, 2021. [38] Richard OJH Stutt, Renata Retkute, Michael Bradley, Christopher A Gilligan, and John Colvin. A modelling framework to assess the likely effectiveness of facemasks in combination with ‘lock-down’ in managing the covid-19 pandemic. Proceedings of the Royal Society A: Mathematical Physical and Engineering Sciences, 476(2238):20200376, 2020. [39] Lauren Tindale, Michelle Coombe, Jessica E Stockdale, Emma Garlock, Wing Yin Venus Lau, Manu Saraswat, Yen-Hsiang Brian Lee, Louxin Zhang, Dongxuan Chen, Jacco Wallinga, et al. Transmission interval estimates suggest pre-symptomatic spread of MedRxiv, 2020. [40] Pauline van den Driessche and James Watmough. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Mathematical Biosciences, 180(1-2):29–48, 2002. [41] Marianne van der Sande, Peter Teunis, and Rob Sabel. Professional and home-made face masks reduce exposure to respiratory infections among the general population. PloS One, 3(7):e2618, 2008. [42] Neeltje van Doremalen, Trenton Bushmaker, Dylan H Morris, Myndi G Holbrook, Amandine Gamble, Brandi N Williamson, Azaibi Tamin, Jennifer L Harcourt, Natalie J Thornburg, Susan I Gerber, et al. Aerosol and surface stability of sars-cov-2 as compared with New England Journal of Medicine, 382(16):1564–1567, 2020. [43] Coronavirus disease 2019 (covid-19): situation report, 73. <https://apps.who.int/iris/handle/10665/331686>, 2020. [44] Rolling updates on coronavirus disease (covid-19): Who characterizes covid-19 as a pandemic. [45] Roman Woelfel, Victor Max Corman, Wolfgang Guggemos, Michael Seilmaier, Sabine Zange, Marcel A Mueller, Daniela Niemeyer, Patrick Vollmar, Camilla Rothe, Michael Hoelscher, et al. Clinical presentation and virological assessment of hospitalized cases of coronavirus disease 2019 in a travel-associated transmission MedRxiv, 2020. [46] Joseph T Wu, Kathy Leung, and Gabriel M Leung. Nowcasting and forecasting the potential domestic and international spread of the 2019-ncov outbreak originating in wuhan, china: a modelling The Lancet, 395(10225):689–697, 2020. [47] Zunyou Wu and Jennifer M McGoogan. Characteristics of and important lessons from the coronavirus disease 2019 (covid-19) outbreak in china: summary of a report of 72 314 cases from the chinese center for disease control and prevention. JAMA, 323(13):1239–1242, 2020. [48] Xiao-Wei Xu, Xiao-Xin Wu, Xian-Gao Jiang, Kai-Jin Xu, Ling-Jun Ying, Chun-Lian Ma, Shi-Bo Li, Hua-Ying Wang, Sheng Zhang, Hai-Nv Gao, et al. Clinical findings in a group of patients infected with the 2019 novel coronavirus (sars-cov-2) outside of wuhan, china: retrospective case series. BMJ, 368:m606, 2020. [49] Qinling Yan, Yingling Tang, Dingding Yan, Jiaying Wang, Linqian Yang, Xinpei Yang, and Sanyi Tang. Impact of media reports on the early spread of covid-19 epidemic. Journal of Theoretical Biology, 502:110385, 2020. [50] Penghui Yang, Yibo Ding, Zhe Xu, Rui Pu, Ping Li, Jin Yan, Jiluo Liu, Fanping Meng, Lei Huang, Lei Shi, et al. Epidemiological and clinical features of covid-19 patients with and without pneumonia in beijing, china. MedRxiv, 2020.
arxiv-papers
2021-07-27T12:57:36
2024-09-04T03:07:21.509189
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Saheb Pal and Indrajit Ghosh", "submitter": "Indrajit Ghosh", "url": "https://arxiv.org/abs/2107.12785" }
2107.12788
# On the data persistency of replicated erasure codes in distributed storage systems Roy Friedman111Research supported by the Israel Science Foundation grant #1505/16. [email protected] Rafał Kapelko222Supported by Polish National Science Center (NCN) grant 2019/33/B/ST6/02988 [email protected] Karol Marchwicki33footnotemark: 3 [email protected] Computer Science Department, Technion - Israel Institute of Technology, Haifa 32000, Israel Department of Fundamentals of Computer Science, Wrocław University of Technology, Poland ###### Abstract This paper studies the fundamental problem of data persistency for a general family of redundancy schemes in distributed storage systems, called replicated erasure codes. Namely, we analyze two strategies of replicated erasure codes distribution: random and symmetric. For both strategies we derive closed analytical and asymptotic formulas for expected data persistency despite nodes failure. ###### keywords: erasure codes, replication, storage system, asymptotic ## 1 Introduction ### 1.1 Background Distributed storage systems are very common these days [1, 2, 4, 14]. Storing data on multiple servers enables scalability, i.e., the ability to handle a large number of clients, a large number of concurrent requests, and large amounts of data. Further, geo-distribution helps reduce client access times by routing client’s requests to a server that is relatively close to them in terms of Internet topology. Finally, distributed systems offer an inherent level of fault-tolerance, since if one server fails or becomes disconnected, other servers can potentially step in to continue the service. An important criteria for storage systems is long term data persistency. That is, it should be possible to retrieve any stored data item even long after it has last been actively saved. This is despite failures and even complete erasures of storage units, which may occur due to wear and tear, operator errors, bugs, and even malicious activity. To that end, a distributed system offers two immediate mechanisms: _replication_ and _error correcting codes_ [10, 15, 19]. In replication, multiple copies of each data item are stored in multiple distinct servers which are assumed to exhibit independent failure pattern. This way, if one server is down, or its storage has been erased, the data can still be retrieved from a replica. This ensures fast recovery, at the cost of multiplying the storage overhead by the replication factor. In error correction, each collection of $p$ data items is encoded into $p+q$ chunks, which are spread over $p+q$ distinct, failure independent, servers. This way, when needed, a stored data item can be retrieved from any $p$ out of the corresponding $p+q$ servers that collectively encoded the missing data item. This reduces the storage cost, but increases the recovery time and network overhead during data recovery. Hence, replication and error correcting codes present a trade-off, whose right balance point depends on the applications requirements, network bandwidth, storage costs, and more [19]. The expected data persistency as well as the maintenance costs of any of the above systems may be analyzed based on the choice of the replication degree $r$ or the choice of $p$ and $q$, as the case may be, together with the other systems characteristics [16]. In order to avoid the above dichotomy and offer a more flexible design, replicated erasure codes have been proposed [8]. In the latter, each of the $p+q$ chunks may be replicated $r$ times. In this paper, we investigate the fundamental problem of expected data persistency of replicated erasure codes when the storage nodes permanently leave the system and erase their locally stored data. This study is related and motivated by the work of [8]. Namely, the general family of redundancy schemes for distributed storage systems, called replicated erasure codes was introduced in [8]. ### 1.2 Preliminaries and Notation Formally, we recall the definition of replicated erasure codes. ###### Definition 1 (replicated erasure codes $REC(p,p+q,r)$). Let $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}$ be fixed. * 1. The original file $f$ is divided into $p$ chunks and then encoded into $p+q$ chunks; $f_{1}(1),f_{2}(1),$ $\dots f_{p+q}(1)$ chunks after encoding. * 2. Each of the $p+q$ chunks is replicated into $r\geq 1$ replicas such that: $f_{1}(1),f_{1}(2),\dots f_{1}(r)$ are replicas of the chunk $f_{1}(1)$, $f_{2}(1),f_{2}(2),\dots f_{2}(r)$ are replicas of the chunk $f_{2}(1)$, $\dots$ $f_{p+q}(1),f_{p+q}(2),\dots f_{p+q}(r)$ are replicas of the chunk $f_{p+q}(1).$ * 3. The total $r\cdot(p+q)$ chunks are spread according to some replication strategy among storage nodes. The purpose of this paper is the analysis of two replication strategies: random [18] and symmetric [9]. The random strategy is simple: all chunks are spread randomly among storage nodes. In the symmetric strategy nodes in the system are split into groups of size $(p+q)\cdot r$ in which every node keeps chunks of all data stored at other nodes in the same group (The precise meaning of the mentioned strategies will be explained further in Algorithm 1 in Section 3 and in Algorithm 2 in Section 4). Also, we recall the properties of restoring an original data item that is divided and encoded according to erasure codes in terms of the replication multisets. ###### Assumption 2 (properties of erasure codes $REC(p,p+q,r)$). We call the multisets $U_{1}=\\{f_{1}(1),f_{1}(2),\dots f_{1}(r)\\},$ $U_{2}=\\{f_{2}(1),f_{2}(2),\dots f_{2}(r)\\},$ $\dots$ $U_{p+q}=\\{f_{p+q}(1),f_{p+q}(2),\dots f_{p+q}(r)\\}$ the replication multisets. To restore the original file, one has to download $p$ chunks, each from a different replication multiset. Figure 1 illustrates Assumption 2 for system parameters $p=1,$ $q=2$ and $r=4$. Observe that, in this special case, to restore the original file $f$, one has to download two fragments $f_{1}(i),$ $f_{2}(j)$ or $f_{1}(i),$ $f_{3}(j)$ or $f_{2}(i),$ $f_{3}(j)$ for some $i,j\in\\{1,2,3,4\\}$. $U_{1}$ | $f_{1}(1)$ | $f_{1}(2)$ | $f_{1}(3)$ | $f_{1}(4)$ ---|---|---|---|--- $U_{2}$ | $f_{2}(1)$ | $f_{2}(2)$ | $f_{2}(3)$ | $f_{2}(4)$ $U_{3}$ | $f_{3}(1)$ | $f_{3}(2)$ | $f_{3}(3)$ | $f_{4}(4)$ Fig. 1: The replication multisets $U_{1},$ $U_{2},$ $U_{3}$ for the replicated erasure codes $REC(1,3,4),$ i.e. the system parameters $p=1,$ $q=2$ and $r=4.$ We are now ready to formulate the main problem of data persistency of replicated erasure codes that is investigated in this paper. ###### Assumption 3 (data persistency of ($REC(p,p+q,r)$)). Let $N$ be the number of nodes in the storage system and let $D$ be the number of documents. * (i) Assume that each document is replicated according to replicated erasure codes (see Definition 1 and Assumption 2). * (ii) Suppose that nodes successively, independently at random leave the storage system and erase the data that they stored without notice. Let $X_{(p,p+q,r)}^{(N,D)}$ denote the number of nodes which must be removed so that restoring some document is no longer possible. The data persistency of $REC(p,p+q,r)$ is the random variable $X_{(p,p+q,r)}^{(N,D)}.$ Our main goal is to study the expected value of the random variable $X_{(p,p+q,r)}^{(N,D)}$ as a function of the parameters $p,q,r,N,D$. Specifically, we derive a closed analytical formula for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ under two replication strategies: random and symmetric, and explain tradeoffs arising among the parameters $p,q,r,N,D$. ### 1.3 Contributions and Outline of this Paper The main contributions of this work include deriving closed form and asymptotic formulas for the persistency of distributed storage systems that employ the replicated erasure coding scheme using the random and symmetric placement strategies. For the specific case that the chosen parameters provide maximal persistency, we give an exact formula. Our formulas are expressed in terms of Beta functions. More specifically, consider a distributed storage system consisting of $N$ nodes and $D$ documents, where each document is replicated according to replicated erasure codes. That is, fix $p\in\mathbb{N}\setminus\\{0\\}$, $q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}$. Each document is divided into $p$ chunks and then encoded into $p+q$ chunks. Each of the $p+q$ chunks are replicated into $r$ replicas (see Definition 1). All chunks are spread in the storage nodes according to either the random or the symmetric strategy (see Algorithm 1 in Section 3 and Algorithm 2 in Section 4). We further assume that nodes successively, independently at random leave the storage system and erase the data that they stored without notice. The objective is to derive the formula for the expected data persistency of replicated erasure codes in the storage system, i.e., the number of nodes in the storage system which must be removed so that restoring some document is no longer possible. To this aim, we make the following two novel contributions: * 1. We derive for random and symmetric replication strategies closed form integral formula for the expected data persistency in terms of incomplete Beta function (see Theorem 8 in Section 3 and Theorem 10 in Section 4) and asymptotics formulas (see Theorem 9 in Section 3 and Theorem 12 in Section 4). * 2. When the maximal expected data persistency of replicated erasure codes for both replication strategies is attained by the replicated erasure codes with parameter $p=1$ (see Corollary 7 in Section 3 and Corollary 11 in Section 4) 444Notice that for $p=1$ replicated erasure codes becomes simply replication with $(1+q)r$ replicas. we give exact formulas for the expected data persistency in terms of Beta Function (see Subsection 5.2). Table 1 summarizes the results proved in this paper (see the Landau asymptotic notation in Section 2). Let us recall that to restore the original file, one has to download $p$ chunks, each from $r$ different replication sets (see Assumption 3). Thus, if $q+1$ chunks in each $r$ replication sets are distributed in the nodes that leave the storage system then restoring the original file is not possible. For the random replication strategy, the expected data persistency is in $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$. If the documents are replicated according to symmetric strategy the expected data persistency is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$. Table 1: The expected data persistency of replicated erasure codes as a function of the replication parameters $p,q,r,$ the number of nodes $N$ and the number of documents $D.$ Replication strategy | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ | Algorithm | Theorems ---|---|---|--- random | $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$ | 1 | 8, 9 symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ | 2 | 10, 12 The rest of the paper is organized as follows. Section 2 provides several preliminary results that will be used in the sequel. In Section 3 we derive the main results on the expected data persistency of replicated erasure codes for the random strategy. Section 4 deals with the main results on the expected data persistency of replicated erasure codes for the symmetric strategy. Section 5 presents further insights including comparision of the random and symmetric placement strategies, non-uniform redundancy scheme and exact formulas in terms of Beta function. The numerical results are presented in Section 6. Finally, Conclusions are drawn in Section 7, where we also outline some future research directions. ## 2 Mathematical Background In this section, we recall some basic facts about special functions: Gamma, Beta and incomplete Beta that will be used in the sequel. We also prove Lemma 4 and Lemma 5 about asymptotic expansions for some function that will be helpful in deriving our main asymptotic results Theorem 9 in Section 3 and Theorem 12 in Section 4. Finally, we recall Formula (5) for discrete nonnegative random variable and the Landau asymptotic notation. The Gamma function is defined via a convergent improper integral $\Gamma(z)=\int_{0}^{\infty}t^{z-1}e^{-t}dt,\,\,\,\,z>0.$ If $n$ is an integer, the Gamma function is related to factorial $\Gamma(n+1)=n!.$ The Beta function $\mathrm{Beta}(a,b)$ (see [7, Chapter 8]) is defined for all positive integer numbers $a,b$ via a convergent improper integral $\mathrm{Beta}(a,b)=\int_{0}^{1}t^{a-1}(1-t)^{b-1}dt.$ (1) It is related to the binomial coefficient. Namely, $\mathrm{Beta}(a,b)=\frac{1}{\binom{a+b-2}{a-1}(a+b-1)}.$ (2) The incomplete Beta function is defined for all positive integer numbers $a,b$ by the formula $I_{x}(a,b)=\frac{1}{\mathrm{Beta}(a,b)}\int_{0}^{x}t^{a-1}(1-t)^{b-1}dt,\,\,\,\text{when}\,\,0\leq x\leq 1.$ (3) The following Identity about incomplete Beta function is known and can be proved using integration by parts. $1-I_{x}(a,b)=\sum_{j=0}^{a-1}\binom{a+b-1}{j}x^{j}(1-x)^{a+b-1-j},$ (4) (see [13, Identity 8.17.5] for $c=m$ and $d=n-m+1$). ###### Lemma 4. Assume that $p,r\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ are fixed and independent on $n.$ Consider the following function $f(x)=-\ln\left(1-I_{x^{r}}(q+1,p)\right),$ where $I_{x^{r}}(q+1,p)$ is the incomplete Beta function. Then 1. (i) $f(x)>f(0)$ for all $x\in(0,1),$ and for every $\delta>0$ the infimum of $f(x)-f(0)$ in $[\delta,1)$ is positive, 2. (ii) $f(x)$ has as $x\rightarrow 0^{+}$ the following expansion $\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},$ where $a_{0}=\binom{p+q}{q+1}$ and the expansion of $f$ is term-wise differentiated, that is $f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}.$ ###### Proof. Using Formula (3) we see that the function $I_{x^{r}}(q+1,p)$ is monotonically increasing over the interval $[0,1]$, giving us the first part of Lemma 4. To prove the second part, we apply (4) for $a:=q+1,$ $b:=p,$ $x:=x^{r}$ and derive $f(x)=-\ln\left(\sum_{j=0}^{q}\binom{p+q}{j}x^{rj}\left(1-x^{r}\right)^{p+q-j}\right).$ By the binomial theorem we have $\displaystyle f(x)$ $\displaystyle=-\ln\left(1-\sum_{j=q+1}^{p+q}\binom{p+q}{j}x^{rj}\left(1-x^{r}\right)^{p+q-j}\right)$ $\displaystyle=-\ln\left(1-\binom{p+q}{q+1}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right).$ It is very well known that the natural logarithm has Maclaurin series $-\ln(1-x)=\sum_{k=1}^{\infty}\frac{x^{k}}{k}.$ Applying this expansion for $x:=\binom{p+q}{q+1}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}$ we get $\displaystyle-\ln\left(1-\binom{p+q}{q+1}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)$ $\displaystyle=\sum_{k=1}^{\infty}\frac{\left(\binom{p+q}{q+1}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)^{k}}{k}.$ From this we derive easily $\displaystyle f(0)=$ $\displaystyle f^{\prime}(0)=f^{\prime\prime}(0)=\dots=f^{(r(q+1)-1)}(0)=0,$ $\displaystyle f^{(r(q+1))}(0)=\binom{p+q}{q+1}(r(q+1))!$ Therefore $f(x)=\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},\,\,\,\,\,\,f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}$ and $a_{0}=\frac{f^{(r(q+1))}(0)}{(r(q+1))!}=\binom{p+q}{q+1}.$ This is enough to prove Lemma 4. ∎ ###### Lemma 5. Assume that $p,r\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ are fixed and independent on $n.$ Consider the following function $f(x)=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right),$ where $I_{x}(q+1,p)$ is the incomplete Beta function. Then 1. (i) $f(x)>f(0)$ for all $x\in(0,1),$ and for every $\delta>0$ the infimum of $f(x)-f(0)$ in $[\delta,1)$ is positive, 2. (ii) $f(x)$ has as $x\rightarrow 0^{+}$ the following expansion $\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},$ where $a_{0}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}$ and the expansion of $f$ is term-wise differentiated, that is $f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}.$ ###### Proof. The proof of Lemma 5 is analogous to that of Lemma 4. Using Formula (3), we see that the function $I_{x}(q+1,p)$ is monotonic increasing over the interval $[0,1]$ and get the first part of Lemma 4. To prove the second part, we apply (4) for $a:=q+1,$ $b:=p,$ $x:=x$ and derive $f(x)=-((p+q)r)^{-1}\ln\left(1-\left(1-\sum_{j=0}^{q}\binom{p+q}{j}x^{j}\left(1-x\right)^{p+q-j}\right)^{r}\right).$ By the binomial theorem we have $\displaystyle f(x)$ $\displaystyle=-((p+q)r)^{-1}\ln\left(1-\left(\sum_{j=q+1}^{p+q}\binom{p+q}{j}x^{j}\left(1-x\right)^{p+q-j}\right)^{r}\right)$ $\displaystyle=-((p+q)r)^{-1}\ln\left(1-\binom{p+q}{q+1}^{r}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right).$ Let us recall that the natural logarithm has Maclaurin series $-\ln(1-x)=\sum_{k=1}^{\infty}\frac{x^{k}}{k}.$ Using this for $x:=\binom{p+q}{q+1}^{r}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}$ we get $\displaystyle-\ln\left(1-\binom{p+q}{q+1}^{r}x^{r(q+1)}-\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)$ $\displaystyle=\sum_{k=1}^{\infty}\frac{\left(\binom{p+q}{q+1}^{r}x^{r(q+1)}+\sum_{j=q+2}^{p+q}a_{j}x^{rj}\right)^{k}}{k}.$ From this we derive easily $\displaystyle f(0)=$ $\displaystyle f^{\prime}(0)=f^{\prime\prime}(0)=\dots=f^{(r(q+1)-1)}(0)=0,$ $\displaystyle f^{(r(q+1))}(0)=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}(r(q+1))!$ Therefore $f(x)=\sum_{k=0}^{\infty}a_{k}x^{k+r(q+1)},\,\,\,\,\,\,f^{{}^{\prime}}(x)=\sum_{k=0}^{\infty}a_{k}(k+r(q+1))x^{k+r(q+1)-1}$ and $a_{0}=\frac{f^{(r(q+1))}(0)}{(r(q+1))!}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r}.$ This is enough to prove Lemma 5. ∎ Assume that $X$ is a discrete nonnegative random variable. Then $\mathbf{E}\left[X\right]=\sum_{l\geq 0}\Pr[X>l]$ (5) (see [17, Exercise 2.1]). We recall the following asymptotic notation: $(a)$ $f(n)=O(g(n))$ if there exists a constant $C_{1}>0$ and integer $N$ such that $|f(n)|\leq C_{1}|g(n)|$ for all $n>N,$ $(b)$ $f(n)=\Omega(g(n))$ if there exists a constant $C_{2}>0$ and integer $N$ such that $|f(n)|\geq C_{2}|g(n)|$ for all $n>N,$ $(c)$ $f(n)=\Theta(g(n))$ if and only if $f(n)=O(g(n))$ and $f(n)=\Omega(g(n)).$ ## 3 Analysis of Random Replicated Erasure Codes In this section, we investigate the expected data persistency of replicated erasure codes for the random replication strategy. Namely, we analyse Algorithm 1. It is worth pointing out that while Algorithm 1 is very simple, its analysis is not completely trivial. Algorithm 1 Random replication of $REC(p,p+q,r)$ 0: A system of $N$ storage nodes; $f^{(1)},f^{(2)},\dots f^{(D)}$ data items; each of the data items is encoded and replicated into $(p+q)r$ chunks (see Definition 1); $f^{(1)}_{1}(j),f^{(1)}_{2}(j),\dots f^{(1)}_{p+q}(j),$ $f^{(2)}_{1}(j),f^{(2)}_{2}(j),\dots f^{(2)}_{p+q}(j),\dots$ $f^{(d)}_{1}(j),f^{(d)}_{2}(j),\dots f^{(D)}_{p+q}(j),$ for $j\in\\{1,2\dots,r\\},$ fragments after encoding and replication. 0: The final random and independent positions of $(p+q)rD$ fragments in the nodes of the storage system (see Figure $2$). 1: for $k=1$ to $D$ do 2: for $j=1$ to $r$ do 3: for $l=1$ to $p+q$ do 4: choose randomly and independently node in the storage system; 5: replicate fragment $f^{(k)}_{l}(j)$ at the chosen node; 6: end for 7: end for 8: end for Figure $2$ illustrates Algorithm 1 for the system parameters $p=q=1$, $r=2$, $D=6$ and $N=8$. In this case, each document is divided and encoded into $4$ chunks. Hence, we have $24$ chunks spread randomly and independently in the $8$ nodes. $\begin{array}[]{|c|c|c|c|c|c|c|c|c|c|}\hline\cr n&1&2&3&4&5&6&7&8\\\ \hline\cr&f^{(1)}_{1}(1)&f^{(2)}_{1}(1)&f^{(1)}_{2}(1)&f^{(1)}_{1}(2)&f^{(1)}_{2}(2)&f^{(2)}_{2}(1)&f^{(2)}_{1}(2)&f^{(2)}_{2}(2)\\\ &f^{(6)}_{1}(1)&f^{(3)}_{1}(1)&f^{(4)}_{1}(2)&f^{(3)}_{2}(2)&f^{(4)}_{2}(1)&f^{(4)}_{1}(1)&f^{(3)}_{2}(1)&f^{(3)}_{1}(2)\\\ &&&&f^{(4)}_{2}(2)&f^{(5)}_{1}(1)&f^{(6)}_{1}(2)&f^{(5)}_{1}(2)&\\\ &&&&&f^{(5)}_{2}(1)&f^{(6)}_{2}(1)&&\\\ &&&&&f^{(5)}_{2}(2)&&&\\\ &&&&&f^{(6)}_{2}(2)&&&\\\ \hline\cr\end{array}$ Fig. 2: Random replicated strategy according to Algorithm 1 for replicated erasure codes $REC(1,2,2),$ i.e. the system parameters $p=q=1,$ $r=2,$ the number of documents $d=6$ and the number of nodes $n=8.$ We now prove the following exact formula for the expected data persistency of replicated erasure codes with the random replication strategy. In the proof of Corollary 6, we derive $\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]$ (see Equation (6)) and apply Identity (5) to get the desired exact formula as the sum of incomplete Beta functions. ###### Corollary 6. Let Assumption 3 hold. Assume that all chunks are spread randomly and independently in the storage nodes as in Algorithm 1. Then $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D},$ where $I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)$ is the incomplete Beta function. ###### Proof. Let $N$ be the number of nodes and let $D$ be the number of documents in the storage system. Assume that nodes successively, independently at random leave the storage system and erase the data that they stored without notice. Let us recall that random variable $X_{(p,p+q,r)}^{(N,D)}$ denotes the number of nodes which must be removed so that restoring some document becomes impossible. Fix $i\in\\{1,2,\dots,p+q\\}$. Assume that the set of nodes of cardinality $l$ are all removed. Since the $l$ nodes successively, independently at random leave the storage system, the probability that we remove all chunks from the replication set $U_{i}$ is equal to $\left(\frac{l}{N}\right)^{r}$. Notice that to restore the fixed file $f$, one has to download $p$ chunks, each from a different replication multiset, i.e., at most $q$ replication multisets can be removed (see Assumption 2). Therefore, the probability for restoring the fixed file $f$, when $l$ nodes successively, independently at random leave the storage system the storage system is equal to $\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}.$ Since each of $D$ documents are transformed into chunks (see Definition 1) and all the chunks are spread independently and randomly among storage nodes, we have $\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]=\left(\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}\right)^{D}.$ (6) Combining together Equation (5) for random variable $X:=X_{(p,p+q,r)}^{(N,D)}$, Equation (6), as well as $\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=0$ for any $l\geq N+1$, we get $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(\sum_{j=0}^{q}\binom{p+q}{j}\left(\left(\frac{l}{N}\right)^{r}\right)^{j}\left(1-\left(\frac{l}{N}\right)^{r}\right)^{p+q-j}\right)^{D}.$ Applying Identity (4) for $a:=q+1,$ $b:=p$ we have the desired Formula $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}.$ This completes the proof of Corollary 6. ∎ We now observe that the maximal expected data persistency of replicated erasure codes for the random replication strategy is attained by the replicated erasure codes with parameter $p=1$. Namely, we combine together the result of previous Corollary 6 with well known Identity [13, Identity 8.17.21] for the incomplete Beta function to obtain Corollary 7. ###### Corollary 7. Under the assumption of Corollary 6 we have $\max_{p\geq 1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$ ###### Proof. Applying [13, Identity 8.17.21] for $a:=q+1$ and $b:=p$, as well as Identity (2) for $a:=q+1,$ and $b:=p$ we have $I_{x}(q+1,p+1)-I_{x}(q+1,p)=x^{1+q}(1-x)^{p}{p+q\choose p}\geq 0.$ (7) Using (7) for $x:=\left(\frac{l}{N}\right)^{r}$ we have $1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\geq 1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p+1).$ Hence $\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}\geq\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p+1)\right)^{D}.$ Applying Corollary 6 we get $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]\geq\mathbf{E}\left[X_{(p+1,p+1+q,r)}^{(N,D)}\right].$ Hence $\max_{p\geq 1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$ This completes the proof of Corollary 7. ∎ The next theorem provides an explicit integral formula for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ ###### Theorem 8. Let Assumption 3 hold. Assume that all chunks are spread randomly and independently in the storage nodes as in Algorithm 1. Then $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx+ER,$ where $I_{x^{r}}(q+1,p)$ is the incomplete Beta function and $|ER|\leq 1.$ ###### Proof. The main idea of the proof is simple. It is an approximation of the sum in Corollary 6 by an integral. Notice that $\sum_{l=0}^{N}\left(1-I_{\left(\frac{l}{N}\right)^{r}}(q+1,p)\right)^{D}=\int_{0}^{N}\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}dy+\Delta,$ (8) where $f(y)=\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}$ and $|\Delta|\leq\sum_{l=0}^{N}\max_{l\leq y<l+1}|f(y)-f(l)|$ (see [6, Page 179]). From (3), we deduce that the function $I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)$ is monotone increasing over the interval $[0,N]$. Therefore, the function $f(y)$ is monotone decreasing over the interval $[0,N]$ and the error term $|\Delta|$ telescopes on the interval $[0,N]$. Hence $|\Delta|\leq|f(0)-f(N)|^{d}=1.$ (9) It is easy to see that $\int_{0}^{N}\left(1-I_{\left(\frac{y}{N}\right)^{r}}(q+1,p)\right)^{D}dy\\\ =N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx.$ (10) Finally, combining together the result of Theorem 7 with (8-10) we get $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx+ER,$ where $|ER|\leq 1$. This is enough to prove Theorem 8. ∎ Unfortunately, the formula in the statement of Theorem 8 makes it difficult to apply it in practice. To that end, we now formulate a very useful asymptotic approximation for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$. In the next Theorem, we analyze the expected data persistency of replicated erasure codes for the random replication strategy when the number of documents $D$ is large. In the proof of Theorem 9, we apply the Erdélyi’s formulation of Laplace’s method for the integral formula obtained in Theorem 8. The following asymptotic result is true ###### Theorem 9. Under the assumption of Theorem 8 for large number of documents $D$ we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}}N{D^{-\frac{1}{r(q+1)}}}\left(1+O\left(D^{-\frac{1}{r(q+1)}}\right)\right)+O(1),$ where $\Gamma\left(1+\frac{1}{r(q+1)}\right)$ is the Gamma function. ###### Proof. Assume that $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}$ are fixed and independent of $D$. Let $I(D)=\int_{0}^{1}\left(1-I_{x^{r}}(q+1,p)\right)^{D}dx.$ (11) We now provide asymptotic analysis of $I(D)$ for large $D.$ In this analysis we use the Erdélyi’s formulation of Laplace’s method. See [5, 12, 20] for a description of this technique. Observe that $I(D)=\int_{0}^{1}e^{-Df(x)}dx,$ where $f(x)=-\ln\left(1-I_{x^{r}}(q+1,p)\right).$ From Lemma 4 we deduce that the assumption of Theorem 1.1 in [12] holds for $f(x):=-\ln\left(1-I_{x^{r}}(q+1,p)\right),$ $g(x):=1,$ $a:=0$ and $b:=1.$ Namely, we apply Formula $(1.5)$ in [12, Theorem 1.1] for $a:=0$ $f(0):=0,$ $\lambda:=D,$ $\beta:=1,$ $\alpha:=r(q+1),$ $b_{0}=1,$ $a_{0}=\binom{p+q}{q+1},$ $n:=k$ and deduce that the integral $I(D)$ has the following asymptotic expansion $\sum_{k=0}^{\infty}\Gamma\left(\frac{k+1}{r(q+1)}\right)\frac{c_{k}}{D^{\frac{k+1}{r(q+1)}}},$ as $D\rightarrow\infty,$ where $(c_{0})^{-1}=\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}r(q+1)$ and $\Gamma\left(\frac{k+1}{r(q+1)}\right)$ is the Gamma function. Therefore $I(D)=\frac{\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}}{{\binom{p+q}{q+1}}^{\frac{1}{r(q+1)}}}\frac{1}{D^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{D^{\frac{2}{r(q+1)}}}\right).$ Using the basic identity for the Gamma function $\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}=\Gamma\left(1+\frac{1}{r(q+1)}\right)$ (see [13, Identity 5.5.1] for $z:=\frac{1}{r(q+1)}$) we get $I(D)=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{{\binom{p+q}{q+1}}^{\frac{1}{r(q+1)}}}\frac{1}{D^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{D^{\frac{2}{r(q+1)}}}\right).$ (12) Finally, combining together the result of Theorem 8, (11) and (12) we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{\binom{p+q}{q+1}^{\frac{1}{r(q+1)}}}N{D^{-\frac{1}{r(q+1)}}}\left(1+O\left(D^{-\frac{1}{r(q+1)}}\right)\right)+O(1).$ This completes the proof of Theorem 9. ∎ Table 2 explains Theorem 9 for $p\in\mathbb{N}\setminus\\{0\\}$ and some fixed parameters $q,r$ in terms of asymptotic notations. In view of Theorem 9, we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=N{\Theta\left(D^{-\frac{1}{r(q+1)}}\right)}+O(1).$ Table 2: The expected data persistency of replicated erasure codes replicated erasure codes for random replication strategy as a function of system parameters $p,q,r$ provided that $D$ is large. parameter $p$ | parameter $q$ | parameter $r$ | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ ---|---|---|--- $p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=1$ | ${N}{\Theta\left(D^{-1}\right)}+O(1)$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=2$ | $N{\Theta\left(D^{-\frac{1}{2}}\right)}+O(1)$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=1$ | $r=2$ | $N{\Theta\left(D^{-\frac{1}{4}}\right)}+O(1)$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=2$ | $r=3$ | $N{\Theta\left(D^{-\frac{1}{9}}\right)}+O(1)$ ## 4 Analysis of Symmetric Replicated Erasure Codes In this section, we analyze the expected data persistency of replicated erasure codes for the symmetric replication strategy. We note that the concept of the expected data persistency for symmetric replication strategy was investigated in Marchwicki’s PhD thesis [11]. Namely, symmetric replication of erasure codes was analyzed and the asymptotic result formulated in Theorem 12 of the current paper was earlier obtained for very special parameters $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r=1$. In our notation, this means for the case $REC(p,p+q,1)$. Thus, in Theorem 12 below we generalizes one of the main results of PhD thesis [11] for all parameters $r\in\mathbb{N}\setminus\\{0\\}$. We are now ready to present and analyse Algorithm 2. Algorithm 2 Symmetric replication of $REC(p,p+q,r).$ 0: A system of $N$ storage nodes; $f^{(1)},f^{(2)},\dots f^{(D)}$ data items; each of the data items is encoded and replicated into $(p+q)r$ chunks (see Definition 1); $f^{(1)}_{1}(j),f^{(1)}_{2}(j),\dots f^{(1)}_{p+q}(j),$ $f^{(2)}_{1}(j),f^{(2)}_{2}(j),\dots f^{(2)}_{p+q}(j),\dots$ $f^{(d)}_{1}(j),f^{(d)}_{2}(j),\dots f^{(D)}_{p+q}(j),$ for $j\in\\{1,2\dots,r\\},$ fragments after encoding and replication. 0: The final positions of $(p+q)rD$ fragments in the nodes of the storage system (see Figure $3$). 1: $A:=1;$ 2: for $k=1$ to $D$ do 3: for $j=1$ to $r$ do 4: for $l=1$ to $p+q$ do 5: replicate fragment $f^{(k)}_{l}(j)$ at the node with identifier $A;$ 6: $A:=A+1\mod N;$ 7: end for 8: end for 9: end for Figure $3$ illustrates Algorithm 2 for the system parameters $p=q=1,$ $r=2,$ number of documents $D=7$ and number of nodes $N=16$. In this case, each document is divided and encoded into $4$ chunks. Hence, we have $28$ chunks replicated according to the symmetric strategy in $16$ nodes. $\begin{array}[]{|c|c|c|c|c|c|c|c|c|c|}\hline\cr n&1&2&3&4&5&6&7&8\\\ \hline\cr&f^{(1)}_{1}(1)&f^{(1)}_{2}(1)&f^{(1)}_{1}(2)&f^{(1)}_{2}(2)&f^{(2)}_{1}(1)&f^{(2)}_{2}(1)&f^{(2)}_{1}(2)&f^{(2)}_{2}(2)\\\ &f^{(5)}_{1}(1)&f^{(5)}_{2}(1)&f^{(5)}_{1}(2)&f^{(5)}_{2}(2)&f^{(6)}_{1}(1)&f^{(6)}_{2}(1)&f^{(6)}_{1}(2)&f^{(6)}_{2}(2)\\\ \hline\cr\hline\cr n&9&10&11&12&13&14&15&16\\\ \hline\cr&f^{(3)}_{1}(1)&f^{(3)}_{2}(1)&f^{(3)}_{1}(2)&f^{(3)}_{2}(2)&f^{(4)}_{1}(1)&f^{(4)}_{2}(1)&f^{(4)}_{1}(2)&f^{(4)}_{2}(2)\\\ &f^{(7)}_{1}(1)&f^{(7)}_{2}(1)&f^{(7)}_{1}(2)&f^{(7)}_{2}(2)&&&&\\\ \hline\cr\end{array}$ Fig. 3: Symmetric replicated strategy according to Algorithm 2 for replicated erasure codes $REC(1,2,2),$ i.e. the system parameters $p=q=1,$ $r=2,$ the number of documents $D=7$ and the number of nodes $n=16.$ We now prove the following exact formula for the expected data persistency of replicated erasure codes for the symmetric replication strategy as the integral of incomplete Beta functions. It is worth pointing out that the proof of Theorem 10 is technically complicated. However, as in the proof of Corollary 6 in the previous section, we derive $\Pr\left[X_{(p,p+q,r)}^{(N,D)}>l\right]$ (see Equations (13), (17)) and apply Identity (5) to get the desired exact integral formula for $\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]$ (see Equations (19), (21) and (25)). ###### Theorem 10. Let Assumption 3 hold. Assume that all chunks are replicated according to the symmetric strategy in the storage nodes as in Algorithm 1. Let $(p+q)r$ be a divisor of the number of nodes $N$ and the number of documents $D\geq\frac{N}{(p+q)r}$. Then $\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx,$ where $I_{x}(q+1,p)$ is the incomplete Beta function. We note that the expected data persistency of symmetric replicated erasure codes does not depend on the number of documents $D$. ###### Proof. Fix $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}.$ Let $\Omega$ denote the set of nodes in the storage system. Assume that $|\Omega|=N$ and $\frac{N}{(p+q)r}\in\mathbb{N},$ and all chunks are replicated according to the symmetric strategy in the storage nodes as in Algorithm 1. We now make the following important observation. Namely, $\displaystyle U_{i,j}=$ $\displaystyle\\{(p+q)(r(i-1)+(j-1))+1,(p+q)(r(i-1)+(j-1))+2,$ $\displaystyle\dots,(p+q)(r(i-1)+(j-1))+(p+q)\\},$ for $i=1,2,\dots,\frac{n}{(p+q)r}$ and for $j=1,2,\dots,r$ is the fixed partition of the set $\Omega$ into disjoint clusters of cardinality $p+q$. Suppose that we are successively, independently and randomly removing distinct nodes from the set $\Omega$. Let $\omega_{1},\omega_{2},\ldots$ be a realization of this process. Observe that $X_{(p,p+q,r)}^{(N,D)}=\min\\{l:(\exists i)(\forall j)(U_{i,j}\cap\\{\omega_{1},\ldots,\omega_{l}\\}=q+1)\\}$ (see Assumption 3). Let $[\Omega]^{l}$ denote the family of all subsets of $\Omega$ of cardinality $l$. Let $X$ be a random element from $[\Omega]^{l}.$ Then $\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=\frac{|\\{X\in[\Omega]^{l}:(\forall i)(\exists j)(0\leq U_{i,j}\cap X\leq q)\\}|}{|[\Omega]^{l}|}~{}.$ (13) Let us consider the space $[\Omega]^{l}$ with uniform probability. Assume that $(\forall i)(\exists j)(0\leq U_{i,j}\cap X\leq q).$ Let $j_{1},j_{2},\dots,j_{r}\in\\{0,1,\dots,p+q\\}.$ Define $A(p,q,r)=\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}:j_{1}\leq q\,\vee\,j_{2}\leq q\vee\dots\vee j_{r}\leq q\\}.$ Let $k_{(j_{1},j_{2},\dots,j_{r})}$ denote the number of occurrences of $(j_{1},j_{2},\dots,j_{r})$ in the sequence $\\{(U_{i,1}\cap X,U_{i,2}\cap X,\dots,U_{i,r}\cap X)\\}_{i\in\left\\{1,2,\dots,\frac{N}{(p+q)r}\right\\}}.$ Observe that $\sum_{A(p,q,r)}k_{(j_{1},j_{2},\dots,j_{r})}=\frac{N}{(p+q)r},$ (14) $\sum_{A(p,q,r)}(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}=l.$ (15) $\displaystyle D(p,q,r,l)=\\{k_{(j_{1},j_{2},\dots,j_{r})}:\sum_{A(p,q,r)}(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}=l\\}.$ (16) Putting all together (13-16) we derive $\displaystyle\Pr[X_{(p,p+q,r)}^{(N,D)}>l]$ $\displaystyle=\frac{\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}}{\binom{N}{l}}.$ (17) Observe that $\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=0$ for any $l\geq q\frac{N}{p+q}+1$ (see Equation (14) and Equation (15) for $j_{1}=j_{2}=\dots=j_{q}=r$). Using this and Identity (5) for random variable $X:=X_{(p,p+q,r)}^{(N,D)}$ we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l\geq 0}\Pr[X_{(p,p+q,r)}^{(N,D)}>l]=\sum_{l=0}^{q\frac{N}{p+q}}\Pr[X_{(p,p+q,r)}^{(N,D)}>l].$ (18) Combining together (17) and (18) we derive the first complicated formula for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right].$ $\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\sum_{l=0}^{q\frac{N}{p+q}}{\binom{N}{l}}^{-1}\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\times$ $\displaystyle\times\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}.$ (19) The rest of this proof is devoted to simplification of expression (19) for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right].$ Using Formula (15) we get $\left(\frac{x}{1-x}\right)^{l}=\prod\limits_{A(p,q,r)}\left(\frac{x}{1-x}\right)^{(j_{1}+j_{2}+\dots+j_{r})k_{(j_{1},j_{2},\dots,j_{r})}}.$ (20) Applying Identities (1), (2) for $a:=l+1$ and $b:=N+1-l$ we have ${\binom{N}{l}}^{-1}=(N+1)\int_{0}^{1}x^{l}(1-x)^{N-l}dx.$ This together with (19) and (20), as well as interchanging summation with integral lead to $\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}(1-x)^{N}\sum_{l=0}^{q\frac{N}{p+q}}\sum\limits_{D(p,q,r,l)}\left(\frac{\left(\frac{N}{(p+q)r}\right)!}{\prod\limits_{A(p,q,r)}\left(k_{(j_{1},j_{2},\dots,j_{r})}\right)!}\right)\times$ $\displaystyle\times\prod\limits_{A(p,q,r)}\left(\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\left(\frac{x}{1-x}\right)^{j_{1}+j_{2}+\dots+j_{r}}\right)^{k_{(j_{1},j_{2},\dots,j_{r})}}dx.$ From Equation (14) and multinomial theorem we get $\displaystyle\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}(1-x)^{N}\times$ $\displaystyle\times\left(\sum\limits_{A(p,q,r)}\binom{p+q}{j_{1}}\binom{p+q}{j_{2}}\dots\binom{p+q}{j_{r}}\left(\frac{x}{1-x}\right)^{j_{1}+j_{2}+\dots+j_{r}}\right)^{\frac{N}{(p+q)r}}dx$ $\displaystyle=(N+1)\int_{0}^{1}\left(\sum\limits_{A(p,q,r)}\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}\right)^{\frac{N}{(p+q)r}}dx.$ (21) We now define $\displaystyle B(p,q,r)=$ $\displaystyle\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}:j_{1}\geq q+1\,\wedge\,j_{2}\geq q+1\wedge\dots\wedge j_{r}\geq q+1\\}.$ Observe that $A(p,q,r)\cup B(p,q,r)=\\{(j_{1},j_{2},\dots,j_{r})\in\\{0,1,\dots p+q\\}\\},$ (22) $A(p,q,r)\cap B(p,q,r)=\emptyset.$ (23) Combining together (22) and the binomial theorem we derive $\displaystyle\sum\limits_{A(p,q,r)\cup B(p,q,r)}$ $\displaystyle\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$ $\displaystyle=\prod_{k=1}^{r}\sum_{j_{k}=0}^{p+q}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}=1.$ Using this, Identity (23), the binomial theorem, as well as Formula (4) for $a:=q+1,$ $b:=p$ we derive $\displaystyle\sum\limits_{A(p,q,r)}$ $\displaystyle\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$ $\displaystyle=1-\sum\limits_{B(p,q,r)}\prod_{k=1}^{r}\binom{p+q}{j_{k}}\left(x\right)^{j_{k}}\left(1-x\right)^{p+q-j_{k}}$ $\displaystyle=1-\left(\sum_{j=q+1}^{p+q}x^{j}(1-x)^{p+q-j}\right)^{r}=1-\left(I_{x}(q+1,p)\right)^{r}.$ (24) Finally, combining together (21) and (24) we have the desired Formula $\mathbf{E}\left[K_{(p,p+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx.$ (25) This completes the proof of Theorem 10. ∎ We now observe that like for the random replication strategy, the maximal expected data persistency of replicated erasure codes for symmetric replication strategy is attained by the replicated erasure codes with parameter $p=1.$ ###### Corollary 11. Under the assumption of Theorem 10 we have $\max_{p\geq 1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$ ###### Proof. The proof of Corollary 11 is analogous to that of Corollary 7. Using (7) we have $I_{x}(q+1,p+1)\geq I_{x}(q+1,p).$ Hence $\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}\geq\left(1-\left(I_{x}(q+1,p+1)\right)^{r}\right)^{\frac{N}{(p+q)r}}.$ Applying Theorem 10 we get $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]\geq\mathbf{E}\left[X_{(p+1,p+1+q,r)}^{(N,D)}\right].$ Therefore $\max_{p\geq 1}\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right].$ This completes the proof of Corollary 11. ∎ As before, the formula in Theorem 10 makes it hard to apply in practice. To that end, we formulate in the next theorem a very useful asymptotic approximation for $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$. Particularly, we analyze the expected data persistency of replicated erasure codes for the symmetric replication strategy when the number of nodes $N$ is large. In the proof of Theorem 12 we apply again the Erdélyi’s formulation of Laplace’s method for the integral formula obtained in Theorem 11. ###### Theorem 12. Let Assumption 3 hold. Assume that all chunks are replicated according to the symmetric strategy in the storage nodes as in Algorithm 1. Let $(p+q)r$ be a divisor of the number of nodes $N$ and the number of documents $D\geq\frac{N}{(p+q)r}$. Then $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{\binom{p+q}{q+1}^{\frac{1}{q+1}}}N^{1-\frac{1}{r(q+1)}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right),$ (26) where $\Gamma\left(1+\frac{1}{r(q+1)}\right)$ is the Gamma function. ###### Proof. The proof of Theorem 12 is analogous to that of Theorem 9. Assume that $p\in\mathbb{N}\setminus\\{0\\},$ $q\in\mathbb{N}$ and $r\in\mathbb{N}\setminus\\{0\\}$ are fixed and independent on $N$. Let $J(N)=\int_{0}^{1}\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)^{\frac{N}{(p+q)r}}dx.$ (27) In the asymptotic analysis of $J(N)$ for large $N$ we apply the Erdélyi’s formulation of Laplace’s method. Observe that $J(N)=\int_{0}^{1}e^{-\frac{N}{(p+q)r}f(x)}dx,$ where $f(x)=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right)$. From Lemma 4, we deduce that the assumption of Theorem 1.1 in [12] holds for $f(x):=-((p+q)r)^{-1}\ln\left(1-\left(I_{x}(q+1,p)\right)^{r}\right),$ $g(x):=1,$ $a:=0$ and $b:=1$. Namely, we apply Formula $(1.5)$ in [12, Theorem 1.1] for $a:=0$ $f(0):=0,$ $\lambda:=N,$ $\beta:=1,$ $\alpha:=r(q+1),$ $b_{0}=1,$ $a_{0}=((p+q)r)^{-1}\binom{p+q}{q+1}^{r},$ $n:=k$ and deduce that the integral $J(N)$ has the following asymptotic expansion $\sum_{k=0}^{\infty}\Gamma\left(\frac{k+1}{r(q+1)}\right)\frac{c_{k}}{\left(N\right)^{\frac{k+1}{r(q+1)}}},$ as $N\rightarrow\infty,$ where $(c_{0})^{-1}=\left(\frac{1}{(p+q)r}\right)^{\frac{1}{r(q+1)}}\binom{p+q}{q+1}^{\frac{1}{q+1}}(r(q+1))$ and $\Gamma\left(\frac{k+1}{r(q+1)}\right)$ is the Gamma function. Therefore $J(N)=\frac{\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}}{{\binom{p+q}{q+1}}^{\frac{1}{q+1}}}\frac{\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{N^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$ Using the basic identity for the Gamma function $\Gamma\left(\frac{1}{r(q+1)}\right)\frac{1}{r(q+1)}=\Gamma\left(1+\frac{1}{r(q+1)}\right)$ (see [13, Identity 5.5.1] for $z:=\frac{1}{r(q+1)}$) we get $J(N)=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)}{{\binom{p+q}{q+1}}^{\frac{1}{q+1}}}\frac{\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{N^{\frac{1}{r(q+1)}}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$ (28) Finally, combining together the result of Theorem 10, (27) and (28), we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\frac{\Gamma\left(1+\frac{1}{r(q+1)}\right)\left((p+q)r\right)^{\frac{1}{r(q+1)}}}{\binom{p+q}{q+1}^{\frac{1}{q+1}}}N^{1-\frac{1}{r(q+1)}}+O\left(\frac{1}{N^{\frac{2}{r(q+1)}}}\right).$ This completes the proof of Theorem 12. ∎ Table 3 explains Theorem 12 for $p\in\mathbb{N}\setminus\\{0\\}$ and some fixed parameters $q,r$ and in terms of asymptotic notations. In view of Theorem 12, we have $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]=\Theta\left(N^{1-\frac{1}{r(q+1)}}\right).$ Table 3: The expected data persistency of replicated erasure codes $REC(p,p+q,r)$ for symmetric replication strategy as a function of the system parameters $p,q,r,$ provided that $N$ is large. parameter $p$ | parameter $q$ | parameter $r$ | $\mathbf{E}\left[X_{(p,p+q,r)}^{(N,D)}\right]$ ---|---|---|--- $p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=1$ | ${\Theta\left(1\right)}$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=0$ | $r=2$ | ${\Theta\left(N^{\frac{1}{2}}\right)}$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=1$ | $r=2$ | ${\Theta\left(N^{\frac{3}{4}}\right)}$ $p\in\mathbb{N}\setminus\\{0\\}$ | $q=2$ | $r=3$ | ${\Theta\left(N^{\frac{8}{9}}\right)}$ ## 5 Discussions In this study, we analyzed the expected data persistency of $REC(p,p+q,r)$ (replicated erasure codes) in distributed storage systems for the random and symmetric replication strategies. Recall that in $REC(p,p+q,r)$, each document is encoded and replicated. To restore the original document, one has to download $p$ chunks, each from $r$ different replication sets (see Assumption 3). Thus, if $q+1$ chunks in each $r$ replication sets are placed in the nodes that leave the storage system, then restoring the original document becomes impossible. The expected data persistency of a storage system for the random (as well as the symmetric) strategy depends on $r(q+1)$. Namely, the expected data persistency is in $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$ for the random replication strategy and is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ for the symmetric replication strategy, where $N$ is the number of nodes in the storage system and $D$ is the number of documents. Table 4 displays a comparison of the strategies: random and symmetric. Table 4: Comparision of the expected data persistency for random and symmetric erasure codes. | Number --- of documents Replication strategy | | Expected --- data persistency $D=O(N)$ | random | $N\Theta\left(D^{-\frac{1}{r(q+1)}}\right)$ $D=\Theta(N)$ | random or symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ $D=\Omega(N)$ | symmetric | $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ Let us consider case $D=\Delta N,$ provided that $\Delta$ is constant, i.e., $\Delta$ is the average number of documents per node. Then both strategies give asymptotically the same expected data persistency. When $D=O(N)$, then the random strategy gives highest expected data persistency. If $D=\Omega(N)$, then the symmetric strategy is better. ### 5.1 Non-uniform Redundancy Scheme In this paper, it is assumed that each document is encoded and replicated according to $REC(p,p+q,r)$ for some fixed parameters $p,q,r$. However, our analysis is not limited to uniform settings only, and the proposed theory can also handle non-uniform redundancy schemes, where each document is encoded and replicated according to different parameters $p,q,r$. Namely, assume that $D_{i}$ is the number of documents that are encoded and replicated according to $REC(p_{i},p_{i}+q_{i},r_{i})$ for some fixed $p_{i}\in\mathbb{N}\setminus\\{0\\},$ $q_{i}\in\mathbb{N}$ and $r_{i}\in\mathbb{N}\setminus\\{0\\}$, provided that $i=1,2,\dots,k$ and $D_{1}+D_{2}+\dots D_{k}=D$. Then, the the expected data persistency of storage system with $D_{i}$ documents is in $N\Theta\left(D_{i}^{-\frac{1}{r(q+1)}}\right)$ for the random replication strategy and is in $\Theta\left(N^{1-\frac{1}{r(q+1)}}\right)$ for the symmetric replication strategy, where $N$ is the number of nodes. Of course, the closed analytical and asymptotic formulas for expected data persistency of a storage system with $D_{1}+D_{2}+\dots D_{k}$ documents need further theoretical studies. ### 5.2 Exact Formulas in Terms of Beta Functions We proved that the maximal expected data persistency of $REC(p,p+q,r)$ for both replication strategies is attained by the replicated erasure codes with parameter $p=1$ (see Theorem 7 in Section 3 and Theorem 11 in Section 4). Let us recall that for $p=1$ replicated erasure codes becomes simply replication with $(1+q)r$ replicas. If we restrict to $p=1$, we can give exacts formulas for the expected data persistency of $REC(1,1+q,r)$ in terms of the Beta function (see Formula (29) and Formula (30)). #### a) The random strategy Combining together Theorem 8 with Equation (4) for $a:=q+1,b:=1$ and $x:=x^{r}$ we have $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(\sum_{j=0}^{q}\binom{q+1}{j}x^{rj}\left(1-x^{r}\right)^{q+1-j}\right)^{D}dx+ER.$ By the binomial theorem we get $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=N\int_{0}^{1}\left(1-x^{r(q+1)}\right)^{D}dx+ER.$ Together, substitution $y:=x^{r(q+1)}$ in the previous formula and Definition 1 for $a:=D+1,$ $b:=\frac{1}{r(q+1)}$ lead to $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=\frac{N}{r(q+1)}\mathrm{Beta}\left(D+1,\frac{1}{r(q+1)}\right)+ER,\,\,\,\text{where}\,\,\,|ER|\leq 1.$ (29) #### b) The symmetric strategy Combining together Theorem 10 with Equation (4) for $a:=q+1,b:=1$ we have $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-\left(1-\sum_{j=0}^{q}\binom{q+1}{j}x^{j}\left(1-x\right)^{q+1-j}\right)^{r}\right)^{\frac{N}{r(q+1)}}dx$ By the binomial theorem we get $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=(N+1)\int_{0}^{1}\left(1-x^{(q+1)r}\right)^{\frac{N}{r(q+1)}}dx.$ Together substitution $y:=x^{r(q+1)}$ in the previous formula and Definition 1 for $a:=\frac{N}{(q+1)r}+1,$ $b:=\frac{1}{r(q+1)}$ lead to $\mathbf{E}\left[X_{(1,1+q,r)}^{(N,D)}\right]=\frac{N+1}{r(q+1)}\mathrm{Beta}\left(\frac{N}{r(q+1)}+1,\frac{1}{r(q+1)}\right).$ (30) We note that the Exact Formula (30) was obtained in [3] for the very special parameter $r=1.$ ## 6 Numerical Results In this section, we use a set of experiments to show how the parameters $p,q,r$ impact the expected data persistency of the two replication strategies: random and symmetric. Algorithms 1 and 2 are implemented to illustrate Theorem 9 together with the exact Formula (29) and Theorem 12. We repeated the following experiments $10$ times. First, for each number of nodes $N\in\\{48*1,48*2,48*3,48*62\\}$, we generated $50$ replicas of $D$ documents according to replicated erasure codes and Algorithms 1 and 2 respectively. Let $E_{n,50}$ be the average of $50$ measurements of the data persistency. Then, we placed the points in the set $\\{(n,E_{n,50}):n=48*1,48*2,48*3,\dots,48*62\\}$ into the picture. $\mathbf{E}\left[X_{(1,1,2)}^{(N,5)}\right]=\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N$ Fig. 4: The expected data persistency of Algorithm 1 for $p=1,$ $q=0,$ $r=2$ and $D=5$ $\mathbf{E}\left[X_{(1,1,2)}^{(N,N)}\right]=\Gamma\left(\frac{3}{2}\right)\sqrt{N}$ Fig. 5: The expected data persistency of Algorithm 1 for $p=1,$ $q=0,$ $r=2$ and $D=N$ In Figures 4 and 5 the dots represent the experimental data persistency of Algorithm 1 considering the parameters $p=1,$ $q=0,$ $r=2,$ $D=5$ and $p=1,$ $q=0,$ $r=2,$ $D=N$ for the number of nodes $N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. The additional lines $\left\\{\left(N,\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N\right),48\leq N\leq 2976\right\\},$ $\left\\{\left(N,\Gamma\left(\frac{3}{2}\right)\sqrt{N}\right),48\leq N\leq 2976\right\\},$ are the leading terms in the theoretical estimation of the expected data persistency of Algorithm 1 when $p=1,$ $q=0,$ $r=2,$ $D=5$ (see exact Formula (29) for $p=1,$ $q=0,$ $r=2,$ $D=5$) and when $p=1,$ $q=0,$ $r=2,$ $D=N$ (see Theorem 9 for $p=1,$ $q=0,$ $r=2,$ $D=N$). Figures 4 and 5 together illustrate the decline from $\frac{\mathrm{Beta}\left(6,\frac{1}{2}\right)}{2}N$ to $\Gamma\left(\frac{3}{2}\right)\sqrt{N}$ in the expected data persistency for the random replication strategy in Algorithm 1 when the number of documents $D$ increases from $5$ to $N$. $\mathbf{E}\left[X_{(1,2,1)}^{(N,D)}\right]=\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}$ Fig. 6: The expected data persistency of Algorithm 2 for $p=1,$ $q=1,$ $r=1$ $\mathbf{E}\left[X_{(2,4,1)}^{(N,D)}\right]=\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$ Fig. 7: The expected data persistency of Algorithm 2 for $p=2,$ $q=2,$ $r=1$ The experimental data persistency of Algorithm 2 considering the parameters $p=1,$ $q=1,$ $r=1$ and $p=2,$ $q=2,$ $r=1$ is illustrated in Figures 6 and 7 for the number of nodes $N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. Similarly, the additional lines $\left\\{\left(N,\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}\right),48\leq N\leq 2976\right\\},$ $\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}\right),48\leq N\leq 2976\right\\},$ are the leading terms in the theoretical estimation of the expected data persistency of Algorithm 2 when $p=1,$ $q=1,$ $r=1$ and when $p=2,$ $q=2,$ $r=1$ (see Theorem 12 for $p=1,$ $q=0,$ $r=1$ and $p=2,$ $q=2,$ $r=1$). Figures 6 and 7 together illustrate the increase from $\Gamma\left(\frac{3}{2}\right)2^{\frac{1}{2}}\sqrt{N}$ to $\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$ in the expected data persistency for the random replication strategy in Algorithm 2 when $r=1$ and $p,q$ increase from $1$ to $2$. $\mathbf{E}\left[X_{(1,3,1)}^{(N,N)}\right]=\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}$ Fig. 8: The expected data persistency of Algorithm 1 for $p=1,$ $q=2,$ $r=1$ abd $D=N$ $\mathbf{E}\left[X_{(1,3,1)}^{(N,D)}\right]=\Gamma\left(\frac{4}{3}\right)3^{\frac{1}{3}}N^{\frac{2}{3}}$ Fig. 9: The expected data persistency of Algorithm 2 for $p=1,$ $q=2,$ $r=1$ Figure 8 depicts the experimental data persistency of Algorithm 1 for $p=1,$ $q=2,$ $r=1,$ $D=N$ and the number of nodes $N\in\\{48*1,48*2,48*3,\dots,48*62\\}$. The additional line $\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)N^{\frac{2}{3}}\right),48\leq N\leq 2976\right\\}$ is the leading term in the theoretical estimation (see Theorem 9 for $p=1,$ $q=2,$ $r=1,$ $D=N$). The experimental data persistency of Algorithm 2 for $p=1,$ $q=2,$ $r=1,$ and the number of nodes $N\in\\{48*1,48*2,48*3,\dots,48*62\\}$ is depicted in Figure 9. Similary, the additional line $\left\\{\left(N,\Gamma\left(\frac{4}{3}\right)3^{\frac{1}{3}}N^{\frac{2}{3}}\right),48\leq N\leq 2976\right\\}$ is the leading term in the theoretical estimation (see Theorem 9 for $p=1,$ $q=2,$ $r=1$). Figures 8 and 9 together illustrate the case when for both replication strategies random and symmetric the expected data persistency is in $\Theta\left(N^{\frac{2}{3}}\right)$ (see Table 4 in Section 5). Finally, we point out that the carried experiments match the developed theory very well. ## 7 Conclusions and Future research In this paper, we addressed the fundamental problem of the data persistency of replicated erasure codes for random and symmetric strategies. To this end, we derived exact and asymptotically approximated formulas for the expected data persistency, that is, the number of nodes in the storage system that must be removed so that restoring some document would become impossible. While we have discussed the applicability of our approach to non-uniform redundancy schemes, a natural open problem for future study is to find a closed form formula for the expected data persistency for non-uniform setting. Additionally, it would be interesting to explore the problem of the data persistency for a mixture of random and symmetric strategies or others strategies. ## References * [1] A. Aghayev, S. Weil, M. Kuchnik, M. Nelson, G. R. Ganger, and G. Amvrosiadis. The case for custom storage backends in distributed storage systems. 16(2), 2020. * [2] A. Bracher, E. Hof, and A. Lapidoth. Guessing attacks on distributed-storage systems. IEEE Transactions on Information Theory, 65(11):6975–6998, 2019\. * [3] J. Cichoń, R. Kapelko, and K.Marchwicki. Brief announcement: A note on replication of documents. In Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, SSS 2011, volume 6976 of LNCS, pages 439 –440. Springer, 2011. * [4] M. Elyasi and S. Mohajer. Cascade codes for distributed storage systems. IEEE Transactions on Information Theory, 66(12):7490–7527, 2020\. * [5] Arthur Erdélyi. Asymptotic Expansion. Dover, New York, 1956. * [6] P. Flajolet and B. Sedgewick. An Introduction to the Analysis of Algorithms. Addison-Wesley, 1995. * [7] Catherine Forbes, Merran Evans, Nicholas Hastings, and Brian Peacock. Statistical Distributions. John Wiley & Sons, 2011. * [8] Roy Friedman, Yoav Kantor, and Amir Kantor. Replicated erasure codes for storage and repair-traffic efficiency. In 14-th IEEE International Conference on Peer-to-Peer Computing, 2014. * [9] Ali Ghodsi, Luc Onana Alima, and Seif Haridi. Symmetric replication for structured peer-to-peer systems. In Databases, Information Systems, and Peer-to-Peer Computing, volume 4125 of Lecture Notes in Computer Science. Springer, 2007. * [10] W. K. Lin, D.M. Chiu, and Y. B. Lee. Erasure Code Replication Revisited. In Proceedings of the 4th International Conference on Peer-to-Peer Computing, pages 90–97, 2004. * [11] Karol Marchwicki. Efektywnosc i niezawodnosc w sieciach typu Peer-to-peer. PhD thesis, Institute of Computer Science, Polish Academy of Science, 2019\. in Polish. * [12] Gergö Nemes. An explicit formula for the coefficients in laplace’s method. Constructive Approximation, 38(3):471–487, 2013. * [13] NIST Digital Library of Mathematical Functions. http://dlmf.nist.gov/8.17. * [14] A.S. Rawat, D. S. Papailiopoulos, A. G. Dimakis, and S. Vishwanath. Locality and availability in distributed storage. IEEE Transactions on Information Theory, 62(8):4481–4493, 2016\. * [15] Rodrigo Rodrigues and Barbara Liskov. High Availability in DHTs: Erasure Coding vs. Replication. In Miguel Castro and Robbert Renesse, editors, Peer-to-Peer Systems, volume 3640 of Lecture Notes in Computer Science, pages 226–239. Springer Berlin Heidelberg, 2005. * [16] Mark Silberstein, Lakshmi Ganesh, Yang Wang, Lorenzo Alvisi, and Mike Dahlin. Lazy Means Smart: Reducing Repair Bandwidth Costs in Erasure-Coded Distributed Storage. In Proc. of ACM International Conference on Systems and Storage, SYSTOR, 2014. * [17] Wojciech Szpankowski. Average Case Analysis of Algorithms on Sequences. A Wiley-Interscience Publication, New York, 2001. * [18] Quang Hieu Vu, Mihai Lupu, and Beng Chin Ooi. Peer-to-Peer Computing - Principles and Applications. 2009\. * [19] Hakim Weatherspoon and John Kubiatowicz. Erasure Coding Vs. Replication: A Quantitative Comparison. In First International Workshop on Peer-to-Peer Systems, IPTPS, page 328–338. Springer-Verlag, 2002. * [20] John Wojdylo. On the coefficients that arise from Laplace’s method. Journal of Computational and Applied Mathematics, 196:241–266, November 2006.
arxiv-papers
2021-07-27T13:00:21
2024-09-04T03:07:21.529256
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Roy Friedman, Rafa{\\l} Kapelko, Karol Marchwicki", "submitter": "Rafal Kapelko", "url": "https://arxiv.org/abs/2107.12788" }
2107.12791
# Clickbait Detection in YouTube Videos Ruchira Gothankar111Department of Computer Science, San Jose State University Fabio Di Troia11footnotemark: 1 Mark Stamp11footnotemark: 1 222mark.stamp$@$sjsu.edu ###### Abstract YouTube videos often include captivating descriptions and intriguing thumbnails designed to increase the number of views, and thereby increase the revenue for the person who posted the video. This creates an incentive for people to post clickbait videos, in which the content might deviate significantly from the title, description, or thumbnail. In effect, users are tricked into clicking on clickbait videos. In this research, we consider the challenging problem of detecting clickbait YouTube videos. We experiment with multiple state-of-the-art machine learning techniques using a variety of textual features. ## 1 Introduction Today, web content is increasingly popular and people rely on information obtained from the internet. Furthermore, with the diversity of available resources, the amount of time spent on the internet has increased. Many platforms provide a medium where virtually anyone can publish information that is accessible to a large number of people. However, the credibility of such information is not guaranteed. Online sources of information include blogs, video sharing platforms, and social media, among others. Many of these applications have been developed with the main intent to generate revenue. Hence, unscrupulous people can use false information to increase their viewership and increase their revenue. Clickbait is false and deceptive information that lures users to click a link, watch a video, or read an article. It aims to exploit the user’s curiosity by providing misleading—though captivating—information. Clickbait has become a marketing tool in many sectors to entice users and thereby to generate revenue. Publishing eye-catching information to manipulate and trick users is a common practice to increase the viewership and spread brand awareness. A clickbait can be an image, a sensational headline, or a misleading video or audio content. While clickbait sources help in gaining attention, there are many disadvantages and negative ramifications. In fact, clickbait not only wastes the time of viewers, but also affects the trustworthiness of the underlying platform [25]. YouTube is a video publishing platforms where users upload videos and share them with others. When uploading a video, the user adds a title, a description, and a thumbnail. The other users then view the title and thumbnail before deciding whether to view the video. Hence, this data become crucial parameters on which the users can base their decision to watch a video or not. For this reason, many YouTube content creators (aka YouTubers) use clickbait title and thumbnails that might deviate from the actual content to increase viewership for a video, and thereby generate more revenue. A recent example includes the COVID-19 pandemic, where individuals have posted misleading health-related content, including some fake cures for COVID-19. Some other common examples of clickbait are video titles such as “You’ll Never Believe What Happened Next$\ldots$”, “The 10 documentaries you should watch before you die”, “You Can Now Travel Abroad Without Having to$\ldots$”,“You Won’t Believe$\ldots$” and so on [13]. Figure 1 shows an example of clickbait video on YouTube. Figure 1: Clickbait video example [30] The clickbait problem is somewhat similar to that of spam detection. Spam, which is unsolicited emails, often includes misleading messages that are sent to deceive users by redirecting them to websites for the purpose of advertising or attack. Therefore, considerable research has been focused on detecting spam. In this research, we are concerned with detecting clickbait YouTube videos. The YouTube platform relies on users to manually flag suspected malicious or clickbait content. However, a more automated approach would clearly be desirable. We consider machine learning and deep learning based solutions to the clickbait detection problem. The remainder of this paper is organized as follows. Section 2 considers relevant previous work and background topics related to natural language processing (NLP). In Section 3, we discuss our experimental setup, including the datasets used. Section 4 contains our experimental results and our analysis of these results. In Section 5, we give our conclusions and we discuss possible directions for future work. ## 2 Background This Section discusses relevant work done in this field. We mainly focuses on clickbait detection, fake news detection, image forgery detection, and hoax detection. Apart from these topics, we also discuss advancements in natural language processing (NLP). ### 2.1 Related Work Clickbait is a way to attract the attention of the users by luring them to access specific contents. However, misleading information is present on the internet in multiple forms and is often used interchangeably in different contexts. For example, a hoax is spreading false stories of, say, a celebrity death [30], while an example of a forgery is an image that suggests false information. We now discuss and analyze the performance of previous works on clickbait, fake news, forgery, and hoax detection. #### 2.1.1 Clickbait Detection In 2016 [4], Chakraborty et al. implemented an ML classifier to detect clickbait. They also created a browser extension to help readers navigate around clickbait. They used the headlines from the Wiki-news corpus and used 18,513 articles as legitimate posts. For the clickbait posts, they used articles from popular domains containing illegitimate content. To train their classifier, they used a set of 14 features spanning linguistic analysis, word patterns, and $N$-gram. They achieved an accuracy of about 89% using a support vector machine (SVM) classifier. Elyashar et al. [8] developed an approach focused on feature engineering. Their work focused on detecting clickbait posts in online social media. They performed linguistic analysis using a machine learning classifier which could differentiate between legitimate and illegitimate posts. The dataset used for analysis was provided by the 2017 Clickbait Challenge [20]. The results of their experiments suggest that malicious content tends to be longer than the benign content. They also concluded that the title of the post played an important role to identify a clickbait. Glenski et al. [11] developed a network model which is a linguistically infused network to detect fake tweets. This model, which is based on long short term memory (LSTM) and convolutional neural networks (CNN), used the text of tweets, images, and description for training. Furthermore, the pretrained embedding model GloVe was used as the embedding layer. They achieved an accuracy of 82%. Zhou [36] proposed a self-attentive neural network model using gated recurrent units (GRU) for predicting fake tweets. They performed multi classification using the annotation scheme. As proof of the success of their approach, they ranked first in the Clickbait Challenge 2017 with an F-score of 0.683. #### 2.1.2 Fake News Detection Fake news is a type of misinformation that has received considerable attention in recent years. The main idea is to analyze the text content of a news item to check if the statements are valid or not. Ahmad et al. [2] implemented an ensemble model based on the linguistic features of the text which involved a combination of multiple machine learning algorithms, namely, random forest, multilayer perceptron, and support vector machine (SVM), to detect fake news. They used XGBoost as an ensemble learner, achieving an accuracy of 92%. Thota et al. [28] presented a paper on detecting fake news using natural language processing. They used TF-IDF and Word2Vec with a dense neural network based on the news headline. In another paper on fake news detection, Jwa et al. [14] implemented a model using bidirectional encoder representations from transformers (BERT). The deep contextualizing nature of BERT has yielded strong results, including the ability to determine the relationship between the headline and the body of a news article. #### 2.1.3 Forgery Detection As the name suggests, image forgery detection consists of trying to detect malicious information that is conveyed through images. In 2018, Zhang et al. [35] developed a “fauxtography” detector which could detect images which are misleading on social media platforms. Palod et al. [19] passed pretrained Word2Vec comment embeddings through an LSTM network to generate a “fakeness” vector, and achieved an F-score of 0.82. Shang et al. [25] proposed a model that involved network feature extraction, metadata feature extraction, and linguistic feature extraction to detect clickbait in YouTube videos. The network feature extraction used comments in the videos and extracted semantic features. In the linguistic feature extraction, they relied on document embedding for comments using Doc2Vec, and they also employed a metadata module. In 2019, Reddy et al. [22] implemented a model using word embedding and trained on a support vector machine (SVM). In [7], Dong et al. have proposed a “deep similarity-aware attentive model” that focuses on the relation between the titles that are misleading and the target content. This method was quite different from traditional feature engineering and seemed to work reasonably well. In [24], Setlur considered a semi- supervised confidence network along with a gated attention based network. Based on a small labeled dataset, this method gave promising results. In many of the above approaches, only the textual information given by the title and the description, along with the metadata features, have been taken into consideration while training a model. An exception is the work in [25], where the authors have also used comments to extract features. It is also worth noting that the embedding layers of Word2Vec, BERT, and Doc2Vec have been used in all of the implementations mentioned above. In this research, we experiment with multiple embedding layers, including BERT, DistilBERT, and Word2Vec. In previous research, BERT has proven to be effective because of its deep contextualizing nature [14]. A combination of multiple models, known as ensemble learning, has given interesting results in [28], and we also consider ensemble models in the form of random forest classifiers. #### 2.1.4 Hoax Detection Articles in which facts are knowingly misrepresented can be viewed as hoaxes. These reports provide deceptive information to readers and present it as legitimate facts. One of such examples can be a fake story about a celebrity death. In [27], the authors have proposed a technique that uses logistic regression for classifying hoaxes. In the model proposed, they have used features based on user interaction and have achieved an accuracy of 99%. Zaman et al. [33] employed a nïve Bayes algorithm which uses the feedback from users as an input to verify if a news is a hoax. Kumar et al. [16] have proposed a method which uses random forest classifier to classify the credibility of the articles on Wikipedia. They achieved an accuracy of 92%. Hoax detection is, though, a less explored area, as compared to the topics discussed above. ### 2.2 Natural Language Processing Natural language processing (NLP) is the ability of a machine to process and understand the language of a human. It is used to solve many real-world problems, such as machine translation, question answering, and predicting words. Figure 2 shows a timeline of some recent advances in NLP. Figure 2: NLP advancements in recent years [21] In the early 1990’s, statistical and probabilistic approaches were employed to train NLP algorithms. However, with the arrival of the Web, the amount of data grew considerably, and such algorithms became inadequate. In 2001, Bengio et al. experimented with feedforward neural networks. Later, recurrent neural networks (RNN) and long short-term memory (LSTM) models were introduced [12]. As of 2012, techniques such as latent semantic indexing (LSI), latent semantic analysis (LSA), and support vector machines (SVM) became popular in the NLP domain. Part of speech (POS) tagging is a commonly used approach. In 2013, Tomas et. al. introduced Word2Vec, which is used to generate vector representations of words. These embeddings are obtained from the weights of a relatively simple neural network, and the vectors can capture important semantic information, based on the cosine distance between Word2Vec embeddings [23]. Global vector for word representation (GloVe) was introduced in 2014 and is an attempt to combine the benefits of LSA, LSI, and Word2Vec. It is based on the occurrence of a word in the entire corpus. CNNs and LSTMs have become popular for NLP related tasks in recent years, as such models can capture effectively utilize sequential information [12]. LSTM is a highly specialized type of RNN that mitigates the gradient issues that occur with plain vanilla RNNs. Gated recurrent unit (GRU) is a variant of LSTM introduced in 2014 that is lighter, in the sense of having fewer parameters that need to be trained. Sutskever et al. [26] proposed a sequence-to-sequence learning approach which uses an encoder-decoder architecture. In fact, such encoder-decoder models appear to be the main language modeling frameworks for NLP tasks today. The concept of an attention mechanism was proposed by Bahdanau et al. [3] in 2015 to overcome the limitation of fixed vector length for input sentences in sequence-to-sequence models [31]. Attention provides information about the importance of a part of a sentence during the decision process. To better deal with the inherent complexity of attention mechanisms, transformers were introduced [18]. Transformer includes multiple stacks of encoder-decoder architecture, where at each step in the processing, the model takes the output of the previous step as an input. Figure 3 shows the architecture of a transformer where the decoder is on the right and the encoder is on the left. Initially, the input tokens are converted to embedding vectors. Since this model does not have any RNN units, position indices are stored in a $n$-dimensional vector space in the form of embeddings. There are three fully connected layers in this particular attention mechanism, namely, the input key $K$, the value $V$, and the query $Q$, which is a matrix of queries. The algorithm defines weights for words based on all the words in $K$, and it generates a vector representation for all words based on multi- head attention [18]. The other processes include context fragmentation, and multiple parallel attention layers. Some example of deep learning models that make use of transformers include BERT, RoBERTa, mBERT, and DistilBERT. Figure 3: Architecture of a transformer [18] Bidirectional encoder representations from transformer (BERT) uses a transformer which is based on attention to learn the contextual relation between words. It involves an encoder which reads the input, and decoder which predicts the output. It is called bidirectional because instead of reading input sequentially from a specific direction, the transformer reads the sequence of words in both directions. This helps in learning the context of words based on previous and subsequent words. Figure 4 illustrated the input pattern used in a BERT model. Figure 4: Input for the BERT model [15] BERT has four pretrained versions with different layers, hidden nodes, and parameters. Each of these BERT models can be fine-tuned for a specific task by adding additional layers. DistilBERT is a lighter and a faster variant of BERT. ### 2.3 Learning Techniques In this section, we discuss the various machine learning techniques that we have employed in this research. Specifically, we have performed experiments for YouTube clickbait detection based on logistic regression, random forest, and MLP, with various embedding mechanisms. #### 2.3.1 Logistic Regression Logistic regression is a supervised learning algorithm that is used for categorical data where some parameter—which depend upon the input features and the output—is a categorical prediction. In Logistic regression, a sigmoid function is fitted on the data. The formula for the sigmoid function is $\sigma(w^{T}x+b)=\frac{1}{1+e^{-(w^{T}x+b)}}$ (1) which produces a value in the range of 0 to 1, and hence it can be interpreted as a probability. The clickbait detection problem can be treated as a type of binomial logistic regression, where the output can be either zero or one [1]. #### 2.3.2 Random Forest A random forest is based on simple decision trees—a large group of decision trees operate together in an ensemble-like manner. Each tree is trained on a subset of the data and features, a process known as boostrap aggregation, or bagging. In bagging, the data for each tree is randomly selected with replacement [32]. The final prediction of the random forest can be obtained via a simple voting scheme. A random forest mitigates the tendency of individual decision trees to overfit the training data. The important hyperparameters in a random forest are $n$-estimators, $n$-jobs, max-features, and min-sample-leaf. The $n$-estimators parameter represent the number of trees that are constructed. Typically, adding more trees increases performance at the cost of computation time. The max-features parameter is the number of features required to split at a specific node. The parameter $n$-jobs is the number of processors that work in parallel. #### 2.3.3 Multilayer Perceptron A multilayer perceptron (MLP) is a basic type of feedforward neural network that includes input and output layers, along with at least one hidden layer. An MLP with two hidden layers is illustrated in Figure 5. $X_{0}$$X_{1}$$f_{0}$$f_{0}$$f_{0}$$f_{1}$$f_{1}$$f_{1}$$f_{1}$$g$$g$$g$$Y_{0}$$Y_{1}$$Y_{2}$Input layer1st hidden layer2nd hidden layerOutput layerOutput Figure 5: MLP with two hidden layers The output layer of an MLP can be used for prediction or classification. Next, we briefly discuss regularization and activation functions; see [9] for additional details on these and related topics. Neural network models are prone to overfitting. An overfitted model is very effective in classifying the training data but it obtains poor accuracy in predicting the test data—in effect, the model has “memorized” the training data, rather than learning from the training data. One useful technique to prevent overfitting is the use of dropouts, where some number of nodes are ignored during various training steps [9]. This simple approach forces nodes that would otherwise atrophy to become active in the learning process. An activation function is used to determine the output of node in a neural network. There are multiple types of activation functions, including tanh, sigmoid, ReLU, and leaky ReLU [9]. In this research, we have experimented with ReLU and tanh. ## 3 Implementation This section includes details on the implementation used in this research. We discuss the setup used to train and execute the various machine learning models, the experimental design, and so on. ### 3.1 Hardware and Software In this research, we used multiple Conda virtual environments for each implementation. Conda is an open source package and environment management system which runs on multiple operating systems [5]. The host machine was configured as given in Table 1. All the training and the experiments were run on the host machine. Table 1: Host machine configuration Component Details Model ASUS ZenBook Processor Intel(R) Core(TM) i7-8565U CPU @ 1.80GHz 1.99 GHz RAM 16.0 GB System Type 64-bit OS Operating System Windows 10 ### 3.2 Approach Our clickbait detection experiments are based on a set of labeled videos. The problem is formulated as a binary classification problem where for each video a machine learning algorithm classifies it is clickbait or non-clickbait. The information from multiple sources (e.g., title, description, comments) are combined and fed to the classification model. The performance is evaluated and analyzed by multiple measures, specifically, precision, recall and the F-score. There are three types of features considered in this research. The first involves features from the profile of the user who posted the video (subscriptions count, views count, and videos count). The second type of feature is based on extracting textual information from the video (title and description). The third component involves statistical features related to the video (like count, dislike count, like-dislike ratio, views, and number of comments). A classification model performs binary classification (clickbait or non-clickbait) based on some combination of these features. An overview is provided in Figure 6. Figure 6: Overview of clickbait classification model ### 3.3 Features Features that provide information regarding the reputation of the channel and the videos include the number of subscribers of the YouTube channel, the number of likes or upvotes, and the age of the channel. These statistical features represent the response of viewers to the channel. Previous related work claimes that videos that are clickbait tend to have a relatively small number of subscribers and likes [30]. Usually, the number of views for the clickbait and non-clickbait videos are quite similar [34]. Useful information in determining the credibility of a video is given by the dislike ratio, the favorites count, the video age, the views count, and the comments count. Sometime, in clickbait videos the uploader disables the comment section. This itself provides clues about the video [30]. Textual features include the headline of the video, the description of the video, and the comments by the viewers. YouTubers who upload clickbait usually employ techniques which are deceptive. They use catchy and exaggerated phrases for the title and description of the video. Some common phrases are “viral,” “top.” “won’t believe”, “epic”, and similar. We tokenize the text and embed it in classification models using various embedding techniques, including Word2Vec, BERT, and DistilBERT ### 3.4 Dataset Every month, billions of people visit YouTube and the videos are watched for over a billion hours. A large number of videos are also uploaded by the users. In fact, YouTube is a platform where people can generate revenue by uploading videos and gaining viewership for their videos. In this research, the evaluation is done on a dataset of 8219 labeled videos, where 4300 are non-clickbait and 3919 are clickbait. The dataset was crawled from the Google YouTube API for the list of video IDs fetched from a Github source [17]. These sources were randomly picked and manually verified. The statistics for various parameters are shown in Table 2. Table 2: Dataset statistics Data Item Min Mean Max Title length 10 54 107 Description length 15 1131 5162 View count 21 5,660,978 2,543,466,463 Comment count 0 522 49,060 Like count 0 49,615 13,542,232 Subscriber count 977 10,200 23,695,417 Dislike count 0 1320 516,171 ### 3.5 Experiments In this research, we experimented multiple techniques including multiple language modeling techniques. We used Word2Vec, BERT, and DistilBERT for word embeddings. Architecture for the individual models is also shown. A grid search was used for training and building the models to obtain the best set of parameters. In this section, we briefly describe each of our models, and in the next section we give the results for each experiment. #### 3.5.1 Experiment I: Logistic Regression with Word2Vec In this experiment, we used a Word2Vec model provided by Gensim [10] to generate the vector representations of words in the dataset. A logistic regression model is trained on these embeddings along with additional features, specifically, comments count, likes count, dislikes count, and subscriptions count for the channel. #### 3.5.2 Experiment II: Random Forest with Word2Vec In this experiment, a random forest classifier is trained on the Word2Vec embeddings. We again used the Word2Vec model provided by Gensim. The values tested for $n$-estimators is!10, 20, 30, 50, and 100. The set of input features are title, description, and metadata features such as comments count, likes count, dislikes count, and subscriptions count for the channel. #### 3.5.3 Experiment III: MLP with Word2Vec In this case, we again use the Word2Vec model provided by Gensim. T The embedding for title and description is concatenated with the metadata features of the video and is fed to an MLP for classification. The batch size is 10 for 40 epochs. The activation functions used are ReLU and sigmoid. Figure 11 in the appendix provides the overall architecture of the model. Note that we use two input embedding layers for textual data (namely, title and description), which are then concatenated together. After this step, the output from the dense layer is flattened and concatenated with the input for the metadata features. Finally, a fully connected layer is used for classification. #### 3.5.4 Experiment IV: MLP with DropOut, Batch Normalization, and Word2Vec This experiment is an optimization of the previous experiment. In this model, additional dense layers, along with batch normalization and dropout rate of 0.5, are employed. We have used parametric rectified linear units (PReLU) as the activation function. The batch size is again 10 for 40 epochs. Figure 12 in the appendix illustrates the overall architecture of the model. In this model, the output from the embedding layers for the textual data is concatenated, followed by a fully connected dense layer, batch normalization, and activation. This output is finally flattened and concatenated with the metadata features. #### 3.5.5 Experiment V: MLP with BERT In this experiment, we have used BERT embedding for title and description of the video. The advantage of using BERT as an embedding model is that it provides context-based representation for each word in a sentence. In contrast, Word2Vec provides representations which are fixed irrespective of where the word is used in the sentence. The pretrained model of BERT that is used in this experiment has 12 layers, 110M parameters, and 768 hidden layers. The BERT tokenizer is used to split the words into tokens and attention masks are used for padding. The mask value of one is for tokens that are not masked, while the value zero means that the token is added by padding and should not be considered for attention. The model uses Adam optimizer, and the batch size is 10 for 5 epochs, and we have used sequence of length 180 for this experiment. Figure 13 in the appendix shows the model architecture. Note that the output of the BERT embedding layer is followed by a dense layer, which is then concatenated with the metadata features. After this, a dropout layer followed by a fully connected layer is used for classifying the data. #### 3.5.6 Experiment VI: MLP with DistilBERT DistilBERT is a faster, lighter model that is a variant of BERT—it runs 60% faster and has 45% fewer parameters than BERT [6]. For this experiment, we have used a pretrained DistilBERT model. The embeddings for tile and description are fed into a MLP and, later, concatenated with the metadata features of the video and the YouTube channel. The model uses Adam optimizer and the batch size is 10 for 5 epochs. Figure 14 in the appendix gives details on this model architecture. Note that in this model, the input from the metadata features is concatenated. Of course, the output layer is a dense layer that is used for classification. ## 4 Results Recall that in experiment I, we have use logistic regression with Word2Vec embeddings for the features title and description, along with the metadata features. In this case, we achieve an accuracy of 52% with just title as input, and an accuracy of 70% with all of these features. This model is fast to train and much simple to implement. Figure 7 shows the ROC curve for this logistic regression model. Figure 7: ROC curve for logistic regression Experiment II involves using a random forest classifier based on the title, description, likes count, dislikes count, comments count, and subscriptions count. We used Word2Vec embeddings for title and description. We trained this model in multiple sets of inputs. The first set of inputs includes just the title and metadata features. The last set of inputs included all the features. Not surprisingly, we find that the accuracy improves as more features are added. Table 3 shows precision and accuracy of 80.1% for the model with the first set of input features, that is, title and two metadata features for likes count and dislikes count. Table 3: Random forest based on title and like/dislike counts Class Precision Recall F-score Support non-clickbait 0.81 0.80 0.81 1275 clickbait 0.80 0.81 0.80 1182 accuracy — — 0.80 2457 macro avg 0.80 0.80 0.80 2457 weighted avg 0.80 0.80 0.80 2457 Table 4 shows the report for this experiment when we use the title and all the metadata as features. The accuracy for this experiment is 92.5%. The report shows the precision and recall of the model in classifying clickbait and non- clickbait videos. The model performs slightly better in classifying non- clickbait videos. Table 4: Random forest based on title and metadata features Class Precision Recall F-score Support non-clickbait 0.93 0.93 0.93 1275 clickbait 0.92 0.92 0.92 1182 accuracy — — 0.93 2457 macro avg 0.93 0.93 0.93 2457 weighted avg 0.93 0.93 0.93 2457 Figure 8 shows the ROC curve for the random forest model where the input features included title, description, and all the metadata features, that is, count, dislikes count, comments count, subscriptions count, and views count. The AUC for this model is 0.95 with an accuracy of 94%. This shows that the model performs well and that adding more features increases the accuracy of the model. Figure 8: ROC curve for random forest In experiment III a simple MLP is used for classification, based on Word2Vec embeddings for title and description that are concatenated with metadata features. In this case, the test accuracy is observed to fluctuate during the training process, but the best average accuracy achieved is better than 91%. Figure 9 (a) shows the accuracy for this experiment over the 30 training epochs. | ---|--- (a) Experiment III | (b) Experiment IV | (c) Experiment V | (d) Experiment VI Figure 9: Accuracy over training epochs for experiments III through VI In experiment IV, a modified MLP is used with batch normalization and PReLU as an activation function. In this case, the accuracy is slightly worse than in experiment III, although the training is more stable, as can be observed in Figure 9 (b). In experiment V, we have used a transfer learning model based on BERT for word embeddings. This experiment with BERT gives an accuracy of 94.5%. In this experiment the length of the input sequence is fixed at 180 characters. Figure 9 (c) shows the plot for accuracy over training epochs for both the train and validation sets. Note that the number of epochs is small due to the extended training time required, as compared to other models considered. In experiment VI, we have used a lighter variant of BERT model for the word embeddings, namely, DistilBERT. The accuracy achieved in this case is around 92%. This model is significantly faster to train than the BERT, although the accuracy obtained with BERT is slightly better than using DistilBERT. Table 5 shows the precision and recall for experiment VI, while Figure 9 (d) shows the training and test accuracy over epochs. Table 5: Results for experiment VI (MLP with DistilBERT) Class Precision Recall F-score Support non-clickbait 0.92 0.95 0.93 884 clickbait 0.93 0.89 0.91 754 accuracy — — 0.92 1638 macro avg 0.92 0.92 0.92 1638 weighted avg 0.92 0.92 0.92 1638 In Figure 10 we summarize the results of our six experiments in terms of accuracy (to two decimal places). Note that in the bar graph in Figure 10, “MLP plus” is used to denote our MLP model that includes dropout and batch normalization. Also, the bars from left-to-right represent experiments I through VI, respectively. Logistic regression (Word2Vec)Random forest (Word2Vec)MLP (Word2Vec)MLP plus (Word2Vec)MLP (BERT)MLP (DistilBERT)$0.00$$0.20$$0.40$$0.60$$0.80$$1.00$$0.70$$0.93$$0.91$$0.88$$0.95$$0.92$Accuracy Figure 10: Accuracy comparison of experiments ## 5 Conclusion and Future Works The goal of this research was to utilize state-of-the-art techniques to classify YouTube videos as clickbait or non-clickbait. A YouTube video has multiple characteristics that can serve as useful features for such classification. We leverage three main types of such features, namely, user profile, video statistics, and textual data. In this research, multiple classification techniques were considered, including logistic regression, random forest, and MLP, and we employed Word2Vec, BERT, and DistilBERT as language models. The best accuracy was achieved using an MLP classifier based on BERT embeddings, but a the more lightweight DistilBERT performed almost as well. We also confirmed that the accuracy of the models could be increased by adding more features. For future work, more features can be included. For instance, the transcript of the video might contain useful information. For example, the “distance” between the transcripts and the title could provide important insight, as the content of clickbait videos often differs significantly from the title. The network structure of the comments and replies, which represents the semantic features and attributes, can also be considered [25]. In this research, we experimented with BERT, Word2Vec, and DistilBERT for word embeddings. For future work, DocToVec embeddings could also be considered. We used random forest classifier, and other ensemble techniques could be considered, including, such as XGBoost. Furthermore, we can also experiment with state-of-the-art attentive language models, such as XLNet, which is supposed to be better than BERT for determining long-term dependencies [29]. ## References * [1] Apoorva Agrawal. Logistic regression simplified. https://medium.com/data-science-group-iitr/logistic-regression-simplified-9b4efe801389, 2017\. * [2] Iftikhar Ahmad, Muhammad Yousaf, Suhail Yousaf, and Muhammad Ovais Ahmad. Fake news detection using machine learning ensemble methods. Complexity, 2020, 2020. * [3] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. https://arxiv.org/abs/1409.0473, 2014. * [4] Abhijnan Chakraborty, Bhargavi Paranjape, Sourya Kakarla, and Niloy Ganguly. Stop clickbait: Detecting and preventing clickbaits in online news media. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pages 9–16, 2016. * [5] Conda. https://docs.conda.io/en/latest/. * [6] Distilbert — transformers 4.5.0.dev0 documentation. https://huggingface.co/transformers/model_doc/distilbert.html. * [7] Manqing Dong, Lina Yao, Xianzhi Wang, Boualem Benatallah, and Chaoran Huang. Similarity-aware deep attentive model for clickbait detection. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 56–69, 2019. * [8] Aviad Elyashar, Jorge Bendahan, and Rami Puzis. Detecting clickbait in online social media: You won’t believe how we did it. https://arxiv.org/abs/1710.06699, 2017. * [9] Franckepeixoto. A simple overview of multilayer perceptron (MLP) deep learning. https://www.analyticsvidhya.com/blog/2020/12/mlp-multilayer-perceptron-simple-overview/, 2020\. * [10] Gensim — python framework for fast vector space modelling. https://pypi.org/project/gensim/. * [11] Maria Glenski, Ellyn Ayton, Dustin Arendt, and Svitlana Volkova. Fishing for clickbaits in social images and texts with linguistically-infused neural network models. https://arxiv.org/abs/1710.06390, 2017. * [12] Alex Graves. Generating sequences with recurrent neural networks. https://arxiv.org/abs/1308.0850, 2013. * [13] Jason Hennessey. 12 surprising examples of clickbait headlines that work. https://www.searchenginejournal.com/12-surprising-examples-of-clickbait-headlines-that-work/362688, 2020\. * [14] Heejung Jwa, Dongsuk Oh, Kinam Park, Jang Mook Kang, and Heuiseok Lim. exBAKE: Automatic fake news detection model based on bidirectional encoder representations from transformers (BERT). Applied Sciences, 9(19), 2019. * [15] Samia Khalid. BERT explained: A complete guide with theory and tutorial. https://towardsml.com/2019/09/17/bert-explained-a-complete-guide-with-theory-and-tutorial/, 2019\. * [16] Srijan Kumar, Robert West, and Jure Leskovec. Disinformation on the Web: Impact, characteristics, and detection of Wikipedia hoaxes. In Proceedings of the 25th International Conference on World Wide Web, pages 591–602, 2016. * [17] Saurabh Mathur. GitHub. https://github.com/saurabhmathur96/clickbait-detector. * [18] Maxime. What is a transformer? https://medium.com/inside-machine-learning/what-is-a-transformer-d07dd1fbec04, 2020\. * [19] Priyank Palod, Ayush Patwari, Sudhanshu Bahety, Saurabh Bagchi, and Pawan Goyal. Misleading metadata detection on YouTube. In European Conference on Information Retrieval, pages 140–147, 2019. * [20] Martin Potthast, Tim Gollub, Matthias Hagen, and Benno Stein. The clickbait challenge 2017: Towards a regression model for clickbait strength. https://arxiv.org/abs/1812.10847. * [21] Praboda Chathurangani Rajapaksha and Rajapaksha Waththe Vidanelage. Clickbait detection using multimodel fusion and transfer learning. https://tel.archives-ouvertes.fr/tel-03139880/document, 2020. * [22] KV Sankar Reddy, K Sai Nihith, M Sasank Chowdary, and TR Krishna Prasad. An efficient word embedded click-bait classification of YouTube titles using SVM. In Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, pages 175–184, 2019. * [23] Moiz Saifee. Recent advancements in NLP (1/2). https://medium.com/swlh/recent-advancements-in-nlp-1-2-192ac7eefe3c, 2019\. * [24] Amrith Rajagopal Setlur. Semi-supervised confidence network aided gated attention based recurrent neural network for clickbait detection. https://arxiv.org/abs/1811.01355, 2018. * [25] Lanyu Shang, Daniel Yue Zhang, Michael Wang, Shuyue Lai, and Dong Wang. Towards reliable online clickbait video detection: A content-agnostic approach. https://arxiv.org/abs/1907.07604, 2019. * [26] Ilya Sutskever, Oriol Vinyals, and Quoc V Le. Sequence to sequence learning with neural networks. https://arxiv.org/abs/1409.3215, 2014. * [27] Eugenio Tacchini, Gabriele Ballarin, Marco L Della Vedova, Stefano Moret, and Luca de Alfaro. Some like it hoax: Automated fake news detection in social networks. https://arxiv.org/abs/1704.07506, 2017. * [28] Aswini Thota, Priyanka Tilak, Simrat Ahluwalia, and Nibrat Lohia. Fake news detection: A deep learning approach. SMU Data Science Review, 1(3):10, 2018. * [29] Phylypo Tum. A survey of the state-of-the-art language models up to early 2020. https://medium.com/@phylypo/a-survey-of-the-state-of-the-art-language-models-up-to-early-2020-aba824302c6, 2020\. * [30] Deepika Varshney and Dinesh Kumar Vishwakarma. A unified approach for detection of clickbait videos on YouTube using cognitive evidences. Applied Intelligence, pages 1–22, 2021. * [31] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. https://arxiv.org/abs/1706.03762, 2017. * [32] Tony Yiu. Towards data science: Understanding random forest. https://towardsdatascience.com/understanding-random-forest-58381e0602d2, 2019\. * [33] Badrus Zaman, Army Justitia, Kretawiweka Nuraga Sani, and Endah Purwanti. An Indonesian hoax news detection system using reader feedback and naïve Bayes algorithm. Cybernetics and Information Technologies, 20(1):82–94, 2020. * [34] Savvas Zannettou, Sotirios Chatzis, Kostantinos Papadamou, and Michael Sirivianos. The good, the bad and the bait: Detecting and characterizing clickbait on YouTube. In IEEE Security and Privacy Workshops, SPW, pages 63–69, 2018\. * [35] Daniel Yue Zhang, Lanyu Shang, Biao Geng, Shuyue Lai, Ke Li, Hongmin Zhu, Md Tanvir Amin, and Dong Wang. Fauxbuster: A content-free fauxtography detector using social media comments. In IEEE International Conference on Big Data, Big Data, pages 891–900, 2018. * [36] Yiwei Zhou. Clickbait detection in tweets using self-attentive network. https://arxiv.org/abs/1710.05364, 2017. ## Appendix: Model Architectures Figure 11: Architecture of model for experiment III Figure 12: Architecture of model for experiment IV Figure 13: Architecture of model for experiment V Figure 14: Architecture of model for experiment VI
arxiv-papers
2021-07-26T12:39:32
2024-09-04T03:07:21.542237
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Ruchira Gothankar, Fabio Di Troia, Mark Stamp", "submitter": "Mark Stamp", "url": "https://arxiv.org/abs/2107.12791" }
2107.12795
# Photoluminescent properties of the carbon-dimer defect in hexagonal boron- nitride: a many-body finite-size cluster approach Michael Winter Institute of Theoretical Phyics, Friedrich-Alexander Universität Erlangen-Nürnberg, Staudtstr. 7/B2, 91058 Erlangen, Germany Univ. Grenoble Alpes, CNRS, Inst NEEL, F-38042 Grenoble, France Manon H. E. Bousquet Université de Nantes, CNRS, CEISAM UMR 6230, F-44000 Nantes, France Denis Jacquemin Université de Nantes, CNRS, CEISAM UMR 6230, F-44000 Nantes, France Ivan Duchemin Univ. Grenoble Alpes, CEA, IRIG-MEM-L_Sim, 38054 Grenoble, France Xavier Blase Univ. Grenoble Alpes, CNRS, Inst NEEL, F-38042 Grenoble, France ###### Abstract We study the carbon dimer defect in a hexagonal boron-nitride monolayer using the $GW$ and Bethe-Salpeter many-body perturbation theories within a finite size cluster approach. While quasiparticle energies converge very slowly with system size due to missing long-range polarization effects, optical excitations converge much faster, with a $1/R^{3}$ scaling law with respect to cluster average radius. We obtain a luminescence zero-phonon energy of 4.36 eV, including significant 0.13 eV zero-point vibrational energy and 0.15 eV reorganization energy contributions. Inter-layer screening decreases further the emission energy by about 0.3 eV. These results bring support to the recent identification of the substitutional carbon dimer as the likely source of the zero-phonon 4.1 eV luminescence line. Finally, the $GW$ quasiparticle energies are extrapolated to the infinite h-BN monolayer limit, leading to a predicted defect HOMO-LUMO photoemission gap of 7.6 eV. Comparison with the optical gap yields a very large excitonic binding energy of 3 eV for the associated localized Frenkel exciton. Ab initio many-body theory; $GW$ formalism; Bethe-Salpeter equation ; defects ; 2D materials ## I Introduction There is by now a large experimental [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16] and theoretical [17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37] literature focusing on better understanding point defects in hexagonal boron-nitride (h-BN), following similar studies on h-BN nanotubes [38]. The very large band gap of the h-BN host ($\simeq$ 6.1 eV experimental value for the bulk system [39]) allows in particular the presence of very deep defect-induced occupied and unoccupied energy levels, yielding optical transitions between defect levels with an energy that can span over the visible and UV domains. Recently, the demonstration that such centers could be responsible for room-temperature single-photon emission sparkled further the interest of the community to better identify the origin of such bright emission lines [9, 10, 12, 14, 15, 16]. As a paradigmatic defect-associated emission line, the so-called zero-phonon 4.1 eV bright photoemission band in the UV range is very widely observed in h-BN systems [1, 2, 3, 4, 5, 6, 10, 13]. This sharp emission line appears at much lower energy than the intense emission at 5.77 eV (215 nm) found in high- purity h-BN samples [40, 39]. Spatially-resolved cathodoluminescence allowed to characterize the localized character of the defect-associated excitons [10], in contrast with the “free” high-purity h-BN excitons that yield a homogeneous emission all over the sample [41]. The evolution of the ultraviolet photoluminescent (PL) spectrum as a function of the h-BN synthesis conditions and reactants led to early identifications of this feature with either carbon-related defects [1, 2, 5] or nitrogen vacancies [6]. Very recently, a periodic-boundary constrained density functional theory (DFT) calculation suggested the carbon dimer defect as the likely source of emission, with a calculated zero-phonon emission line value of 4.3 eV [32]. At the theoretical level, the electronic properties of defects in periodic semiconductors or insulators are commonly explored using periodic boundary conditions (PBC) with large supercells designed to minimize defect interactions between neighboring cells [42, 43]. While standard density functional theory (DFT) calculations can be efficiently used for neutral defects, charged centers require to carefully cancel the long range Coulomb interaction between cells [42, 43, 44, 45, 46, 47]. However, even in the case of neutral defects, the study of their electronic properties using accurate many-body approaches, such as the $GW$ [48] and Bethe-Salpeter [49, 50] formalisms, run into similar difficulties. In particular, the $GW$ formalism properly accounts for the effects associated with the addition or removal of a charge in the system during a photo-emission experiment used to measure electronic energy levels. As such, Coulomb interactions between localized “charged” excitations repeated periodically must also be canceled carefully. This was clearly illustrated in a $GW$ study of h-BN, showing that the photoemission gap converges very slowly to the monolayer limit as a function of interlayer spacing [51]. Due to computational cost, the study of defects in extended systems is still in its infancy at the $GW$ and Bethe-Salpeter levels [52, 18, 47, 21], and examples of the monitoring of the evolution of a localized defect electronic properties as a function of unit cell size, or using a proper scheme to truncate long-range Coulomb effects, remain very scarce [21]. In the present work, we explore the electronic and optical properties associated with the neutral carbon-dimer defect in h-BN using many-body Green’s function perturbation theory (MBPT) in a finite size cluster approach. Namely, we use the $GW$ [48, 53, 54, 55, 56, 57, 58, 59] and Bethe-Salpeter equation (BSE) [49, 50, 60, 61, 62, 63, 57, 58, 64] formalisms to calculate the in-gap quasiparticle energies and lowest optical excitations associated with the carbon-dimer defect in h-BN flakes [1, 4, 5, 6, 11, 32]. We find that the vertical BSE excitation energies, together with the excited-state reorganization energy and zero-point-vibrational energy (ZPVE), converge relatively fast with system size, leading to a zero-phonon line emission energy $(E_{ZPL})$ of 4.36 eV in monolayer h-BN. A very similar value is obtained using TD-DFT with an adequate hybrid exchange-correlations functional. This is in good agreement with the 4.31 eV value stemming from a recent theoretical study using an elegant periodic-boundary-conditions constrained-DFT [32], but not including ZPVE correction calculated here to be of the order of 0.13 eV. We further demonstrate that multilayer packing may lower the defect absorption and emission energies by a few tenths of an eV, bringing theoretical calculations in closer agreement with the 4.1 eV experimental value [1, 4, 5, 6, 11]. Finally, extrapolating quasiparticle $GW$ data to the infinite monolayer size limit, we predict the HOMO-LUMO gap associated with the defect to be of the order of 7.6 eV, yielding by comparison with the optical gap a large excitonic binding energy of about 3 eV in relation with the very localized nature of the defect-associated excitation. ## II Formalisms and Technical details The DFT calculations used to generate the needed Kohn-Sham (KS) orbitals that enter the construction of the $GW$ and Bethe-Salpeter Hamiltonians are performed with the ORCA code [65] with which we also perform our TD-DFT calculations. Concerning the many-body Green’s functions perturbation theories, the $GW$ calculations are performed with the BeDeft (Beyond-DFT) code [66, 67] that is an ongoing rewriting and extension of the Fiesta code [68, 69, 70, 71] that we use for Bethe-Salpeter (BSE) calculations. In a nutshell, the $GW$ self-energy operator, that accounts for exchange and correlation effects, is first built from input Kohn-Sham $\\{\varepsilon_{n}^{\mathrm{KS}},\phi_{n}^{\mathrm{KS}}\\}$ one-body eigenstates, with : $\displaystyle G({\bf r},{\bf r}^{\prime};\omega)$ $\displaystyle=\sum_{n}\frac{\phi_{n}^{\mathrm{KS}}({\bf r})\phi_{n}^{\mathrm{KS}}({\bf r}^{\prime})}{\omega-\varepsilon_{n}^{\mathrm{KS}}+i\eta\times\text{sgn}(\varepsilon_{n}^{\mathrm{KS}}-\mu)}$ $\displaystyle\chi_{0}({\bf r},{\bf r}^{\prime};i\omega)$ $\displaystyle=2\sum_{ja}\frac{{\left(\phi_{j}^{\mathrm{KS}}({\bf r})\right)}^{*}\phi_{a}^{\mathrm{KS}}({\bf r}){\left(\phi_{a}^{\mathrm{KS}}({\bf r}^{\prime})\right)}^{*}\phi_{j}^{\mathrm{KS}}({\bf r}^{\prime})}{i\omega-(\varepsilon_{a}^{\mathrm{KS}}-\varepsilon_{i}^{\mathrm{KS}})}+c.c.$ where $G$ is the time-ordered Green’s function and $\chi_{0}$ the independent- electron susceptibility used to build, within the random phase approximation, the screened Coulomb potential $W=v+v\chi_{0}W$ with $v$ the bare Coulomb potential. In the preceding equations, $\eta$ is a positive infinitesimal and $\mu$ the chemical potential. Following quantum chemistry notations, (j/a) index occupied/empty energy levels. The $GW$ exchange correlation self-energy operator reads: $\displaystyle\Sigma^{GW}({\bf r},{\bf r}^{\prime};E)=\frac{i}{2\pi}\int d\omega\;e^{i\eta\omega}G({\bf r},{\bf r}^{\prime};E+\omega)W({\bf r},{\bf r}^{\prime};\omega)$ where $W$ is obtained along the real axis by an analytic continuation (AC) from the $W(i\omega)$ calculated at $n_{\omega}$=14 optimized frequencies along the imaginary axis following a recently improved AC scheme [72, 66, 67]. The knowledge of $\Sigma^{GW}$ allows to obtained $GW$ quasiparticle energies: $\displaystyle\varepsilon_{n}^{GW}=\varepsilon_{n}^{\mathrm{KS}}+\left\langle\phi_{n}^{\mathrm{KS}}\left|\Sigma^{GW}\left(\varepsilon_{n}^{GW}\right)-V_{\mathrm{XC}}^{\mathrm{DFT}}\right|\phi_{n}^{\mathrm{KS}}\right\rangle$ We explicitly correct 50 occupied and 50 unoccupied states around the gap, states at lower/higher energy being corrected following the correction of the lowest/highest explicitly corrected level. Following extensive benchmarks on finite size systems [68, 73, 70], we adopt for accuracy an eigenvalue self-consistent scheme (labeled ev$GW$) where the corrected quasiparticle energies are reinjected self-consistently in place of the input KS energy levels to calculate $G$ and $\chi_{0}$. Besides accuracy, such a self-consistent scheme allows to significantly reduce the impact of the arbitrariness associated with the choice of the DFT $V_{\mathrm{XC}}^{\mathrm{DFT}}$ functional used to generate the input $\\{\varepsilon_{n}^{\mathrm{KS}},\phi_{n}^{\mathrm{KS}}\\}$ eigenstates. Following again recent benchmarks [68, 73, 70], we select the global hybrid PBE0 functional for this initial step [74]. Finally, Coulomb integrals are expressed using Coulomb-fitting resolution-of-the-identity techniques [75, 76, 77] with standard auxiliary basis sets [78] designed for the well-established cc-pVTZ [79] and augmented _aug_ -cc-pVTZ basis sets used below, or the auxiliary universal Weigend Coulomb fitting basis set [80] in conjunction with the smaller 6-311G(d) triple-zeta plus polarization basis set [81] adopted for exploring large size systems. In the calculation of the susceptibility and self-energy, all unoccupied levels are considered. Once the ev$GW$ quasiparticle energies and screened Coulomb potential are obtained, singlet optical excitation energies $\\{\Omega_{\lambda}\\}$ can be calculated within the Bethe-Salpeter equation (BSE) formalism that expresses the two-body electron-hole excitation eigenstates on the basis of the occupied-to-virtual level transitions: $\displaystyle\psi^{\mathrm{BSE}}_{\lambda}({\bf r}_{\mathrm{e}},{\bf r}_{\mathrm{h}})=\sum_{ia}\left[X_{ia}^{\lambda}\phi_{i}({\bf r}_{\mathrm{h}})\phi_{a}({\bf r}_{\mathrm{e}})+Y_{ia}^{\lambda}\phi_{a}({\bf r}_{\mathrm{h}})\phi_{i}({\bf r}_{\mathrm{e}})\right]$ where the $Y_{ia}^{\lambda}$ components indicate that we go beyond the Tamm- Dancoff approximation. These eigenstates solve a Casida-like [82] equation : $\begin{pmatrix}R&C\\\ -C^{*}&-R^{*}\end{pmatrix}\begin{pmatrix}X^{\lambda}\\\ Y^{\lambda}\end{pmatrix}=\Omega_{\lambda}\begin{pmatrix}X^{\lambda}\\\ Y^{\lambda}\end{pmatrix},$ (1) where the leading resonant block reads: $R_{ia,jb}=\left(\varepsilon_{a}^{GW}-\varepsilon_{i}^{GW}\right)\delta_{ij}\delta_{ab}+\kappa V_{ia,jb}^{\mathrm{x}}-W_{ij,ab}^{\mathrm{d}}$ (2) with $\kappa$=2 or 0 for singlet or triplet excitations, and : $\displaystyle V_{ia,jb}^{\mathrm{x}}=(ia|jb)=\int\mathrm{d}{\bf r}\mathrm{d}{\bf r}^{\prime}\;\phi_{i}({\bf r})\phi_{a}({\bf r})v({\bf r},{\bf r}^{\prime})\phi_{i}({\bf r}^{\prime})\phi_{b}({\bf r}^{\prime})$ $\displaystyle W_{ij,ab}^{\mathrm{d}}=\int\mathrm{d}{\bf r}\mathrm{d}{\bf r}^{\prime}\;\phi_{i}({\bf r})\phi_{j}({\bf r})W({\bf r},{\bf r}^{\prime};\omega=0)\phi_{a}({\bf r}^{\prime})\phi_{b}({\bf r}^{\prime})$ Good convergence can be obtained by including all occupied-to-virtual transitions such that $\left(\varepsilon_{a}^{GW}-\varepsilon_{i}^{GW}\right)\leq E_{\mathrm{cut}}$ with $E_{\mathrm{cut}}$ = 30 eV (see SM [83] for convergence study). Otherwise stated, this will be the cutoff adopted. Further, the convergence with basis sets size is detailed in the SM [83] evidencing the slower convergence of the BSE data as compared to TD-DFT. For computing the zero-point vibrational energy (ZPVE) associated with the ground and excited states, we take advantage of the analytic DFT and TD-DFT Hessian available in Gaussian 16.A.03 [84]. For these calculations, performed at the PBE0 [74] 6-311G(d) level in gas phase, we optimized the geometries with _tight_ convergence criteria for both the SCF and residual forces, and select the so-called _ultra-fine_ DFT integration grid. The second-order coupled-cluster, CC2 [85], and algebraic diagrammatic construction, ADC(2) [86], calculations used for accuracy validation, are performed with the Turbomole 7.3 code [87], using various Dunning’s basis sets and applying the RI approach with the corresponding auxiliary basis. Default Turbomole parameters and algorithms are applied. The calculations of the vibronic couplings and Huang-Rhys factors was achieved using the FCClasses-3 package [88, 89, 90, 91], on the basis of the vibrational data associated with the ground and excited states as obtained with the Gaussian code. These vibronic calculations, performed in a time-independent (TI) approach, use the Franck- Condon (FC) approximation and account for the so-called Duschinsky effects as well as temperature (298 K), and are based on the most refined adiabatic Hessian (AH) model to determine the vibronic couplings [90]. We used 108 integrals in the TI scheme, allowing a good convergence (FC recovery $>$ 0.9). ## III Systems studied Figure 1: Isocontour representation for the 6-311G(d) PBE0 (a) HOMO and (b) LUMO levels in the C2@BN138 intermediate flake. In (c,d) the hole-averaged electron (orange) and electron-averaged hole (purple) densities, respectively, are given for the lowest singlet BSE excitation. The finite size h-BN flakes with a central C-C dimer in substitution are represented in the Supplemental Material (SM) [83]. One of them, of intermediate size, is shown in Fig. 1. The systems studied comprise from 42 to 240 B,C,N atoms, or 58 to 278 atoms including the H atoms used to avoid dangling bonds at the borders. These systems are labeled C2@BNX where X counts the total number of atoms in the systems. The smallest flake is thus named C2@BN58 and the largest C2@BN278. In such systems, the minimal number of bonds between a central C atom and an edge B/N atom ranges from 4 to 11. The geometries of all systems were optimized at the PBE0/6-311G(d) level [74]. The corresponding C-C bond length is found to range between 1.368 Å and 1.369 Å in the smallest and largest flakes, respectively, in close agreement with the 1.361 Å periodic boundary condition PBEh(0.4)+D3 value of Ref. 32, where PBEh(0.4) indicates a global hybrid in the PBE0 family with 40 % of exact exchange (instead of the default 25 %), while the D3 points to the Grimme empirical correction scheme for dispersion energies. For sake of illustration, we plot in Fig. 1(a,b) the PBE0 HOMO and LUMO levels associated with the intermediate size C2@BN138 system. As expected, independently of the system size, the PBE0 KS HOMO and LUMO levels are localized on the C-C carbon dimer. The bonding/anti-bonding character of the HOMO/LUMO along the C-C bond is clearly seen in Fig. 1(a,b). Anticipating on the analysis of the Bethe-Salpeter optical excitation energies, we further plot in Fig. 1(c,d) the hole-averaged $\rho_{\mathrm{e}}({\bf r})$ electron distribution and electron-averaged $\rho_{\mathrm{h}}({\bf r})$ hole distribution, with e.g., $\rho_{\mathrm{e}}({\bf r}_{\mathrm{e}})=\int\mathrm{d}{\bf r}_{\mathrm{h}}\;\left|\psi^{\mathrm{BSE}}_{\lambda=1}({\bf r}_{\mathrm{e}},{\bf r}_{\mathrm{h}})\right|^{2}\,.$ The electron and hole localization allows to recognize that the lowest singlet BSE excitation is mainly of HOMO-LUMO character. The weight $X_{ia}^{\lambda}$ squared of the BSE electron-hole wavefunction on the HOMO-LUMO transition is found to be consistently of the order of 0.94, rather independently of the system size beyond the C2@BN86 system, in close agreement with the 0.96 weight at the TD-PBE0 level. The remaining contributions, even though small, explain the evolution of the BSE excitation energy with respect to the $E_{\mathrm{cut}}$ parameter (see SM [83]). While the two C atoms are non- equivalent, being bonded either to B or N atoms with different electronegativities, there is no sign of significant charge-transfer character for the HOMO-LUMO transition, as confirmed below by the large value of the oscillator strength. ## IV Benchmark of methods We first benchmark the accuracy of the present BSE/ev$GW$ scheme, together with that of standard TD-DFT calculations using various exchange-correlation functionals, for the present carbon substituted h-BN flakes. The study of finite size systems allows in particular to use accurate quantum chemistry wavefunction based methods, such as coupled-cluster (CC) or algebraic diagrammatic techniques (ADC). A similar comparison between mean-field DFT/TD- DFT approaches and wavefunction based methods on finite size systems was already proposed in the case of a few defects in a cluster geometry [26, 31, 35]. Significantly more expensive than BSE and TD-DFT calculations, calculations with the second-order wavefunction approaches, CC2 and ADC(2), with a large converged basis set (_aug_ -cc-pVTZ) are only possible for the smallest C2@BN58 system. Even though limited in size, this small system presents already well defined defect states, with a lowest singlet excitation energy within no more than 0.10–0.15 eV of its limit value obtained in larger flakes (see below). While very accurate “theoretical best estimates" (TBE), such as those obtained from third order CC3 calculations [92, 93], cannot be obtained for the present systems, CC2 and ADC(2) calculations have been shown, thanks to very large benchmarks on molecular families, to present mean absolute errors of the order of 0.10 eV to 0.15 eV as compared to TBE or experimental data for various type of excitations, from localized (Frenkel) to Rydberg or charge-transfer type transitions [94, 73, 95]. In particular, even though an approximation to CCSD, CC2 provides a similar level of accuracy for localized (Frenkel) excitations with a reduced cost scaling [92, 93]. Our data are presented in Table 1. In the converged _aug_ -cc-pVTZ limit, we observe that the Bethe-Salpeter vertical excitation energy relying on self- consistent ev$GW$@PBE0 input quasiparticle energies and screened Coulomb potential, is in close agreement with the CC2 value, even though 0.1 eV larger than its ADC(2) analogue. In other words, BSE falls within the error bar of second-order wavefunction schemes. The present results confirm the accuracy of the BSE/ev$GW$ approach, already demonstrated in large benchmarks on molecular systems [68, 70] . Table 1: Lowest singlet ($S_{1}$) excitation energy for the C2@BN058 system. We compare quantum chemistry wavefunction methods [CC2 and ADC(2)], the many-body BSE/ev$GW$@PBE0 method, and TDDFT with the PBE, PBE0 and PBEh(0.4) functionals at the _aug_ -cc-pVTZ level. Energies are in eV and oscillator strength in parenthesis. CC2 | ADC(2) | BSE/evGW@PBE0 ---|---|--- 4.761 (0.494) | 4.660 (0.468) | 4.765 (0.407) PBE0 | PBE | PBEh(0.4) 4.716 (0.406) | 4.024 (0.119) | 4.966 (0.443) Among the TD-DFT calculations, we further observe that the standard TD-PBE0, with its 25 % ratio of exact exchange, offers an excellent accuracy, standing in between ADC(2) and CC2 data. TD-PBE0 and BSE/ev$GW$ excitation energies fall within 50 meV of each other, while their oscillator strengths are also in excellent agreement. Such values are also in good agreement with the 4.78 eV CAM-B3LYP energy of Ref. [31] obtained with a minimally augmented cc-pVDZ basis for a cluster equivalent in size to our C2@BN138 system. In contrast, TD-PBE calculations yield an excitation energy that is significantly too small, together with an oscillator strength that is a factor 4 smaller than that of the CC2 or ADC(2) references. On the contrary, adopting the PBEh(0.4) functional with 40 % of exact exchange yields an excitation energy that is somehow too large. The balanced performance of the PBE0 functional is consistent again with large TD-DFT benchmark on molecular systems, proving that PBE0 is one of the most accurate functional for localized excited states [96]. We adopt thus the BSE/ev$GW$ and TD-PBE0 schemes for exploring now the convergence with system size. Further, since analytic forces in the excited states have not been developed at the BSE level, reorganization energy and vibrational-spectrum calculations in the excited state are conducted below at the TD-PBE0 level. ## V Vertical excitation energies We now explore the evolution of the lowest singlet ($S_{1}$) vertical excitation energy with respect to system size. While TD-DFT and BSE data for the smallest C2@BN58 system have been explicitly calculated at the _aug_ -cc- pVTZ level, calculations on the largest flakes have been performed with the 6-311G(d) Pople atomic basis set level, stopping at the C2@BN202 system for BSE calculations. As shown in the SM [83], the evolution with system size of the excitation energy is weakly dependent on the basis size, allowing to safely extrapolate the 6-311G(d) data to their _aug_ -cc-pVTZ value. Further, the small evolution of these energies beyond the C2@BN86 system insures that errors in the extrapolation are very limited. Figure 2: Evolution of the lowest vertical singlet ($S_{1}$) excitation energy (in eV) with respect to the number of non-H atoms ($N_{\mathrm{at}}$). TD-PBE0 (orange) and BSE (blue) data are presented. Plotted values have been extrapolated to the _aug_ -cc-pVTZ level (see text and the SM [83]). The largest flakes data points (out of the shaded area) are fitted by an asymptotic $\;f(x)=a\cdot x^{3}+c\;$ functional with $x=1/\sqrt{N_{\mathrm{at}}}$ where $N_{\mathrm{at}}\sim{R^{2}}$ with $R$ the flake average radius. The infinite radius extrapolated energy value is indicated in the Inset. As shown in Fig. 2, both the TD-PBE0 and BSE vertical excitation energies decrease with system size, converging relatively fast, with the C2@BN138 system being within $\sim$20 meV of the extrapolated infinite size limit. The decay rate within the TD-PBE0 and BSE formalisms are similar. Several effects can be invoked to understand the reduction of the excitation energy with system size. A first possible explanation could hinge on the confinement of the defect states, resulting in an increase of the HOMO-LUMO gap in the small size limit. The analysis of the KS HOMO and LUMO levels indicates a 75 meV reduction of the gap between the C2@BN58 and C2@BN278 systems. Even though not directly related to the optical gap, this reduction of the Kohn-Sham gap, that fully accounts for confinement effects, can contribute to the $\sim$0.11 eV decrease of the optical gap with system size. Confinement is expected to yield an evolution of the band gap that scales as $1/R^{2}$ where $R$ is the flake radius. Figure 3: Size evolution with respect to the smallest C2@BN58 system of the ev$GW$ HOMO-LUMO gap (blue), the lowest vertical singlet ($S_{1}$) excitation energy (orange), the $\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$ (green) and $\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$ (red) matrix elements. Calculations performed with the 6-311G(d) atomic basis set. Energies are in eV. Another source of reduction of the optical gap with system size is the polarization energy, or the increase of environmental screening upon increase of the system size. It is interesting to analyze in this respect the evolution with size of the various contributions to the BSE absorption energy, including in particular the ev$GW$ HOMO-LUMO gap together with the expectation values $\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$ and $\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$ of the bare and screened Coulomb potentials over the $S_{1}$ BSE eigenstate (see Eqn. 2). As shown in Fig. 3, the drop of the ev$GW$ gap is much larger than the 75 meV calculated at the KS level. The $GW$ formalism properly mimics a photoemission experiment that measures charging energies. Upon charging the defect levels, the generated Coulomb field strongly polarizes the surrounding medium. The environment charge rearrangement generates a reaction field that stabilizes the added charge. This effect, that closes the gap, is a strong long range polarization effect that slowly converges with system size. The much faster convergence of the BSE excitation energy can be explained by the evolution of the screened electron-hole $\langle\psi^{\mathrm{BSE}}_{1}|W^{\mathrm{d}}|\psi^{\mathrm{BSE}}_{1}\rangle$ term that decays with system size similarly as the ev$GW$ energy levels, compensating largely the drop in the gap. In other words, the evolution of the screened Coulomb potential with respect to the size of the polarizable environment affects in a similar fashion both the electron-electron (exchange- correlation) interaction that enters the ev$GW$ gap, and the electron-hole interaction that is subtracted in the BSE Hamiltonian. The unscreened bare electron $\langle\psi^{\mathrm{BSE}}_{1}|2V^{\mathrm{x}}|\psi^{\mathrm{BSE}}_{1}\rangle$ contribution varies much less dramatically with system size, confirming that it is the change in long-range screening that determines the evolution of the ev$GW$ gap and the counterbalancing electron-hole interaction. Overall, the optical excitation is a neutral excitation that polarizes the environment much more weakly as compared to charged excitations. To analyze more precisely the scaling properties of the optical excitation energy, we briefly recall the so-called linear-response (LR) and state- specific (SS) contributions to the energy shift induced by a polarizable environment on a localized excitation [97, 71, 98]. The localized excitation is here the dimer-defect excitation and the polarizable environment is the h-BN host. Assuming for simplicity a pure HOMO-LUMO transition, the LR contribution to the shift of the absorption energy induced by the environment reads $\langle\rho_{\mathrm{HL}}|v^{\mathrm{reac}}|\rho_{\mathrm{HL}}\rangle$, with $\left|\rho_{\mathrm{HL}}\right\rangle=\left|\phi_{\mathrm{H}}\phi_{\mathrm{L}}\right\rangle$ the product of the HOMO and LUMO one-body orbitals. The reaction field $v^{\mathrm{reac}}({\bf r},{\bf r}^{\prime})$ describes the potential generated in ${\bf r}^{\prime}$ by the variation of charge induced in the environment by a point charge added in ${\bf r}$. In the LR contribution, the environment reacts to the $\rho_{HL}$ transition codensity, and the LR effect is closely related to the magnitude of the oscillator strength. In the SS contribution, the energy shift reads $\langle\Delta\rho_{\mathrm{ES}}|v^{\mathrm{reac}}|\Delta\rho_{\mathrm{ES}}\rangle/2$, with $\Delta\rho_{\mathrm{ES}}$ the variation of the total charge density between the ground-state and the excited state, i.e., the SS contribution is large when the density reorganization is large, such as in CT excitations. Both contributions scale as the reaction field that we now show to vary as $1/R^{3}$ with $R$ the radius of the flake as expected in 2D systems. Both the $\rho_{\mathrm{HL}}$ and $\Delta\rho_{\mathrm{ES}}$ density variations have no monopolar component. However, the rather large oscillator strength associated with the transition indicates a large $\rho_{\mathrm{HL}}$ dipolar component. The $1/r^{3}$ electric field associated with these dipolar components induces dipoles proportional to $\alpha_{\mathrm{at}}/r^{3}$ on B/N atoms located at a distance $r$ of the defect, where $\alpha_{\mathrm{at}}$ is some effective average atomic polarizability. Each induced dipole generates a reaction potential that stabilizes the defect excited-state dipole. Integrating over the reaction field generated by all B/N atoms in the flake leads indeed to an overall reaction potential that scales as $1/R^{3}$, with $R\simeq\sqrt{N_{\mathrm{at}}}$, taking $N_{\mathrm{at}}$ to be the number of B/C/N atoms. Fitting with such a functional form the TD-PBE0 data for the 3 largest flakes (Fig. 2, dashed blue line) leads to a fit that smoothly goes close to the 2 smallest systems for which such an asymptotic behavior may be less accurate, accounting in particular for the $1/R^{2}$ behavior associated with confinement. Fitting the 2 largest systems for the BSE data leads to a fit somehow less satisfactory in the small size limit (Fig. 2, dashed orange line). We must note that such an asymptotic behavior relies on the assumption that the defect excitation $\rho_{\mathrm{HL}}$ and $\Delta\rho_{\mathrm{ES}}$ charge variations do not change with system size, a condition that may not be fully validated in the small size limit. Overall, the large system size extrapolated TD-PBE0 vertical $S_{1}$ excitation energy is found to be 4.61 eV, within 5 meV of the value obtained for the largest C2@BN278 system. Similarly, the infinite-system size extrapolated BSE value of 4.64 eV lies within 10 mev of the value obtained for the C2@BN202 system. We adopt in the following these extrapolated values. The present results confirm the conclusions of Ref. 35 that optical excitations converge rather fast with cluster size. ## VI Reorganization energies and ZPVE corrections As a next step, we explore the convergence with system size of the reorganization energies in the ground and excited states, namely the differences $\;\lambda^{GS}=E_{\mathrm{GS}}[R_{\mathrm{ES}}]-E_{\mathrm{GS}}[R_{\mathrm{GS}}]\;$ and $\;\lambda^{ES}=E_{\mathrm{ES}}[R_{\mathrm{GS}}]-E_{\mathrm{ES}}[R_{\mathrm{ES}}]\;$ where $R_{\mathrm{GS}}$ and $R_{\mathrm{ES}}$ indicate the $S_{0}$ and $S_{1}$ geometries, respectively. Analytic forces in the ground and excited states are not available within the BSE formalism so that we use TD-PBE0 for this exploration. As shown in Fig. 4, the reorganization energies slightly decrease with system size with variations that are of the same magnitude as those evidenced above for the vertical excitation energy. While an elastic theory analysis of the deformation energy induced by a point defect in 2D finite-size systems is beyond the present study, we find that the ground-state reorganization energy can be accurately fitted by a $1/N_{\mathrm{at}}^{2}$ or $1/R$ law, where $N_{\mathrm{at}}$ in the number of atoms and $R$ the effective radius of the flake. We extrapolate the ground-state reorganization energy to 0.164 eV. For the ES, the reorganization energy is found to be somehow smaller with a decay law that seems to rely on a larger exponent. Whatever the reliability of the fit, the extrapolated value and the one explicitly calculated for the largest C2@BN202 system are within a very few meV from each other, indicating again that any extrapolation inaccuracy can hardly affect the conclusions. We adopt the values of 0.16 eV and 0.15 eV for the reorganization energy in the ground and excited state, respectively. The smaller value of the reorganization energy in the excited state can be associated with smaller vibrational energies as compared to the ground state. This is what we now explore by considering the zero-point vibrational energy (ZPVE). Figure 4: Evolution of the ground and excited state reorganization energy (in eV) at the TD-PBE0/6-311G(d) level. The solid lines are a 1/$N_{\mathrm{at}}^{2}$ fit to the data points. The dashed lines are a "free" exponent 1/$N_{\mathrm{at}}^{\alpha}$ with $\alpha\simeq 2.08$ for the ground- state and $\alpha\simeq 3.71$ for the excited-state. Free fit infinite size extrapolated values amount to 0.164 eV for the ground-state and 0.150 eV for the excited-state, respectively. To further account for the ZPVE correction, we perform calculations of the vibrational spectrum in the ground-state at the ground-state geometry, and in the $S_{1}$ excited state at the excited-state geometry. The difference in ZPVE between the excited and ground states amounts to 0.147 eV for the smallest C2@BN58 system and 0.131 eV in the larger C2@BN86 system. As expected [99, 100], the vibrational modes in the excited states are “softer”, consistent with the antibonding character of the LUMO level (see Fig. 1b). Such vibrational energy differences are rather large yet not exceptional [99, 100]. This is likely related to a significant tensile stress for the C-C bond embedded in the h-BN lattice with larger bond length, a constraint that is essentially released upon populating an antibonding state. In fact, the C-C bond length changes from 1.37 Å to 1.45 Å at the $S_{1}$ excited state geometry $R_{\mathrm{ES}}$, a bond length that can be compared to 1.44 Å, the PBE0/6-311G(d) B-N bond length at the center of an undoped pristine h-BN flake. In the excited state, the C-C bond length is thus much closer to that of the host network, confirming the release of the tensile stress. Assuming that the ZPVE correction will further decrease slightly in the limit of larger systems, we adopt in the following the value of 0.13 eV. Finally, taking the 4.64 eV calculated BSE vertical absorption energy, subtracting the 0.15 eV reorganization energy in the $S_{1}$ excited state and the ZPVE difference contribution of 0.13 eV, we obtain a zero-phonon-line (ZPL) energy of about 4.36 eV (see summary in Fig. 5). This is close to the 4.31 eV value found in Ref. 32 using constrained DFT calculations in a PBC geometry, even though this previous value does not contain the ZPVE contribution. ## VII Huang-Rhys and Debye-Waller factors Figure 5: Symbolic representation of the lowest singlet vertical and zero- phonon transitions, with the reorganization energy in the ground ($\lambda^{\mathrm{GS}}$) and excited ($\lambda^{\mathrm{ES}}$) states, ZPVE contribution and Huang-Rhys factor $S$. We now discuss the Huang-Rhys and Debye-Waller factors as an additional mean to connect to experimental data [13]. Closely related to the reorganization energy from the ground-state to the excited-state geometry, the Huang-Rhys (HR) factor is a measure of the strength of coupling between the excitation and the vibrational modes. In our case, we computed the HR factors for all vibrational modes using the adiabatic Hessian vibronic model relying on the (TD-)PBE0/6-311G(d) vibrational data of the two states. The HR factor reported below, $S$, is obtained as the sum of the HR terms determined for all vibrational modes. The $S$ factor associated with the smallest C2@BN58 system is found to be $S=1.37$, decreasing to $S=1.23$ in the case of the C2@BN86 system. This 10 % decrease with system size is consistent with the 10 % decrease of the reorganization energy between these two systems in the excited state (see Fig. 4). The very limited decrease of the reorganization energy at larger sizes indicates that the value obtained for the C2@BN86 system is a very good estimate of the converged $S$ in the large size limit. Our calculated value falls within the 1–2 range of the experimental estimate [13]. The related $W_{ZPL}\approx e^{-S}$ Debye-Waller coefficient is found to be 0.29, in good agreement with the estimated 0.26 experimental value [11]. In the C2@BN58 system, the largest single mode contribution to the total $S$ factor is a clear C-C stretching mode located at 1347 cm-1 (168 meV) in the excited state, that according to the Duschinsky analysis, couples to several ground state mode, the strongest being the alike C-C stretching mode at 1644 cm-1 (204 meV) that was shown in Ref. [31] to stand higher in energy as compared to the optical modes of pristine h-BN. The second and third contributions originate in couplings between low-frequency breathing modes: the excited state modes appearing at 338 cm-1 (42 meV) and 236 cm-1 (29 meV) being respectively coupled to the ground state modes at 254 cm-1 (31 meV) and 242 cm-1 (39 meV). In the C2@BN86 flake, the largest single mode contributions to $S$ are coming from, on the one hand, a breathing mode (272 cm-1 or 33 meV in the excited state), and on the other hand, the excited-state C-C stretching at 1260 cm-1 (156 meV). These modes are represented in the SM [83]. In the computed vibrationally-resolved emission spectrum (see the SM [83]), the strongest “stick” contributions also involve these vibrations. We note that the energy of the stretching and breathing modes can be associated with the 174 meV and 60 meV energy spacing between phonon replica of the 4.08 eV zero- phonon line as observed in the experimental PL spectrum of Ref. 13. ## VIII Multi-layer polarization effects The theoretical $\sim$4.36 eV zero-phonon emission energy calculated for the defected monolayer system remains larger than the 4.08 eV experimental value. However, experimental data were not acquired for defected single-layer h-BN sheet but multilayer systems. As such, environmental screening phenomena are expected to affect the optical transition energies, an effect that may be labeled a solvatochromic shift by analogy with the change in absorption or emission energies for solvated species as compared to the gas phase. Such environmental screening phenomena were already shown in Refs. [28, 33] to stabilize the defect states, namely reducing the HOMO-LUMO photoemission gap. To study this effect in the present case of photoluminescence, we explore again the optical properties of our smallest C2@BN58 system in a bilayer and trilayer geometry. For these model systems, the layers are individually relaxed and then stacked without further relaxation. We adopt the standard AA’ geometry (B atoms on top of N atoms) with a 3.33 Å interlayer spacing [101, 102]. In this geometry, the C-C dimer is located on top of a B-N dimer of neighboring layers. As shown in Fig 6, the defect-associated HOMO and LUMO levels remain strongly localized on the defected layer. Figure 6: Isocontour representation of the defect-associated (a) HOMO and (b) LUMO levels in a C2@BN58 trilayer system with the defect localized in the inner layer. The stacking is of AA’ type and the interlayer spacing has been set to 3.33 Å. In c) and d), the hole-averaged electron density and electron- averaged hole density for the lowest defect-associated BSE singlet excitation are represented. The most salient feature is that the defect-associated BSE absorption energy is red-shifted by 0.17 eV and 0.27 eV from the monolayer to the bi- and trilayer systems, respectively, taking the central layer in its ground-state geometry. The very same 0.27 eV redshift is found for the $S_{1}$ energy of a trilayer system taking the central layer in its $S_{1}$ excited state geometry. As such, the effect on the excitation energy of the neighboring layers seems rather independent of the central layer geometry, suggesting that the reorganization energy and ZPVE contributions calculated for the defected monolayer remain good estimates in the multilayer case. To better analyze this evolution, we selected the central monolayer in its ground-state geometry and found that between the monolayer and the trilayer systems, the KS gap closes by 0.17 eV while the $GW$ gap closes by 0.78 eV. As such, direct hybridization between layers is not negligible, but is marginal as compared to polarization effects, namely long-range screening by adjacent layers. This confirms the stabilization of the defect states, namely the reduction of the ionization potential and increase of the electronic affinity, induced by environmental screening. The same effect was studied in the case of h-BN layers on a substrate [33]. Again, interlayer screening reduces as well the electron-hole interaction, leading to a reduction of the optical excitation that is significantly smaller than that of the (photoemission) gap. This remains however a non-negligible effect when attempting to corroborate theoretical with experimental data, a message that applies to the present carbon-dimer defect but certainly to any other defects. We can speculate that most of the screening effects, inducing a redshift of the optical lines as compared to the defected monolayer system, originates from the screening by a very few neighbouring layers, tentatively explaining why experiments performed on bulk or few-layers h-BN provide a very stable ZPL emission line at about 4.1 eV. Studying the evolution of the emission line with respect to the number of layers would be prohibitively expensive and lies beyond the scope of the present study. The main message however is that calculations of absorption or luminescence energies on monolayer systems should overestimate the experimental values by a few tenths of an eV. We adopt the plausible value of 0.3 eV, namely slightly larger than the 0.27 eV value explicitly calculated for the trilayer system. Reducing the calculated 4.36 eV ZPL energy for the monolayer system by a redshift of the order of 0.3 eV brings that calculated value to close agreement with the 4.08 eV experimental line. Such a close agreement is certainly fortuitous given the $\simeq$0.1 eV difference on the vertical absorption energies between high-level methods [BSE, CC2, ADC(2)], the rough estimate of the neighboring layers screening effect (rounded to 0.3 eV) and the extrapolations needed to reach the infinite system size and complete basis set limits. However, the present estimate certainly comforts the carbon-dimer defect as the origin of this emission line as proposed by the authors of Ref. 32. ## IX Photoemission gap and excitonic binding energy We close this study by a brief discussion of the dopant-associated HOMO-LUMO gap as obtained within the ev$GW$ formalism and the resulting excitonic binding energy obtained from subtracting the optical gap. Since no experimental data are available for these quantities, the resulting values will stand as predictions. More details are available in the SM [83]. Starting with the smallest C2@BN58 system, our most converged _aug_ -cc-pVTZ ev$GW$ value yields 8.28 eV which is very close to the extrapolated 8.3 eV to 8.4 eV values in the complete basis set (CBS) limit. Adapting the discussion provided above for the scaling laws associated with long-range polarization effects, but treating here the response to charged (photoemission) excitations, the evolution with size of the gap scales as 1/$R^{2}$ (see e.g. Ref. 103 in the case of molecular 2D systems). Fitting our $GW$ data points with such a functional form, the extrapolated gap in the infinite system size limit is found to close by 0.77 eV as compared to the smallest C2@BN58 system, leading to $\simeq$7.6 eV for the carbon dimer defect HOMO-LUMO gap in an infinite h-BN monolayer. Subtracting the 4.64 eV vertical optical absorption energy, one obtains a very large $\simeq$3 eV electron-hole binding energy. This is much larger than the estimated 0.7-0.8 eV [104, 105, 106] and 1.9 eV - 2.1 eV [51, 107, 108, 104] excitonic binding energy for layered and single- sheet undefected h-BN systems. The clear localization of the Frenkel electron- hole pair on the defect, as shown in Fig. 1(c,d), can certainly explain such a large increase of the excitonic binding energy. Finally, the knowledge of the defect $GW$ ionization potential and electronic affinity allows estimating the defect charge transition levels (CTLs) as an indication of the chemical potential energy range where the neutral defect is more stable than the charged ones (see e.g. Refs. [23, 34]). Exploiting the fast convergence with system size of structural reorganization energies, we estimate from the large C2@BN138 system the reorganization energy from the neutral to the cationic state geometry to be 0.35 eV [PBE0 6-311G(d) value]. Further, in the infinite size limit (see SM [83], Section VIII), we find the position of the occupied defect level to be $\simeq$0.64 eV above the monolayer h-BN occupied band edge. These data bring the (+1/0) CTL at about 1.0 eV above the h-BN top of the valence band, in close agreement with the DFT calculations of Ref. [32]. Further, with a reorganization energy to the anionic geometry of 0.25 eV and a defect HOMO-LUMO gap of 7.6 eV, we find the (0/-1) CTL to lie at about 8.0 eV above the valence band edge. These calculations confirm the outcomes of Ref. [32] that for the isolated defected monolayer, the neutral state should be the most stable for a chemical potential located throughout most of the gap. We will not explore here the effect of multilayer screening on the CTL positions [34]. ## X Conclusion We have studied the optoelectronic properties of the recently proposed carbon- dimer defect in hexagonal boron-nitride using the $GW$ and Bethe-Salpeter equation many-body Green’s function formalisms in a finite size cluster (flake) approach. More precisely, we calculate vertical excitation energies within the BSE formalism, while relaxation in the excited state and zero-point vibrational energies (ZPVE) are calculated at the TD-PBE0 level. Comparison with wavefunction CC2 and ADC(2) calculations on a small C2@BN58 atoms system validated the accuracy of both the BSE formalism and of the TD-PBE0 approach in the family of TD-DFT techniques. The study of all relevant quantities with respect to system size allows to find that the vertical optical absorption energy, the reorganization energy, and the ZPVE contributions, converge rather quickly with system size, being close to their extrapolated value for systems containing between 100 and 200 B/C/N atoms. As a result, we find a BSE ZPL emission energy of 4.36 eV for the defected monolayer, accounting for a 0.15 eV reorganization energy in the excited state and a significant 0.13 eV ZPVE reduction from the ground to the excited state. We show further that additional screening associated with neighboring layers reduce the defect emission energy, with a 0.27 eV redshift in the simple case of a model trilayer system, bringing the calculated ZPL energy in close agreement with the 4.08 eV experimental value. Further, the S$\simeq$1.37 Huang-Rhys and $W_{ZPL}\simeq$0.25 Debye-Waller coefficients are found to be in excellent agreement with experimental estimates. The present results thus confirm the identification proposed in Ref. 32 that the carbon- dimer defect is at the origin of the 4.08 eV ZPL luminescence line. On a more general ground, the present study suggests that many-body Bethe-Salpeter calculations, performed on finite size systems containing a unique defect, stand as a valuable alternative to periodic boundary approaches for the study of the optical properties of defects in the dilute limit. In contrast to the neutral optical excitations, the $GW$ quasiparticle energies (HOMO, LUMO, etc.), namely charged excitations, converge very slowly with system size. Extrapolation of quasiparticle energies to the infinite size limit can however be safely obtained with a 1/$R^{2}$ law, with $R$ the radius of the 2D flake containing the defect. This stems from a simple polarization scaling law in insulating 2D systems. As a result, the gap is found to close by $\simeq$0.77 eV from the smallest C2@BN58 system to the infinite size limit, leading to an ev$GW$ HOMO-LUMO gap of 7.6 eV in the monolayer complete- basis set and infinite system size limits. Subtracting the vertical absorption energy, one obtains a very large excitonic binding energy of 3 eV. The very localized Frenkel character of the excitation can justify that this electron- hole interaction is much larger than what is found in pristine h-BN systems where the excitons are much more delocalized. ###### Acknowledgements. X.B., I.D., and D.J. thank the ANR for financial support in the framework of the BSE-forces grant (ANR-20-CE29-0005). Calculations have been performed on the French TGCC Joliot-Curie supercomputing center thanks to a GENCI allocation under contract noA0090910016. M.H.E.B. and D.J. are indebted to the CCIPL computational center installed in Nantes for (the always very) generous allocation of computational time. M.W. thanks the RRZE for allocation of computational time and support, the ERASMUS+ traineeship program for their financial support and P. Hansmann as co-supervisor of his master’s period. ## References * Katzir _et al._ [1975] A. Katzir, J. T. Suss, A. Zunger, and A. Halperin, Point defects in hexagonal boron nitride. I. EPR, thermoluminescence, and thermally-stimulated-current measurements, Phys. Rev. B 11, 2370 (1975). * Era _et al._ [1981] K. Era, F. Minami, and T. Kuzuba, Fast luminescence from carbon-related defects of hexagonal boron nitride, J. Lumin. 24-25, 71 (1981). * Wu _et al._ [2004] J. Wu, W.-Q. Han, W. Walukiewicz, J. W. Ager, W. Shan, E. E. Haller, and A. Zettl, Raman spectroscopy and time-resolved photoluminescence of BN and $B_{x}C_{y}N_{z}$ nanotubes, Nano Lett. 4, 647 (2004), https://doi.org/10.1021/nl049862e . * Silly _et al._ [2007] M. G. Silly, P. Jaffrennou, J. Barjon, J.-S. Lauret, F. Ducastelle, A. Loiseau, E. Obraztsova, B. Attal-Tretout, and E. Rosencher, Luminescence properties of hexagonal boron nitride: Cathodoluminescence and photoluminescence spectroscopy measurements, Phys. Rev. B 75, 085205 (2007). * Museur _et al._ [2008] L. Museur, E. Feldbach, and A. Kanaev, Defect-related photoluminescence of hexagonal boron nitride, Phys. Rev. B 78, 155204 (2008). * Du _et al._ [2015] X. Z. Du, J. Li, J. Y. Lin, and H. X. Jiang, The origin of deep-level impurity transitions in hexagonal boron nitride, Appl. Phys. Lett. 106, 021110 (2015), https://doi.org/10.1063/1.4905908 . * Meuret _et al._ [2015] S. Meuret, L. H. G. Tizei, T. Cazimajou, R. Bourrellier, H. C. Chang, F. Treussart, and M. Kociak, Photon bunching in cathodoluminescence, Phys. Rev. Lett. 114, 197401 (2015). * Wong _et al._ [2015] D. Wong, J. Velasco, L. Ju, J. Lee, S. Kahn, H.-Z. Tsai, C. Germany, T. Taniguchi, K. Watanabe, A. Zettl, F. Wang, and M. F. Crommie, Characterization and manipulation of individual defects in insulating hexagonal boron nitride using scanning tunnelling microscopy, Nature Nanotech. 10 (2015). * Tran _et al._ [2016] T. Tran, K. Bray, M. Ford, M. Toth, and I. Aharonovich, Quantum emission from hexagonal boron nitride monolayers, Nature Nanotech 11, 37–41 (2016). * Bourrellier _et al._ [2016] R. Bourrellier, S. Meuret, A. Tararan, O. Stéphan, M. Kociak, L. H. G. Tizei, and A. Zobelli, Bright UV single photon emission at point defects in h-BN, Nano Lett. 16, 4317 (2016), pMID: 27299915, https://doi.org/10.1021/acs.nanolett.6b01368 . * Vuong _et al._ [2016] T. Q. P. Vuong, G. Cassabois, P. Valvin, A. Ouerghi, Y. Chassagneux, C. Voisin, and B. Gil, Phonon-photon mapping in a color center in hexagonal boron nitride, Phys. Rev. Lett. 117, 097402 (2016). * Jungwirth _et al._ [2016] N. R. Jungwirth, B. Calderon, Y. Ji, M. G. Spencer, M. E. Flatté, and G. D. Fuchs, Temperature dependence of wavelength selectable zero-phonon emission from single defects in hexagonal boron nitride, Nano Lett. 16, 6052 (2016), pMID: 27580074, https://doi.org/10.1021/acs.nanolett.6b01987 . * Vokhmintsev _et al._ [2019] A. Vokhmintsev, I. Weinstein, and D. Zamyatin, Electron-phonon interactions in subband excited photoluminescence of hexagonal boron nitride, J. Lumin. 208, 363 (2019). * Gottscholl _et al._ [2020] A. Gottscholl, M. Kianinia, V. Soltamov, S. Orlinskii, G. Mamin, C. Bradac, C. Kasper, K. Krambrock, A. Sperlich, M. Toth, I. Aharonovich, and V. Dyakonov, Initialization and read-out of intrinsic spin defects in a van der waals crystal at room temperature, Nat. Mater. 19, 540 (2020). * Hayee _et al._ [2020] F. Hayee, L. Yu, J. L. Zhang, C. J. Ciccarino, M. Nguyen, A. F. Marshall, I. Aharonovich, J. Vučkovič, P. Narang, T. F. Heinz, and J. A. Dionne, Revealing multiple classes of stable quantum emitters in hexagonal boron nitride with correlated optical and electron microscopy, Nat. Mater. 19, 534 (2020). * Mendelson _et al._ [2021] N. Mendelson, D. Chugh, J. R. Reimers, T. S. Cheng, A. Gottscholl, H. Long, C. J. Mellor, A. Zettl, V. Dyakonov, P. H. Beton, S. V. Novikov, C. Jagadish, H. H. Tan, M. J. Ford, M. Toth, C. Bradac, and I. Aharonovich, Identifying carbon as the source of visible single-photon emission from hexagonal boron nitride, Nat. Matter. 20, 321 (2021). * Azevedo _et al._ [2009] S. Azevedo, J. R. Kaschny, C. M. de Castilho, and F. de Brito Mota, Electronic structure of defects in a boron nitride monolayer, Eur. Phys. J. B 67, 507 (2009). * Attaccalite _et al._ [2011] C. Attaccalite, M. Bockstedte, A. Marini, A. Rubio, and L. Wirtz, Coupling of excitons and defect states in boron-nitride nanostructures, Phys. Rev. B 83, 144115 (2011). * Huang and Lee [2012] B. Huang and H. Lee, Defect and impurity properties of hexagonal boron nitride: A first-principles calculation, Phys. Rev. B 86, 245406 (2012). * Berseneva _et al._ [2013] N. Berseneva, A. Gulans, A. V. Krasheninnikov, and R. M. Nieminen, Electronic structure of boron nitride sheets doped with carbon from first-principles calculations, Phys. Rev. B 87, 035404 (2013). * Wu _et al._ [2017a] F. Wu, A. Galatas, R. Sundararaman, D. Rocca, and Y. Ping, First-principles engineering of charged defects for two-dimensional quantum technologies, Phys. Rev. Materials 1, 071001 (2017a). * Tawfik _et al._ [2017] S. A. Tawfik, S. Ali, M. Fronzi, M. Kianinia, T. T. Tran, C. Stampfl, I. Aharonovich, M. Toth, and M. J. Ford, First-principles investigation of quantum emission from hBN defects, Nanoscale 9, 13575 (2017). * Wu _et al._ [2017b] F. Wu, A. Galatas, R. Sundararaman, D. Rocca, and Y. Ping, First-principles engineering of charged defects for two-dimensional quantum technologies, Phys. Rev. Materials 1, 071001 (2017b). * Cheng _et al._ [2017] G. Cheng, Y. Zhang, L. Yan, H. Huang, Q. Huang, Y. Song, Y. Chen, and Z. Tang, A paramagnetic neutral $C_{B}V_{N}$ center in hexagonal boron nitride monolayer for spin qubit application, Comput. Mater. Sci. 129, 247 (2017). * Jungwirth and Fuchs [2017] N. R. Jungwirth and G. D. Fuchs, Optical absorption and emission mechanisms of single defects in hexagonal boron nitride, Phys. Rev. Lett. 119, 057401 (2017). * Reimers _et al._ [2018] J. R. Reimers, A. Sajid, R. Kobayashi, and M. J. Ford, Understanding and calibrating density-functional-theory calculations describing the energy and spectroscopy of defect sites in hexagonal boron nitride, J. Chem. Theory Comput. 14, 1602 (2018), pMID: 29412670, https://doi.org/10.1021/acs.jctc.7b01072 . * Weston _et al._ [2018] L. Weston, D. Wickramaratne, M. Mackoit, A. Alkauskas, and C. G. Van de Walle, Native point defects and impurities in hexagonal boron nitride, Phys. Rev. B 97, 214104 (2018). * Smart _et al._ [2018] T. J. Smart, F. Wu, M. Govoni, and Y. Ping, Fundamental principles for calculating charged defect ionization energies in ultrathin two-dimensional materials, Phys. Rev. Materials 2, 124002 (2018). * Sajid _et al._ [2018] A. Sajid, J. R. Reimers, and M. J. Ford, Defect states in hexagonal boron nitride: Assignments of observed properties and prediction of properties relevant to quantum computation, Phys. Rev. B 97, 064101 (2018). * Turiansky _et al._ [2019] M. E. Turiansky, A. Alkauskas, L. C. Bassett, and C. G. Van de Walle, Dangling bonds in hexagonal boron nitride as single-photon emitters, Phys. Rev. Lett. 123, 127401 (2019). * Korona and Chojecki [2019] T. Korona and M. Chojecki, Exploring point defects in hexagonal boron-nitrogen monolayers, Int. J. Quant. Chem. 119, e25925 (2019), https://onlinelibrary.wiley.com/doi/pdf/10.1002/qua.25925 . * Mackoit-Sinkevičiené _et al._ [2019] M. Mackoit-Sinkevičiené, M. Maciaszek, C. G. Van de Walle, and A. Alkauskas, Carbon dimer defect as a source of the 4.1 eV luminescence in hexagonal boron nitride, Appl. Phys. Lett. 115, 212101 (2019), https://doi.org/10.1063/1.5124153 . * Wang and Sundararaman [2019] D. Wang and R. Sundararaman, Substrate effects on charged defects in two-dimensional materials, Phys. Rev. Materials 3, 083803 (2019). * Wang and Sundararaman [2020] D. Wang and R. Sundararaman, Layer dependence of defect charge transition levels in two-dimensional materials, Phys. Rev. B 101, 054103 (2020). * Reimers _et al._ [2020] J. R. Reimers, J. Shen, M. Kianinia, C. Bradac, I. Aharonovich, M. J. Ford, and P. Piecuch, Photoluminescence, photophysics, and photochemistry of the $V_{B}^{-}$ defect in hexagonal boron nitride, Phys. Rev. B 102, 144105 (2020). * Sajid and Thygesen [2020] A. Sajid and K. S. Thygesen, $V_{N}C_{B}$ defect as source of single photon emission from hexagonal boron nitride, 2D Materials 7, 031007 (2020). * Jara _et al._ [2021] C. Jara, T. Rauch, S. Botti, M. A. L. Marques, A. Norambuena, R. Coto, J. E. Castellanos-Águila, J. R. Maze, and F. Munoz, First-principles identification of single photon emitters based on carbon clusters in hexagonal boron nitride, J. Phys. Chem. A 125, 1325 (2021), pMID: 33554602, https://doi.org/10.1021/acs.jpca.0c07339 . * Attaccalite _et al._ [2013] C. Attaccalite, L. Wirtz, A. Marini, and A. Rubio, Efficient gate-tunable light-emitting device made of defective boron nitride nanotubes: from ultraviolet to the visible, Sci. Rep. 3 (2013). * Cassabois _et al._ [2016] G. Cassabois, P. Valvin, and B. Gil, Hexagonal boron nitride is an indirect bandgap semiconductor, Nature Photon. 10 (2016). * Watanabe _et al._ [2004] K. Watanabe, T. Taniguchi, and H. Kanda, Direct-bandgap properties and evidence for ultraviolet lasing of hexagonal boron nitride single crystal, Nature Mater. 3 (2004). * Jaffrennou _et al._ [2007] P. Jaffrennou, J. Barjon, J.-S. Lauret, B. Attal-Trétout, F. Ducastelle, and A. Loiseau, Origin of the excitonic recombinations in hexagonal boron nitride by spatially resolved cathodoluminescence spectroscopy, J. Appl. Phys. 102, 116102 (2007), https://doi.org/10.1063/1.2821413 . * Leslie and Gillan [1985] M. Leslie and N. J. Gillan, The energy and elastic dipole tensor of defects in ionic crystals calculated by the supercell method, J. Phys., C, Solid State Phys. 18, 973 (1985). * Makov and Payne [1995] G. Makov and M. C. Payne, Periodic boundary conditions in ab initio calculations, Phys. Rev. B 51, 4014 (1995). * Freysoldt _et al._ [2009] C. Freysoldt, J. Neugebauer, and C. G. Van de Walle, Fully ab initio finite-size corrections for charged-defect supercell calculations, Phys. Rev. Lett. 102, 016402 (2009). * Taylor and Bruneval [2011] S. E. Taylor and F. Bruneval, Understanding and correcting the spurious interactions in charged supercells, Phys. Rev. B 84, 075155 (2011). * Freysoldt _et al._ [2014] C. Freysoldt, B. Grabowski, T. Hickel, J. Neugebauer, G. Kresse, A. Janotti, and C. G. Van de Walle, First-principles calculations for point defects in solids, Rev. Mod. Phys. 86, 253 (2014). * Chen and Pasquarello [2015] W. Chen and A. Pasquarello, First-principles determination of defect energy levels through hybrid density functionals and $GW$, J. Phys. : Condens. Matter 27, 133202 (2015). * Hedin [1965] L. Hedin, New method for calculating the one-particle green’s function with application to the electron-gas problem, Phys. Rev. 139, A796 (1965). * Salpeter and Bethe [1951] E. E. Salpeter and H. A. Bethe, A relativistic equation for bound-state problems, Phys. Rev. 84, 1232 (1951). * Strinati [1982] G. Strinati, Dynamical shift and broadening of core excitons in semiconductors, Phys. Rev. Lett. 49, 1519 (1982). * Wirtz _et al._ [2006] L. Wirtz, A. Marini, and A. Rubio, Excitons in boron nitride nanotubes: Dimensionality effects, Phys. Rev. Lett. 96, 126104 (2006). * Rinke _et al._ [2009] P. Rinke, A. Janotti, M. Scheffler, and C. G. Van de Walle, Defect formation energies without the band-gap problem: Combining density-functional theory and the $GW$ approach for the silicon self-interstitial, Phys. Rev. Lett. 102, 026402 (2009). * Strinati _et al._ [1980] G. Strinati, H. J. Mattausch, and W. Hanke, Dynamical correlation effects on the quasiparticle bloch states of a covalent crystal, Phys. Rev. Lett. 45, 290 (1980). * Hybertsen and Louie [1986] M. S. Hybertsen and S. G. Louie, Electron correlation in semiconductors and insulators: Band gaps and quasiparticle energies, Phys. Rev. B 34, 5390 (1986). * Godby _et al._ [1988] R. W. Godby, M. Schlüter, and L. J. Sham, Self-energy operators and exchange-correlation potentials in semiconductors, Phys. Rev. B 37, 10159 (1988). * von der Linden and Horsch [1988] W. von der Linden and P. Horsch, Precise quasiparticle energies and hartree-fock bands of semiconductors and insulators, Phys. Rev. B 37, 8351 (1988). * Onida _et al._ [2002] G. Onida, L. Reining, and A. Rubio, Electronic excitations: density-functional versus many-body green’s-function approaches, Rev. Mod. Phys. 74, 601 (2002). * Martin _et al._ [2016] R. Martin, L. Reining, and D. Ceperley, _Interacting Electrons: Theory and Computational Approaches_ (Cambridge University Press, 2016). * Golze _et al._ [2019] D. Golze, M. Dvorak, and P. Rinke, The $GW$ compendium: A practical guide to theoretical photoemission spectroscopy, Front. Chem. 7, 377 (2019). * Strinati [1984] G. Strinati, Effects of dynamical screening on resonances at inner-shell thresholds in semiconductors, Phys. Rev. B 29, 5718 (1984). * Benedict _et al._ [1998] L. X. Benedict, E. L. Shirley, and R. B. Bohn, Optical absorption of insulators and the electron-hole interaction: An ab initio calculation, Phys. Rev. Lett. 80, 4514 (1998). * Rohlfing and Louie [1998] M. Rohlfing and S. G. Louie, Electron-hole excitations in semiconductors and insulators, Phys. Rev. Lett. 81, 2312 (1998). * Albrecht _et al._ [1998] S. Albrecht, L. Reining, R. Del Sole, and G. Onida, Ab initio calculation of excitonic effects in the optical spectra of semiconductors, Phys. Rev. Lett. 80, 4510 (1998). * Ping _et al._ [2013] Y. Ping, D. Rocca, and G. Galli, Electronic excitations in light absorbers for photoelectrochemical energy conversion: first principles calculations based on many body perturbation theory, Chem. Soc. Rev. 42, 2437 (2013). * Neese [2012] F. Neese, The orca program system, WIREs Comput. Mol. Sci. 2, 73 (2012). * Duchemin and Blase [2020] I. Duchemin and X. Blase, Robust analytic-continuation approach to many-body $GW$ calculations, J. Chem. Theory Comput. 16, 1742 (2020), pMID: 32023052, https://doi.org/10.1021/acs.jctc.9b01235 . * Duchemin and Blase [2021] I. Duchemin and X. Blase, Cubic-scaling all-electron $GW$ calculations with a separable density-fitting space–time approach, J. Chem. Theory Comput. 17, 2383 (2021), pMID: 33797245, https://doi.org/10.1021/acs.jctc.1c00101 . * Jacquemin _et al._ [2015a] D. Jacquemin, I. Duchemin, and X. Blase, Benchmarking the bethe–salpeter formalism on a standard organic molecular set, J. Chem. Theory Comput. 11, 3290 (2015a), pMID: 26207104, https://doi.org/10.1021/acs.jctc.5b00304 . * Li _et al._ [2016] J. Li, G. D’Avino, I. Duchemin, D. Beljonne, and X. Blase, Combining the many-body $GW$ formalism with classical polarizable models: Insights on the electronic structure of molecular solids, J. Phys. Chem. Lett. 7, 2814 (2016), pMID: 27388926, https://doi.org/10.1021/acs.jpclett.6b01302 . * Jacquemin _et al._ [2017] D. Jacquemin, I. Duchemin, and X. Blase, Is the bethe–salpeter formalism accurate for excitation energies? comparisons with TD-DFT, CASPT2, and EOM-CCSD, J. Phys. Chem. Lett. 8, 1524 (2017), pMID: 28301726, https://doi.org/10.1021/acs.jpclett.7b00381 . * Duchemin _et al._ [2018] I. Duchemin, C. A. Guido, D. Jacquemin, and X. Blase, The bethe–salpeter formalism with polarisable continuum embedding: Reconciling linear-response and state-specific features, Chem. Sci. 9, 4430 (2018). * Friedrich [2019] C. Friedrich, Tetrahedron integration method for strongly varying functions: Application to the $GT$ self-energy, Phys. Rev. B 100, 075142 (2019). * Jacquemin _et al._ [2015b] D. Jacquemin, I. Duchemin, and X. Blase, 0–0 energies using hybrid schemes: Benchmarks of TD-DFT, CIS(D), ADC(2), CC2, and BSE/$GW$ formalisms for 80 real-life compounds, J. Chem. Theory Comput. 11, 5340 (2015b), pMID: 26574326, https://doi.org/10.1021/acs.jctc.5b00619 . * Adamo and Barone [1999] C. Adamo and V. Barone, Toward reliable density functional methods without adjustable parameters: the PBE0 model, J. Comp. Phys. 110, 6158 (1999). * Whitten [1973] J. L. Whitten, Coulombic potential energy integrals and approximations, J. Chem. Phys. 58, 4496 (1973), https://doi.org/10.1063/1.1679012 . * Ren _et al._ [2012] X. Ren, P. Rinke, V. Blum, J. Wieferink, A. Tkatchenko, A. Sanfilippo, K. Reuter, and M. Scheffler, Resolution-of-identity approach to hartree–fock, hybrid density functionals, RPA, MP2 and $GW$ with numeric atom-centered orbital basis functions, New J. Phys. 14, 053020 (2012). * Duchemin _et al._ [2017] I. Duchemin, J. Li, and X. Blase, Hybrid and constrained resolution-of-identity techniques for coulomb integrals, J. Chem. Theory Comput. 13, 1199 (2017), pMID: 28094983, https://doi.org/10.1021/acs.jctc.6b01215 . * Weigend _et al._ [2002] F. Weigend, A. Köhn, and C. Hättig, Efficient use of the correlation consistent basis sets in resolution of the identity MP2 calculations, J. Chem. Phys. 116, 3175 (2002), https://doi.org/10.1063/1.1445115 . * Dunning [1989] T. H. Dunning, Gaussian basis sets for use in correlated molecular calculations. I. The atoms boron through neon and hydrogen, J. Chem. Phys. 90, 1007 (1989), https://doi.org/10.1063/1.456153 . * Weigend [2008] F. Weigend, Hartree–fock exchange fitting basis sets for H to Rn, J. Comp. Chem. 29, 167 (2008), https://onlinelibrary.wiley.com/doi/pdf/10.1002/jcc.20702 . * Krishnan _et al._ [1980] R. Krishnan, J. S. Binkley, R. Seeger, and J. A. Pople, Self-consistent molecular orbital methods. XX. A basis set for correlated wave functions, J. Chem. Phys. 72, 650 (1980), https://doi.org/10.1063/1.438955 . * Casida [1995] M. E. Casida, Time-dependent density functional response theory for molecules, in _Recent Advances in Density Functional Methods_ (1995) pp. 155–192, https://www.worldscientific.com/doi/pdf/10.1142/9789812830586_0005 . * [83] See Supplemental Material at [Link to be added upon publication] for the representation of the C2@BNX structures, the convergence with basis set and atomic structure sizes of TD-DFT and BSE calculations, the complete basis set (CBS) analysis of the smallest flake $GW$ energy levels, the extrapolation to infinite system size of the $GW$ HOMO-LUMO gap, the illustration of the vibrational modes contributing to the Huang-Rhys factor, the theoretical emission spectrum at room temperature and finally a study of the defect levels position with respect to the h-BN monolayer valence band edge. * Frisch _et al._ [2016] M. J. Frisch, G. W. Trucks, H. B. Schlegel, G. E. Scuseria, M. A. Robb, J. R. Cheeseman, G. Scalmani, V. Barone, G. A. Petersson, H. Nakatsuji, X. Li, M. Caricato, A. V. Marenich, J. Bloino, B. G. Janesko, R. Gomperts, B. Mennucci, H. P. Hratchian, J. V. Ortiz, A. F. Izmaylov, J. L. Sonnenberg, D. Williams-Young, F. Ding, F. Lipparini, F. Egidi, J. Goings, B. Peng, A. Petrone, T. Henderson, D. Ranasinghe, V. G. Zakrzewski, J. Gao, N. Rega, G. Zheng, W. Liang, M. Hada, M. Ehara, K. Toyota, R. Fukuda, J. Hasegawa, M. Ishida, T. Nakajima, Y. Honda, O. Kitao, H. Nakai, T. Vreven, K. Throssell, J. A. Montgomery, Jr., J. E. Peralta, F. Ogliaro, M. J. Bearpark, J. J. Heyd, E. N. Brothers, K. N. Kudin, V. N. Staroverov, T. A. Keith, R. Kobayashi, J. Normand, K. Raghavachari, A. P. Rendell, J. C. Burant, S. S. Iyengar, J. Tomasi, M. Cossi, J. M. Millam, M. Klene, C. Adamo, R. Cammi, J. W. Ochterski, R. L. Martin, K. Morokuma, O. Farkas, J. B. Foresman, and D. J. Fox, Gaussian 16 Revision A.03 (2016), gaussian Inc. Wallingford CT. * Koch _et al._ [1995] H. Koch, O. Christiansen, P. Jorgensen, and J. Olsen, Excitation energies of BH, CH2 and Ne in full configuration interaction and the hierarchy CCS, CC2, CCSD and CC3 of coupled cluster models, CPL 244, 75 (1995). * Dreuw and Wormit [2015] A. Dreuw and M. Wormit, The algebraic diagrammatic construction scheme for the polarization propagator for the calculation of excited states, WIREs Comput. Mol. Sci. 5, 82 (2015). * Tur [2018] Turbomole v7.3 2018, a development of university of karlsruhe and forschungszentrum karlsruhe gmbh, 1989-2007, turbomole gmbh, since 2007; available from http://www.turbomole.com (accessed 13 june 2016). (2018). * Santoro _et al._ [2007a] F. Santoro, R. Improta, A. Lami, J. Bloino, and V. Barone, Effective method to compute franck-condon integrals for optical spectra of large molecules in solution, J. Comp. Phys. 126, 084509 (2007a). * Santoro _et al._ [2007b] F. Santoro, R. Improta, A. Lami, J. Bloino, and V. Barone, Effective method to compute vibrationally resolved optical spectra of large molecules at finite temperature in the gas phase and in solution, J. Comp. Phys. 126, 184102 (2007b). * Santoro and Jacquemin [2016] F. Santoro and D. Jacquemin, Going beyond the vertical approximation with time-dependent density functional theory, WIREs Comput. Mol. Sci. 6, 460 (2016). * Cerezo and Santoro [2020] J. Cerezo and F. Santoro, Fcclasses 3.0, http://www.pi.iccom.cnr.it/fcclasses (2020). * Koch _et al._ [1997] H. Koch, O. Christiansen, P. Jorgensen, A. M. Sanchez de Merás, and T. Helgaker, The cc3 model: An iterative coupled cluster approach including connected triples, J. Chem. Phys. 106, 1808 (1997). * Véril _et al._ [2021] M. Véril, A. Scemama, M. Caffarel, F. Lipparini, M. Boggio-Pasqua, D. Jacquemin, and P.-F. Loos, Questdb: a database of highly-accurate excitation energies for the electronic structure community, WIREs Comput. Mol. Sci. 11, e1517 (2021). * Winter _et al._ [2013] N. O. C. Winter, N. K. Graf, S. Leutwyler, and C. Hättig, Benchmarks for 0–0 transitions of aromatic organic molecules: DFT/B3LYP, ADC(2), CC2, SOS-CC2 and SCS-CC2 compared to high-resolution gas-phase data, Phys. Chem. Chem. Phys. 15, 6623 (2013). * Oruganti _et al._ [2016] B. Oruganti, C. Fang, and B. Durbeej, Assessment of a composite CC2/DFT procedure for calculating 0–0 excitation energies of organic molecules, Mol. Phys. 114, 3448 (2016), http://dx.doi.org/10.1080/00268976.2016.1235736 . * Laurent and Jacquemin [2013] A. D. Laurent and D. Jacquemin, TD-DFT benchmarks: A review, Int. J. Quantum Chem. 113, 2019 (2013). * Cammi _et al._ [2005] R. Cammi, S. Corni, B. Mennucci, and J. Tomasi, Electronic excitation energies of molecules in solution: State specific and linear response methods for nonequilibrium continuum solvation models, J. Chem. Phys. 122, 104513 (2005), https://doi.org/10.1063/1.1867373 . * Guido and Caprasecca [2019] C. A. Guido and S. Caprasecca, On the description of the environment polarization response to electronic transitions, Int. J. Quantum Chem. 119, e25711 (2019), https://onlinelibrary.wiley.com/doi/pdf/10.1002/qua.25711 . * Goerigk _et al._ [2009] L. Goerigk, J. Moellmann, and S. Grimme, Computation of accurate excitation energies for large organic molecules with double-hybrid density functionals, Phys. Chem. Chem. Phys. 11, 4611 (2009). * Jacquemin _et al._ [2012] D. Jacquemin, A. Planchat, C. Adamo, and B. Mennucci, A td-dft assessment of functionals for optical 0-0 transitions in solvated dyes, J. Chem. Theory Comput. 8, 2359 (2012). * Lin _et al._ [2010] Y. Lin, T. V. Williams, and J. W. Connell, Soluble, exfoliated hexagonal boron nitride nanosheets, J. Phys. Chem. Lett. 1, 277 (2010), https://doi.org/10.1021/jz9002108 . * Shi _et al._ [2010] Y. Shi, C. Hamsen, X. Jia, K. K. Kim, A. Reina, M. Hofmann, A. L. Hsu, K. Zhang, H. Li, Z.-Y. Juang, M. S. Dresselhaus, L.-J. Li, and J. Kong, Synthesis of few-layer hexagonal boron nitride thin film by chemical vapor deposition, Nano Lett. 10, 4134 (2010), pMID: 20812716, https://doi.org/10.1021/nl1023707 . * D’Avino _et al._ [2016] G. D’Avino, L. Muccioli, F. Castet, C. Poelking, D. Andrienko, Z. G. Soos, J. Cornil, and D. Beljonne, Electrostatic phenomena in organic semiconductors: fundamentals and implications for photovoltaics, J. Phys.: Cond. Mat. 28, 433002 (2016). * Paleari _et al._ [2018] F. Paleari, T. Galvani, H. Amara, F. Ducastelle, A. Molina-Sánchez, and L. Wirtz, Excitons in few-layer hexagonal boron nitride: Davydov splitting and surface localization, 2D Materials 5, 045017 (2018). * Aggoune _et al._ [2018] W. Aggoune, C. Cocchi, D. Nabok, K. Rezouali, M. A. Belkhir, and C. Draxl, Dimensionality of excitons in stacked van der waals materials: The example of hexagonal boron nitride, Phys. Rev. B 97, 241114 (2018). * Kolos and Karlický [2019] M. Kolos and F. Karlický, Accurate many-body calculation of electronic and optical band gap of bulk hexagonal boron nitride, Phys. Chem. Chem. Phys. 21, 3999 (2019). * Galvani _et al._ [2016] T. Galvani, F. Paleari, H. P. C. Miranda, A. Molina-Sánchez, L. Wirtz, S. Latil, H. Amara, and F. m. c. Ducastelle, Excitons in boron nitride single layer, Phys. Rev. B 94, 125303 (2016). * Cudazzo _et al._ [2016] P. Cudazzo, L. Sponza, C. Giorgetti, L. Reining, F. Sottile, and M. Gatti, Exciton band structure in two-dimensional materials, Phys. Rev. Lett. 116, 066803 (2016).
arxiv-papers
2021-07-27T13:10:11
2024-09-04T03:07:21.561662
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Michael Winter and Manon H. E. Bousquet and Denis Jacquemin and Ivan\n Duchemin and Xavier Blase", "submitter": "Xavier Blase", "url": "https://arxiv.org/abs/2107.12795" }
2107.12797
# Wasserstein-Splitting Gaussian Process Regression for Heterogeneous Online Bayesian Inference Michael E. Kepler1, Alec Koppel2, Amrit Singh Bedi2, and Daniel J. Stilwell1 1M.E. Kepler and D.J. Stilwell are with the Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA 24060, USA [email protected], [email protected]. Koppel and A.S. Bedi are with the Computational and Information Sciences Directorate, U.S. Army Research Laboratory, Adelphi, MD 20783, USA [email protected], [email protected]*This work was supported by the National Defense Science and Engineering Graduate (NDSEG) fellowship program and the Office of Naval Research via grants N00014-18-1-2627 and N00014-19-1-2194 ###### Abstract Gaussian processes (GPs) are a well-known nonparametric Bayesian inference technique, but they suffer from scalability problems for large sample sizes, and their performance can degrade for non-stationary or spatially heterogeneous data. In this work, we seek to overcome these issues through (i) employing variational free energy approximations of GPs operating in tandem with online expectation propagation steps; and (ii) introducing a local splitting step which instantiates a new GP whenever the posterior distribution changes significantly as quantified by the Wasserstein metric over posterior distributions. Over time, then, this yields an ensemble of sparse GPs which may be updated incrementally, and adapts to locality, heterogeneity, and non- stationarity in training data. We provide a 1-dimensional example to illustrate the motivation behind our approach, and compare the performance of our approach to other Gaussian process methods across various data sets, which often achieves competitive, if not superior predictive performance, relative to other locality-based GP regression methods in which hyperparameters are learned in an online manner. ## I Introduction Gaussian Processes (GPs) are a nonparametric Bayesian inference technique that has been widely used across science and engineering to provide nonlinear interpolation and uncertainty estimates [1], as in terrain elevation [2], temperature [3], the inverse mapping of sensor outputs to joint inputs for the control of a robotic arm [4, 5], systems identification [6, 7] and in uncertainty-aware mapping [8, 9]. In its most essential form, a posterior distribution of an unknown nonlinear map $f:\mathcal{X}\rightarrow\mathbb{R}$ is computed using a basis of feature vectors $\mathbf{x}_{k}\in\mathcal{X}\subset\mathbb{R}^{d}$, $1\leq k\leq N$, and noisy observations $y_{k}=f(\mathbf{x}_{k})+\epsilon_{k}$ where $\epsilon_{k}$ is observation noise, typically Gaussian. The descriptive power of this framework is hamstrung by two important attributes of the GP posterior: (i) computing the conditional mean and covariance require computational effort cubic $\mathcal{O}(N^{3})$ in the sample size $N$ due to the presence of a kernel matrix inversion; and (ii) consistency guarantees require data to be independent and identically distributed (i.i.d) [10]. In robotics, data is typically arriving incrementally and exhibits locality or drift [11]. Augmenting GPs to address these issues is the goal of this work. TABLE I: Comparison of characteristics of WGPR and related works. Method | Model representation | Model hyperparameters | Hyperparameters learned | Splitting criterion | Prediction ---|---|---|---|---|--- LGPR[4] | Exact | Globally fixed | Offline | Feature space distance | Weighted average SOLAR GP[12] | Sparse | Locally adaptive | Online | Feature space distance | Weighted average WGPR | Sparse | Locally adaptive | Online | Wasserstein distance | Nearest model Challenge (i), the poor scaling with sample size $N$, originates from the fact that the posterior mean and covariance depend on a data matrix, or kernel dictionary, that accumulates all past observations. A long history of works have studied this issue, and typically select a subset of $M\ll N$ possible model points called inducing [13] or pseudo-inputs [14], and optimize GP hyperparameters along this subspace. One may select points via information gain [15], greedy compression [16], Nyström sampling [17], or other probabilistic criteria [18, 19]. A related question is the objective for inducing input optimization, which may be done according to the posterior likelihood along the $M$-dimensional subspace [14], or a KL-divergence lower bound thereof called the variational free energy (VFE) [13]. In addition to pseudo-point methods, sparse spectrum Gaussian processes [20] can be used to obtain a reduced spectral representation of the Gaussian process. These methods are predominately offline, where the model is trained over the entire training set with a fixed finite number of samples. However, as we discuss next, VFE is more naturally extensible to incremental processing. In particular, to augment these approaches to apply to settings with incrementally arriving data, dynamic point selection schemes have been proposed [21]; however, it is difficult to incorporate hyperparameter search, especially for inducing inputs, into these schemes, which are essential to obtaining competitive performance in practice. By contrast, fixed-memory VFE approximations may gracefully incorporate online Expectation Propagation (EP) steps [22], as pointed out in [23], and may be subsumed into the streaming variational Bayes framework [24]. See [25, 26] for a review of recent advances in Variational Bayes as it pertains to GPs. For this reason, to mitigate the sample complexity bottleneck, we adopt a VFE approach with online EP steps [23], whose approximate consistency (for i.i.d. settings) is recently established [27]. Attempts to address issue (ii), i.e., to broaden use of GPs to non-stationary or spatially heterogeneous data, have taken inspiration from vector-valued time-series analysis as well as ensemble methods. Specifically, time-series approaches seek to define covariance kernels that vary with time and/or space [28, 29, 30, 31]. These approaches have also given rise to use of GPs in high- dimensional problems through use of convolutional kernels [32]. However, doing so typically requires offline training, and numerical conditioning issues make it challenging to adapt them to the online setting, which is inherent to continually learning autonomous robots. Efforts to address the non- stationarity that arises in problems with dynamics have also been considered, especially in the context of occupancy grids for mapping application [33, 8]. Our approach is, instead, inspired by ensemble methods, where one builds a family of “weak learners” and forms the inference by appropriately weighting the constituents [34, 35], as in boosting [36], and local regression, i.e., the Nadaraya-Watson estimator [37, 38, 39]. Two design decisions are crucial to formulating an ensemble GP: (a) how to form the aggregate estimate, and (b) when to instantiate a new model. The line of research related to ensemble GPs began with local Gaussian Process regression (LGPR) [4], which (a) formulates estimates by weighted majority voting akin to Nadaraya-Watson, and (b) assigns samples to a local model based on a similarity measure defined in terms of the covariance kernel to the arithmetic mean of a local model’s samples. If no local models are sufficiently close, then a new local model is instantiated. We note that this approach requires hyperparameters to be fixed _in advance_ of training. Most similar to this work is sparse online locally adaptive regression using Gaussian processes (SOLAR GP) [12], where each local GP is approximated using VFE and updated online using EP [23]. The aforementioned approaches to ensemble GPs have two key limitations [4, 40, 12]: (a) they form aggregate estimates by weighted voting, and (b) use distance in feature space to quantify whether a new constituent model is needed. Weighted voting, as inspired by local regression, hinges upon the validity of an i.i.d. hypothesis [37, 38]. Moreover, using distance in feature space may falsely ascribe novelty to far away samples that are similar in distribution to a current local model. To address these issues, we propose Wasserstein-splitting Gaussian Process Regression (WGPR), whose main merits are as follows: * • the notion of similarity is specified as the Wasserstein distance, a rigorous metric over distributions which is available in closed-form for Gaussian Processes. This distance is used to quantify the change in the each model’s predictive distribution caused by an update with the new training data, and hence defines a decision rule for when to instantiate a new local model: a new local model is instantiated only if the change in the posterior predictive model exceeds a threshold in the Wasserstein distance for every model, otherwise it is incorporated into the most similar, i.e. smallest Wasserstein distance, model via expectation propagation (EP) steps; * • WGPR forms predictive distributions upon the basis of only the the nearest local model in terms of Euclidean distance in the input space, rather than a weighted vote, in order to more strictly encapsulate local heterogeneity in the data, and hence only operates upon a _local_ i.i.d. hypotheses; * • experimentally WGPR identifies the number of data phase transitions on a 1-dimensional data set and achieves competitive performance with the state of the art for a variety of real data sets. We compare characteristics of WGPR, LGPR[4], and SOLAR GP[12] in Table I. Note that LGPR requires the hyperparameters of all models to be fixed to the same set of global hyperparameters, which are learned a priori offline. WGPR, on the other hand, does not require the hyperparameters to be globally fixed a priori, but allows for the hyperparameters of a model to be updated recursively as more data is collected. In contrast to both LGPR and SOLAR GP, WGPR decides whether to update an existing model or instantiate a new one based on the effect the new data has on the posterior distribution of each model, quantified in terms of the Wasserstein distance, and prediction is based on the model nearest to the query point in an effort to preserve local features, which can be filtered out when using a weighted prediction of models. ## II Background and Notation In WGPR, we employ a sparse approximation of the posterior predictive distribution for each model. In this section, we introduce notation and provide the background material on sparse Gaussian processes required to implement WGPR. ### II-A Gaussian Process Regression A Gaussian process is a collection of random variables, any finite number of which have a joint Gaussian distribution [41]. We use a Gaussian process to model the spatial field of interest $f:\mathcal{X}\rightarrow\mathbb{R}$, which we write as $f(\cdot)\sim GP\left(m(\cdot),k(\cdot,\cdot)\right)$, where $m:\mathcal{X}\rightarrow\mathbb{R}$ and $k:\mathcal{X}\times\mathcal{X}\rightarrow\mathbb{R}$ denote the mean and covariance functions, respectively. Practical application involves evaluating a Gaussian process at a finite set of inputs $\mathbf{X}=\\{\mathbf{x}_{1},\cdots,\mathbf{x}_{N}\\}\subset\mathcal{X}$, and with a slight abuse of notation we write $f(\mathbf{X})\sim\mathcal{N}\left(m(\mathbf{X}),k(\mathbf{X},\mathbf{X})\right)$ where the mean vector $m(\mathbf{X})\in\mathbb{R}^{N}$ and covariance matrix $k(\mathbf{X},\mathbf{X})\in\mathbb{R}^{N\times N}$ are defined element-wise via $[m(\mathbf{X})]_{i}=m(\mathbf{x}_{i})$ and $[k(\mathbf{X},\mathbf{X})]_{i,j}=k(\mathbf{x}_{i},\mathbf{x}_{j})$. More generally, for $\mathbf{Z}=\\{\mathbf{z}_{1},\cdots,\mathbf{z}_{M}\\}\subset\mathcal{X}$, the matrix $k(\mathbf{X},\mathbf{Z})\in\mathbb{R}^{N\times M}$ is defined by $[k(\mathbf{X},\mathbf{Z})]_{i,j}=k(\mathbf{x}_{i},\mathbf{z}_{j})$ for all $i=1:N$, and all $j=1:M$. Gaussian process regression follows a Bayesian approach which begins with specifying a prior distribution $f(\cdot)\sim GP_{0}\left(m_{0}(\cdot),k_{0}(\cdot,\cdot)\right)$. As is customarily done for the sake notational simplicity [41, Ch. 2.2], we select the zero-mean function as the prior mean function $m_{0}(\cdot)$. The covariance kernel $k_{0}(\cdot,\cdot)$ is user-specified and encodes prior assumptions, such as smoothness, about the underlying function $f$. Throughout this paper, we employ the commonly-used squared exponential covariance kernel given by $\displaystyle k_{0}(\mathbf{x},\mathbf{x}^{\prime})=\sigma_{f}^{2}\exp\\{-({1}/{2})(\mathbf{x}-\mathbf{x}^{\prime})^{\mathsf{T}}\Lambda^{-1}(\mathbf{x}-\mathbf{x}^{\prime})\\},$ (1) where $\sigma_{f}^{2}$ denotes the signal variance, and $\Lambda=\textrm{diag}(\lambda_{1}^{2},...,\lambda_{d}^{2})$ contains the length-scale parameter $\lambda_{i}$ of each input dimension $i=1,...,d$. The entire conceptual development proceeds analogous for other covariance kernels. The assumption that each measurement is corrupted by independent identically distributed Gaussian noise $\epsilon\sim N(0,\sigma_{n}^{2})$ gives rise to a Gaussian likelihood, and given a collection of training data $\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N}$ the posterior process is $\displaystyle f(\mathbf{x})\sim GP(m_{post}(\mathbf{x}),k_{post}(\mathbf{x},\mathbf{x}^{\prime})),$ (2) where $\displaystyle m_{post}(\mathbf{x})$ $\displaystyle=k_{0}(\mathbf{x},\mathbf{X})(k_{0}(\mathbf{X},\mathbf{X})+\sigma_{n}^{2}\mathbf{I})^{-1}\mathbf{y},$ $\displaystyle k_{post}(\mathbf{x},\mathbf{x}^{\prime})$ $\displaystyle=k_{0}(\mathbf{x},\mathbf{x}^{\prime})+k_{0}(\mathbf{x},\mathbf{X})(k_{0}(\mathbf{X},\mathbf{X})+\sigma_{n}^{2}\mathbf{I})^{-1}k_{0}(\mathbf{X},\mathbf{x}^{\prime}),$ for all $\mathbf{x},\mathbf{x}^{\prime}\in\mathcal{X}$. Performing inference with the exact form of the posterior (2), is only feasible for small to moderate data sets, e.g. sample size $N<10,000$, as the necessary matrix inversion in the preceding expression for the posterior mean and covariance functions incurs a computational cost that scales $\mathcal{O}(N^{3})$. To mitigate the complexity bottleneck in the sample size, we employ a sparse approximation of the posterior distribution for each Gaussian process parameterization henceforth considered. Next we define the specific sparse approximation scheme we consider. ### II-B Variational Free Energy Approximation We reduce computational and memory costs using the posterior approximation developed by Titsias [13]. The key idea underpinning the approximation is to express the posterior in terms of $M\ll N$ pseudo (inducing) points, which serve to summarize the exact posterior associated with $N$ training points. With $M$ fixed (by the user), the pseudo points $\mathbf{Z}=\\{\mathbf{z}_{1},...,\mathbf{z}_{M}\\}\subset\mathcal{X}$, specified as variational parameters, are selected so as to maximize a lower bound on the true log marginal likelihood. This bound is referred to as the variational free energy and is given by $\displaystyle F_{VFE}=\log[\mathcal{N}(\mathbf{y};\mathbf{0},\sigma_{n}^{2}\mathbf{I}+\mathbf{Q}_{NN})]-\frac{1}{2\sigma_{n}^{2}}\mathrm{tr}(k_{0}(\mathbf{X},\mathbf{X})-\mathbf{Q}_{NN}),$ (3) where $\mathbf{Q}_{NN}=k_{0}(\mathbf{X},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{X})$. Equivalently, by maximizing the variational free energy, the Kullback-Leibler divergence between the variational distribution and exact posterior distribution over $f(\mathbf{Z})$ is minimized. Given the pseudo inputs $\mathbf{Z}$, the optimal variational distribution over $f(\mathbf{Z})\triangleq\mathbf{f}_{Z}$ has an analytic form $\mathbf{f}_{Z}\sim N(\mu_{Z},\mathbf{S}_{Z})$ with $\displaystyle\mu_{Z}$ $\displaystyle=\sigma_{n}^{-2}k_{0}(\mathbf{Z},\mathbf{Z})\Sigma k_{0}(\mathbf{Z},\mathbf{X})\mathbf{y},$ $\displaystyle\mathbf{S}_{Z}$ $\displaystyle=k_{0}(\mathbf{Z},\mathbf{Z})\underbrace{(k_{0}(\mathbf{Z},\mathbf{z})+\sigma_{n}^{-2}k_{0}(\mathbf{Z},\mathbf{X})k_{0}(\mathbf{X},\mathbf{Z}))^{-1}}_{\triangleq\Sigma}k_{0}(\mathbf{Z},\mathbf{Z}).$ Given the optimal pseudo-inputs $\mathbf{Z}\subset\mathcal{X}$, the approximate posterior is given by $f(\cdot)\sim GP(m_{VFE}(\cdot),k_{VFE}(\cdot,\cdot))$, where $\displaystyle m_{VFE}(\mathbf{x})=$ $\displaystyle k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}\mu_{Z},$ (4) $\displaystyle k_{VFE}(\mathbf{x},\mathbf{x}^{\prime})=$ $\displaystyle k_{0}(\mathbf{x},\mathbf{x}^{\prime})-k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{x}^{\prime})$ $\displaystyle+k_{0}(\mathbf{x},\mathbf{Z})k_{0}(\mathbf{Z},\mathbf{Z})^{-1}\mathbf{S}_{Z}k_{0}(\mathbf{Z},\mathbf{Z})^{-1}k_{0}(\mathbf{Z},\mathbf{x}^{\prime}).$ In practice, we first obtain the pseudo-inputs $\mathbf{Z}\subset\mathcal{X}$ and hyperparameters $\theta=\\{\sigma_{f},\Lambda,\sigma_{n}\\}$ via gradient- based minimization of the negative variational free energy (3). With the (locally optimal)111Observe that in general, since the VFE is non-convex with respect to its hyperparameters $\theta$ and pseudo-inputs $\mathbf{Z}$, the best pointwise limit one may hope to achieve via gradient-based search is a local minimizer. hyperparameters and pseudo-inputs in hand, we then form the posterior predictive distribution (4). As new training data is collected, we use the principled _expectation propagation_ framework of Bui et al.[23] to recursively update the existing sparse approximation, along with the hyperparameters and pseudo points. For the recursive update, it is assumed that previous measurements are inaccessible so knowledge about previously collected measurements is inferred through existing pseudo points. More precisely, let $GP_{old}$ denote the current sparse posterior approximation with associated pseudo inputs $\mathbf{Z}_{a}\subset\mathcal{X}$ and hyperparameters $\theta_{old}$. The updated posterior approximation follows from an optimization problem, where given the new data $\mathcal{D}_{new}=\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N_{new}}$ and $\mathbf{Z}_{a}\subset\mathcal{X}$ we maximize the online log marginal likelihood $F_{OVFE}$. The optimization gives rise to the updated posterior predictive distribution $\displaystyle GP_{upd}(m_{upd}(\cdot),k_{upd}(\cdot,\cdot)),$ (5) which depends on the new pseudo inputs $\mathbf{Z}_{b}$ and hyperparameters $\theta_{new}$ that jointly optimize $F_{OVFE}$. We omit the exact expressions for $F_{OVFE}$ and the posterior mean and covariance as they are prohibitively long, but they can be readily accessed from the supplementary appendix of [23]. In summary, the recursive update is performed by first obtaining the pseudo-inputs $\mathbf{Z}_{b}$ and hyperparameters $\theta_{new}$ that optimize $F_{OVFE}$, and then using them to form the posterior (5). ## III Wasserstein-Splitting Gaussian Processes In this section, we present Wasserstein-Splitting Gaussian Process Regression (WGPR). The high-level structure of WGPR mirrors that of LGPR [4] and SOLAR GP [12], however our method deviates from the existing methods in two notable ways: (i) we instantiate new models on the basis of the their posterior predictive distribution, rather than their locality in the input space, and (ii) we propose an alternative approach for making predictions. ### III-A Training Initialization: Training the overall prediction model begins with an empty collection of models, and given the initial batch of training data $\mathcal{D}_{new}=\\{(\mathbf{x}_{i},y_{i})\\}_{i=1}^{N_{new}}$ of $N_{new}$ samples, we instantiate the first local model using the VFE approximation as detailed in Section II-B yielding $GP_{1}$. Updating the Current Ensemble: Now, suppose we have a collection $\\{GP_{j}\\}_{j=1}^{J}$ of $J$ Gaussian Process models. Upon obtaining a new batch of training data $\mathcal{D}_{new}$, the key question is how to decide which model is most similar, and thus is a suitable candidate for executing an update. Previous approaches[39, 4, 12] define similarity in terms of the covariance kernel [cf. (1)]. With this definition of similarity, two distant regions of the spatial field, characterized by the same set of underlying hyperparameters, gives rise to two different models. There are indeed apparent structural similarities to local kernel regression estimates of conditional expectations such as the Nadaraya-Watson estimator [37, 38] or ensemble techniques [36] inspired by majority voting [34, 35]. However, the former approach hinges upon i.i.d. training examples from a stationary distribution, and the latter collapses distributional inference to point estimates in feature space, which belies the fact that we are in the Bayesian setting. We, instead, base similarity on the intuition that if $\mathcal{D}_{new}$ is similar to an existing model, then the new data should minimally change the posterior predictive distribution according to some metric over probability distributions. In other words, predictions of the updated individual model (i) remain (approximately) unchanged across previously seen data, and (ii) agree with the predictions of a newly instantiated model across the new measurements. To formalize this intuition and assess how the new data would affect each posterior distribution in the collection $\\{GP_{j}(m_{j}(\cdot),k_{j}(\cdot,\cdot))\\}_{j=1}^{J}$, we update each model using the recursive VFE framework [23] using the new mini-batch $\mathcal{D}_{new}$, as outlined in Section II, which yields the updated collection $\\{GP_{j}^{upd}\\}_{j=1}^{J}$ where $\displaystyle GP_{j}^{upd}\left(m_{j}^{upd}(\cdot),k_{j}^{upd}(\cdot,\cdot)\right)\;,\quad j=1,...,J.$ Let $\mathbf{Z}_{j}\subset\cal X$ denote the pseudo-inputs of model $j$, prior to performing the update with $\mathcal{D}_{new}$. We then measure the change in predictions over previous data by computing the squared Wasserstein distance [42] between the original and updated posterior evaluated at $\mathbf{Z}_{j}$, i.e. $\displaystyle w_{j}^{old}=$ $\displaystyle\|\mathbf{m}_{j}\\!-\\!\mathbf{m}_{j,Z}^{upd}\|^{2}\\!+\\!\textrm{tr}\left(\mathbf{S}_{j}\\!+\\!\mathbf{S}_{j,Z}^{upd}-2\left(\mathbf{S}_{j}^{1/2}\mathbf{S}_{j,Z}^{upd}\mathbf{S}_{j}^{1/2}\right)^{1/2}\right),$ where $\|\cdot\|$ denotes the Euclidean norm, and $\displaystyle\mathbf{m}_{j}$ $\displaystyle\triangleq m_{j}(\mathbf{Z}_{j}),$ $\displaystyle\mathbf{S}_{j}$ $\displaystyle\triangleq k_{j}(\mathbf{Z}_{j},\mathbf{Z}_{j})$ $\displaystyle\mathbf{m}_{j,Z}^{upd}$ $\displaystyle\triangleq m_{j}^{upd}(\mathbf{Z}_{j}),$ $\displaystyle\mathbf{S}_{j,Z}^{upd}$ $\displaystyle\triangleq k_{j}^{upd}(\mathbf{Z}_{j},\mathbf{Z}_{j}).$ Note that the Wasserstein distance is a valid metric over probability measures, and its salient feature is that it is computable in closed-form for Gaussians, as well as it avoids some of the computational issues of comparable choices such as the Total Variation or Hellinger metrics – see [43]. Now, with $\\{GP_{j}^{upd}\\}_{j=1}^{J}$ in hand, we quantify how well each updated model agrees with the new data. To do so, we take $\mathcal{D}_{new}$ and instantiate a new approximate GP via the batch variational free energy sparse approximation (3) - (4): $\displaystyle GP_{J+1}\left(m_{J+1}(\cdot),k_{J+1}(\cdot,\cdot)\right)$ that is free from bias of any previous data. Ideally, if model $j$ is similar to the new data, then the distributions $GP_{j}^{upd}$ and $GP_{J+1}$ should agree well over the new data. Let $\mathbf{X}_{new}\subset\cal X$ denote the locations of the new measurements. We measure the agreement by computing the squared Wasserstein distance between the newly instantiated and updated posterior evaluated at $\mathbf{X}_{new}$, given by $\displaystyle w_{j}^{new}\\!\\!\\!=\\!\\!\|\mathbf{m}_{J\\!+\\!1}\\!-\\!\mathbf{m}_{j,X}^{upd}\|^{2}\\!\\!+\\!\textrm{tr}\left(\\!\\!\mathbf{S}_{J\\!+\\!1}\\!\\!+\\!\mathbf{S}_{j,X}^{upd}\\!-\\!2\left(\mathbf{S}_{J+1}^{1/2}\mathbf{S}_{j,X}^{upd}\mathbf{S}_{J\\!+\\!1}^{1/2}\right)^{\\!\\!1/2}\right),$ where $\displaystyle\mathbf{m}_{J+1}$ $\displaystyle\triangleq m_{J+1}(\mathbf{X}_{new}),$ $\displaystyle\mathbf{S}_{J+1}$ $\displaystyle\triangleq k_{J+1}(\mathbf{X}_{new},\mathbf{X}_{new})$ $\displaystyle\mathbf{m}_{j,X}^{upd}$ $\displaystyle\triangleq m_{j}^{upd}(\mathbf{X}_{new}),$ $\displaystyle\mathbf{S}_{j,X}^{upd}$ $\displaystyle\triangleq k_{j}^{upd}(\mathbf{X}_{new},\mathbf{X}_{new}).$ Thus, the net measure of similarity $w_{j}$ is the aggregation of the squared- Wasserstein distance between the previous model $GP_{j}$ and its updated variant $GP_{j}^{upd}$ evaluated at the old pseudo-inputs $\mathbf{Z}_{j}$, which serve as a proxy for previously seen data, and the squared distance between $GP_{j}^{upd}$ and the new model $GP_{J+1}$ evaluated at the new measurement locations $\mathbf{X}_{new}$: $\displaystyle w_{j}=w_{j}^{new}+w_{j}^{old},$ $\displaystyle j=1,\dots,J.$ (6) Input : Instantiation threshold $\epsilon$ Output : Collection of models $\\{GP\\}_{j=1}^{J_{k+1}}$ $\mathcal{D}_{new}^{1}\leftarrow$ Receive $1^{st}$ batch of data; $GP_{1}\leftarrow$ Init. new $GP$ with $\mathcal{D}_{new}^{1}$ (Eq. (4)); for _k = 2,3,…_ do $\mathcal{D}_{new}^{k}\leftarrow$ Receive new batch of data; $GP_{J_{k}+1}\leftarrow$ Init. new $GP$ with $\mathcal{D}_{new}^{k}$ (Eq. (4)); for _$j=1:J_{k}$_ do $GP_{j}^{upd}\leftarrow$ Update $GP_{j}$ with $\mathcal{D}_{new}^{k}$ (Eq. (5)); $w_{j}^{old}\leftarrow$ Similarity wrt previous predictions; $w_{j}^{new}\leftarrow$ Similarity wrt new data; $w_{j}=w_{j}^{old}+w_{j}^{new}$ ; end for $w_{j^{*}}=\min{w_{j}}$ ; if _$w_{j^{*}}\leq\epsilon$_ then $\\{GP_{j}\\}_{j=1}^{J_{k+1}}\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\setminus\\{GP_{j*}\\}\cup\\{GP_{j*}^{upd}\\}$; else $\\{GP_{j}\\}_{j=1}^{J_{k+1}}\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\cup\\{GP_{J_{k}+1}\\}$. end if end for Algorithm 1 Wasserstein-Splitting GP Regression (WGPR): train online approximate GP ensemble. Once we compute $w_{j}$ for all $j$, we define the most similar model $GP_{j^{*}}$ as the one that minimizes (6) , i.e., $j^{*}=\operatorname*{arg\,min}_{j=1,\dots,J}{w_{j}}$ and provided it is sufficiently similar, meaning $w_{j^{*}}$ is less than a user-defined threshold $\epsilon$, we retain the updated model $GP_{j*}^{upd}$. All other models revert back to their previous state, prior to the update, and the newly instantiated model $GP_{J+1}$ is discarded. However, if $GP_{*}$ is not sufficiently similar, then we retain $GP_{J+1}$ and revert all local models back to their state prior to the update. To be more precise, denote $J_{k}$ as the number of ensemble models at time $k$. Upon observing mini-batch $\mathcal{D}_{new}^{k}$, we update model $GP_{j^{*}}$ if (6) is less than a threshold $\epsilon$, otherwise we add $GP_{J_{K}+1}$ to the collection; succinctly stated as $\displaystyle\\{GP_{j}\\}_{j=1}^{J_{k+1}}$ $\displaystyle\leftarrow\left\\{\\{GP_{j}\\}_{j=1}^{J_{k}}\setminus\\{GP_{j*}\\}\right\\}\cup\\{GP_{j*}^{upd}\\}$ $\displaystyle\text{ if }w_{j^{*}}\leq\epsilon$ $\displaystyle\\{GP_{j}\\}_{j=1}^{J_{k+1}}$ $\displaystyle\leftarrow\\{GP_{j}\\}_{j=1}^{J_{k}}\cup\\{GP_{J_{k}+1}\\}$ $\displaystyle\text{ if }w_{j^{*}}>\epsilon$ (7) We summarize the process of iteratively developing the collection of models $\\{GP_{j}\\}_{j=1}^{J_{k}}$ in Algorithm 1. ### III-B Model Evaluation and Prediction The previous approaches [39, 4, 12] propose combining predictions from various models to form a single weighted prediction, as mentioned in the preceding section, mostly inspired by ensemble [36] and local kernel smoothing techniques [37, 38]. However, the validity of doing so hinges upon an i.i.d. stationarity hypothesis for the unknown data distribution. This makes these approaches well-suited to capture global patterns (long-term spatial correlations) in data at the expense of filtering out local patterns [25]. In an effort to preserve the non-stationary features of a heterogeneous spatial field, we predict the spatial field at a location of interest $\mathbf{x}_{s}$ by considering the model with the pseudo-input closest to $\mathbf{x}_{s}$ evaluated as $GP_{*}=\operatorname*{arg\,min}_{j=1:J}{\left\\{\min_{\mathbf{z}_{i}\in\mathbf{Z}_{j}}{\|\mathbf{z}_{i}-\mathbf{x}_{s}\|^{2}}\right\\}}$, and using $GP_{*}(m_{*}(\cdot),k_{*}(\cdot,\cdot))$ to predict $f(\mathbf{x}_{s})\sim\mathcal{N}(\mu_{s},\sigma_{s}^{2})$ where $\mu_{s}=m_{*}(\mathbf{x}_{s})$ and $\sigma^{2}_{s}=k_{*}(\mathbf{x}_{s},\mathbf{x}_{s})$, with the posterior given by the VFE approximation (4) for models that have not undergone a recursive update. Models that have been recursively updated have the posterior mean and covariance functions given by (5). This better encompasses non- stationarity and heterogeneous nonlinearities, although it may be susceptible to sub-sampling bias or discontinuities as a respective function of the the number of pseudo-inputs in a local model or the kernel hyperparameters. Figure 1: Toy example motivating our definition of similarity. The training data in (a) is generated from two distinct Gaussian processes with known hyperparameters. By defining similarity in terms of the posterior predictive model, WGPR identifies the two models as seen in (b). Other methods that define similarity based on proximity in input space fail to capture to the two underlying models succinctly as indicated by the 16 models in (c). ## IV Empirical Assessment In this section, we explore the performance of WGPR across various numerical experiments. We start with a 1-dimensional toy example that motivates defining model similarity in terms of the Wasserstein metric over posterior distributions rather than simply distance in feature space (or a positive definite map thereof). Next, the performance of WGPR is compared to SOLAR-GP [12], which has the same algorithmic structure and Gaussian process model representation, but defines similarity in terms of Euclidean distance. The purpose of this comparison is to highlight the difference in performance due to the new similarity metric and using the prediction of the nearest model. Lastly, we compare the performance of several methods, that learn hyperparameters online, with LGPR, which is optimal in the sense that hyperparameters are learned offline on a training set characteristic of the entire domain. In all comparisons, we evaluate the methods on a real-world bathymetry dataset collected at Claytor Lake in Southwest Virginia, as well as four other publicly accessible datasets222Kin40k: https://www.cs.toronto.edu/$\sim$delve/data/kin/desc.html Abalone: https://archive.ics.uci.edu/ml/datasets/abalone Sarcos Joint 1: http://www.gaussianprocess.org/gpml/data/ Pumadyn(8nm): https://www.cs.toronto.edu/$\sim$delve/data/pumadyn/desc.html. Our MATLAB-based implementation uses the gradient optimizer and covariance kernel functionality provided by the GPML toolbox[44]. ### IV-A Toy-example To illustrate the motivation behind our definition of similarity, consider the non-stationary dataset depicted in Figure 1(a). This dataset was constructed from two different Gaussian process models with known hyperparameters. Ideally, this data set could be concisely described with two models. The dataset is processed in mini-batches of size $N_{new}=100$ in spatial order from $\mathbf{x}=0$ to $\mathbf{x}=300$ and each local model employs $M=50$ pseudo points. Provided the instantiation threshold $\epsilon$ is set appropriately, WGPR is able to identify the two underlying models as seen in 1(b). Regardless of how the instantiation threshold is set, SOLAR GP is incapable of succinctly identifying the two underlying models in 1(a) because a new model is instantiated provided new data is sufficiently far from all other existing models. This phenomenon is demonstrated by the 16 models in 1(c). WGPR, with 2 models, achieves a root mean squared error (RMSE) of 0.26. SOLAR GP, with 16 models, achieves an RMSE of 0.39. ### IV-B Comparison of Online Local GPs on Real Data To examine how our new definition of similarity and making predictions based on the nearest model impact performance, we conducted experiments to examine the difference in performance between WGPR and SOLAR GP [12]. In theory, the model instantiation threshold can be set to achieve anywhere from a single model to the maximum allowable number of models (as dictated by the number of batches of training data). So ideally, the comparison should highlight the performance difference between the two methods as a function of the number of models used. Thus, the instantiation thresholds are set separately for WGPR and SOLAR to yield approximately the same number of models. Training data was processed in batches of size $N_{new}=100$ and we employed $M=50$ pseudo points for each individual Gaussian process model. Additionally, we note that for WGPR, computing the similarity metric $w_{j}$ for each $j=1:J$ can be computationally prohibitive. In practice, we can reduce computational complexity by computing the similarity metric over the $\hat{J}\leq J$ models closest in terms of Euclidean distance in input space given by $\|\mathbf{c}_{j}-\mathbf{c}_{new}\|^{2}$ for $j=1,\dots,J$, where $\mathbf{c}_{j}\in\mathcal{X}$ is the arithmetic center of the pseudo-inputs of model $j$ and $\mathbf{c}_{new}\in\mathcal{X}$ is the arithmetic center of the new batch of data. For the experiments in this subsection and the following, we fix $\hat{J}=5$. Although the $\hat{J}$ nearest models are selected on the basis of proximity, similar to [4, 12], the decision to instantiate a new model or update an existing one is ultimately dictated by the similarity measure $\eqref{eq: sim metric}$. This distinction is particularly important for cases in which two regions, that are close in proximity, are characterized by different spatial fields. Provided the regions are sufficiently close, a distance-based similarity metric will incorporate these two different spatial fields into one. In contrast, we can use the similarity measure (6), based on predictive distributions, to identify that these two regions are best-characterized by two models and thereby employ two models to avoid the pathology. For the comparison of SOLAR GP and WGPR, we began by setting the instantiation thresholds to yield the maximum number of allowable models and progressively adjusted the thresholds to yield fewer models. For SOLAR GP, despite meticulous tuning of the number of pseudo points and mini-batch size, we regularly observed divergence in the Claytor lake, Abalone, and Sarcos data sets. By divergence, we mean that the posterior mean evaluated at the pseudo- inputs, i.e $m(\mathbf{Z}_{b})$, tended to infinity for some local models. This is due to the online update of the VFE posterior approximation [23], which only guarantees we recover the batch posterior and marginal likelihood approximation [13] when the hyperparameters and pseudo-inputs are fixed in advance. When operating with online updates, however, it is possible that pseudo-inputs become very concentrated in a small region of the feature space, causing kernel matrices to become near-singular. Figure 2: Comparison of the performance difference between our method (WGPR) and SOLAR GP [12] on the kin40k dataset. Regardless of the number of models used, WGPR outperforms the other online methods at the expense of additional computations required to compute new similarity metric. With our definition of similarity (6), on the other hand, we can identify when a stable update can be performed, as the effect of the posterior update is reflected in our similarity metric. In other words, if an EP update with the new data $D_{new}$ causes numerical instability for model $j$, then clearly model $j$ is not a suitable candidate to be updated. For our numerical experiments with WGPR, we observed this had the effect of preserving convergence, and overall requiring significantly fewer models on a consistent basis than SOLAR GP. For example, given the batch size of $N_{new}=100$, the maximum number of models that can be instantiated with the Claytor Lake dataset is 127. We were consistently able to achieve as few as 14.6 models, which is the average across 5 trials, with standardized MSE of 0.097, whereas SOLAR GP only achieves sensible predictive performance when there are more than 108.8 models, on average, with standarized MSE of 0.183. Thus, for the Claytor Lake, Sarcos, and Abalone data sets, we can only non-trivially compare predictive performance between SOLAR GP and WGPR in the setting where a new model is instantiated with each new batch of data. We observed that WGPR outperformed SOLAR on the Claytor Lake and Sarcos data sets, and both methods achieved approximately the same predictiableve performance on the Abalone data set. For the Kin40k dataset, however, we were able to achieve stable performance for SOLAR GP across various numbers of models employed. We illustrate the overall performance difference between WGPR and SOLAR GP in Figure 2. We report the root MSE, along with the training frequency achieved by both methods. Training frequency refers to how many samples are processed per second. Observe that for a given number of models, WGPR outperforms SOLAR GP in terms of predictive performance. This is at the expense of additional computational complexity, as reflected by the lower training frequency. Additionally, we note that the predictive performance of approximately 10 models with WGPR is superior to SOLAR GP’s best-case predictive performance which occurs with approximately 100 models. For applications in which the size of the map representation is critical, as in communication-limited applications, this is a significant advantage for WGPR. We conclude by stating that we were also able to achieve stable performance for SOLAR GP on the Pumadyn dataset and observed that SOLAR GP (RMSE = 1.088) outperformed WGPR (RMSE = 1.142). However, performance was approximately constant across the number of models used, and thus we omit the performance plots for the sake of space limitations. Figure 3: Evolution of the RMSE as more training batches are processed for Claytor Lake (a) and the Sarcos (b) datasets for SOLAR GP [12], WGPR, and the offline benchmark LGPR [4]. Observe that as more training examples are processed, we approach the performance of the offline method. ### IV-C Offline Benchmark In various practical applications, there is no a priori access to a dataset, characteristic of the entire state space, to learn the hyperparameters of the predictive model. To cope with these situations, we require that our method have the ability to iteratively update the hyperparameters of the predictive model as new training data is received. As local Gaussian process regression (LGPR) [4] learns the hyperparameters on a characteristic subset of all training data prior to building the prediction model, we consider this an appropriate offline benchmark to assess the predictive performance of WGPR and SOLAR GP. Given that there are parameters unique to each method and LGPR employs the exact posterior (2) for each model, we manually tune the parameters to achieve the best possible predictive performance (averaged across 5 trials) for all algorithms and compare them. We depict the results for Claytor Lake and the Sarcos dataset in Figure 3 (a) and (b), respectively. Here, we see that as more training data is collected, the predictive performance of WGPR tends to LGPR and in both cases WGPR outperforms SOLAR GP. Moreover, for the Claytor Lake dataset, WGPR outperforms LGPR. This is consistent with the intuition that given the dataset is known to be nonstationary, we expect WGPR to outperform LGPR, as LGPR requires all models to have the same set of hyperparameters whereas WGPR does not. For all datasets, we collect the training time (seconds) and RMSE after processing the entire dataset in Tables II and III, respectively. We delineate LGPR from all other methods that iteratively learn hyperparameters using a dashed lined. We also included the online VFE method of Bui et al. [23], which we denote by OVFE. Note that entries in the table containing a “-” indicate the algorithm failed to converge. By and large, we see that at the expense of additional computational time WGPR either outperforms or attains comparable performance with all other methods that iteratively learn the hyperparameters, and we achieve comparable performance with the offline benchmark. Note that LGPR exhibits the least computational time as all hyperparameter learning is only done once, prior to allocating samples to their respective models. The methods that learn hyperparameters online require more computation time, and as WGPR computes the Wasserstein metric over various candidate posterior distributions it incurs the greatest computational time. TABLE II: Training time (s) of online methods and the offline benchmark LGPR | Claytor Lake | Sarcos | kin40k | Abalone | Pumadyn ---|---|---|---|---|--- LGPR [4] | 39.484 | 347.857 | 31.221 | 13.221 | 38.138 WGPR | 210.053 | 870.358 | 202.184 | 62.912 | 120.836 SOLAR [12] | 131.417 | 477.143 | 119.403 | 40.126 | 76.353 OVFE [23] | - | - | 115.902 | - | 45.267 TABLE III: RMSE of online methods and the offline benchmark LGPR | Claytor Lake | Sarcos | kin40k | Abalone | Pumadyn ---|---|---|---|---|--- LGPR [4] | 1.381 | 3.195 | 0.231 | 2.07 | 1.079 WGPR | 1.362 | 4.476 | 0.797 | 2.487 | 1.137 SOLAR [12] | 3.524 | 12.686 | 0.910 | 2.887 | 1.085 OVFE [23] | - | - | 0.996 | - | 2.482 ## V Conclusion Our empirical results demonstrate that WGPR achieves comparable, if not superior, predictive performance to other methods that iteratively learn hyperparameters. Our new measure of similarity not only allows us to succinctly characterize a non-stationary spatial field, but more importantly offers the ability to prevent the pathology that can arise when using proximity-based similarity metrics: measurements from two regions of the spatial field, best characterized by different hyperparameters, are merged to form a single model because the regions were sufficiently close in proximity. For WGPR, there are two user-specified parameters: the instantiation threshold $\epsilon$, and the number of inducing inputs $M$ in each Gaussian process model. In practice, $\epsilon$ can be made “large” to yield a map representation with fewer models if memory or transmitting data is a concern, as it is in communication-limited environments like the sub-sea domain [45]. However, this is at the potential cost of a loss in accuracy, as two models that may be best characterized by two distinct models may effectively be averaged into a single model. In contrast, if the size of the map representation is not a concern, $\epsilon$ can be made “small” in an effort to give rise to more models that may be more accurate. However it remains an open question of how to precisely define “large” and “small” as the similarity metric (6) is not generalizable across data sets. An interesting avenue of further research is to conduct isolation studies to understand the individual implications of each element: (i) Wasserstein- splitting, (ii) prediction of the nearest model, and (iii) the expectation propagation steps. Additionally, studies to better understand how computing the similarity metric over the $\hat{J}\leq J$ nearest models impacts performance are of interest. Lastly, we seek principled methods to determine the number of pseudo-points in each local model to ensure a certain quality of approximation. ## References * [1] C. E. Rasmussen, “Gaussian processes in machine learning,” in _Advanced lectures on machine learning_. Springer, 2004, pp. 63–71. * [2] S. Vasudevan, F. Ramos, E. Nettleton, and H. Durrant-Whyte, “Gaussian process modeling of large-scale terrain,” _Journal of Field Robotics_ , vol. 26, no. 10, pp. 812–840, 2009. * [3] A. Krause, A. Singh, and C. Guestrin, “Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies,” _Journal of Machine Learning Research_ , vol. 9, no. Feb, pp. 235–284, 2008\. * [4] D. Nguyen-Tuong, M. Seeger, and J. Peters, “Model learning with local gaussian process regression,” _Advanced Robotics_ , vol. 23, no. 15, pp. 2015–2034, 2009. * [5] M. P. Deisenroth, D. Fox, and C. E. Rasmussen, “Gaussian processes for data-efficient learning in robotics and control,” _IEEE transactions on pattern analysis and machine intelligence_ , vol. 37, no. 2, pp. 408–423, 2013\. * [6] G. Pillonetto, F. Dinuzzo, T. Chen, G. De Nicolao, and L. Ljung, “Kernel methods in system identification, machine learning and function estimation: A survey,” _Automatica_ , vol. 50, no. 3, pp. 657–682, 2014. * [7] M. Liu, G. Chowdhary, B. C. Da Silva, S.-Y. Liu, and J. P. How, “Gaussian processes for learning and control: A tutorial with examples,” _IEEE Control Systems Magazine_ , vol. 38, no. 5, pp. 53–86, 2018. * [8] R. Senanayake and F. Ramos, “Bayesian hilbert maps for dynamic continuous occupancy mapping,” in _Conference on Robot Learning_ , 2017, pp. 458–471. * [9] E. Zobeidi, A. Koppel, and N. Atanasov, “Dense incremental metric-semantic mapping via sparse gaussian process regression,” in _IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_ , 2020. * [10] A. W. van der Vaart and J. H. van Zanten, “Rates of contraction of posterior distributions based on gaussian process priors,” _The Annals of Statistics_ , pp. 1435–1463, 2008. * [11] F. Meier and S. Schaal, “Drifting gaussian processes with varying neighborhood sizes for online model learning,” in _2016 IEEE International Conference on Robotics and Automation (ICRA)_. IEEE, 2016, pp. 264–269. * [12] B. Wilcox and M. C. Yip, “Solar-gp: Sparse online locally adaptive regression using gaussian processes for bayesian robot model learning and control,” _IEEE Robotics and Automation Letters_ , vol. 5, no. 2, pp. 2832–2839, 2020\. * [13] M. Titsias, “Variational learning of inducing variables in sparse gaussian processes,” in _Artificial Intelligence and Statistics_ , 2009, pp. 567–574. * [14] E. Snelson and Z. Ghahramani, “Sparse gaussian processes using pseudo-inputs,” in _Advances in neural information processing systems_ , 2006, pp. 1257–1264. * [15] M. Seeger, C. Williams, and N. Lawrence, “Fast forward selection to speed up sparse gaussian process regression,” in _Artificial Intelligence and Statistics 9_ , no. EPFL-CONF-161318, 2003. * [16] A. J. Smola and P. L. Bartlett, “Sparse greedy gaussian process regression,” in _Advances in neural information processing systems_ , 2001, pp. 619–625. * [17] C. K. Williams and M. Seeger, “Using the nyström method to speed up kernel machines,” in _Advances in neural information processing systems_ , 2001, pp. 682–688. * [18] A. Solin and S. Särkkä, “Hilbert space methods for reduced-rank gaussian process regression,” _Statistics and Computing_ , pp. 1–28, 2014\. * [19] M. McIntire, D. Ratner, and S. Ermon, “Sparse gaussian processes for bayesian optimization,” in _Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence_. AUAI Press, 2016, pp. 517–526. * [20] M. Lázaro-Gredilla, J. Quinonero-Candela, C. E. Rasmussen, and A. R. Figueiras-Vidal, “Sparse spectrum gaussian process regression,” _The Journal of Machine Learning Research_ , vol. 11, pp. 1865–1881, 2010. * [21] A. Koppel, H. Pradhan, and K. Rajawat, “Consistent online gaussian process regression without the sample complexity bottleneck,” _arXiv preprint arXiv:2004.11094_ , 2020. * [22] L. Csató, “Gaussian processes: iterative sparse approximations,” Ph.D. dissertation, Aston University, 2002. * [23] T. D. Bui, C. Nguyen, and R. E. Turner, “Streaming sparse gaussian process approximations,” in _Advances in Neural Information Processing Systems_ , 2017, pp. 3299–3307. * [24] T. Broderick, N. Boyd, A. Wibisono, A. C. Wilson, and M. I. Jordan, “Streaming variational bayes,” in _Advances in neural information processing systems_ , 2013, pp. 1727–1735. * [25] H. Liu, Y.-S. Ong, X. Shen, and J. Cai, “When gaussian process meets big data: A review of scalable gps,” _arXiv preprint arXiv:1807.01065_ , 2018. * [26] J. Shi, M. Titsias, and A. Mnih, “Sparse orthogonal variational inference for gaussian processes,” in _International Conference on Artificial Intelligence and Statistics_. PMLR, 2020, pp. 1932–1942. * [27] D. Burt, C. E. Rasmussen, and M. Van Der Wilk, “Rates of convergence for sparse variational gaussian process regression,” in _International Conference on Machine Learning_ , 2019, pp. 862–871. * [28] A. Wilson and H. Nickisch, “Kernel interpolation for scalable structured gaussian processes (kiss-gp),” in _International Conference on Machine Learning_ , 2015, pp. 1775–1784. * [29] S. Remes, M. Heinonen, and S. Kaski, “Non-stationary spectral kernels,” in _Advances in neural information processing systems_ , 2017, pp. 4642–4651. * [30] C. Toth and H. Oberhauser, “Variational gaussian processes with signature covariances,” _arXiv preprint arXiv:1906.08215_ , 2019. * [31] C. J. Paciorek and M. J. Schervish, “Nonstationary covariance functions for gaussian process regression.” in _NIPS_. Citeseer, 2003, pp. 273–280. * [32] K. Blomqvist, S. Kaski, and M. Heinonen, “Deep convolutional gaussian processes,” in _Joint European Conference on Machine Learning and Knowledge Discovery in Databases_. Springer, 2019, pp. 582–597. * [33] R. Senanayake, A. Tompkins, and F. Ramos, “Automorphing kernels for nonstationarity in mapping unstructured environments,” in _Conference on Robot Learning_. PMLR, 2018, pp. 443–455. * [34] N. Littlestone and M. K. Warmuth, “The weighted majority algorithm,” _Information and computation_ , vol. 108, no. 2, pp. 212–261, 1994. * [35] D. Fudenberg and D. Levine, “Consistency and cautious fictitious play,” _Journal of Economic Dynamics and Control_ , 1995. * [36] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line learning and an application to boosting,” _Journal of computer and system sciences_ , vol. 55, no. 1, pp. 119–139, 1997. * [37] E. A. Nadaraya, “On estimating regression,” _Theory of Probability & Its Applications_, vol. 9, no. 1, pp. 141–142, 1964. * [38] G. S. Watson, “Smooth regression analysis,” _Sankhyā: The Indian Journal of Statistics, Series A_ , pp. 359–372, 1964. * [39] S. Vijayakumar, A. D’souza, and S. Schaal, “Incremental online learning in high dimensions,” _Neural computation_ , vol. 17, no. 12, pp. 2602–2634, 2005. * [40] F. Meier, P. Hennig, and S. Schaal, “Incremental local gaussian regression,” in _Advances in Neural Information Processing Systems_ , 2014, pp. 972–980. * [41] C. K. Williams and C. E. Rasmussen, _Gaussian processes for machine learning_. MIT press Cambridge, MA, 2006, vol. 2, no. 3. * [42] V. M. Panaretos and Y. Zemel, “Statistical aspects of wasserstein distances,” _Annual review of statistics and its application_ , vol. 6, pp. 405–431, 2019\. * [43] L. Wasserman, _All of nonparametric statistics_. Springer Science & Business Media, 2006. * [44] C. E. Rasmussen and H. Nickisch, “Gaussian processes for machine learning (gpml) toolbox,” _The Journal of Machine Learning Research_ , vol. 11, pp. 3011–3015, 2010. * [45] M. E. Kepler and D. J. Stilwell, “An approach to reduce communication for multi-agent mapping applications,” in _2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)_. IEEE, 2020, pp. 4814–4820.
arxiv-papers
2021-07-26T17:52:46
2024-09-04T03:07:21.577163
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Michael E. Kepler, Alec Koppel, Amrit Singh Bedi, and Daniel J.\n Stilwell", "submitter": "Michael Kepler Jr", "url": "https://arxiv.org/abs/2107.12797" }
2107.12800
11institutetext: CentraleSupélec, Paris-Saclay University, Mathématiques et Informatique pour la Complexité et les Systèmes, Gif-sur-Yvette, France. 22institutetext: Radiology Department, Hôpital Cochin AP-HP, Paris, France 33institutetext: Inria Saclay, Gif-sur-Yvette, France 44institutetext: Centre National de Recherche Scientifique, LIP6, Paris, France 55institutetext: Therapanacea, Paris, France # Deep Reinforcement Learning for L3 Slice Localization in Sarcopenia Assessment Othmane Laousy 112233 Guillaume Chassagnon 22 Edouard Oyallon 44 Nikos Paragios 55 Marie-Pierre Revel 22 Maria Vakalopoulou 1133 ###### Abstract Sarcopenia is a medical condition characterized by a reduction in muscle mass and function. A quantitative diagnosis technique consists of localizing the CT slice passing through the middle of the third lumbar area (L3) and segmenting muscles at this level. In this paper, we propose a deep reinforcement learning method for accurate localization of the L3 CT slice. Our method trains a reinforcement learning agent by incentivizing it to discover the right position. Specifically, a Deep Q-Network is trained to find the best policy to follow for this problem. Visualizing the training process shows that the agent mimics the scrolling of an experienced radiologist. Extensive experiments against other state-of-the-art deep learning based methods for L3 localization prove the superiority of our technique which performs well even with a limited amount of data and annotations. ###### Keywords: L3 slice CT slice localization Deep Reinforcement Learning Sarcopenia ## 1 Introduction Sarcopenia corresponds to muscle atrophy which may be due to ageing, inactivity, or disease. The decrease of skeletal muscle is a good indicator of the overall health state of a patient [11]. In oncology, it has been shown that sarcopenia is linked to outcome in patients treated by chemotherapy [14, 5], immunotherapy [20], or surgery [9]. There are multiple definitions of sarcopenia [7, 23] and consequently multiple ways of assessing it. On CT imaging, the method used is based on muscle mass quantification. Muscle mass is most commonly assessed at a level passing through the middle of the third lumbar vertebra area (L3), which has been found to be representative of the body composition [29]. After manual selection of the correct CT slice at the L3 level, segmentation of muscles is performed to calculate the skeletal muscle area [8]. In practice, the evaluation is tedious, time-consuming, and rarely done by radiologists, highlighting the need for an automatic diagnosis tool that could be integrated into clinical practice. Such automated measurement of muscle mass could be of great help for introducing sarcopenia assessment in daily clinical practice. Muscle segmentation and quantification on a single slice have been thoroughly addressed in multiple works using simple 2D U-Net like architectures [4, 6]. Few works, however, focus on L3 slice detection. The main challenges for solving this task rely on the inherent diversity in patient’s anatomy, the strong resemblance between vertebrae, the variability of CT fields of view as well as their acquisition and reconstruction protocols. The most straightforward approach to address L3 localization is by investigating methods for multiple vertebrae labeling in 3D images using detection [25] or even segmentation algorithms [22]. Such methods require a substantial volume of annotations and are computationally inefficient when dealing with the entire 3D CT scan. In fact, even if our input is 3D, a one- dimensional output as the $z$-coordinate of the slice is sufficient to solve the L3 localization problem. In terms of L3 slice detection, the closest methods leverage deep learning [3, 13] and focus on training simple convolutional neural networks (CNN). These techniques use maximal intensity projection (MIP), where the objective is to project voxels with maximal intensity values into a 2D plane. Frontal view MIP projections contain enough information towards the body and vertebra’s bone structure differentiation. On the sagittal view, restricted MIP projections are used to focus solely on the spinal area. In [3] the authors tackle this problem through regression, training the CNN with parts of the MIP that contain the L3 vertebra only. More recently, in [13] a UNet-like architecture (L3UNet-2D) is proposed to draw a 2D confidence map over the position of the L3 slice. In this paper, we propose a reinforcement learning algorithm for accurate detection of the L3 slice in CT scans, automatizing the process of sarcopenia assessment. The main contribution of our paper is a novel formulation for the problem of L3 localization, exploiting different deep reinforcement learning (DRL) schemes that boost the state of the art for this challenging task, even on scarce data settings. Moreover, in this paper we demonstrate that the use of 2D approaches for vertebrae detection provides state of the art results compared to 3D landmark detection methods, simplifying the problem, reducing the search space and the amount of annotations needed. To the best of our knowledge, this is the first time a reinforcement learning algorithm is explored on vertebrae slice localization, reporting performances similar to medical experts and opening new directions for this challenging task. ## 2 Background Reinforcement Learning is a fundamental tool of machine learning which allows dealing efficiently with the exploration/exploitation trade-off [24]. Given state-reward pairs, a reinforcement learning agent can pick actions to reach unexplored states or increase its accumulated future reward. Those principles are appealing for medical applications because they imitate a practitioner’s behavior and self-learn from experience based on ground-truth. One of the main issues of this class of algorithm is its sample complexity: a large amount of interaction with its environment is needed before obtaining an agent close to an optimal state [26]. However, those techniques were recently combined with deep learning approaches, which efficiently addressed this issue [17] by incorporating priors based on neural networks. In the context of highly- dimensional computer vision applications, this approach allowed RL algorithms to obtain outstanding accuracy [12] in a variety of tasks and applications. In medical imaging, model-free reinforcement learning algorithms are highly used for landmark detection [10] as well as localization tasks [16]. In [1], a Deep Q-Network (DQN) that automates the view planning process on brain and cardiac MRI was proposed. This framework takes as an input a single plane and updates its angle and position during the training process until convergence. Moreover, in [27] the authors again present a DQN framework for the localization of different anatomical landmarks introducing multiple agents that act and learn simultaneously. DRL has also been studied for object or lesion localization. More recently, in [19] the authors propose a DQN framework for the localization of $6$ different organs from CT scans achieving a performance comparable to supervised CNNs. This framework uses a $3$D volume as input with $11$ different actions to generate bounding boxes for these organs. Our work is the first to explore and validate a RL scheme on MIP representations for a single slice detection using the discrete and 2D nature of the problem. ## 3 Reinforcement Learning Strategy In this paper, we formulate the slice localization problem as a Markov Decision Process (MDP), which contains a set of states $S$, actions $A$, and rewards $R$. States $S$: For our formulation, the environment $\mathcal{E}$ that we explore and exploit is a $2$D image representing the frontal MIP projection of the $3$D CT scans. This projection allows us to reduce our problem’s dimensionality from a volume of size $512\times 512\times N$ ($N$ being the varying heights of the volumes) to an image of size $512\times N$. The reinforcement learning agent is self-taught by interacting with this environment, executing a set of actions, and receiving a reward linked to the action taken. An input example is shown in Figure 1. We define a state $s\in S$ as an image of size $512\times 200$ in $\mathcal{E}$. We consider the middle of the image to be the slice’s current position on a $z$-axis. To highlight this, we assign a line of maximum intensity pixel value to the middle of each image provided as input to our DQN. Actions $A$: We define a set of discrete actions $\mathcal{A}=\\{t^{+}_{z},t^{-}_{z}\\}\in\mathbb{R}^{2}$. $t^{+}_{z}$ corresponds to a positive translation (going up by one slice) and $t^{-}_{z}$ corresponds to a negative translation (going down by one slice). These two actions allow us to explore the entirety of our environment $\mathcal{E}$. Rewards $R$: In reinforcement learning designing a good reward function is crucial in learning the goal to achieve. To measure the quality of taking an action $a\in A$ we use the distance over $z$ between the current slice and the annotated slice $g$. The reward for non-terminating states is computed with: $R_{a}(s,s^{\prime})=sign(\mathcal{D}(p,g)-\mathcal{D}(p^{\prime},g))$ (1) where we denote as $s$ and $s^{\prime}$ the current and next state and $g$ the ground truth annotation. Moreover, our positions $p$ and $p^{\prime}$ are the $z$-coordinates of the current and next state respectively. $\mathcal{D}$ is the Euclidean distance between both coordinates over the $z$-axis. The reward is non-sparse and binary $r\in\\{-1,+1\\}$ and helps the agent differentiate between good and bad actions. A good action being when the agent gets closer to the correct slice. For a terminating state, we assign a reward of $r=0.5$. Starting States: An episode starts by randomly sampling a slice over the $z$-axis and ends when the agent has achieved its goal of finding the right slice. The agent then executes a set of actions and collects rewards until the episode terminates. When reaching the upper or lower borders of an image, the current state is assigned to the next state (i.e., the agent does not move), and a reward of $r=-1$ is appointed to this action. Final States: During training, a terminal state is defined as a state in which the agent has reached the right slice. A reward of $r=0.5$ is assigned in this case, and an episode is terminated. During testing, the termination of an episode happens when oscillations occur. We adopted the same approach as [1], and chose actions with the lowest $Q$-value, which have been found to be closest to the right slice since the DQN outputs higher $Q$-values to actions when the current slice is far from the ground truth. ### 3.1 Deep Q-Learning To find the optimal policy $\pi^{*}$ of the MDP, a state-action value function $Q(s,a)$ can be learned. In Q-Learning, the expected value of the accumulated discounted future rewards can be estimated recursively using the Bellman optimality equation: $Q_{i+1}(s,a)=\mathbb{E}[r+\gamma\underset{a^{\prime}}{\mathrm{max}}\>Q_{i}(s^{\prime},a^{\prime})\mid s,a]$ (2) In practice, since the state $S$ is not easily exploitable, we can take advantage of neural networks as universal function approximators to approximate $Q(s,a)$ [18]. We utilize an experience replay technique that consists in storing the agent’s experience $e_{t}=(s,a,r,s^{\prime},a^{\prime})$ at each time step in a replay memory $M$. To break the correlation between consecutive samples, we will uniformly batch a set of experiences from $M$. The Deep Q-Network (DQN) will iteratively optimize its parameters $\theta$ by minimizing the following loss function: $L_{i}(\theta_{i})=\mathbb{E}_{(s,a,r,s^{\prime},a^{\prime})}\Big{[}{\big{(}r+\gamma\underset{a^{\prime}}{\mathrm{max}}\>Q_{target}(s^{\prime},a^{\prime};\theta_{i}^{-})-Q_{policy}(s,a;\theta_{i})\big{)}}^{2}\Big{]}$ (3) with $\theta_{i}$ and $\theta_{i}^{-}$ being the parameters of the policy and the target network respectively. To stabilize rapid policy changes due to the distribution of the data and the variations in Q-values, the DQN uses $Q_{target}(\theta_{i}^{-})$, a fixed version of $Q_{policy}(\theta_{i})$ that is updated periodically. For our experiments, we update $\theta_{i}^{-}$ every 50 iterations. ### 3.2 Network Architecture Our Deep Q-Network takes as input the state $s$ and passes it through a convolutional network. The network contains four convolution layers separated by parametric ReLU in order to break the linearity of the network, and four linear layers with LeakyReLU. Contrary to [1], we chose not to add the history of previously visited states in our case. We opted for this approach since there is a single path that leads to the right slice. This approach allows us to simplify our problem even more. Ideally, our agent should learn, just by looking at the current state, whether to go up or down when the current slice is respectively below or above the L3 slice. An overview of our framework is presented in Figure 1. Figure 1: The implemented Deep Q-Network architecture for L3 slice localization. The network takes as input an image of size $512\times 200$ with a single channel. The output is the q-values corresponding to each of the two actions. We also explore dueling DQNs from [28]. Dueling DQNs rely on the concept of an advantage which calculates the benefit that each action can provide. The advantage is defined as $A(s,a)=Q(s,a)-V(s)$ with $V(s)$ being our state value function. This algorithm will use the advantage of the Q-values to distinguish between actions from the state’s baseline values. Dueling DQNs were shown to provide more robust agents that are wiser in choosing the next best action. For our dueling DQN, we use the same architecture as the one in Figure 1 but change the second to last fully connected layer to compute state values on one side, and action values on the other. ### 3.3 Training Since our agent is unaware of the possible states and rewards in $\mathcal{E}$, the exploration step is implemented first. After a few iterations, our agent can start exploiting what it has learned on $\mathcal{E}$. In order to balance between exploration and exploitation, we use an $\epsilon$-greedy strategy. This strategy consists of defining an exploration rate $\epsilon$, which is initialed to $1$ with a decay of $0.1$, allowing the agent to become greedy and exploit the environment. A batch size of $48$ and an experience replay of $17\times 10^{3}$ are used. The entire framework was developed in Pytorch [21] library using an NVIDIA GTX 1080Ti GPU. We trained our model for $10^{5}$ episodes, requiring approximately $20$-$24$ hours. Our source code is available on GitHub: https://git.io/JRyYw. ## 4 Experiments and Results ### 4.1 Dataset A diverse dataset of $1000$ CT scans has been retrospectively collected for this study. CT scans were acquired on four different CT models from three manufacturers (Revolution HD from GE Healthcare, Milwaukee, WI; Brillance 16 from Philips Healthcare, Best, Netherlands; and Somatom AS+ & Somatom Edge from Siemens Healthineer, Erlangen, Germany). Exams were either abdominal, thoracoabdominal, or thoraco-abdominopelvic CT scans acquired with or without contrast media injection. Images were reconstructed using abdominal kernel with either filtered back-projection or iterative reconstruction. Slice thickness ranged from $0.625$ to $3$mm, and the number of slices varied from $121$ to $1407$. The heterogeneity of our dataset highlights the challenges of the problem from a clinical perspective. Experienced radiologists manually annotated the dataset, indicating the position of the middle of the L3 slice. Before computing the MIP, all of the CT scans are normalized to $1mm$ over the $z$-axis. This normalisation step harmonises our network’s input, especially since the agent performs actions along the $z$-axis. After the MIP, we apply a threshold of $100$ HU (Hounsfield Unit) to $1500$ HU allowing us to eliminate artifacts and foreign metal bodies while keeping the skeleton structure. The MIP are finally normalized to [0,1]. From the entire dataset, we randomly selected $100$ patients for testing and the rest $900$ for training and validation. For the testing cohort, annotations of L3 from a second experienced radiologist have been provided to measure the interobserver performance. ### 4.2 Results and Discussion Our method is compared with other techniques from the literature. The error is calculated as the distance in millimeters ($mm$) between the predicted L3 slice and the one annotated by the experts. In particular, we performed experiments with the L3UNet-2D [13] approach and the winning SC-Net [22] method of the Verse2020111https://verse2020.grand-challenge.org/ challenge. Even if SC-Net is trained on more accurate annotations with 3D landmarks as well as vertebrae segmentations, and addresses a different problem, we applied it to our testing cohort. The comparison of the different methods is summarised in Table 1. SC-Net reports $12$ CT scans with an error higher than $10$mm. Moreover, L3UNet-2D [13] reports a mean error of $4.24$mm $\pm 6.97$mm when the method is trained on the entire training set, giving only $7$ scans with an error higher than $10$mm for the L3 detection. Our proposed method gives the lowest errors with a mean error of $3.77$mm$\pm 4.71$mm, proving its superiority. Finally, we evaluated our technique’s performance with a Duel DQN strategy, reporting higher errors than the proposed one. This observation could be linked to the small action space that is designed for this study. Duel DQNs were proven to be powerful in cases with higher action spaces and in which the computation of the advantage function makes a difference. Table 1: Quantitative evaluation of the different methods using different number of training samples (metrics in mm). Method | # of samples | Mean | Std | Median | Max | Error $>10mm$ ---|---|---|---|---|---|--- Interobserver | - | 2.04 | 4.36 | 1.30 | 43.19 | 1 SC-Net [22] | - | 6.78 | 13.96 | 1.77 | 46.98 | 12 L3UNet-2D [13] | 900 | 4.24 | 6.97 | 2.19 | 40 | 7 Ours (Duel-DQN) | 900 | 4.30 | 5.59 | 3 | 38 | 8 Ours | 900 | 3.77 | 4.71 | 2.0 | 24 | 9 L3UNet-2D [13] | 100 | 145.37 | 161.91 | 32.8 | 493 | 68 Ours | 100 | 5.65 | 5.83 | 4 | 26 | 19 L3UNet-2D [13] | 50 | 108.7 | 97.33 | 87.35 | 392.02 | 86 Ours | 50 | 6.88 | 5.79 | 6.5 | 26 | 11 L3UNet-2D [13] | 10 | 242.85 | 73.07 | 240.5 | 462 | 99 Ours | 10 | 8.97 | 8.72 | 7 | 56 | 33 For the proposed reinforcement learning framework, trained on the whole training set, 9 CTs had a detection error of more than $10$mm. These scans were analysed by a medical expert who indicated that $2$ of them have a lumbosacral transitional vertebrae (LSTV) anomaly [15]. Transitional vertebrae cases are common and observed in 15-35% of the population [2] highlighting once again the challenges of this task. For both cases, the localization of the L3 vertebra for sarcopenia assessment is ambiguous for radiologists and consequently for the reinforcement learning agent. In fact, the only error higher than $10mm$ in the interobserver comparison corresponds to an LSTV case where each radiologist chose a different vertebrae as a basis for sarcopenia assessment. Even if the interobserver performance is better than the one reported by the algorithms, our method reports the lowest errors, proving its potential. Qualitative results are displayed in Figure 2. The yellow line represents the medical expert’s annotation and the blue one the prediction of the different employed models. One can notice that all of the different methods converge to the correct L3 region with our method reporting great performance. It is important to note that for sarcopenia assessment, an automatic system does not need to be at the exact middle of the slice; a few millimeters around will not skew the end result since muscle mass in the L3 zone does not change significantly. Concerning prediction times for the RL agent, they depend on the initial slice that is randomly sampled on the MIP. Computed inference time for a single step is approximately 0.03 seconds. Figure 2: Qualitative comparison of different localization methods for two patients. First left to right represents: interobserver ($4mm$/ $2mm$), SC-Net ($4mm$/$2mm$), L3UNet-2D ($8mm$/$1mm$), Ours ($1mm$/$4mm$). In the parenthesis we present the reported errors for the first and second row respectively. The yellow line represents the ground truth and the blue one the prediction. To highlight the robustness of our network on a low number of annotated samples, we performed different experiments using 100, 50, and 10 CTs corresponding respectively to 10%, 5% and 1% of our dataset. We tested those 3 agents on the same 100 patients test set and report results in Table 1. Our experiments prove the robustness of reinforcement learning algorithms compared to traditional CNN based ones [13] in the case of small annotated datasets. One can observe that the traditional methods fail to be trained properly with a small number of annotations, reporting errors higher than $100$mm for all three experiments. In our case, decreasing the dataset size does not significantly affect the performance. In fact, trained on only 10 CTs with the same number of iterations and memory size, our agent was able to learn a correct policy and achieve a mean error of $8.97$mm $\pm$ $8.72$mm. Learning a valid policy from a low number of annotations is one of the strengths of reinforcement learning. Traditional deep learning techniques rely on pairs of images and annotations in order to build a robust generalization. Thus, each pair is exploited only once by the learning algorithm. Reinforcement learning, however, relies on experiences, each experience $e_{t}=(s,a,r,s^{\prime},a^{\prime})$ being a tuple of state, action, reward, next state and next action. Therefore, a single CT scan can provide multiple experiences to the self-learning agent, making our method ideal for slice localization problems using datasets with a limited amount of annotations. ## 5 Conclusion In this paper, we propose a novel direction to address the problem of CT slice localization. Our experiments empirically prove that reinforcement learning schemes work very well on small datasets and boost performance compared to classical convolutional architectures. One limitation of our work lies in the fact that our agent is always moving $1mm$ independently of the location, slowing down the process. In the future, we aim to explore different ways to adapt the action taken depending on the current location, with one possibility being to incentivize actions with higher increments. Future work also includes the use of reinforcement learning in multiple vertebrae detection with competitive or collaborative agents. ## References * [1] Alansary, A., Le Folgoc, L., Vaillant, G., Oktay, O., Li, Y., Bai, W., Passerat-Palmbach, J., Guerrero, R., Kamnitsas, K., Hou, B., et al.: Automatic view planning with multi-scale deep reinforcement learning agents. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. pp. 277–285. Springer (2018) * [2] Apazidis, A., Ricart, P.A., Diefenbach, C.M., Spivak, J.M.: The prevalence of transitional vertebrae in the lumbar spine. The Spine Journal 11(9), 858–862 (2011) * [3] Belharbi, S., Chatelain, C., Hérault, R., Adam, S., Thureau, S., Chastan, M., Modzelewski, R.: Spotting l3 slice in ct scans using deep convolutional network and transfer learning. Computers in biology and medicine 87, 95–103 (2017) * [4] Blanc-Durand, P., Schiratti, J.B., Schutte, K., Jehanno, P., Herent, P., Pigneur, F., Lucidarme, O., Benaceur, Y., Sadate, A., Luciani, A., Ernst, O., Rouchaud, A., Creze, M., Dallongeville, A., et al.: Abdominal musculature segmentation and surface prediction from ct using deep learning for sarcopenia assessment. Diagnostic and Interventional Imaging 101(12), 789–794 (2020) * [5] Bozzetti, F.: Forcing the vicious circle: sarcopenia increases toxicity, decreases response to chemotherapy and worsens with chemotherapy. Annals of Oncology 28(9), 2107–2118 (2017), a focus on esophageal squamous cell carinoma * [6] Castiglione, J., Somasundaram, E., Gilligan, L.A., Trout, A.T., Brady, S.: Automated segmentation of abdominal skeletal muscle in pediatric ct scans using deep learning. Radiology: Artificial Intelligence p. e200130 (2021) * [7] Cruz-Jentoft, A.J., Bahat, G., Bauer, J., Boirie, Y., Bruyère, O., Cederholm, T., Cooper, C., Landi, F., Rolland, Y., Sayer, A.A., et al.: Sarcopenia: revised european consensus on definition and diagnosis. Age and ageing 48(1), 16–31 (2019) * [8] Derstine, B.A., Holcombe, S.A., Goulson, R.L., Ross, B.E., Wang, N.C., Sullivan, J.A., Su, G.L., Wang, S.C.: Quantifying Sarcopenia Reference Values Using Lumbar and Thoracic Muscle Areas in a Healthy Population. J Nutr Health Aging 21(10), 180–185 (2017) * [9] Du, Y., Karvellas, C.J., Baracos, V., Williams, D.C., Khadaroo, R.G.: Sarcopenia is a predictor of outcomes in very elderly patients undergoing emergency surgery. Surgery 156(3), 521–527 (2014) * [10] Ghesu, F.C., Georgescu, B., Grbic, S., Maier, A., Hornegger, J., Comaniciu, D.: Towards intelligent robust detection of anatomical structures in incomplete volumetric data. Med Image Anal 48, 203–213 (08 2018) * [11] Gilligan, L.A., Towbin, A.J., Dillman, J.R., Somasundaram, E., Trout, A.T.: Quantification of skeletal muscle mass: sarcopenia as a marker of overall health in children and adults. Pediatric Radiology 50(4), 455–464 (Apr 2020) * [12] Grill, J.B., Strub, F., Altché, F., Tallec, C., Richemond, P.H., Buchatskaya, E., Doersch, C., Pires, B.A., Guo, Z.D., Azar, M.G., et al.: Bootstrap your own latent: A new approach to self-supervised learning. arXiv preprint arXiv:2006.07733 (2020) * [13] Kanavati, F., Islam, S., Aboagye, E.O., Rockall, A.: Automatic l3 slice detection in 3d ct images using fully-convolutional networks (2018) * [14] Lee, J., Chang, C.L., Lin, J.B., Wu, M.H., Sun, F.J., Jan, Y.T., Hsu, S.M., Chen, Y.J.: Skeletal muscle loss is an imaging biomarker of outcome after definitive chemoradiotherapy for locally advanced cervical cancer. Clinical Cancer Research 24(20), 5028–5036 (2018) * [15] Lian, J., Levine, N., Cho, W.: A review of lumbosacral transitional vertebrae and associated vertebral numeration. European Spine Journal 27(5), 995–1004 (May 2018) * [16] Maicas, G., Carneiro, G., Bradley, A.P., Nascimento, J.C., Reid, I.: Deep reinforcement learning for active breast lesion detection from dce-mri. In: Descoteaux, M., Maier-Hein, L., Franz, A., Jannin, P., Collins, D.L., Duchesne, S. (eds.) Medical Image Computing and Computer Assisted Intervention - MICCAI 2017. pp. 665–673. Springer International Publishing, Cham (2017) * [17] Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., Riedmiller, M.: Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013) * [18] Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., Petersen, S., Beattie, C., Sadik, A., Antonoglou, I., King, H., Kumaran, D., Wierstra, D., Legg, S., Hassabis, D.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (Feb 2015) * [19] Navarro, F., Sekuboyina, A., Waldmannstetter, D., Peeken, J.C., Combs, S.E., Menze, B.H.: Deep reinforcement learning for organ localization in ct. In: Medical Imaging with Deep Learning. pp. 544–554. PMLR (2020) * [20] Nishioka, N., Uchino, J., Hirai, S., Katayama, Y., Yoshimura, A., Okura, N., Tanimura, K., Harita, S., Imabayashi, T., Chihara, Y., Tamiya, N., Kaneko, Y., Yamada, T., Takayama, K.: Association of sarcopenia with and efficacy of anti-pd-1/pd-l1 therapy in non-small-cell lung cancer. Journal of Clinical Medicine 8(4) (2019) * [21] Paszke, A., Gross, S., Chintala, S., Chanan, G., Yang, E., DeVito, Z., Lin, Z., Desmaison, A., Antiga, L., Lerer, A.: Automatic differentiation in PyTorch. In: NIPS Autodiff Workshop (2017) * [22] Payer, C., Štern, D., Bischof, H., Urschler, M.: Coarse to fine vertebrae localization and segmentation with spatialconfiguration-net and u-net. In: Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 5: VISAPP. vol. 5, pp. 124–133 (2020). https://doi.org/10.5220/0008975201240133 * [23] Santilli, V., Bernetti, A., Mangone, M., Paoloni, M.: Clinical definition of sarcopenia. Clinical cases in mineral and bone metabolism 11(3), 177 (2014) * [24] Sutton, R.S., Barto, A.G.: Reinforcement learning: An introduction. MIT press (2018) * [25] Suzani, A., Seitel, A., Liu, Y., Fels, S., Rohling, R.N., Abolmaesumi, P.: Fast automatic vertebrae detection and localization in pathological ct scans - a deep learning approach. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) Medical Image Computing and Computer-Assisted Intervention – MICCAI 2015. pp. 678–686. Springer International Publishing (2015) * [26] Tarbouriech, J., Garcelon, E., Valko, M., Pirotta, M., Lazaric, A.: No-regret exploration in goal-oriented reinforcement learning. In: International Conference on Machine Learning. pp. 9428–9437. PMLR (2020) * [27] Vlontzos, A., Alansary, A., Kamnitsas, K., Rueckert, D., Kainz, B.: Multiple landmark detection using multi-agent reinforcement learning. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. pp. 262–270. Springer (2019) * [28] Wang, Z., de Freitas, N., Lanctot, M.: Dueling network architectures for deep reinforcement learning. CoRR abs/1511.06581 (2015), http://arxiv.org/abs/1511.06581 * [29] Zopfs, D., Theurich, S., Große Hokamp, N., Naetlitz, J., Gerecht, L., Borggrefe, J., Schlaak, M., Pinto dos Santos, D.: Single-slice ct measurements allow for accurate assessment of sarcopenia and body composition. European radiology 30 (11 2019)
arxiv-papers
2021-07-27T13:15:42
2024-09-04T03:07:21.593733
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Othmane Laousy, Guillaume Chassagnon, Edouard Oyallon, Nikos Paragios,\n Marie-Pierre Revel, Maria Vakalopoulou", "submitter": "Othmane Laousy", "url": "https://arxiv.org/abs/2107.12800" }
2107.12802
# Weak scale right-handed neutrino as pseudo-Goldstone fermion of spontaneously broken $U(1)_{L_{\mu}-L_{\tau}}$ Anjan S. Joshipura [email protected] Ketan M. Patel [email protected] Theoretical Physics Division, Physical Research Laboratory, Navarangpura, Ahmedabad-380 009, India. ###### Abstract Possibility of a Right-Handed (RH) neutrino being a Goldstone fermion of a spontaneously broken global $U(1)$ symmetry in a supersymmetric theory is considered. This fermion obtains mass from the supergravity effects leading to a RH neutrino at the electroweak scale with a mass similar to the gravitino mass. A prototype model realizing this scenario contains just three gauge singlet superfields needed for the type I seesaw mechanism. Masses of the other two neutrinos are determined by the $U(1)$ breaking scale which too can be around the electroweak scale. Light neutrinos obtain their masses in this scenario through (a) mixing with the RH neutrinos (type I seesaw), (b) mixing with neutralinos ($R$-parity breaking), (c) indirectly through mixing of the RH neutrinos with neutralinos, and (d) radiative corrections. All these contributions are described by the same set of a small number of underlying parameters and provide a very constrained and predictive framework for the neutrino masses which is investigated in detail for various choices of $U(1)$ symmetries. It is found that flavour independent $U(1)$ symmetries cannot describe neutrino masses if the soft supersymmetry breaking terms are flavour universal and one needs to consider flavour dependent symmetries. Considering a particular example of $L_{\mu}-L_{\tau}$ symmetry, it is shown that viable neutrino masses and mixing can be obtained without introducing any flavour violation in the soft sector. The leptonic couplings of Majoron are worked out in the model and shown to be consistent with various laboratory, astrophysical and cosmological constraints. The neutrino data allows sizeable couplings between the RH neutrinos and Higgsinos which can be used to probe the pseudo- Goldstone fermion at colliders through its displaced decay vertex. ## I Introduction Extensions of the Standard Model (SM) by one or more Right-Handed (RH) singlet fermions provide the most popular mechanism for obtaining light neutrino masses Minkowski (1977); Yanagida (1979); Mohapatra and Senjanovic (1980); Schechter and Valle (1980). The scale $M_{N}$ of the masses of these neutrinos is set by different underlying physics. $M_{N}$ can be close to the Planck scale in the absence of any symmetry protecting it. Grand unified theories based on $SO(10)$ group can lead to $M_{N}$ in the range $10^{10}-10^{16}$ GeV Fritzsch and Minkowski (1975); Gell-Mann _et al._ (1979). Smaller $M_{N}$ close to TeV scale can be linked to theories with a low scale gauge symmetry breaking such as $U(1)_{B-L}$ or the left right symmetry. The supersymmetric theories with a spontaneously broken global symmetry provide an alternate mechanism for protecting the RH neutrino masses upto TeV scale or less Chun _et al._ (1995, 1996). If the global symmetry is broken by singlet superfield(s) and the supersymmetry remains unbroken in the process then the fermionic partner of the Goldstone Boson - the Goldstone Fermion - would also remain massless. Once the supersymmetry is broken, say by supergravity effects, this fermion can pick up a mass around the gravitino mass $m_{3/2}\sim$ TeV or less. This pseudo-Goldstone Fermion (pGF) can be identified with one of the sterile neutrinos. Implementation of this mechanism generically requires more than one singlet superfields which may be identified with the additional RH neutrinos participating in the seesaw mechanism. The minimal choice of the global symmetry is $U(1)$. The basic assumption is that the underlying theory is supersymmetric and invariant under $U(1)$. The $U(1)$ is assumed to break spontaneously keeping supersymmetry intact. A prototype model satisfying these requirements contains just three singlet chiral superfields $\hat{N}_{\alpha}\equiv(\hat{Y},\hat{N},\hat{N}^{\prime})$ with $U(1)$ charges $(0,-1,1)$ and the superpotential $W_{N}=\lambda\,(\hat{N}\hat{N}^{\prime}-f^{2})\,\hat{Y}\,.$ (1) As usual, a chiral superfield $\hat{N}_{\alpha}$ contains a complex scalar $\tilde{N}_{\alpha}$ and its fermionic partner which we denote as $N_{\alpha}$. We identify the fermionic parts of $\hat{N}_{\alpha}$ with the three RH neutrinos. Then Eq. (1), apart from breaking $U(1)$ also determines the zeroeth order structure of the RH neutrino mass matrix which gets corrected by the supergravity effects. The Dirac mass terms required to complete the seesaw mechanism arise from the following superpotetial $W_{D}=\lambda_{\alpha\beta}\,\hat{L}_{\alpha}\hat{N}_{\beta}\hat{H}_{2}\,.$ (2) The structure of $\lambda_{\alpha\beta}$ is determined by the choice of the quantum numbers of $(L_{\alpha},H_{2})$ under $U(1)$ symmetry and we will consider various choices. Eqs. (1) and (2) contribute to neutrino masses in two different ways. One obtains non-zero Vacuum Expectation Values (VEVs) for scalars of $\hat{N}$, $\hat{N}^{\prime}$ at the global supersymmetric minimum from Eq. (1). These VEVs generate the masses for two of the RH neutrinos. The third RH neutrino obtains its mass from the supersymmetry breaking effects and the three neutrinos together generate the seesaw masses for the light neutrinos. VEVs for $\hat{N}$, $\hat{N}^{\prime}$ also lead to spontaneous bilinear $R$-parity violation through Eq. (2) which leads to additional contribution to neutrino masses through their mixing with neutralinos (see for example Barbier _et al._ (2005) and references therein). These two entirely different contributions to neutrino masses are governed by the same set of parameters appearing in Eqs. (1,2) and provide a very constrained and predictive framework for neutrino masses. Moreover, a simple requirement that the $R$-parity violating contribution to neutrino masses is smaller or of the order of the neutrino masses lead to a an upper bound on the RH sneutrino VEVs since the bilinear $R$-parity breaking parameters are proportional to these VEVs. This bound is around TeV but is model dependent as the the standard seesaw also contributes to the neutrino masses. Since the RH sneutrino VEVs control the masses of the other two RH neutrinos, they also have masses around TeV. As a result, the masses of all three RH neutrinos are around TeV or less and one obtains a viable scenario for the TeV scale RH masses without invoking any additional gauge symmetry, see Deppisch _et al._ (2015) for a review on weak scale RH neutrinos. A phenomenological motivation to consider seesaw models with TeV scale RH neutrinos is the possibility of producing and detecting them at colliders. Disadvantage of these models on the other hand is the smallness of the active sterile mixing required to obtain the correct light neutrino masses. Since this mixing governs the production and decay of the RH neutrino in the minimal seesaw model it is not possible to observe such RH neutrino within the minimum set up111There exist special textures of the Dirac and Majorana neutrino mass matrices which lead to small neutrino masses and large active sterile mixing even within the minimal seesaw, see for example Kersten and Smirnov (2007); Lee _et al._ (2013); Chattopadhyay and Patel (2017).. This changes if one or more RH neutrinos are pGF of the type considered above. In this case, the symmetry breaking VEV of the RH sneutrino directly couples the pGF to Higgsinos and their production does not require suppressed mixing as is the case with the standard seesaw model. Relatively small mixing $|V_{N\nu_{i}}|\sim 10^{-6}$ of the pGF with neutrinos make them long lived and pGF can lead to displaced vertex signature at in the collider experiments. This possibility has been studied extensively recently Lavignac and Medina (2021) and can also be realized within the scenario presented in this paper. We introduce the basic framework in the next section choosing the above mentioned case of the spontaneously broken $U(1)$ symmetry. We then discuss structure of neutrino masses in section III assuming $U(1)$ to be flavour independent. It is shown that models in this category cannot reproduce the neutrino masses correctly if the soft supersymmetry (SUSY) breaking terms are assumed flavour universal. We then discuss the case of the $U(1)_{L_{\mu}-L_{\tau}}$ symmetry in section IV which allows correct description of the observed neutrino spectrum even with the universal soft terms. The framework implies an existence of Goldstone Boson (GB) of sponteneously broken $U(1)_{L_{\mu}-L_{\tau}}$ symmetry, namely the Majoron Chikashige _et al._ (1981). In section V, we derive the couplings of Majoron with the charged and neutral leptons and discuss their phenomenological implications. We also discuss about the possibility to detect the lightest RH neutrino in the direct search experiment in section VI. The work is summarized in section VII. ## II Basic framework The starting point of the models we discuss is the renormalizable superpotential given in Eq. (1). The other terms in $W_{N}$, such as $Y^{2}$ or $Y^{3}$, can be forbidden by an additional symmetry like $R$ symmetry. The minimization of the potential $V_{N}$ obtained from $W_{N}$ leads to a global SUSY preserving minimum corresponding to $\langle\tilde{N}\rangle=Us_{\phi}\,,~{}~{}\langle\tilde{N}^{\prime}\rangle=Uc_{\phi}\,,~{}~{}\langle\tilde{Y}\rangle=0\,,$ (3) where $s_{\phi}=\sin\phi$, $c_{\phi}=\cos\phi$ and $U=\frac{f}{\sqrt{s_{\phi}c_{\phi}}}\,,$ (4) represents $U(1)$ breaking scale. Even in the presence of terms like $Y^{2}$ and $Y^{3}$ in $W_{N}$, Eq. (3) describes the global minimum of the potential. The spontaneous breaking of global $U(1)$ symmetry implies a massless Goldstone boson. Writing the scalar fields as $\tilde{N}_{\alpha}=\langle\tilde{N}_{\alpha}\rangle+\frac{1}{\sqrt{2}}\left(\tilde{N}_{R\alpha}+i\tilde{N}_{I\alpha}\right)\,,$ (5) at the minimum of the potential, we obtain the Goldstone boson as $G_{B}=c_{\phi}\tilde{N}^{\prime}_{I}-s_{\phi}\tilde{N}_{I}\,.$ (6) Its fermionic partner also remains massless in the SUSY preserving limit and it is given by a similar linear combination $G_{F}=c_{\phi}N^{\prime}-s_{\phi}N\,.$ (7) This can also be seen explicitly by constructing singlet fermion mass matrix from Eq. (1). It is obtained as $M_{N}^{0}=\lambda U\left(\begin{array}[]{ccc}0&c_{\phi}&s_{\phi}\\\ c_{\phi}&0&0\\\ s_{\phi}&0&0\\\ \end{array}\right)\,.$ (8) The diagonalization of the above matrix leads to a massless state given by Eq. (7) and two massive and degenerate states with masses $|\lambda U|$. The fermion mass matrix in Eq. (8) changes in the presence of the local SUSY breaking terms. These terms shift the VEVs of $\tilde{N},\tilde{N}^{\prime}$ by ${\cal O}(m_{3/2})$ and also generate a nonzero VEV for $\tilde{Y}$ field Goto and Yamaguchi (1992). The later makes the Goldstone fermion massive. These shifts follow from the minimisation of the potential with the soft SUSY terms Chun _et al._ (1992); Chun and Lukas (1995). If the kinetic terms in Kahler potential $K$ are minimal and hidden sector is assumed to have Polonyi form then the shifts are given by Lahanas and Nanopoulos (1987) $\delta\langle\tilde{N}\rangle=\delta\langle\tilde{N}^{\prime}\rangle=\frac{m_{3/2}}{\lambda}\left(1+\frac{f^{2}\lambda^{2}}{m_{3/2}^{2}}\right)^{\frac{1}{2}}\,,~{}~{}~{}\delta\langle\tilde{Y}\rangle=\frac{m_{3/2}}{\lambda}\,.$ (9) Shifts for general soft terms are calculated in Chun and Lukas (1995). The fermion mass matrix in SUGRA is given by $M_{ab}=M_{P}\,e^{\frac{G}{2M_{P}^{2}}}\,\left(G_{ab}+\frac{1}{3}\frac{G_{a}G_{b}}{M_{P}^{2}}-G_{c}\,(G^{-1})^{c}_{d}\,G^{d}_{ab}\right)\,.$ (10) with $G=K+M_{P}^{2}~{}\ln|W/M_{P}^{3}|^{2}\,,$ (11) $G_{a}=\frac{\delta G}{\delta\phi^{a}}$, $\phi^{a}=\phi_{a}^{*}$ is antichiral superfield and $W=g(z)+W_{N}(N_{\alpha})\,.$ (12) Here, $g(z)$ describes the hidden sector potential and $W_{N}$ is given by Eq. (1). We evaluate the fermion mass matrix by substituting $\langle z\rangle=bM_{P}$, $\langle W\rangle\sim\langle g(z)\rangle\sim\frac{m_{3/2}M_{P}^{2}}{c}$ where $c=e^{b^{2}/2}$ is a numerical constant and remembering that now $\lambda\langle\tilde{Y}\rangle\approx{\cal O}(m_{3/2})$. The gravitino mass is defined as $m_{3/2}=M_{P}\,\exp(\langle G\rangle/2M_{P}^{2})$. The fermion mass matrix following from Eq. (10) is then given by $M_{N}^{\rm loc}=c\,m_{3/2}\left(\begin{array}[]{ccc}{\cal O}\left(\frac{U^{2}}{M_{P}^{2}}\right)&\frac{\lambda Uc_{\phi}}{m_{3/2}}&\frac{\lambda Us_{\phi}}{m_{3/2}}\\\ \frac{\lambda Uc_{\phi}}{m_{3/2}}&{\cal O}\left(\frac{U^{2}}{M_{P}^{2}}\right)&\frac{\lambda\langle\hat{Y}\rangle}{m_{3/2}}\\\ \frac{\lambda Us_{\phi}}{m_{3/2}}&\frac{\lambda\langle\hat{Y}\rangle}{m_{3/2}}&{\cal O}\left(\frac{U^{2}}{M_{P}^{2}}\right)\\\ \end{array}\right)\,.$ (13) The above mass matrix approximately coincides with the $M_{N}^{0}$ in Eq. (8) if one effectively assumes nonzero VEV for $\tilde{Y}$ in the latter. The other corrections induced by SUSY breaking are ${\cal O}(U^{2}/M_{P}^{2})$ and they are very small. Therefore, we approximate the singlet fermion mass matrix in the presence of local SUSY breaking as $M_{N}\simeq\lambda U\left(\begin{array}[]{ccc}0&c_{\phi}&s_{\phi}\\\ c_{\phi}&0&\epsilon\\\ s_{\phi}&\epsilon&0\\\ \end{array}\right)\,,$ (14) where $\epsilon=\langle\hat{Y}\rangle/U<1$ and we have absorbed $c$ in redefining $\lambda$. Note that $U$ denotes now a shifted VEV and it does not strictly satisfy Eq. (4). The SUSY breaking generates the mass for the lightest RH neutrino and split the masses of the other two singlet neutrinos by ${\cal O}(m_{3/2})$. Explicitly, $M_{N_{1}}\approx|2\epsilon\lambda Uc_{\phi}s_{\phi}|\,,~{}~{}M_{N_{2,3}}\approx|\lambda U(1\pm\epsilon c_{\phi}s_{\phi})|\,.$ (15) The lightest RH neutrino is now a pseudo-Goldstone fermion which can be written as $N_{1}\simeq\cos\phi\,N^{\prime}-\sin\phi\,N-\epsilon\cos 2\phi\,Y\,,$ (16) at the leading order in $\epsilon$. ## III Flavour independent $U(1)$ symmetries and neutrino masses We now discuss the interaction of the RH neutrinos with the SM leptons, Higgs and their superpartners. This depends on the choice of the symmetry $U(1)$. There are four possible choices. $U(1)$ is (a) a “hidden” symmetry acting only on the RH fields $N_{\alpha}$, or (b) a leptonic symmetry acting on $L_{\alpha}$ and $N_{\alpha}$, or (c) a Peccei Quinn like symmetry acting on the Higgs doublet(s), on some of the right-handed quarks and may also be on the leptonic fields, or (d) a leptonic family symmetry acting only on leptons and distinguishing among them. We discuss the case (d) in detail in the next section. The cases (a-c) can all be described by a general superpotential $W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{S}_{1}\,+\,\kappa\,\hat{H}_{1}\hat{H}_{2}\hat{S_{2}}\,$ (17) where we have only shown the part relevant for the neutrino masses. Here $\hat{S}_{1,2}$ can be any of the three RH fields $\hat{N}_{\alpha}$ depending on the choice of the $U(1)$ symmetry. For the case (a), one has $\hat{S}_{1}=\hat{S}_{2}=\hat{Y}$. The case (b) corresponds to $\kappa=0$ and $\hat{S}_{1}=\hat{N}$ if $L_{\alpha}$ have $U(1)$ charge is +1. $W$ in this case contains an additional $\mu$ term. The choice of $\hat{S}_{1,2}$ in case (c) depends on the $U(1)$ charges of $\hat{H}_{1,2}$. The cases (a-c) are similar and we consider the case (c) with $\hat{S}_{1}=\hat{N}$ and $\hat{S}_{2}=\hat{N}^{\prime}$ for definiteness. Without loss of generality, the parameters $\lambda_{\alpha}$ and $\kappa$ can be chosen real. We shift the fields $\hat{N},\hat{N}^{\prime}$ by the VEV of their scalar components. This leads to the following superpotetial $W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{N}\,+\,\kappa\,\hat{H}_{1}\hat{H}_{2}\hat{N^{\prime}}\,-\mu\hat{H}_{1}\hat{H}_{2}-\epsilon_{\alpha}\hat{L}_{\alpha}\hat{H}_{2}\,$ (18) with $\epsilon_{\alpha}=-\lambda_{\alpha}Us_{\phi}~{}~{}~{},~{}~{}~{}\mu=-\kappa Uc_{\phi}~{}.$ (19) The model contains ten neutral fermion fields which mix with each other through the gauge and superpotential interactions. The corresponding mass Lagrangian in the basis $\psi_{0}=(\nu_{\alpha},N_{\alpha},-i\lambda_{1},-i\lambda_{2},\tilde{h}_{1}^{0},\tilde{h}_{2}^{0})^{T}$ is given by $-{\cal L}_{\cal N}=\frac{1}{2}\,\psi_{0}^{T}\,{\cal M}_{\cal N}\,\psi_{0}\,+\,{\rm h.c.}\,,$ (20) where ${\cal M}_{\cal N}$ is a $10\times 10$ mass matrix which can be parametrized as ${\cal M}_{\cal N}=\left(\begin{array}[]{ccc}0&m_{D}&m_{\nu\chi}\\\ m_{D}^{T}&M_{N}&m_{N\chi}\\\ m_{\nu\chi}^{T}&m_{N\chi}^{T}&M_{\chi}\end{array}\right)\,.$ (21) Here, $M_{N}$ is singlet neutrino mass matrix as given by Eq. (14). $m_{D}$ is $3\times 3$ Dirac neutrino mass matrix as can be read-off from Eq. (18), $m_{D}=v_{2}\,\left(\begin{array}[]{ccc}0&\lambda_{e}&0\\\ 0&\lambda_{\mu}&0\\\ 0&\lambda_{\tau}&0\\\ \end{array}\right)\,,$ (22) with $v_{1,2}\equiv\langle H_{1,2}\rangle$ and $\sqrt{v_{1}^{2}+v_{2}^{2}}\equiv v=174\,{\rm GeV}$. $m_{\nu\chi}$ and $m_{N\chi}$ are $3\times 4$ mass matrices. They can be determined from Eq. (18) and the gauge interactions as $m_{\nu\chi}=\left(\begin{array}[]{cccc}-\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{e}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{e}&0&-\epsilon_{e}\\\ -\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{\mu}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{\mu}&0&-\epsilon_{\mu}\\\ -\frac{1}{\sqrt{2}}g^{\prime}\omega^{\prime}_{\tau}&\frac{1}{\sqrt{2}}g\omega^{\prime}_{\tau}&0&-\epsilon_{\tau}\end{array}\right)\,,~{}~{}m_{N\chi}=\left(\begin{array}[]{cccc}0&0&0&0\\\ 0&0&0&\lambda_{\alpha}\omega_{\alpha}^{\prime}\\\ 0&0&\kappa v_{2}&\kappa v_{1}\\\ \end{array}\right)\,,$ (23) where $\omega_{\alpha}^{\prime}\equiv\langle\tilde{\nu}_{\alpha}\rangle$. The explicit form of the neutralino mass matrix is $M_{\chi}=\left(\begin{array}[]{cccc}M_{1}&0&-\frac{1}{\sqrt{2}}g^{\prime}v_{1}&\frac{1}{\sqrt{2}}g^{\prime}v_{2}\\\ 0&M_{2}&\frac{1}{\sqrt{2}}gv_{1}&-\frac{1}{\sqrt{2}}gv_{2}\\\ -\frac{1}{\sqrt{2}}g^{\prime}v_{1}&\frac{1}{\sqrt{2}}gv_{1}&0&-\mu\\\ \frac{1}{\sqrt{2}}g^{\prime}v_{2}&-\frac{1}{\sqrt{2}}gv_{2}&-\mu&0\\\ \end{array}\right)\,.$ (24) The tree level light neutrino masses can be obtained from Eq. (21). For $m_{\nu\chi},m_{D}\ll M_{\chi},M_{N}$, the neutrino mass matrix at the leading order is given by $m_{\nu}=-m_{3\times 7}\,{\cal M}_{7\times 7}^{-1}\,(m_{3\times 7})^{T}\,.$ (25) Here, $m_{3\times 7}\equiv(m_{D},m_{\nu\chi})$ is a $3\times 7$ analogue of the conventional Dirac matrix in familiar type I seesaw mechanism. ${\cal M}_{7\times 7}$ is a mass matrix of heavier states corresponding to the lower $7\times 7$ block of Eq. (21). Neglecting $\lambda_{\alpha}\omega_{\alpha}^{\prime}$ term222It is shown later in this section that the SM neutrino mass scale requires $\lambda_{\alpha}\ll 1$ in this framework. Therefore, $\kappa v_{1,2}\gg\lambda_{\alpha}\omega^{\prime}_{\alpha}$ unless $\kappa$ is vanishingly small. in $m_{N\chi}$, an explicit evaluation of Eq. (25) gives $\displaystyle m_{\nu}$ $\displaystyle=$ $\displaystyle\tilde{m}_{0}\left[\left(1-\frac{\kappa c_{\phi}U}{\mu}\left(2-\frac{\kappa c_{\phi}U}{\mu}\right)\right)\,s_{\phi}^{2}\,\tilde{\cal A}+\left(\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}-\frac{2\kappa^{2}c_{\phi}^{2}A_{0}v_{1}}{\mu v_{2}}\right)\,\tilde{{\cal B}}\right.$ (26) $\displaystyle-$ $\displaystyle\left.\frac{\kappa A_{0}c_{\phi}(v_{1}^{2}-v_{2}^{2})}{v_{2}\mu}\left(1-\frac{\kappa c_{\phi}U}{\mu}\right)\,s_{\phi}\,\tilde{{\cal H}}\right]\,,$ where, $\tilde{m}_{0}=\frac{D_{4}v_{2}^{2}U^{2}\lambda^{2}}{\tilde{D}_{7}}=\frac{v_{2}^{2}}{M_{N_{1}}-\kappa^{2}c_{\phi}^{2}\zeta}\,,$ (27) $D_{4}$ and $\tilde{D}_{7}$ are the determinants of $M_{\chi}$ and ${\cal M}_{7\times 7}$, respectively. Explicit expression of $D_{4}$ is $D_{4}={\rm Det}\,M_{\chi}=-\mu(M_{1}M_{2}\mu-(g^{2}M_{1}+g^{\prime 2}M_{2})v_{1}v_{2})\,.$ (28) $\tilde{D}_{7}$ can be obtained using the second equality in Eq. (27) in terms of the other known parameters where $M_{N_{1}}\equiv 2\epsilon\lambda Us_{\phi}c_{\phi}\,,$ (29) is the mass of the pGF and $\zeta=\frac{v^{4}(g^{2}M_{1}+g^{\prime 2}M_{2})-4v_{1}v_{2}\mu M_{1}M_{2}}{2D_{4}}\,.$ (30) Further, $A_{0}=-\frac{\mu(g^{2}M_{1}+g^{\prime 2}M_{2})}{2(M_{1}M_{2}\mu- v_{1}v_{2}(g^{2}M_{1}+g^{\prime 2}M_{2}))}\,.$ (31) The matrices in Eq. (26) are obtained as $\tilde{{\cal A}}=\left(\begin{array}[]{ccc}\lambda_{e}^{2}&\lambda_{e}\lambda_{\mu}&\lambda_{e}\lambda_{\tau}\\\ \lambda_{e}\lambda_{\mu}&\lambda_{\mu}^{2}&\lambda_{\mu}\lambda_{\tau}\\\ \lambda_{e}\lambda_{\tau}&\lambda_{\mu}\lambda_{\tau}&\lambda_{\tau}^{2}\\\ \end{array}\right)\,,~{}\tilde{{\cal B}}=\left(\begin{array}[]{ccc}\omega_{e}^{2}&\omega_{e}\omega_{\mu}&\omega_{e}\omega_{\tau}\\\ \omega_{e}\omega_{\mu}&\omega_{\mu}^{2}&\omega_{\mu}\omega_{\tau}\\\ \omega_{e}\omega_{\tau}&\omega_{\mu}\omega_{\tau}&\omega_{\tau}^{2}\\\ \end{array}\right)\,,$ (32) $\tilde{{\cal H}}=\left(\begin{array}[]{ccc}2\lambda_{e}\omega_{e}&\lambda_{e}\omega_{\mu}+\lambda_{\mu}\omega_{e}&\lambda_{e}\omega_{\tau}+\lambda_{\tau}\omega_{e}\\\ \lambda_{e}\omega_{\mu}+\lambda_{\mu}\omega_{e}&2\lambda_{\mu}\omega_{\mu}&\lambda_{\mu}\omega_{\tau}+\lambda_{\tau}\omega_{\mu}\\\ \lambda_{e}\omega_{\tau}+\lambda_{\tau}\omega_{e}&\lambda_{\mu}\omega_{\tau}+\lambda_{\tau}\omega_{\mu}&2\lambda_{\tau}\omega_{\tau}\\\ \end{array}\right)\,.$ (33) Here, $\omega_{\alpha}$ denote the VEVs of sneutrino in the basis in which the bilinear term is rotated away from the superpotential Joshipura _et al._ (2002). Explicitly, $\omega_{\alpha}=\omega^{\prime}_{\alpha}-\frac{v_{1}}{\mu}\epsilon_{\alpha}\,.$ (34) If one neglects mixing $m_{N\chi}$ between the RH neutrino and neutralino induced by $\kappa$, then the ${\cal M}_{7\times 7}$ becomes block diagonal and $m_{\nu}$ becomes sum of two independent seesaw contributions corresponding to the first two terms of Eq. (26) with $\kappa=0$. The first term is the normal seesaw contribution while the second is the standard $R$-parity violating contribution arising due to neutrino-neutralino mixing. Both these contributions are of rank one and each can give mass to only one neutrino. As seen from Eq. (26), the leading terms of the conventional seesaw contribution is solely governed by the mass of the pGF. The $\kappa$-dependent terms in Eq. (26) make significant contribution. This can be seen by eliminating $\kappa$ using the second in Eq. (19) which leads to $\displaystyle m_{\nu}$ $\displaystyle=$ $\displaystyle\tilde{m}_{0}\left[4s_{\phi}^{2}\,\tilde{\cal A}+\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}\left(1-\frac{2\mu v_{1}v_{2}}{U^{2}M_{N_{1}}}\right)\,\tilde{{\cal B}}+\frac{2A_{0}(v_{1}^{2}-v_{2}^{2})}{v_{2}U}\,s_{\phi}\,\tilde{{\cal H}}\right]\,.$ (35) The snuetrino VEVs arise from the parameters $\epsilon_{\alpha}$ and one can parametrize them as $\omega_{\alpha}\equiv k_{\alpha}\epsilon_{\alpha}=-\lambda_{\alpha}k_{\alpha}Us_{\phi}\,,$ (36) where we have used Eq. (19). The elements of matrix $m_{\nu}$ in Eq. (35) can then be rewritten as $\left(m_{\nu}\right)_{\alpha\beta}\ =\tilde{m}_{0}\,\lambda_{\alpha}\lambda_{\beta}\,s_{\phi}^{2}\left[4+\frac{A_{0}M_{N_{1}}U^{2}}{v_{2}^{2}}\left(1-\frac{2\mu v_{1}v_{2}}{U^{2}M_{N_{1}}}\right)\,k_{\alpha}k_{\beta}-\frac{2A_{0}(v_{1}^{2}-v_{2}^{2})}{v_{2}}\,(k_{\alpha}+k_{\beta})\right]\,.$ (37) Assuming the second and third terms are $\lesssim{\cal O}(1)$, one finds typically $|\lambda_{\alpha}|^{2}\sim{\cal O}\left(\frac{m_{\nu}M_{N_{1}}}{v_{2}^{2}}\right)\sim{\cal O}\left(10^{-13}\right)\times\left(\frac{M_{N_{1}}}{100\,{\rm GeV}}\right)\,.$ (38) Therefore, $|\lambda_{\alpha}|\ll 1$ and neglecting $\lambda_{\alpha}$ dependent terms in $m_{N\chi}$ is justified. The third term in Eq. (37) is smaller than the seesaw contribution for $k_{\alpha}\leq 1$. The second term however increases with $k_{\alpha}U$ and can compete with the seesaw contribution. Requiring that this term is at most of the order of the seesaw term implies $U^{2}|k_{\alpha}|^{2}\lesssim{\cal O}\left(\frac{v_{2}^{2}}{|A_{0}|M_{N_{1}}}\right)\sim{\cal O}\left(10^{6}\right)\,{\rm GeV}^{2}\times\left(\frac{2.8\times 10^{-4}\,{\rm GeV}^{-1}}{|A_{0}|}\right)\times\left(\frac{100\,{\rm GeV}}{M_{N_{1}}}\right)\,.$ (39) The parameters $k_{\alpha}$ can be determined from the minimization of the scalar potential of the model, see Appendix A for details. Generically, $k_{\alpha}$ would be ${\cal O}(1)$. However, they can be very small if the soft SUSY breaking terms are correlated (see, Appendix A). For $k_{\alpha}\sim 1$, Eq. (39) implies a strong upper bound on the symmetry breaking scale which weakens with the decrease in the values of $k_{\alpha}$. The magnitude of $k_{\alpha}$ depends on the trilinear soft terms and sneutrino soft masses along with the other parameters and in general it can be different for different $\alpha$. However, $k_{\alpha}$ can be identical in minimal SUGRA type theories because of flavour universal soft parameters at the scale of SUSY breaking mediation. A splitting among the values of $k_{\alpha}$ then get induced by renormalization group effects and it is expected to be small. Thus it is natural to assume flavour universal $k_{\alpha}$ in a large class of models. In such a situation, Eq. (37) can generate mass for only one neutrino and all the models in this category are ruled out in spite of the presence of various contributions to neutrino masses333This is not true if $\omega_{\alpha}$ and $\lambda_{\alpha}$ are regarded as independent. One can obtain correct masses and mixing in this case, see for example, model in Lavignac and Medina (2021). However, this amounts to assuming flavour dependent $k_{\alpha}$.. These models become viable only if sizeable flavour violations in $k_{\alpha}$ are introduced. Even with the most general $k_{\alpha}$, Eq. (37) leads to a massless neutrino. We find that to get large enough solar angle and viable ratio of the solar to atmospheric squared mass differences, one requires $(k_{2}-k_{3})/k_{3}\simeq{\cal O}(1)$. Such a sizeable difference between $k_{\alpha}$ cannot come from the RG induced small corrections and one needs to assume large flavour violation in the soft terms at the SUSY breaking mediation scale. The need for such large flavour violation in case of the purely bilinear $R$-parity violation was noticed before Joshipura _et al._ (2002); Romao _et al._ (2000); Hirsch _et al._ (2000). This is an unwelcome feature which can be cured if the flavour independent symmetry considered here is replaced by a flavour dependent leptonic symmetry. It is possible in this case to retain flavour universality of $k_{\alpha}$ and reproduce all the neutrino data as we discuss in the next section. ## IV $U(1)_{L_{\mu}-L_{\tau}}$ symmetry and neutrino masses The example we consider here is based on the spontaneously broken $U(1)_{L_{\mu}-L_{\tau}}$ symmetry. The three RH neutrinos $N_{\alpha}=(\hat{Y},\hat{N},\hat{N}^{\prime})$ retain the same charges as before and we appropriately relabel them as a $(\hat{N_{e}},\hat{N_{\mu}},\hat{N_{\tau}})$. The $U(1)$ charges for the three generations of the lepton doublet superfields, $\hat{L}_{\alpha}$ are $(0,1,-1)$ while the $SU(2)$ singlet charged lepton superfields, $\hat{E}^{c}_{\alpha}$, have charges $(0,-1,1)$. The MSSM Higgs superfields are neutral under $U(1)$. A renormalizable superpotential involving these superfields is written as $\displaystyle W=\lambda_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\hat{N}_{\alpha}\,+\,\lambda_{\alpha}^{\prime}\,\hat{L}_{\alpha}\hat{H}_{1}\hat{E}^{c}_{\alpha}\,-\mu_{0}\hat{H}_{1}\hat{H}_{2}\,+\kappa\hat{N}_{e}\,\hat{H}_{1}\hat{H}_{2}\,$ (40) The above along with $W_{N}$ gives the complete superpotential characterizing the leptonic interactions in the model. Without loss of generality, the parameters $\lambda_{\alpha}$, $\lambda^{\prime}_{\alpha}$ and $\mu_{0}$ can be chosen real. The bilinear $R$-parity violation and the $\mu$ parameter generated through the VEVs of scalar components of $\hat{N}_{\alpha}$ are given by $\epsilon_{\alpha}=-\lambda_{\alpha}\langle\tilde{N}_{\alpha}\rangle\,,~{}~{}\mu=\mu_{0}-\kappa\langle\tilde{N}_{e}\rangle\,$ (41) The spontaneous breaking of $R$-parity also induces nonzero VEVs for the sneutrino fields residing in $\hat{\nu}_{\alpha}$ at the minimum of the scalar potential. The masses of all the ten neutral fermions are given by the matrix in Eq. (21). The matrices $M_{N}$, $M_{\nu\chi}$ and $M_{\chi}$ are the same as given before by Eqs. (14,23,24), respectively. $m_{D}$ and $M_{N\chi}$ are different compared to the flavour independent cases and are given by $m_{D}=v_{2}\,{\rm Diag.}\left(\lambda_{e},\lambda_{\mu},\lambda_{\tau}\right)\,,~{}~{}~{}~{}m_{N\chi}=\left(\begin{array}[]{cccc}0&0&\kappa v_{2}&\kappa v_{1}+\lambda_{e}\omega_{e}^{\prime}\\\ 0&0&0&\lambda_{\mu}\omega_{\mu}^{\prime}\\\ 0&0&0&\lambda_{\tau}\omega_{\tau}^{\prime}\\\ \end{array}\right)\,.$ (42) The tree level light neutrino mass matrix after the seesaw is still given by Eq. (25). Neglecting $\lambda_{\alpha}\omega^{\prime}_{\alpha}$ terms in $M_{N\chi}$, an explicit evaluation of $m_{\nu}^{(0)}$ gives $\displaystyle m_{\nu}^{(0)}$ $\displaystyle=$ $\displaystyle m_{0}\left[{\cal A}+\frac{A_{0}M_{N_{1}}}{v_{2}^{2}}\,{\cal B}+\frac{2\kappa\epsilon U}{\mu}\,{\cal C}+\frac{\kappa A_{0}\epsilon(v_{1}^{2}-v_{2}^{2})}{v_{2}\mu}\,{\cal D}\right.$ (43) $\displaystyle+$ $\displaystyle\left.\frac{\kappa^{2}\epsilon\zeta}{\lambda U}\,{\cal F}+\left(\frac{\kappa\epsilon U}{\mu}\right)^{2}\,{\cal G}-\frac{2\kappa^{2}\epsilon^{2}A_{0}v_{1}}{\mu v_{2}}\,{\cal B}+\frac{\kappa^{2}A_{0}\epsilon^{2}(v_{1}^{2}-v_{2}^{2})U}{v_{2}\mu^{2}}\,{\cal H}\right]\,,$ where we have used relations Eqs. (34,41). Further, $m_{0}=\frac{D_{4}v_{2}^{2}U^{2}\lambda^{2}}{D_{7}}=\frac{v_{2}^{2}}{M_{N_{1}}-\kappa^{2}\epsilon^{2}\zeta}\,,$ (44) and $D_{4}$, $\zeta$ and $A_{0}$ are as defined earlier in Eqs. (28,30,31) respectively. $D_{7}$ is the determinant of the new ${\cal M}_{7\times 7}$ and it is different from $\tilde{D}_{7}$ defined earlier unless $\kappa=0$. Also, ${\cal A}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&-\epsilon s_{\phi}\lambda_{e}\lambda_{\mu}&-\epsilon c_{\phi}\lambda_{e}\lambda_{\tau}\\\ -\epsilon s_{\phi}\lambda_{e}\lambda_{\mu}&s_{\phi}^{2}\lambda_{\mu}^{2}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\ -\epsilon c_{\phi}\lambda_{e}\lambda_{\tau}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,~{}{\cal B}=\left(\begin{array}[]{ccc}\omega_{e}^{2}&\omega_{e}\omega_{\mu}&\omega_{e}\omega_{\tau}\\\ \omega_{e}\omega_{\mu}&\omega_{\mu}^{2}&\omega_{\mu}\omega_{\tau}\\\ \omega_{e}\omega_{\tau}&\omega_{\mu}\omega_{\tau}&\omega_{\tau}^{2}\\\ \end{array}\right)\,,$ (45) ${\cal C}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&0&0\\\ 0&-s_{\phi}^{2}\lambda_{\mu}^{2}&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\ 0&-s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&-c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,$ (46) ${\cal D}=\left(\begin{array}[]{ccc}2\epsilon\lambda_{e}\omega_{e}&\epsilon\lambda_{e}\omega_{\mu}-s_{\phi}\lambda_{\mu}\omega_{e}&\epsilon\lambda_{e}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{e}\\\ \epsilon\lambda_{e}\omega_{\mu}-s_{\phi}\lambda_{\mu}\omega_{e}&-2s_{\phi}\lambda_{\mu}\omega_{\mu}&-s_{\phi}\lambda_{\mu}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{\mu}\\\ \epsilon\lambda_{e}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{e}&-s_{\phi}\lambda_{\mu}\omega_{\tau}-c_{\phi}\lambda_{\tau}\omega_{\mu}&-2c_{\phi}\lambda_{\tau}\omega_{\tau}\\\ \end{array}\right)\,,$ (47) ${\cal F}=\left(\begin{array}[]{ccc}0&0&0\\\ 0&0&\lambda_{\mu}\lambda_{\tau}\\\ 0&\lambda_{\mu}\lambda_{\tau}&0\end{array}\right)\,,~{}~{}{\cal G}=\left(\begin{array}[]{ccc}\epsilon^{2}\lambda_{e}^{2}&\epsilon s_{\phi}\lambda_{e}\lambda_{\mu}&\epsilon c_{\phi}\lambda_{e}\lambda_{\tau}\\\ \epsilon s_{\phi}\lambda_{e}\lambda_{\mu}&s_{\phi}^{2}\lambda_{\mu}^{2}&s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}\\\ \epsilon c_{\phi}\lambda_{e}\lambda_{\tau}&s_{\phi}c_{\phi}\lambda_{\mu}\lambda_{\tau}&c_{\phi}^{2}\lambda_{\tau}^{2}\end{array}\right)\,,$ (48) ${\cal H}=\left(\begin{array}[]{ccc}2\epsilon\lambda_{e}\omega_{e}&\epsilon\lambda_{e}\omega_{\mu}+s_{\phi}\lambda_{\mu}\omega_{e}&\epsilon\lambda_{e}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{e}\\\ \epsilon\lambda_{e}\omega_{\mu}+s_{\phi}\lambda_{\mu}\omega_{e}&2s_{\phi}\lambda_{\mu}\omega_{\mu}&s_{\phi}\lambda_{\mu}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{\mu}\\\ \epsilon\lambda_{e}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{e}&s_{\phi}\lambda_{\mu}\omega_{\tau}+c_{\phi}\lambda_{\tau}\omega_{\mu}&2c_{\phi}\lambda_{\tau}\omega_{\tau}\\\ \end{array}\right)\,.$ (49) In the limit $\kappa\to 0$, the first term in Eq. (43) quantifies the standard seesaw contribution: $m_{\nu}^{S}\equiv- m_{D}\,M_{N}^{-1}\,m_{D}^{T}=\frac{v_{2}^{2}}{M_{N_{1}}}\,{\cal A}\,.$ (50) Contrary to the flavour independent cases, this contribution leads to non-zero masses for all three neutrinos. The leading mass $m_{\nu_{3}}\simeq\frac{v_{2}^{2}}{|M_{N_{1}}|}\left(c_{\phi}^{2}\lambda_{\tau}^{2}+s_{\phi}^{2}\lambda_{\mu}^{2}\right)\,,$ (51) is controlled by the mass of the pGF. The lower $2\times 2$ block of the matrix ${\cal A}$ along with this mass can account for the atmospheric neutrino oscillations. The other two masses are degenerate when the terms of ${\cal O}(\epsilon^{2})$ are neglected in ${\cal A}$. Degeneracy is lifted by the latter but by itself it is not sufficient to account for the solar scale and angle. The seesaw term in Eq. (43) however gets significant contribution from the $\kappa$ dependent terms ${\cal C}$, ${\cal F}$ and ${\cal G}$ when $\left|\kappa U\epsilon/\mu\right|\sim{\cal O}(1)$. These terms by themselves are sufficient to reproduce the neutrino spectrum as we will discuss. For $\kappa=0$, the second term denotes the usual contribution to the neutrino masses from the sneutrino VEVs induced by $R$-parity violation: $m_{\nu}^{\cancel{R}}\equiv- m_{\nu\chi}\,M_{\chi}^{-1}\,m_{\nu\chi}^{T}=A_{0}\,{\cal B}\,.$ (52) This contribution also gets corrected by the $\kappa$ dependent terms as shown in Eq. (43). As mentioned earlier, the parameters $\omega_{\alpha}$ denote the VEVs of sneutrino in the basis in which the bilinear term is shifted away Joshipura _et al._ (2002). They can be parametrized as $\omega_{\alpha}=k_{\alpha}\epsilon_{\alpha}$ and $k_{\alpha}$ can be determined from minimization of the scalar potential of the model, see Appendix A for details. The magnitude of $k_{\alpha}$ depends on the trilinear soft terms and sneutrino soft masses along with the other parameters and in general their value can be different for different $\alpha$. However, $k_{\alpha}$ are expected to be universal in minimal SUGRA type theories because of flavour universal soft parameters at the scale of SUSY breaking mediation. A splitting among the values of $k_{\alpha}$ then get induced by renormalization group effects. We assume that these effects are small and $k_{\alpha}$ are approximately universal at the electroweak scale as well. For $\omega_{\alpha}=k\epsilon_{\alpha}$, we find ${\cal B}=k^{2}U^{2}\,{\cal G}\,,~{}~{}{\cal D}=-2kU\,{\cal C}\,,~{}~{}{\cal H}=-2kU\,{\cal G}\,.$ (53) Substituting these in Eq. (43) and defining $r_{e,\mu}=\lambda_{e,\mu}/\lambda_{\tau}$, we obtain the neutrino mass matrix after combining the different contributions as $m^{(0)}_{\nu}=m_{0}\lambda_{\tau}^{2}\left(\begin{array}[]{ccc}\epsilon^{2}r_{e}^{2}(1+\eta+\eta^{\prime})&-\epsilon r_{e}r_{\mu}s_{\phi}(1-\eta)&-\epsilon r_{e}c_{\phi}(1-\eta)\\\ -\epsilon r_{e}r_{\mu}s_{\phi}(1-\eta)&r_{\mu}^{2}s_{\phi}^{2}(1+\eta-\eta^{\prime})&-r_{\mu}s_{\phi}c_{\phi}(1-\eta+\eta^{\prime}-\zeta^{\prime})\\\ -\epsilon r_{e}c_{\phi}(1-\eta)&-r_{\mu}s_{\phi}c_{\phi}(1-\eta+\eta^{\prime}-\zeta^{\prime})&c_{\phi}^{2}(1+\eta-\eta^{\prime})\\\ \end{array}\right),$ (54) where, $\displaystyle\eta$ $\displaystyle=$ $\displaystyle\frac{A_{0}k^{2}U^{2}M_{N_{1}}}{v_{2}^{2}}+\left(\frac{\kappa\epsilon U}{\mu}\right)^{2}\left(1-\frac{2A_{0}k(kv_{1}\mu+v_{1}^{2}-v_{2}^{2})}{v_{2}}\right)\,,$ $\displaystyle\eta^{\prime}$ $\displaystyle=$ $\displaystyle\frac{2\kappa\epsilon U}{\mu}\left(1-\frac{A_{0}k(v_{1}^{2}-v_{2}^{2})}{v_{2}}\right)\,,$ $\displaystyle\zeta^{\prime}$ $\displaystyle=$ $\displaystyle\frac{2\kappa^{2}\epsilon^{2}\zeta}{M_{N_{1}}}\,.$ (55) If the induced sneutrino VEVs $\omega_{\alpha}$ are small then only the seesaw terms contribute to Eq. (54). This contribution by itself is sufficient to describe neutrino masses and mixing parameters including the Dirac CP phase. However, it requires relatively low value of the $U(1)$ breaking scale $U$. This is quantified as follows. One obtains a relation $\eta=\frac{1}{4}\eta^{\prime 2}$ from Eq. (IV) in the purely seesaw limit. Eq. (53) is then described in terms of five real parameters $m_{0}\lambda_{\tau}^{2}$, $\eta^{\prime}$, $\phi$, $r_{e}\epsilon$, $r_{\mu}$ and a complex $\zeta^{\prime}$ which control neutrino masses and mixing in this case. Explicitly, $\displaystyle r_{e}\epsilon$ $\displaystyle=$ $\displaystyle-0.649\,,~{}~{}r_{\mu}=-13.23\,,~{}~{}\eta^{\prime}=0.714\,,~{}~{}\phi=-0.09\,,$ $\displaystyle\zeta^{\prime}$ $\displaystyle=$ $\displaystyle 0.516+0.022\,i\,,~{}~{}m_{0}\lambda_{\tau}^{2}=0.0367\,{\rm eV}\,,$ (56) reproduce all the neutrino squared mass differences and mixing angles within less than 1$\sigma$ and the Dirac CP phase within 1.4$\sigma$ ranges given by the latest global fit results, NuFIT v5.0 Esteban _et al._ (2020). The implied value of $\eta^{\prime}=\frac{2\kappa\epsilon U}{\mu}=\frac{2\kappa\langle\tilde{N}_{e}\rangle}{\mu}$ determines the VEV of $\tilde{N}_{e}$ induced by the supergravity effect. The definitions of $\zeta^{\prime}$ and $M_{N_{1}}$ can be used to obtain a relation $U^{2}=\left|\frac{\kappa\eta^{\prime}\mu\zeta}{\lambda\zeta^{\prime}\sin 2\phi}\right|\,.$ (57) The values in Eq. (IV) then imply $U=432\,{\rm GeV}\,\times\sqrt{\left|\frac{\kappa}{\lambda}\right|}\,\times\left(\frac{\mu}{\rm TeV}\right)^{1/2}\times\,\left(\frac{\zeta}{24.13\,{\rm GeV}}\right)^{1/2}\,.$ (58) corresponding to a relatively low breaking of the $U(1)$ symmetry. The pGF mass is determined as $|M_{N_{1}}|=\left|\frac{\lambda}{\kappa}\,\eta^{\prime}\mu\,s_{\phi}c_{\phi}\right|=64\,{\rm GeV}\,\times\left|\frac{\lambda}{\kappa}\right|\times\left(\frac{\mu}{\rm TeV}\right)\,,$ (59) while the heavier two neutrinos have masses $432\sqrt{|\lambda\kappa|}\,{\rm GeV}\mp\frac{1}{2}|M_{N_{1}}|$. The $R$-parity violating contribution to the seesaw model can be significant with increasing $U$ and need to be included. Also, Eq. (54) is a neutrino mas matrix as predicted by the model at the tree level. The neutrino masses also receive higher order corrections and for the masses of RH neutrinos of ${\cal O}(100)$ GeV, these corrections are non-negligible in general. We, therefore, include 1-loop correction to determine the viability of this model in reproducing the neutrino masses and mixing parameters and to derive its reliable predictions. There are several sources of 1-loop correction to the neutrino masses in this model. The dominant contribution arises from the self- energy correction mediated by the lightest Higgs $H$ and $Z$ bosons Grimus and Lavoura (2002); Aristizabal Sierra and Yaguna (2011). These are evaluated in Grimus and Lavoura (2002) for multi Higgs doublets. Using this we obtain in our case, $\delta m_{\nu}^{(1)}=\frac{1}{32\pi^{2}v^{2}}\,m_{D}\,U_{N}^{*}\,{\rm Diag.}\left(g(M_{N_{1}}),g(M_{N_{2}}),g(M_{N_{3}})\right)\,U_{N}^{\dagger}\,m_{D}^{T}\,,$ (60) where $U_{N}$ is a unitary matrix which diagonalizes $M_{N}$ such that $M_{N}=U_{N}{\rm Diag.}(M_{N_{1}},M_{N_{2}},M_{N_{3}})U_{N}^{T}\,,$ (61) and $g(M_{i})=M_{i}\left(\frac{1}{\sin^{2}\beta}\,\frac{\log\frac{M_{i}^{2}}{m_{H}^{2}}}{\frac{M_{i}^{2}}{m_{H}^{2}}-1}\,+\,3\,\frac{\log\frac{M_{i}^{2}}{m_{Z}^{2}}}{\frac{M_{i}^{2}}{m_{Z}^{2}}-1}\right)\,.$ (62) Similar corrections at 1-loop also arise from supersymmetric particles in the loop. We list them in Appendix B. Complete determination of the magnitude of these correction in general requires specification of SUSY breaking sector and depending on the later their contribution can be sizeable or sub-dominant. For a range of parameters of our interest, we find that these contributions remain small and $\delta m_{\nu}^{(1)}$ given in Eq. (60) captures the most relevant and dominant 1-loop correction. The 1-loop corrected neutrino mass matrix is therefore given by $m_{\nu}=m^{(0)}_{\nu}+\delta m_{\nu}^{(1)}\,.$ (63) The charged lepton mass matrix is dominantly given by $3\times 3$ matrix $m_{l}$ which is diagonal and real. Hence, the lepton mixing matrix can be determined from diagonalization of $m_{\nu}$ only. Note that $\lambda_{\alpha}$, $\epsilon$ and $U$ can be chosen real without loss of generality. $A_{0}$ and $k$ are also real if no CP violation is introduced in the soft SUSY breaking sector. The CP violation in the lepton sector, therefore, arises only from a parameter $\lambda$. Considering the present generic limits on the masses of neutralinos and charginos Zyla _et al._ (2020), we take $M_{1}\simeq M_{2}\simeq\mu=1$ TeV to evaluate the neutrino mass spectrum. We also fix $\tan\beta\equiv v_{2}/v_{1}=2$. This implies $\zeta=24.13$ GeV from Eq. (30) and $A_{0}=-2.8\times 10^{-4}\,{\rm GeV^{-1}}$ from Eq. (31). We fix $\kappa=1$ and choose four sample values for $U$ and determine the remaining dimensionless eight real parameters (real $r_{e}$, $r_{\mu}$, $\epsilon$, $\phi$, $\lambda_{\tau}$, $k$ and complex $\lambda$) using $\chi^{2}$ minimization. The $\chi^{2}$ function includes two neutrino squared mass differences, three mixing angles and a Dirac CP phase. We use the values of these observables from the latest global fit results (NuFIT v5.0) Esteban _et al._ (2020). We also assume normal ordering in neutrino masses. The results for four example values of $U$ are displayed in Table 1. Parameters | BP 1 | BP 2 | BP 3 | BP 4 ---|---|---|---|--- $U$ [GeV] | $10^{3}$ | $10^{4}$ | $10^{5}$ | $10^{6}$ $\kappa$ | $1.0$ | $1.0$ | $1.0$ | $1.0$ $\lambda$ | $0.5591+0.1449\,i$ | $0.6148-0.2204\,i$ | $0.7513+0.0327\,i$ | $-0.8436-0.0283\,i$ $\epsilon$ | 0.1648 | -0.0955 | 0.0276 | 0.0035 $\phi$ | 3.0965 | -3.011 | -2.8527 | -0.7434 $\lambda_{\tau}$ | $9.73\times 10^{-8}$ | $2.321\times 10^{-7}$ | $-5.895\times 10^{-7}$ | $-1.2484\times 10^{-6}$ $r_{\mu}$ | 27.2463 | -8.3797 | 4.614 | -1.5014 $r_{e}$ | -5.2322 | -140.889 | -16.6385 | -55.4134 $k$ | 0 | 0.0252 | -0.006 | 0.0005 $\Delta m^{2}_{21}$ [$10^{-5}$ eV2] | 7.42 | 7.35 | 7.42 | 7.42 $\Delta m^{2}_{31}$ [$10^{-3}$ eV2] | 2.516 | 2.517 | 2.517 | 2.517 $\sin^{2}\theta_{12}$ | 0.302 | 0.299 | 0.304 | 0.304 $\sin^{2}\theta_{23}$ | 0.578 | 0.584 | 0.573 | 0.573 $\sin^{2}\theta_{13}$ | 0.0221 | 0.0221 | 0.0222 | 0.0222 $\sin\delta_{\rm CP}$ | -0.78 | -0.57 | -0.29 | -0.29 $\sum m_{\nu_{i}}$ [eV] | 0.146 | 0.086 | 0.09 | 0.092 $|m_{\beta\beta}|$ [eV] | 0.039 | 0.016 | 0.019 | 0.019 $M_{N_{1}}$ [GeV] | 8.34 | 159.7 | 1132 | 2912 $M_{N_{2}}$ [GeV] | 581.1 | 6479 | $7.466\times 10^{4}$ | $8.426\times 10^{5}$ $M_{N_{3}}$ [GeV] | 589.5 | 6639 | $7.579\times 10^{4}$ | $8.455\times 10^{5}$ Table 1: The best fit values of model parameters, corresponding results for neutrino masses and mixing observables and relevant predictions for four benchmark solutions obtained for $\kappa=1$ and different values of $U$. The solution BP 1 represent the pure seesaw case discussed earlier in Eq. (IV) but it now includes the radiatiove correction. This is shown here for specific values of various parameters for comparison. The benchmark points BP 3 and BP 4 reproduce the central values of neutrino squared mass differences and mixing parameters as obtained from the latest global fit results Esteban _et al._ (2020). BP 1 and BP 2 reproduce all the observables within $1.3\sigma$. It is seen that the 1-loop correction considered in Eq. (60) significantly modifies one of the elements of $m_{\nu}$ from its tree level value. This is shown explicitly in Appendix B where we also discuss the strengths of the other 1-loop corrections. We also repeat the same analysis but for $\kappa=0$ and the corresponding results are discussed in Appendix C. In Table 1, we also list predictions for the sum of the three light neutrino masses, the effective mass parameter relevant for neutrinoless double beta decay (i.e. $m_{\beta\beta}=U_{ei}^{2}\,m_{\nu_{i}}$), and mass spectrum of the RH neutrinos. It can be seen that all the benchmark points predict relatively degenerate mass spectrum for the light neutrinos. The obtained value of $|m_{\beta\beta}|$ is smaller than the current upper limits from various recent experiments seearching for neutrinoless double beta decay as listed in Dolinski _et al._ (2019). The strongest constraint on the neutrino mass spectrum of the model comes from the cosmological observations. The current limit from Planck collaboration is $\sum m_{\nu_{i}}<0.12$ eV Aghanim _et al._ (2020) (see also Vagnozzi _et al._ (2017)) which seems to be in conflict with the prediction of BP 1. However, in deriving the constraint on the sum of the neutrino masses from cosmology, it is assumed that the neutrinos are stable or atleast their lifetime is greater than the age of the universe. If neutrinos decay into invisible radiation on the time scales shorter than the age of the universe, the above constraint can be replaced by a much weaker limit Chacko _et al._ (2020), as weak as $\sum m_{\nu_{i}}<0.9$ eV. In our model, neutrinos can decay into Majoron allowing such a possibility. We compute the neutrino lifetime in the next section and show that the solution BP 1 can evade the strongest limit444Alternatively, the stricter limit on $\sum m_{\nu_{i}}$ can also be relaxed in models based on dynamical dark energy with arbitrary equation of state Vagnozzi _et al._ (2018).. A pair of the heavier neutrinos is quasi-degenerate while the mass of the pGF is predicted to be $<{\cal O}(200)$ GeV for some of the benchmark points. The later is within the kinematic reach of the LHC. However, it’s production and detection involves coupling with the SM particles which arise through active- sterile neutrino mixing in the standard scenario and hence the current bounds are sensitive to such mixing. We estimate this in section VI and obtain that the magnitude of the underlying mixing is $\lesssim 10^{-6}$. For such a small mixing, the current ATLAS Aad _et al._ (2015) and CMS Khachatryan _et al._ (2015, 2016) analysis do not put any limit on the RH neutrino masses. ## V Majoron and its couplings As a consequence of spontaneous breaking of $U(1)_{L_{\mu}-L_{\tau}}$, there exists a massless Goldstone boson - Majoron - which was primarily given by the linear combination Eq. (6). Since two of the three lepton doublets are also charged under $U(1)_{L_{\mu}-L_{\tau}}$, this structure gets modified to $J\simeq\cos\phi\,\tilde{N}_{I\tau}-\sin\phi\,\tilde{N}_{I\mu}+\frac{\omega^{\prime}_{\mu}}{U}\,\tilde{\nu}_{I\mu}-\frac{\omega^{\prime}_{\tau}}{U}\,\tilde{\nu}_{I\tau}\,.$ (64) Majoron couples to the leptons at the tree level in this model while the couplings with the other SM particles can arise through loop(s). The leptonic Majoron couplings are strongly constrained from cosmology and astrophysics. The strongest constraints on the neutrino-Majoron couplings, denoted by $g_{ij}$ here, come from the observed CMB spectrum which requires that the neutrinos should be free streaming at the time of the photon decoupling. This restricts both the diagonal and the off-diagonal couplings Hannestad and Raffelt (2005); Raffelt and Weiss (1995); Ayala _et al._ (2014). For the diagonal neutrino couplings with Majoron, the constraint reads $|g_{ii}|\>\raisebox{-4.73611pt}{$\stackrel{{\scriptstyle\textstyle<}}{{\sim}}$}\>10^{-7}$ while the off-diagonal couplings are required to be $|g_{ij}|\>\raisebox{-4.73611pt}{$\stackrel{{\scriptstyle\textstyle<}}{{\sim}}$}\>0.61\times 10^{-11}\,\left(\frac{0.05\,{\rm eV}}{m_{\nu_{i}}}\right)^{2}$ (65) for the hierarchical neutrino masses. The off-diagonal couplings $h_{\alpha\beta}$ of Majoron to the charged leptons are constrained from the non observation of the decay $e_{\alpha}\rightarrow e_{\beta}J\,.$ The branching ratio of $\alpha$ lepton decaying into Majoron and $\beta$ lepton is estimated as ${\rm BR}[\alpha\to\beta\,J]=\frac{\Gamma[\alpha\to\beta\,J]}{\Gamma[\alpha\to\beta\,\nu_{\alpha}\,\bar{\nu}_{\beta}]}\simeq\frac{12\pi^{2}}{G_{F}^{2}m_{\alpha}^{4}}\,|h_{\alpha\beta}|^{2}\,,$ (66) for $m_{\alpha}\gg m_{\beta},m_{J}$. The experimental limits ${\rm BR}[\mu\to e\,J]\leq 2.6\times 10^{-6}$ Jodidio _et al._ (1986) and ${\rm BR}[\tau\to e/\mu\,J]\leq 10^{-3}$ Albrecht _et al._ (1995) require $|h_{\mu e}|<1.9\times 10^{-11}\,,~{}~{}|h_{\tau e}|,|h_{\tau\mu}|<1.1\times 10^{-7}\,.$ (67) The electron coupling to Majoran is contained from the energy loss from red giant and require Raffelt and Weiss (1995); Ayala _et al._ (2014) $|h_{ee}|<2.57\times 10^{-13}\,.$ (68) We systematically evaluate leptonic couplings to Majoron below and show that the above bounds are satisfied for the set of parameters which give the correct neutrino spectrum. In particular, the Majoron coupling to electron is absent in the model in the seesaw limit and $g_{ee}$ much smaller than the value required above arise from higher order terms in the seesaw expansion. ### V.1 Couplings with neutrinos In the $U(1)_{L_{\mu}-L_{\tau}}$ based model, the dominant interaction of the light neutrinos with Majoron arises from primarily two sources: (a) through light-heavy neutrino mixing from $W_{N}$ in Eq. (1), and (b) through neutrino- neutralino mixing from $W$ in Eq. (40) and gauge interactions. From the F-term of $W_{N}$ and substitution given in Eq. (5), the relevant interaction terms are ${\cal L}^{(a)}_{\nu J}=-\frac{i\lambda}{\sqrt{2}}\,\left(N_{\tau}^{T}C^{-1}N_{e}\,\tilde{N}_{I\mu}+N^{T}_{\mu}C^{-1}N_{e}\,\tilde{N}_{I\tau}\right)+{\rm h.c.}\,.$ (69) The above gives rise to coupling between Majoron and the light neutrinos through heavy-light neutrino mixing. The later can be computed using diagonalization of the relevant blocks of neutral fermion mass matrix given in Eq. (21) with $M_{N}$, $m_{\nu\chi}$, $M_{\chi}$ as written in Eqs. (14,23,24) respectively and $m_{D}$, $m_{N\chi}$ given in Eq. (42). The full matrix ${\cal M}_{\cal N}$ is block diagonalized at the leading order using a unitary matrix $U_{\cal N}=\left(\begin{array}[]{ccc}1&\rho_{D}&\rho_{\nu\chi}\\\ -\rho_{D}^{\dagger}&1&\rho_{N\chi}\\\ -\rho_{\nu\chi}^{\dagger}&-\rho_{N\chi}^{\dagger}&1\end{array}\right)\,+\,{\cal O}(\rho^{2})\,.$ (70) such that $U_{\cal N}^{T}{\cal M}_{\cal N}U_{\cal N}$ is an approximate block diagonal matrix. Here, $\rho_{D}\simeq(m_{D}M_{N}^{-1})^{*}\,,~{}~{}\rho_{\nu\chi}\simeq(m_{\nu\chi}M_{\chi}^{-1})^{*}\,,~{}~{}\rho_{\chi N}\simeq(m_{N\chi}M_{\chi}^{-1})^{*}\,.$ (71) The neutral fermions in the block-diagonal basis are then obtained from the original basis as $U_{\cal N}^{\dagger}\psi^{0}$. Using this and denoting the light neutrinos in block diagonal basis as $\nu_{\alpha}^{\prime}$, we find $\displaystyle N_{e}$ $\displaystyle=$ $\displaystyle-(\rho_{D}^{\dagger})_{1\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha 1}}\,B_{0}\,\epsilon\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$ $\displaystyle N_{\mu}$ $\displaystyle=$ $\displaystyle-(\rho_{D}^{\dagger})_{2\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha 2}}\,B_{0}\,\sin\phi\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$ $\displaystyle N_{\tau}$ $\displaystyle=$ $\displaystyle-(\rho_{D}^{\dagger})_{3\alpha}\,\nu_{L\alpha}^{\prime}=(-1)^{1-\delta_{\alpha 3}}\,B_{0}\,\cos\phi\,\epsilon_{\alpha}\,\nu_{L\alpha}^{\prime}\,,$ (72) where $B_{0}=\frac{v_{2}}{U^{2}\lambda\epsilon\sin 2\phi}=\frac{v_{2}}{M_{N_{1}}U}\,.$ (73) Substituting Eq. (V.1) in Eq. (69) and use of Eq. (64) determine the couplings of heavy and light neutrinos with Majoron. As we are interested in the latter, the relevant part is obtained as ${\cal L}^{(a)}_{\nu J}=-i\frac{B_{0}}{\sqrt{2}U}\,\frac{v_{2}}{U}\,(-1)^{(1-\delta_{\beta 1})}\,\epsilon_{\beta}\left(\epsilon_{\mu}\,\nu_{L\mu}^{\prime T}-\epsilon_{\tau}\,\nu_{L\tau}^{\prime T}\right)C^{-1}\nu_{L\beta}^{\prime}\,J\,+{\rm h.c.}\,.$ (74) In the physical basis of the light neutrinos, $\nu_{L\alpha}^{\prime}=U_{\alpha i}\,\nu_{Li}$ where $U_{\alpha i}$ are the elements of the PMNS matrix, the above term is written as ${\cal L}^{(a)}_{\nu J}=-ig_{ij}^{(a)}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm h.c.}\,,$ (75) with $g^{(a)}_{ij}=\frac{B_{0}}{\sqrt{2}U}\,\frac{v_{2}}{U}\,\sum_{\beta}\,(-1)^{(1-\delta_{\beta 1})}\,\left(\epsilon_{\mu}\,U_{\mu i}-\epsilon_{\tau}\,U_{\tau i}\right)\,\epsilon_{\beta}\,U_{\beta j}\,.$ (76) We now evaluate the neutrino-Majoron coupling which arise from the neutrino- neutralino mixing. The relevant Lagrangian can be read from Eq. (40) and gauge interaction as $\displaystyle{\cal L}^{(b)}_{\nu J}$ $\displaystyle=$ $\displaystyle-\frac{i}{\sqrt{2}}\left(\lambda_{\mu}\,\nu_{L\mu}^{T}\tilde{N}_{I\mu}+\lambda_{\tau}\,\nu_{L\tau}^{T}\tilde{N}_{I\mu}\right)C^{-1}\tilde{h}_{2}^{0}+\frac{i}{2}(g^{\prime}\tilde{B}^{T}-g\tilde{W}^{0T})C^{-1}\nu_{L\beta}\,\tilde{\nu}_{I\beta}+{\rm h.c.}\,,$ (77) where we define $-i\lambda_{1}\equiv\tilde{B}$ and $-i\lambda_{2}\equiv\tilde{W}^{0}$. The neutral fermions $\tilde{h}_{2}^{0}$, $\tilde{B}$ and $\tilde{W}^{0}$ in the above contain the light neutrinos when ${\cal M}_{\cal N}$ is block diagonalized. From Eqs. (70,71), we obtain $\displaystyle\tilde{h}_{2}^{0}$ $\displaystyle=$ $\displaystyle-(\rho_{\nu\chi}^{\dagger})_{4\alpha}\,\nu_{L\alpha}^{\prime}=\frac{v_{1}}{\mu}A_{0}\,\omega_{\alpha}\,U_{\alpha i}\,\nu_{Li}\,,$ $\displaystyle\tilde{B}$ $\displaystyle=$ $\displaystyle-(\rho_{\nu\chi}^{\dagger})_{1\alpha}\,\nu_{L\alpha}^{\prime}=-\frac{\sqrt{2}g^{\prime}M_{2}}{g^{2}M_{1}+g^{\prime 2}M_{2}}\,A_{0}\,\omega_{\alpha}\,U_{\alpha i}\,\nu_{Li}\,,$ $\displaystyle\tilde{W}^{0}$ $\displaystyle=$ $\displaystyle-(\rho_{\nu\chi}^{\dagger})_{2\alpha}\,\nu_{L\alpha}^{\prime}=\frac{\sqrt{2}gM_{1}}{g^{2}M_{1}+g^{\prime 2}M_{2}}\,A_{0}\,\omega_{\alpha}\,U_{\alpha i}\,\nu_{Li}\,,$ (78) where $A_{0}$ and $\omega_{\alpha}$ are defined in Eqs. (31,34). Substituting the above relations in Eq. (77) and use of Eq. (64) lead to the following interaction between the SM neutrinos and Majoron: ${\cal L}^{(b)}_{\nu J}=-ig_{ij}^{(b)}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm h.c.}\,,$ (79) with $g^{(b)}_{ij}=\frac{A_{0}}{\sqrt{2}U}\,\sum_{\beta}\,\left(\omega_{\mu}\,U_{\mu i}-\omega_{\tau}\,U_{\tau i}\right)\,\omega_{\beta}\,U_{\beta j}\,.$ (80) Combining the two contributions, the light neutrino-Majoron coupling is parametrized as $-{\cal L}_{\nu J}=ig_{ij}\,\nu^{T}_{Li}C^{-1}\nu_{Lj}\,J\,+{\rm h.c.}\,,$ (81) with $g_{ij}=g_{ij}^{(a)}+g_{ij}^{(b)}=\frac{B_{0}v_{2}}{\sqrt{2}\,U^{2}}\,\sum_{\beta}\left((-1)^{(1-\delta_{\beta 1})}+\eta_{0}\right)\left(\epsilon_{\mu}\,U_{\mu i}-\epsilon_{\tau}\,U_{\tau i}\right)\,\epsilon_{\beta}\,U_{\beta j}\,,$ (82) where we have used $\omega_{\alpha}=k\epsilon_{\alpha}$ and $\eta_{0}=\frac{A_{0}k^{2}U^{2}M_{N_{1}}}{v_{2}^{2}}\,.$ (83) Note that for $\kappa\to 0$, $\eta_{0}$ denotes the relative strength of $R$-parity violating contribution compared to the standard seesaw contribution to the neutrino masses. For $|\eta_{0}|<1$, the neutrino-Majoron coupling is dominantly determined by the light-heavy neutrino mixing while for $|\eta_{0}|>1$ it mainly arises from the neutrino-neutralino mixing. The interaction in Eq. (81) leads to neutrino decay into Majoron whenever it is kinematically allowed. The decay width can be estimated as $\Gamma[\nu_{j}\to\nu_{i}\,J]=\frac{\lambda^{1/2}[m_{\nu j}^{2},m_{\nu i}^{2},m_{J}^{2}]}{16\pi\,m_{\nu j}^{3}}\,|g_{ji}|^{2}\,\left(m_{\nu j}^{2}+m_{\nu i}^{2}-m_{J}^{2}-2m_{\nu i}m_{J}\right)\,,$ (84) where $\lambda[x,y,z]=x^{2}+y^{2}+z^{2}-2xy-2yz-2zx$. Assuming massless Majoron, we compute the total decay width of $\nu_{3}$ as $\Gamma_{\nu}\equiv\Gamma[\nu_{3}\to\nu_{2}\,J]+\Gamma[\nu_{3}\to\nu_{1}\,J]$ and the lifetime $\tau_{\nu}=1/\Gamma_{\nu}$ for the benchmark solutions listed in Table 1. The results are displayed in Table 2 where we also list the obtained value of $|\eta_{0}|$ and the relevant off-diagonal and the largest diagonal couplings $|g_{ij}|$. Parameters | BP 1 | BP 2 | BP 3 | BP 4 ---|---|---|---|--- $|\eta_{0}|$ | 0 | 0.118 | 4.79 | 7.67 ${\rm Max.}\\{|g_{ii}|\\}$ | $1.2\times 10^{-14}$ | $5.8\times 10^{-15}$ | $1.8\times 10^{-16}$ | $2.8\times 10^{-17}$ $|g_{32}|$ | $3.3\times 10^{-14}$ | $8.9\times 10^{-16}$ | $4.5\times 10^{-17}$ | $6.2\times 10^{-18}$ $|g_{31}|$ | $4.0\times 10^{-14}$ | $1.4\times 10^{-15}$ | $4.1\times 10^{-17}$ | $4.9\times 10^{-18}$ $\tau_{\nu}$ [sec.] | $2.3\times 10^{14}$ | $2.4\times 10^{17}$ | $1.7\times 10^{20}$ | $1.0\times 10^{22}$ Table 2: Predictions for the largest diagonal coupling of neutrinos with Majoron, off-diagonal couplings relevant for neutrino decays and the corresponding neutrino lifetime for the benchmark solutions. The neutrino lifetime turns out to be smaller than the age of the universe for solution BP 1 and hence the stringent limit on the sum of neutrino masses does not apply on this solutions as discussed earlier. The derived values of the neutrino-Majoron couplings for all the benchmark solutions obey the limits Eq. (65). ### V.2 Couplings with charged leptons The chargino spectrum of the model consists of three pairs of the charged lepton fields and pairs of charged wino and Higgsino. In the basis $\psi_{+}=\left(e^{c}_{\alpha},-i\lambda^{+},h_{2}^{+}\right)^{T}$ and $\psi_{-}=\left(e_{\alpha},-i\lambda^{-},h_{1}^{-}\right)^{T}$, the charged fermion masses are given by $-{\cal L}_{\cal C}=\psi_{-}^{T}\,{\cal M}_{\cal C}\,\psi_{+}\,+\,{\rm h.c.}\,,$ (85) with ${\cal M}_{\cal C}=\left(\begin{array}[]{cc}m_{l}&m_{lC}\\\ m_{lC}^{\prime}&M_{C}\end{array}\right)\,,$ (86) and $m_{l}=v_{1}\,{\rm Diag.}\left(\lambda_{e}^{\prime},\lambda_{\mu}^{\prime},\lambda_{\tau}^{\prime}\right)\,,~{}~{}M_{C}=\left(\begin{array}[]{cc}M_{2}&gv_{2}\\\ gv_{1}&\mu\end{array}\right)\,,$ (87) $m_{lC}=\left(\begin{array}[]{cc}g\omega^{\prime}_{e}&\epsilon_{e}\\\ g\omega^{\prime}_{\mu}&\epsilon_{\mu}\\\ g\omega^{\prime}_{\tau}&\epsilon_{\tau}\end{array}\right)\,,~{}~{}m_{lC}^{\prime}=\left(\begin{array}[]{ccc}0&0&0\\\ -\omega^{\prime}_{e}\lambda^{\prime}_{e}&-\omega^{\prime}_{\mu}\lambda^{\prime}_{\mu}&-\omega^{\prime}_{\tau}\lambda^{\prime}_{\tau}\end{array}\right)\,.$ (88) From $W$ in Eq. (40) and gauge interactions, we get the following interaction term involving the charged fermions and Majoron $\displaystyle{\cal L}_{lJ}$ $\displaystyle=$ $\displaystyle\frac{i}{\sqrt{2}}\,\left(\lambda_{\mu}\,\mu\tilde{N}_{I\mu}+\lambda_{\tau}\,\tau\tilde{N}_{I\tau}\right)\tilde{h}_{2}^{+}+\frac{i}{\sqrt{2}}\left(\lambda^{\prime}_{\mu}\,\tilde{\nu}_{I\mu}\mu^{c}+\lambda^{\prime}_{\tau}\,\tilde{\nu}_{I\tau}\tau^{c}\right)\tilde{h}_{1}^{-}\,$ (89) $\displaystyle-$ $\displaystyle\frac{i}{\sqrt{2}}\,g\left(\tilde{\nu}_{I\mu}\,\mu+\tilde{\nu}_{I\tau}\,\tau\right)(-i\lambda^{+})\,+\,{\rm h.c.}\,.$ The chargino-charged lepton mixing can be evaluated by block diagonalizing the matrix ${\cal M}_{\cal C}$ given in Eq. (86). For $m_{l}<m_{lC}<M_{C}$, this is done using the following leading order unitary matrices $U_{+}=\left(\begin{array}[]{cc}1&(M_{C}^{-1}m_{lC}^{\prime})^{\dagger}\\\ -M_{C}^{-1}m_{lC}^{\prime}&1\end{array}\right)\,,~{}~{}U_{-}=\left(\begin{array}[]{cc}1&(m_{lC}M_{C}^{-1})^{*}\\\ -(m_{lC}M_{C}^{-1})^{T}&1\end{array}\right)\,.$ (90) such that $U_{-}^{T}\,{\cal M}_{\cal C}\,U_{+}\approx\left(\begin{array}[]{cc}m_{l}-m_{lC}\,M_{C}^{-1}\,m_{lC}^{\prime}&0\\\ 0&M_{C}\end{array}\right)\,.$ (91) The fields $\tilde{h}_{2}^{+}$, $\lambda^{+}$ and $\tilde{h}_{1}^{-}$ can then be written in the block diagonal basis of the charged leptons, $e^{\prime}_{\alpha}$ and $e^{c\prime}_{\alpha}$, as $\displaystyle h_{2}^{+}$ $\displaystyle=$ $\displaystyle-\left(M_{C}^{-1}m_{lC}^{\prime}\right)_{5\alpha}\,e^{c\prime}_{\alpha}=\frac{M_{2}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,\omega^{\prime}_{\alpha}\lambda^{\prime}_{\alpha}\,e^{c\prime}_{\alpha}\,,$ $\displaystyle-i\lambda^{+}$ $\displaystyle=$ $\displaystyle-\left(M_{C}^{-1}m_{lC}^{\prime}\right)_{4\alpha}\,e^{c\prime}_{\alpha}=-\frac{gv_{2}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,\omega^{\prime}_{\alpha}\lambda^{\prime}_{\alpha}\,e^{c\prime}_{\alpha}\,\,,$ $\displaystyle h_{1}^{-}$ $\displaystyle=$ $\displaystyle-\left((M_{C}^{-1})^{T}m_{lC}^{T}\right)_{5\alpha}\,e^{\prime}_{\alpha}=-\frac{M_{2}\epsilon_{\alpha}-g^{2}v_{2}\omega_{\alpha}^{\prime}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,e^{\prime}_{\alpha}\,\,.$ (92) Substitution of Eqs. (V.2,64) in Eq. (89) leads to $-{\cal L}_{lJ}=\frac{i}{\sqrt{2}}\frac{1}{Uv_{1}}\,\left(\omega^{\prime}_{\alpha}m_{\alpha}\xi_{\mu}\,\mu^{\prime}\,e^{c\prime}_{\alpha}+\omega_{\mu}m_{\mu}\xi_{\alpha}\,e^{\prime}_{\alpha}\,\mu^{c\prime}-(\mu\to\tau)\right)\,J\,+\,{\rm h.c.}\,,$ (93) where $m_{\alpha}\simeq v_{1}\lambda^{\prime}_{\alpha}$ are the charged lepton masses, and $\xi_{\alpha}=\frac{M_{2}\epsilon_{\alpha}-g^{2}v_{2}\omega^{\prime}_{\alpha}}{M_{2}\mu-g^{2}v_{1}v_{2}}\,.$ (94) As can be seen from Eq. (91) the charged lepton mass matrix, $M_{l}=m_{l}-m_{lC}\,M_{C}^{-1}m_{lC}^{\prime}$, in the block diagonal basis is approximately diagonal since $m_{l}$ is diagonal. The primed fields and corresponding physical states are related with each other by a unitary matrix very close to the identity matrix. Hence, the Majoron dominantly couples to the second and third generation charged leptons and its coupling to a pair of electrons arises only through $e-\alpha$ mixing $U_{e\alpha}\approx{\cal O}\left(\frac{\epsilon_{e}\lambda^{\prime}_{\alpha}\omega^{\prime}_{\alpha}}{m_{e}\mu}\right)$ induced by the seesaw correction $m_{lC}M_{C}^{-1}m^{\prime}_{lC}$. We estimate the magnitude of the coupling appearing in Eq. (93) for the benchmark solutions listed in Table 1. $\omega_{\alpha}^{\prime}$ can be expressed in terms of the known parameters using Eqs. (34,36). For $\mu,M_{2}\gg v$, one finds $h_{\alpha\beta}\equiv\frac{\omega^{\prime}_{\alpha}m_{\alpha}\xi_{\beta}}{\sqrt{2}Uv_{1}}\simeq\left(k+\frac{v_{1}}{\mu}\right)\frac{m_{\alpha}\epsilon_{\alpha}\epsilon_{\beta}}{\sqrt{2}\,v_{1}\mu U}\,.$ (95) The magnitudes of the largest value of $h_{\alpha\beta}$ obtained for different benchmark points are given in Table 3. These are consistent with the experimental bounds given in Eq.(67). Parameters | BP 1 | BP 2 | BP 3 | BP 4 ---|---|---|---|--- ${\rm Max.}\\{|h_{\alpha\beta}|\\}$ | $10^{-17}$ | $10^{-15}$ | $10^{-14}$ | $10^{-13}$ Table 3: Maximum value of charged leptons’ coupling with Majoron obtained for the different benchmark solutions. The strength of couplings is larger for solutions with the higher $U(1)$ breaking scale in contrast to neutrino-Majoron coupling. As mentioned earlier, the coupling of Majoron with electrons will be further suppressed and will be much smaller than $10^{-13}$ for all the solutions. This is in agreement with the astrophysical bounds from red giant Raffelt and Weiss (1995); Ayala _et al._ (2014) and SN 1987A Keil _et al._ (1997). ## VI Direct searches of pseudo-Goldstone fermion In the standard seesaw models, the direct searches of heavy neutrinos typically depend on production mechanisms which involve light-heavy neutrino mixing. Therefore, the production cross section is suppressed for small mixings between the active and sterile neutrinos Pilaftsis (1992). This picture changes significantly in the present framework as the lightest RH neutrino, which is a pseudo-Goldstone fermion, can be produced from the decays of neutralinos Lavignac and Medina (2021). The production of Higgsino-like neutralino state is governed by electroweak interactions and it is not suppressed in general. The RH neutrinos mix with neutralinos through mass mixing term $m_{\chi N}$ in Eq. (21). If this mixing is large enough then $N_{1}$ is produced in the decays of Higgsinos. For $M_{N_{1}}\ll m_{\chi^{0}}$, the produced heavy neutrino is boosted and its subsequent decays into $W$ and charged leptons or $Z$ and light neutrinos give rise to displaced vertex signature. Such a signature has a better visibility due to less SM background and hence it improves significantly the prospects of detecting the pGF. Note that the decays of $N_{1}$ in the visible particles are still governed by the light-heavy neutrino mixing. The details of the displaced vertex signature of pGF of this kind are recently discussed in Lavignac and Medina (2021). The parameter of primary interest here is the mixing between RH neutrinos and neutralino. This can be estimated following the same procedure outlined in section IV-A. One finds from Eq. (70), $N_{\alpha}=(\rho_{N\chi})_{\alpha m}\,\psi_{0,m}$ with $m=7,..,10$. This leads to the following leading order mixing between the RH neutrinos and neutralinos in the block-diagonal basis: $\displaystyle N_{e}$ $\displaystyle\simeq$ $\displaystyle\frac{2\kappa A_{0}vM_{1}M_{2}}{\mu(g^{2}M_{1}+g^{\prime 2}M_{2})}\,\left(\cos\beta\,\tilde{h}^{0}_{1}+\sin\beta\,\tilde{h}^{0}_{2}+\frac{g^{\prime}v}{\sqrt{2}M_{1}}\cos 2\beta\,\tilde{B}-\frac{gv}{\sqrt{2}M_{2}}\cos 2\beta\,\tilde{W^{0}}\right).$ (96) We have neglected $\lambda_{\alpha}$ dependent terms in $m_{N\chi}$ while deriving the above. $N_{\mu,\tau}$ do not contain any neutralino state at the leading order. Substituting the above in Eq. (16), one can determine the mixing between the pGF $N_{1}$ and neutralinos. As it can be seen, $N_{1}$ has dominant mixing with the Higgsino states and they are obtained as $\displaystyle V_{{N_{1}}\tilde{h}^{0}_{1}}$ $\displaystyle=$ $\displaystyle-\left(\frac{2A_{0}vM_{1}M_{2}}{\mu(g^{2}M_{1}+g^{\prime 2}M_{2})}\right)\,\kappa\epsilon\cos 2\phi\,\cos\beta\,\simeq\frac{v}{\mu}\kappa\epsilon\cos 2\phi\,\cos\beta\,,$ $\displaystyle V_{{N_{1}}\tilde{h}^{0}_{2}}$ $\displaystyle\simeq$ $\displaystyle\tan\beta\,V_{{N_{1}}\tilde{h}^{0}_{1}}\,,$ (97) for $v\ll M_{1,2}$. This can be compared with the $N_{1}$-$\nu_{i}$ mixing which can be read-off from similar expressions, Eq. (V.1), as $V_{{N_{1}}{\nu_{i}}}=V_{{N_{1}}{\nu_{\alpha}}}\,U_{\alpha i}\,,$ (98) where $\displaystyle V_{{N_{1}}{\nu_{e}}}$ $\displaystyle\simeq$ $\displaystyle- B_{0}\,\epsilon_{e}\cos 2\phi\,(1+\epsilon^{2})\,,$ $\displaystyle V_{{N_{1}}{\nu_{\mu}}}$ $\displaystyle\simeq$ $\displaystyle- B_{0}\,\epsilon_{\mu}\,(1-\epsilon^{2}\cos 2\phi)\,,$ $\displaystyle V_{{N_{1}}{\nu_{\tau}}}$ $\displaystyle\simeq$ $\displaystyle B_{0}\,\epsilon_{\tau}\,(1+\epsilon^{2}\cos 2\phi)\,.$ (99) For $\kappa\sim{\cal O}(1)$, one finds $|V_{{N_{1}}\tilde{h}^{0}_{1,2}}|\gg|V_{{N_{1}}{\nu_{i}}}|$ as the later is suppressed by Yukawa couplings $\lambda_{\alpha}$. The estimated values of the above mixing for the different benchmark solutions are listed in Table 4. Parameters | BP 1 | BP 2 | BP 3 | BP 4 ---|---|---|---|--- $\left|V_{{N_{1}}\tilde{h}^{0}_{1}}\right|$ | 0.013 | 0.0072 | 0.0007 | 0.0011 $\left|V_{{N_{1}}{\nu_{1}}}\right|$ | $1.6\times 10^{-6}$ | $2.6\times 10^{-6}$ | $2.7\times 10^{-8}$ | $6.4\times 10^{-8}$ $\left|V_{{N_{1}}{\nu_{2}}}\right|$ | $1.0\times 10^{-6}$ | $1.3\times 10^{-6}$ | $3.2\times 10^{-7}$ | $3.9\times 10^{-7}$ $\left|V_{{N_{1}}{\nu_{3}}}\right|$ | $2.5\times 10^{-6}$ | $4.7\times 10^{-7}$ | $1.1\times 10^{-7}$ | $2.6\times 10^{-7}$ Table 4: Estimated magnitudes of the pseudo-Goldstone fermion’s mixing with Higgsino and light neutrinos for the benchmark solutions. For the first two solutions, the obtained values of mixings are such that the pGF with mass less than $200$ GeV can be detected through displaced vertex signature at the LHC Lavignac and Medina (2021). ## VII Summary and Discussions Possibility of a RH neutrino being a Goldstone fermion of a spontaneously broken global $U(1)$ symmetry in the supersymmetric theories offers an interesting opportunity to confirm or otherwise, the mechanism of neutrino mass generation in direct search experiments. The singlet fermion is naturally light with mass of the order of gravitino mass scale in minimal supergravity like setup. Moreover, it can couple to some of the supersymmetric particles with large enough couplings such that the former can be produced at colliders through decays of the later. Investigating this general framework in detail, we find that the observed neutrino mass spectrum severely restricts the nature of $U(1)$ symmetry. The light neutrino masses arise in the framework through the standard type I seesaw mechanism as well as through the $R$-parity violating RH snuetrino VEVs. Because of their common origin, these contributions are highly correlated. It is shown that if all three families of the SM leptons have the same $U(1)$ charge and the soft SUSY breaking terms are flavour universal then two of the three light neutrinos remain massless despite the presence of more than one sources of neutrino mass generation. One requires large flavour violations in the soft sector to induce the solar neutrino mass scale with one neutrino still remaining massless. We show that this picture changes significantly when the underlying $U(1)$ is flavour dependent symmetry. Considering a particular example of $L_{\mu}-L_{\tau}$ symmetry, it is shown that viable neutrino masses and mixing can be obtained without introducing any flavour violation in the soft sector. The framework also contains a Majoron - the Goldstone boson of $U(1)_{L_{\mu}-L_{\tau}}$. We derive its couplings with the SM leptons and show that it couples weakly enough to evade the present constraints from cosmology, the stellar cooling as well as the constraints from the flavour violating decays of the charged leptons. Given this, and the fact that the viable neutrino mass spectrum can be achieved without any explicit breaking of $U(1)_{L_{\mu}-L_{\tau}}$, the Majoron can remain massless in the present framework. Light neutrinos can also decay into Majoron in this case and we find that the neutrino lifetime can be of the order of the age of universe or smaller if the scale of $U(1)$ breaking is $\lesssim\,10^{4}$ GeV. The nature of neutrino mass generation mechanism in this framework appears similar to the one in $\mu\nu$SSM model Lopez-Fogliani and Munoz (2006); Escudero _et al._ (2008); Ghosh and Roy (2009); Fidalgo _et al._ (2009). In the later, the bilinear terms including the $\mu$ term are assumed to be absent at the begining and they arise from the trilinear terms when RH neutrinos take VEVs. Typically, the most general trilinear terms are considered which explicitly violate the $U(1)$ lepton number. As a result, both the Dirac and RH neutrino mass matrices take general form in $\mu\nu$SSM. In contrast to this, the present framework uses a flavour dependent combination of lepton number as a global symmetry which leads to highly restricted forms of $m_{D}$ and $M_{N}$ and still gives viable explanation of lepton spectrum. More importantly, the structure of the RH neutrino masses is determined here from the combined requirement of the unbroken global supersymmetry and the spontaneous violation of the $U(1)$ symmetry. The $U(1)$ symmetry protects the masses of a boson and its superpartner which is identified as the lightest RH neutrino. The later receives mass from the local SUSY breaking effects. A weak scale RH neutrino as pGF, therefore, naturally emerge in this setup. Thus, the formalism presented here is more constrained than the $\mu\nu$SSM. If $\mu_{0}=0$ set by some mechanism, this shift in VEVs also generates a TeV scale $\mu$ parameter in the present framework in a simlar way discussed recently in Dvali and Jankowsky (2020). In this case, one typically finds $\mu\sim M_{N_{1}}\sim m_{3/2}$ and hence sub-TeV scale RH neutrino may face strong constraints from non-observation of neutralinos and/or charginos. The existence of a pGF coupled to Higgsino and the charged leptons offers an interesting possibility to search for this fermion at colliders through the displaced vertex signal. It is shown that such a signal can be observed Lavignac and Medina (2021) for the parameters of the model required to fit the neutrino data. ## Acknowledgements The work of KMP is partially supported by a research grant under INSPIRE Faculty Award (DST/INSPIRE/04/2015/000508) from the Department of Science and Technology, Government of India. The computational work reported in this paper was performed on the High Performance Computing (HPC) resources (Vikram-100 HPC cluster) at the Physical Research Laboratory, Ahmedabad. ## Appendix A Sneutrino VEVs and $k$ factor In this Appendix, we show the origin of Eq. (36) in the present framework. The procedure is similar to the one carried out previously in Joshipura _et al._ (2002); Giudice _et al._ (1993). When the scalar components of $\hat{N}_{\alpha}$ take VEVs, the bilinear terms in $W$ are given by $W\supset-\,\epsilon_{\alpha}\,\hat{L}_{\alpha}\hat{H}_{2}\,-\,\mu\,\hat{H}_{1}\hat{H}_{2}\,.$ (100) The $F$ and $D$ term potential evaluated from the above terms is $\displaystyle V_{F,D}$ $\displaystyle=$ $\displaystyle\left|\mu\tilde{H}_{1}+\epsilon_{\alpha}\tilde{L}_{\alpha}\right|^{2}+\left(|\mu|^{2}+|\epsilon_{\alpha}|^{2}\right)|\tilde{H}_{2}|^{2}+\frac{1}{8}(g^{2}+g^{\prime 2})\left(|\tilde{H}_{1}|^{2}-|\tilde{H}_{2}|^{2}+|\tilde{L}_{\alpha}|^{2}\right)^{2},$ (101) where index $\alpha$ is summed over. Further, the relevant soft terms can be written as $V_{\rm soft}=m_{1}^{2}\,|\tilde{H}_{1}|^{2}+m_{2}^{2}\,|\tilde{H}_{2}|^{2}+m_{\alpha}^{2}\,|\tilde{L}_{\alpha}|^{2}+\left\\{B_{\mu}\,\mu\,\tilde{H}_{1}\tilde{H}_{2}+A_{\alpha}\,\epsilon_{\alpha}\,\tilde{L}_{\alpha}\tilde{H}_{2}+{\rm h.c.}\right\\}\,.$ (102) The term proportional to $\epsilon_{\alpha}$ form $W$ can be rotated away with the following redefinitions of the fields $\mu\hat{H}_{1}+\epsilon_{\alpha}\hat{L}_{\alpha}\to\mu\hat{H}_{1}\,,~{}~{}~{}~{}-\epsilon_{\alpha}\hat{H}_{1}+\mu\hat{L}_{\alpha}\to\mu\hat{L}_{\alpha}\,.$ (103) In this new basis, $V_{F,D}$ does not contain terms involving $\epsilon_{\alpha}$ while $V_{\rm soft}$ gets replaced by $V_{\rm soft}\to V_{\rm soft}\,-\,\left\\{\frac{\epsilon_{\alpha}}{\mu}(m_{1}^{2}-m_{\alpha}^{2})\,\tilde{H}_{1}^{\dagger}\tilde{L}_{\alpha}\,+\,\left(B_{\mu}-A_{\alpha}\right)\epsilon_{\alpha}\,\tilde{L}_{\alpha}\tilde{H}_{2}\,+{\rm h.c.}\right\\}\,.$ (104) In the new basis, the VEV of $\tilde{L}_{\alpha}$ is denoted by $\omega_{\alpha}$. It is related to the VEV $\omega^{\prime}_{\alpha}$ in the original basis by Eq. (34) as can be explicitly seen from Eq. (103). Using the definition Eq. (36) and minimizing the full potential, we obtain $k_{\alpha}\simeq\frac{v_{1}}{\mu}\frac{(m_{1}^{2}-m_{\alpha}^{2})-\mu\tan\beta\left(B_{\mu}-A_{\alpha}\right)}{m_{\alpha}^{2}+\frac{1}{2}M_{Z}^{2}\,\cos 2\beta}\,.$ (105) The first term in $k_{\alpha}$ can be suppressed for universal soft masses, however the difference $B_{\mu}-A_{\alpha}$ can be arbitrary and hence $k_{\alpha}$ need not be small. For flavour universal soft terms, $k_{\alpha}\equiv k$ can be universal at SUSY breaking mediation scale and difference among $k_{\alpha}$ can arise through renormalization group evolution. ## Appendix B On the size of 1-loop contributions to the neutrino masses The resulting values of the tree level neutrino mass matrix $m_{\nu}^{(0)}$ and 1-loop corrected seesaw contribution $\delta m_{\nu}^{(1)}$ as defined in Eqs. (43) and (60) are obtained for example, in case of solution BP 4 as $\displaystyle m_{\nu}^{(0)}$ $\displaystyle=$ $\displaystyle\left(\begin{array}[]{ccc}5.84\,-0.319i&-8.379+0.932i&-6.071+0.675i\\\ -8.379+0.932i&-21.508-2.723i&-34.962-1.322i\\\ -6.071+0.675i&-34.962-1.322i&-11.29-1.429i\\\ \end{array}\right)\,{\rm meV}\,,$ (109) $\displaystyle\delta m_{\nu}^{(1)}$ $\displaystyle=$ $\displaystyle\left(\begin{array}[]{ccc}11.491&-0.006&0.005\\\ -0.006&0.419&-0.298\\\ 0.005&-0.298&0.219\\\ \end{array}\right)\,{\rm meV}\,.$ (113) The $(1,1)$ element of the neutrino mass matrix receives significant correction from $\delta m_{\nu}^{(1)}$ while the other elements are dominantly determined by tree level contribution. This characteristic has also been seen in the other benchmark solutions listed in Table 1. In the above, we considered 1-loop self-energy diagram of light neutrinos with Higgs/$Z$ and RH neutrinos in the loop. In general, the neutrino masses also receive corrections from SUSY particles in the loop. A comprehensive discussion on such corrections is given in Dedes _et al._ (2006). We outline these contributions and discuss their magnitudes in the context of our model. 1. 1. Neutralino - $\tilde{\nu}_{R}$ loop: This contribution arises when both Higgs/$Z$ and RH neutrinos are replaced by their SUSY partners in the self- energy diagram. The contribution is $R$-parity conserving and it goes like $(\delta m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{N}\,\lambda_{\alpha}\lambda_{\beta}\,\left(B_{0}\left[m_{\nu}^{2},m_{\tilde{\nu}^{+}_{R}}^{2},M_{N}^{2}\right]-B_{0}\left[m_{\nu}^{2},m_{\tilde{\nu}^{-}_{R}}^{2},M_{N}^{2}\right]\right)\,,$ (114) where $m_{\tilde{\nu}^{\pm}_{R}}$ are masses of CP even and odd RH sneutrinos. We have used the general result derived in Dedes _et al._ (2006) to evaluate the above contribution. Apparently, the above contribution depends on the mass spectrum of sneutrinos and hence its complete determination would require specification of the SUSY breaking mechanism. The contribution vanishes when the RH sneutrinos are degenerate as can be seen from Eq. (114). 2. 2. Neutralino-$H/Z$ loop: This arises when RH neutrino is replaced by neutralinos in the loop considered initially. This contribution arises through R-parity violating mixing between neutrino and neutralino and it goes as $(\delta m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{1}\,\left(\frac{\omega_{\alpha}\omega_{\beta}}{M_{1}^{2}}\right)\,\frac{m_{H/Z}^{2}}{M_{1}^{2}}\,\ln\frac{M_{1}^{2}}{m_{H/Z}^{2}}\,,$ (115) where $\omega_{\alpha}=k\epsilon_{\alpha}$ as defined in Eq. (34) and $M_{1}$ is a common neutralino mass scale. With $M_{1}=1$ TeV and the values of $\omega_{\alpha}$ obtained for solution BP 2, the largest magnitude of this contribution is ${\cal O}(10^{-6})$ eV. Hence, it is sub-dominant in comparison to loop corrected seesaw contribution given in Eq. (109). 3. 3. Neutralino - $\tilde{\nu}_{L}$ loop: This contribution also depends on the details of soft SUSY breaking sector. It vanishes for the degenerate masses of CP even and odd $\tilde{\nu}^{\pm}_{L}$. However, in the presence of $R$-parity violating soft terms, $\tilde{\nu}^{\pm}_{L}$ mix with the other CP even and odd neutral scalars and the mass splitting between $\tilde{\nu}^{\pm}_{L}$ eigenstates gets induced. The contribution to the neutrino mass is approximated as Dedes _et al._ (2006) $(\delta m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}M_{1}\,g^{2}\,\left(\frac{M_{1}}{m_{\tilde{\nu}_{L}}}\right)^{2}\,\frac{b_{\alpha}b_{\beta}\tan^{2}\beta}{(M_{N}^{2}-m_{\tilde{\nu}_{L}}^{2})^{2}}\,,$ (116) where $b_{\alpha}=B\epsilon_{\alpha}$. For typical values of the parameters, $M_{1}=1$ TeV, $m_{\tilde{\nu}_{L}}=2$ TeV, $\tan\beta=2$ and $b_{\alpha}=1.0$ GeV2, one obtains $\delta m_{\nu}\sim{\cal O}(10^{-5})$ eV. 4. 4. Chargino-slepton loop: This contribution is also computed in Dedes _et al._ (2006) but assuming vanishing VEVs for sneutrinos. We estimate this considering nonzero sneutrino VEVs and find that the dominant contribution is given by $(\delta m_{\nu})_{\alpha\beta}\sim\frac{1}{16\pi^{2}}m_{l}\,\tan\beta\frac{\omega_{\alpha}}{M_{C}}\,\frac{b_{\beta}}{M_{H^{+}}^{2}}\,,$ (117) where $m_{l}$ is charged lepton mass, $M_{2}$ is chargino mass. Another similar contribution also arise when $b_{\beta}$ is replaced by $\epsilon_{\beta}m_{l}$ in the above equation. These contributions are suppressed for $\omega_{\alpha}\ll\epsilon_{\alpha}$. For typical values, $M_{2}=1$ TeV, $M_{H^{+}}=2$ TeV, $\tan\beta=2$, $b_{\alpha}=1.0$ GeV2 and $\omega_{\alpha}=k\epsilon_{\alpha}$, the largest contribution from Eq. (117) for solution BP 2 is estimated as $\delta m_{\nu}\sim 10^{-8}$ eV which is again negligibly small compared to the 1-loop seesaw corrected contribution. Therefore, the 1-loop correction to the neutrino masses from the SUSY particles in the loop is insignificant in comparison to the loop corrected seesaw contribution that we have taken into consideration. The 2-loop correction to the seesaw is expected to remain smaller than 1-loop contribution as it is further suppressed by factor of $\lambda^{2}_{\alpha}/(4\pi)^{2}$. Hence, the results and predictions for the various observable parameters that we have derived using $m_{\nu}$ as given in Eq. (25) are robust. ## Appendix C Neutrino spectrum with $\kappa=0$ In this Appendix, we show the same results as displayed in Tables 1, 2 and 3 but for vanishingly small $\kappa$ and $\tan\beta=1.5$. These cases correspond to vanishingly small mixing between neutralino and RH neutrinos. As it can be seen, one can reproduce neutrino mass spectrum consistent with all the current experimental bounds in this case as well. For BP 6 and BP 7, the predicted value of the sum of light neutrino masses is larger than the current Planck limit. However, the neutrino lifetime obtained in these cases are shorter than the age of the universe as it can be seen from the corresponding values in Table 6. Hence, these solutions can evade the Planck constraint Chacko _et al._ (2020) as discussed in section IV. Parameters | BP 5 | BP 6 | BP 7 | BP 8 ---|---|---|---|--- $U$ [GeV] | $10^{3}$ | $10^{4}$ | $10^{5}$ | $10^{6}$ $\kappa$ | $0$ | $0$ | $0$ | $0$ $\lambda$ | $-0.1+0.0004\,i$ | $0.1168-0.0013\,i$ | $-0.9998-0.3\,i$ | $0.2973+0.0891\,i$ $\epsilon$ | 0.0139 | -0.0377 | -0.0015 | -0.0007 $\phi$ | -0.7764 | 2.1609 | -2.1093 | 1.7723 $\lambda_{\tau}$ | $7.59\times 10^{-8}$ | $5.031\times 10^{-7}$ | $4.261\times 10^{-7}$ | $9.032\times 10^{-7}$ $r_{\mu}$ | 1.0749 | 0.7156 | -0.8108 | 0.2771 $r_{e}$ | -43.4421 | -11.7682 | 85.9164 | 64.9009 $k$ | 4.2802 | 0.082 | 0.0118 | 0.0014 $\Delta m^{2}_{21}$ [$10^{-5}$ eV2] | $7.43$ | 7.43 | 7.42 | 7.42 $\Delta m^{2}_{31}$ [$10^{-3}$ eV2] | $2.513$ | 2.515 | 2.517 | 2.517 $\sin^{2}\theta_{12}$ | 0.309 | 0.303 | 0.304 | 0.304 $\sin^{2}\theta_{23}$ | 0.6 | 0.596 | 0.573 | 0.573 $\sin^{2}\theta_{13}$ | 0.0221 | 0.0221 | 0.0222 | 0.0222 $\sin\delta_{\rm CP}$ | -0.14 | -0.42 | -0.29 | -0.29 $\sum m_{\nu_{i}}$ [eV] | 0.252 | 0.23 | 0.093 | 0.093 $|m_{\beta\beta}|$ [eV] | 0.079 | 0.071 | 0.02 | 0.02 $M_{N_{1}}$ [GeV] | 1.39 | 40.7 | 133.4 | 91.2 $M_{N_{2}}$ [GeV] | 99.31 | 1147 | 104317 | 310266 $M_{N_{3}}$ [GeV] | 100.7 | 1188 | 104451 | 310357 Table 5: Same as Table 1 but with $\kappa=0$. Parameters | BP 5 | BP 6 | BP 7 | BP 8 ---|---|---|---|--- $|\eta_{0}|$ | 0.341 | 0.366 | 2.497 | 2.495 ${\rm Max.}\\{|g_{ii}|\\}$ | $1.5\times 10^{-14}$ | $1.4\times 10^{-15}$ | $1.2\times 10^{-16}$ | $1.2\times 10^{-17}$ $|g_{32}|$ | $5.9\times 10^{-14}$ | $5.9\times 10^{-15}$ | $1.4\times 10^{-17}$ | $1.4\times 10^{-18}$ $|g_{31}|$ | $6.7\times 10^{-14}$ | $6.0\times 10^{-15}$ | $3.1\times 10^{-18}$ | $3.1\times 10^{-19}$ $\tau_{\nu}$ [sec.] | $9.1\times 10^{13}$ | $9.9\times 10^{15}$ | $3.2\times 10^{21}$ | $3.2\times 10^{23}$ Table 6: Same as Table 2 but with $\kappa=0$. Parameters | BP 5 | BP 6 | BP 7 | BP 8 ---|---|---|---|--- ${\rm Max.}\\{|h_{\alpha\beta}|\\}$ | $10^{-16}$ | $10^{-15}$ | $10^{-14}$ | $10^{-13}$ Table 7: Same as Table 3 but with $\kappa=0$. ## References * Minkowski (1977) Peter Minkowski, “$\mu\to e\gamma$ at a Rate of One Out of $10^{9}$ Muon Decays?” Phys. Lett. B 67, 421–428 (1977). * Yanagida (1979) Tsutomu Yanagida, “Horizontal gauge symmetry and masses of neutrinos,” Conf. Proc. C 7902131, 95–99 (1979). * Mohapatra and Senjanovic (1980) Rabindra N. Mohapatra and Goran Senjanovic, “Neutrino Mass and Spontaneous Parity Nonconservation,” Phys. Rev. Lett. 44, 912 (1980). * Schechter and Valle (1980) J. Schechter and J. W. F. Valle, “Neutrino masses in su(2) $\bigotimes$ u(1) theories,” Phys. Rev. D 22, 2227–2235 (1980). * Fritzsch and Minkowski (1975) Harald Fritzsch and Peter Minkowski, “Unified Interactions of Leptons and Hadrons,” Annals Phys. 93, 193–266 (1975). * Gell-Mann _et al._ (1979) Murray Gell-Mann, Pierre Ramond, and Richard Slansky, “Complex Spinors and Unified Theories,” Conf. Proc. C 790927, 315–321 (1979), arXiv:1306.4669 [hep-th] . * Chun _et al._ (1995) E. J. Chun, Anjan S. Joshipura, and A. Yu. Smirnov, “Models of light singlet fermion and neutrino phenomenology,” Phys. Lett. B 357, 608–615 (1995), arXiv:hep-ph/9505275 . * Chun _et al._ (1996) Eung Jin Chun, Anjan S. Joshipura, and Alexei Yu. Smirnov, “QuasiGoldstone fermion as a sterile neutrino,” Phys. Rev. D 54, 4654–4661 (1996), arXiv:hep-ph/9507371 . * Barbier _et al._ (2005) R. Barbier _et al._ , “R-parity violating supersymmetry,” Phys. Rept. 420, 1–202 (2005), arXiv:hep-ph/0406039 . * Deppisch _et al._ (2015) Frank F. Deppisch, P. S. Bhupal Dev, and Apostolos Pilaftsis, “Neutrinos and Collider Physics,” New J. Phys. 17, 075019 (2015), arXiv:1502.06541 [hep-ph] . * Kersten and Smirnov (2007) Jörn Kersten and Alexei Yu. Smirnov, “Right-Handed Neutrinos at CERN LHC and the Mechanism of Neutrino Mass Generation,” Phys. Rev. D 76, 073005 (2007), arXiv:0705.3221 [hep-ph] . * Lee _et al._ (2013) Chang-Hun Lee, P. S. Bhupal Dev, and R. N. Mohapatra, “Natural TeV-scale left-right seesaw mechanism for neutrinos and experimental tests,” Phys. Rev. D 88, 093010 (2013), arXiv:1309.0774 [hep-ph] . * Chattopadhyay and Patel (2017) Pratik Chattopadhyay and Ketan M. Patel, “Discrete symmetries for electroweak natural type-I seesaw mechanism,” Nucl. Phys. B 921, 487–506 (2017), arXiv:1703.09541 [hep-ph] . * Lavignac and Medina (2021) Stéphane Lavignac and Anibal D. Medina, “Displaced Vertex signatures of a pseudo-Goldstone sterile neutrino,” JHEP 01, 151 (2021), arXiv:2010.00608 [hep-ph] . * Chikashige _et al._ (1981) Y. Chikashige, Rabindra N. Mohapatra, and R. D. Peccei, “Are There Real Goldstone Bosons Associated with Broken Lepton Number?” Phys. Lett. B 98, 265–268 (1981). * Goto and Yamaguchi (1992) Toru Goto and Masahiro Yamaguchi, “Is axino dark matter possible in supergravity?” Phys. Lett. B 276, 103–107 (1992). * Chun _et al._ (1992) E. J. Chun, Jihn E. Kim, and Hans Peter Nilles, “Axino mass,” Phys. Lett. B 287, 123–127 (1992), arXiv:hep-ph/9205229 . * Chun and Lukas (1995) E. J. Chun and A. Lukas, “Axino mass in supergravity models,” Phys. Lett. B 357, 43–50 (1995), arXiv:hep-ph/9503233 . * Lahanas and Nanopoulos (1987) A. B. Lahanas and Dimitri V. Nanopoulos, “The Road to No Scale Supergravity,” Phys. Rept. 145, 1 (1987). * Joshipura _et al._ (2002) Anjan S. Joshipura, Rishikesh D. Vaidya, and Sudhir K. Vempati, “Bi maximal mixing and bilinear R violation,” Nucl. Phys. B 639, 290–306 (2002), arXiv:hep-ph/0203182 . * Romao _et al._ (2000) J. C. Romao, M. A. Diaz, M. Hirsch, W. Porod, and J. W. F Valle, “A Supersymmetric solution to the solar and atmospheric neutrino problems,” Phys. Rev. D 61, 071703 (2000), arXiv:hep-ph/9907499 . * Hirsch _et al._ (2000) M. Hirsch, M. A. Diaz, W. Porod, J. C. Romao, and J. W. F. Valle, “Neutrino masses and mixings from supersymmetry with bilinear R parity violation: A Theory for solar and atmospheric neutrino oscillations,” Phys. Rev. D 62, 113008 (2000), [Erratum: Phys.Rev.D 65, 119901 (2002)], arXiv:hep-ph/0004115 . * Esteban _et al._ (2020) Ivan Esteban, M. C. Gonzalez-Garcia, Michele Maltoni, Thomas Schwetz, and Albert Zhou, “The fate of hints: updated global analysis of three-flavor neutrino oscillations,” JHEP 09, 178 (2020), arXiv:2007.14792 [hep-ph] . * Grimus and Lavoura (2002) Walter Grimus and Luis Lavoura, “One-loop corrections to the seesaw mechanism in the multi-Higgs-doublet standard model,” Phys. Lett. B 546, 86–95 (2002), arXiv:hep-ph/0207229 . * Aristizabal Sierra and Yaguna (2011) D. Aristizabal Sierra and Carlos E. Yaguna, “On the importance of the 1-loop finite corrections to seesaw neutrino masses,” JHEP 08, 013 (2011), arXiv:1106.3587 [hep-ph] . * Zyla _et al._ (2020) P.A. Zyla _et al._ (Particle Data Group), “Review of Particle Physics,” PTEP 2020, 083C01 (2020). * Dolinski _et al._ (2019) Michelle J. Dolinski, Alan W. P. Poon, and Werner Rodejohann, “Neutrinoless Double-Beta Decay: Status and Prospects,” Ann. Rev. Nucl. Part. Sci. 69, 219–251 (2019), arXiv:1902.04097 [nucl-ex] . * Aghanim _et al._ (2020) N. Aghanim _et al._ (Planck), “Planck 2018 results. VI. Cosmological parameters,” Astron. Astrophys. 641, A6 (2020), arXiv:1807.06209 [astro-ph.CO] . * Vagnozzi _et al._ (2017) Sunny Vagnozzi, Elena Giusarma, Olga Mena, Katherine Freese, Martina Gerbino, Shirley Ho, and Massimiliano Lattanzi, “Unveiling $\nu$ secrets with cosmological data: neutrino masses and mass hierarchy,” Phys. Rev. D 96, 123503 (2017), arXiv:1701.08172 [astro-ph.CO] . * Chacko _et al._ (2020) Zackaria Chacko, Abhish Dev, Peizhi Du, Vivian Poulin, and Yuhsin Tsai, “Cosmological Limits on the Neutrino Mass and Lifetime,” JHEP 04, 020 (2020), arXiv:1909.05275 [hep-ph] . * Vagnozzi _et al._ (2018) Sunny Vagnozzi, Suhail Dhawan, Martina Gerbino, Katherine Freese, Ariel Goobar, and Olga Mena, “Constraints on the sum of the neutrino masses in dynamical dark energy models with $w(z)\geq-1$ are tighter than those obtained in $\Lambda$CDM,” Phys. Rev. D 98, 083501 (2018), arXiv:1801.08553 [astro-ph.CO] . * Aad _et al._ (2015) Georges Aad _et al._ (ATLAS), “Search for heavy Majorana neutrinos with the ATLAS detector in pp collisions at $\sqrt{s}=8$ TeV,” JHEP 07, 162 (2015), arXiv:1506.06020 [hep-ex] . * Khachatryan _et al._ (2015) Vardan Khachatryan _et al._ (CMS), “Search for heavy Majorana neutrinos in $\mu^{\pm}\mu^{\pm}+$ jets events in proton-proton collisions at $\sqrt{s}$ = 8 TeV,” Phys. Lett. B 748, 144–166 (2015), arXiv:1501.05566 [hep-ex] . * Khachatryan _et al._ (2016) Vardan Khachatryan _et al._ (CMS), “Search for heavy Majorana neutrinos in e±e±\+ jets and e± $\mu^{\textpm}$\+ jets events in proton-proton collisions at $\sqrt{s}=8$ TeV,” JHEP 04, 169 (2016), arXiv:1603.02248 [hep-ex] . * Hannestad and Raffelt (2005) Steen Hannestad and Georg Raffelt, “Constraining invisible neutrino decays with the cosmic microwave background,” Phys. Rev. D 72, 103514 (2005), arXiv:hep-ph/0509278 . * Raffelt and Weiss (1995) Georg Raffelt and Achim Weiss, “Red giant bound on the axion - electron coupling revisited,” Phys. Rev. D 51, 1495–1498 (1995), arXiv:hep-ph/9410205 . * Ayala _et al._ (2014) Adrian Ayala, Inma Domínguez, Maurizio Giannotti, Alessandro Mirizzi, and Oscar Straniero, “Revisiting the bound on axion-photon coupling from Globular Clusters,” Phys. Rev. Lett. 113, 191302 (2014), arXiv:1406.6053 [astro-ph.SR] . * Jodidio _et al._ (1986) A. Jodidio, B. Balke, J. Carr, G. Gidal, K. A. Shinsky, H. M. Steiner, D. P. Stoker, M. Strovink, R. D. Tripp, B. Gobbi, and C. J. Oram, “Search for right-handed currents in muon decay,” Phys. Rev. D 34, 1967–1990 (1986). * Albrecht _et al._ (1995) H. Albrecht _et al._ (ARGUS), “A Search for lepton flavor violating decays tau $\to$ e alpha, tau $\to$ mu alpha,” Z. Phys. C 68, 25–28 (1995). * Keil _et al._ (1997) Wolfgang Keil, Hans-Thomas Janka, David N. Schramm, Gunter Sigl, Michael S. Turner, and John R. Ellis, “A Fresh look at axions and SN-1987A,” Phys. Rev. D 56, 2419–2432 (1997), arXiv:astro-ph/9612222 . * Pilaftsis (1992) Apostolos Pilaftsis, “Radiatively induced neutrino masses and large Higgs neutrino couplings in the standard model with Majorana fields,” Z. Phys. C 55, 275–282 (1992), arXiv:hep-ph/9901206 . * Lopez-Fogliani and Munoz (2006) D. E. Lopez-Fogliani and C. Munoz, “Proposal for a Supersymmetric Standard Model,” Phys. Rev. Lett. 97, 041801 (2006), arXiv:hep-ph/0508297 . * Escudero _et al._ (2008) Nicolas Escudero, Daniel E. Lopez-Fogliani, Carlos Munoz, and Roberto Ruiz de Austri, “Analysis of the parameter space and spectrum of the mu nu SSM,” JHEP 12, 099 (2008), arXiv:0810.1507 [hep-ph] . * Ghosh and Roy (2009) Pradipta Ghosh and Sourov Roy, “Neutrino masses and mixing, lightest neutralino decays and a solution to the mu problem in supersymmetry,” JHEP 04, 069 (2009), arXiv:0812.0084 [hep-ph] . * Fidalgo _et al._ (2009) Javier Fidalgo, Daniel E. Lopez-Fogliani, Carlos Munoz, and R. Ruiz de Austri, “Neutrino Physics and Spontaneous CP Violation in the mu nu SSM,” JHEP 08, 105 (2009), arXiv:0904.3112 [hep-ph] . * Dvali and Jankowsky (2020) Gia Dvali and Anna Jankowsky, “Absence of $\mu$-Problem in Grand Unification,” (2020), arXiv:2009.07762 [hep-ph] . * Giudice _et al._ (1993) G. F. Giudice, A. Masiero, M. Pietroni, and A. Riotto, “The Supersymmetric singlet majoron,” Nucl. Phys. B 396, 243–260 (1993), arXiv:hep-ph/9209296 . * Dedes _et al._ (2006) Athanasios Dedes, Steven Rimmer, and Janusz Rosiek, “Neutrino masses in the lepton number violating MSSM,” JHEP 08, 005 (2006), arXiv:hep-ph/0603225 .
arxiv-papers
2021-07-27T13:20:56
2024-09-04T03:07:21.605646
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Anjan S. Joshipura, Ketan M. Patel", "submitter": "Ketan Patel", "url": "https://arxiv.org/abs/2107.12802" }
2107.12803
# Dipolar Ising Model: Phases, Growth Laws and Universality Shikha Kumari Sanjay Puri School of Physical Sciences, Jawaharlal Nehru University, New Delhi - 110067, India Varsha Banerjee Department of Physics, Indian Institute of Technology Delhi, New Delhi - 110016, India ###### Abstract The behavior of many magnetic and dielectric solids, and the more contemporary magnetic super-lattices, is governed by dipolar interactions. They are anisotropic and long-ranged, having varied consequences ranging from ground states with complicated magnetic order to the presence of glassy dynamics characterized by a plethora of relaxation times. These systems are well- captured by the dipolar Ising model (DIM) with nearest-neighbor exchange interactions ($J$) and long-range dipolar interactions ($D$). Depending on the relative interaction strength $\Gamma=J/D$, there are four phases of distinct magnetic order and symmetry. Using Monte Carlo simulations, we perform deep quenches to study domain growth or coarsening in the $d=3$ DIM. This important non-equilibrium phenomenon has not been addressed as dipolar interactions are notoriously difficult to handle theoretically. Our study reveals that, in spite of the anisotropy in interactions and diversity in ground state configurations, we observe universality in the ordering dynamics of all phases. ## I Introduction Dipolar interactions are prevalent in magnetic and dielectric solids composed of rare-earths and transition metals Kretschmer and Binder (1979); Merz (1954); Molnar et al. (1997); Chakraborty et al. (2004); Chamberlain and Corruccini (2005); Biltmo and Henelius (2009); Wu et al. (2017); Cai et al. (2019). They are anisotropic and long-ranged, and arise from nuclear magnetic moments in alkali hydrides and solid ${}^{3}He$, electron magnetic moments in rare earth fluorides, chlorides and hydroxides, electric dipole moments in ferroelectric and anti-ferroelectric structures, etc. A large class of these compounds is well-described by the nearest-neighbor (nn) Ising model with dipolar interactions or the dipolar Ising model (DIM). For $N$ Ising spins on a $d$-dimensional cubic lattice with sites labeled by $i$, the Hamiltonian is given by $\mathcal{H}=-J\sum_{\langle ij\rangle}\sigma_{i}\sigma_{j}-D\sum_{\begin{subarray}{c}{i,j}\\\ i\neq j\end{subarray}}\left(\frac{3\cos^{2}{\theta}_{ij}-1}{r_{ij}^{3}}\right)\sigma_{i}\sigma_{j},\quad\sigma_{i}=\pm 1.$ (1) The first term on the right-hand-side is the contribution from the nn exchange energy. The parameter $J$ represents the interaction strength, and favors ferromagnetic (antiferromagnetic) alignment of spins for $J>0$ ($J<0$). The second term is the contribution from the dipole-dipole interactions, whose strength is given by $D=\mu^{2}/a^{3}$. Here, $\mu$ is the dipole moment of the spin, and $a$ is the spacing between nn sites of the underlying lattice. Further, $\vec{r}_{ij}$ is a vector joining sites $i$ and $j$ in units of lattice spacing $a$, and $\theta_{ij}$ is the angle made by $\vec{r}_{ij}$ with the Ising axis ($z$-axis). The presence of $r_{ij}^{3}$ in the denominator makes dipolar interactions long-ranged due to which spin-spin interactions are significant up to multiple lattice spacings. Consequently, the sum in the second term extends over all spin pairs. In addition to being long-ranged, the dipolar interactions are anisotropic, fluctuating in sign and strongly influenced by the underlying lattice structure. The $\theta_{ij}$-dependence implies that dipolar interactions can be zero, positive or negative – depending on the positions of the spins $i$ and $j$. For a reference spin $i$, the interaction with spin $j$ is zero for $3\cos^{2}{\theta}_{ij}-1=0$, antiferromagnetic for $$55\text{\,}\mathrm{\SIUnitSymbolDegree}$<\theta_{ij}<$125\text{\,}\mathrm{\SIUnitSymbolDegree}$$, and ferromagnetic for other values. Therefore, a ferromagnetic alignment of spins is favored along the $z$-direction, but domain walls are preferred along the $xy$-plane. A phase diagram of the DIM was obtained by Kretschmer and Binder for a simple cubic lattice $(L^{3},\ L=6,8)$ using Monte Carlo (MC) simulations Kretschmer and Binder (1979). The interplay of the nn exchange interactions and the complicated dipolar interactions reveals rich phase behavior. The phase diagram in Fig. 1 has been obtained by varying $J,T$ with fixed $D=1$. Depending on the relative interaction strength $\Gamma=J/D$, the system exhibits four phases with distinct magnetic order and symmetry: (I) For $\Gamma<-1.338$, the nn exchange interaction with $J<0$ dominates over the dipolar term. As expected, the ground state (GS) is an antiferromagnet (AFM). (II) For $-1.338<\Gamma<0.127$, the dipolar term dominates over the nn exchange interaction. The ground state is anisotropic and consists of ferromagnetic columns along the $z$-axis arranged antiferromagnetically in the $xy$-plane. We refer to this GS as a columnar antiferromagnet (CAFM). (III) For $0.127<\Gamma<0.164$, the nn exchange favors ferromagnetic alignment and the dipolar interaction continues to dominate. The GS structure changes to a layered antiferromagnet (LAFM) with a two-component order parameter. (IV) For $\Gamma>0.164$, the exchange interactions are dominant and the GS is a ferromagnet (FM). It is interesting to note the systematic transition from the AFM phase to the FM phase via the onset of ferromagnetic alignment – first along a single-site one-dimensional column (CAFM), then along a two-dimensional layer (LAFM) and finally . The lower panel depicts the corresponding ground state (GS) configurations for each phase. The symmetry of the Hamiltonian under $\sigma_{i}\rightarrow-\sigma_{i}$ spins results in degenerate GS. The degeneracy is two for Phases I, II, IV, and four for Phase III. The equilibrium states for a given value of $\Gamma$ at non-zero $T$ will be combinations of the corresponding degenerate GS, separated by frustrated spins due to conflicting interactions. The free energy landscape is complex with several local minima, especially in the dipolar-dominated regimes. A large number of experimental realizations of the DIM indeed exhibit a non- trivial organization of dipoles in the (so-called) equilibrium phase. For example, magnetic measurements of rare earth hydroxides reveal FM ordering for $\text{Tb(OH)}_{3}$, $\text{Dy(OH)}_{3}$ and $\text{Ho(OH)}_{3}$, and a complex AFM ordering for $\text{Nd(OH)}_{3}$ and $\text{Gd(OH)}_{3}$ Wolf et al. (1968). Amongst rare-earth fluorides, LiHoF4 and LiTbF4 exhibit FM ordering, while LiErF4 shows AFM ordering Battison et al. (1975); Biltmo and Henelius (2009); Holmes et al. (1973); Beauvillain et al. (1977). Similar observations have been made in the context of rare earth ethyl sulphates Cooke et al. (1959), rare earth perovskites Wu et al. (2017, 2019), and rare earth garnets Cai et al. (2019). The above examples have captured much attention in modern solid state physics and materials science because they exhibit interesting magnetic, multiferroic, and optical effects. Some of these systems, due to their low critical temperatures, are also realizations of quantum Hamiltonians and exhibit phase transitions driven by quantum fluctuations Bitko et al. (1996); Schechter and Stamp (2005). The presence of a glassy phase due to frustrated moments arising from conflicting FM and AFM interactions has also been seriously contemplated Piatek et al. (2013); Andresen et al. (2014); Alonso and Allés (2017). Recent inclusions in the family of dipolar solids are self-assembled super-lattices of mono-disperse magnetic nanoparticles such as ferric oxide (Fe2O3) or magnetite (Fe3O4) Bae et al. (2007); Singh et al. (2014). They exhibit a rich phase diagram revealing a variety of stable structures such as hexagonal close-packed, face centered cubic, spherical, cylindrical, etc Talapin et al. (2007); Boles et al. (2016). Complex and almost perfect geometric ordering of the nano-dipoles has also been observed in microscopy snapshots Taheri et al. (2015). Both these observations have been interpreted in the context of dipolar interactions between individual particles. Laboratory experiments generally require application of external fields that drive the system out-of-equilibrium. The system re-equilibrates, and the approach to equilibrium critically depends on the free energy landscape. An important non-equilibrium study in this context is the kinetics of domain growth or phase ordering, initiated by a sudden quench of the system from the disordered phase to the ordered phase Puri and Wadhawan (2009). The subsequent domain growth or coarsening, characterized by a growing length scale $\ell(t)$, is monitored with time. The growth law reveals details of the free energy landscape and relaxation time-scales Lai et al. (1988). For example, pure and isotropic systems with non-conserved kinetics such as the Ising model ($D=0$) obey the Lifshitz-Allen-Cahn (LAC) law: $\ell(t)\sim t^{1/2}$ Lifshitz (1962); Allen and Cahn (1979). It is characteristic of systems with no energy barriers to coarsening and a unique relaxation time-scale. Systems with complicated free energy landscape due to disorder and competing interactions have a plethora of relaxation time-scales Binder and Young (1986); Fischer and Hertz (1991); Janke (2008); Ros et al. (2019). The interfaces are usually rough fractals, and the barriers to coarsening grow as a power law of the domain size Villain (1984); Shrivastav et al. (2011, 2014). Domain growth in these systems exhibits logarithmic behavior in the asymptotic limit Corberi et al. (2012). In spite of its wide-ranging presence, there are only a few studies of the DIM in $d=3$, and non-equilibrium phenomena are even less addressed Bupathy et al. (2017, 2018). This is primarily because handling long-ranged interactions is notoriously difficult, both analytically and computationally. Thus challenged, we were motivated to develop theoretical techniques to study the DIM. In a benchmarking study, we investigated coarsening via large-scale Monte Carlo (MC) simulations on cubic lattices $(L=128)$ using Ewald summation procedures to accurately handle the long-range dipolar interactions Bupathy et al. (2017). We investigated their effect on growth laws in the FM phase for a limited range of $\Gamma$ values $(\gtrsim 0.16)$. Encouraged by the unusual observation of anisotropic growth laws in this simplest phase, we now undertake the task of exploring the entire phase diagram. Our investigations are guided by the following questions: Are the growth laws distinct in the four phases or are they universal? What information can we obtain about the energy landscapes of the four phases? Is the system characterized by a universal scaling behavior or is it phase specific? Does the complexity and frustration introduced by dipolar interactions yield rough fractal interfaces? There are two important results in our paper. Our first finding is that, although the equilibrium states in the four phases have distinct symmetry and the interactions are anisotropic, the system obeys the LAC domain growth law $\ell(t)\sim t^{1/2}$ across phases and directions. The growth exponent $1/2$ is universal for the DIM. The second important result is that the two-point equal-time correlation function that quantifies domain growth exhibits generalized scaling in all phases: $C\left(x,y,z,t\right)=g(\rho/\ell_{\rho},z/\ell_{z})$, where $\rho$ is the radial coordinate in the $xy$-plane. The coarsening system is thus characterized by unique but distinct length-scales along $xy$ and $z$ directions. The scaling function in both directions is universal, and can be approximated by the well-known Ohta-Jasnow-Kawasaki (OJK) function Ohta et al. (1982); Puri and Wadhawan (2009). The rest of the paper is organized as follows. In Section 2, we present detailed numerical results on coarsening in phases 1-4 of the DIM. Section 3 provides a summary and discussion. ## II Coarsening Studies We now proceed to present detailed results from our studies of coarsening. These studies use local single-spin flip moves which are computationally expensive in contrast to the cluster algorithms often used for equilibrium studies. Further, in systems with long-range dipolar interactions, spins separated by multiple lattice spacings also contribute to the energy. An explicit evaluation of the latter is only possible for small systems as the number of computations scales as $O(N^{2})$. A successful procedure for dealing with long-range interactions is the Ewald summation technique Frenkel and Smit (1996). The basic idea here is to write the potential in two parts using the identity: $\dfrac{1}{r^{3}}=\dfrac{f(r)}{r^{3}}+\dfrac{1-f(r)}{r^{3}}.$ (2) Here, $f(r)$ is an appropriate splitting function with the following properties: (i) The first part is negligible beyond a certain cutoff $r_{\rm cut}$ so that the summation up to this cutoff is a good approximation of this contribution to the total energy. (ii) The second part is a slowly varying function for all $r$ so that its Fourier transform can be represented by only a few $k$-vectors with $|k|\leq k_{\rm cut}=2\pi/r_{\rm cut}$. Therefore, this part can be efficiently evaluated in reciprocal space. There are many choices of $f(r)$ that satisfy the above two conditions, but the usual choice is a complementary error function: $\text{erfc}(r)=\dfrac{2}{\sqrt{\pi}}\int_{r}^{\infty}e^{-t^{2}}dt.$ (3) In particular, we use $f(r)=\text{erfc}(\sqrt{\eta}~{}r)$, where the Ewald splitting parameter $\eta$ decides the relative weights of the real and Fourier terms. By a suitable choice of $\eta$, we can optimize the computation time for a specified error bound. An excellent discussion of this procedure is found in Ref. Holm (2004). Using cubic systems of up to $128^{3}$ spins, we performed deep quenches to $T=0.5\ T_{c}(\Gamma)$ in the ordered phase. The quench locations are marked in the phase diagram in Fig. 1. The initial state for all quenches was chosen to be a random configuration of $\sigma_{i}=\pm 1$ corresponding to the disordered (paramagnetic) phase. The Ewald summation technique with metallic boundary conditions was used to compute the dipolar term of Eq. (1) Frenkel and Smit (1996) . We chose the Ewald splitting parameter $\eta=0.032$, which yields an error of $\delta=10^{-3}$ in the evaluation of the dipolar term. We also performed simulations designed to yield an error of $\delta=10^{-4}$ on smaller lattices. This did not alter the growth laws obtained with $\delta=10^{-3}$ for larger lattices. The system evolution was studied using spin-flip Glauber dynamics with the standard Metropolis procedure up to 1024 MC steps (MCS). In each phase, the acceptance rate (fraction of spins flipped in 1 MCS) decreases exponentially with time. In Table 1, we show typical values of the acceptance rate in the 4 quenches studied in this paper. Table 1: Typical values of the acceptance rate at different times in the four quenches studied here. $\Gamma$ | $-10.0$ | 0.0 | 0.14 | $\infty$ ---|---|---|---|--- $t=10^{0}$ | 0.345 | 0.358 | 0.335 | 0.537 $t=10^{1}$ | 0.052 | 0.080 | 0.066 | 0.147 $t=10^{2}$ | 0.014 | 0.024 | 0.027 | 0.055 $t=10^{3}$ | 0.001 | 0.003 | 0.003 | 0.012 All statistical quantities have been averaged over $10$ different initial conditions. This results in error bars for the correlation function and length scale data which are smaller than the symbol sizes we use subsequently for these quantities. In Fig. 2, we present typical snapshots of coarsening morphologies in the four phases. The top row shows the snapshots at $t=8$ MCS, and the second row at $t=64$ MCS. During the coarsening process, the degenerate equilibrium states compete with one another, and the corresponding domains are separated by interfacial defects. As time evolves, the defects annihilate and the system selects one of the ground states. The different colors in each snapshot represent domains of one of the degenerate ground states of that phase, as shown in the keys below. To identify the domains in phases I-III, a standard prescription is used to define the staggered magnetization: (i) In phase I, the morphology has AFM spin arrangement along $x$, $y$ and $z$ directions. The staggered spin variables are obtained using: $\psi_{xyz}=(-1)^{x+y+z}\sigma_{xyz}.$ (4) The green (blue) domains in Fig. 2(a) correspond to correlated regions of up (down) spins in the staggered representation. The key below also shows the corresponding GS configurations in terms of the original spin variables $\sigma_{xyz}$. (ii) In phase II, the morphology is AFM along the $x$ and $y$ directions, and FM along the $z$ direction. So the spins are staggered using: $\psi_{xyz}=(-1)^{x+y}\sigma_{xyz}.$ (5) The green (blue) domains in Fig. 2(b) correspond to correlated regions of up (down) spins in the staggered representation of the GS. (iii) In phase III, the morphology comprises of FM $xz$ (or $yz$) planes with an AFM arrangement in the $y$ ($x$) direction. In such morphologies, the system is characterized by a two-component order parameter $\vec{\psi}_{xyz}\equiv\left(\psi^{1}_{xyz},\psi^{2}_{xyz}\right)$ Krinsky and Mukamel (1977); Sadiq and Binder (1984) with $\displaystyle\psi^{1}_{xyz}$ $\displaystyle=$ $\displaystyle(-1)^{x}\frac{1}{4}\left[\sigma_{xyz}+\sigma_{x(y+1)z}-\left(\sigma_{(x+1)yz}+\sigma_{(x+1)(y+1)z}\right)\right],$ (6) $\displaystyle\psi^{2}_{xyz}$ $\displaystyle=$ $\displaystyle(-1)^{y}\frac{1}{4}\left[\sigma_{xyz}+\sigma_{(x+1)yz}-\left(\sigma_{x(y+1)z}+\sigma_{(x+1)(y+1)z}\right)\right].$ (7) In the morphologies in Fig. 2(c), a site is assigned: green for $\vec{\psi}_{xyz}=(1,0)$; blue for $\vec{\psi}_{xyz}=(-1,0)$; red for $\vec{\psi}_{xyz}=(0,1)$; orange for $\vec{\psi}_{xyz}=(0,-1)$. Each of the colored domains represents correlated regions corresponding to one of the four GS, as shown in the key below. (iv) No staggering is required for the morphologies in Fig. 2(d) in the FM phase. For uniformity of notation, we assign $\psi_{xyz}=\sigma_{xyz}$. Clearly, the domains in each phase grow with time, although the growth is faster in the $z$ direction as compared in the $xy$ plane. However, the growth in the $xy$ plane for Fig. 2(c) is arrested as the system gets stuck in metastable states. The problem of metastability is widespread in phase III due to the presence of four competing GS. The length scales associated with the evolving domains can be evaluated from the two-point equal-time correlation function: $C(\vec{r},t)=\langle\psi(\vec{r}_{1},t)\psi(\vec{r}_{2},t)\rangle-\langle\psi(\vec{r}_{1},t)\rangle\ \langle\psi(\vec{r}_{2},t)\rangle.$ (8) Here, $\psi$ is the appropriate order parameter, $\vec{r}=\vec{r}_{1}-\vec{r}_{2}$, and $\langle\cdot\cdot\cdot\rangle$ represents an average over independent runs Puri and Wadhawan (2009). In the case of isotropic domain growth, the dynamical scaling ansatz assumes the presence of a single length scale $\ell(t)$. This is demonstrated post facto by the scaling collapse of the correlation function: $C(\vec{r},t)=g(r/\ell)$. The validity of this has been shown in many experiments and simulations. In the anisotropic case considered here, we propose (following Ref. Puri et al. (1992, 1994)) the simplest anisotropic generalization of this ansatz. This also has to be verified post facto by the dynamical scaling of the correlation function. Thus, we introduce $C(\vec{r},t)\equiv C(\vec{\rho},z;t)$ where $\vec{\rho}=(x,y)$. In the case of unique length scales $\ell_{\rho}$ and $\ell_{z}$ characterizing domain growth in the $xy$ and $z$-directions, the correlation function should exhibit generalized dynamical scaling: $C(\vec{\rho},z,t)=g(\rho/\ell_{\rho},z/\ell_{z})$. In the isotropic case, an approximate analytical form of the correlation function for a system described by a scalar nonconserved order parameter has been obtained by Ohta et al. (OJK) by studying the interfacial defect dynamics Ohta et al. (1982); Puri and Wadhawan (2009). The OJK function is given by $C(r,t)=\frac{2}{\pi}\sin^{-1}\gamma,\quad\gamma=\exp\left(-r^{2}/\ell^{2}\right).$ (9) In Fig. 3, we show the scaled correlation functions for phase II with $\Gamma=0$: $C(\vec{\rho},0,t)$ vs. $\rho/\ell_{\rho}$ in Fig. 3(a), and $C(0,z,t)$ vs. $z/\ell_{z}$ in Fig. 3(b). The length scales are self- consistently defined from the data as the distance over which the relevant correlation function decays to 0.2 times its maximum value. We emphasize that no fitting parameters have been used to observe the data collapse. Both data sets exhibit dynamical scaling, indicating that the system is characterized by unique but distinct length-scales along $xy$ and $z$-directions. More striking is their agreement with the OJK function (solid line), which shows that the defect dynamics is robust across directions in spite of the inherent anisotropy of the dipolar interactions. Fig. 3(c) shows $C(\vec{\rho},0,t)$ vs. $\rho/\ell_{\rho}$ for $t=64$ in phases I-IV for the specified values of $\Gamma$. Fig. 3(d) shows the corresponding data for $C(0,z,t)$ vs. $z/\ell_{z}$ for $t=64$. The data collapse is excellent in both Figs. 3(c)-(d), and is well-approximated by the OJK form. These observations reveal that the coarsening morphologies are robust across diverse phases of the DIM. Finally, we discuss the growth laws in the four phases of the DIM. In this context, it is useful to reiterate observations from earlier studies Bray and Rutenberg (1994) of domain growth in the Ising model with isotropic long-range interactions: $J(r_{ij})\sim r_{ij}^{-(d+\mu)}.$ (10) Using energy scaling arguments, Bray-Rutenberg Bray and Rutenberg (1994) predicted the following domain growth laws: $\ell(t)\sim\left\\{\begin{array}[]{ll}t^{1/1+\mu},&\mu<1,\\\ (t\ln t)^{1/2},&\mu=1,\\\ t^{1/2},&\mu>1.\\\ \end{array}\right.$ (11) A recent work by Christiansen et al. Christiansen et al. (2019) has studied coarsening in the $d=2$ Ising model with additional long-range interactions as in Eq. (10). Using efficient numerical schemes, the authors confirmed the predictions in Eq. (11) for many values of $\mu$. The angular dependence of the dipolar interactions yields anisotropic morphologies due to ferromagnetic interactions along the $z$-direction and antiferromagnetic interactions in the $xy$-plane. Roughly speaking, the system behaves as a long-range Ising model along the $z$-axis with $d=1,\mu=2$. Then, the expected growth law from Eq. (11) is $\ell_{z}(t)\sim t^{1/2}$. On the other hand, in the $xy$-plane, we have $d=2,\mu=1$ in Eq. (10). Again, we expect the growth to be predominantly diffusive with logarithmic corrections. In Fig. 4, we present the growth laws $\ell_{\rho}(t)$ vs. $t$ and $\ell_{z}(t)$ vs. $t$ on a log-log scale for phases I-IV. We have not shown $\ell_{\rho}$ vs. $t$ for the LAFM phase as the growth in the $xy$ plane is almost frozen in that phase Kretschmer and Binder (1979). Further, as the growth in the $z$-direction is very rapid, we see finite-size effects in the late-time data for the FM phase. The error bars for each data point are smaller than the symbol sizes used except in the regime where finite-size effects are seen. The dashed lines with the expected slope 1/2 have been plotted for reference. It is striking that the growth in both directions, in spite of the diversity of phases and the inherent anisotropy of the dipolar interactions, obeys the universal LAC law $\ell(t)\sim t^{1/2}$! Their presence is thus confined to the prefactors alone. There are no length-scale- dependent barriers to coarsening in the DIM, and the non-equilibrium evolution is characterized by a unique relaxation time-scale. (In our earlier study, the domain growth in the FM phase is studied for smaller values of $\Gamma\gtrsim 0.16$ that are close to the phase boundary separating the LAFM and FM phase Bupathy et al. (2017). Here, longer timescales are required to observe the $t^{1/2}$ law and the anisotropy is again contained in the pre-factors.) Before concluding, it is relevant to ask how the finite size of the system would affect the growth laws. In contrast to the equilibrium case, various physical quantities do not change systematically with the system size. Rather, the domains grow in a power-law manner until the domain scale becomes some significant fraction of the lateral system size. After that, finite-size effects are seen via a crossover to a regime with flattening and saturation of the domain growth law. Typically, the data sets for different system sizes are numerically coincident until they encounter finite-size effects. This is shown in Fig. 4(b) for the case with $\Gamma=0$. ## III Summary and Discussion We end this paper with a summary of our results, their implications, and future directions. We have performed large-scale Monte Carlo (MC) simulations to study coarsening dynamics in the dipolar Ising model (DIM) which encompasses short-range exchange interactions as well as long-range dipolar interactions. This model is characterized by four distinct phases: (i) antiferromagnet (AFM), (ii) columnar antiferromagnet (CAFM), (iii) layered antiferromagnet (LAFM), (iv) ferromagnet (FM). The dipolar interactions lead to diverse ground state (GS) configurations with strong anisotropy. Yet the non-equilibrium dynamics is characterized by universality. Our main observations are (i) the spatial correlation function exhibits universal scaling; (ii) The domain growth law obeys the universal Lifshitz-Allen-Cahn law $\ell(t)\sim t^{1/2}$. Thermal quenches are a starting point for many non-equilibrium studies in the laboratory. In these experiments, the system often accesses long-lived metastable states that are encountered in our simulations. So our observations could provide a fresh outlook to interpret relaxation phenomena in dipolar solids Chamberlain and Corruccini (2005); Biltmo and Henelius (2009); Wu et al. (2019). Our work also suggests novel experimental investigations in the more contemporary self-assembled super-lattices Ku et al. (2011). In the latter system, the constituent magnetic nanoparticles are usually functionalized with an insulating surfactant layer to prevent aggregation. The surfactant thickness can be adjusted to manipulate dipole-dipole interactions to tailor spin morphologies dictated by applications. For example, a large class of self-assembled lattices finds applications for spintronic devices that require an AFM arrangement of the nano-dipoles for efficient operation Black et al. (2000); Kechrakos and Trohidou (2005); Dugay et al. (2011); Usmani et al. (2018); Bupathy et al. (2019); Déjardin (2011); Anand et al. (2019). An improved understanding of the interplay of short-range and long- range interactions would yield better strategies to achieve such challenges. To the best of our knowledge, this is the first study of coarsening in ($d=3$) dipolar solids. The developed methodologies provide a basis for relaxation studies in systems with anisotropic and long-range interactions in general. We have identified unexpected dynamical universalities in the DIM, which is representative of a large class of microscopic and mesoscopic systems. However, there are many puzzles that still need to be understood. For example the basis for universality, the role of lattice geometry and other forms of long-range interactions, and the possibility of the glassy state in the LAFM phase are open questions. Another non-equilibrium phenomenon of great relevance in experimental systems is that of aging Binder and Young (1986); Fischer and Hertz (1991). This property probes the history-dependent evolution of correlation and response functions when the system is driven out-of- equilibrium by, e.g., a thermal quench or the application of a magnetic field. There are a few such studies for the Ising model with long-range interactions in $d=2$, and these have suggested novel violations, phases and exponents Stariolo and Cannas (1999); Cannas et al. (2008); Christiansen et al. (2020). It will be interesting to study aging phenomena in the anisotropic DIM. The consequence of special directions on the relationship between waiting times and relaxation times is an open question. We hope that our study will motivate investigations to seek these answers, which are important for fundamental understanding as well as experimental interpretations. ### Acknowledgements SK acknowledges the HPC facility at the Jawaharlal Nehru University, New Delhi, and useful discussions with Arunkumar Bupathy. VB acknowledges DST, India for a MATRICS research grant. ## References * Kretschmer and Binder (1979) R. Kretschmer and K. Binder, Z. Phys. B 34, 375 (1979). * Merz (1954) W. J. Merz, Phys. Rev. 95, 690 (1954). * Molnar et al. (1997) A. A. Molnar, Y. M. Vysochanskii, A. A. Horvat, and Y. S. Nakonechnii, Ferroelectrics 192, 137 (1997). * Chakraborty et al. (2004) P. B. Chakraborty, P. Henelius, H. Kjønsberg, A. W. Sandvik, and S. M. Girvin, Phys. Rev. B 70, 144411 (2004). * Chamberlain and Corruccini (2005) S. L. Chamberlain and L. R. Corruccini, Phys. Rev. B 71, 024434 (2005). * Biltmo and Henelius (2009) A. Biltmo and P. Henelius, Europhys. Lett. 87, 27007 (2009). * Wu et al. (2017) L. S. Wu, S. E. Nikitin, M. Frontzek, A. I. Kolesnikov, G. Ehlers, M. D. Lumsden, K. A. Shaykhutdinov, E.-J. Guo, A. T. Savici, Z. Gai, et al., Phys. Rev. B 96, 144407 (2017). * Cai et al. (2019) Y. Cai, M. N. Wilson, J. Beare, C. Lygouras, G. Thomas, D. R. Yahne, K. Ross, K. M. Taddei, G. Sala, H. A. Dabkowska, et al., Phys. Rev. B 100, 184415 (2019). * Wolf et al. (1968) W. P. Wolf, H. Meissner, and C. A. Catanese, J. Appl. Phys. 39, 1134 (1968). * Battison et al. (1975) J. E. Battison, A. Kasten, M. J. M. Leask, J. B. Lowry, and B. M. Wanklyn, J. Phys. C 8, 4089 (1975). * Holmes et al. (1973) L. M. Holmes, T. Johansson, and H. J. Guggenheim, Solid State Commun. 12, 993 (1973). * Beauvillain et al. (1977) P. Beauvillain, J. P. Renard, and P. E. Hansen, J. Phys. C 10, L709 (1977). * Cooke et al. (1959) A. H. Cooke, D. T. Edmonds, C. B. P. Finn, and W. P. Wolf, Proc. Phys. Soc. 74, 791 (1959). * Wu et al. (2019) L. S. Wu, S. E. Nikitin, M. Brando, L. Vasylechko, G. Ehlers, M. Frontzek, A. T. Savici, G. Sala, A. D. Christianson, M. D. Lumsden, et al., Phys. Rev. B 99, 195117 (2019). * Bitko et al. (1996) D. Bitko, T. F. Rosenbaum, and G. Aeppli, Phys. Rev. Lett. 77, 940 (1996). * Schechter and Stamp (2005) M. Schechter and P. C. E. Stamp, Phys. Rev. Lett. 95, 267208 (2005). * Piatek et al. (2013) J. O. Piatek, B. Dalla Piazza, N. Nikseresht, N. Tsyrulin, I. Živković, K. W. Krämer, M. Laver, K. Prokes, S. Mataš, N. B. Christensen, et al., Phys. Rev. B 88, 014408 (2013). * Andresen et al. (2014) J. C. Andresen, H. G. Katzgraber, V. Oganesyan, and M. Schechter, Phys. Rev. X 4, 041016 (2014). * Alonso and Allés (2017) J. J. Alonso and B. Allés, J Phys. Condens. Matter 29, 355802 (2017). * Bae et al. (2007) C. J. Bae, S. Angappane, J.-G. Park, Y. Lee, J. Lee, K. An, and T. Hyeon, Appl. Phys. Lett. 91, 102502 (2007). * Singh et al. (2014) G. Singh, H. Chan, A. Baskin, E. Gelman, N. Repnin, P. Král, and R. Klajn, Science 345, 1149 (2014). * Talapin et al. (2007) D. V. Talapin, E. V. Shevchenko, C. B. Murray, A. V. Titov, and P. Král, Nano Lett. 7, 1213 (2007). * Boles et al. (2016) M. A. Boles, M. Engel, and D. V. Talapin, Chem. Rev. 116, 11220 (2016). * Taheri et al. (2015) S. M. Taheri, M. Michaelis, T. Friedrich, B. Förster, M. Drechsler, F. M. Römer, P. Bösecke, T. Narayanan, B. Weber, I. Rehberg, et al., PNAS 112, 14484 (2015). * Puri and Wadhawan (2009) S. Puri and V. Wadhawan, _Kinetics of Phase Transitions_ (CRC Press, Boca Raton, 2009). * Lai et al. (1988) Z. W. Lai, G. F. Mazenko, and O. T. Valls, Phys. Rev. B 37, 9481 (1988), URL https://link.aps.org/doi/10.1103/PhysRevB.37.9481. * Lifshitz (1962) I. M. Lifshitz, Sov. Phys. JETP 15, 939 (1962). * Allen and Cahn (1979) S. M. Allen and J. W. Cahn, Acta Metall. 27, 1085 (1979). * Binder and Young (1986) K. Binder and A. P. Young, Rev. Mod. Phys. 58, 801 (1986), URL https://link.aps.org/doi/10.1103/RevModPhys.58.801. * Fischer and Hertz (1991) K. H. Fischer and J. A. Hertz, _Spin Glasses_ , Cambridge Studies in Magnetism (Cambridge University Press, 1991). * Janke (2008) W. Janke, _Rugged Free-Energy Landscapes - An Introduction: In Lecture Notes in Physics_ (Springer Heidelberg, 2008). * Ros et al. (2019) V. Ros, G. Ben Arous, G. Biroli, and C. Cammarota, Phys. Rev. X 9, 011003 (2019). * Villain (1984) J. Villain, Phys. Rev. Lett. 52, 1543 (1984). * Shrivastav et al. (2011) G. P. Shrivastav, S. Krishnamoorthy, V. Banerjee, and S. Puri, Europhys. Lett. 96, 36003 (2011). * Shrivastav et al. (2014) G. P. Shrivastav, M. Kumar, V. Banerjee, and S. Puri, Phys. Rev. E 90, 032140 (2014). * Corberi et al. (2012) F. Corberi, E. Lippiello, A. Mukherjee, S. Puri, and M. Zannetti, Phys. Rev. E 85, 021141 (2012). * Bupathy et al. (2017) A. Bupathy, V. Banerjee, and S. Puri, Phys. Rev. E 95, 060103 (2017). * Bupathy et al. (2018) A. Bupathy, V. Banerjee, and S. Puri, Europhys. Lett. 122, 36002 (2018). * Ohta et al. (1982) T. Ohta, D. Jasnow, and K. Kawasaki, Phys. Rev. Lett. 49, 1223 (1982). * Frenkel and Smit (1996) D. Frenkel and B. Smit, _Understanding Molecular Simulations: From Algorithms to Applications_ (Academic, San Diego, 1996). * Holm (2004) C. Holm, Computational Soft Matter: From Synthetic Polymers to Proteins 23, 195 (2004). * Krinsky and Mukamel (1977) S. Krinsky and D. Mukamel, Phys. Rev. B 16, 2313 (1977). * Sadiq and Binder (1984) A. Sadiq and K. Binder, J. Stat. Phys. 35, 517 (1984). * Puri et al. (1992) S. Puri, K. Binder, and S. Dattagupta, Phys. Rev. B 46, 98 (1992). * Puri et al. (1994) S. Puri, N. Parekh, and S. Dattagupta, J. Stat. Phys. 77, 839 (1994). * Bray and Rutenberg (1994) A. J. Bray and A. D. Rutenberg, Phys. Rev. E 49, R27 (1994). * Christiansen et al. (2019) H. Christiansen, S. Majumder, and W. Janke, Phys. Rev. E 99, 011301 (2019), URL https://link.aps.org/doi/10.1103/PhysRevE.99.011301. * Ku et al. (2011) J. Ku, D. M. Aruguete, A. P. Alivisatos, and P. L. Geissler, J. Am. Chem. Soc. 133, 838 (2011). * Black et al. (2000) C. T. Black, C. B. Murray, R. L. Sandstrom, and S. Sun, Science 290, 1131 (2000). * Kechrakos and Trohidou (2005) D. Kechrakos and K. N. Trohidou, Phys. Rev. B 71, 054416 (2005). * Dugay et al. (2011) J. Dugay, R. P. Tan, A. Meffre, T. Blon, L.-M. Lacroix, J. Carrey, P. F. Fazzini, S. Lachaize, B. Chaudret, and M. Respaud, Nano lett. 11, 5128 (2011). * Usmani et al. (2018) S. Usmani, M. Lepesant, A. Bupathy, T. Blon, L.-M. Lacroix, V. Banerjee, B. Chaudret, and J. Carrey, Phys. Rev. B 98, 104433 (2018). * Bupathy et al. (2019) A. Bupathy, V. Banerjee, and J. Carrey, Phys. Rev. B 100, 064420 (2019). * Déjardin (2011) P. M. Déjardin, J. Appl. Phys. 110, 113921 (2011). * Anand et al. (2019) M. Anand, V. Banerjee, and J. Carrey, Phys. Rev. B 99, 024402 (2019). * Stariolo and Cannas (1999) D. A. Stariolo and S. A. Cannas, Phys. Rev. B 60, 3013 (1999), URL https://link.aps.org/doi/10.1103/PhysRevB.60.3013. * Cannas et al. (2008) S. A. Cannas, M. F. Michelon, D. A. Stariolo, and F. A. Tamarit, Phys. Rev. E 78, 051602 (2008), URL https://link.aps.org/doi/10.1103/PhysRevE.78.051602. * Christiansen et al. (2020) H. Christiansen, S. Majumder, M. Henkel, and W. Janke, Phys. Rev. Lett. 125, 180601 (2020), URL https://link.aps.org/doi/10.1103/PhysRevLett.125.180601. Figure 1: Schematic phase diagram of the DIM model in the $(\Gamma,k_{B}T/D)$-plane, where $\Gamma=J/D$. We set $D=1$ and vary $J,T$. There are four distinct phases: (I) Antiferromagnet (AFM); (II) Columnar antiferromagnet (CAFM); (III) Layered antiferromagnet (LAFM); (IV) Ferromagnet (FM). The corresponding ground state configurations are shown below. The quench locations are marked by crosses, and satisfy $T=0.5T_{c}(\Gamma)$. The corresponding parameter values are $(\Gamma,k_{B}T/D)=(-10,1.75)$ for AFM; $(0,1.19)$ for CAFM; $(0.14,0.825)$ for LAFM; and $(\infty,\infty)$ for FM. Figure 2: Evolution snapshots of the staggered magnetization at $t=8$ MCS (top row) and $t=64$ MCS (second row) for the four phases: (a) AFM, (b) CAFM, (c) LAFM, and (d) FM. The key shows the color code for the degenerate GS in each phase, as described in the text. Figure 3: Scaled correlation functions at $t=16,64,128$ for $\Gamma=0$ in phase II: (a) $C(\rho,0,t)$ vs. $\rho/\ell_{\rho}$, and (b) $C(0,z,t)$ vs. $z/\ell_{z}$. Scaled correlation functions at $t=64$ for specified $\Gamma$-values: (c) $C(\rho,0,t)$ vs. $\rho/\ell_{\rho}$, and (d) $C(0,z,t)$ vs. $z/\ell_{z}$. The solid line in (a)-(d) represents the OJK function. Figure 4: Characteristic length scales, $\ell_{\rho}(t)$ vs. $t$ and $\ell_{z}(t)$ vs. $t$ on a log-log scale. The panels correspond to (a) $\Gamma=-10$; (b) $\Gamma=0$; (c) $\Gamma=0.14$; (d) $\Gamma=\infty$. In (b), we also include data for systems of size $32^{3}$ and $64^{3}$ to show the finite-size effects. In (c), we have not shown $\ell_{\rho}$ vs. $t$ as there is almost no growth in that direction. In (d), the data sets for $\ell_{\rho}$ and $\ell_{z}$ are numerically indistinguishable as the growth is isotropic. The dashed line in each panel denotes the LAC law: $\ell(t)\sim t^{1/2}$.
arxiv-papers
2021-07-27T13:24:30
2024-09-04T03:07:21.625181
{ "license": "Creative Commons - Attribution - https://creativecommons.org/licenses/by/4.0/", "authors": "Shikha Kumari, Sanjay Puri, Varsha Banerjee", "submitter": "Shikha Kumari", "url": "https://arxiv.org/abs/2107.12803" }